Submitted URL: https://arstechnica.com/security/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Effective URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microso...
Submission: On December 19 via api from US

Summary

This website contacted 62 IPs in 8 countries across 40 domains to perform 220 HTTP transactions. The main IP is 50.31.169.131, located in Elk Grove Village, United States and belongs to SERVERCENTRAL - Server Central Network, US. The main domain is arstechnica.com.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on January 16th 2019. Valid for: 2 years.
This is the only time arstechnica.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 4 50.31.169.131 23352 (SERVERCEN...)
20 205.234.175.175 30081 (CACHENETW...)
7 2a00:1450:400... 15169 (GOOGLE)
3 99.84.93.101 16509 (AMAZON-02)
6 2.18.234.21 16625 (AKAMAI-AS)
12 2.18.235.40 16625 (AKAMAI-AS)
1 143.204.101.48 16509 (AMAZON-02)
3 143.204.101.27 16509 (AMAZON-02)
2 2606:4700::68... 13335 (CLOUDFLAR...)
3 151.139.128.10 20446 (HIGHWINDS3)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
9 172.217.16.194 15169 (GOOGLE)
2 2.18.234.190 16625 (AKAMAI-AS)
2 18.211.127.174 14618 (AMAZON-AES)
2 143.204.98.85 16509 (AMAZON-02)
1 54.76.0.5 16509 (AMAZON-02)
2 151.101.112.239 54113 (FASTLY)
1 3 35.190.59.101 15169 (GOOGLE)
2 35.201.67.47 15169 (GOOGLE)
5 2606:4700::68... 13335 (CLOUDFLAR...)
1 3.8.13.5 16509 (AMAZON-02)
3 2a00:1450:400... 15169 (GOOGLE)
5 2a00:1450:400... 15169 (GOOGLE)
6 152.195.132.202 15133 (EDGECAST)
16 54.173.157.53 14618 (AMAZON-AES)
1 2600:9000:215... 16509 (AMAZON-02)
1 23.210.248.65 16625 (AKAMAI-AS)
1 54.174.252.80 14618 (AMAZON-AES)
1 35.190.40.172 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 64.202.112.127 22075 (AS-OUTBRAIN)
1 52.4.170.229 14618 (AMAZON-AES)
2 3.209.40.151 14618 (AMAZON-AES)
1 2a00:1450:400... 15169 (GOOGLE)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 104.17.192.78 13335 (CLOUDFLAR...)
26 143.204.98.2 16509 (AMAZON-02)
1 178.250.2.130 44788 (ASN-CRITE...)
1 13.32.8.22 16509 (AMAZON-02)
1 63.32.144.14 16509 (AMAZON-02)
3 2a00:1450:400... 15169 (GOOGLE)
4 99.84.87.154 16509 (AMAZON-02)
2 52.203.142.184 14618 (AMAZON-AES)
1 151.101.114.2 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a03:2880:f0f... 32934 (FACEBOOK)
6 143.204.101.76 16509 (AMAZON-02)
1 50.31.142.127 22075 (AS-OUTBRAIN)
6 2.18.232.28 16625 (AKAMAI-AS)
4 34.194.193.74 14618 (AMAZON-AES)
1 216.58.207.66 15169 (GOOGLE)
1 2606:4700:10:... 13335 (CLOUDFLAR...)
1 35.244.174.68 15169 (GOOGLE)
2 69.173.144.140 26667 (RUBICONPR...)
8 20 152.199.21.89 15133 (EDGECAST)
2 178.250.2.152 44788 (ASN-CRITE...)
1 2a03:2880:f01... 32934 (FACEBOOK)
2 34.230.71.126 14618 (AMAZON-AES)
220 62
Apex Domain
Subdomains
Transfer
38 cloudfront.net
d1z2jf7jlzjs58.cloudfront.net
dwgyu36up6iuz.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
2 MB
25 condenastdigital.com
pixel.condenastdigital.com
capture.condenastdigital.com
infinityid.condenastdigital.com
4d.condenastdigital.com
