URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Submission: On April 30 via manual from US — Scanned from DE

Summary

This website contacted 32 IPs in 4 countries across 26 domains to perform 70 HTTP transactions. The main IP is 108.138.17.118, located in United States and belongs to AMAZON-02, US. The main domain is forums.malwarebytes.com.
TLS certificate: Issued by Amazon on August 21st 2021. Valid for: a year.
This is the only time forums.malwarebytes.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 108.138.17.118 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
21 2600:9000:225... 16509 (AMAZON-02)
1 107.180.50.166 26496 (AS-26496-...)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
3 2a03:2880:f02... 32934 (FACEBOOK)
5 2a00:1450:400... 15169 (GOOGLE)
1 108.138.17.47 16509 (AMAZON-02)
1 2606:4700::68... 13335 (CLOUDFLAR...)
2 2a04:4e42:4b::84 54113 (FASTLY)
1 4 2620:1ec:c11:... 8068 (MICROSOFT...)
1 2600:9000:223... 16509 (AMAZON-02)
2 2a03:2880:f11... 32934 (FACEBOOK)
2 2 54.171.228.20 16509 (AMAZON-02)
1 2 52.222.214.56 16509 (AMAZON-02)
1 35.244.174.68 15169 (GOOGLE)
1 18.66.97.57 16509 (AMAZON-02)
2 151.101.192.84 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
4 52.224.31.34 8075 (MICROSOFT...)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2 52.142.114.2 8075 (MICROSOFT...)
4 2606:4700::68... 13335 (CLOUDFLAR...)
1 199.232.136.157 54113 (FASTLY)
1 52.223.40.198 16509 (AMAZON-02)
1 104.244.42.67 13414 (TWITTER)
1 104.244.42.197 13414 (TWITTER)
1 52.222.236.90 16509 (AMAZON-02)
1 18.66.122.72 16509 (AMAZON-02)
1 54.77.91.70 16509 (AMAZON-02)
70 32
Apex Domain
Subdomains
Transfer
21 invisioncic.com
content.invisioncic.com — Cisco Umbrella Rank: 72207
430 KB
7 crazyegg.com
script.crazyegg.com — Cisco Umbrella Rank: 1716
pagestates-tracking.crazyegg.com — Cisco Umbrella Rank: 3152
assets-tracking.crazyegg.com — Cisco Umbrella Rank: 3050
tracking.crazyegg.com — Cisco Umbrella Rank: 2989
31 KB
6 clarity.ms
h.clarity.ms — Cisco Umbrella Rank: 1796
c.clarity.ms — Cisco Umbrella Rank: 626
24 KB
5 google-analytics.com
www.google-analytics.com — Cisco Umbrella Rank: 33
21 KB
4 bing.com
bat.bing.com — Cisco Umbrella Rank: 337
c.bing.com — Cisco Umbrella Rank: 205
13 KB
3 company-target.com
segments.company-target.com — Cisco Umbrella Rank: 1172
api.company-target.com — Cisco Umbrella Rank: 2944
2 KB
3 facebook.net
connect.facebook.net — Cisco Umbrella Rank: 133
135 KB
3 malwarebytes.com
forums.malwarebytes.com
www.malwarebytes.com — Cisco Umbrella Rank: 31285
100 KB
2 pinterest.com
ct.pinterest.com — Cisco Umbrella Rank: 835
830 B
2 bidr.io
match.prod.bidr.io — Cisco Umbrella Rank: 437
1019 B
2 facebook.com
www.facebook.com — Cisco Umbrella Rank: 103
315 B
2 pinimg.com
s.pinimg.com — Cisco Umbrella Rank: 735
19 KB
1 t.co
t.co — Cisco Umbrella Rank: 485
337 B
1 twitter.com
analytics.twitter.com — Cisco Umbrella Rank: 490
354 B
1 adsrvr.org
insight.adsrvr.org — Cisco Umbrella Rank: 529
261 B
1 ads-twitter.com
static.ads-twitter.com — Cisco Umbrella Rank: 573
10 KB
1 google.de
www.google.de — Cisco Umbrella Rank: 6250
501 B
1 google.com
www.google.com — Cisco Umbrella Rank: 5
501 B
1 doubleclick.net
stats.g.doubleclick.net — Cisco Umbrella Rank: 77
447 B
1 rlcdn.com
id.rlcdn.com — Cisco Umbrella Rank: 536
98 B
1 unpkg.com
unpkg.com — Cisco Umbrella Rank: 838
2 KB
1 demandbase.com
scripts.demandbase.com — Cisco Umbrella Rank: 5848
19 KB
1 gstatic.com
fonts.gstatic.com
37 KB
1 googletagmanager.com
www.googletagmanager.com — Cisco Umbrella Rank: 55
94 KB
1 tech61.com
tech61.com
1 googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 39
1 KB
70 26
Domain Requested by
21 content.invisioncic.com forums.malwarebytes.com
content.invisioncic.com
5 www.google-analytics.com www.googletagmanager.com
www.google-analytics.com
forums.malwarebytes.com
4 script.crazyegg.com www.googletagmanager.com
script.crazyegg.com
4 h.clarity.ms bat.bing.com
h.clarity.ms
3 bat.bing.com www.googletagmanager.com
bat.bing.com
forums.malwarebytes.com
3 connect.facebook.net www.googletagmanager.com
connect.facebook.net
2 c.clarity.ms 1 redirects
2 ct.pinterest.com s.pinimg.com
forums.malwarebytes.com
2 segments.company-target.com 1 redirects forums.malwarebytes.com
2 match.prod.bidr.io 2 redirects
2 www.facebook.com forums.malwarebytes.com
2 s.pinimg.com www.googletagmanager.com
s.pinimg.com
2 forums.malwarebytes.com forums.malwarebytes.com
1 tracking.crazyegg.com script.crazyegg.com
1 assets-tracking.crazyegg.com script.crazyegg.com
1 pagestates-tracking.crazyegg.com script.crazyegg.com
1 t.co
1 analytics.twitter.com
1 insight.adsrvr.org
1 static.ads-twitter.com forums.malwarebytes.com
1 c.bing.com 1 redirects
1 www.google.de forums.malwarebytes.com
1 www.google.com forums.malwarebytes.com
1 stats.g.doubleclick.net www.google-analytics.com
1 api.company-target.com scripts.demandbase.com
1 id.rlcdn.com forums.malwarebytes.com
1 www.malwarebytes.com www.googletagmanager.com
1 unpkg.com www.googletagmanager.com
1 scripts.demandbase.com forums.malwarebytes.com
1 fonts.gstatic.com fonts.googleapis.com
1 www.googletagmanager.com forums.malwarebytes.com
1 tech61.com forums.malwarebytes.com
1 fonts.googleapis.com forums.malwarebytes.com
70 33
Subject Issuer Validity Valid
forums.malwarebytes.com
Amazon
2021-08-21 -
2022-09-19
a year crt.sh
upload.video.google.com
GTS CA 1C3
2022-04-11 -
2022-07-04
3 months crt.sh
content.invisioncic.com
Amazon
2021-08-20 -
2022-09-18
a year crt.sh
tech61.com
tech61.com
2020-04-15 -
2021-04-15
a year crt.sh
*.google-analytics.com
GTS CA 1C3
2022-04-11 -
2022-07-04
3 months crt.sh
*.gstatic.com
GTS CA 1C3
2022-04-11 -
2022-07-04
3 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2022-02-06 -
2022-05-07
3 months crt.sh
tag.demandbase.com
Go Daddy Secure Certificate Authority - G2
2021-10-18 -
2022-10-14
a year crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2021-07-02 -
2022-07-01
a year crt.sh
*.pinterest.com
DigiCert TLS RSA SHA256 2020 CA1
2021-07-27 -
2022-08-05
a year crt.sh
www.bing.com
Microsoft RSA TLS CA 01
2022-03-16 -
2022-09-16
6 months crt.sh
www.malwarebytes.com
Amazon
2022-04-26 -
2023-05-25
a year crt.sh
*.rlcdn.com
Sectigo RSA Domain Validation Secure Server CA
2022-02-03 -
2023-02-25
a year crt.sh
api.demandbase.com
Go Daddy Secure Certificate Authority - G2
2021-10-20 -
2022-09-26
a year crt.sh
*.g.doubleclick.net
GTS CA 1C3
2022-04-11 -
2022-07-04
3 months crt.sh
a.clarity.ms
Microsoft RSA TLS CA 01
2021-07-27 -
2022-07-27
a year crt.sh
www.google.com
GTS CA 1C3
2022-04-11 -
2022-07-04
3 months crt.sh
www.google.de
GTS CA 1C3
2022-04-11 -
2022-07-04
3 months crt.sh
ads-twitter.com
DigiCert TLS RSA SHA256 2020 CA1
2021-07-21 -
2022-07-26
a year crt.sh
*.adsrvr.org
GlobalSign GCC R3 DV TLS CA 2020
2022-03-31 -
2023-05-02
a year crt.sh
*.twitter.com
DigiCert TLS Hybrid ECC SHA384 2020 CA1
2022-03-07 -
2023-03-06
a year crt.sh
t.co
DigiCert TLS Hybrid ECC SHA384 2020 CA1
2022-03-07 -
2023-03-06
a year crt.sh
*.crazyegg.com
DigiCert SHA2 Secure Server CA
2020-07-26 -
2022-07-23
2 years crt.sh

This page contains 2 frames:

Primary Page: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Frame ID: 39BEC0CFE9219A1D300337BAC75AA8B3
Requests: 71 HTTP requests in this frame

Frame: https://www.facebook.com/tr/
Frame ID: 9040B9B96EC83B1C640AB8E7D09FE054
Requests: 1 HTTP requests in this frame

Screenshot

Page Title

Getting "Exploit attempt to bypass ASLR blocked" and "Exploit memory HeapSpray attempt" - Malwarebytes Anti-Exploit for Business - Malwarebytes Forums

Detected technologies

Overall confidence: 100%
Detected patterns
  • /wp-(?:content|includes)/

Overall confidence: 100%
Detected patterns
  • <[^>]+data-controller

Overall confidence: 100%
Detected patterns
  • script\.crazyegg\.com/pages/scripts/\d+/\d+\.js

Overall confidence: 100%
Detected patterns
  • //connect\.facebook\.([a-z]+)/[^/]*/[a-z]*\.js

Overall confidence: 100%
Detected patterns
  • <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
  • (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)

Overall confidence: 100%
Detected patterns
  • google-analytics\.com/(?:ga|urchin|analytics)\.js

Overall confidence: 100%
Detected patterns
  • <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com

Overall confidence: 100%
Detected patterns
  • googletagmanager\.com/ns\.html[^>]+></iframe>
  • <!-- (?:End )?Google Tag Manager -->
  • googletagmanager\.com/gtm\.js

Page Statistics

70
Requests

94 %
HTTPS

47 %
IPv6

26
Domains

33
Subdomains

32
IPs

4
Countries

941 kB
Transfer

2975 kB
Size

33
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 39
  • https://match.prod.bidr.io/cookie-sync/demandbase HTTP 303
  • https://match.prod.bidr.io/cookie-sync/demandbase?_bee_ppp=1 HTTP 303
  • https://segments.company-target.com/log?vendor=choca&user_id=AADlmE7E2pUAADzRRDLOYQ HTTP 303
  • https://segments.company-target.com/validateCookie?vendor=choca&user_id=AADlmE7E2pUAADzRRDLOYQ&verifyHash=9afeb05c3ed35130fce9b352ed1650f094c7649d
Request Chain 54
  • https://c.clarity.ms/c.gif HTTP 302
  • https://c.bing.com/c.gif?CtsSyncId=378081208459450E98ED0763C6AA654F&RedC=c.clarity.ms&MXFR=368AA4B25DAD657D06FCB52459AD6B1C HTTP 302
  • https://c.clarity.ms/c.gif?CtsSyncId=378081208459450E98ED0763C6AA654F&MUID=10BC6C5EF9C36EEA3CA57DC8F8116F80

