URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Submission: On October 16 via api from US

Summary

This website contacted 56 IPs in 7 countries across 52 domains to perform 131 HTTP transactions. The main IP is 2a02:e980:d::87, located in United States and belongs to INCAPSULA - Incapsula Inc, US. The main domain is www.proofpoint.com.
TLS certificate: Issued by Thawte RSA CA 2018 on August 27th 2019. Valid for: a year.
This is the only time www.proofpoint.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
40 2a02:e980:d::87 19551 (INCAPSULA)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 3 216.58.205.226 15169 (GOOGLE)
2 184.31.84.223 20940 (AKAMAI-ASN1)
3 2a00:1450:400... 15169 (GOOGLE)
1 23.38.51.49 20940 (AKAMAI-ASN1)
2 4 2a00:1450:400... 15169 (GOOGLE)
4 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 143.204.101.110 16509 (AMAZON-02)
2 2a00:1450:400... 15169 (GOOGLE)
2 4 2a00:1450:400... 15169 (GOOGLE)
4 2a00:1450:400... 15169 (GOOGLE)
2 2620:1ec:c11:... 8068 (MICROSOFT...)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
1 151.101.12.157 54113 (FASTLY)
1 147.75.85.119 54825 (PACKET)
1 91.228.74.252 27281 (QUANTCAST)
3 2a03:2880:f02... 32934 (FACEBOOK)
2 4 52.208.204.25 16509 (AMAZON-02)
2 159.122.87.153 36351 (SOFTLAYER)
5 2606:4700::68... 13335 (CLOUDFLAR...)
4 2a00:1450:400... 15169 (GOOGLE)
2 143.204.101.122 16509 (AMAZON-02)
1 1 68.67.153.60 29990 (ASN-APPNEXUS)
2 2 37.252.173.22 29990 (ASN-APPNEXUS)
1 13.224.196.10 16509 (AMAZON-02)
1 1 216.200.122.11 6461 (ZAYO-6461)
2 2 216.58.205.230 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 2 2a00:1450:400... 15169 (GOOGLE)
1 2 2a05:f500:10:... 14413 (LINKEDIN)
1 1 2a05:f500:10:... 14413 (LINKEDIN)
2 2 52.30.193.62 16509 (AMAZON-02)
1 2 143.204.101.119 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 23.210.248.44 16625 (AKAMAI-AS)
1 5 2.18.233.40 16625 (AKAMAI-AS)
1 2 172.217.16.198 15169 (GOOGLE)
2 147.75.85.99 54825 (PACKET)
3 2a03:2880:f12... 32934 (FACEBOOK)
1 2600:9000:200... 16509 (AMAZON-02)
1 104.244.42.133 13414 (TWITTER)
1 192.28.144.124 15224 (OMNITURE)
1 2a00:1450:400... 15169 (GOOGLE)
14 17 54.228.197.115 16509 (AMAZON-02)
1 91.228.74.249 27281 (QUANTCAST)
2 2 35.156.24.221 16509 (AMAZON-02)
1 2 3.122.14.108 16509 (AMAZON-02)
1 2 2.18.234.21 16625 (AKAMAI-AS)
1 69.173.144.136 26667 (RUBICONPR...)
1 3 151.101.14.2 54113 (FASTLY)
1 185.64.189.110 62713 (AS-PUBMATIC)
1 1 2a00:1288:110... 34010 (YAHOO-IRD)
1 2 3.123.114.61 16509 (AMAZON-02)
1 2 3.121.253.254 16509 (AMAZON-02)
1 37.252.173.27 29990 (ASN-APPNEXUS)
1 35.190.72.21 15169 (GOOGLE)
1 2 34.95.120.147 15169 (GOOGLE)
1 151.101.14.110 54113 (FASTLY)
1 104.244.42.131 13414 (TWITTER)
2 2a00:1450:400... 15169 (GOOGLE)
1 162.247.242.19 23467 (NEWRELIC-...)
131 56
Apex Domain
Subdomains
Transfer
40 proofpoint.com
www.proofpoint.com
2 MB
22 adroll.com
s.adroll.com
d.adroll.com
26 KB
9 doubleclick.net
googleads.g.doubleclick.net
ad.doubleclick.net
stats.g.doubleclick.net
4788165.fls.doubleclick.net
cm.g.doubleclick.net
4 KB
5 g2crowd.com
tracking.g2crowd.com
5 google.com
www.google.com
adservice.google.com
702 B
5 googleapis.com
fonts.googleapis.com
storage.googleapis.com
1 MB
4 company-target.com
api.company-target.com
segments.company-target.com
4 KB
4 reactful.com
visitor.reactful.com
tracking.reactful.com
124 KB
4 avocet.io
ads.avocet.io
2 KB
4 google.de
www.google.de
438 B
4 gstatic.com
fonts.gstatic.com
40 KB
4 google-analytics.com
www.google-analytics.com
40 KB
3 yahoo.com
ups.analytics.yahoo.com
ads.yahoo.com
1 KB
3 facebook.com
www.facebook.com
513 B
3 linkedin.com
px.ads.linkedin.com
www.linkedin.com
2 KB
3 adnxs.com
secure.adnxs.com
ib.adnxs.com
2 KB
3 facebook.net
connect.facebook.net
154 KB
3 hotjar.com
static.hotjar.com
script.hotjar.com
vars.hotjar.com
75 KB
2 openx.net
us-u.openx.net
481 B
2 bidswitch.net
x.bidswitch.net
911 B
2 3lift.com
eb2.3lift.com
694 B
2 outbrain.com
sync.outbrain.com
701 B
2 casalemedia.com
dsum-sec.casalemedia.com
2 KB
2 advertising.com
pixel.advertising.com
722 B
2 bidr.io
match.prod.bidr.io
752 B
2 visualwebsiteoptimizer.com
dev.visualwebsiteoptimizer.com
907 B
2 quantserve.com
secure.quantserve.com
pixel.quantserve.com
6 KB
2 bing.com
bat.bing.com
7 KB
2 marketo.net
munchkin.marketo.net
6 KB
2 googleadservices.com
www.googleadservices.com
18 KB
2 maxmind.com
js.maxmind.com
geoip-js.maxmind.com
3 KB
1 nr-data.net
bam.nr-data.net
260 B
1 twitter.com
analytics.twitter.com
634 B
1 newrelic.com
js-agent.newrelic.com
9 KB
1 rlcdn.com
idsync.rlcdn.com
62 B
1 taboola.com
trc.taboola.com
262 B
1 pubmatic.com
simage2.pubmatic.com
862 B
1 rubiconproject.com
pixel.rubiconproject.com
239 B
1 ytimg.com
s.ytimg.com
9 KB
1 mktoresp.com
309-rhv-619.mktoresp.com
303 B
1 t.co
t.co
448 B
1 quantcount.com
rules.quantcount.com
354 B
1 addthis.com
s7.addthis.com
113 KB
1 youtube.com
www.youtube.com
929 B
1 gwmtracking.com
gwmtracking.com
375 B
1 ml-api.io
attr.ml-api.io
484 B
1 ml-attr.com
s.ml-attr.com
280 B
1 ads-twitter.com
static.ads-twitter.com
2 KB
1 bizographics.com
sjs.bizographics.com
2 KB
1 demandbase.com
scripts.demandbase.com
18 KB
1 googletagmanager.com
www.googletagmanager.com
37 KB
1 typography.com
cloud.typography.com
131 52
Domain Requested by
40 www.proofpoint.com www.proofpoint.com
17 d.adroll.com 14 redirects s.adroll.com
www.proofpoint.com
5 s.adroll.com 1 redirects www.googletagmanager.com
www.proofpoint.com
s.adroll.com
5 tracking.g2crowd.com www.proofpoint.com
4 ads.avocet.io 2 redirects www.proofpoint.com
4 www.google.de www.proofpoint.com
4 www.google.com 2 redirects www.proofpoint.com
4 fonts.gstatic.com www.proofpoint.com
4 www.google-analytics.com 2 redirects www.proofpoint.com
www.google-analytics.com
3 www.facebook.com www.proofpoint.com
connect.facebook.net
3 connect.facebook.net www.proofpoint.com
connect.facebook.net
3 fonts.googleapis.com www.proofpoint.com
visitor.reactful.com
2 storage.googleapis.com
2 tracking.reactful.com visitor.reactful.com
2 us-u.openx.net 1 redirects www.proofpoint.com
2 x.bidswitch.net 1 redirects www.proofpoint.com
2 eb2.3lift.com 1 redirects www.proofpoint.com
2 sync.outbrain.com 1 redirects www.proofpoint.com
2 dsum-sec.casalemedia.com 1 redirects www.proofpoint.com
2 ups.analytics.yahoo.com 1 redirects www.proofpoint.com
2 pixel.advertising.com 2 redirects
2 4788165.fls.doubleclick.net 1 redirects www.googletagmanager.com
2 segments.company-target.com 1 redirects www.proofpoint.com
2 match.prod.bidr.io 2 redirects
2 px.ads.linkedin.com 1 redirects www.proofpoint.com
2 stats.g.doubleclick.net 2 redirects
2 ad.doubleclick.net 2 redirects
2 secure.adnxs.com 2 redirects
2 api.company-target.com www.proofpoint.com
scripts.demandbase.com
2 visitor.reactful.com www.proofpoint.com
visitor.reactful.com
2 dev.visualwebsiteoptimizer.com www.proofpoint.com
2 bat.bing.com www.googletagmanager.com
www.proofpoint.com
2 googleads.g.doubleclick.net www.googleadservices.com
2 munchkin.marketo.net www.proofpoint.com
munchkin.marketo.net
2 www.googleadservices.com www.proofpoint.com
www.googletagmanager.com
1 bam.nr-data.net js-agent.newrelic.com
1 analytics.twitter.com static.ads-twitter.com
1 js-agent.newrelic.com www.proofpoint.com
1 cm.g.doubleclick.net 1 redirects
1 idsync.rlcdn.com www.proofpoint.com
1 ib.adnxs.com www.proofpoint.com
1 trc.taboola.com www.proofpoint.com
1 ads.yahoo.com 1 redirects
1 simage2.pubmatic.com www.proofpoint.com
1 pixel.rubiconproject.com www.proofpoint.com
1 pixel.quantserve.com www.proofpoint.com
1 vars.hotjar.com static.hotjar.com
1 s.ytimg.com www.youtube.com
1 309-rhv-619.mktoresp.com munchkin.marketo.net
1 t.co www.proofpoint.com
1 rules.quantcount.com secure.quantserve.com
1 script.hotjar.com static.hotjar.com
1 s7.addthis.com www.proofpoint.com
1 geoip-js.maxmind.com js.maxmind.com
1 www.youtube.com www.proofpoint.com
1 www.linkedin.com 1 redirects
1 adservice.google.com www.proofpoint.com
1 gwmtracking.com 1 redirects
1 attr.ml-api.io www.proofpoint.com
1 s.ml-attr.com 1 redirects
1 secure.quantserve.com www.googletagmanager.com
1 static.hotjar.com www.googletagmanager.com
1 static.ads-twitter.com www.googletagmanager.com
1 sjs.bizographics.com www.googletagmanager.com
1 scripts.demandbase.com www.proofpoint.com
1 www.googletagmanager.com www.proofpoint.com
1 cloud.typography.com www.proofpoint.com
1 js.maxmind.com www.proofpoint.com
131 68
Subject Issuer Validity Valid
proofpoint.com
Thawte RSA CA 2018
2019-08-27 -
2020-08-26
a year crt.sh
*.maxmind.com
COMODO RSA Organization Validation Secure Server CA
2018-10-15 -
2020-11-06
2 years crt.sh
www.googleadservices.com
GTS CA 1O1
2019-09-17 -
2019-12-10
3 months crt.sh
*.marketo.net
DigiCert SHA2 Secure Server CA
2018-12-24 -
2020-03-24
a year crt.sh
*.googleapis.com
GTS CA 1O1
2019-09-17 -
2019-12-10
3 months crt.sh
*.typography.com
DigiCert SHA2 Secure Server CA
2019-03-23 -
2020-06-21
a year crt.sh
*.google-analytics.com
GTS CA 1O1
2019-09-17 -
2019-12-10
3 months crt.sh
*.google.com
GTS CA 1O1
2019-10-03 -
2019-12-26
3 months crt.sh
*.demandbase.com
Go Daddy Secure Certificate Authority - G2
2018-09-20 -
2020-11-19
2 years crt.sh
*.g.doubleclick.net
GTS CA 1O1
2019-09-17 -
2019-12-10
3 months crt.sh
www.google.com
GTS CA 1O1
2019-10-03 -
2019-12-26
3 months crt.sh
www.google.de
GTS CA 1O1
2019-10-03 -
2019-12-26
3 months crt.sh
www.bing.com
Microsoft IT TLS CA 2
2019-04-30 -
2021-04-30
2 years crt.sh
js.bizographics.com
DigiCert SHA2 Secure Server CA
2018-04-13 -
2020-04-17
2 years crt.sh
ads-twitter.com
DigiCert SHA2 High Assurance Server CA
2019-08-14 -
2020-08-18
a year crt.sh
static.hotjar.com
Let's Encrypt Authority X3
2019-10-06 -
2020-01-04
3 months crt.sh
*.quantserve.com
DigiCert SHA2 High Assurance Server CA
2019-10-04 -
2020-10-07
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-09-22 -
2019-12-20
3 months crt.sh
*.avocet.io
Amazon
2019-07-06 -
2020-08-06
a year crt.sh
*.visualwebsiteoptimizer.com
Starfield Secure Certificate Authority - G2
2017-06-30 -
2020-07-06
3 years crt.sh
*.g2crowd.com
Sectigo ECC Domain Validation Secure Server CA
2019-08-06 -
2020-09-28
a year crt.sh
*.reactful.com
Go Daddy Secure Certificate Authority - G2
2019-03-10 -
2020-05-09
a year crt.sh
*.company-target.com
Go Daddy Secure Certificate Authority - G2
2019-06-19 -
2021-08-18
2 years crt.sh
*.ml-api.io
Amazon
2019-02-22 -
2020-03-22
a year crt.sh
px.ads.linkedin.com
DigiCert SHA2 Secure Server CA
2019-05-29 -
2021-06-29
2 years crt.sh
odc-prod-01.oracle.com
DigiCert SHA2 Secure Server CA
2019-10-10 -
2020-09-04
a year crt.sh
*.adroll.com
DigiCert SHA2 Secure Server CA
2018-12-19 -
2020-03-19
a year crt.sh
*.doubleclick.net
GTS CA 1O1
2019-10-03 -
2019-12-26
3 months crt.sh
script.hotjar.com
Let's Encrypt Authority X3
2019-10-06 -
2020-01-04
3 months crt.sh
t.co
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
*.mktoresp.com
GeoTrust RSA CA 2018
2018-02-05 -
2020-02-05
2 years crt.sh
vars.hotjar.com
Let's Encrypt Authority X3
2019-10-06 -
2020-01-04
3 months crt.sh
ups.analytics.yahoo.com
DigiCert SHA2 High Assurance Server CA
2019-05-08 -
2019-11-04
6 months crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2019-07-17 -
2020-03-09
8 months crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2019-01-10 -
2021-01-14
2 years crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-07-30 -
2020-07-25
a year crt.sh
*.pubmatic.com
Sectigo RSA Organization Validation Secure Server CA
2019-02-22 -
2021-02-21
2 years crt.sh
*.3lift.com
Amazon
2019-07-17 -
2020-08-17
a year crt.sh
*.bidswitch.net
Sectigo RSA Domain Validation Secure Server CA
2019-04-17 -
2020-05-04
a year crt.sh
*.adnxs.com
DigiCert ECC Secure Server CA
2019-01-23 -
2021-03-08
2 years crt.sh
*.rlcdn.com
Sectigo RSA Domain Validation Secure Server CA
2019-04-24 -
2020-04-23
a year crt.sh
*.openx.net
GeoTrust RSA CA 2018
2018-01-04 -
2020-07-09
3 years crt.sh
f4.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-04-10 -
2020-03-21
a year crt.sh
*.twitter.com
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
*.storage.googleapis.com
GTS CA 1O1
2019-09-17 -
2019-12-10
3 months crt.sh
*.nr-data.net
GeoTrust RSA CA 2018
2018-01-11 -
2020-03-17
2 years crt.sh

This page contains 3 frames:

Primary Page: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Frame ID: 1F273B5EE2F0D775A55F9EBF5549413C
Requests: 141 HTTP requests in this frame

Frame: https://4788165.fls.doubleclick.net/activityi;dc_pre=COzE4u6qoeUCFVUFiwodygcGwQ;src=4788165;type=sitew0;cat=proof0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=8889445769701.318
Frame ID: D5218A6A5BB42EDD2306C3EFDE48E1B1
Requests: 1 HTTP requests in this frame

Frame: https://vars.hotjar.com/box-90f3a29ef7448451db5af955688970d7.html
Frame ID: 8038503988594B55CD125DABFBBCF62E
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • meta generator /^Drupal(?:\s([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • meta generator /^Drupal(?:\s([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers via /varnish(?: \(Varnish\/([\d.]+)\))?/i

Overall confidence: 100%
Detected patterns
  • script /(?:a|s)\.adroll\.com/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • script /^\/\/static\.hotjar\.com\/c\/hotjar-/i

Overall confidence: 100%
Detected patterns
  • script /\.quantserve\.com\/quant\.js/i