wren.condenastdigital.com
22 KB
20 advertising.com
adserver-us.adtech.advertising.com
8 KB
20 arstechnica.net
cdn.arstechnica.net
758 KB
15 moatads.com
z.moatads.com
mb.moatads.com
px.moatads.com
v4.moatads.com
365 KB
11 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
pubads.g.doubleclick.net
95 KB
8 outbrainimg.com
tcheck.outbrainimg.com
log.outbrainimg.com
images.outbrainimg.com
45 KB
8 skimresources.com
s.skimresources.com
r.skimresources.com
t.skimresources.com
p.skimresources.com
17 KB
6 cookielaw.org
cdn.cookielaw.org
158 KB
5 google-analytics.com
www.google-analytics.com
19 KB
5 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
98 KB
5 polarcdn-terrax.com
polarcdn-terrax.com
8 KB
5 cnevids.com
player.cnevids.com
api.cnevids.com
63 KB
5 googletagservices.com
www.googletagservices.com
130 KB
4 casalemedia.com
as-sec.casalemedia.com
2 KB
4 outbrain.com
widgets.outbrain.com
odb.outbrain.com
mcdp-chidc2.outbrain.com
47 KB
4 google.com
adservice.google.com
ampcid.google.com
www.google.com
1 KB
4 arstechnica.com
arstechnica.com
16 KB
3 googleapis.com
imasdk.googleapis.com
116 KB
3 parsely.com
srv-2019-12-19-05.config.parsely.com
srv-2019-12-19-05.pixel.parsely.com
1 KB
3 google.de
adservice.google.de
ampcid.google.de
www.google.de
737 B
3 amazon-adsystem.com
c.amazon-adsystem.com
29 KB
2 criteo.com
bidder.criteo.com
290 B
2 rubiconproject.com
fastlane.rubiconproject.com
1 KB
2 facebook.net
connect.facebook.net
142 KB
2 polarcdn-pentos.com
polarcdn-pentos.com
675 B
2 mediavoice.com
cdn.mediavoice.com
plugin.mediavoice.com
127 KB
2 actionbutton.co
embed.actionbutton.co
prod-native.actionbutton.co
17 KB
2 indexww.com
js-sec.indexww.com
37 KB
1 facebook.com
an.facebook.com
1 KB
1 rlcdn.com
api.rlcdn.com
203 B
1 onetrust.com
geolocation.onetrust.com
452 B
1 2mdn.net
s0.2mdn.net
10 KB
1 adsrvr.org
match.adsrvr.org
536 B
1 rkdms.com
mid.rkdms.com
1 criteo.net
static.criteo.net
27 KB
1 polarcdn.com
static.polarcdn.com
121 KB
1 consensu.org
api.skimlinks.mgr.consensu.org
636 B
1 zqtk.net
segment-data.zqtk.net
491 B
1 googletagmanager.com
www.googletagmanager.com
71 KB
220 40
Domain Requested by
26 dwgyu36up6iuz.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
20 adserver-us.adtech.advertising.com 8 redirects
20 cdn.arstechnica.net arstechnica.com
16 capture.condenastdigital.com arstechnica.com
9 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
arstechnica.com
8 px.moatads.com arstechnica.com
6 images.outbrainimg.com arstechnica.com
6 dp8hsntg6do36.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
6 cdn.cookielaw.org www.googletagmanager.com
cdn.cookielaw.org
5 www.google-analytics.com www.googletagmanager.com
www.google-analytics.com
arstechnica.com
5 polarcdn-terrax.com cdn.mediavoice.com
plugin.mediavoice.com
static.polarcdn.com
arstechnica.com
5 www.googletagservices.com arstechnica.com
securepubads.g.doubleclick.net
4 as-sec.casalemedia.com js-sec.indexww.com
4 wren.condenastdigital.com cdn.arstechnica.net
4 d2c8v52ll5s99u.cloudfront.net player.cnevids.com