70 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
144 KB
22 KB
Document
General
Full URL
https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
108.138.17.118 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-108-138-17-118.fra56.r.cloudfront.net
Software
Apache /
Resource Hash
07ab6efe388a48ccade72df819b978e8f6e3717245bb00c4e4993d6f893f2d61
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self'
Strict-Transport-Security max-age=31536000
X-Content-Security-Policy frame-ancestors 'self'
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

cache-control
no-cache="Set-Cookie", max-age=900, public, s-maxage=900, stale-while-revalidate, stale-if-error
content-encoding
gzip
content-length
21747
content-security-policy
frame-ancestors 'self'
content-type
text/html;charset=UTF-8
date
Sat, 30 Apr 2022 14:41:03 GMT
expires
Sat, 30 Apr 2022 14:56:02 GMT
last-modified
Sat, 30 Apr 2022 14:41:02 GMT
referrer-policy
strict-origin-when-cross-origin
server
Apache
strict-transport-security
max-age=31536000
vary
Cookie,Accept-Encoding
via
1.1 fde85e7daa13f95cf6b8f5fa09c62ef6.cloudfront.net (CloudFront)
x-amz-cf-id
sX8INyqab5ECTurUQHjLlqLF9J4nkZR0UjTTyr6h1xL6X3Hj3hi5PQ==
x-amz-cf-pop
FRA56-P7
x-cache
Miss from cloudfront
x-content-security-policy
frame-ancestors 'self'
x-content-type-options
nosniff
x-frame-options
sameorigin
x-ips-loggedin
0
x-xss-protection
0
fontawesome-webfont.woff2
forums.malwarebytes.com/applications/core/interface/font/
75 KB
76 KB
Font
General
Full URL
https://forums.malwarebytes.com/applications/core/interface/font/fontawesome-webfont.woff2?v=4.7.0
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
108.138.17.118 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-108-138-17-118.fra56.r.cloudfront.net
Software
Apache /
Resource Hash
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Origin
https://forums.malwarebytes.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Sat, 30 Apr 2022 02:02:00 GMT
via
1.1 fde85e7daa13f95cf6b8f5fa09c62ef6.cloudfront.net (CloudFront)
x-content-type-options
nosniff
last-modified
Tue, 12 Apr 2022 10:07:36 GMT
server
Apache
age
45543
etag
"12d68-5dc723ae4aa00"
x-cache
Hit from cloudfront
x-amz-cf-pop
FRA56-P7
accept-ranges
bytes
content-length
77160
x-amz-cf-id
fllRxislGrgCGL0B7TyptTUOg7Nwf9h0GqvQ5BQAYGaPa3LST2p-vw==
css
fonts.googleapis.com/
8 KB
1 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Inter:300,300i,400,400i,500,700,700i
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
e77b0b0105ef41fd666c7cc11965857031bdee400e9172c41ffe48b270580ae2
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Sat, 30 Apr 2022 14:02:04 GMT
server
ESF
cross-origin-opener-policy
same-origin-allow-popups
date
Sat, 30 Apr 2022 14:41:03 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sat, 30 Apr 2022 14:41:03 GMT
341e4a57816af3ba440d891ca87450ff_framework.css.gz
content.invisioncic.com/Mmalware/css_built_28/
311 KB
57 KB
Stylesheet
General
Full URL
https://content.invisioncic.com/Mmalware/css_built_28/341e4a57816af3ba440d891ca87450ff_framework.css.gz?v=d815db93211649849688
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:225e:6e00:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
76e642163bb3a95f32d0848cd9e9c0e8fa902ecd5689d737b5c08787a5c72af9

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Wed, 13 Apr 2022 11:35:49 GMT
content-encoding
gzip
last-modified
Wed, 13 Apr 2022 11:34:50 GMT
server
AmazonS3
age
1479915
etag
"37f0ea2742a0cfac5b4a4eb52e672d9c"
x-cache
Hit from cloudfront
x-amz-version-id
null
via
1.1 013a54c6b9caf01f403c247789c7256c.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
FRA60-P4
accept-ranges
bytes
content-type
text/css
content-length
57810
x-amz-cf-id
BEZutBwuF382lbdU9eaAx-Fa531iCi8D8IwPyQmXs36ZB8ks4Lrhgg==
05e81b71abe4f22d6eb8d1a929494829_responsive.css.gz
content.invisioncic.com/Mmalware/css_built_28/
36 KB
7 KB
Stylesheet
General
Full URL
https://content.invisioncic.com/Mmalware/css_built_28/05e81b71abe4f22d6eb8d1a929494829_responsive.css.gz?v=d815db93211649849688
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:225e:6e00:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
19cca2997ca363463d58dee4ce2cbf34888e6a38806964d2682dc0e25113a8f9

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Wed, 13 Apr 2022 11:35:49 GMT
content-encoding
gzip
last-modified
Wed, 13 Apr 2022 11:34:51 GMT
server
AmazonS3
age
1479915
etag
"931af40a5cc480c7161f62e7a941ae0b"
x-cache
Hit from cloudfront
x-amz-version-id
null
via
1.1 013a54c6b9caf01f403c247789c7256c.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
FRA60-P4
accept-ranges
bytes
content-type
text/css
content-length
6768
x-amz-cf-id
unOwEsByOwLXercG_-nrg8-8xELSUi-p8lQcyMC2zsuuzSxZXJ8yQg==
90eb5adf50a8c640f633d47fd7eb1778_core.css.gz
content.invisioncic.com/Mmalware/css_built_28/
18 KB
5 KB
Stylesheet
General
Full URL
https://content.invisioncic.com/Mmalware/css_built_28/90eb5adf50a8c640f633d47fd7eb1778_core.css.gz?v=d815db93211649849688
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:225e:6e00:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
5ffe700367a30c00174ae22872b0baf26b346b6afcb9f18aba329c141ea4ecf3

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Wed, 13 Apr 2022 11:35:49 GMT
content-encoding
gzip
last-modified
Wed, 13 Apr 2022 11:34:53 GMT
server
AmazonS3
age
1479915
etag
"fa9e3ae8bab0b1a84db2e663074c1a99"
x-cache
Hit from cloudfront
x-amz-version-id
null
via
1.1 013a54c6b9caf01f403c247789c7256c.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
FRA60-P4
accept-ranges
bytes
content-type
text/css
content-length
4508
x-amz-cf-id
WgZQvR_T0BC2nkwMlz8p4ummufgyZOESSeZLbM3xhQg-xSlsOhYQLw==
5a0da001ccc2200dc5625c3f3934497d_core_responsive.css.gz
content.invisioncic.com/Mmalware/css_built_28/
5 KB
2 KB
Stylesheet
General
Full URL
https://content.invisioncic.com/Mmalware/css_built_28/5a0da001ccc2200dc5625c3f3934497d_core_responsive.css.gz?v=d815db93211649849688
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:225e:6e00:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
4e0f39543ae4c15cfe3222f68e358c416dc79cb262c16c8d5b46281a5d850f40

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Wed, 13 Apr 2022 11:35:49 GMT
content-encoding
gzip
last-modified
Wed, 13 Apr 2022 11:34:51 GMT
server
AmazonS3
age
1479915
etag
"5c3c523b949cbb61acd0828c69748124"
x-cache
Hit from cloudfront
x-amz-version-id
null
via
1.1 013a54c6b9caf01f403c247789c7256c.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
FRA60-P4
accept-ranges
bytes
content-type
text/css
content-length
1204
x-amz-cf-id
5x3d6qUSkL3fSUPPztwFGS64VMrPKJx3hK0EABRa879vNE6Ad_1fcg==
62e269ced0fdab7e30e026f1d30ae516_forums.css.gz
content.invisioncic.com/Mmalware/css_built_28/
17 KB
4 KB
Stylesheet
General
Full URL
https://content.invisioncic.com/Mmalware/css_built_28/62e269ced0fdab7e30e026f1d30ae516_forums.css.gz?v=d815db93211649849688
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:225e:6e00:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
b89bf2837649ddee4db1c378ce5fce75f999da1308457aeb1e595ae33a0912c7

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Wed, 13 Apr 2022 11:35:49 GMT
content-encoding
gzip
last-modified
Wed, 13 Apr 2022 11:34:54 GMT
server
AmazonS3
age
1479915
etag
"0c50588884562053349c5946e31e51a7"
x-cache
Hit from cloudfront
x-amz-version-id
null
via
1.1 013a54c6b9caf01f403c247789c7256c.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
FRA60-P4
accept-ranges
bytes
content-type
text/css
content-length
3794
x-amz-cf-id
22GYMOw_YxygQGGVj-j9pMkIxhUUWF3amh8IMeXBdFb50dv5qlTe8A==
76e62c573090645fb99a15a363d8620e_forums_responsive.css.gz
content.invisioncic.com/Mmalware/css_built_28/
7 KB
2 KB
Stylesheet
General
Full URL
https://content.invisioncic.com/Mmalware/css_built_28/76e62c573090645fb99a15a363d8620e_forums_responsive.css.gz?v=d815db93211649849688
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:225e:6e00:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
07fbbfd8f908b547a39cbb53d85c204d4668ac45979862d8ca49892085669dea

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Wed, 13 Apr 2022 11:35:49 GMT
content-encoding
gzip
last-modified
Wed, 13 Apr 2022 11:34:54 GMT
server
AmazonS3
age
1479915
etag
"fd6252f9621681a87b55e87c32a1c96d"
x-cache
Hit from cloudfront
x-amz-version-id
null
via
1.1 013a54c6b9caf01f403c247789c7256c.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
FRA60-P4
accept-ranges
bytes
content-type
text/css
content-length
1435
x-amz-cf-id
1yoT-CnOcVQQqQJ-rBCRTZZcdjAI96mFfJJ6RPWQgyNaQDqDAQCeDA==
ebdea0c6a7dab6d37900b9190d3ac77b_topics.css.gz
content.invisioncic.com/Mmalware/css_built_28/
3 KB
1 KB
Stylesheet
General
Full URL
https://content.invisioncic.com/Mmalware/css_built_28/ebdea0c6a7dab6d37900b9190d3ac77b_topics.css.gz?v=d815db93211649849688
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:225e:6e00:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
9bde20f23db841b077e3392fb8fbaac4c6fe1392bfd7b8f0947e3ee32f41f6d0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Wed, 13 Apr 2022 11:35:49 GMT
content-encoding
gzip
last-modified
Wed, 13 Apr 2022 11:35:03 GMT
server
AmazonS3
age
1479915
etag
"179f44143d9f001cfe0953cddb82c253"
x-cache
Hit from cloudfront
x-amz-version-id
null
via
1.1 013a54c6b9caf01f403c247789c7256c.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
FRA60-P4
accept-ranges
bytes
content-type
text/css
content-length
927
x-amz-cf-id
2r-HD3EVyC-T3dGeJ2XB6MOP7dv5KOVx1HGmifMu4ZuA8CuoAWU1pQ==
258adbb6e4f3e83cd3b355f84e3fa002_custom.css.gz
content.invisioncic.com/Mmalware/css_built_28/
921 B
835 B
Stylesheet
General
Full URL
https://content.invisioncic.com/Mmalware/css_built_28/258adbb6e4f3e83cd3b355f84e3fa002_custom.css.gz?v=d815db93211649849688
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:225e:6e00:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
0e36308a13aa06d085ad95ecf45f9dfa5352f683f6fb03c27fc35887bcf6f678

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Wed, 13 Apr 2022 11:35:49 GMT
content-encoding
gzip
last-modified
Wed, 13 Apr 2022 11:34:55 GMT
server
AmazonS3
age
1479915
etag
"888870628c8044a41eb685cab13f6d18"
x-cache
Hit from cloudfront
x-amz-version-id
null
via
1.1 013a54c6b9caf01f403c247789c7256c.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
FRA60-P4
accept-ranges
bytes
content-type
text/css
content-length
453
x-amz-cf-id
AkYUb3f9HbwzartxpRgBxPXGWE3cKtleyBdO_anVu9FmcweFQMAt9w==
MWB4_FreeDownload_728x90_v1.jpg.b80b620cce83ef5649ae4740e701210c.jpg
content.invisioncic.com/Mmalware/monthly_2020_08/
16 KB
16 KB
Image
General
Full URL
https://content.invisioncic.com/Mmalware/monthly_2020_08/MWB4_FreeDownload_728x90_v1.jpg.b80b620cce83ef5649ae4740e701210c.jpg
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:225e:6e00:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
73c6d9bea582fd9ea44e6f647006f9ef8b4af0c15199ff20bd524186913eb9e2