Page Statistics

131
Requests

99 %
HTTPS

39 %
IPv6

52
Domains

68
Subdomains

56
IPs

7
Countries

4421 kB
Transfer

7566 kB
Size

18
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 68
  • https://ads.avocet.io/s?add=5aba5f53ab79f7f51390a95a&ty=j HTTP 302
  • https://ads.avocet.io/s?bounce=true&add=5aba5f53ab79f7f51390a95a&ty=j
Request Chain 77
  • https://ads.avocet.io/s?add=5d1dcad3b00320110090d553&ty=j HTTP 302
  • https://ads.avocet.io/s?bounce=true&add=5d1dcad3b00320110090d553&ty=j
Request Chain 78
  • https://s.ml-attr.com/getuid?https%3a%2f%2fattr.ml-api.io%2f%3fdomain%3dproofpoint.com%26pId%3d%24UID HTTP 302
  • https://secure.adnxs.com/getuid?https%3a%2f%2fattr.ml-api.io%2f%3fdomain%3dproofpoint.com%26pId%3d%24UID HTTP 302
  • https://secure.adnxs.com/bounce?%2Fgetuid%3Fhttps%253a%252f%252fattr.ml-api.io%252f%253fdomain%253dproofpoint.com%2526pId%253d%2524UID HTTP 302
  • https://attr.ml-api.io/?domain=proofpoint.com&pId=1632223327079324601
Request Chain 79
  • https://gwmtracking.com/p/v/1/5b7320b8f870815f7f59492b/format/img?gtmcb=195737731 HTTP 302
  • https://ad.doubleclick.net/ddm/activity/src=8909468;type=invmedia;cat=1l6xh4ap;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=1 HTTP 302
  • https://ad.doubleclick.net/ddm/activity/src=8909468;dc_pre=CIS3me-qoeUCFUmVdwodf04LoQ;type=invmedia;cat=1l6xh4ap;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=1 HTTP 302
  • https://adservice.google.com/ddm/fls/z/src=8909468;dc_pre=CIS3me-qoeUCFUmVdwodf04LoQ;type=invmedia;cat=1l6xh4ap;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=1
Request Chain 80
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&aip=1&a=809979347&t=pageview&_s=1&dl=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware&ul=en-us&de=UTF-8&dt=Ammyy%20Admin%20Malware%20-%20FlawedAmmy%20Download%20%7C%20Proofpoint&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=aGBAAEADQ~&jid=1936113989&gjid=1123423654&cid=1655445379.1571247982&tid=UA-2257074-1&_gid=995778174.1571247982&_r=1&z=1409141833 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-2257074-1&cid=1655445379.1571247982&jid=1936113989&_gid=995778174.1571247982&gjid=1123423654&_v=j79&z=1409141833 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2257074-1&cid=1655445379.1571247982&jid=1936113989&_v=j79&z=1409141833 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2257074-1&cid=1655445379.1571247982&jid=1936113989&_v=j79&z=1409141833&slf_rd=1&random=2360788858
Request Chain 82
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=169250&url=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware&time=1571247982254 HTTP 302
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D169250%26url%3Dhttps%253A%252F%252Fwww.proofpoint.com%252Fus%252Fthreat-insight%252Fpost%252Fleaked-ammyy-admin-source-code-turned-malware%26time%3D1571247982254%26liSync%3Dtrue HTTP 302
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=169250&url=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware&time=1571247982254&liSync=true
Request Chain 86
  • https://match.prod.bidr.io/cookie-sync/demandbase HTTP 303
  • https://match.prod.bidr.io/cookie-sync/demandbase?_bee_ppp=1 HTTP 303
  • https://segments.company-target.com/log?vendor=choca&user_id=AARmgk67Tq8AAD9g1iaRXg HTTP 303
  • https://segments.company-target.com/validateCookie?vendor=choca&user_id=AARmgk67Tq8AAD9g1iaRXg&verifyHash=caac2620cfb34c18795c5542c170af6a0a01a9e1
Request Chain 93
  • https://4788165.fls.doubleclick.net/activityi;src=4788165;type=sitew0;cat=proof0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=8889445769701.318 HTTP 302
  • https://4788165.fls.doubleclick.net/activityi;dc_pre=COzE4u6qoeUCFVUFiwodygcGwQ;src=4788165;type=sitew0;cat=proof0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=8889445769701.318
Request Chain 98
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&aip=1&a=809979347&t=event&ni=1&_s=2&dl=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware&ul=en-us&de=UTF-8&dt=Ammyy%20Admin%20Malware%20-%20FlawedAmmy%20Download%20%7C%20Proofpoint&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&ec=Demandbase&ea=API%20Resolution&el=IP%20API&_u=aHBAAEADQ~&jid=2026363175&gjid=588063687&cid=1655445379.1571247982&tid=UA-2257074-1&_gid=995778174.1571247982&_r=1&cd1=110089647&cd2=Worldstream&cd3=Software%20%26%20Technology&cd4=Software%20Applications&cd5=Less%20than%20250&cd6=%241%20-%20%241M&cd7=SMB&cd8=Software%20%26%20Technology&cd9=Worldstream&cd10=Naaldwijk&cd11=(Non-Company%20Visitor)&cd12=Netherlands&cd13=(Non-AccountWatch%20Visitor)&cd14=(Non-AccountWatch%20Visitor)&cd15=(Non-AccountWatch%20Visitor)&cd16=(Non-AccountWatch%20Visitor)&cd17=worldstream.nl&z=1376864968 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-2257074-1&cid=1655445379.1571247982&jid=2026363175&_gid=995778174.1571247982&gjid=588063687&_v=j79&z=1376864968 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2257074-1&cid=1655445379.1571247982&jid=2026363175&_v=j79&z=1376864968 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2257074-1&cid=1655445379.1571247982&jid=2026363175&_v=j79&z=1376864968&slf_rd=1&random=403305814
Request Chain 110
  • https://s.adroll.com/j/exp/7YJ7XZCLMRHSVCXIHB5HIT/index.js HTTP 302
  • https://s.adroll.com/j/exp/index.js
Request Chain 113
  • https://d.adroll.com/pixel/7YJ7XZCLMRHSVCXIHB5HIT/YV5KYXXEJZATZCT37YRTMK?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&pv=49043279920.20108&cookie=&adroll_s_ref=&keyw=&arrfrr=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware HTTP 302
  • https://s.adroll.com/pixel/7YJ7XZCLMRHSVCXIHB5HIT/YV5KYXXEJZATZCT37YRTMK/T47Y2VPPABDUBJXFROMZZM.js
Request Chain 116
  • https://d.adroll.com/cm/aol/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT HTTP 302
  • https://pixel.advertising.com/ups/55980/sync?uid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&_origin=1&gdpr=1&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA HTTP 302
  • https://pixel.advertising.com/ups/55980/sync?uid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&_origin=1&gdpr=1&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA&verify=true HTTP 302
  • https://ups.analytics.yahoo.com/ups/55980/sync?uid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&_origin=1&gdpr=1&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA&apid=UPde4924a2-f03c-11e9-96e8-0699de109772 HTTP 302
  • https://ups.analytics.yahoo.com/ups/55980/sync?uid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&_origin=1&gdpr=1&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA&apid=UPde4924a2-f03c-11e9-96e8-0699de109772&verify=true
Request Chain 117
  • https://d.adroll.com/cm/index/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT HTTP 302
  • https://dsum-sec.casalemedia.com/rum?cm_dsp_id=105&external_user_id=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&expiration=1602783982 HTTP 302
  • https://dsum-sec.casalemedia.com/rum?cm_dsp_id=105&external_user_id=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&expiration=1602783982&C=1
Request Chain 118
  • https://d.adroll.com/cm/n/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT HTTP 302
  • https://pixel.rubiconproject.com/tap.php?v=194538&nid=3644&put=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&expires=365
Request Chain 119
  • https://d.adroll.com/cm/outbrain/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT HTTP 302
  • https://sync.outbrain.com/cookie-sync?p=adroll&uid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU HTTP 302
  • https://sync.outbrain.com/cookie-sync?p=adroll&uid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&rdrctExp=true
Request Chain 120
  • https://d.adroll.com/cm/pubmatic/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT HTTP 302
  • https://simage2.pubmatic.com/AdServer/Pug?vcode=bz0yJnR5cGU9MSZqcz0xJmNvZGU9MzMwNiZ0bD01MjU2MDA&piggybackCookie=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&gdpr=1&gdpr_consent=BOOoKswOOoKswA2ABBENAkwAAAAXyACACYAIIA
Request Chain 121
  • https://d.adroll.com/cm/r/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT HTTP 302
  • https://ads.yahoo.com/cms/v1?esig=1~bf4e7dc4546a90c08591652d78a230d3f2ef5733&nwid=10001032567&sigv=1&gdpr=1&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA HTTP 302
  • https://d.adroll.com/cm/r/in?xid=E0&gdpr=1&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA
Request Chain 122
  • https://d.adroll.com/cm/taboola/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT HTTP 302
  • https://trc.taboola.com/sg/adroll-network/1/rtb-h/?taboola_hm=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU
Request Chain 123
  • https://d.adroll.com/cm/triplelift/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT HTTP 302
  • https://eb2.3lift.com/xuid?mid=4714&xuid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&dongle=c85e HTTP 302
  • https://eb2.3lift.com/xuid?ld=1&mid=4714&xuid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&dongle=c85e&gdpr=1&cmp_cs=
Request Chain 124
  • https://d.adroll.com/cm/b/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT HTTP 302
  • https://x.bidswitch.net/sync?dsp_id=44&user_id=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU HTTP 302
  • https://x.bidswitch.net/ul_cb/sync?dsp_id=44&user_id=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU
Request Chain 125
  • https://d.adroll.com/cm/x/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT HTTP 302
  • https://ib.adnxs.com/setuid?entity=172&code=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU
Request Chain 126
  • https://d.adroll.com/cm/l/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT HTTP 302
  • https://idsync.rlcdn.com/377928.gif?partner_uid=6e1842edddbe486638810eb46b1b012e
Request Chain 127
  • https://d.adroll.com/cm/o/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT HTTP 302
  • https://us-u.openx.net/w/1.0/sd?id=537103138&val=6e1842edddbe486638810eb46b1b012e HTTP 302
  • https://us-u.openx.net/w/1.0/sd?cc=1&id=537103138&val=6e1842edddbe486638810eb46b1b012e
Request Chain 128
  • https://d.adroll.com/cm/g/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT&google_nid=adroll5 HTTP 302
  • https://cm.g.doubleclick.net/pixel?google_sc&google_nid=artb&google_hm=bhhC7d2-SGY4gQ60axsBLg HTTP 302
  • https://d.adroll.com/cm/g/in

131 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request leaked-ammyy-admin-source-code-turned-malware
www.proofpoint.com/us/threat-insight/post/
72 KB
20 KB
Document
General
Full URL
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
100457763a195fb66d85f3aff97a2121024f796b7e6d4395a3f7eced09506e61
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

:method
GET
:authority
www.proofpoint.com
:scheme
https
:path
/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
navigate
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

status
200
server
nginx
date
Wed, 16 Oct 2019 17:46:20 GMT
content-type
text/html; charset=utf-8
x-drupal-cache
MISS
x-content-type-options
nosniff
etag
"1571244854-0"
expires
Thu, 17 Oct 2019 16:54:14 GMT
x-frame-options
SAMEORIGIN
content-language
en
x-generator
Drupal 7 (http://drupal.org)
link
<https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware>; rel="canonical",<https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware>; rel="shortlink"
cache-control
public, max-age=86400
last-modified
Wed, 16 Oct 2019 16:54:14 GMT
vary
Cookie,Accept-Encoding
content-encoding
gzip
x-request-id
v-957cc382-f035-11e9-bc01-7f077fcb98a8
x-ah-environment
prod
age
3125
via
varnish
x-cache
HIT
x-cache-hits
2
accept-ranges
bytes
set-cookie
visid_incap_177663=+vr7LlDVTl6oRG+sm5EeXGtXp10AAAAAQUIPAAAAAADXNB9IwbQ42YUnWaMT/ak3; expires=Thu, 15 Oct 2020 08:16:01 GMT; path=/; Domain=.proofpoint.com incap_ses_245_177663=ZHsjbf8+z00MhmjiJWtmA2xXp10AAAAAZuCIwRM6Tc7joATgwjyv/A==; path=/; Domain=.proofpoint.com
x-iinfo
10-45020196-45020197 NNNN CT(163 329 0) RT(1571247979559 0) q(0 0 5 1) r(7 8) U18
x-cdn
Incapsula
css_rEI_5cK_B9hB4So2yZUtr5weuEV3heuAllCDE6XsIkI.css
www.proofpoint.com/sites/default/files/css/
4 KB
1 KB
Stylesheet
General
Full URL
https://www.proofpoint.com/sites/default/files/css/css_rEI_5cK_B9hB4So2yZUtr5weuEV3heuAllCDE6XsIkI.css
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
ac423fe5c2bf07d841e12a36c9952daf9c1eb8457785eb8096508313a5ec2242
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cdn
Incapsula
age
5310
x-cache
HIT
status
200
x-iinfo
10-45020267-45020054 2NNN RT(1571247980397 0) q(0 0 0 -1) r(5 5) U18
x-ah-environment
prod
content-length
1236
x-request-id
v-7fb3b600-f030-11e9-a9b4-ffb47f7f456f
last-modified
Mon, 23 Sep 2019 00:10:43 GMT
server
nginx
vary
Accept-Encoding
content-type
text/css
via
varnish
expires
Wed, 30 Oct 2019 16:17:50 GMT
cache-control
max-age=1209600
accept-ranges
bytes
x-cache-hits
275
css_dflN4gznpSoqyE-fQqvdVodUm8IHE1_6p9W67RzHBgo.css
www.proofpoint.com/sites/default/files/css/
21 KB
5 KB
Stylesheet
General
Full URL
https://www.proofpoint.com/sites/default/files/css/css_dflN4gznpSoqyE-fQqvdVodUm8IHE1_6p9W67RzHBgo.css
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
75f94de20ce7a52a2ac84f9f42abdd5687549bc207135ffaa7d5baed1cc7060a
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cdn
Incapsula
age
5310
x-cache
HIT
status
200
x-iinfo
10-45020268-45012164 2NNN RT(1571247980399 0) q(0 1 1 -1) r(7 7) U18
x-ah-environment
prod
content-length
4794
x-request-id
v-7fb675e8-f030-11e9-937f-273c7d73120d
last-modified
Thu, 19 Sep 2019 01:02:19 GMT
server
nginx
vary
Accept-Encoding
content-type
text/css
via
varnish
expires
Wed, 30 Oct 2019 16:17:50 GMT
cache-control
max-age=1209600
accept-ranges
bytes
x-cache-hits
270
css_YvthmAHmOujLQtPnmuEtkfiby4EqNavjYNQ2dGZqvJg.css
www.proofpoint.com/sites/default/files/css/
5 KB
2 KB
Stylesheet
General
Full URL
https://www.proofpoint.com/sites/default/files/css/css_YvthmAHmOujLQtPnmuEtkfiby4EqNavjYNQ2dGZqvJg.css
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
62fb619801e63ae8cb42d3e79ae12d91f89bcb812a35abe360d43674666abc98
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cdn
Incapsula
age
5310
x-cache
HIT
status
200
x-iinfo
10-45020269-45020053 2NNN RT(1571247980400 0) q(0 0 0 -1) r(4 4) U18
x-ah-environment
prod
content-length
1532
x-request-id
v-7fe7fffa-f030-11e9-9014-cfb85bb9bdd4
last-modified
Mon, 23 Sep 2019 00:10:43 GMT
server
nginx
vary
Accept-Encoding
content-type
text/css
via
varnish
expires
Wed, 30 Oct 2019 16:17:50 GMT
cache-control
max-age=1209600
accept-ranges
bytes
x-cache-hits
251
styles.css
www.proofpoint.com/sites/all/themes/proofpoint/css/
337 KB
47 KB
Stylesheet
General
Full URL
https://www.proofpoint.com/sites/all/themes/proofpoint/css/styles.css?pzh5j9
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
05c915ee57e99bd0d092085c38ba287dc1bcf6f624840f296ca2270cce1b9a47
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cdn
Incapsula
age
5310
x-cache
HIT
status
200
x-iinfo
10-45020270-45013013 2NNN RT(1571247980401 0) q(0 0 0 -1) r(6 6) U18
x-ah-environment
prod
content-length
47521
x-request-id
v-7fec7cec-f030-11e9-8960-db3870b2bd84
last-modified
Wed, 16 Oct 2019 15:50:22 GMT
server
nginx
vary
Accept-Encoding
content-type
text/css
via
varnish
expires
Wed, 30 Oct 2019 16:17:50 GMT
cache-control
max-age=1209600
accept-ranges
bytes
x-cache-hits
416
proofpoint.css
www.proofpoint.com/sites/all/themes/proofpoint/css/
1008 B
622 B
Stylesheet
General
Full URL
https://www.proofpoint.com/sites/all/themes/proofpoint/css/proofpoint.css?pzh5j9
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
c6687d159fd14a00a4b187ecfa840c0e21d5a28f352003295d8508190fbdd826
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cdn
Incapsula
age
5310
x-cache
HIT
status
200
x-iinfo
10-45020271-44976069 2NNN RT(1571247980402 0) q(0 0 0 -1) r(4 4) U18
x-ah-environment
prod
content-length
439
x-request-id
v-801fc192-f030-11e9-bd31-3becb0d9524d
last-modified
Fri, 07 Dec 2018 08:47:10 GMT
server
nginx
vary
Accept-Encoding
content-type
text/css
via
varnish
expires
Wed, 30 Oct 2019 16:17:51 GMT
cache-control
max-age=1209600
accept-ranges
bytes
x-cache-hits
414
css_xJL0rSJqAihUjc_Ngv2wHJie34Fd4preHc6a7AnDGhw.css
www.proofpoint.com/sites/default/files/css/
245 KB
83 KB
Stylesheet
General
Full URL
https://www.proofpoint.com/sites/default/files/css/css_xJL0rSJqAihUjc_Ngv2wHJie34Fd4preHc6a7AnDGhw.css
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
c492f4ad226a0228548dcfcd82fdb01c989edf815de29ade1dce9aec09c31a1c
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cdn
Incapsula
age
5309
x-cache
HIT
status
200
x-iinfo
10-45020272-45018582 2NNN RT(1571247980403 0) q(0 0 0 -1) r(6 6) U18
x-ah-environment
prod
content-length
84810
x-request-id
v-805c830c-f030-11e9-a4f5-5bcb7b4ab828
last-modified
Fri, 27 Sep 2019 23:45:16 GMT
server
nginx
vary
Accept-Encoding
content-type
text/css
via
varnish
expires
Wed, 30 Oct 2019 16:17:51 GMT
cache-control
max-age=1209600
accept-ranges
bytes
x-cache-hits
266
css_nQwtytNsztHNRD8oGYQyyja_LgjxLi44qLISIPyImuw.css
www.proofpoint.com/sites/default/files/css/
113 B
276 B
Stylesheet
General
Full URL
https://www.proofpoint.com/sites/default/files/css/css_nQwtytNsztHNRD8oGYQyyja_LgjxLi44qLISIPyImuw.css
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
9d0c2dcad36cced1cd443f28198432ca36bf2e08f12e2e38a8b21220fc889aec
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cdn
Incapsula
age
5310
x-cache
HIT
status
200
x-iinfo
10-45020273-45020287 2NNN RT(1571247980404 0) q(0 4 4 -1) r(9 9) U18
x-ah-environment
prod
content-length
113
x-request-id
v-805a1c16-f030-11e9-8c3e-d73b02091bd7
last-modified
Tue, 17 Sep 2019 00:38:30 GMT
server
nginx
vary
Accept-Encoding
content-type
text/css
via
varnish
expires
Wed, 30 Oct 2019 16:17:51 GMT
cache-control
max-age=1209600
accept-ranges
bytes
x-cache-hits
263
js_jATlw3iucl8O1KM88pfP_buAg5xbrWmEgBVT94k-xFs.js
www.proofpoint.com/sites/default/files/js/
3 KB
2 KB
Script
General
Full URL
https://www.proofpoint.com/sites/default/files/js/js_jATlw3iucl8O1KM88pfP_buAg5xbrWmEgBVT94k-xFs.js
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
8c04e5c378ae725f0ed4a33cf297cffdbb80839c5bad6984801553f7893ec45b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cdn
Incapsula
age
5309
x-cache
HIT
status
200
x-iinfo
10-45020274-45017519 2NNN RT(1571247980405 0) q(0 4 4 -1) r(9 9) U18
x-ah-environment
prod
content-length
1583
x-request-id
v-80ca1070-f030-11e9-b225-4763b74cece3
last-modified
Mon, 23 Sep 2019 00:10:43 GMT
server
nginx
vary
Accept-Encoding
content-type
text/javascript
via
varnish
expires
Wed, 30 Oct 2019 16:17:52 GMT
cache-control
max-age=1209600
accept-ranges
bytes
x-cache-hits
261
js_Sd3E1-ubI8_oPJ3epUeNgAhdPIZsHFWzDl_t8nL-a0k.js
www.proofpoint.com/sites/default/files/js/
286 KB
86 KB
Script
General
Full URL
https://www.proofpoint.com/sites/default/files/js/js_Sd3E1-ubI8_oPJ3epUeNgAhdPIZsHFWzDl_t8nL-a0k.js
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
49ddc4d7eb9b23cfe83c9ddea5478d80085d3c866c1c55b30e5fedf272fe6b49
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cdn
Incapsula
age
5308
x-cache
HIT
status
200
x-iinfo
10-45020275-45020053 2NNN RT(1571247980406 0) q(0 4 4 -1) r(8 8) U18
x-ah-environment
prod
content-length
87383
x-request-id
v-80fd4684-f030-11e9-90fb-6f5601c745ce
last-modified
Fri, 27 Sep 2019 21:44:37 GMT
server
nginx
vary
Accept-Encoding
content-type
text/javascript
via
varnish
expires
Wed, 30 Oct 2019 16:17:52 GMT
cache-control
max-age=1209600
accept-ranges
bytes
x-cache-hits
267
js_5vQZfnw555SB_O3f6hT7WgFdY4KMR-8z4yzVohnQouU.js
www.proofpoint.com/sites/default/files/js/
32 KB
11 KB
Script
General
Full URL
https://www.proofpoint.com/sites/default/files/js/js_5vQZfnw555SB_O3f6hT7WgFdY4KMR-8z4yzVohnQouU.js
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
e6f4197e7c39e79481fceddfea14fb5a015d63828c47ef33e32cd5a219d0a2e5
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cdn
Incapsula
age
5308
x-cache
HIT
status
200
x-iinfo
10-45020276-45012119 2NNN RT(1571247980406 0) q(0 6 6 -1) r(8 8) U18
x-ah-environment
prod
content-length
10968
x-request-id
v-80fb2016-f030-11e9-a813-1be8b7114253
last-modified
Fri, 27 Sep 2019 21:44:37 GMT
server
nginx
vary
Accept-Encoding
content-type
text/javascript
via
varnish
expires
Wed, 30 Oct 2019 16:17:52 GMT
cache-control
max-age=1209600
accept-ranges
bytes
x-cache-hits
262
js_oYQw43wAjKdM3p6nU1hLDI3mDgL3UfCyqPsngNU6GnY.js
www.proofpoint.com/sites/default/files/js/
2 KB
805 B
Script
General
Full URL
https://www.proofpoint.com/sites/default/files/js/js_oYQw43wAjKdM3p6nU1hLDI3mDgL3UfCyqPsngNU6GnY.js
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
a18430e37c008ca74cde9ea753584b0c8de60e02f751f0b2a8fb2780d53a1a76
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cdn
Incapsula
age
5334
x-cache
HIT
status
200
x-iinfo
10-45020277-45012164 2NNN RT(1571247980406 0) q(0 7 7 -1) r(9 9) U18
x-ah-environment
prod
content-length
600
x-request-id
v-721390b0-f030-11e9-b4e1-ef6819454049
last-modified
Tue, 17 Sep 2019 00:38:31 GMT
server
nginx
vary
Accept-Encoding
content-type
text/javascript
via
varnish
expires
Wed, 30 Oct 2019 16:17:27 GMT
cache-control
max-age=1209600
accept-ranges
bytes
x-cache-hits
259
js_zDz6OD0aee_SzC8Md9FNnnSFgxJWG22Pihtjt166tQA.js
www.proofpoint.com/sites/default/files/js/
78 KB
28 KB
Script
General
Full URL
https://www.proofpoint.com/sites/default/files/js/js_zDz6OD0aee_SzC8Md9FNnnSFgxJWG22Pihtjt166tQA.js
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
cc3cfa383d1a79efd2cc2f0c77d14d9e74858312561b6d8f8a1b63b75ebab500
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cdn
Incapsula
age
5308
x-cache
HIT
status
200
x-iinfo
10-45020278-45012119 2NNN RT(1571247980407 0) q(0 8 8 -1) r(10 10) U18
x-ah-environment
prod
content-length
28482
x-request-id
v-816973ea-f030-11e9-a071-ab0d06f2812e
last-modified
Wed, 25 Sep 2019 18:37:23 GMT
server
nginx
vary
Accept-Encoding
content-type
text/javascript
via
varnish
expires
Wed, 30 Oct 2019 16:17:53 GMT
cache-control
max-age=1209600
accept-ranges
bytes
x-cache-hits
81
js_V59Lq7kRtaAiYM_YS8pC0OFMBYJk_jt8nNK4UA1wlGk.js
www.proofpoint.com/sites/default/files/js/
8 KB
2 KB
Script
General
Full URL
https://www.proofpoint.com/sites/default/files/js/js_V59Lq7kRtaAiYM_YS8pC0OFMBYJk_jt8nNK4UA1wlGk.js
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
579f4babb911b5a02260cfd84bca42d0e14c058264fe3b7c9cd2b8500d709469
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cdn
Incapsula
age
5334
x-cache
HIT
status
200
x-iinfo
10-45020279-45013013 2NNN RT(1571247980407 0) q(0 8 8 -1) r(10 10) U18
x-ah-environment
prod
content-length
1934
x-request-id
v-721b9bc0-f030-11e9-8eb9-bb5eb12a7d07
last-modified
Thu, 03 Oct 2019 16:00:08 GMT
server
nginx
vary
Accept-Encoding
content-type
text/javascript
via
varnish
expires
Wed, 30 Oct 2019 16:17:27 GMT
cache-control
max-age=1209600
accept-ranges
bytes
x-cache-hits
262
geoip2.js
js.maxmind.com/js/apis/geoip2/v2.1/
4 KB
2 KB
Script
General
Full URL
https://js.maxmind.com/js/apis/geoip2/v2.1/geoip2.js
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:252f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
69666124ea4313cf5b2da94871c86acd68bcbc4d50b360fdebc4dc3b977dde21