imasdk.googleapis.com
d2c8v52ll5s99u.cloudfront.net
4 z.moatads.com arstechnica.com
securepubads.g.doubleclick.net
d2c8v52ll5s99u.cloudfront.net
4 arstechnica.com 1 redirects arstechnica.com
cdn.arstechnica.net
3 imasdk.googleapis.com player.cnevids.com
imasdk.googleapis.com
3 tpc.googlesyndication.com securepubads.g.doubleclick.net
3 r.skimresources.com 1 redirects arstechnica.com
3 player.cnevids.com arstechnica.com
cdn.arstechnica.net
player.cnevids.com
3 c.amazon-adsystem.com arstechnica.com
c.amazon-adsystem.com
2 v4.moatads.com
2 bidder.criteo.com static.criteo.net
2 fastlane.rubiconproject.com js-sec.indexww.com
2 pagead2.googlesyndication.com arstechnica.com
2 connect.facebook.net d2c8v52ll5s99u.cloudfront.net
connect.facebook.net
2 srv-2019-12-19-05.pixel.parsely.com arstechnica.com
2 polarcdn-pentos.com static.polarcdn.com
2 4d.condenastdigital.com pixel.condenastdigital.com
2 p.skimresources.com arstechnica.com
2 t.skimresources.com arstechnica.com
s.skimresources.com
2 pixel.condenastdigital.com arstechnica.com
2 d1z2jf7jlzjs58.cloudfront.net arstechnica.com
d1z2jf7jlzjs58.cloudfront.net
2 api.cnevids.com cdn.arstechnica.net
2 widgets.outbrain.com cdn.arstechnica.net
widgets.outbrain.com
2 adservice.google.com www.googletagservices.com
imasdk.googleapis.com
2 js-sec.indexww.com arstechnica.com
1 an.facebook.com js-sec.indexww.com
1 api.rlcdn.com js-sec.indexww.com
1 geolocation.onetrust.com cdn.cookielaw.org
1 pubads.g.doubleclick.net d2c8v52ll5s99u.cloudfront.net
1 mcdp-chidc2.outbrain.com widgets.outbrain.com
1 s0.2mdn.net imasdk.googleapis.com
1 odb.outbrain.com widgets.outbrain.com
1 match.adsrvr.org js-sec.indexww.com
1 mid.rkdms.com js-sec.indexww.com
1 static.criteo.net js-sec.indexww.com
1 www.google.de arstechnica.com
1 www.google.com 1 redirects
1 stats.g.doubleclick.net 1 redirects
1 ampcid.google.de www.google-analytics.com
1 infinityid.condenastdigital.com pixel.condenastdigital.com
1 log.outbrainimg.com widgets.outbrain.com
1 static.polarcdn.com securepubads.g.doubleclick.net
1 ampcid.google.com www.google-analytics.com
1 api.skimlinks.mgr.consensu.org s.skimresources.com
1 srv-2019-12-19-05.config.parsely.com d1z2jf7jlzjs58.cloudfront.net
1 tcheck.outbrainimg.com widgets.outbrain.com
1 prod-native.actionbutton.co embed.actionbutton.co
1 mb.moatads.com z.moatads.com
1 plugin.mediavoice.com cdn.mediavoice.com
1 segment-data.zqtk.net arstechnica.com
1 adservice.google.de www.googletagservices.com
1 www.googletagmanager.com arstechnica.com
1 s.skimresources.com arstechnica.com
1 cdn.mediavoice.com arstechnica.com
1 embed.actionbutton.co arstechnica.com
220 68
Subject Issuer Validity Valid
*.arstechnica.com
Sectigo RSA Domain Validation Secure Server CA
2019-01-16 -
2021-01-15
2 years crt.sh
*.cachefly.net
GlobalSign RSA OV SSL CA 2018
2019-12-03 -
2021-10-29
2 years crt.sh
*.g.doubleclick.net
GTS CA 1O1
2019-11-13 -
2020-02-05
3 months crt.sh
c.amazon-adsystem.com
Amazon
2019-10-07 -
2020-09-29