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Sat, 05 Feb 2022 05:48:20 GMT
via
1.1 013a54c6b9caf01f403c247789c7256c.cloudfront.net (CloudFront)
last-modified
Tue, 25 Aug 2020 00:38:45 GMT
server
AmazonS3
age
7289564
etag
"f0356d9351192b59bc7db4b160684b81"
x-cache
Hit from cloudfront
x-amz-version-id
gZw59MumHC3jdRWKPrDF1l.WFGbejRR2
cache-control
public, max-age=31536000
x-amz-cf-pop
FRA60-P4
accept-ranges
bytes
content-type
image/jpeg
content-length
16292
x-amz-cf-id
kFRoMN59vrC-vkkUauI9zdwqVYrWuhYWTixArQ2NIr9NyMF2Dy-y6Q==
MB_Error.png
tech61.com/wp-content/uploads/2016/01/
0
0
Image
General
Full URL
https://tech61.com/wp-content/uploads/2016/01/MB_Error.png
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
107.180.50.166 Ashburn, United States, ASN26496 (AS-26496-GO-DADDY-COM-LLC, US),
Reverse DNS
ip-107-180-50-166.ip.secureserver.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

1260260717_MWBStaffLogoShort.png.f3c2333c547d547e6017599aa8a67ca1.png
content.invisioncic.com/Mmalware/monthly_2020_11/
3 KB
3 KB
Image
General
Full URL
https://content.invisioncic.com/Mmalware/monthly_2020_11/1260260717_MWBStaffLogoShort.png.f3c2333c547d547e6017599aa8a67ca1.png
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:225e:6e00:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
24c13cdea638620ec96bc3b7ba1bdef0cbe3ad0847b2ddc6f041df1fa24cffa4

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Thu, 14 Oct 2021 14:56:58 GMT
via
1.1 013a54c6b9caf01f403c247789c7256c.cloudfront.net (CloudFront)
last-modified
Fri, 06 Nov 2020 22:32:31 GMT
server
AmazonS3
age
17106245
etag
"840107c60632e151d3d4ed52457243db"
x-cache
Hit from cloudfront
x-amz-version-id
kkF87fI5uAZJzW7sjjAxYuKYhJxSe.Q.
cache-control
public, max-age=31536000
x-amz-cf-pop
FRA60-P4
accept-ranges
bytes
content-type
image/png
content-length
2919
x-amz-cf-id
9eQs0SnFFRTEN4Kq5khcba7znV5zpKBua3NhlOA_uwNrOtk6ODjt0A==
MWB4_FreeDownload_728x90_v1.jpg.5b008278530bf816655dbb1ec796173c.jpg
content.invisioncic.com/Mmalware/monthly_2020_08/
16 KB
16 KB
Image
General
Full URL
https://content.invisioncic.com/Mmalware/monthly_2020_08/MWB4_FreeDownload_728x90_v1.jpg.5b008278530bf816655dbb1ec796173c.jpg
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:225e:6e00:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
73c6d9bea582fd9ea44e6f647006f9ef8b4af0c15199ff20bd524186913eb9e2

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Thu, 03 Feb 2022 12:46:21 GMT
via
1.1 013a54c6b9caf01f403c247789c7256c.cloudfront.net (CloudFront)
last-modified
Tue, 25 Aug 2020 00:41:21 GMT
server
AmazonS3
age
7437283
etag
"f0356d9351192b59bc7db4b160684b81"
x-cache
Hit from cloudfront
x-amz-version-id
MNnZHAJMYhDJUF.vMbK1qXLuHRyyzGm1
cache-control
public, max-age=31536000
x-amz-cf-pop
FRA60-P4
accept-ranges
bytes
content-type
image/jpeg
content-length
16292
x-amz-cf-id
sB42jyh4hYbpr7FvNhJZa5VmYxzkQWmGUjHD_1sA0zAO6qedvp6OtQ==
root_library.js.gz
content.invisioncic.com/Mmalware/javascript_global/
389 KB
128 KB
Script
General
Full URL
https://content.invisioncic.com/Mmalware/javascript_global/root_library.js.gz?v=d815db93211651242719
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:225e:6e00:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
b630edba1b6569cd1a4f2d899d9a6a7bc75951a6ff3261c69c493cd1332a4cf4

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Fri, 29 Apr 2022 14:32:20 GMT
content-encoding
gzip
last-modified
Wed, 27 Apr 2022 11:34:52 GMT
server
AmazonS3
age
86924
etag
"e51bd7f0ae2090c6f05376624e4c8ae0"
x-cache
Hit from cloudfront
x-amz-version-id
null
via
1.1 013a54c6b9caf01f403c247789c7256c.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
FRA60-P4
accept-ranges
bytes
content-type
text/javascript
content-length
130156
x-amz-cf-id
dwRMdYinHouTXEjEOqPaetgaCiRhnQN0FuDfoBs3IyOrPqaRxvbpbQ==
root_js_lang_1.js.gz
content.invisioncic.com/Mmalware/javascript_global/
99 KB
31 KB
Script
General
Full URL
https://content.invisioncic.com/Mmalware/javascript_global/root_js_lang_1.js.gz?v=d815db93211651242719
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:225e:6e00:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
d97b23d6d87a3947de8a9046de5e1bc4faa365ec3f480f8eb210329138c5837c

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Fri, 29 Apr 2022 14:32:20 GMT
content-encoding
gzip
last-modified
Wed, 27 Apr 2022 11:34:51 GMT
server
AmazonS3
age
86924
etag
"ba3434027bbf333751cf89ef5b08df44"
x-cache
Hit from cloudfront
x-amz-version-id
null
via
1.1 013a54c6b9caf01f403c247789c7256c.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
FRA60-P4
accept-ranges
bytes
content-type
text/javascript
content-length
31370
x-amz-cf-id
oXs24hMihwvYxXCnpTyuoALiK7Iz2eh66mgtERv6kKy0BBmvIpwEwg==
root_framework.js.gz
content.invisioncic.com/Mmalware/javascript_global/
428 KB
98 KB
Script
General
Full URL
https://content.invisioncic.com/Mmalware/javascript_global/root_framework.js.gz?v=d815db93211651242719
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:225e:6e00:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
c93a67b40b26249332d0efcf83ecd6ddea24677becaf88f4fe55a613a3a71032

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Fri, 29 Apr 2022 14:32:20 GMT
content-encoding
gzip
last-modified
Wed, 27 Apr 2022 11:34:52 GMT
server
AmazonS3
age
86924
etag
"aea413ae1a50c551b697557ee772527b"
x-cache
Hit from cloudfront
x-amz-version-id
null
via
1.1 013a54c6b9caf01f403c247789c7256c.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
FRA60-P4
accept-ranges
bytes
content-type
text/javascript
content-length
99502
x-amz-cf-id
CRXwEJ8ycCZgs-N3B3cHfy48H_QEVBBMal3ruMS5bXKfdN-pRVOQQA==
global_global_core.js.gz
content.invisioncic.com/Mmalware/javascript_core/
36 KB
9 KB
Script
General
Full URL
https://content.invisioncic.com/Mmalware/javascript_core/global_global_core.js.gz?v=d815db93211651242719
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:225e:6e00:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
419317ee9d2b18382073c6d3cc12d38280da97892aebe7c2897ad5534a05604a

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Fri, 29 Apr 2022 14:32:20 GMT
content-encoding
gzip
last-modified
Wed, 27 Apr 2022 11:34:51 GMT
server
AmazonS3
age
86924
etag
"6af9f98bb78cb4ce8f0d77f6bfccc78b"
x-cache
Hit from cloudfront
x-amz-version-id
null
via
1.1 013a54c6b9caf01f403c247789c7256c.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
FRA60-P4
accept-ranges
bytes
content-type
text/javascript
content-length
8536
x-amz-cf-id
N2_fJGNga3CCrqcNmULJxUlvDYUVGH2UZtOFN4AbYAUfrlf1nqOnPQ==
root_front.js.gz
content.invisioncic.com/Mmalware/javascript_global/
101 KB
22 KB
Script
General
Full URL
https://content.invisioncic.com/Mmalware/javascript_global/root_front.js.gz?v=d815db93211651242719
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:225e:6e00:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
5f5dc03d56d8cc6ea7455d5b0d769701bc118667d82208359c8a49a71a3b38e8

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Fri, 29 Apr 2022 14:32:20 GMT
content-encoding
gzip
last-modified
Wed, 27 Apr 2022 11:34:52 GMT
server
AmazonS3
age
86924
etag
"04ce94ea6b965dbcce3ad5e28ee52ffc"
x-cache
Hit from cloudfront
x-amz-version-id
null
via
1.1 013a54c6b9caf01f403c247789c7256c.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
FRA60-P4
accept-ranges
bytes
content-type
text/javascript
content-length
22553
x-amz-cf-id
volxHafSfnWSaIDsuQxHoMpdI0o7XGjYgjuZY02CaNqL5AblhN040g==
front_front_core.js.gz
content.invisioncic.com/Mmalware/javascript_core/
29 KB
7 KB
Script
General
Full URL
https://content.invisioncic.com/Mmalware/javascript_core/front_front_core.js.gz?v=d815db93211651242719
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:225e:6e00:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
b35674228f9ead8fc11ad99377cdc307736257bc618caa275802e4abd08f36d4

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Fri, 29 Apr 2022 14:32:20 GMT
content-encoding
gzip
last-modified
Wed, 27 Apr 2022 11:34:53 GMT
server
AmazonS3
age
86924
etag
"fc77244a6bd1c13efe089e01393cdfb9"
x-cache
Hit from cloudfront
x-amz-version-id
null
via
1.1 013a54c6b9caf01f403c247789c7256c.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
FRA60-P4
accept-ranges
bytes
content-type
text/javascript
content-length
6920
x-amz-cf-id
O1wP-xO1N1yr2WXN75da-Zg-hzYLWPcSG0xhmMFR1tamE9DAEFIcUg==
front_front_topic.js.gz
content.invisioncic.com/Mmalware/javascript_forums/
4 KB
1 KB
Script
General
Full URL
https://content.invisioncic.com/Mmalware/javascript_forums/front_front_topic.js.gz?v=d815db93211651242719
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:225e:6e00:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1e353dd6f81b838bbc322417e995c5812bb61c1c891a31725da0acd0185efeaf

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Fri, 29 Apr 2022 14:32:20 GMT
content-encoding
gzip
last-modified
Wed, 27 Apr 2022 11:34:53 GMT
server
AmazonS3
age
86924
etag
"994ac7e21afa71d446009d37cb840ae7"
x-cache
Hit from cloudfront
x-amz-version-id
null
via
1.1 013a54c6b9caf01f403c247789c7256c.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
FRA60-P4
accept-ranges
bytes
content-type
text/javascript
content-length
1108
x-amz-cf-id
8ojhzRxKWHAT7D7GumCs7S6Yrie7HzJPcSvtzSSY2jpTt8I4yTA1-g==
root_map.js.gz
content.invisioncic.com/Mmalware/javascript_global/
2 KB
675 B
Script
General
Full URL
https://content.invisioncic.com/Mmalware/javascript_global/root_map.js.gz?v=d815db93211651242719
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:225e:6e00:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
75976f06467c549fa30ec39acf5ba32272a086d5b986ff4d4bd859dcb791d907

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Fri, 29 Apr 2022 14:32:20 GMT
content-encoding
gzip
last-modified
Fri, 29 Apr 2022 14:32:00 GMT
server
AmazonS3
age
86924
etag
"7604e367d5978e6b719b82b0ca4e6483"
x-cache
Hit from cloudfront
x-amz-version-id
null
via
1.1 013a54c6b9caf01f403c247789c7256c.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
FRA60-P4
accept-ranges
bytes
content-type
text/javascript
content-length
288
x-amz-cf-id
XpfhlxOXc2qR3s-ya2IG7mFxktEUqYOHsdFJWdN1ZSJI3uOBH57F8A==
gtm.js
www.googletagmanager.com/
301 KB
94 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:812::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
e56b6dce82361f24686a020ab9878f237aa58520022a3fdd6780548058f16465
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Sat, 30 Apr 2022 14:41:03 GMT
content-encoding
br
vary
Accept-Encoding
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
95575
x-xss-protection
0
last-modified
Sat, 30 Apr 2022 12:00:00 GMT
server
Google Tag Manager
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Sat, 30 Apr 2022 14:41:03 GMT
truncated
/
283 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f32a5cb4de06a33d9c92e75f5a74c82a588b7a2c7dfe0a87b2550cfcf9a95729