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:20 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Wed, 16 Oct 2019 16:09:26 GMT
server
cloudflare
age
1368
etag
W/"5da740b6-f39"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=43200
cf-ray
526bda076a90cbc0-VIE
expires
Thu, 17 Oct 2019 05:46:20 GMT
js_W5fEOeIW0TWunhDVrtJI2tfSDJsF5U0-qYgg5VUhN50.js
www.proofpoint.com/sites/default/files/js/
13 KB
4 KB
Script
General
Full URL
https://www.proofpoint.com/sites/default/files/js/js_W5fEOeIW0TWunhDVrtJI2tfSDJsF5U0-qYgg5VUhN50.js
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
5b97c439e216d135ae9e10d5aed248dad7d20c9b05e54d3ea98820e55521379d
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cdn
Incapsula
age
5334
x-cache
HIT
status
200
x-iinfo
10-45020280-45018582 2NNN RT(1571247980408 0) q(0 9 9 -1) r(11 11) U18
x-ah-environment
prod
content-length
3712
x-request-id
v-72250eda-f030-11e9-a7e2-cf806193bcc4
last-modified
Tue, 17 Sep 2019 00:38:31 GMT
server
nginx
vary
Accept-Encoding
content-type
text/javascript
via
varnish
expires
Wed, 30 Oct 2019 16:17:27 GMT
cache-control
max-age=1209600
accept-ranges
bytes
x-cache-hits
259
js__cwWPjumGXMIx9KU2ky-QSTvGf2-Z0EfSkrlgTMtTMU.js
www.proofpoint.com/sites/default/files/js/
156 KB
45 KB
Script
General
Full URL
https://www.proofpoint.com/sites/default/files/js/js__cwWPjumGXMIx9KU2ky-QSTvGf2-Z0EfSkrlgTMtTMU.js
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
fdcc163e3ba6197308c7d294da4cbe4124ef19fdbe67411f4a4ae581332d4cc5
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cdn
Incapsula
age
5334
x-cache
HIT
status
200
x-iinfo
10-45020281-45020054 2NNN RT(1571247980408 0) q(0 9 9 -1) r(12 12) U18
x-ah-environment
prod
content-length
45461
x-request-id
v-72251f4c-f030-11e9-b7e3-1b3486feed5f
last-modified
Thu, 03 Oct 2019 03:01:11 GMT
server
nginx
vary
Accept-Encoding
content-type
text/javascript
via
varnish
expires
Wed, 30 Oct 2019 16:17:27 GMT
cache-control
max-age=1209600
accept-ranges
bytes
x-cache-hits
257
logo-reg.svg
www.proofpoint.com/sites/all/themes/proofpoint/
3 KB
1 KB
Image
General
Full URL
https://www.proofpoint.com/sites/all/themes/proofpoint/logo-reg.svg
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
4c858ea92bdc30e89d30d477c30228c47b19648e1539829bb2303a176f0c23dd
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:21 GMT
via
varnish
x-content-type-options
nosniff
x-cdn
Incapsula
age
5334
x-cache
HIT
status
200
x-iinfo
10-45020282-45020197 PNNN RT(1571247980409 0) q(0 9 9 -1) r(11 11) U18
x-cache-hits
615
x-ah-environment
prod
content-encoding
gzip
x-request-id
v-72295030-f030-11e9-b9c2-7bac5e20ad6b
last-modified
Fri, 07 Dec 2018 08:45:31 GMT
server
nginx
content-type
image/svg+xml
cache-control
max-age=1209600
accept-ranges
bytes
expires
Wed, 30 Oct 2019 16:17:27 GMT
psat-training-modules.png
www.proofpoint.com/sites/all/themes/proofpoint/images/
913 KB
916 KB
Image
General
Full URL
https://www.proofpoint.com/sites/all/themes/proofpoint/images/psat-training-modules.png
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
2cfe7c393d823154ee86def4c4eeeff7520b903871d93073ef7ad566a07ea92d
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:21 GMT
via
varnish
x-content-type-options
nosniff
x-cdn
Incapsula
age
5334
x-cache
HIT
status
200
x-iinfo
10-45020283-44976069 2NNN RT(1571247980409 0) q(0 9 9 -1) r(13 13) U18
x-cache-hits
273
x-ah-environment
prod
content-length
934755
x-request-id
v-722b8486-f030-11e9-85c3-2f418f5822f4
last-modified
Wed, 04 Sep 2019 18:25:18 GMT
server
nginx
content-type
image/png
cache-control
max-age=1209600
accept-ranges
bytes
expires
Wed, 30 Oct 2019 16:17:27 GMT
home.svg
www.proofpoint.com/sites/all/themes/proofpoint/images/
784 B
657 B
Image
General
Full URL
https://www.proofpoint.com/sites/all/themes/proofpoint/images/home.svg
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
0e41e449d2997692fc3631d239e51c964577b35502ee9e138eead4a960682806
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
via
varnish
x-content-type-options
nosniff
x-cdn
Incapsula
age
5311
x-cache
HIT
status
200
x-iinfo
10-45020345-45020197 PNNN RT(1571247981866 0) q(0 0 0 -1) r(2 2) U18
x-cache-hits
269
x-ah-environment
prod
content-encoding
gzip
x-request-id
v-7fb90a88-f030-11e9-a7c6-0f2b6f4e615a
last-modified
Tue, 18 Jun 2019 16:19:41 GMT
server
nginx
content-type
image/svg+xml
cache-control
max-age=1209600
accept-ranges
bytes
expires
Wed, 30 Oct 2019 16:17:50 GMT
rat.png
www.proofpoint.com/sites/default/files/styles/image_1920_x_400/public/images/Blog/
32 KB
33 KB
Image
General
Full URL
https://www.proofpoint.com/sites/default/files/styles/image_1920_x_400/public/images/Blog/rat.png?itok=TVX9BXlT&timestamp=1540510417
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
a687a614bfb45fc773b0401e453f71ae4a770c71b67519cb14c3baaa6f9dad46
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
via
varnish
x-content-type-options
nosniff
x-cdn
Incapsula
age
3068
x-cache
HIT
status
200
x-iinfo
10-45020346-45012119 2NNN RT(1571247981866 0) q(0 0 0 -1) r(2 2) U18
x-cache-hits
1
x-ah-environment
prod
content-length
33056
x-request-id
v-b920a510-f035-11e9-8770-c37dac46ed8f
last-modified
Mon, 10 Dec 2018 23:03:19 GMT
server
nginx
content-type
image/png
cache-control
max-age=1209600
accept-ranges
bytes
expires
Wed, 30 Oct 2019 16:55:14 GMT
faf1.png
www.proofpoint.com/sites/default/files/
162 KB
163 KB
Image
General
Full URL
https://www.proofpoint.com/sites/default/files/faf1.png
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
d8ccf6cac6efe6c021085478e19c362b3b964e1862b6e2d3752401cdf5704fbc
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
via
varnish
x-content-type-options
nosniff
x-cdn
Incapsula
age
3068
x-cache
HIT
status
200
x-iinfo
10-45020347-45020054 2NNN RT(1571247981867 0) q(0 2 2 -1) r(3 3) U18
x-cache-hits
1
x-ah-environment
prod
content-length
165920
x-request-id
v-b921e286-f035-11e9-9414-d3c515d0c2f1
last-modified
Wed, 07 Mar 2018 18:05:02 GMT
server
nginx
content-type
image/png
cache-control
max-age=1209600
accept-ranges
bytes
expires
Wed, 30 Oct 2019 16:55:14 GMT
faf2.png
www.proofpoint.com/sites/default/files/
70 KB
70 KB
Image
General
Full URL
https://www.proofpoint.com/sites/default/files/faf2.png
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
30990ce4d71d324d466aff1f5527cb15b48596a85a82f32c8bbe2eab1c4b14dd
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
via
varnish
x-content-type-options
nosniff
x-cdn
Incapsula
age
3067
x-cache
HIT
status
200
x-iinfo
10-45020348-45013013 2NNN RT(1571247981868 0) q(0 2 2 -1) r(4 4) U18
x-cache-hits
1
x-ah-environment
prod
content-length
71816
x-request-id
v-b955eb58-f035-11e9-9b04-cb076579e884
last-modified
Wed, 07 Mar 2018 18:06:17 GMT
server
nginx
content-type
image/png
cache-control
max-age=1209600
accept-ranges
bytes
expires
Wed, 30 Oct 2019 16:55:14 GMT
faf3.png
www.proofpoint.com/sites/default/files/
110 KB
111 KB
Image
General
Full URL
https://www.proofpoint.com/sites/default/files/faf3.png
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
63d5add8c9039b28ed873682e342f27c1f5f9ef3b762da3c08b0e62dbcb5bb2e
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
via
varnish
x-content-type-options
nosniff
x-cdn
Incapsula
age
3067
x-cache
HIT
status
200
x-iinfo
10-45020349-45012119 2NNN RT(1571247981868 0) q(0 4 4 -1) r(5 5) U18
x-cache-hits
1
x-ah-environment
prod
content-length
112423
x-request-id
v-b968d9a2-f035-11e9-801d-3fec13b92eb6
last-modified
Wed, 07 Mar 2018 18:07:31 GMT
server
nginx
content-type
image/png
cache-control
max-age=1209600
accept-ranges
bytes
expires
Wed, 30 Oct 2019 16:55:14 GMT
faf4.png
www.proofpoint.com/sites/default/files/
190 KB
191 KB
Image
General
Full URL
https://www.proofpoint.com/sites/default/files/faf4.png
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
202641095d629a469e6305ad45dabec4a444f2357e48de6dd7141b587184df85
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
via
varnish
x-content-type-options
nosniff
x-cdn
Incapsula
age
3067
x-cache
HIT
status
200
x-iinfo
10-45020350-45012164 2NNN RT(1571247981869 0) q(0 6 6 -1) r(9 9) U18
x-cache-hits
1
x-ah-environment
prod
content-length
194937
x-request-id
v-b975973c-f035-11e9-a3cb-8fbe2fc39036
last-modified
Wed, 07 Mar 2018 18:08:17 GMT
server
nginx
content-type
image/png
cache-control
max-age=1209600
accept-ranges
bytes
expires
Wed, 30 Oct 2019 16:55:14 GMT
faf5.png
www.proofpoint.com/sites/default/files/
31 KB
31 KB
Image
General
Full URL
https://www.proofpoint.com/sites/default/files/faf5.png
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
f56f7b656d9d946ad4ba29005099fc2fcd695bebc46003b5e61bb07991727a4c
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
via
varnish
x-content-type-options
nosniff
x-cdn
Incapsula
age
3067
x-cache
HIT
status
200
x-iinfo
10-45020351-45018582 2NNN RT(1571247981870 0) q(0 6 6 -1) r(8 8) U18
x-cache-hits
1
x-ah-environment
prod
content-length
31380
x-request-id
v-b976de8a-f035-11e9-916e-3f863789828d
last-modified
Wed, 07 Mar 2018 18:09:08 GMT
server
nginx
content-type
image/png
cache-control
max-age=1209600
accept-ranges
bytes
expires
Wed, 30 Oct 2019 16:55:14 GMT
faf6.png
www.proofpoint.com/sites/default/files/
54 KB
54 KB
Image
General
Full URL
https://www.proofpoint.com/sites/default/files/faf6.png
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
69cb04478e97d40271d13a0f7d1c5d3b92a8993993073bbdb5d9533216797325
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
via
varnish
x-content-type-options
nosniff
x-cdn
Incapsula
age
3067
x-cache
HIT
status
200
x-iinfo
10-45020352-44976069 2NNN RT(1571247981870 0) q(0 7 7 -1) r(8 8) U18
x-cache-hits
1
x-ah-environment
prod
content-length
55426
x-request-id
v-b975d1de-f035-11e9-9429-937e622ca00a
last-modified
Wed, 07 Mar 2018 18:09:39 GMT
server
nginx
content-type
image/png
cache-control
max-age=1209600
accept-ranges
bytes
expires
Wed, 30 Oct 2019 16:55:14 GMT
faf7.png
www.proofpoint.com/sites/default/files/
305 KB
307 KB
Image
General
Full URL
https://www.proofpoint.com/sites/default/files/faf7.png
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
b8f7a53b40a3ee7af9bfec90ed51574122eb1d8ce302af0213d326d99e883b7a
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
via
varnish
x-content-type-options
nosniff
x-cdn
Incapsula
age
3068
x-cache
HIT
status
200
x-iinfo
10-45020353-45017519 2NNN RT(1571247981871 0) q(0 7 7 -1) r(10 10) U18
x-cache-hits
1
x-ah-environment
prod
content-length
312263
x-request-id
v-b975fb14-f035-11e9-8c2a-7348862d6ca2
last-modified
Wed, 07 Mar 2018 18:10:45 GMT
server
nginx
content-type
image/png
cache-control
max-age=1209600
accept-ranges
bytes
expires
Wed, 30 Oct 2019 16:55:14 GMT
conversion.js
www.googleadservices.com/pagead/
24 KB
9 KB
Script
General
Full URL
https://www.googleadservices.com/pagead/conversion.js
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.205.226 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s24-in-f2.1e100.net
Software
cafe /
Resource Hash
78a79d5cefe3a91bfccc9d0e3522b756e142d8c2aeba35146f2bc399b71cf4ad
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
9385
x-xss-protection
0
server
cafe
etag
14299522277420216331
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Wed, 16 Oct 2019 17:46:21 GMT
js_VGWVxZzZSi3YQD4B3uHe9fBD5c_2NSz4TEx3cL9dx1Q.js
www.proofpoint.com/sites/default/files/js/
78 KB
19 KB
Script
General
Full URL
https://www.proofpoint.com/sites/default/files/js/js_VGWVxZzZSi3YQD4B3uHe9fBD5c_2NSz4TEx3cL9dx1Q.js
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
546595c59cd94a2dd8403e01dee1def5f043e5cff6352cf84c4c7770bf5dc754
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cdn
Incapsula
age
5334
x-cache
HIT
status
200
x-iinfo
10-45020331-45020287 2NNN RT(1571247981576 0) q(0 0 0 -1) r(4 4) U18
x-ah-environment
prod
content-length
19613
x-request-id
v-723c7aa2-f030-11e9-9ac5-175e33dd7b99
last-modified
Fri, 27 Sep 2019 21:44:37 GMT
server
nginx
vary
Accept-Encoding
content-type
text/javascript
via
varnish
expires
Wed, 30 Oct 2019 16:17:27 GMT
cache-control
max-age=1209600
accept-ranges
bytes
x-cache-hits
262
js_pLyroj8w56o5oEuhy9M3_UPhli8Yg1Zq5LxhrROPoWs.js
www.proofpoint.com/sites/default/files/js/
11 KB
5 KB
Script
General
Full URL
https://www.proofpoint.com/sites/default/files/js/js_pLyroj8w56o5oEuhy9M3_UPhli8Yg1Zq5LxhrROPoWs.js
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
a4bcaba23f30e7aa39a04ba1cbd337fd43e1962f1883566ae4bc61ad138fa16b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cdn
Incapsula
age
5307
x-cache
HIT
status
200
x-iinfo
10-45020343-45017519 2NNN RT(1571247981864 0) q(0 0 0 -1) r(2 2) U18
x-ah-environment
prod
content-length
4376
x-request-id
v-82076136-f030-11e9-a59a-83540b889d7f
last-modified
Wed, 25 Sep 2019 18:36:25 GMT
server
nginx
vary
Accept-Encoding
content-type
text/javascript
via
varnish
expires
Wed, 30 Oct 2019 16:17:54 GMT
cache-control
max-age=1209600
accept-ranges
bytes
x-cache-hits
92
munchkin.js
munchkin.marketo.net/
1 KB
1 KB
Script
General
Full URL
https://munchkin.marketo.net/munchkin.js
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.31.84.223 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-31-84-223.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
66f7eaa7a45f696c332cd450771f4be48e110f6afbe1fe7b39c7a95518aeef76