a year crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2019-07-17 -
2020-03-09
8 months crt.sh
moatads.com
DigiCert ECC Secure Server CA
2018-11-10 -
2020-02-09
a year crt.sh
*.actionbutton.co
Go Daddy Secure Certificate Authority - G2
2019-06-25 -
2020-06-27
a year crt.sh
*.cnevids.com
Trusted Secure Certificate Authority 5
2017-01-10 -
2020-01-10
3 years crt.sh
ssl962336.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-11-12 -
2020-05-20
6 months crt.sh
*.skimresources.com
DigiCert SHA2 Secure Server CA
2018-09-13 -
2020-10-07
2 years crt.sh
*.google-analytics.com
GTS CA 1O1
2019-11-13 -
2020-02-05
3 months crt.sh
*.google.com
GTS CA 1O1
2019-11-13 -
2020-02-05
3 months crt.sh
*.outbrain.com
DigiCert SHA2 Secure Server CA
2018-12-14 -
2020-03-14
a year crt.sh
*.cloudfront.net
DigiCert Global CA G2
2019-07-17 -
2020-07-05
a year crt.sh
*.zqtk.net
COMODO RSA Domain Validation Secure Server CA
2018-08-09 -
2020-08-24
2 years crt.sh
condenast.com
GlobalSign CloudSSL CA - SHA256 - G3
2019-10-31 -
2020-08-07
9 months crt.sh
ssl446800.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-09-13 -
2020-03-21
6 months crt.sh
*.moatads.com
DigiCert SHA2 Secure Server CA
2019-03-12 -
2021-06-10
2 years crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2019-12-03 -
2020-02-25
3 months crt.sh
sa437gl.wpc.edgecastcdn.net
DigiCert SHA2 Secure Server CA
2018-05-17 -
2020-08-19
2 years crt.sh
*.outbrainimg.com
DigiCert SHA2 Secure Server CA
2019-02-24 -
2020-05-25
a year crt.sh
*.config.parsely.com
Amazon
2019-02-27 -
2020-03-27
a year crt.sh
api.skimlinks.mgr.consensu.org
DigiCert SHA2 Secure Server CA
2019-10-04 -
2021-10-07
2 years crt.sh
ssl962736.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-11-12 -
2020-05-20
6 months crt.sh
*.conde.io
Amazon
2019-06-03 -
2020-07-03
a year crt.sh
www.google.de
GTS CA 1O1
2019-12-03 -
2020-02-25
3 months crt.sh
ssl887612.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-08-29 -
2020-03-06
6 months crt.sh
*.criteo.net
DigiCert ECC Secure Server CA
2019-12-03 -
2021-04-06
a year crt.sh
*.rkdms.com
Entrust Certification Authority - L1K
2017-10-09 -
2020-10-30
3 years crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh
*.storage.googleapis.com
GTS CA 1O1
2019-11-13 -
2020-02-05
3 months crt.sh
*.pixel.parsely.com
Let's Encrypt Authority X3
2019-12-02 -
2020-03-01
3 months crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-07-30 -
2020-07-25
a year crt.sh
*.doubleclick.net
GTS CA 1O1
2019-12-03 -
2020-02-25
3 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-12-06 -
2020-03-05
3 months crt.sh
*.onetrust.com
DigiCert SHA2 Secure Server CA
2018-03-12 -
2020-06-14
2 years crt.sh
*.rlcdn.com
Sectigo RSA Domain Validation Secure Server CA
2019-04-24 -
2020-04-23
a year crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2019-01-10 -
2021-01-14
2 years crt.sh
*.adtech.advertising.com
DigiCert SHA2 High Assurance Server CA
2018-05-22 -
2020-05-26
2 years crt.sh
*.criteo.com
DigiCert ECC Secure Server CA
2019-12-05 -
2021-04-08
a year crt.sh