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
283 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5e087947c8cdb696a6c510cbed34b068e9894c2577a20c976eba168c685f4b9e

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

Content-Type
image/svg+xml
UcC73FwrK3iLTeHuS_fvQtMwCp50KnMa1ZL7.woff2
fonts.gstatic.com/s/inter/v11/
37 KB
37 KB
Font
General
Full URL
https://fonts.gstatic.com/s/inter/v11/UcC73FwrK3iLTeHuS_fvQtMwCp50KnMa1ZL7.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Inter:300,300i,400,400i,500,700,700i
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:828::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b97c99a69a6275c8f90703cd4c0864089a74fd08383a1cc75a8a4d0c2cb60cce
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://forums.malwarebytes.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 26 Apr 2022 17:07:46 GMT
x-content-type-options
nosniff
age
336797
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
37716
x-xss-protection
0
last-modified
Tue, 26 Apr 2022 15:29:50 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="apps-themes"
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 26 Apr 2023 17:07:46 GMT
photo-thumb-141843.jpg
content.invisioncic.com/Mmalware/profile/
15 KB
15 KB
Image
General
Full URL
https://content.invisioncic.com/Mmalware/profile/photo-thumb-141843.jpg
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:225e:6e00:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
b531e69987afedfb538c8e92370e3af9542b77ccbfbde901e361ba5e0b95c6e4

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Thu, 14 Oct 2021 15:30:08 GMT
via
1.1 013a54c6b9caf01f403c247789c7256c.cloudfront.net (CloudFront)
last-modified
Tue, 29 May 2018 19:52:27 GMT
server
AmazonS3
age
17104256
etag
"8619953d7e98a72ce5da647f664ea81f"
x-cache
Hit from cloudfront
x-amz-version-id
null
cache-control
public, max-age=31536000
x-amz-cf-pop
FRA60-P4
accept-ranges
bytes
content-type
image/jpeg
content-length
15180
x-amz-cf-id
G_Lk1_MSvvONH0P2ba7SwIl-ySc8j87L07LFIYVi4ThX-rNmYOXf_g==
fbevents.js
connect.facebook.net/en_US/
99 KB
27 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:100:face:b00c:0:3 Frankfurt am Main, Germany, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
086f1c868f8f769ef0039b238b415fc3c46d97e342309dc8c61cefb40868212e
Security Headers
Name Value
Content-Security-Policy default-src facebook.net *.facebook.net fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com data: blob: 'self';script-src *.fbcdn.net *.facebook.net 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' facebook.net *.facebook.net fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com;connect-src *.fbcdn.net *.facebook.net wss://*.fbcdn.net attachment.fbsbx.com blob: 'self';block-all-mixed-content;upgrade-insecure-requests;report-uri https://www.facebook.com/csp/reporting/?m=c&minimize=0;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

content-security-policy
default-src facebook.net *.facebook.net fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com data: blob: 'self';script-src *.fbcdn.net *.facebook.net 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' facebook.net *.facebook.net fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com;connect-src *.fbcdn.net *.facebook.net wss://*.fbcdn.net attachment.fbsbx.com blob: 'self';block-all-mixed-content;upgrade-insecure-requests;report-uri https://www.facebook.com/csp/reporting/?m=c&minimize=0;
content-encoding
gzip
x-content-type-options
nosniff
document-policy
force-load-at-top
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400,h3-29=":443"; ma=86400
content-length
26311
x-xss-protection
0
pragma
public
x-fb-debug
D6DocIqEDTUKxCNcQyFFh7eM+2/JHJehpCgJChRpZRlsWF68W/JeWVwIJF+uh2YZCbvSbmppiKBwwrOW6oWgKA==
x-fb-trip-id
917726464
x-frame-options
DENY
cross-origin-opener-policy
same-origin-allow-popups
cross-origin-embedder-policy-report-only
require-corp;report-to="coep_report"
date
Sat, 30 Apr 2022 14:41:03 GMT
strict-transport-security
max-age=31536000; preload; includeSubDomains
report-to
{"max_age":86400,"endpoints":[{"url":"https:\/\/www.facebook.com\/browser_reporting\/?minimize=0"}],"group":"coep_report"}
content-type
application/x-javascript; charset=utf-8
vary
Accept-Encoding
cache-control
public, max-age=1200
x-fb-rlafr
0
priority
u=3,i
expires
Sat, 01 Jan 2000 00:00:00 GMT
analytics.js
www.google-analytics.com/
49 KB
20 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80f::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
a1925038db769477ab74b4df34350c35688a795bb718727b0f4292a4a78a6210
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 13 Apr 2022 21:02:38 GMT
server
Golfe2
age
3973
date
Sat, 30 Apr 2022 13:34:50 GMT
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=7200
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
20006
expires
Sat, 30 Apr 2022 15:34:50 GMT
HWyTnY16.min.js
scripts.demandbase.com/
68 KB
19 KB
Script
General
Full URL
https://scripts.demandbase.com/HWyTnY16.min.js
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
108.138.17.47 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-108-138-17-47.fra56.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
f1db9263224e56deb92260d9f03afce188ab0c022e7218f21d99529c22266c9b
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

x-amz-version-id
D62rSyFf8vBo.Es1wVtjiT7P89VN_6LI
content-encoding
gzip
etag
W/"0d748baa982668654ed32cd3d79e3f57"
age
1398
x-cache
Hit from cloudfront
vary
Accept-Encoding
last-modified
Thu, 03 Mar 2022 18:36:39 GMT
server
AmazonS3
date
Sat, 30 Apr 2022 14:18:04 GMT
strict-transport-security
max-age=63072000; includeSubDomains; preload
content-type
application/javascript; charset=utf-8
via
1.1 8dc3ccc34d68ee81173fff2a80f72bde.cloudfront.net (CloudFront)
cache-control
public, max-age=3600
permissions-policy
accelerometer=(), camera=(), geolocation=(), gyroscope=(), magnetometer=(), microphone=(), payment=(), usb=(), interest-cohort=()
x-amz-cf-pop
FRA56-P7
x-amz-cf-id
Jc5InQGBVTkCJmOQJr-_pWK23I4TzvzHcrmDjcE8RZKK4l4gvGdH1w==
web-vitals.umd.js
unpkg.com/web-vitals@1.1.0/dist/
4 KB
2 KB
Script
General
Full URL
https://unpkg.com/web-vitals@1.1.0/dist/web-vitals.umd.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7caf , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
22f39a41a30342a5c51d150be48c4726245655a560d154af893337d1ae953f62
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Sat, 30 Apr 2022 14:41:03 GMT
via
1.1 fly.io
x-content-type-options
nosniff
cf-cache-status
HIT
age
3733851
fly-request-id
01FYE5SX54TJZTQVN4X3QYN0MA-fra
content-encoding
br
vary
Accept-Encoding
last-modified
Sat, 26 Oct 1985 08:15:00 GMT
server
cloudflare
etag
W/"1060-9qPq4bqeRCeFWudNuS98Bp0PQDY"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=31536000
cf-ray
7041093d09859b3a-FRA
core.js
s.pinimg.com/ct/
1 KB
1 KB
Script
General
Full URL
https://s.pinimg.com/ct/core.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4b::84 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
f17de407562ed5814892a1b44c6e349761f067cf6f2360ebe2aef4f03a5bea4e

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Sat, 30 Apr 2022 14:41:03 GMT
fastly-restarts
1
x-cdn
fastly
etag
"c4a0eea377c5e0da574e46f4d6e838e5"
vary
Accept-Encoding, Origin
access-control-allow-methods
GET
content-type
application/javascript
access-control-allow-origin
*
access-control-max-age
86400
cache-control
max-age=7200
content-length
1142
access-control-expose-headers
X-CDN
bat.js
bat.bing.com/
38 KB
12 KB
Script
General
Full URL
https://bat.bing.com/bat.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:c11::200 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
8540c5e2d2e85cc6c5d46b1b06b7f6642dce39e0314299a08976cfe6053c7c52
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-encoding
gzip
last-modified
Wed, 09 Feb 2022 23:54:49 GMT
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref
Ref A: 43AD46CD015A40B48A694554530319CD Ref B: FRAEDGE1315 Ref C: 2022-04-30T14:41:03Z
etag
"806a236c101ed81:0"
vary
Accept-Encoding
x-cache
CONFIG_NOCACHE
content-type
application/javascript
access-control-allow-origin
*
cache-control
private,max-age=1800
date
Sat, 30 Apr 2022 14:41:03 GMT
accept-ranges
bytes
content-length
11333
demandbase-forms.js
www.malwarebytes.com/js/
3 KB
1 KB
Script
General
Full URL
https://www.malwarebytes.com/js/demandbase-forms.js?d=2020-02-04-15-03-08--0800
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:223c:2000:16:26c7:ff80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
5576e25dd8a4d45e90da43e0f127c4efb4d16eebcb7a1bc55fbb66e7cf504f9d
Security Headers
Name Value
Strict-Transport-Security max-age=63072000

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

strict-transport-security
max-age=63072000
content-encoding
gzip
last-modified
Tue, 20 Jul 2021 23:12:41 GMT
server
Microsoft-IIS/10.0
age
499
x-powered-by
ASP.NET
etag
W/"178b70bdbc7dd71:0"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 1f0db25765b79d244ad1fa2184395c12.cloudfront.net (CloudFront)
cache-control
max-age=900
date
Sat, 30 Apr 2022 14:32:45 GMT
x-amz-cf-pop
FRA56-P2
x-amz-cf-id
BuXi055VvgoUrEznbUzTUvXA6o-ejQxJU91VJjg0jplFCmTEShCnnQ==
identity.js
connect.facebook.net/signals/plugins/
64 KB
20 KB
Script
General
Full URL
https://connect.facebook.net/signals/plugins/identity.js?v=2.9.57
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:100:face:b00c:0:3 Frankfurt am Main, Germany, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
5825a682d41932f76e0cb9afa5967e2b7f236a2f9439587bc6d937bc76edf005
Security Headers
Name Value
Content-Security-Policy default-src facebook.net *.facebook.net fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com data: blob: 'self';script-src *.fbcdn.net *.facebook.net 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' facebook.net *.facebook.net fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com;connect-src *.fbcdn.net *.facebook.net wss://*.fbcdn.net attachment.fbsbx.com blob: 'self';block-all-mixed-content;upgrade-insecure-requests;report-uri https://www.facebook.com/csp/reporting/?m=c&minimize=0;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

content-security-policy
default-src facebook.net *.facebook.net fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com data: blob: 'self';script-src *.fbcdn.net *.facebook.net 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' facebook.net *.facebook.net fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com;connect-src *.fbcdn.net *.facebook.net wss://*.fbcdn.net attachment.fbsbx.com blob: 'self';block-all-mixed-content;upgrade-insecure-requests;report-uri https://www.facebook.com/csp/reporting/?m=c&minimize=0;
content-encoding
gzip
x-content-type-options
nosniff
document-policy
force-load-at-top
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400,h3-29=":443"; ma=86400
content-length
20656
x-xss-protection
0
pragma
public
x-fb-debug
jCmD9+IpLZCXWyw+V+yAbyJWYWJUF8VELpK9jW13b5NcfjkSbGjuDCoaP+GYE3P7mgrN3ymg3ejtifEaKQQ5qA==
x-fb-trip-id
917726464
x-frame-options
DENY
date
Sat, 30 Apr 2022 14:41:03 GMT
strict-transport-security
max-age=31536000; preload; includeSubDomains
content-type
application/x-javascript; charset=utf-8
vary
Accept-Encoding
cache-control
public, max-age=1200
x-fb-rlafr
0
expires
Sat, 01 Jan 2000 00:00:00 GMT
1480959392203028
connect.facebook.net/signals/config/
306 KB
87 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/1480959392203028?v=2.9.57&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:100:face:b00c:0:3 Frankfurt am Main, Germany, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
2f266d3099989312d6995c39b02333ed7cab5e019458df6bebf02b7ce8391144
Security Headers
Name Value
Content-Security-Policy default-src facebook.net *.facebook.net fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com data: blob: 'self';script-src *.fbcdn.net *.facebook.net 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' facebook.net *.facebook.net fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com;connect-src *.fbcdn.net *.facebook.net wss://*.fbcdn.net attachment.fbsbx.com blob: 'self';block-all-mixed-content;upgrade-insecure-requests;report-uri https://www.facebook.com/csp/reporting/?m=c&minimize=0;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