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 16 Oct 2019 17:46:22 GMT
Content-Encoding
gzip
Last-Modified
Fri, 05 Apr 2019 02:53:44 GMT
Server
Apache
ETag
"54520320df20b526337717d6d28181fc:1554432824"
Vary
Accept-Encoding
P3P
policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR"
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
application/x-javascript
Content-Length
752
script.js
www.proofpoint.com/sites/all/themes/proofpoint/js/
23 KB
6 KB
Script
General
Full URL
https://www.proofpoint.com/sites/all/themes/proofpoint/js/script.js?pzh5j9
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
878a2db8adb5cc7af20d31d61c245a233572707cf7d0d2e43277e9d75e4c66f5
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cdn
Incapsula
age
5334
x-cache
HIT
status
200
x-iinfo
10-45020344-45012164 2NNN RT(1571247981865 0) q(0 0 0 -1) r(2 2) U18
x-ah-environment
prod
content-length
5922
x-request-id
v-726778ce-f030-11e9-a32b-5b88eb3c9ee0
last-modified
Tue, 15 Oct 2019 15:35:25 GMT
server
nginx
vary
Accept-Encoding
content-type
application/javascript
via
varnish
expires
Wed, 30 Oct 2019 16:17:28 GMT
cache-control
max-age=1209600
accept-ranges
bytes
x-cache-hits
402
_Incapsula_Resource
www.proofpoint.com/
107 KB
15 KB
Script
General
Full URL
https://www.proofpoint.com/_Incapsula_Resource?SWJIYLWA=719d34d31c8e3a6e6fffd425f7e032f3&ns=1&cb=1322658854
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
/
Resource Hash
882c5906f6cd3b081acb517d70e0a62680a0d1ee23267c1e28e9671fe1ad245f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
content-encoding
gzip
cache-control
no-cache
x-robots-tag
noindex
content-length
15736
content-type
application/javascript
css
fonts.googleapis.com/
3 KB
687 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Fjalla+One|Roboto+Condensed
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
74166c3ce466a4afbab3fee3dc53106c377de2217ddb142774eb4b59fe65c6e8
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Wed, 16 Oct 2019 17:46:21 GMT
server
ESF
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
status
200
date
Wed, 16 Oct 2019 17:46:21 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
x-xss-protection
0
expires
Wed, 16 Oct 2019 17:46:21 GMT
css
fonts.googleapis.com/
12 KB
736 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Oswald:200,300,400,500,600,700|Open+Sans+Condensed:300
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
c91bae8f9074efbe5429e95dcab486cda690b269404a017be16b027cf10154c6
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Wed, 16 Oct 2019 17:46:21 GMT
server
ESF
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
status
200
date
Wed, 16 Oct 2019 17:46:21 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
x-xss-protection
0
expires
Wed, 16 Oct 2019 17:46:21 GMT
fonts.css
cloud.typography.com/7639856/7486392/css/
0
0
Stylesheet
General
Full URL
https://cloud.typography.com/7639856/7486392/css/fonts.css
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.38.51.49 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-38-51-49.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 16 Oct 2019 17:46:21 GMT
Cache-Control
must-revalidate, private
Server
Apache
Connection
keep-alive
Content-Length
16
Content-Type
text/html; charset=iso-8859-1
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
dbb67c620eaabf6679a314db18d3ae43037aef71ab27422e6feec08ee987cc0a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 19 Aug 2019 17:22:41 GMT
server
Golfe2
age
706
date
Wed, 16 Oct 2019 17:34:36 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
17803
expires
Wed, 16 Oct 2019 19:34:36 GMT
truncated
/
251 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
46454a26b3142dec4540c21c9c156f2b3e570488667f1bbcf81854e27925f2a4

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
263 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
479f333c6cdf10724e19b33079cab821bb37b0a463170ea9943dcbc0c6d9dc67

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
91221ebe7decdf80fc3cfddffa7595ff915be4af1a9a5620fc9c138bf6cc0363

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
562 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a8bac03a9bf9bff1a50a992ffe70257f2c6a24e0cc79ba4c268baf19c9ca2880

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
588 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
047ef44b759411ac70b47ffb1c29a2814d34ec9aa7cf12a927340128500bc9fe

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e7e6695bf782bd4b52cc817b8adba3d03973c348cea7622ecb06ab94165c4d0f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
1006 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
df7b034e11f350b02f383677a2c37d598922ad494d0e0241ad5740313332a5c8

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e675880ebe2bfb0c3364d32f0ea5569eb1d50d4b18fd15c644cf67ce098e04ed

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3886459ca89f9ca7588cc412ddb3b279947acec2258c42c065bc044ce67276c0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6015b6cdafa09835ca9f65f2d9e211f3e120f8da2760401c7ba5e9520a260c37

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
blue-bg.png
www.proofpoint.com/sites/all/themes/proofpoint/images/
25 KB
25 KB
Image
General
Full URL
https://www.proofpoint.com/sites/all/themes/proofpoint/images/blue-bg.png
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
5451119aa5fd566ad1bc22ab81193be0154f0e80c69a1b5d9c99d217f5737e3a
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
via
varnish
x-content-type-options
nosniff
x-cdn
Incapsula
age
5334
x-cache
HIT
status
200
x-iinfo
10-45020355-45020287 2NNN RT(1571247981880 0) q(0 7 7 -1) r(10 10) U18
x-cache-hits
263
x-ah-environment
prod
content-length
25228
x-request-id
v-72825ba8-f030-11e9-9549-133e9f3ab52b
last-modified
Wed, 04 Sep 2019 18:25:19 GMT
server
nginx
content-type
image/png
cache-control
max-age=1209600
accept-ranges
bytes
expires
Wed, 30 Oct 2019 16:17:28 GMT
Proofpoint-logo-reg-Reversed.png
www.proofpoint.com/sites/all/themes/proofpoint/images/
45 KB
45 KB
Image
General
Full URL
https://www.proofpoint.com/sites/all/themes/proofpoint/images/Proofpoint-logo-reg-Reversed.png
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
1ee51b94d3a3346cbfb9f77ae1e629353494a22d41986fcf197aeae7ff530d70
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/sites/all/themes/proofpoint/css/styles.css?pzh5j9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
via
varnish
x-content-type-options
nosniff
x-cdn
Incapsula
age
5334
x-cache
HIT
status
200
x-iinfo
10-45020356-45018587 2NNN RT(1571247981885 0) q(0 7 7 -1) r(10 10) U18
x-cache-hits
264
x-ah-environment
prod
content-length
46089
x-request-id
v-72a18c08-f030-11e9-8ad9-17c0d95860dd
last-modified
Fri, 07 Dec 2018 08:45:31 GMT
server
nginx
content-type
image/png
cache-control
max-age=1209600
accept-ranges
bytes
expires
Wed, 30 Oct 2019 16:17:28 GMT
earth.svg
www.proofpoint.com/sites/all/themes/proofpoint/images/
3 KB
2 KB
Image
General
Full URL
https://www.proofpoint.com/sites/all/themes/proofpoint/images/earth.svg
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
b7eab4c7c851a155bd46eb51790debc67d6f4b076d8b7070da3bb77abab18448
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/sites/all/themes/proofpoint/css/styles.css?pzh5j9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:23 GMT
via
varnish
x-content-type-options
nosniff
x-cdn
Incapsula
age
5334
x-cache
HIT
status
200
x-iinfo
10-45020357-45020368 PNNN RT(1571247981886 0) q(0 8 8 -1) r(10 10) U18
x-cache-hits
547
x-ah-environment
prod
content-encoding
gzip
x-request-id
v-72a11bba-f030-11e9-b2d9-23fd18c49ec5
last-modified
Wed, 24 Apr 2019 16:02:59 GMT
server
nginx
content-type
image/svg+xml
cache-control
max-age=1209600
accept-ranges
bytes
expires
Wed, 30 Oct 2019 16:17:28 GMT
ieVl2ZhZI2eCN5jzbjEETS9weq8-19K7DQk6YvM.woff2
fonts.gstatic.com/s/robotocondensed/v18/
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/robotocondensed/v18/ieVl2ZhZI2eCN5jzbjEETS9weq8-19K7DQk6YvM.woff2
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
49a1b4e1296645aa2f513c87a0e5fe56a305a7ed678c2f6499631ec1f3b35856
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://fonts.googleapis.com/css?family=Fjalla+One|Roboto+Condensed
Origin
https://www.proofpoint.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 11 Oct 2019 07:16:52 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 03:48:22 GMT
server
sffe
age
469770
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10968
x-xss-protection
0
expires
Sat, 10 Oct 2020 07:16:52 GMT
BebasNeue-Bold.woff2
www.proofpoint.com/sites/all/themes/proofpoint/fonts/
13 KB
13 KB
Font
General
Full URL
https://www.proofpoint.com/sites/all/themes/proofpoint/fonts/BebasNeue-Bold.woff2
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
e2eb28c4292664b548ad2c8ecf855b1f425a08966c5b413a4a0184b6ff52a509
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.proofpoint.com/sites/all/themes/proofpoint/css/styles.css?pzh5j9
Origin
https://www.proofpoint.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
via
varnish
x-content-type-options
nosniff
x-cdn
Incapsula
age
5333
x-cache
HIT
status
200
x-iinfo
10-45020358-45020361 NNNN CT(0 0 0) RT(1571247981887 0) q(0 1 1 -1) r(2 2) U18
x-cache-hits
516
x-ah-environment
prod
content-length
13140
x-request-id
v-728f8580-f030-11e9-89d9-779a62eb9b7c
last-modified
Fri, 07 Dec 2018 08:47:10 GMT
server
nginx
cache-control
max-age=1209600
accept-ranges
bytes
expires
Wed, 30 Oct 2019 16:17:28 GMT
Yq6R-LCAWCX3-6Ky7FAFrOF6kjouQb4.woff2
fonts.gstatic.com/s/fjallaone/v7/
11 KB
12 KB
Font
General
Full URL
https://fonts.gstatic.com/s/fjallaone/v7/Yq6R-LCAWCX3-6Ky7FAFrOF6kjouQb4.woff2
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
529e77ee17cf48e9ccbb5a64a0e59a1bbda0d9c011ee061f40b1aa189e8fabb8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://fonts.googleapis.com/css?family=Fjalla+One|Roboto+Condensed
Origin
https://www.proofpoint.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 11 Oct 2019 09:56:02 GMT
x-content-type-options
nosniff
last-modified
Tue, 16 Jul 2019 23:50:02 GMT
server
sffe
age
460220
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
11668
x-xss-protection
0
expires
Sat, 10 Oct 2020 09:56:02 GMT
proofpoint.woff2
www.proofpoint.com/sites/all/themes/proofpoint/fonts/
18 KB
18 KB
Font
General
Full URL
https://www.proofpoint.com/sites/all/themes/proofpoint/fonts/proofpoint.woff2
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
88b3102f2889489e2db30d672885b580d0275e944baacebc652c90ce2263d7ab
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.proofpoint.com/sites/all/themes/proofpoint/css/styles.css?pzh5j9
Origin
https://www.proofpoint.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
via
varnish
x-content-type-options
nosniff
x-cdn
Incapsula
age
5334
x-cache
HIT
status
200
x-iinfo
10-45020359-45020367 NNNN CT(0 0 0) RT(1571247981891 0) q(0 2 2 -1) r(3 5) U18
x-cache-hits
511
x-ah-environment
prod
content-length
18296
x-request-id
v-7293fad4-f030-11e9-8aa9-fbeca3901fd1
last-modified
Fri, 07 Dec 2018 08:45:31 GMT
server
nginx
cache-control
max-age=1209600
accept-ranges
bytes
expires
Wed, 30 Oct 2019 16:17:28 GMT
BebasNeue-Regular.woff2
www.proofpoint.com/sites/all/themes/proofpoint/fonts/
27 KB
27 KB
Font
General
Full URL
https://www.proofpoint.com/sites/all/themes/proofpoint/fonts/BebasNeue-Regular.woff2
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
94761f99487dcae4d91af9d25f37227af94965157adee62bd2f503645ded4fc7
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.proofpoint.com/sites/all/themes/proofpoint/css/styles.css?pzh5j9
Origin
https://www.proofpoint.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
via
varnish
x-content-type-options
nosniff
x-cdn
Incapsula
age
5306
x-cache
HIT
status
200
x-iinfo
10-45020360-45020368 NNNN CT(0 0 0) RT(1571247981895 0) q(0 2 2 -1) r(3 5) U18
x-cache-hits
310
x-ah-environment
prod
content-length
27220
x-request-id
v-82f8f71c-f030-11e9-af0e-e71d89b85680
last-modified
Fri, 07 Dec 2018 08:47:10 GMT
server
nginx
cache-control
max-age=1209600
accept-ranges
bytes
expires
Wed, 30 Oct 2019 16:17:55 GMT
gtm.js
www.googletagmanager.com/
166 KB
37 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-MGR7P8X
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
fa69cdafd5091dd80bb927ec9402e2f00865c572fc3b2670e6f20f6e83b58cef
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
content-encoding
br
last-modified
Wed, 16 Oct 2019 15:55:40 GMT
server
Google Tag Manager
access-control-allow-headers
Cache-Control
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
37841
x-xss-protection
0
expires
Wed, 16 Oct 2019 17:46:22 GMT
MP9Jyqtx.min.js
scripts.demandbase.com/
75 KB
18 KB
Script
General
Full URL
https://scripts.demandbase.com/MP9Jyqtx.min.js
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.110 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-110.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
4a02becff5da2f4a8660a33e1365c24621966445cc3c78029e9e4af31b7948ec

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
5yCqreib.8fd_tgQ7VuTf3ckLKekbrix
content-encoding
gzip
last-modified
Tue, 15 Oct 2019 15:25:48 GMT
server
AmazonS3
age
3396
date
Wed, 16 Oct 2019 16:49:47 GMT
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=3600
x-amz-cf-pop
FRA50-C1
x-amz-cf-id
y3YGnAkBr9ahatz_HIgJ_2vD-k6LSBBBP1Q41YZjTgA0DVq3tO0Frg==
via
1.1 e64eb476d8f76c461d21278e018e194f.cloudfront.net (CloudFront)
/
googleads.g.doubleclick.net/pagead/viewthroughconversion/950296937/
2 KB
1 KB
Script
General
Full URL
https://googleads.g.doubleclick.net/pagead/viewthroughconversion/950296937/?random=1571247982183&cv=9&fst=1571247982183&num=1&guid=ON&resp=GooglemKTybQhCsO&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=120&u_java=false&u_nplug=0&u_nmime=0&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware&tiba=Ammyy%20Admin%20Malware%20-%20FlawedAmmy%20Download%20%7C%20Proofpoint&rfmt=3&fmt=4
Requested by
Host: www.googleadservices.com
URL: https://www.googleadservices.com/pagead/conversion.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
2d8dc744bf21760108cd3b309dac92e2a004a57dd6c2922f47a8aeecab1c4319
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 16 Oct 2019 17:46:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-cache, must-revalidate
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
980
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
js
www.google-analytics.com/gtm/
60 KB
22 KB
Script
General
Full URL
https://www.google-analytics.com/gtm/js?id=GTM-KKGL4NZ&cid=1655445379.1571247982&aip=true
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
453836f0fce4dab82586c330dd1abd1e176f1d6128abf39516c84cd5f096e0a0
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
content-encoding
br
server
Google Tag Manager
access-control-allow-headers
Cache-Control
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
22524
x-xss-protection
0
expires
Wed, 16 Oct 2019 17:46:22 GMT
/
www.google.com/pagead/1p-user-list/950296937/
42 B
113 B
Image
General
Full URL
https://www.google.com/pagead/1p-user-list/950296937/?random=1571247982183&cv=9&fst=1571245200000&num=1&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=120&u_java=false&u_nplug=0&u_nmime=0&sendb=1&frm=0&url=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware&tiba=Ammyy%20Admin%20Malware%20-%20FlawedAmmy%20Download%20%7C%20Proofpoint&fmt=3&is_vtc=1&random=1335705411&resp=GooglemKTybQhCsO&rmt_tld=0&ipr=y
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Content-Security-Policy script-src 'none'; object-src 'none'
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 16 Oct 2019 17:46:22 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-security-policy
script-src 'none'; object-src 'none'
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
www.google.de/pagead/1p-user-list/950296937/
42 B
110 B
Image
General
Full URL
https://www.google.de/pagead/1p-user-list/950296937/?random=1571247982183&cv=9&fst=1571245200000&num=1&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=120&u_java=false&u_nplug=0&u_nmime=0&sendb=1&frm=0&url=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware&tiba=Ammyy%20Admin%20Malware%20-%20FlawedAmmy%20Download%20%7C%20Proofpoint&fmt=3&is_vtc=1&random=1335705411&resp=GooglemKTybQhCsO&rmt_tld=1&ipr=y
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Content-Security-Policy script-src 'none'; object-src 'none'
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 16 Oct 2019 17:46:22 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-security-policy
script-src 'none'; object-src 'none'
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
conversion_async.js
www.googleadservices.com/pagead/
24 KB
9 KB
Script
General
Full URL
https://www.googleadservices.com/pagead/conversion_async.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MGR7P8X
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.205.226 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s24-in-f2.1e100.net
Software
cafe /
Resource Hash
04cc99186aa1ed2c9e0989ad7f6a2e180508c8656caef8cd2b153fa8dbba9038
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
9198
x-xss-protection
0
server
cafe
etag
4566352449703540938
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Wed, 16 Oct 2019 17:46:22 GMT
bat.js
bat.bing.com/
23 KB
7 KB
Script
General
Full URL
https://bat.bing.com/bat.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MGR7P8X
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2620:1ec:c11::200 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
/
Resource Hash
b139982ce002c53ddfb65aec1e90704c0a3704fc5aa35247f9323b74a1d3f721

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:21 GMT
content-encoding
gzip
last-modified
Tue, 10 Sep 2019 18:57:28 GMT
x-msedge-ref
Ref A: C584F4FFF68548608E4FB26AE7AA71A3 Ref B: VIEEDGE0619 Ref C: 2019-10-16T17:46:22Z
status
200
etag
"09c5197968d51:0"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
private,max-age=1800
accept-ranges
bytes
content-length
7148
insight.min.js
sjs.bizographics.com/
3 KB
2 KB
Script
General
Full URL
https://sjs.bizographics.com/insight.min.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MGR7P8X
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:293::3adf , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
41dd5e421fe221a7d2921d6fa2b36e8b01a9f2c054aaef5fad866fe896c1d1e0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 16 Oct 2019 17:46:22 GMT
Content-Encoding
gzip
Last-Modified
Mon, 07 Oct 2019 16:41:31 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=82741
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1576
uwt.js
static.ads-twitter.com/
5 KB
2 KB
Script
General
Full URL
https://static.ads-twitter.com/uwt.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MGR7P8X
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.157 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
content-encoding
gzip
age
34379
x-cache
HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
1954
x-served-by
cache-fra19154-FRA
last-modified
Tue, 23 Jan 2018 20:09:00 GMT
x-timer
S1571247982.297242,VS0,VE0
etag
"b7b33882a4f3ffd5cbf07434f3137166+gzip"
vary
Accept-Encoding,Host
content-type
application/javascript; charset=utf-8
via
1.1 varnish
cache-control
no-cache
accept-ranges
bytes
hotjar-1456002.js
static.hotjar.com/c/
3 KB
2 KB
Script
General
Full URL
https://static.hotjar.com/c/hotjar-1456002.js?sv=5
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MGR7P8X
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
147.75.85.119 Parsippany, United States, ASN54825 (PACKET - Packet Host, Inc., US),
Reverse DNS
pkt-ams-k1-2
Software
openresty /
Resource Hash
efa6cceec5c22c28a54f019c7db4b9bbd9130f7e7e2757b7898d1b88695949e5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
section-io-tag
hotjar
age
102
status
200
access-control-max-age
600
section-io-cache
Hit
content-length
1598
server
openresty
cache-control
max-age=60
x-frame-options
SAMEORIGIN
etag
W/2f7a4340d1636fa586d026e875be88a7
vary
Accept-Encoding
section-io-origin-status
200
access-control-allow-origin
*
x-cache-hit
1
section-io-origin-time-seconds
0.071
section-io-id
96803df34e034108788bd68f2ceb86d3
accept-ranges
bytes
content-type
application/javascript
quant.js
secure.quantserve.com/
12 KB
6 KB
Script
General
Full URL
https://secure.quantserve.com/quant.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MGR7P8X
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.252 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
Software
QS /
Resource Hash
404a9b0ffbcc813e8ddbb8d8510a24a69c09079282f8083ee94f4adc5d627176

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 16 Oct 2019 17:46:22 GMT
Content-Encoding
gzip
Last-Modified
Wed, 16-Oct-2019 17:46:22 GMT
Server
QS
ETag
M0-e2b9884a
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=604800
Connection
keep-alive
Content-Length
5456
Expires
Wed, 23 Oct 2019 17:46:22 GMT
fbevents.js
connect.facebook.net/en_US/
105 KB
23 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
0629946fe142c676784daa479fe86526051bfa44bdeb5e3f4608fa22b8e153ae
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
content-length
23413
x-xss-protection
0
pragma
public
x-fb-debug
4lQE7PtmnzhjSQxIlmSGtXrOggjafMkG4qz1kZjIUw+KUpT9rZz7fVlPbm/KFZR9bgIGr5hBkAv16b+0GUOvMw==
x-fb-trip-id
136226023
x-frame-options
DENY
date
Wed, 16 Oct 2019 17:46:22 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
s
ads.avocet.io/
Redirect Chain
  • https://ads.avocet.io/s?add=5aba5f53ab79f7f51390a95a&ty=j
  • https://ads.avocet.io/s?bounce=true&add=5aba5f53ab79f7f51390a95a&ty=j
0
417 B
Script
General
Full URL
https://ads.avocet.io/s?bounce=true&add=5aba5f53ab79f7f51390a95a&ty=j
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.208.204.25 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-208-204-25.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 16 Oct 2019 17:46:22 GMT
Connection
keep-alive
P3p
policyref="http://cdn.avocet.io/w3c/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Content-Length
0
Content-Type
application/javascript