This page contains 12 frames:

Primary Page: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Frame ID: 3C1E69070AFBF3E59823ECD6D884908B
Requests: 184 HTTP requests in this frame

Frame: https://js-sec.indexww.com/um/ixmatch.html
Frame ID: A55501BD6D4E1E7006347580E8B6C7F3
Requests: 1 HTTP requests in this frame

Frame: https://t.skimresources.com/api/v2/robots.txt?__skimjs_preflight__please_ignore__=true&rnd=0.21625965785556245
Frame ID: 100816F0E879BB0C68DEDDF4E323552B
Requests: 1 HTTP requests in this frame

Frame: https://prod-native.actionbutton.co/?isNativeEmbed=true&4bbc65ed-2d94-4868-920f-c5147e96e904
Frame ID: 6BFAFE7404B2D1EA598FB5F9A9315DEE
Requests: 1 HTTP requests in this frame

Frame: https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Frame ID: 750BE4782B8A774195ACC5E454101E9E
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvkQyAXOerDkJKoUyEu-upEBlKQsT7EQzr-ARiu0dzcGxgQnZzP3Pxqh2qhhsSlCHY1OxJNEwnFNBTddLKV4SvTq6VRI7-jADRoiywFDD2YQuVEjUeDZPvfXCKkCyfpbIQ03tqy4H9fSAd6sw5oIQelEuB56Q8PmI23PWqI1EihGxE4qHHYGy3EdeMzliEW-umVqSu5hpV-AHdlhCb0BtlGwN6bUuX6qLrcRg-IFH4W_sDLZ1oK88RkqHguHwJocrjWU7A9HNQccd0-hXpUud791_ZnpthF7KMMKFp1bP5ISdlZJi44cl5Zjt1YDw&sai=AMfl-YSDQxJdpurJX14DOBGAKNoHmOfSfV0U8itb81ID9mzWOQGFZB-3ODB9CNj92dKmP5jY2N3nkBwrqeS0IyEEU2Fw4Zi_jZY97tGENOz5&sig=Cg0ArKJSzJ-QQuKYF0U9EAE&urlfix=1&adurl=
Frame ID: A8B10760694A3EC3D7920DBF41E70BDF
Requests: 7 HTTP requests in this frame

Frame: https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Frame ID: F58E1DF0E429934EB1678A4A773D9385
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: 5E2093BFD885CC7B3AF260C606AA6893
Requests: 27 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.355.3_en.html
Frame ID: 7296697C45C0248BF225BAB9F1FA10FA
Requests: 1 HTTP requests in this frame

Frame: https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Frame ID: 2C3E95D13F9F9F815FE606376635D779
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvGADQy-lSxVF8JYaXBNigcEWn6v0DAkp1q9HgZknGH_vjT3gXtlVtRNLHzmzLAboX0QhaK1FySd5Z9d5ZG2F23uNqVJ0uKbeOD63SXjZQsBFgDkPU5c7wKltG_ldo__QOp2IoEk1XSU70UcmGOefZEiHN4zlwIr-nGJVhWcBMZFIJdFXJa4yXHCN7XzwRMrHYlWUYpslKSLSO_OtuKoD8Fr62BUEJ9tFhZfbVWSjvfCVF0u5hqFIN3PG_ZgcWpHAU9KRYYanUB6kjCWzenbraK7BhD4etYWO7Wtu95vWaxP9ywLzQPcA&sig=Cg0ArKJSzGi9wWuzze8nEAE&urlfix=1&adurl=
Frame ID: A80C72278C050A7684B33AA0D3E128B9
Requests: 6 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjss8rToGEP-YIXc3Xi60Mb15eaXJ__AWj4pZ_MYQB9vqOqPnywJ5t1VpQVipGRALqXbBAYLSIZS2SsmzgZ6M-EduMmAy7nKF_2E53L0AaM1YQl0U9dQZEdex3U6nxIZnQfpXhBz_VcFWpQwhn0bTCP2qJd1rzCaoeImVmM--hY_AiOymaCf6QHJpcO-bg6uhVPnxLzCIJLMbDMUSb3a_hCIdy7JnNQdMs5V0BtXkfXBfZx_gOKXwujp8z8SX4ljHIqphr6fFiVJgTSBwzKv3hji9yX5nNqwFHuyqxMx3FVE88KrXudqOuw&sig=Cg0ArKJSzBFOpwUO0wcYEAE&urlfix=1&adurl=
Frame ID: F11E70FC4A100B1F0B34239C21109BDD
Requests: 6 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://arstechnica.com/security/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-m... HTTP 301
    https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-expl... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /googletagservices\.com\/tag\/js\/gpt(?:_mobile)?\.js/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<!-- (?:End )?Google Tag Manager -->/i