content-security-policy
default-src facebook.net *.facebook.net fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com data: blob: 'self';script-src *.fbcdn.net *.facebook.net 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' facebook.net *.facebook.net fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com;connect-src *.fbcdn.net *.facebook.net wss://*.fbcdn.net attachment.fbsbx.com blob: 'self';block-all-mixed-content;upgrade-insecure-requests;report-uri https://www.facebook.com/csp/reporting/?m=c&minimize=0;
content-encoding
gzip
x-content-type-options
nosniff
document-policy
force-load-at-top
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400,h3-29=":443"; ma=86400
content-length
89414
x-xss-protection
0
pragma
public
x-fb-debug
Ow2sBiMMl1wVMRXI63aR5yJzGOwiw2VzuXiws8cG7+ExIAkT8kvXmzAlWuofy9aVQFys2DMzqjkM+EHYm7c8rw==
x-fb-trip-id
917726464
cross-origin-opener-policy
same-origin-allow-popups
x-frame-options
DENY
date
Sat, 30 Apr 2022 14:41:03 GMT
strict-transport-security
max-age=31536000; preload; includeSubDomains
content-type
application/x-javascript; charset=utf-8
vary
Accept-Encoding
cache-control
public, max-age=1200
x-fb-rlafr
0
priority
u=3,i
expires
Sat, 01 Jan 2000 00:00:00 GMT
/
www.facebook.com/tr/
44 B
297 B
Image
General
Full URL
https://www.facebook.com/tr/?id=1480959392203028&ev=PageView&dl=https%3A%2F%2Fforums.malwarebytes.com%2Ftopic%2F177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt%2F&rl=&if=false&ts=1651329663553&sw=1600&sh=1200&v=2.9.57&r=stable&a=tmSimo-GTM-WebTemplate&ec=0&o=30&fbp=fb.1.1651329663552.1732550776&it=1651329663521&coo=false&tm=1&exp=p0&rqm=GET
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de Frankfurt am Main, Germany, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Sat, 30 Apr 2022 14:41:03 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
cache-control
no-cache, must-revalidate, max-age=0
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
44
expires
Sat, 30 Apr 2022 14:41:03 GMT
4072696.js
bat.bing.com/p/action/
1 KB
1 KB
Script
General
Full URL
https://bat.bing.com/p/action/4072696.js
Requested by
Host: bat.bing.com
URL: https://bat.bing.com/bat.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:c11::200 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
a988faf4de28a0b0027878c216cf36b48a886ac5b312baaec765380904adfc79
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

pragma
no-cache
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-encoding
gzip
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref
Ref A: 31A4CD02B8DA450DA99F0888E17D08F5 Ref B: FRAEDGE1315 Ref C: 2022-04-30T14:41:03Z
date
Sat, 30 Apr 2022 14:41:03 GMT
vary
Accept-Encoding
x-cache
CONFIG_NOCACHE
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
no-store,no-cache
content-length
895
0
bat.bing.com/action/
0
175 B
Image
General
Full URL
https://bat.bing.com/action/0?ti=4072696&tm=gtm002&Ver=2&mid=c1e8c060-5f86-4ed0-a171-72e005afa9ab&sid=8f8ba740c89311ecb4b2236c881988e9&vid=8f8bf8c0c89311ec8bedcbe6acd5de5c&vids=1&pi=1200101525&lg=en-US&sw=1600&sh=1200&sc=24&tl=Getting%20%22Exploit%20attempt%20to%20bypass%20ASLR%20blocked%22%20and%20%22Exploit%20memory%20HeapSpray%20attempt%22%20-%20Malwarebytes%20Anti-Exploit%20for%20Business%20-%20Malwarebytes%20Forums&p=https%3A%2F%2Fforums.malwarebytes.com%2Ftopic%2F177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt%2F&r=&lt=802&evt=pageLoad&msclkid=N&sv=1&rn=649349
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:c11::200 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

pragma
no-cache
strict-transport-security
max-age=31536000; includeSubDomains; preload
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref
Ref A: 8DB0451715EC47B9957924215B6A19D4 Ref B: FRAEDGE1315 Ref C: 2022-04-30T14:41:03Z
date
Sat, 30 Apr 2022 14:41:03 GMT
x-cache
CONFIG_NOCACHE
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
expires
Fri, 01 Jan 1990 00:00:00 GMT
validateCookie
segments.company-target.com/
Redirect Chain
  • https://match.prod.bidr.io/cookie-sync/demandbase
  • https://match.prod.bidr.io/cookie-sync/demandbase?_bee_ppp=1
  • https://segments.company-target.com/log?vendor=choca&user_id=AADlmE7E2pUAADzRRDLOYQ
  • https://segments.company-target.com/validateCookie?vendor=choca&user_id=AADlmE7E2pUAADzRRDLOYQ&verifyHash=9afeb05c3ed35130fce9b352ed1650f094c7649d
26 B
409 B
Image
General
Full URL
https://segments.company-target.com/validateCookie?vendor=choca&user_id=AADlmE7E2pUAADzRRDLOYQ&verifyHash=9afeb05c3ed35130fce9b352ed1650f094c7649d
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
HTTP/1.1
Server
52.222.214.56 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-214-56.fra56.r.cloudfront.net
Software
/
Resource Hash
3b7b8a4b411ddf8db9bacc2f3aabf406f8e4c0c087829b336ca331c40adfdff1

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

Date
Sat, 30 Apr 2022 14:41:03 GMT
Via
1.1 474733f16f494ddb794b4f7dfd7de966.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA56-P3
Vary
Origin
X-Cache
Miss from cloudfront
Content-Type
image/gif
Transfer-Encoding
chunked
Connection
keep-alive
trace-id
345db22f0a0309ab
X-Amz-Cf-Id
xx_50l3p8VjviLA45CkZvJeSc_qPUgZ2kmNzJPEA5Hd2cB_LBUVXtw==

Redirect headers

Date
Sat, 30 Apr 2022 14:41:03 GMT
Via
1.1 474733f16f494ddb794b4f7dfd7de966.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA56-P3
Vary
Origin
X-Cache
Miss from cloudfront
Location
/validateCookie?vendor=choca&user_id=AADlmE7E2pUAADzRRDLOYQ&verifyHash=9afeb05c3ed35130fce9b352ed1650f094c7649d
Connection
keep-alive
trace-id
94ed8be7ae40959a
Content-Length
0
X-Amz-Cf-Id
9I6WZz9Y0LocKAEMg7RmROGSWGnvyLpWy1qUVhzyIMHV8A2D7JvTaw==
464526.gif
id.rlcdn.com/
0
98 B
Image
General
Full URL
https://id.rlcdn.com/464526.gif
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
35.244.174.68 Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
68.174.244.35.bc.googleusercontent.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Sat, 30 Apr 2022 14:41:03 GMT
via
1.1 google
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
0
ip.json
api.company-target.com/api/v2/
461 B
958 B
XHR
General
Full URL
https://api.company-target.com/api/v2/ip.json?referrer=&page=https%3A%2F%2Fforums.malwarebytes.com%2Ftopic%2F177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt%2F&page_title=Getting%20%22Exploit%20attempt%20to%20bypass%20ASLR%20blocked%22%20and%20%22Exploit%20memory%20HeapSpray%20attempt%22%20-%20Malwarebytes%20Anti-Exploit%20for%20Business%20-%20Malwarebytes%20Forums&src=tag&auth=TcuHErVpEQlFNgsvW0BgkLmoffXoRf8c17jto6PU
Requested by
Host: scripts.demandbase.com
URL: https://scripts.demandbase.com/HWyTnY16.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
18.66.97.57 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-18-66-97-57.fra56.r.cloudfront.net
Software
nginx /
Resource Hash
06294245f12818c2d04b2a9f1e1d9d5cadd44667f565cdc6f51c83aaf4dfef28

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Sat, 30 Apr 2022 14:41:03 GMT
identification-source
CENTRAL
vary
Accept-Encoding, Origin
x-amz-cf-pop
FRA56-P2
x-cache
Miss from cloudfront
request-id
c587c3ef-8749-46b3-ba14-a494379dadfc
content-encoding
gzip
pragma
no-cache
access-control-allow-origin
https://forums.malwarebytes.com
server
nginx
access-control-max-age
7200
access-control-allow-methods
GET, POST, OPTIONS
content-type
application/json;charset=utf-8
via
1.1 b9d2ce196c8a711fb15d92175d58476e.cloudfront.net (CloudFront)
access-control-expose-headers
cache-control
no-cache, no-store, max-age=0, must-revalidate
access-control-allow-credentials
true
api-version
v2
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
x-amz-cf-id
mRWS2AGBsNNlq8HZHMhO02DytYBhU8gnUninABUaYUc7ktYpw1DhhQ==
expires
Fri, 29 Apr 2022 14:41:03 GMT
linkid.js
www.google-analytics.com/plugins/ua/
2 KB
884 B
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/linkid.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
92fca55833f48b4289ac8f1cedd48752b580fce4ec4b5d81670b8193d6e51b54
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Sat, 30 Apr 2022 14:06:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
2065
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
859
x-xss-protection
0
last-modified
Tue, 22 Oct 2019 18:15:00 GMT
server
sffe
vary
Accept-Encoding
report-to
{"group":"static-on-bigtable","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/static-on-bigtable"}]}
content-type
text/javascript
cache-control
public, max-age=3600
accept-ranges
bytes
cross-origin-opener-policy-report-only
same-origin; report-to="static-on-bigtable"
expires
Sat, 30 Apr 2022 15:06:38 GMT
main.32155010.js
s.pinimg.com/ct/lib/
52 KB
18 KB
Script
General
Full URL
https://s.pinimg.com/ct/lib/main.32155010.js
Requested by
Host: s.pinimg.com
URL: https://s.pinimg.com/ct/core.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4b::84 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
83912349e8bc8f0ec2084562dc5e71e06f33a3dfcad4899af80117a7174be14d

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Sat, 30 Apr 2022 14:41:03 GMT
content-encoding
gzip
fastly-restarts
1
x-cdn
fastly
etag
"fd86de14455274a7c147dc95b77e18e3"
vary
Accept-Encoding, Origin
access-control-allow-methods
GET
content-type
application/javascript
access-control-allow-origin
*
access-control-max-age
86400
cache-control
max-age=1209600
content-length
18298
access-control-expose-headers
X-CDN
/
ct.pinterest.com/user/
488 B
734 B
XHR
General
Full URL
https://ct.pinterest.com/user/?tid=2614167509439&pd=%7B%22np%22%3A%22gtm%22%2C%22gtm_aem_configs%22%3A%5B%22em%22%5D%2C%22md_frequency%22%3A1%7D&cb=1651329663681
Requested by
Host: s.pinimg.com
URL: https://s.pinimg.com/ct/lib/main.32155010.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.192.84 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
dca1ae93b9c0a595ca6470fda80b9628d455812f8ba2bef0cb29edebe4290633

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 30 Apr 2022 14:41:03 GMT
content-encoding
gzip
referrer-policy
origin
x-cdn
fastly
content-type
application/json; charset=utf-8
access-control-allow-origin
https://forums.malwarebytes.com
access-control-expose-headers
Epik,Pin-Unauth
cache-control
no-cache,no-store,must-revalidate,max-age=0
pin-unauth
dWlkPU9XVTNPR016Tm1VdFptVTROeTAwTlRJMUxXRTFNbVV0TkRJeE9HVmxaRGxsTVdaaA
x-pinterest-rid
1604605106678715
x-envoy-upstream-service-time
1
access-control-allow-credentials
true
content-length
349
expires
Sat, 01 Jan 2000 00:00:00 GMT
/
ct.pinterest.com/v3/
35 B
96 B
Image
General
Full URL
https://ct.pinterest.com/v3/?tid=2614167509439&pd=%7B%22np%22%3A%22gtm%22%2C%22gtm_aem_configs%22%3A%5B%22em%22%5D%2C%22md_frequency%22%3A1%7D&event=init&ad=%7B%22loc%22%3A%22https%3A%2F%2Fforums.malwarebytes.com%2Ftopic%2F177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt%2F%22%2C%22ref%22%3A%22%22%2C%22if%22%3Afalse%2C%22sh%22%3A1200%2C%22sw%22%3A1600%2C%22mh%22%3A%2232155010%22%2C%22architecture%22%3A%22%22%2C%22bitness%22%3A%22%22%2C%22brands%22%3A%5B%5D%2C%22mobile%22%3Afalse%2C%22model%22%3A%22%22%2C%22platform%22%3A%22%22%2C%22platformVersion%22%3A%22%22%2C%22uaFullVersion%22%3A%22%22%2C%22ecm_enabled%22%3Afalse%7D&cb=1651329663683
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.192.84 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
37b17c5135a176a9474521af147d96dfa1fb4ca0f43f00d1400bd1885be3ab9b