Redirect headers

Location
/s?bounce=true&add=5aba5f53ab79f7f51390a95a&ty=j
Date
Wed, 16 Oct 2019 17:46:22 GMT
Connection
keep-alive
P3p
policyref="http://cdn.avocet.io/w3c/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Content-Length
79
Content-Type
text/html; charset=utf-8
j.php
dev.visualwebsiteoptimizer.com/
899 B
671 B
Script
General
Full URL
https://dev.visualwebsiteoptimizer.com/j.php?a=359897&u=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware&r=0.4189280671586655
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
159.122.87.153 Frankfurt am Main, Germany, ASN36351 (SOFTLAYER - SoftLayer Technologies Inc., US),
Reverse DNS
99.57.7a9f.ip4.static.sl-reverse.com
Software
dacdn2 /
Resource Hash
fdf291fa760a17f1f4dff9c1ccb58315b18f0cb51e752b6750a88b36bcef6a81

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 16 Oct 2019 17:46:21 GMT
content-encoding
gzip
server
dacdn2
content-type
application/javascript; charset=UTF-8
1594.js
tracking.g2crowd.com/attribution_tracking/conversions/
0
0
Script
General
Full URL
https://tracking.g2crowd.com/attribution_tracking/conversions/1594.js?p=https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware&e=
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:1abe , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

1644.js
tracking.g2crowd.com/attribution_tracking/conversions/
0
0
Script
General
Full URL
https://tracking.g2crowd.com/attribution_tracking/conversions/1644.js?p=https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware&e=
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:1abe , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

1645.js
tracking.g2crowd.com/attribution_tracking/conversions/
0
0
Script
General
Full URL
https://tracking.g2crowd.com/attribution_tracking/conversions/1645.js?p=https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware&e=
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:1abe , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

1646.js
tracking.g2crowd.com/attribution_tracking/conversions/
0
0
Script
General
Full URL
https://tracking.g2crowd.com/attribution_tracking/conversions/1646.js?p=https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware&e=
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:1abe , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

1647.js
tracking.g2crowd.com/attribution_tracking/conversions/
0
0
Script
General
Full URL
https://tracking.g2crowd.com/attribution_tracking/conversions/1647.js?p=https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware&e=
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:1abe , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

main.rtfl.js
visitor.reactful.com/dist/
269 KB
104 KB
Script
General
Full URL
https://visitor.reactful.com/dist/main.rtfl.js
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2013 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Frontend /
Resource Hash
6133e41555e0169c50044cb52a13271289303965ec1bf735025c7a578fdf6cae

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:36:40 GMT
content-encoding
gzip
server
Google Frontend
age
582
etag
"GMBorA"
content-type
application/javascript; charset=UTF-8
status
200
x-cloud-trace-context
20cd8f41d3ba911a2208b32d23f10171
cache-control
public, max-age=600
content-length
106047
expires
Wed, 16 Oct 2019 17:46:40 GMT
ip.json
api.company-target.com/api/v2/
1 KB
1 KB
XHR
General
Full URL
https://api.company-target.com/api/v2/ip.json?key=8d20076343394d24eb8250e933d1560c
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.122 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-122.fra50.r.cloudfront.net
Software
nginx /
Resource Hash
4a4f0978f5beb74050cb1e3b95d66002bfd8c37b0cf4b0e9d87743f02c4077de

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
content-encoding
gzip
x-amz-cf-pop
FRA50-C1
x-cache
Miss from cloudfront
status
200
access-control-max-age
1728000
request-id
78a1a52a-3957-4801-b7e4-c7ff718ecb50
content-length
537
x-amz-cf-id
pLhDGefTxXPWYdh5STtTvmWCsryRyrmstghbjiBxM2C7s7K0eKzIsQ==
pragma
no-cache
access-control-allow-origin
https://www.proofpoint.com
server
nginx
vary
Accept-Encoding, Origin
access-control-allow-methods
GET, POST, OPTIONS
content-type
application/json;charset=utf-8
via
1.1 055d899361491602a9ef1eb0cdc5e337.cloudfront.net (CloudFront)
access-control-expose-headers
cache-control
no-cache, no-store, max-age=0, must-revalidate
access-control-allow-credentials
true
api-version
v2
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
identification-source
CACHE
expires
Tue, 15 Oct 2019 17:46:22 GMT
s
ads.avocet.io/
Redirect Chain
  • https://ads.avocet.io/s?add=5d1dcad3b00320110090d553&ty=j
  • https://ads.avocet.io/s?bounce=true&add=5d1dcad3b00320110090d553&ty=j
0
417 B
Script
General
Full URL
https://ads.avocet.io/s?bounce=true&add=5d1dcad3b00320110090d553&ty=j
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.208.204.25 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-208-204-25.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 16 Oct 2019 17:46:22 GMT
Connection
keep-alive
P3p
policyref="http://cdn.avocet.io/w3c/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Content-Length
0
Content-Type
application/javascript

Redirect headers

Location
/s?bounce=true&add=5d1dcad3b00320110090d553&ty=j
Date
Wed, 16 Oct 2019 17:46:22 GMT
Connection
keep-alive
P3p
policyref="http://cdn.avocet.io/w3c/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Content-Length
79
Content-Type
text/html; charset=utf-8
/
attr.ml-api.io/
Redirect Chain
  • https://s.ml-attr.com/getuid?https%3a%2f%2fattr.ml-api.io%2f%3fdomain%3dproofpoint.com%26pId%3d%24UID
  • https://secure.adnxs.com/getuid?https%3a%2f%2fattr.ml-api.io%2f%3fdomain%3dproofpoint.com%26pId%3d%24UID
  • https://secure.adnxs.com/bounce?%2Fgetuid%3Fhttps%253a%252f%252fattr.ml-api.io%252f%253fdomain%253dproofpoint.com%2526pId%253d%2524UID
  • https://attr.ml-api.io/?domain=proofpoint.com&pId=1632223327079324601
4 B
484 B
Image
General
Full URL
https://attr.ml-api.io/?domain=proofpoint.com&pId=1632223327079324601
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.10 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-10.fra2.r.cloudfront.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 16 Oct 2019 17:46:23 GMT
Via
1.1 3df1d6f6e1999cb29078ddff1a62bd1d.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
x-amzn-RequestId
08e23b22-219b-4e04-b5b5-895e7a7e3550
X-Cache
Miss from cloudfront
Content-Type
image/jpeg
X-Amzn-Trace-Id
Root=1-5da7576e-79db8fe061be8400dc2ee1d8;Sampled=0
Connection
keep-alive
x-amz-apigw-id
BqqZVEgyIAMF3bw=
Content-Length
4
X-Amz-Cf-Id
Y5gaQ_RZjdu8-171ZuXgJhdsqnJ4FSo3Pyjjwle8hHhmVVXpvRXx_w==

Redirect headers

Pragma
no-cache
Date
Wed, 16 Oct 2019 17:46:24 GMT
X-Proxy-Origin
109.236.94.25; 109.236.94.25; 536.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.172.176:80
AN-X-Request-Uuid
2eb8345d-b204-463e-82cf-e8f2a0078bd0
Server
nginx/1.13.4
Access-Control-Allow-Origin
*
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Location
https://attr.ml-api.io/?domain=proofpoint.com&pId=1632223327079324601
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
src=8909468;dc_pre=CIS3me-qoeUCFUmVdwodf04LoQ;type=invmedia;cat=1l6xh4ap;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=1
adservice.google.com/ddm/fls/z/
Redirect Chain
  • https://gwmtracking.com/p/v/1/5b7320b8f870815f7f59492b/format/img?gtmcb=195737731
  • https://ad.doubleclick.net/ddm/activity/src=8909468;type=invmedia;cat=1l6xh4ap;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=1?
  • https://ad.doubleclick.net/ddm/activity/src=8909468;dc_pre=CIS3me-qoeUCFUmVdwodf04LoQ;type=invmedia;cat=1l6xh4ap;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=1?
  • https://adservice.google.com/ddm/fls/z/src=8909468;dc_pre=CIS3me-qoeUCFUmVdwodf04LoQ;type=invmedia;cat=1l6xh4ap;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=1
42 B
109 B
Image
General
Full URL
https://adservice.google.com/ddm/fls/z/src=8909468;dc_pre=CIS3me-qoeUCFUmVdwodf04LoQ;type=invmedia;cat=1l6xh4ap;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=1
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 16 Oct 2019 17:46:23 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 16 Oct 2019 17:46:23 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
302
content-type
text/html; charset=UTF-8
location
https://adservice.google.com/ddm/fls/z/src=8909468;dc_pre=CIS3me-qoeUCFUmVdwodf04LoQ;type=invmedia;cat=1l6xh4ap;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=1
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&aip=1&a=809979347&t=pageview&_s=1&dl=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malw...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-2257074-1&cid=1655445379.1571247982&jid=1936113989&_gid=995778174.1571247982&gjid=1123423654&_v=j79&z=1409141833
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2257074-1&cid=1655445379.1571247982&jid=1936113989&_v=j79&z=1409141833
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2257074-1&cid=1655445379.1571247982&jid=1936113989&_v=j79&z=1409141833&slf_rd=1&random=2360788858
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2257074-1&cid=1655445379.1571247982&jid=1936113989&_v=j79&z=1409141833&slf_rd=1&random=2360788858
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 16 Oct 2019 17:46:22 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 16 Oct 2019 17:46:22 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2257074-1&cid=1655445379.1571247982&jid=1936113989&_v=j79&z=1409141833&slf_rd=1&random=2360788858
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
143852102935619
connect.facebook.net/signals/config/
281 KB
65 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/143852102935619?v=2.9.6&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
197892160d7f98d6ac74ebb34eee9ba6f2379b6b07480c9cd0663f61b870a2c1
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
content-length
66631
x-xss-protection
0
pragma
public
x-fb-debug
sJ8lNeAzuwszUEaaD99L3XcKpWoswkYNkeCjTNGx0edRe+E/qXW8tWrXsflSFdKwpLBZcfMBcS6KS+oemfzRFw==
x-fb-trip-id
136226023
x-frame-options
DENY
date
Wed, 16 Oct 2019 17:46:22 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
collect
px.ads.linkedin.com/
Redirect Chain
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=169250&url=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware&time=1571247982254
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D169250%26url%3Dhttps%253A%252F%252Fwww.proofpoint.com%252Fus%252Fthreat-insight%2...
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=169250&url=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware&time=1571247982254&liSync...
0
87 B
Image
General
Full URL
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=169250&url=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware&time=1571247982254&liSync=true
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:10:101::b93f:9105 , Ireland, ASN14413 (LINKEDIN - LinkedIn Corporation, US),
Reverse DNS
Software
Play /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
content-encoding
gzip
server
Play
vary
Accept-Encoding
x-li-fabric
prod-lva1
status
200
x-li-proto
http/2
x-li-pop
prod-efr5
content-type
application/javascript
content-length
20
x-li-uuid
2CDsJLcxzhUwdIGswSoAAA==

Redirect headers

date
Wed, 16 Oct 2019 17:46:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
302
vary
Accept-Encoding
content-length
20
x-li-uuid
bTjXG7cxzhVwtR5/ySoAAA==
server
Play
pragma
no-cache
x-li-pop
prod-efr5
x-frame-options
sameorigin
expect-ct
max-age=86400, report-uri="https://www.linkedin.com/platform-telemetry/ct"
strict-transport-security
max-age=2592000
x-li-fabric
prod-lva1
location
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=169250&url=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware&time=1571247982254&liSync=true
x-xss-protection
1; mode=block
cache-control
no-cache, no-store
content-security-policy
default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id https://lnkd.demdex.net/event blob:; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' platform.linkedin.com spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com https://snap.licdn.com/li.lms-analytics/insight.min.js; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'
x-li-proto
http/2
expires
Thu, 01 Jan 1970 00:00:00 GMT
/
googleads.g.doubleclick.net/pagead/viewthroughconversion/950296937/
2 KB
1 KB
Script
General
Full URL
https://googleads.g.doubleclick.net/pagead/viewthroughconversion/950296937/?random=1571247982264&cv=9&fst=1571247982264&num=1&guid=ON&resp=GooglemKTybQhCsO&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=120&u_java=false&u_nplug=0&u_nmime=0&gtm=2wga21&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware&tiba=Ammyy%20Admin%20Malware%20-%20FlawedAmmy%20Download%20%7C%20Proofpoint&async=1&rfmt=3&fmt=4
Requested by
Host: www.googleadservices.com
URL: https://www.googleadservices.com/pagead/conversion_async.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e0dec1b80b5def1d248d74317f1e36b38a61959ff66125d29d22ba94813ce98a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 16 Oct 2019 17:46:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-cache, must-revalidate
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
996
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
0
bat.bing.com/action/
0
135 B
Image
General
Full URL
https://bat.bing.com/action/0?ti=17087961&Ver=2&mid=01765306-781a-a3c6-f59a-454458e3d548&pi=0&lg=en-US&sw=1600&sh=1200&sc=24&tl=Ammyy%20Admin%20Malware%20-%20FlawedAmmy%20Download%20%7C%20Proofpoint&p=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware&r=&evt=pageLoad&msclkid=N&rn=504554
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2620:1ec:c11::200 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
204
pragma
no-cache
date
Wed, 16 Oct 2019 17:46:21 GMT
cache-control
no-cache, must-revalidate
x-msedge-ref
Ref A: 34196FC3B91D492A9D7225DDD025E025 Ref B: VIEEDGE0619 Ref C: 2019-10-16T17:46:22Z
access-control-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ip.json
api.company-target.com/api/v2/
1 KB
1 KB
XHR
General
Full URL
https://api.company-target.com/api/v2/ip.json?referrer=&page=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware&page_title=Ammyy%20Admin%20Malware%20-%20FlawedAmmy%20Download%20%7C%20Proofpoint&key=2e81efc731d57cb3e458d08fae112991&src=tag
Requested by
Host: scripts.demandbase.com
URL: https://scripts.demandbase.com/MP9Jyqtx.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.122 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-122.fra50.r.cloudfront.net
Software
nginx /
Resource Hash
4a4f0978f5beb74050cb1e3b95d66002bfd8c37b0cf4b0e9d87743f02c4077de

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
content-encoding
gzip
x-amz-cf-pop
FRA50-C1
x-cache
Miss from cloudfront
status
200
access-control-max-age
1728000
request-id
ce748be4-7e6c-4156-8d99-3309972fad97
x-amz-cf-id
D8x5oSSHH2tbfNJ3h3FGIkYcTsLfs_EvfrXrRsddDB5w1UrTrflYIw==
pragma
no-cache
access-control-allow-origin
https://www.proofpoint.com
server
nginx
vary
Accept-Encoding, Origin
access-control-allow-methods
GET, POST, OPTIONS
content-type
application/json;charset=utf-8
via
1.1 a394c864b23364262af48fed4e7e9fad.cloudfront.net (CloudFront)
access-control-expose-headers
cache-control
no-cache, no-store, max-age=0, must-revalidate
access-control-allow-credentials
true
api-version
v2
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
identification-source
CACHE
expires
Tue, 15 Oct 2019 17:46:22 GMT
validateCookie
segments.company-target.com/
Redirect Chain
  • https://match.prod.bidr.io/cookie-sync/demandbase
  • https://match.prod.bidr.io/cookie-sync/demandbase?_bee_ppp=1
  • https://segments.company-target.com/log?vendor=choca&user_id=AARmgk67Tq8AAD9g1iaRXg
  • https://segments.company-target.com/validateCookie?vendor=choca&user_id=AARmgk67Tq8AAD9g1iaRXg&verifyHash=caac2620cfb34c18795c5542c170af6a0a01a9e1
26 B
390 B
Image
General
Full URL
https://segments.company-target.com/validateCookie?vendor=choca&user_id=AARmgk67Tq8AAD9g1iaRXg&verifyHash=caac2620cfb34c18795c5542c170af6a0a01a9e1
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.119 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-119.fra50.r.cloudfront.net
Software
/
Resource Hash
3b7b8a4b411ddf8db9bacc2f3aabf406f8e4c0c087829b336ca331c40adfdff1

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 16 Oct 2019 17:46:22 GMT
Via
1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA50-C1
Vary
Origin
X-Cache
Miss from cloudfront
Content-Type
image/gif
Connection
keep-alive
trace-id
37b405940fd133b1
Content-Length
26
X-Amz-Cf-Id
D89IjKk4AQm0jan_L3_vt2_HzKnks2q1QU1oRpH7cR6Skv5tBZ610g==

Redirect headers

Date
Wed, 16 Oct 2019 17:46:22 GMT
Via
1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA50-C1
Vary
Origin
X-Cache
Miss from cloudfront
Location
/validateCookie?vendor=choca&user_id=AARmgk67Tq8AAD9g1iaRXg&verifyHash=caac2620cfb34c18795c5542c170af6a0a01a9e1
Connection
keep-alive
trace-id
92f52eca5b0b298a
Content-Length
0
X-Amz-Cf-Id
8An7b2M2CYi2--O0TITgVhWXLCn-2rT5IsqJP1JA6d0habRYtU0a3w==
munchkin.js
munchkin.marketo.net/155/
9 KB
4 KB
Script
General
Full URL
https://munchkin.marketo.net/155/munchkin.js
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.31.84.223 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-31-84-223.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
efb6b9732bf508ee305363b10cf2a67ace474e06eb42642f2c3696b2442a5775

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 16 Oct 2019 17:46:22 GMT
Content-Encoding
gzip
Last-Modified
Fri, 30 Nov 2018 03:18:20 GMT
Server
Apache
ETag
"c67dad42946949112916578f78706df8:1543547900"
Vary
Accept-Encoding
P3P
policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR", policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR"
Cache-Control
max-age=8640000
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
application/x-javascript
Content-Length
3923
Expires
Fri, 24 Jan 2020 17:46:22 GMT
iframe_api
www.youtube.com/
859 B
929 B
Script
General
Full URL
https://www.youtube.com/iframe_api
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/sites/all/themes/proofpoint/js/script.js?pzh5j9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
YouTube Frontend Proxy /
Resource Hash
16dd54686a3ed4ca169cba44af157ea072d91930a6b5ad3690b4651820e5e0b2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
x-content-type-options
nosniff
server
YouTube Frontend Proxy
content-type
application/javascript
status
200
cache-control
no-cache
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
859
x-xss-protection
0
expires
Tue, 27 Apr 1971 19:44:06 EST
me
geoip-js.maxmind.com/geoip/v2.1/country/
771 B
1 KB
XHR
General
Full URL
https://geoip-js.maxmind.com/geoip/v2.1/country/me?referrer=https%3A%2F%2Fwww.proofpoint.com
Requested by
Host: js.maxmind.com
URL: https://js.maxmind.com/js/apis/geoip2/v2.1/geoip2.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:262f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
bf963a539b0317b528442ad4a6f4cea0e64fb53bfa1e8769a09cdd9f9fb319c0

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
cf-cache-status
DYNAMIC
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
status
200
content-type
application/vnd.maxmind.com-country+json; charset=UTF-8; version=2.1
access-control-allow-origin
*
cf-ray
526bda11ac6b8c9e-VIE
content-length
771
truncated
/
562 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5fde80b0aaf01a7fe4f8de3dbb671abadb59a30f6143e828b8000ac4fa9a45ec