Page Statistics

220
Requests

99 %
HTTPS

32 %
IPv6

40
Domains

68
Subdomains

62
IPs

8
Countries

4146 kB
Transfer

10818 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://arstechnica.com/security/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/ HTTP 301
    https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 51
  • https://r.skimresources.com/api/ HTTP 307
  • https://r.skimresources.com/api/?xguid=01DWEB4WXRWVFFP0K75YW4CF04&persistence=1&checksum=f0ddc08327daf8d3216d198cf345d4d04b2ee7a035eb67c1029d27a3d7a0ebb6
Request Chain 90
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j79&tid=UA-31997-1&cid=1631964171.1576734455&jid=1686073417&gjid=852318580&_gid=1715468464.1576734455&_u=aChAgUAjAAQC~&z=1774473598 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1631964171.1576734455&jid=1686073417&_v=j79&z=1774473598 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1631964171.1576734455&jid=1686073417&_v=j79&z=1774473598&slf_rd=1&random=3951508123
Request Chain 209
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._Zv69l88G;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._Zv69l88G;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
Request Chain 210
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._irCmVfTI;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._irCmVfTI;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
Request Chain 217
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._rX8CjxhX;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._rX8CjxhX;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
Request Chain 218
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._Fd8XUgii;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._Fd8XUgii;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
Request Chain 221
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._Fd8XUgii;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1A1378944a-2223-11ea-8343-12bdedcc1230;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._Fd8XUgii;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
Request Chain 222
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._irCmVfTI;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1A13a03f04-2223-11ea-ad2d-1204ea82ed4e;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._irCmVfTI;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
Request Chain 223
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._rX8CjxhX;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1A13a1430e-2223-11ea-93c9-12eca44d2d72;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._rX8CjxhX;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
Request Chain 224
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._Zv69l88G;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1A137ac44a-2223-11ea-af32-12b295be6374;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._Zv69l88G;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA

220 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Redirect Chain
  • https://arstechnica.com/security/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
  • https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
46 KB
15 KB
Document
General
Full URL
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Elk Grove Village, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
cc881a1c83c4cd372211a0c74d8ae4a38e62f4aa5cae4da55fad019aad960aec
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
arstechnica.com
:scheme
https
:path
/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
sec-fetch-mode
navigate
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-User
?1

Response headers

status
200
server
nginx
date
Thu, 19 Dec 2019 05:47:34 GMT
content-type
text/html; charset=UTF-8
link
<https://arstechnica.com/wp-json/>; rel="https://api.w.org/"
strict-transport-security
max-age=300
x-content-type-options
nosniff
x-xss-protection
1; mode=block
x-frame-options
SAMEORIGIN
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
x-ars-server
web205
content-encoding
gzip

Redirect headers

status
301
server
nginx
date
Thu, 19 Dec 2019 05:47:33 GMT
content-type
text/html; charset=UTF-8
location
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
strict-transport-security
max-age=300
x-content-type-options
nosniff
x-xss-protection
1; mode=block
x-frame-options
SAMEORIGIN
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
x-ars-server
web205
main-af0123dfd5.css
cdn.arstechnica.net/wp-content/themes/ars/assets/css/
344 KB
72 KB
Stylesheet
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
3f5e07ec8bcc711b2a34aa1dfcc0d0637bf8050803243aa19d30fd43ad957c92