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 30 Apr 2022 14:41:03 GMT
referrer-policy
origin
x-cdn
fastly
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache,no-store,must-revalidate,max-age=0
x-envoy-upstream-service-time
3
x-pinterest-rid
1069538821340477
content-length
35
expires
Sat, 01 Jan 2000 00:00:00 GMT
collect
stats.g.doubleclick.net/j/
4 B
447 B
XHR
General
Full URL
https://stats.g.doubleclick.net/j/collect?t=dc&aip=1&_r=3&v=1&_v=j96&tid=UA-3347303-10&cid=1607876754.1651329664&jid=1320344107&uid=B1F2EDC6-E280-41EE-819F-475419FBE340&gjid=120720216&_gid=966034275.1651329664&_u=aGBAgEAjAAAAAE~&z=1874981452
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:400c:c00::9c Brussels, Belgium, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
84e01419bd81f32ac6df0f75f49c604fda9172000a3ae432b3c47b2a6a712d80
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://forums.malwarebytes.com/
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
strict-transport-security
max-age=10886400; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
date
Sat, 30 Apr 2022 14:41:03 GMT
content-type
text/plain
access-control-allow-origin
https://forums.malwarebytes.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
4
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/
35 B
55 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j96&a=1651619336&t=pageview&_s=1&dl=https%3A%2F%2Fforums.malwarebytes.com%2Ftopic%2F177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt%2F&ul=en-us&de=UTF-8&dt=Getting%20%22Exploit%20attempt%20to%20bypass%20ASLR%20blocked%22%20and%20%22Exploit%20memory%20HeapSpray%20attempt%22%20-%20Malwarebytes%20Anti-Exploit%20for%20Business%20-%20Malwarebytes%20Forums&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=aGBAgEAj~&jid=1320344107&gjid=120720216&cid=1607876754.1651329664&uid=B1F2EDC6-E280-41EE-819F-475419FBE340&tid=UA-3347303-10&_gid=966034275.1651329664&gtm=2wg4r0MKSKW3&z=906611175
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 29 Apr 2022 15:49:58 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
82265
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/
35 B
55 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j96&a=1651619336&t=event&ni=1&_s=2&dl=https%3A%2F%2Fforums.malwarebytes.com%2Ftopic%2F177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt%2F&ul=en-us&de=UTF-8&dt=Getting%20%22Exploit%20attempt%20to%20bypass%20ASLR%20blocked%22%20and%20%22Exploit%20memory%20HeapSpray%20attempt%22%20-%20Malwarebytes%20Anti-Exploit%20for%20Business%20-%20Malwarebytes%20Forums&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=Demandbase&ea=API%20Resolution&el=IP%20API&_u=aHBAgEAjAAAAAE~&jid=&gjid=&cid=1607876754.1651329664&uid=B1F2EDC6-E280-41EE-819F-475419FBE340&tid=UA-3347303-10&_gid=966034275.1651329664&gtm=2wg4r0MKSKW3&cd2=(Non-Company%20Visitor)&cd3=Bot&cd4=(Non-Company%20Visitor)&cd5=(Non-Company%20Visitor)&cd6=(Non-Company%20Visitor)&cd7=(Non-Company%20Visitor)&cd8=(Non-Company%20Visitor)&cd9=(Non-Company%20Visitor)&cd10=(Non-Company%20Visitor)&cd11=Frankfurt%20am%20Main&cd12=HE&cd13=(Non-Company%20Visitor)&cd14=(Non-Company%20Visitor)&cd15=(Non-Company%20Visitor)&cd16=(Non-Company%20Visitor)&cd17=DE&cd18=(Non-Company%20Visitor)&z=583059050
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 29 Apr 2022 15:49:58 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
82265
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
clarity.js
h.clarity.ms/s/0.6.34/
53 KB
23 KB
Script
General
Full URL
https://h.clarity.ms/s/0.6.34/clarity.js
Requested by
Host: bat.bing.com
URL: https://bat.bing.com/p/action/4072696.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.224.31.34 Tappahannock, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
ca63193ce799e4e00c9106349365981dc6e26cb77632ebf5df23dffba2aaccfa

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Sat, 30 Apr 2022 14:41:03 GMT
content-encoding
br
etag
"1d84ce176162e54"
last-modified
Sun, 10 Apr 2022 13:47:04 GMT
server
Microsoft-IIS/10.0
x-powered-by
ASP.NET
vary
Accept-Encoding
content-type
application/javascript;charset=utf-8
cache-control
public,max-age=86400
accept-ranges
bytes
content-length
23150
request-context
appId=cid-v1:b1d896b3-bec7-448b-b764-240152e813e8
ga-audiences
www.google.com/ads/
42 B
501 B
Image
General
Full URL
https://www.google.com/ads/ga-audiences?t=sr&aip=1&_r=4&slf_rd=1&v=1&_v=j96&tid=UA-3347303-10&cid=1607876754.1651329664&jid=1320344107&_u=aGBAgEAjAAAAAE~&z=635763610
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:812::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 30 Apr 2022 14:41:03 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, no-store, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
42 B
501 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?t=sr&aip=1&_r=4&slf_rd=1&v=1&_v=j96&tid=UA-3347303-10&cid=1607876754.1651329664&jid=1320344107&_u=aGBAgEAjAAAAAE~&z=635763610
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 30 Apr 2022 14:41:03 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, no-store, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
front_front_widgets.js.gz
content.invisioncic.com/Mmalware/javascript_core/
16 KB
5 KB
Script
General
Full URL
https://content.invisioncic.com/Mmalware/javascript_core/front_front_widgets.js.gz?v=d815db93211651242719&csrfKey=&antiCache=d815db93211651242719
Requested by
Host: content.invisioncic.com
URL: https://content.invisioncic.com/Mmalware/javascript_global/root_library.js.gz?v=d815db93211651242719
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:225e:6e00:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
3e2a06ebf1e42871cb98243dc0120e51087ee2b0200414047751f07dc712e458

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Fri, 29 Apr 2022 14:32:21 GMT
content-encoding
gzip
last-modified
Wed, 27 Apr 2022 15:10:30 GMT
server
AmazonS3
age
86923
etag
"7d07817c9aad54d0dc6a741a6aa8ff8f"
x-cache
Hit from cloudfront
x-amz-version-id
null
via
1.1 013a54c6b9caf01f403c247789c7256c.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
FRA60-P4
accept-ranges
bytes
content-type
text/javascript
content-length
4246
x-amz-cf-id
q1pZBnXVHWruZ7lKdZFE3TIjOwnpZaHo6tTYXWwruR3OhOag1CjrBA==
/
www.facebook.com/tr/ Frame 9040
0
18 B
Document
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de Frankfurt am Main, Germany, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Content-Type
application/x-www-form-urlencoded
Origin
https://forums.malwarebytes.com
Referer
https://forums.malwarebytes.com/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

access-control-allow-credentials
true
access-control-allow-origin
https://forums.malwarebytes.com
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
0
content-type
text/plain
cross-origin-resource-policy
cross-origin
date
Sat, 30 Apr 2022 14:41:04 GMT
priority
u=0
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
c.gif
c.clarity.ms/
Redirect Chain
  • https://c.clarity.ms/c.gif
  • https://c.bing.com/c.gif?CtsSyncId=378081208459450E98ED0763C6AA654F&RedC=c.clarity.ms&MXFR=368AA4B25DAD657D06FCB52459AD6B1C
  • https://c.clarity.ms/c.gif?CtsSyncId=378081208459450E98ED0763C6AA654F&MUID=10BC6C5EF9C36EEA3CA57DC8F8116F80
42 B
370 B
Image
General
Full URL
https://c.clarity.ms/c.gif?CtsSyncId=378081208459450E98ED0763C6AA654F&MUID=10BC6C5EF9C36EEA3CA57DC8F8116F80
Protocol
H2
Server
52.142.114.2 Dublin, Ireland, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
99c2917ee5b2a01459a923bdd1c676f15ee73b62b87f696e6735312d26f51e12

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 30 Apr 2022 14:41:03 GMT
last-modified
Fri, 18 Mar 2022 19:39:54 GMT
server
Microsoft-IIS/10.0
x-powered-by
ASP.NET
etag
"8120eaf0ff3ad81:0"
p3p
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
cache-control
private, no-cache, proxy-revalidate, no-store
accept-ranges
bytes
content-type
image/gif
content-length
42

Redirect headers

pragma
no-cache
date
Sat, 30 Apr 2022 14:41:04 GMT
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref
Ref A: 40C8DAF3B78B41AE90513CB2F4FCDD4B Ref B: FRAEDGE1315 Ref C: 2022-04-30T14:41:04Z
x-powered-by
ASP.NET
x-cache
CONFIG_NOCACHE
p3p
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
location
https://c.clarity.ms/c.gif?CtsSyncId=378081208459450E98ED0763C6AA654F&MUID=10BC6C5EF9C36EEA3CA57DC8F8116F80
cache-control
private, no-cache, proxy-revalidate, no-store
content-length
0
2893.js
script.crazyegg.com/pages/scripts/0081/
5 KB
2 KB
Script
General
Full URL
https://script.crazyegg.com/pages/scripts/0081/2893.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:9308 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a46ed92667c2008572fe507f2650e820dfea2d192a7c46a150c94e5cc560a44b

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Sat, 30 Apr 2022 14:41:04 GMT
content-encoding
gzip
cf-cache-status
HIT
age
7237
cf-polished
origSize=5359
cf-ray
70410941ad5d9b4f-FRA
ce-version
11.1.420
last-modified
Sat, 30 Apr 2022 12:40:27 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
access-control-expose-headers
CE-Version
cache-control
public, max-age=300, s-maxage=1209600
timing-allow-origin
*
cf-bgj
minify
uwt.js
static.ads-twitter.com/
28 KB
10 KB
Script
General
Full URL
https://static.ads-twitter.com/uwt.js
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.232.136.157 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
70d4c4423dab9cf00b6e9bcf57518eeafff00e9d2499f4463498b03bef2bdc33