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
addthis_widget.js
s7.addthis.com/js/300/
349 KB
113 KB
Script
General
Full URL
https://s7.addthis.com/js/300/addthis_widget.js?_=1571247982320
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/sites/default/files/js/js_Sd3E1-ubI8_oPJ3epUeNgAhdPIZsHFWzDl_t8nL-a0k.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.248.44 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-248-44.deploy.static.akamaitechnologies.com
Software
nginx/1.15.8 /
Resource Hash
a95ebbca9b2c9a1cbd25f9b5070862c532bf98170e12f9d53b0212e2569622c2
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=15724800; includeSubDomains
content-encoding
gzip
last-modified
Thu, 10 Oct 2019 17:01:35 GMT
server
nginx/1.15.8
etag
"5d9f63ef-573ea"
vary
Accept-Encoding
x-distribution
99
content-type
application/javascript
status
200
cache-control
public, max-age=600
date
Wed, 16 Oct 2019 17:46:22 GMT
x-host
s7.addthis.com
content-length
114882
roundtrip.js
s.adroll.com/j/
33 KB
11 KB
Script
General
Full URL
https://s.adroll.com/j/roundtrip.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MGR7P8X
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
9376bf715986d3500b26c5935970ee676b9f57844fc26844fcfcb2eebd97a97c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
fTDJv6EgcLjvYeTBgoNw0ttHF7cHKgnf
Content-Encoding
gzip
ETag
"f37bc546fe63ca0c7926a4cf9948bee0"
x-amz-request-id
0E2B8F4FFF24281B
x-amz-server-side-encryption
AES256
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
10489
x-amz-id-2
aqIWInyXpxAm5bJk5AWCcZJTVlWaRn4pEfDbjju4BOaEKVQgzu6hAcRaqJ/wk9RLGNHM8q0hoGg=
Last-Modified
Mon, 14 Oct 2019 16:06:49 GMT
Server
AmazonS3
Date
Wed, 16 Oct 2019 17:46:22 GMT
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=3600, must-revalidate
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
activityi;dc_pre=COzE4u6qoeUCFVUFiwodygcGwQ;src=4788165;type=sitew0;cat=proof0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=8889445769701.318
4788165.fls.doubleclick.net/ Frame D521
Redirect Chain
  • https://4788165.fls.doubleclick.net/activityi;src=4788165;type=sitew0;cat=proof0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=8889445769701.318?
  • https://4788165.fls.doubleclick.net/activityi;dc_pre=COzE4u6qoeUCFVUFiwodygcGwQ;src=4788165;type=sitew0;cat=proof0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=8889445769701.318?
0
0
Document
General
Full URL
https://4788165.fls.doubleclick.net/activityi;dc_pre=COzE4u6qoeUCFVUFiwodygcGwQ;src=4788165;type=sitew0;cat=proof0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=8889445769701.318?
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MGR7P8X
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.198 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f6.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=21600
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
4788165.fls.doubleclick.net
:scheme
https
:path
/activityi;dc_pre=COzE4u6qoeUCFVUFiwodygcGwQ;src=4788165;type=sitew0;cat=proof0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=8889445769701.318?
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
accept-encoding
gzip, deflate, br
cookie
IDE=AHWqTUn5GLUetAorE_RbBvkD9jruNFMkSl43FJU3S4RnYMXK6DcxuCjji5thSxIm
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
date
Wed, 16 Oct 2019 17:46:22 GMT
expires
Wed, 16 Oct 2019 17:46:22 GMT
cache-control
private, max-age=0
strict-transport-security
max-age=21600
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
422
x-xss-protection
0
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000

Redirect headers

status
302
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
date
Wed, 16 Oct 2019 17:46:22 GMT
pragma
no-cache
expires
Fri, 01 Jan 1990 00:00:00 GMT
cache-control
no-cache, must-revalidate
follow-only-when-prerender-shown
1
strict-transport-security
max-age=21600
location
https://4788165.fls.doubleclick.net/activityi;dc_pre=COzE4u6qoeUCFVUFiwodygcGwQ;src=4788165;type=sitew0;cat=proof0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=8889445769701.318?
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
server
cafe
content-length
0
x-xss-protection
0
set-cookie
IDE=AHWqTUn5GLUetAorE_RbBvkD9jruNFMkSl43FJU3S4RnYMXK6DcxuCjji5thSxIm; expires=Mon, 09-Nov-2020 17:46:22 GMT; path=/; domain=.doubleclick.net; HttpOnly test_cookie=; domain=.doubleclick.net; path=/; expires=Mon, 21 Jul 2008 23:59:00 GMT
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
_Incapsula_Resource
www.proofpoint.com/
1 B
89 B
Image
General
Full URL
https://www.proofpoint.com/_Incapsula_Resource?SWKMTFSR=1&e=0.8696634453260204
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
cache-control
no-cache
x-robots-tag
noindex
content-length
1
content-type
text/plain
modules.ae52192fb234e49a031e.js
script.hotjar.com/
431 KB
73 KB
Script
General
Full URL
https://script.hotjar.com/modules.ae52192fb234e49a031e.js
Requested by
Host: static.hotjar.com
URL: https://static.hotjar.com/c/hotjar-1456002.js?sv=5
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
147.75.85.99 Parsippany, United States, ASN54825 (PACKET - Packet Host, Inc., US),
Reverse DNS
pkt-ams-k1-5
Software
/
Resource Hash
9b864283c1d05d3a504dabb954a6bfd9df5645bfe1c934528488a58b573b527d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
content-encoding
br
last-modified
Wed, 16 Oct 2019 07:56:06 GMT
status
200
etag
"ce9f40dcefadbe1c6a73694d3d5b1e17"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=31536000
section-io-origin-time-seconds
0.041
section-io-origin-status
200
accept-ranges
bytes
section-io-id
d8e534dc20fc3a5f0e66ae9d2fa0bdf1
content-length
74180
v.gif
dev.visualwebsiteoptimizer.com/
35 B
236 B
Image
General
Full URL
https://dev.visualwebsiteoptimizer.com/v.gif?a=359897&d=proofpoint.com&u=DB398A2A988C260DF695BEFD2518D2309&h=e1c24f94c1c496a2a896fcd195fb61e0&t=false&r=0.08140780492367594
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
159.122.87.153 Frankfurt am Main, Germany, ASN36351 (SOFTLAYER - SoftLayer Technologies Inc., US),
Reverse DNS
99.57.7a9f.ip4.static.sl-reverse.com
Software
dacdn2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 16 Oct 2019 17:46:21 GMT
x-content-type-options
nosniff
server
dacdn2
content-type
image/gif
status
200
cache-control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
content-length
35
expires
Mon, 10 Jan 2005 00:00:01 GMT
/
www.facebook.com/tr/
44 B
311 B
Image
General
Full URL
https://www.facebook.com/tr/?id=143852102935619&ev=PageView&dl=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware&rl=&if=false&ts=1571247982423&sw=1600&sh=1200&v=2.9.6&r=stable&ec=0&o=30&fbp=fb.1.1571247982422.945046289&it=1571247982252&coo=false&rqm=GET
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Wed, 16 Oct 2019 17:46:22 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&aip=1&a=809979347&t=event&ni=1&_s=2&dl=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-ma...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-2257074-1&cid=1655445379.1571247982&jid=2026363175&_gid=995778174.1571247982&gjid=588063687&_v=j79&z=1376864968
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2257074-1&cid=1655445379.1571247982&jid=2026363175&_v=j79&z=1376864968
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2257074-1&cid=1655445379.1571247982&jid=2026363175&_v=j79&z=1376864968&slf_rd=1&random=403305814
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2257074-1&cid=1655445379.1571247982&jid=2026363175&_v=j79&z=1376864968&slf_rd=1&random=403305814
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 16 Oct 2019 17:46:22 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 16 Oct 2019 17:46:22 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-2257074-1&cid=1655445379.1571247982&jid=2026363175&_v=j79&z=1376864968&slf_rd=1&random=403305814
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
rules-p-R3wfD8YvtmDvY.js
rules.quantcount.com/
3 B
354 B
Script
General
Full URL
https://rules.quantcount.com/rules-p-R3wfD8YvtmDvY.js
Requested by
Host: secure.quantserve.com
URL: https://secure.quantserve.com/quant.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:200c:a000:6:44e3:f8c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:45:23 GMT
via
1.1 8391f131e4acb30724947dab1f8592a5.cloudfront.net (CloudFront)
last-modified
Fri, 03 Mar 2017 23:52:35 GMT
server
AmazonS3
age
67
etag
"8a80554c91d9fca8acb82f023de02f11"
x-cache
Error from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=300
x-amz-cf-pop
FRA2
accept-ranges
bytes
content-length
3
x-amz-cf-id
Q2zDCYfpGkH4ma0dJNdzSdkLFgtPFZkMyP9U2lwBMOD1PcNhqcdOxQ==
adsct
t.co/i/
43 B
448 B
Image
General
Full URL
https://t.co/i/adsct?p_id=Twitter&p_user_id=0&txn_id=nyk4d&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.133 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=0
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
121
pragma
no-cache
last-modified
Wed, 16 Oct 2019 17:46:22 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=0
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
564142fb2b59ebfb093d1b3288f24bc6
x-transaction
000dcdbe009116f4
expires
Tue, 31 Mar 1981 05:00:00 GMT
/
visitor.reactful.com/config/879986/
194 KB
19 KB
XHR
General
Full URL
https://visitor.reactful.com/config/879986/?page=%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware&hash=&referer=&user_id=&hshkgid=74c68bba-fb98-4f19-a5a5-0a7aca33e26e&cb_rtfl=_rtfl_jsonp_0
Requested by
Host: visitor.reactful.com
URL: https://visitor.reactful.com/dist/main.rtfl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2013 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Frontend /
Resource Hash
ec5a7ce7c578dfce0c51ef78643b02f266ac711353259b9c9c3434442a62c549

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:23 GMT
content-encoding
gzip
server
Google Frontend
status
200
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
p3p
CP="NOI ADM DEV PSAi COM NAV OUR OTR STP IND DEM"
access-control-allow-origin
https://www.proofpoint.com
x-cloud-trace-context
b1ebd595c748343ad5b0252ebd672644
cache-control
no-cache
access-control-allow-credentials
true
content-type
text/html; charset=utf-8
access-control-allow-headers
Six-Sense-Data,Custom-Vars-Data
content-length
19354
expires
Wed, 16 Oct 2019 17:46:23 GMT
/
www.google.com/pagead/1p-user-list/950296937/
42 B
113 B
Image
General
Full URL
https://www.google.com/pagead/1p-user-list/950296937/?random=1571247982264&cv=9&fst=1571245200000&num=1&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=120&u_java=false&u_nplug=0&u_nmime=0&gtm=2wga21&sendb=1&frm=0&url=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware&tiba=Ammyy%20Admin%20Malware%20-%20FlawedAmmy%20Download%20%7C%20Proofpoint&async=1&fmt=3&is_vtc=1&random=220846132&resp=GooglemKTybQhCsO&rmt_tld=0&ipr=y
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Content-Security-Policy script-src 'none'; object-src 'none'
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 16 Oct 2019 17:46:22 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-security-policy
script-src 'none'; object-src 'none'
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
www.google.de/pagead/1p-user-list/950296937/
42 B
110 B
Image
General
Full URL
https://www.google.de/pagead/1p-user-list/950296937/?random=1571247982264&cv=9&fst=1571245200000&num=1&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=120&u_java=false&u_nplug=0&u_nmime=0&gtm=2wga21&sendb=1&frm=0&url=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware&tiba=Ammyy%20Admin%20Malware%20-%20FlawedAmmy%20Download%20%7C%20Proofpoint&async=1&fmt=3&is_vtc=1&random=220846132&resp=GooglemKTybQhCsO&rmt_tld=1&ipr=y
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Content-Security-Policy script-src 'none'; object-src 'none'
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 16 Oct 2019 17:46:22 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-security-policy
script-src 'none'; object-src 'none'
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
visitWebPage
309-rhv-619.mktoresp.com/webevents/
2 B
303 B
XHR
General
Full URL
https://309-rhv-619.mktoresp.com/webevents/visitWebPage?_mchNc=1571247982462&_mchCn=&_mchId=309-RHV-619&_mchTk=_mch-proofpoint.com-1571247982461-17716&_mchHo=www.proofpoint.com&_mchPo=&_mchRu=%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware&_mchPc=https%3A&_mchVr=155&_mchHa=&_mchRe=&_mchQp=
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/155/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
192.28.144.124 , United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
Software
akka-http/10.1.7 /
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 16 Oct 2019 17:46:22 GMT
Content-Encoding
gzip
Server
akka-http/10.1.7
Transfer-Encoding
chunked
X-Request-Id
e66eeebd-506e-4a94-b33b-f023e7cf3eea
Content-Type
text/plain; charset=UTF-8
www-widgetapi.js
s.ytimg.com/yts/jsbin/www-widgetapi-vfloS5Wsk/
23 KB
9 KB
Script
General
Full URL
https://s.ytimg.com/yts/jsbin/www-widgetapi-vfloS5Wsk/www-widgetapi.js
Requested by
Host: www.youtube.com
URL: https://www.youtube.com/iframe_api
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
b631fccbe48b26dccef2b6eedeed2d6fb9020daf34dbc8010e587e280b6f498e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 04:08:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
49051
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
8680
x-xss-protection
0
last-modified
Tue, 15 Oct 2019 12:11:19 GMT
server
sffe
vary
Accept-Encoding, Origin
content-type
text/javascript
cache-control
public, max-age=691200
accept-ranges
bytes
timing-allow-origin
https://www.youtube.com
expires
Thu, 24 Oct 2019 04:08:51 GMT
DE.png
www.proofpoint.com/sites/all/modules/custom/pp_cdn/images/
3 KB
4 KB
Image
General
Full URL
https://www.proofpoint.com/sites/all/modules/custom/pp_cdn/images/DE.png
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
013ebc8682bafe775a56f93904cff8456974906327dad3524e2ab2fe0c0df700
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
via
varnish
x-content-type-options
nosniff
x-cdn
Incapsula
age
4386
x-cache
HIT
status
200
x-iinfo
10-45020384-45015027 2NNN RT(1571247982225 0) q(0 1 1 2) r(1 3) U18
x-cache-hits
4
x-ah-environment
prod
content-length
3329
x-request-id
v-a75e2530-f032-11e9-a42c-0f9ca9427efd
last-modified
Wed, 17 Jul 2019 18:26:10 GMT
server
nginx
content-type
image/png
cache-control
max-age=1209600
accept-ranges
bytes
expires
Wed, 30 Oct 2019 16:33:15 GMT
box-90f3a29ef7448451db5af955688970d7.html
vars.hotjar.com/ Frame 8038
0
0
Document
General
Full URL
https://vars.hotjar.com/box-90f3a29ef7448451db5af955688970d7.html
Requested by
Host: static.hotjar.com
URL: https://static.hotjar.com/c/hotjar-1456002.js?sv=5
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
147.75.85.99 Parsippany, United States, ASN54825 (PACKET - Packet Host, Inc., US),
Reverse DNS
pkt-ams-k1-5
Software
/
Resource Hash

Request headers

:method
GET
:authority
vars.hotjar.com
:scheme
https
:path
/box-90f3a29ef7448451db5af955688970d7.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware

Response headers

status
200
date
Wed, 16 Oct 2019 17:46:22 GMT
content-type
text/html
content-length
787
cache-control
max-age=31536000
content-encoding
br
last-modified
Fri, 04 Oct 2019 14:41:13 GMT
etag
"5ee1a7ca3792b75767626ba3f51572aa"
section-io-origin-status
200
section-io-origin-time-seconds
0.026
vary
Accept-Encoding
accept-ranges
bytes
section-io-id
7cce26b50f597c7f4f03325561e2687f
truncated
/
571 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
89cfdadb23c7206b508ca2007f1e8c183f609fd283a91b03e19b64ee2f03a288

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
close_button.svg
www.proofpoint.com/sites/all/themes/proofpoint/images/
433 B
664 B
Image
General
Full URL
https://www.proofpoint.com/sites/all/themes/proofpoint/images/close_button.svg
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:e980:d::87 , United States, ASN19551 (INCAPSULA - Incapsula Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
ba2fc3f7fc4e3de678f7071c05e967705f407dd069e2488b9845c6eb55fb240f
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/sites/all/themes/proofpoint/css/styles.css?pzh5j9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:22 GMT
via
varnish
x-content-type-options
nosniff
x-cdn
Incapsula
age
4821
x-cache
HIT
status
200
x-iinfo
10-45020383-45020368 PNNN RT(1571247982225 0) q(0 1 1 0) r(1 2) U18
x-cache-hits
33
x-ah-environment
prod
content-encoding
gzip
x-request-id
v-a433bc54-f031-11e9-860d-679e186d87b7
last-modified
Wed, 17 Jul 2019 18:26:10 GMT
server
nginx
content-type
image/svg+xml
cache-control
max-age=1209600
accept-ranges
bytes
expires
Wed, 30 Oct 2019 16:26:01 GMT
index.js
s.adroll.com/j/exp/
Redirect Chain
  • https://s.adroll.com/j/exp/7YJ7XZCLMRHSVCXIHB5HIT/index.js
  • https://s.adroll.com/j/exp/index.js
28 B
680 B
Script
General
Full URL
https://s.adroll.com/j/exp/index.js
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
f59e5f34a941183aacaed25322ac0856628493c2cfd936ded3fddc0a49510e52

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
niuFHHiE0TCeLklfDq1_G80VStt1Fv5p
ETag
"5816cced8568d223aa09d889f300692b"
x-amz-request-id
49478B962289910C
x-amz-server-side-encryption
AES256
Connection
keep-alive
Content-Length
28
x-amz-id-2
3YbRq7O/wetiCWiTOhO4PZ0DDJm7oU1WHojYg0yqJWYoJhq4jd6IpK2njQyhXw6H13nB6urMoZk=
Last-Modified
Mon, 14 Oct 2019 16:46:26 GMT
Server
AmazonS3
Date
Wed, 16 Oct 2019 17:46:22 GMT
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*

Redirect headers

Date
Wed, 16 Oct 2019 17:46:22 GMT
Server
AkamaiGHost
Location
https://s.adroll.com/j/exp/index.js
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
false
Connection
keep-alive
Access-Control-Allow-Headers
*
Content-Length
0
7YJ7XZCLMRHSVCXIHB5HIT
d.adroll.com/consent/check/
52 B
511 B
Script
General
Full URL
https://d.adroll.com/consent/check/7YJ7XZCLMRHSVCXIHB5HIT?_s=7fb647954873b3ab11da985310a03d41&_b=2
Requested by
Host: s.adroll.com
URL: https://s.adroll.com/j/roundtrip.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.228.197.115 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-228-197-115.eu-west-1.compute.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
78e8014068cb4da20c259ed16b0576ab430744d992d822b5b643ef6d0049dd05

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 16 Oct 2019 17:46:22 GMT
Server
nginx/1.14.1
P3P
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
Cache-Control
no-store, no-cache, must-revalidate
Connection
keep-alive
Content-Type
application/javascript
Content-Length
52
pixel;r=761819106;rf=0;a=p-R3wfD8YvtmDvY;url=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware;fpan=1;fpa=P0-527428179-1571247982586;ns=0...
pixel.quantserve.com/
35 B
494 B
Image
General
Full URL
https://pixel.quantserve.com/pixel;r=761819106;rf=0;a=p-R3wfD8YvtmDvY;url=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware;fpan=1;fpa=P0-527428179-1571247982586;ns=0;ce=1;qjs=1;qv=4c19192-20180628134937;cm=;ref=;je=0;sr=1600x1200x24;enc=n;dst=1;et=1571247982585;tzo=-120;ogl=url.https%3A%2F%2Fwww%252Eproofpoint%252Ecom%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code%2Ctitle.Ammyy%20Admin%20Malware%20-%20FlawedAmmy%20Download%20%7C%20Proofpoint%2Cdescription.Learn%20how%20Proofpoint%20discovered%20a%20RAT%20based%20on%20the%20leaked%20source%20code%20of%20the%20Amm%2Cimage.https%3A%2F%2Fwww%252Eproofpoint%252Ecom%2Fsites%2Fdefault%2Ffiles%2Fimages%2FBlog%2Frat%252Epng
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.249 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
Software
QS /
Resource Hash
a0d3a0aff7dc3bf32d2176fc3dcda6e7aba2867c4f4d1f7af6355d2cfc6c44f8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 16 Oct 2019 17:46:22 GMT
Server
QS
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAo PSDo OUR SAMa IND COM NAV"
Cache-Control
private, no-cache, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
Fri, 04 Aug 1978 12:00:00 GMT
T47Y2VPPABDUBJXFROMZZM.js
s.adroll.com/pixel/7YJ7XZCLMRHSVCXIHB5HIT/YV5KYXXEJZATZCT37YRTMK/
Redirect Chain
  • https://d.adroll.com/pixel/7YJ7XZCLMRHSVCXIHB5HIT/YV5KYXXEJZATZCT37YRTMK?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&pv=49043279920.20108&cookie=&adroll_s_ref=&keyw=&arrfrr=h...
  • https://s.adroll.com/pixel/7YJ7XZCLMRHSVCXIHB5HIT/YV5KYXXEJZATZCT37YRTMK/T47Y2VPPABDUBJXFROMZZM.js
4 KB
2 KB
Script
General
Full URL
https://s.adroll.com/pixel/7YJ7XZCLMRHSVCXIHB5HIT/YV5KYXXEJZATZCT37YRTMK/T47Y2VPPABDUBJXFROMZZM.js
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
5845e8453fb8ad463202d8314428e13413d953b87a024ab6eedb0e988e620c19