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1576519026:cacheN.ams1-01:H
status
200
content-length
72883
x-cf-tsc
1576519299
x-cf2
H
last-modified
Mon, 16 Dec 2019 17:45:29 GMT
server
CFS 0215
x-cff
B
etag
W/"5df7c2b9-5606b"
content-type
text/css
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
x-cf-rand
45.838
expires
Thu, 13 Feb 2020 05:47:34 GMT
gpt.js
www.googletagservices.com/tag/js/
51 KB
16 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
f213be31d540e30366635b474daedd9c0b46287d55429ec9ef7a4829361c6f01
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"371 / 687 of 1000 / last-modified: 1576520981"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
15827
x-xss-protection
0
expires
Thu, 19 Dec 2019 05:47:34 GMT
apstag.js
c.amazon-adsystem.com/aax2/
87 KB
25 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.84.93.101 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-99-84-93-101.muc50.r.cloudfront.net
Software
Server /
Resource Hash
0f144f16507d02eabc67a131e4d54ac36266dcfe3dac263a6971265371eff7b9

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 18 Dec 2019 16:30:18 GMT
content-encoding
gzip
server
Server
age
47836
etag
6bed68e25cc35021d570267b56047ef8
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=86400
x-amz-cf-pop
MUC50-C1
accept-ranges
bytes
x-amz-cf-id
0syUzCu47RNW29wn-RplsW0t21HYHkV25ENnb4Y7HZEnggQrhc4ptg==
via
1.1 39ed76664123c3090231ff0882467152.cloudfront.net (CloudFront)
183973-1558632223658.js
js-sec.indexww.com/ht/p/
129 KB
37 KB
Script
General
Full URL
https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
c17eff2bacde53ebca1ff1d5871b51abeee623069c48b92b05950a24f3e20ce9

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:47:35 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Dec 2019 05:45:15 GMT
Server
Apache
ETag
"90201a-20394-59a0810c19967"
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=3546
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
text/javascript
Content-Length
37347
Expires
Thu, 19 Dec 2019 06:46:41 GMT
moatheader.js
z.moatads.com/condenastprebidheader987326845656/
187 KB
66 KB
Script
General
Full URL
https://z.moatads.com/condenastprebidheader987326845656/moatheader.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
0eb438ad4233f9cdadd2cf6e5e3544a29b1e693a03f45b0b9fa25e70f2675917

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:47:34 GMT
Content-Encoding
gzip
Last-Modified
Tue, 29 Oct 2019 23:07:10 GMT
Server
AmazonS3
x-amz-request-id
EE440658F867C214
ETag
"36eff026ea983609efb74e7f83fac3f5"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=29523
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
67412
x-amz-id-2
YL9ogPz0mWBFOZthev9AeEKdbJpmm9pcgfLlY/H6675TxLi7xe45e7mSRBFYKnwFlZgbaSnvgx4=
ars-technica.min.js
cdn.arstechnica.net/cns/
134 KB
44 KB
Script
General
Full URL
https://cdn.arstechnica.net/cns/ars-technica.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
74f7fa7a78e8e51e919df7918f2d872881efca3e930835a1f7d55dfa079bbc21