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Sat, 30 Apr 2022 14:41:04 GMT
content-encoding
gzip
last-modified
Thu, 21 Apr 2022 18:44:51 GMT
etag
"c47a9d4becaab89e22af7ba863c58452+gzip+gzip"
vary
Accept-Encoding,Host
x-tw-cdn
FT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
cache-control
no-cache
x-cache
HIT, HIT
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
content-length
9501
x-served-by
cache-iad-kiad7000172-IAD, cache-hhn11572-HHN
/
insight.adsrvr.org/track/pxl/
70 B
261 B
Image
General
Full URL
https://insight.adsrvr.org/track/pxl/?adv=jtuxrxn&ct=0:fyckj1z&fmt=3
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.223.40.198 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
a6370ebea231e0c9a.awsglobalaccelerator.com
Software
/
Resource Hash
8d70b3e6badb6973663b398d297bb32eaedd08826a1af98d0a1cfce5324ffce0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 30 Apr 2022 14:41:04 GMT
cache-control
private,no-cache, must-revalidate
x-aspnet-version
4.0.30319
content-type
image/gif
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
collect
www.google-analytics.com/
35 B
55 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j96&a=1651619336&t=event&ni=1&_s=1&dl=https%3A%2F%2Fforums.malwarebytes.com%2Ftopic%2F177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt%2F&ul=en-us&de=UTF-8&dt=Getting%20%22Exploit%20attempt%20to%20bypass%20ASLR%20blocked%22%20and%20%22Exploit%20memory%20HeapSpray%20attempt%22%20-%20Malwarebytes%20Anti-Exploit%20for%20Business%20-%20Malwarebytes%20Forums&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=scroll&ea=vertical&ev=25&_u=aHDAgEAjAAAAAE~&jid=&gjid=&cid=1607876754.1651329664&uid=B1F2EDC6-E280-41EE-819F-475419FBE340&tid=UA-3347303-10&_gid=966034275.1651329664&gtm=2wg4r0MKSKW3&z=1146957732
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 29 Apr 2022 15:49:58 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
82266
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
collect
h.clarity.ms/
0
75 B
XHR
General
Full URL
https://h.clarity.ms/collect
Requested by
Host: h.clarity.ms
URL: https://h.clarity.ms/s/0.6.34/clarity.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.224.31.34 Tappahannock, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept
application/x-clarity-gzip
Referer
https://forums.malwarebytes.com/
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

access-control-allow-origin
https://forums.malwarebytes.com
date
Sat, 30 Apr 2022 14:41:03 GMT
access-control-allow-credentials
true
server
Microsoft-IIS/10.0
x-powered-by
ASP.NET
request-context
appId=cid-v1:b1d896b3-bec7-448b-b764-240152e813e8
adsct
analytics.twitter.com/i/
43 B
354 B
Image
General
Full URL
https://analytics.twitter.com/i/adsct?type=javascript&version=2.3.2&p_id=Twitter&p_user_id=0&txn_id=o1m5j&events=%5B%5B%22pageview%22%2C%7B%7D%5D%5D&tw_order_quantity=0&tw_sale_amount=0&tw_iframe_status=0&event_id=6e3970a0-807b-4400-ae40-47f9a206c4ff&tw_document_href=https%3A%2F%2Fforums.malwarebytes.com%2Ftopic%2F177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt%2F
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.244.42.67 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

x-response-time
119
date
Sat, 30 Apr 2022 14:41:03 GMT
server
tsa_o
strict-transport-security
max-age=631138519
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, max-age=0
x-connection-hash
aebea551f9826da3ac0e5e66fe25b5cb28f8ec2d5cab046baef1f2e20ae4d944
content-length
43
adsct
t.co/i/
43 B
337 B
Image
General
Full URL
https://t.co/i/adsct?type=javascript&version=2.3.2&p_id=Twitter&p_user_id=0&txn_id=o1m5j&events=%5B%5B%22pageview%22%2C%7B%7D%5D%5D&tw_order_quantity=0&tw_sale_amount=0&tw_iframe_status=0&event_id=6e3970a0-807b-4400-ae40-47f9a206c4ff&tw_document_href=https%3A%2F%2Fforums.malwarebytes.com%2Ftopic%2F177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt%2F
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.244.42.197 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

x-response-time
109
date
Sat, 30 Apr 2022 14:41:03 GMT
server
tsa_o
strict-transport-security
max-age=0
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, max-age=0
x-connection-hash
e2202f46120ca6e8248770d9cff2f1db376b555bffaa1129a3dfa85b8a590650
content-length
43
2893.json
script.crazyegg.com/pages/data-scripts/0081/
4 KB
2 KB
XHR
General
Full URL
https://script.crazyegg.com/pages/data-scripts/0081/2893.json?t=1
Requested by
Host: script.crazyegg.com
URL: https://script.crazyegg.com/pages/scripts/0081/2893.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:9308 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
74ad9f82e81b3b81dc0212915ed5ad8bb7b666987611c5229000752cee0f1feb

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Sat, 30 Apr 2022 14:41:04 GMT
content-encoding
gzip
cf-cache-status
HIT
age
7289
ce-version
11.1.420
content-length
1560
timing-allow-origin
*
last-modified
Sat, 30 Apr 2022 12:39:35 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
access-control-expose-headers
CE-Version
cache-control
public, max-age=300, s-maxage=1209600
accept-ranges
bytes
cf-ray
704109422e78914d-FRA
11.1.420.js
script.crazyegg.com/pages/versioned/common-scripts/
81 KB
26 KB
Script
General
Full URL
https://script.crazyegg.com/pages/versioned/common-scripts/11.1.420.js
Requested by
Host: script.crazyegg.com
URL: https://script.crazyegg.com/pages/scripts/0081/2893.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:9308 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
bd002adada90b672244a9e72b7904810cb0dc8f9ca1e73a9029f4714acee898d

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 30 Apr 2022 14:41:04 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Thu, 21 Apr 2022 12:08:56 GMT
server
cloudflare
age
346909
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000, s-maxage=31536000
accept-ranges
bytes
cf-ray
704109426ead9b4f-FRA
content-length
26624
collect
h.clarity.ms/
0
25 B
XHR
General
Full URL
https://h.clarity.ms/collect
Requested by
Host: h.clarity.ms
URL: https://h.clarity.ms/s/0.6.34/clarity.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.224.31.34 Tappahannock, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept
application/x-clarity-gzip
Referer
https://forums.malwarebytes.com/
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

access-control-allow-origin
https://forums.malwarebytes.com
date
Sat, 30 Apr 2022 14:41:03 GMT
access-control-allow-credentials
true
server
Microsoft-IIS/10.0
x-powered-by
ASP.NET
request-context
appId=cid-v1:b1d896b3-bec7-448b-b764-240152e813e8
2893.json
script.crazyegg.com/pages/sampling-data-scripts/0081/
46 B
130 B
XHR
General
Full URL
https://script.crazyegg.com/pages/sampling-data-scripts/0081/2893.json?t=458702
Requested by
Host: script.crazyegg.com
URL: https://script.crazyegg.com/pages/versioned/common-scripts/11.1.420.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:9308 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7dd0a74549d8c479d8fd34d205ae2b14847fd29ca52c6114eb9653e8020e4d4b

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Sat, 30 Apr 2022 14:41:04 GMT
content-encoding
gzip
cf-cache-status
HIT
age
7289
ce-version
11.1.420
content-length
65
timing-allow-origin
*
last-modified
Sat, 30 Apr 2022 12:39:35 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
access-control-expose-headers
CE-Version
cache-control
public, max-age=300, s-maxage=1209600
accept-ranges
bytes
cf-ray
704109430807914d-FRA
healthcheck
pagestates-tracking.crazyegg.com/
19 B
420 B
XHR
General
Full URL
https://pagestates-tracking.crazyegg.com/healthcheck
Requested by
Host: script.crazyegg.com
URL: https://script.crazyegg.com/pages/versioned/common-scripts/11.1.420.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
52.222.236.90 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-236-90.fra56.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
830e67bda2532cd5880ee86e3b33e69721082f8458bb0df0cd4edbb1577fd375

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 21 Dec 2021 13:52:43 GMT
via
1.1 10f3c0984ab3eaba3e5720ed830a77b6.cloudfront.net (CloudFront)
last-modified
Tue, 05 Oct 2021 13:53:30 GMT
server
AmazonS3
age
11234902
etag
"d06f04fccf68d0b228a5923187ce1afd"
access-control-max-age
31536000
access-control-allow-methods
GET, HEAD
content-type
binary/octet-stream
access-control-allow-origin
*
x-cache
Hit from cloudfront
x-amz-cf-pop
FRA56-P4
accept-ranges
bytes
content-length
19
x-amz-cf-id
4VexbxRwMHOR89g-nuYt8_O9j4zVAfYKL2tG7zSJUrNcf68WeA5cXw==
healthcheck
assets-tracking.crazyegg.com/
19 B
420 B
XHR
General
Full URL
https://assets-tracking.crazyegg.com/healthcheck
Requested by
Host: script.crazyegg.com
URL: https://script.crazyegg.com/pages/versioned/common-scripts/11.1.420.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
18.66.122.72 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-18-66-122-72.fra60.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
830e67bda2532cd5880ee86e3b33e69721082f8458bb0df0cd4edbb1577fd375

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 21 Dec 2021 13:24:28 GMT
via
1.1 0121ceb2efadb6db52d122a8b6b52f90.cloudfront.net (CloudFront)
last-modified
Tue, 05 Oct 2021 13:53:30 GMT
server
AmazonS3
age
11236597
etag
"d06f04fccf68d0b228a5923187ce1afd"
access-control-max-age
31536000
access-control-allow-methods
GET, HEAD
content-type
binary/octet-stream
access-control-allow-origin
*
x-cache
Hit from cloudfront
x-amz-cf-pop
FRA60-P2
accept-ranges
bytes
content-length
19
x-amz-cf-id
ZSpdLSCjWS8dz_UwhIdNTPb6rPT7fYiKkKKkul17FBdS3sLTv-RiMg==
d874cd16-5d3c-4238-b366-5bd3a5f618d0
https://forums.malwarebytes.com/
53 B
0
Other
General
Full URL
blob:https://forums.malwarebytes.com/d874cd16-5d3c-4238-b366-5bd3a5f618d0
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
8ff09cd0ee012fe06ed1b67dc914858cde819f21bb479f629994d9e49f3c0049

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

Content-Length
53
Content-Type
text/javascript
clock
tracking.crazyegg.com/
29 B
136 B
XHR
General
Full URL
https://tracking.crazyegg.com/clock?t=1651329664571
Requested by
Host: script.crazyegg.com
URL: https://script.crazyegg.com/pages/versioned/common-scripts/11.1.420.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.77.91.70 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-77-91-70.eu-west-1.compute.amazonaws.com
Software
awselb/2.0 /
Resource Hash
1be572ef57b6e6175b7bc18208cf87c785a33b46c409774cb4fb9f4df9d77dde

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

access-control-allow-origin
*
date
Sat, 30 Apr 2022 14:41:04 GMT
cache-control
no-store
server
awselb/2.0
content-length
29
content-type
text/plain
collect
h.clarity.ms/
0
48 B
XHR
General
Full URL
https://h.clarity.ms/collect
Requested by
Host: h.clarity.ms
URL: https://h.clarity.ms/s/0.6.34/clarity.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.224.31.34 Tappahannock, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept
application/x-clarity-gzip
Referer
https://forums.malwarebytes.com/
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

access-control-allow-origin
https://forums.malwarebytes.com
date
Sat, 30 Apr 2022 14:41:05 GMT
access-control-allow-credentials
true
server
Microsoft-IIS/10.0
x-powered-by
ASP.NET
request-context
appId=cid-v1:b1d896b3-bec7-448b-b764-240152e813e8

Verdicts & Comments Add Verdict or Comment

77 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| oncontextlost object| oncontextrestored function| structuredClone function| getScreenDetails object| dataLayer boolean| ipsDebug string| CKEDITOR_BASEPATH object| ipsSettings object| Debug object| ips function| _ function| $ function| jQuery function| EvEmitter function| imagesLoaded object| Mustache object| jstz object| linkify function| Hammer boolean| PR_SHOULD_USE_CONTINUATION function| prettyPrintOne function| prettyPrint object| PR function| XRegExp function| recaptcha2Callback function| escapeRegExp object| ipsJavascriptMap function| ctSetCookie function| ctMouseStopData function| ctKeyStopStopListening object| d number| ctTimeMs boolean| ctMouseEventTimerFlag string| ctMouseData number| ctMouseDataCounter number| ctMouseReadInterval number| ctMouseWriteDataInterval function| ctFunctionMouseMove function| ctFunctionFirstKey object| google_tag_manager function| postscribe object| google_tag_manager_external function| fbq function| _fbq object| _fbq_gtm_ids object| google_tag_data string| GoogleAnalyticsObject function| ga function| pintrk object| webVitals function| cwv_dlv string| fieldIds object| fields function| expandFormFields function| showAllFields function| hideFormFields function| demandbaseLoaded function| UET function| UET_init function| UET_push object| ueto_32dbd956b0 object| uetq object| Demandbase object| gaplugins object| gaGlobal object| gaData function| clarity function| twq object| tradedeskTag object| twttr boolean| CE_USER_SCRIPT object| CE2 string| CE_USER_DATA_URL string| CE_USER_COMMON_SCRIPT_URL string| CE_USER_THIRDPARTY_SCRIPT_URL object| CE2BH function| CE_URL_FINGERPRINT