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
dwlld16Df9e5KETqcUXx9X8tirgIhUOf
Content-Encoding
gzip
ETag
"fb5bf8932022bf0d652c73d5f80ec463"
x-amz-request-id
0EE31F7DA6DE09D1
x-amz-server-side-encryption
AES256
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
1529
x-amz-id-2
wMXmXR/RtXcOTAFCcJJJkAVioNrZoh8MHtXR309xvrd1psZajZlgcvpj0H8az6MsaO4xBH1z2zo=
Last-Modified
Thu, 10 Oct 2019 21:00:05 GMT
Server
AmazonS3
Date
Wed, 16 Oct 2019 17:46:22 GMT
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Content-Type
text/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=3600, must-revalidate
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*

Redirect headers

Date
Wed, 16 Oct 2019 17:46:22 GMT
X-Segment-Display-Name
P3P
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
Connection
keep-alive
Content-Length
0
Pragma
no-cache
X-Conversion-Value
0.0
Server
nginx/1.14.1
X-Rule
*
X-Segment-Eid
T47Y2VPPABDUBJXFROMZZM
Location
https://s.adroll.com/pixel/7YJ7XZCLMRHSVCXIHB5HIT/YV5KYXXEJZATZCT37YRTMK/T47Y2VPPABDUBJXFROMZZM.js
Cache-Control
no-store, no-cache, must-revalidate
X-Pixel-Eid
YV5KYXXEJZATZCT37YRTMK
X-Segment-Name
*
X-Advertisable-Eid
7YJ7XZCLMRHSVCXIHB5HIT
X-Conversion-Currency
sendrolling.js
s.adroll.com/j/
9 KB
3 KB
Script
General
Full URL
https://s.adroll.com/j/sendrolling.js
Requested by
Host: s.adroll.com
URL: https://s.adroll.com/pixel/7YJ7XZCLMRHSVCXIHB5HIT/YV5KYXXEJZATZCT37YRTMK/T47Y2VPPABDUBJXFROMZZM.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
1bdbcee5cd776cb671f72362db4be8dde833057b8e8f816c86fd301896652c8d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
MoLWhO2.QuEN6uxWTtfGTs9VNo6GBT4q
Content-Encoding
gzip
ETag
"15441b08d0c4f93b1dd5f533cd361cd8"
x-amz-request-id
8D66B12AEC1FE16F
x-amz-server-side-encryption
AES256
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
2039
x-amz-id-2
U03k8W+834KnzjHY1HWwJBpUJGIUw1OrdeDx2NV4ro8fdV068lw0rs7u1JTVs0/hT895iGPnM+w=
Last-Modified
Thu, 10 Oct 2019 01:46:34 GMT
Server
AmazonS3
Date
Wed, 16 Oct 2019 17:46:22 GMT
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=3600
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
389545881899618
connect.facebook.net/signals/config/
281 KB
65 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/389545881899618?v=2.9.6&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
691654756bff4ed3f98e4e4b77366ad626ca372a21e8b88be6113a8c556d2dc1
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-fb-trip-id
136226023
pragma
public
x-fb-debug
XFHauGLOc9r31N1r0SwnExezAa6jgk+dtEDPK3AMRLfFmFyK0ZySrUyedaTm8MADy1jd9pp/BCVktvG+73eTxg==
content-encoding
gzip
x-content-type-options
nosniff
x-frame-options
DENY
date
Wed, 16 Oct 2019 17:46:22 GMT
strict-transport-security
max-age=31536000; preload; includeSubDomains
content-type
application/x-javascript; charset=utf-8
status
200
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
vary
Accept-Encoding
x-xss-protection
0
expires
Sat, 01 Jan 2000 00:00:00 GMT
sync
ups.analytics.yahoo.com/ups/55980/
Redirect Chain
  • https://d.adroll.com/cm/aol/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT
  • https://pixel.advertising.com/ups/55980/sync?uid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&_origin=1&gdpr=1&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA
  • https://pixel.advertising.com/ups/55980/sync?uid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&_origin=1&gdpr=1&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA&verify=true
  • https://ups.analytics.yahoo.com/ups/55980/sync?uid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&_origin=1&gdpr=1&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA&apid=UPde4924a2-f03c-11e9-96e8-06...
  • https://ups.analytics.yahoo.com/ups/55980/sync?uid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&_origin=1&gdpr=1&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA&apid=UPde4924a2-f03c-11e9-96e8-06...
0
472 B
Image
General
Full URL
https://ups.analytics.yahoo.com/ups/55980/sync?uid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&_origin=1&gdpr=1&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA&apid=UPde4924a2-f03c-11e9-96e8-0699de109772&verify=true
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.122.14.108 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-3-122-14-108.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
204
date
Wed, 16 Oct 2019 17:46:23 GMT
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

status
302
date
Wed, 16 Oct 2019 17:46:23 GMT
content-length
0
location
https://ups.analytics.yahoo.com/ups/55980/sync?uid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&_origin=1&gdpr=1&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA&apid=UPde4924a2-f03c-11e9-96e8-0699de109772&verify=true
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
rum
dsum-sec.casalemedia.com/
Redirect Chain
  • https://d.adroll.com/cm/index/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT
  • https://dsum-sec.casalemedia.com/rum?cm_dsp_id=105&external_user_id=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&expiration=1602783982
  • https://dsum-sec.casalemedia.com/rum?cm_dsp_id=105&external_user_id=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&expiration=1602783982&C=1
43 B
898 B
Image
General
Full URL
https://dsum-sec.casalemedia.com/rum?cm_dsp_id=105&external_user_id=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&expiration=1602783982&C=1
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 16 Oct 2019 17:46:23 GMT
Server
Apache
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Wed, 16 Oct 2019 17:46:23 GMT

Redirect headers

Pragma
no-cache
Date
Wed, 16 Oct 2019 17:46:22 GMT
Server
Apache
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Location
https://dsum-sec.casalemedia.com/rum?cm_dsp_id=105&external_user_id=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&expiration=1602783982&C=1
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Content-Type
text/html; charset=iso-8859-1
Content-Length
333
Expires
Wed, 16 Oct 2019 17:46:22 GMT
tap.php
pixel.rubiconproject.com/
Redirect Chain
  • https://d.adroll.com/cm/n/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT
  • https://pixel.rubiconproject.com/tap.php?v=194538&nid=3644&put=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&expires=365
0
239 B
Image
General
Full URL
https://pixel.rubiconproject.com/tap.php?v=194538&nid=3644&put=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&expires=365
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
69.173.144.136 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Expires
0
Cache-Control
no-cache,no-store,must-revalidate
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
X-RPHost
66ef90d06496cfd000aab8206f2b6221
Content-Type
image/gif

Redirect headers

Pragma
no-cache
Date
Wed, 16 Oct 2019 17:46:22 GMT
Server
nginx/1.14.1
P3P
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
Location
https://pixel.rubiconproject.com/tap.php?v=194538&nid=3644&put=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&expires=365
Cache-Control
no-store, no-cache, must-revalidate
Connection
keep-alive
Content-Length
124
cookie-sync
sync.outbrain.com/
Redirect Chain
  • https://d.adroll.com/cm/outbrain/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT
  • https://sync.outbrain.com/cookie-sync?p=adroll&uid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU
  • https://sync.outbrain.com/cookie-sync?p=adroll&uid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&rdrctExp=true
0
359 B
Image
General
Full URL
https://sync.outbrain.com/cookie-sync?p=adroll&uid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&rdrctExp=true
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:23 GMT
via
1.1 varnish, 1.1 varnish
traffic-path
CHIDC2, MDW, FRA, Europe2
x-timer
S1571247983.147347,VS0,VE110
accept-ranges
bytes, bytes
x-served-by
cache-mdw17346-MDW, cache-fra19131-FRA
x-cache
MISS, MISS
status
200
backend-ip
157.52.75.46
x-traceid
a4c4de3d9efd76ab1038269bc1ee6e5e
content-length
0
x-cache-hits
0, 0

Redirect headers

date
Wed, 16 Oct 2019 17:46:23 GMT
via
1.1 varnish, 1.1 varnish
traffic-path
CHIDC2, MDW, FRA, Europe2
x-timer
S1571247983.017006,VS0,VE107
accept-ranges
bytes, bytes
x-served-by
cache-mdw17370-MDW, cache-fra19131-FRA
status
302
x-cache
MISS, MISS
location
https://sync.outbrain.com/cookie-sync?p=adroll&uid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&rdrctExp=true
backend-ip
157.52.75.70
x-traceid
8f4eb86647dbe92ee4be76a69bca3315
content-length
0
x-cache-hits
0, 0
Pug
simage2.pubmatic.com/AdServer/
Redirect Chain
  • https://d.adroll.com/cm/pubmatic/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT
  • https://simage2.pubmatic.com/AdServer/Pug?vcode=bz0yJnR5cGU9MSZqcz0xJmNvZGU9MzMwNiZ0bD01MjU2MDA&piggybackCookie=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&gdpr=1&gdpr_consent=BOOoKswOOoKswA2ABBENA...
1 B
862 B
Image
General
Full URL
https://simage2.pubmatic.com/AdServer/Pug?vcode=bz0yJnR5cGU9MSZqcz0xJmNvZGU9MzMwNiZ0bD01MjU2MDA&piggybackCookie=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&gdpr=1&gdpr_consent=BOOoKswOOoKswA2ABBENAkwAAAAXyACACYAIIA
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.110 , United Kingdom, ASN62713 (AS-PUBMATIC - PubMatic, Inc., US),
Reverse DNS
Software
Apache/2.2.24 (Unix) mod_ssl/2.2.24 OpenSSL/1.0.1e-fips mod_fastcgi/2.4.6 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

X-Cnection
close
Pragma
no-cache
Date
Wed, 16 Oct 2019 17:46:22 GMT
X-lat
Pug22020:0:377
Server
Apache/2.2.24 (Unix) mod_ssl/2.2.24 OpenSSL/1.0.1e-fips mod_fastcgi/2.4.6
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Cache-Control
no-store, no-cache, private
Content-Type
text/html; charset=utf-8
Content-Length
1

Redirect headers

Pragma
no-cache
Date
Wed, 16 Oct 2019 17:46:22 GMT
Server
nginx/1.14.1
P3P
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
Location
https://simage2.pubmatic.com/AdServer/Pug?vcode=bz0yJnR5cGU9MSZqcz0xJmNvZGU9MzMwNiZ0bD01MjU2MDA&piggybackCookie=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&gdpr=1&gdpr_consent=BOOoKswOOoKswA2ABBENAkwAAAAXyACACYAIIA
Cache-Control
no-store, no-cache, must-revalidate
Connection
keep-alive
Content-Length
220
in
d.adroll.com/cm/r/
Redirect Chain
  • https://d.adroll.com/cm/r/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT
  • https://ads.yahoo.com/cms/v1?esig=1~bf4e7dc4546a90c08591652d78a230d3f2ef5733&nwid=10001032567&sigv=1&gdpr=1&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA
  • https://d.adroll.com/cm/r/in?xid=E0&gdpr=1&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA
42 B
488 B
Image
General
Full URL
https://d.adroll.com/cm/r/in?xid=E0&gdpr=1&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.228.197.115 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-228-197-115.eu-west-1.compute.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 16 Oct 2019 17:46:23 GMT
Server
nginx/1.14.1
P3P
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
Cache-Control
no-store, no-cache, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
42

Redirect headers

Date
Wed, 16 Oct 2019 17:46:23 GMT
X-Content-Type-Options
nosniff
Server
ATS
Age
0
Expect-CT
max-age=31536000, report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only"
Strict-Transport-Security
max-age=31536000
P3P
policyref="https://policies.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Location
https://d.adroll.com/cm/r/in?xid=E0&gdpr=1&gdpr_consent=BOOla_OOOla_OA2ABBENAkwAAAAXyACAAyAIIA
Connection
keep-alive
Content-Length
0
X-XSS-Protection
1; mode=block
/
trc.taboola.com/sg/adroll-network/1/rtb-h/
Redirect Chain
  • https://d.adroll.com/cm/taboola/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT
  • https://trc.taboola.com/sg/adroll-network/1/rtb-h/?taboola_hm=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU
0
262 B
Image
General
Full URL
https://trc.taboola.com/sg/adroll-network/1/rtb-h/?taboola_hm=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:23 GMT
via
1.1 varnish
server
nginx
x-timer
S1571247983.050996,VS0,VE9
x-cache
MISS
status
204
x-cache-hits
0
accept-ranges
bytes
x-served-by
cache-fra19131-FRA

Redirect headers

Pragma
no-cache
Date
Wed, 16 Oct 2019 17:46:23 GMT
Server
nginx/1.14.1
P3P
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
Location
https://trc.taboola.com/sg/adroll-network/1/rtb-h/?taboola_hm=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU
Cache-Control
no-store, no-cache, must-revalidate
Connection
keep-alive
Content-Length
111
xuid
eb2.3lift.com/
Redirect Chain
  • https://d.adroll.com/cm/triplelift/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT
  • https://eb2.3lift.com/xuid?mid=4714&xuid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&dongle=c85e
  • https://eb2.3lift.com/xuid?ld=1&mid=4714&xuid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&dongle=c85e&gdpr=1&cmp_cs=
37 B
335 B
Image
General
Full URL
https://eb2.3lift.com/xuid?ld=1&mid=4714&xuid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&dongle=c85e&gdpr=1&cmp_cs=
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.123.114.61 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-3-123-114-61.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
bb229a48bee31f5d54ca12dc9bd960c63a671f0d4be86a054c1d324a44499d96

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 16 Oct 2019 17:46:23 GMT
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
content-length
37
p3p
policyref="http://cdn.3lift.com/w3c/p3p.xml", CP="NON DSP COR NID OUR DEL SAM OTR UNR COM NAV INT DEM CNT STA PRE LOC OTC"

Redirect headers

status
302
date
Wed, 16 Oct 2019 17:46:23 GMT
cache-control
no-cache, no-store, must-revalidate
content-length
0
location
/xuid?ld=1&mid=4714&xuid=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU&dongle=c85e&gdpr=1&cmp_cs=
p3p
policyref="http://cdn.3lift.com/w3c/p3p.xml", CP="NON DSP COR NID OUR DEL SAM OTR UNR COM NAV INT DEM CNT STA PRE LOC OTC"
sync
x.bidswitch.net/ul_cb/
Redirect Chain
  • https://d.adroll.com/cm/b/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT
  • https://x.bidswitch.net/sync?dsp_id=44&user_id=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU
  • https://x.bidswitch.net/ul_cb/sync?dsp_id=44&user_id=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU
43 B
380 B
Image
General
Full URL
https://x.bidswitch.net/ul_cb/sync?dsp_id=44&user_id=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.121.253.254 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-3-121-253-254.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 16 Oct 2019 17:46:23 GMT
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
content-length
43
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"

Redirect headers

status
302
date
Wed, 16 Oct 2019 17:46:23 GMT
cache-control
no-cache, no-store, must-revalidate
content-length
0
location
https://x.bidswitch.net/ul_cb/sync?dsp_id=44&user_id=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
setuid
ib.adnxs.com/
Redirect Chain
  • https://d.adroll.com/cm/x/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT
  • https://ib.adnxs.com/setuid?entity=172&code=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU
0
590 B
Image
General
Full URL
https://ib.adnxs.com/setuid?entity=172&code=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
37.252.173.27 , Ascension Island, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
539.bm-nginx-loadbalancer.mgmt.fra1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 16 Oct 2019 17:46:25 GMT
X-Proxy-Origin
109.236.94.25; 109.236.94.25; 539.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.172.197:80
AN-X-Request-Uuid
1fc5894b-019d-4e31-b8aa-409d4e33dfcc
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Cache-Control
no-store, no-cache, private
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT

Redirect headers

Pragma
no-cache
Date
Wed, 16 Oct 2019 17:46:23 GMT
Server
nginx/1.14.1
P3P
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
Location
https://ib.adnxs.com/setuid?entity=172&code=NmUxODQyZWRkZGJlNDg2NjM4ODEwZWI0NmIxYjAxMmU
Cache-Control
no-store, no-cache, must-revalidate
Connection
keep-alive
Content-Length
93
377928.gif
idsync.rlcdn.com/
Redirect Chain
  • https://d.adroll.com/cm/l/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT
  • https://idsync.rlcdn.com/377928.gif?partner_uid=6e1842edddbe486638810eb46b1b012e
0
62 B
Image
General
Full URL
https://idsync.rlcdn.com/377928.gif?partner_uid=6e1842edddbe486638810eb46b1b012e
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.72.21 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
21.72.190.35.bc.googleusercontent.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
204
date
Wed, 16 Oct 2019 17:46:23 GMT
via
1.1 google
alt-svc
clear

Redirect headers

Pragma
no-cache
Date
Wed, 16 Oct 2019 17:46:23 GMT
Server
nginx/1.14.1
P3P
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
Location
https://idsync.rlcdn.com/377928.gif?partner_uid=6e1842edddbe486638810eb46b1b012e
Cache-Control
no-store, no-cache, must-revalidate
Connection
keep-alive
Content-Length
86
sd
us-u.openx.net/w/1.0/
Redirect Chain
  • https://d.adroll.com/cm/o/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT
  • https://us-u.openx.net/w/1.0/sd?id=537103138&val=6e1842edddbe486638810eb46b1b012e
  • https://us-u.openx.net/w/1.0/sd?cc=1&id=537103138&val=6e1842edddbe486638810eb46b1b012e
43 B
183 B
Image
General
Full URL
https://us-u.openx.net/w/1.0/sd?cc=1&id=537103138&val=6e1842edddbe486638810eb46b1b012e
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.163.0 /
Resource Hash
4e0705327480ad2323cb03d9c450ffcae4a98bf3a5382fa0c7882145ed620e49

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 16 Oct 2019 17:46:23 GMT
via
1.1 google
server
OXGW/16.163.0
vary
Accept
p3p
CP="CUR ADM OUR NOR STA NID"
status
200
cache-control
private, max-age=0, no-cache
content-type
image/gif
alt-svc
clear
content-length
43
expires
Mon, 26 Jul 1997 05:00:00 GMT

Redirect headers

date
Wed, 16 Oct 2019 17:46:23 GMT
via
1.1 google
server
OXGW/16.163.0
status
302
p3p
CP="CUR ADM OUR NOR STA NID"
location
https://us-u.openx.net/w/1.0/sd?cc=1&id=537103138&val=6e1842edddbe486638810eb46b1b012e
alt-svc
clear
content-length
0
in
d.adroll.com/cm/g/
Redirect Chain
  • https://d.adroll.com/cm/g/out?adroll_fpc=0dac1fb64c1a750e359b25e4fd7748d6-1571247982785&xid_ch=f&advertisable=7YJ7XZCLMRHSVCXIHB5HIT&google_nid=adroll5
  • https://cm.g.doubleclick.net/pixel?google_sc&google_nid=artb&google_hm=bhhC7d2-SGY4gQ60axsBLg
  • https://d.adroll.com/cm/g/in
42 B
523 B
Image
General
Full URL
https://d.adroll.com/cm/g/in
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.228.197.115 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-228-197-115.eu-west-1.compute.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 16 Oct 2019 17:46:23 GMT
Server
nginx/1.14.1
P3P
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
Cache-Control
no-store, no-cache, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
X-Result
g.-1.-1.-1

Redirect headers

pragma
no-cache
date
Wed, 16 Oct 2019 17:46:23 GMT
server
HTTP server (unknown)
status
302
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
location
https://d.adroll.com/cm/g/in
cache-control
no-cache, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
225
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
www.facebook.com/tr/
0
80 B
Other
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
multipart/form-data; boundary=----WebKitFormBoundaryXMG1zkzHAAWmnEdA

Response headers

strict-transport-security
max-age=31536000; includeSubDomains
server
proxygen-bolt
date
Wed, 16 Oct 2019 17:46:23 GMT
status
200
content-type
text/plain
access-control-allow-origin
https://www.proofpoint.com
access-control-allow-credentials
true
content-length
0
/
www.facebook.com/tr/
44 B
122 B
Image
General
Full URL
https://www.facebook.com/tr/?id=389545881899618&ev=PageView&dl=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware&rl=&if=false&ts=1571247982998&cd[segment_eid]=T47Y2VPPABDUBJXFROMZZM&sw=1600&sh=1200&v=2.9.6&r=stable&ec=0&o=29&fbp=fb.1.1571247982422.945046289&it=1571247982252&coo=false&rqm=GET
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:23 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Wed, 16 Oct 2019 17:46:23 GMT
be01724b-4f3a-4cef-b3d1-741772beea3a
https://www.proofpoint.com/
194 KB
0
Script
General
Full URL
blob:https://www.proofpoint.com/be01724b-4f3a-4cef-b3d1-741772beea3a
Requested by
Host: visitor.reactful.com
URL: https://visitor.reactful.com/dist/main.rtfl.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ec5a7ce7c578dfce0c51ef78643b02f266ac711353259b9c9c3434442a62c549