33 Cookies

Domain/Path Name / Value
.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt Name: gaUserID
Value: B1F2EDC6-E280-41EE-819F-475419FBE340
forums.malwarebytes.com/ Name: ips4_IPSSessionFront
Value: tbil6bip5v1po442r92b976jqf
forums.malwarebytes.com/ Name: ct_cookies_test
Value: %7B%22cookies_names%22%3A%5B%5D%2C%22check_value%22%3A%229533b808c1c1d7b1afde9a8986ca2daf%22%7D
forums.malwarebytes.com/ Name: AWSALB
Value: cBwPDIgmmsZ3ZWgBwq6+6iQxZGbnOoL9upLH1+Iz8E4iwCIi0mvXGTMv/atBy1JGeDSkEm36/zN9/+CXNWCXGqGZkHKZOLtVcDgEJbXyp/uIRFh/usPlX8FF1fOu
forums.malwarebytes.com/ Name: ct_ps_timestamp
Value: 1651329663
forums.malwarebytes.com/ Name: ct_fkp_timestamp
Value: 0
forums.malwarebytes.com/ Name: ct_timezone
Value: 0
forums.malwarebytes.com/ Name: ips4_ipsTimezone
Value: Etc/Unknown
forums.malwarebytes.com/ Name: ips4_hasJS
Value: true
.malwarebytes.com/ Name: _fbp
Value: fb.1.1651329663552.1732550776
.bing.com/ Name: MUID
Value: 10BC6C5EF9C36EEA3CA57DC8F8116F80
.malwarebytes.com/ Name: _uetsid
Value: 8f8ba740c89311ecb4b2236c881988e9
.malwarebytes.com/ Name: _uetvid
Value: 8f8bf8c0c89311ec8bedcbe6acd5de5c
.malwarebytes.com/ Name: _ga
Value: GA1.2.1607876754.1651329664
.malwarebytes.com/ Name: _gid
Value: GA1.2.966034275.1651329664
.malwarebytes.com/ Name: _dc_gtm_UA-3347303-10
Value: 1
.bidr.io/ Name: bito
Value: AADlmE7E2pUAADzRRDLOYQ
.bidr.io/ Name: bitoIsSecure
Value: ok
.forums.malwarebytes.com/ Name: _pin_unauth
Value: dWlkPU9XVTNPR016Tm1VdFptVTROeTAwTlRJMUxXRTFNbVV0TkRJeE9HVmxaRGxsTVdaaA
.company-target.com/ Name: tuuid
Value: e49c4827-1630-43e5-9097-a978c1fcb03e
.company-target.com/ Name: tuuid_lu
Value: 1651329663
.malwarebytes.com/ Name: _clck
Value: 1lef4o8|1|f12|0
.c.bing.com/ Name: SRM_B
Value: 10BC6C5EF9C36EEA3CA57DC8F8116F80
.c.clarity.ms/ Name: SM
Value: C
.clarity.ms/ Name: MUID
Value: 10BC6C5EF9C36EEA3CA57DC8F8116F80
.c.clarity.ms/ Name: ANONCHK
Value: 0
.malwarebytes.com/ Name: _clsk
Value: 175xar2|1651329664393|1|1|h.clarity.ms/collect
forums.malwarebytes.com/ Name: ct_checkjs
Value: 2aeb54415e014ccbf357f5329726bd11
.t.co/ Name: muc_ads
Value: c5066bda-c791-4b79-ad12-10693d72157f
.twitter.com/ Name: personalization_id
Value: "v1_9OsadNwfPcXyZrszEZlsMA=="
.malwarebytes.com/ Name: cebs
Value: 1
.malwarebytes.com/ Name: _ce.s
Value: v~dc1be0e8ead8a81f76d21b6a76f1f9a3acbecc19~vpv~0
forums.malwarebytes.com/ Name: ct_pointer_data
Value: %5D

5 Console Messages

Source Level URL
Text
security warning URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Message:
Mixed Content: The page at 'https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/' was loaded over HTTPS, but requested an insecure element 'http://tech61.com/wp-content/uploads/2016/01/MB_Error.png'. This request was automatically upgraded to HTTPS, For more information see https://blog.chromium.org/2019/10/no-more-mixed-messages-about-https.html
security warning URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/(Line 3947)
Message:
Mixed Content: The page at 'https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/' was loaded over HTTPS, but requested an insecure element 'http://tech61.com/wp-content/uploads/2016/01/MB_Error.png'. This request was automatically upgraded to HTTPS, For more information see https://blog.chromium.org/2019/10/no-more-mixed-messages-about-https.html
security warning URL: https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/
Message:
Mixed Content: The page at 'https://forums.malwarebytes.com/topic/177952-getting-exploit-attempt-to-bypass-aslr-blocked-and-exploit-memory-heapspray-attempt/' was loaded over HTTPS, but requested an insecure element 'http://tech61.com/wp-content/uploads/2016/01/MB_Error.png'. This request was automatically upgraded to HTTPS, For more information see https://blog.chromium.org/2019/10/no-more-mixed-messages-about-https.html
network error URL: https://id.rlcdn.com/464526.gif
Message:
Failed to load resource: the server responded with a status of 451 ()
network error URL: https://tech61.com/wp-content/uploads/2016/01/MB_Error.png
Message:
Failed to load resource: the server responded with a status of 404 ()

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy frame-ancestors 'self'
Strict-Transport-Security max-age=31536000
X-Content-Security-Policy frame-ancestors 'self'
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 0

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

analytics.twitter.com
api.company-target.com
assets-tracking.crazyegg.com
bat.bing.com
c.bing.com
c.clarity.ms
connect.facebook.net
content.invisioncic.com
ct.pinterest.com
fonts.googleapis.com
fonts.gstatic.com
forums.malwarebytes.com
h.clarity.ms
id.rlcdn.com
insight.adsrvr.org
match.prod.bidr.io
pagestates-tracking.crazyegg.com
s.pinimg.com
script.crazyegg.com
scripts.demandbase.com
segments.company-target.com
static.ads-twitter.com
stats.g.doubleclick.net
t.co
tech61.com
tracking.crazyegg.com
unpkg.com
www.facebook.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.malwarebytes.com
104.244.42.197
104.244.42.67
107.180.50.166
108.138.17.118
108.138.17.47
151.101.192.84
18.66.122.72
18.66.97.57
199.232.136.157
2600:9000:223c:2000:16:26c7:ff80:93a1
2600:9000:225e:6e00:1e:ebe7:1480:93a1
2606:4700::6810:7caf
2606:4700::6813:9308
2620:1ec:c11::200
2a00:1450:4001:80f::200e
2a00:1450:4001:810::2003
2a00:1450:4001:812::2004
2a00:1450:4001:812::2008
2a00:1450:4001:828::2003
2a00:1450:4001:82b::200a
2a00:1450:400c:c00::9c
2a03:2880:f02d:100:face:b00c:0:3
2a03:2880:f11c:8083:face:b00c:0:25de
2a04:4e42:4b::84
35.244.174.68
52.142.114.2
52.222.214.56
52.222.236.90
52.223.40.198
52.224.31.34
54.171.228.20
54.77.91.70
06294245f12818c2d04b2a9f1e1d9d5cadd44667f565cdc6f51c83aaf4dfef28
07ab6efe388a48ccade72df819b978e8f6e3717245bb00c4e4993d6f893f2d61
07fbbfd8f908b547a39cbb53d85c204d4668ac45979862d8ca49892085669dea
086f1c868f8f769ef0039b238b415fc3c46d97e342309dc8c61cefb40868212e
0e36308a13aa06d085ad95ecf45f9dfa5352f683f6fb03c27fc35887bcf6f678
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
19cca2997ca363463d58dee4ce2cbf34888e6a38806964d2682dc0e25113a8f9
1be572ef57b6e6175b7bc18208cf87c785a33b46c409774cb4fb9f4df9d77dde
1e353dd6f81b838bbc322417e995c5812bb61c1c891a31725da0acd0185efeaf
22f39a41a30342a5c51d150be48c4726245655a560d154af893337d1ae953f62
24c13cdea638620ec96bc3b7ba1bdef0cbe3ad0847b2ddc6f041df1fa24cffa4
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe
2f266d3099989312d6995c39b02333ed7cab5e019458df6bebf02b7ce8391144
37b17c5135a176a9474521af147d96dfa1fb4ca0f43f00d1400bd1885be3ab9b
3b7b8a4b411ddf8db9bacc2f3aabf406f8e4c0c087829b336ca331c40adfdff1
3e2a06ebf1e42871cb98243dc0120e51087ee2b0200414047751f07dc712e458
419317ee9d2b18382073c6d3cc12d38280da97892aebe7c2897ad5534a05604a
4e0f39543ae4c15cfe3222f68e358c416dc79cb262c16c8d5b46281a5d850f40
5576e25dd8a4d45e90da43e0f127c4efb4d16eebcb7a1bc55fbb66e7cf504f9d
5825a682d41932f76e0cb9afa5967e2b7f236a2f9439587bc6d937bc76edf005
5e087947c8cdb696a6c510cbed34b068e9894c2577a20c976eba168c685f4b9e
5f5dc03d56d8cc6ea7455d5b0d769701bc118667d82208359c8a49a71a3b38e8
5ffe700367a30c00174ae22872b0baf26b346b6afcb9f18aba329c141ea4ecf3
70d4c4423dab9cf00b6e9bcf57518eeafff00e9d2499f4463498b03bef2bdc33
73c6d9bea582fd9ea44e6f647006f9ef8b4af0c15199ff20bd524186913eb9e2
74ad9f82e81b3b81dc0212915ed5ad8bb7b666987611c5229000752cee0f1feb
75976f06467c549fa30ec39acf5ba32272a086d5b986ff4d4bd859dcb791d907
76e642163bb3a95f32d0848cd9e9c0e8fa902ecd5689d737b5c08787a5c72af9
7dd0a74549d8c479d8fd34d205ae2b14847fd29ca52c6114eb9653e8020e4d4b
830e67bda2532cd5880ee86e3b33e69721082f8458bb0df0cd4edbb1577fd375
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
83912349e8bc8f0ec2084562dc5e71e06f33a3dfcad4899af80117a7174be14d
84e01419bd81f32ac6df0f75f49c604fda9172000a3ae432b3c47b2a6a712d80
8540c5e2d2e85cc6c5d46b1b06b7f6642dce39e0314299a08976cfe6053c7c52
8d70b3e6badb6973663b398d297bb32eaedd08826a1af98d0a1cfce5324ffce0
8ff09cd0ee012fe06ed1b67dc914858cde819f21bb479f629994d9e49f3c0049
92fca55833f48b4289ac8f1cedd48752b580fce4ec4b5d81670b8193d6e51b54
99c2917ee5b2a01459a923bdd1c676f15ee73b62b87f696e6735312d26f51e12
9bde20f23db841b077e3392fb8fbaac4c6fe1392bfd7b8f0947e3ee32f41f6d0
a1925038db769477ab74b4df34350c35688a795bb718727b0f4292a4a78a6210
a46ed92667c2008572fe507f2650e820dfea2d192a7c46a150c94e5cc560a44b
a988faf4de28a0b0027878c216cf36b48a886ac5b312baaec765380904adfc79
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
b35674228f9ead8fc11ad99377cdc307736257bc618caa275802e4abd08f36d4
b531e69987afedfb538c8e92370e3af9542b77ccbfbde901e361ba5e0b95c6e4
b630edba1b6569cd1a4f2d899d9a6a7bc75951a6ff3261c69c493cd1332a4cf4
b89bf2837649ddee4db1c378ce5fce75f999da1308457aeb1e595ae33a0912c7
b97c99a69a6275c8f90703cd4c0864089a74fd08383a1cc75a8a4d0c2cb60cce
bd002adada90b672244a9e72b7904810cb0dc8f9ca1e73a9029f4714acee898d
c93a67b40b26249332d0efcf83ecd6ddea24677becaf88f4fe55a613a3a71032
ca63193ce799e4e00c9106349365981dc6e26cb77632ebf5df23dffba2aaccfa
d97b23d6d87a3947de8a9046de5e1bc4faa365ec3f480f8eb210329138c5837c
dca1ae93b9c0a595ca6470fda80b9628d455812f8ba2bef0cb29edebe4290633
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e56b6dce82361f24686a020ab9878f237aa58520022a3fdd6780548058f16465
e77b0b0105ef41fd666c7cc11965857031bdee400e9172c41ffe48b270580ae2
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
f17de407562ed5814892a1b44c6e349761f067cf6f2360ebe2aef4f03a5bea4e
f1db9263224e56deb92260d9f03afce188ab0c022e7218f21d99529c22266c9b
f32a5cb4de06a33d9c92e75f5a74c82a588b7a2c7dfe0a87b2550cfcf9a95729