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
198625
Content-Type
text/html
/
tracking.reactful.com/tracking/879986/
6 B
120 B
XHR
General
Full URL
https://tracking.reactful.com/tracking/879986/
Requested by
Host: visitor.reactful.com
URL: https://visitor.reactful.com/dist/main.rtfl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2013 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Frontend /
Resource Hash
cf8646fc48648f5a6d806df8f757007e6398a55ddccc3d8c2046a4c014cf1b56

Request headers

Accept
*/*
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Wed, 16 Oct 2019 17:46:23 GMT
content-encoding
gzip
server
Google Frontend
status
200
vary
Accept-Encoding
content-type
text/html; charset=utf-8
access-control-allow-origin
*
x-cloud-trace-context
49fe3652628ad80b007dfc8317df3c92
cache-control
no-cache
content-length
26
nr-1130.min.js
js-agent.newrelic.com/
24 KB
9 KB
Script
General
Full URL
https://js-agent.newrelic.com/nr-1130.min.js
Requested by
Host: www.proofpoint.com
URL: https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.110 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
0e78b8cde09dbe0fc473f87bc77ec30ccc56780398d8676cf93c4aaec432257f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:23 GMT
content-encoding
gzip
x-amz-request-id
8174A4BD27442C39
x-cache
HIT
status
200
content-length
9407
x-amz-id-2
okRb4AqloAZZ3+qaWnpqMQYC7hkPpbr/Yrluzst01SO9f1ckk5T9tspUtBHMBazVI7CvXAVZCdo=
x-served-by
cache-fra19168-FRA
last-modified
Tue, 09 Jul 2019 23:52:06 GMT
server
AmazonS3
x-timer
S1571247984.680261,VS0,VE0
etag
"73f8857196b9ef7fd3b302cbc557b8ac"
vary
Accept-Encoding
content-type
application/javascript
via
1.1 varnish
cache-control
public, max-age=7200, stale-if-error=604800
accept-ranges
bytes
x-cache-hits
20922
adsct
analytics.twitter.com/i/
31 B
634 B
Script
General
Full URL
https://analytics.twitter.com/i/adsct?p_id=Twitter&p_user_id=0&txn_id=nyk4d&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0&tpx_cb=twttr.conversion.loadPixels&tw_document_href=https%3A%2F%2Fwww.proofpoint.com%2Fus%2Fthreat-insight%2Fpost%2Fleaked-ammyy-admin-source-code-turned-malware
Requested by
Host: static.ads-twitter.com
URL: https://static.ads-twitter.com/uwt.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.131 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
df3e003cc30e9bdd0313100e8ee5d468070b4b34d11ad355f276a356d4b9c7bf
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:46:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
57
x-xss-protection
0
x-response-time
122
pragma
no-cache
last-modified
Wed, 16 Oct 2019 17:46:23 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
content-type
application/javascript;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
ed9c8a7ecd33adde34b91729225ccadc
x-transaction
004a223b00de51df
expires
Tue, 31 Mar 1981 05:00:00 GMT
css
fonts.googleapis.com/
24 KB
1 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Open+Sans:400,300,300italic,400italic,600,600italic,700,700italic,800,800italic
Requested by
Host: visitor.reactful.com
URL: https://visitor.reactful.com/dist/main.rtfl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
0a733c9a259685cf9a9816145434c0087227f35400e16208e7e63e58ccd44538
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Wed, 16 Oct 2019 17:46:23 GMT
server
ESF
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
status
200
date
Wed, 16 Oct 2019 17:46:23 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
x-xss-protection
0
expires
Wed, 16 Oct 2019 17:46:23 GMT
1569550148_4238_proofpoint_ads_reactful_350x225_b.jpg
storage.googleapis.com/reactful-main-prod.appspot.com/879986/card/
564 KB
565 KB
Image
General
Full URL
https://storage.googleapis.com/reactful-main-prod.appspot.com/879986/card/1569550148_4238_proofpoint_ads_reactful_350x225_b.jpg
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2010 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
UploadServer /
Resource Hash
fce32ffef9053b174f14996327fe0f71274a264e7c1f14efb62ece8d5a28acca

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:18:18 GMT
age
1685
x-guploader-uploadid
AEnB2UpaCmyWNOH_qvIBgmhTFegnmd8oZv8BJFG6Ykf8IF67wOQGS1w4lWq0Nl3pJzbDjmJeel91fq_wGij0aPC-i8k11sLdgw
x-goog-storage-class
STANDARD
status
200
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
577529
last-modified
Fri, 27 Sep 2019 02:09:08 GMT
server
UploadServer
etag
"90199ed3bcfd759c9a984974c6e3b37f"
x-goog-hash
crc32c=xvIhDg==, md5=kBme07z9dZyamEl0xuOzfw==
x-goog-generation
1569550148258690
cache-control
public, max-age=3600
x-goog-stored-content-length
577529
accept-ranges
bytes
content-type
image/jpeg
expires
Wed, 16 Oct 2019 18:18:18 GMT
1569302460_4238_proofpoint_ads_reactful_350x225_c.jpg
storage.googleapis.com/reactful-main-prod.appspot.com/879986/card/
762 KB
763 KB
Image
General
Full URL
https://storage.googleapis.com/reactful-main-prod.appspot.com/879986/card/1569302460_4238_proofpoint_ads_reactful_350x225_c.jpg
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2010 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
UploadServer /
Resource Hash
d257a826307144ccdb6dc26f750e2e8fab4587f59b1f5273efc4e59d196f384d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 16 Oct 2019 17:18:18 GMT
age
1685
x-guploader-uploadid
AEnB2UpZfrZT2kSBK545zS6wxYWiBWy2IhAJvXZ10lngGXll9wzsqmn3xvPnPTUFY_Q9k-LcKgCi_Vkl2E-t4-8krmp5lltgUw
x-goog-storage-class
STANDARD
status
200
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
780526
last-modified
Tue, 24 Sep 2019 05:21:00 GMT
server
UploadServer
etag
"f853e7506a66c4a22df59717ce3bcc0c"
x-goog-hash
crc32c=kbC5Uw==, md5=+FPnUGpmxKIt9ZcXzjvMDA==
x-goog-generation
1569302460901454
cache-control
public, max-age=3600
x-goog-stored-content-length
780526
accept-ranges
bytes
content-type
image/jpeg
expires
Wed, 16 Oct 2019 18:18:18 GMT
0ae22ad83e
bam.nr-data.net/1/
57 B
260 B
Script
General
Full URL
https://bam.nr-data.net/1/0ae22ad83e?a=51794255&v=1130.54e767a&to=bgQBYERQXBBWVBFbDldOIldCWF0NGEcEVQRmDAJaV1ZXEWhZClYEZhcKUUFuQgJQUg%3D%3D&rst=3999&ref=https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware&ap=269&be=961&fe=3972&dc=2606&perf=%7B%22timing%22:%7B%22of%22:1571247979695,%22n%22:0,%22f%22:0,%22dn%22:1,%22dne%22:110,%22c%22:110,%22s%22:115,%22ce%22:123,%22rq%22:123,%22rp%22:951,%22rpe%22:956,%22dl%22:954,%22di%22:2606,%22ds%22:2606,%22de%22:2631,%22dc%22:3972,%22l%22:3972,%22le%22:3987%7D,%22navigation%22:%7B%7D%7D&fp=2497&fcp=2497&at=QkMCFgxKTx4%3D&jsonp=NREUM.setToken
Requested by
Host: js-agent.newrelic.com
URL: https://js-agent.newrelic.com/nr-1130.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
162.247.242.19 San Francisco, United States, ASN23467 (NEWRELIC-AS-1 - New Relic, US),
Reverse DNS
bam-7.nr-data.net
Software
/
Resource Hash
f69a13217482dc43f25e74cfcb9391d0f06d22501f10f5cb5e413d2d98a5cd23

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Expires
Thu, 01 Jan 1970 00:00:00 GMT
Content-Length
57
Content-Type
text/javascript;charset=ISO-8859-1
mem5YaGs126MiZpBA-UN_r8OUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UN_r8OUuhpKKSTjw.woff2
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
5e261f7e11c39ff6f4c8fe884e5c9de2fa15f29085a1adefdd36603ef2e23c00
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://fonts.googleapis.com/css?family=Open+Sans:400,300,300italic,400italic,600,600italic,700,700italic,800,800italic
Origin
https://www.proofpoint.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 11 Oct 2019 19:39:28 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:37 GMT
server
sffe
age
425215
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
9016
x-xss-protection
0
expires
Sat, 10 Oct 2020 19:39:28 GMT
mem8YaGs126MiZpBA-UFVZ0bf8pkAg.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem8YaGs126MiZpBA-UFVZ0bf8pkAg.woff2
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
54c64f3c66372027154f01fc9f24b4e25fdfe405b70d1994c79abbc2576ff775
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://fonts.googleapis.com/css?family=Open+Sans:400,300,300italic,400italic,600,600italic,700,700italic,800,800italic
Origin
https://www.proofpoint.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 08 Oct 2019 17:59:15 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:49 GMT
server
sffe
age
690428
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
9132
x-xss-protection
0
expires
Wed, 07 Oct 2020 17:59:15 GMT
/
tracking.reactful.com/tracking/879986/
6 B
115 B
XHR
General
Full URL
https://tracking.reactful.com/tracking/879986/
Requested by
Host: visitor.reactful.com
URL: https://visitor.reactful.com/dist/main.rtfl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2013 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Frontend /
Resource Hash
cf8646fc48648f5a6d806df8f757007e6398a55ddccc3d8c2046a4c014cf1b56

Request headers

Accept
*/*
Referer
https://www.proofpoint.com/us/threat-insight/post/leaked-ammyy-admin-source-code-turned-malware
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Wed, 16 Oct 2019 17:46:24 GMT
content-encoding
gzip
server
Google Frontend
status
200
vary
Accept-Encoding
content-type
text/html; charset=utf-8
access-control-allow-origin
*
x-cloud-trace-context
9318e9589df0e1a6b47bda0f47ad5246
cache-control
no-cache
content-length
26

Verdicts & Comments Add Verdict or Comment

178 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| NREUM object| newrelic function| __nr_require object| Modernizr object| Drupal undefined| $ function| jQuery object| jQuery18305473913068418512 object| hljs string| GoogleAnalyticsObject function| ga object| geoip2 object| enquire object| dataLayer object| google_conversion_id object| google_custom_params object| google_remarketing_only function| GooglemKTybQhCsO object| google_conversion_date object| google_conversion_time number| google_conversion_snippets number| google_conversion_first_time object| google_conversion_js_version object| google_conversion_format object| google_enable_display_cookie_match object| google_conversion_type object| google_conversion_order_id object| google_conversion_language object| google_conversion_value object| google_conversion_evaluemrc object| google_conversion_currency object| google_conversion_domain object| google_conversion_label object| google_conversion_color object| google_disable_viewthrough object| google_gtag_event_data object| google_conversion_linker object| google_tag_for_child_directed_treatment object| google_tag_for_under_age_of_consent object| google_allow_ad_personalization_signals object| google_conversion_items object| google_conversion_merchant_id object| google_user_id object| onload_callback object| opt_image_generator object| google_conversion_page_url object| google_conversion_referrer_url object| google_gtm object| google_gcl_cookie_prefix object| google_read_gcl_cookie_opt_out object| google_basket_feed_country object| google_basket_feed_language object| google_basket_discount object| google_basket_transaction_type object| google_disable_merchant_reported_conversions object| google_additional_conversion_params object| google_tag_data object| gaplugins object| gaGlobal object| gaData object| google_tag_manager function| postscribe object| uetq string| _bizo_data_partner_id undefined| _bizo_data_partner_title undefined| _bizo_data_partner_domain undefined| _bizo_data_partner_company undefined| _bizo_data_partner_location undefined| _bizo_data_partner_employee_range undefined| _bizo_data_partner_sics undefined| _bizo_data_partner_email function| twq function| hj object| _hjSettings object| _qevents object| vimeoGAJS function| fbq function| _fbq object| _vwo_code number| settings_timer number| _vwo_settings_timer object| _rctfl object| google_optimize function| lintrk boolean| _already_called_lintrk function| google_trackConversion object| GooglebQhCsO function| UET function| __extends object| Demandbase object| __db function| DBSegment function| picturefill function| mktoMunchkinFunction object| Munchkin function| mktoMunchkin object| tag object| players undefined| player object| firstScriptTag function| onYouTubeIframeAPIReady string| tablet object| $body object| $pageWrapper string| headerMenuFlag object| $headerMenuBtn object| $mainMenu string| $expandedMenuFlag object| $expandedMenuBtn object| $megaMenu object| annoucementHeight number| superNavHeight number| heightHeader function| addPaddingHeader function| resetHeader function| showHidenMenu function| dropDownEpMenu function| showHideAddThis object| addthis_config object| addthis_share string| adroll_adv_id string| adroll_pix_id boolean| __adroll_loaded string| axel number| a object| twttr object| hjSiteSettings function| hjBootstrap object| hjBootstrapCalled undefined| b object| vwo_iehack_queue function| quantserve function| __qc object| ezt object| _qoptions undefined| _ object| MunchkinTracker object| YT object| YTConfig function| onYTReady string| adroll_sid object| __adroll boolean| adroll_optout object| adroll_ext_network object| adroll_callbacks undefined| adroll_tpc_callback function| atwpjp string| _atd function| _euc function| _duc object| _atc string| _atr object| addthis function| emdot object| _ate object| _adr object| addthis_conf function| addthis_open function| addthis_close function| addthis_sendto object| yt function| ytDomDomGetNextId object| ytEventsEventsListeners object| ytEventsEventsCounter object| adroll_exp_list boolean| __adroll_consent boolean| __adroll_consent_is_gdpr string| __adroll_consent_user_country string| __adroll_consent_adv_country number| adroll_xavier_called number| __adroll_xid_ch object| adroll_currency object| adroll_conversion_value object| adroll_conversion_value_in_dollars object| _rctfl_track function| _rctfl_original_ga_fn

18 Cookies

Domain/Path Name / Value
www.proofpoint.com/ Name: __atuvs
Value: 5da7576eab4fd9d1000
www.proofpoint.com/ Name: __atuvc
Value: 1%7C42
.doubleclick.net/ Name: IDE
Value: AHWqTUn5GLUetAorE_RbBvkD9jruNFMkSl43FJU3S4RnYMXK6DcxuCjji5thSxIm
.proofpoint.com/ Name: _rtfl_s_879986_specific_site_session
Value: X01UcG1TTElXTTVET2cwekNVcUFOeFlfMGI5OTg0NjIwNmM5NjUyMzJjODg2N2I0NTVhMDkxYzYxMWRkZWYxNw==
.www.proofpoint.com/ Name: __ar_v4
Value: %7C7YJ7XZCLMRHSVCXIHB5HIT%3A20191015%3A1%7CYV5KYXXEJZATZCT37YRTMK%3A20191015%3A1%7CT47Y2VPPABDUBJXFROMZZM%3A20191015%3A1
.proofpoint.com/ Name: visid_incap_177663
Value: r7W1jtvKQCuIlXytqtx5r25Xp10AAAAAQUIPAAAAAACJV1k62FzTmnio2seQYxUz
.www.proofpoint.com/ Name: __adroll_fpc
Value: 0dac1fb64c1a750e359b25e4fd7748d6-s2-1571247982785
www.proofpoint.com/ Name: _rtfl_s_specific_site_sessions_count
Value: 1
.proofpoint.com/ Name: _rtfl_s_unique_visitor_session
Value: X3dhOGZCcU1LM0RkSVNua2VZU3dqWmhfNTM0MDU0YTljY2Q0MDNlYzI5NDc0Njg4ZmQ2MmNiZWU4YjJhOTRiZg==
.proofpoint.com/ Name: __qca
Value: P0-527428179-1571247982586
.proofpoint.com/ Name: _hjid
Value: df96589b-a381-4387-b4a6-7d512c398f5f
.proofpoint.com/ Name: _fbp
Value: fb.1.1571247982422.945046289
.proofpoint.com/ Name: _gat
Value: 1
.proofpoint.com/ Name: _mkto_trk
Value: id:309-RHV-619&token:_mch-proofpoint.com-1571247982461-17716
.proofpoint.com/ Name: incap_ses_245_177663
Value: X7+ZDz+6IW85iWjiJWtmA25Xp10AAAAAGGb3eOp7x6otLRfcv2UzGw==
.www.proofpoint.com/ Name: _rtfl_s_handshake_guid
Value: 74c68bba-fb98-4f19-a5a5-0a7aca33e26e
.proofpoint.com/ Name: _vwo_uuid_v2
Value: DB398A2A988C260DF695BEFD2518D2309|e1c24f94c1c496a2a896fcd195fb61e0
www.proofpoint.com/us/threat-insight/post Name: pp_user_country
Value: de

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

309-rhv-619.mktoresp.com
4788165.fls.doubleclick.net
ad.doubleclick.net
ads.avocet.io
ads.yahoo.com
adservice.google.com
analytics.twitter.com
api.company-target.com
attr.ml-api.io
bam.nr-data.net
bat.bing.com
cloud.typography.com
cm.g.doubleclick.net
connect.facebook.net
d.adroll.com
dev.visualwebsiteoptimizer.com
dsum-sec.casalemedia.com
eb2.3lift.com
fonts.googleapis.com
fonts.gstatic.com
geoip-js.maxmind.com
googleads.g.doubleclick.net
gwmtracking.com
ib.adnxs.com
idsync.rlcdn.com
js-agent.newrelic.com
js.maxmind.com
match.prod.bidr.io
munchkin.marketo.net
pixel.advertising.com
pixel.quantserve.com
pixel.rubiconproject.com
px.ads.linkedin.com
rules.quantcount.com
s.adroll.com
s.ml-attr.com
s.ytimg.com
s7.addthis.com
script.hotjar.com
scripts.demandbase.com
secure.adnxs.com
secure.quantserve.com
segments.company-target.com
simage2.pubmatic.com
sjs.bizographics.com
static.ads-twitter.com
static.hotjar.com
stats.g.doubleclick.net
storage.googleapis.com
sync.outbrain.com
t.co
tracking.g2crowd.com
tracking.reactful.com
trc.taboola.com
ups.analytics.yahoo.com
us-u.openx.net
vars.hotjar.com
visitor.reactful.com
www.facebook.com
www.google-analytics.com
www.google.com
www.google.de
www.googleadservices.com
www.googletagmanager.com
www.linkedin.com
www.proofpoint.com
www.youtube.com
x.bidswitch.net
104.244.42.131
104.244.42.133
13.224.196.10
143.204.101.110
143.204.101.119
143.204.101.122
147.75.85.119
147.75.85.99
151.101.12.157
151.101.14.110
151.101.14.2
159.122.87.153
162.247.242.19
172.217.16.198
184.31.84.223
185.64.189.110
192.28.144.124
2.18.233.40
2.18.234.21
216.200.122.11
216.58.205.226
216.58.205.230
23.210.248.44
23.38.51.49
2600:9000:200c:a000:6:44e3:f8c0:93a1
2606:4700::6810:252f
2606:4700::6810:262f
2606:4700::6812:1abe
2620:1ec:c11::200
2a00:1288:110:c305::9000
2a00:1450:4001:800::2004
2a00:1450:4001:808::200e
2a00:1450:4001:817::2002
2a00:1450:4001:81a::2008
2a00:1450:4001:81a::2013
2a00:1450:4001:81c::2002
2a00:1450:4001:81c::2003
2a00:1450:4001:81d::2003
2a00:1450:4001:81e::200e
2a00:1450:4001:820::2010
2a00:1450:4001:821::200a
2a00:1450:4001:825::200e
2a00:1450:400c:c00::9c
2a02:26f0:6c00:293::3adf
2a02:e980:d::87
2a03:2880:f02d:12:face:b00c:0:3
2a03:2880:f12d:83:face:b00c:0:25de
2a05:f500:10:101::b93f:9101
2a05:f500:10:101::b93f:9105
3.121.253.254
3.122.14.108
3.123.114.61
34.95.120.147
35.156.24.221
35.190.72.21
37.252.173.22
37.252.173.27
52.208.204.25
52.30.193.62
54.228.197.115
68.67.153.60
69.173.144.136
91.228.74.249
91.228.74.252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