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
x-cf3
H
x-amz-request-id
EB5EFB8DF7141FF3
x-cf1
14961:fB.ams1:co:1576089267:cacheN.ams1-01:H
status
200
content-length
44266
x-amz-id-2
rBsgiWaFuvQFzkIrCXZOH1WRGd9bORjDW3ymGUeOhx0SgRVFURe/cfxzQpFeNHJT9JiISUgHK0w=
x-cf-tsc
1576089270
cf4ttl
119.500
x-cf2
H
last-modified
Tue, 10 Dec 2019 17:18:43 GMT
server
CFS 0215
x-timer
S1576089270.597272,VS0,VE1
x-cff
B
etag
"ddc58829b26392a3b7d4ca435d8ade2e"
x-served-by
cache-dca17729-DCA
vary
Accept-Encoding
x-amz-version-id
KECwyyNnH9UBZqmHkq3UHIMjxhZ7ain2
access-control-allow-origin
*
expires
Fri, 20 Dec 2019 05:47:34 GMT
cache-control
max-age=86400
cf4age
2
accept-ranges
bytes
content-type
application/javascript
x-cf-rand
90.664
x-cache-hits
1
ars-bcfee6c82a.ads.us.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
4 KB
2 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/ars-bcfee6c82a.ads.us.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
032027ea92b8b014594b64b514f922a12029c27c3dc27e5c11b09eabfaf810c3

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1565891941:cacheN.ams1-01:H
status
200
content-length
1415
x-cf-tsc
1572377905
x-cf2
H
last-modified
Tue, 29 Oct 2019 19:37:29 GMT
server
CFS 0215
x-cff
B
etag
W/"5db894f9-e66"
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Thu, 13 Feb 2020 05:47:34 GMT
word-500x392.jpg
cdn.arstechnica.net/wp-content/uploads/2017/04/
43 KB
44 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2017/04/word-500x392.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
8da8c23d9bf300c6d309b03cb5678ebadb3b4754e3c081278dbb6f82cbcac094

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:M
status
200
content-length
44404
x-cf-tsc
1576734454
x-cf2
M
last-modified
Sat, 08 Apr 2017 20:06:36 GMT
server
CFS 0215
x-cff
B
etag
"58e942cc-ad74"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
6148
accept-ranges
bytes
x-cf-rand
37.266
expires
Thu, 13 Feb 2020 05:47:34 GMT
image1-300x98.png
cdn.arstechnica.net/wp-content/uploads/2017/04/
20 KB
21 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2017/04/image1-300x98.png
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
2c42115c0847de6030c95c350f66525b4311997d1911f4d887e8f1c991fcadcc

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:M
status
200
content-length
20764
x-cf-tsc
1576734454
x-cf2
M
last-modified
Sat, 08 Apr 2017 19:30:22 GMT
server
CFS 0215
x-cff
B
etag
"58e93a4e-511c"
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
x-cf-rand
73.970
expires
Thu, 13 Feb 2020 05:47:34 GMT
image2-300x99.png
cdn.arstechnica.net/wp-content/uploads/2017/04/
48 KB
49 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2017/04/image2-300x99.png
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
3b150a27981e05771154e8231d64b433239056246ef9ab87aa1573b115125980

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:M
status
200
content-length
49567
x-cf-tsc
1576734454
x-cf2
M
last-modified
Sat, 08 Apr 2017 19:30:51 GMT
server
CFS 0215
x-cff
B
etag
"58e93a6b-c19f"
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
x-cf-rand
57.830
expires
Thu, 13 Feb 2020 05:47:34 GMT
main-21927b84b8.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
662 KB
215 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-21927b84b8.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
994348f41972e42ce444fa51b3d2fe5fc1b07fe25771c3ca9add7d2f02208901

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1576518918:cacheN.ams1-01:H
status
200
content-length
219227
x-cf-tsc
1576519286
x-cf2
H
last-modified
Mon, 16 Dec 2019 17:45:29 GMT
server
CFS 0215
x-cff
B
etag
W/"5df7c2b9-a5753"
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
x-cf-rand
58.187
expires
Thu, 13 Feb 2020 05:47:34 GMT
widget.min.js
embed.actionbutton.co/widget/
53 KB
17 KB
Script
General
Full URL
https://embed.actionbutton.co/widget/widget.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.48 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-48.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
f9b84f2df9256c362df6f7eb8ca204830c81a25cec361bcff302e48e55fc15ce

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 18 Dec 2019 18:37:12 GMT
Content-Encoding
gzip
Last-Modified
Mon, 04 Nov 2019 18:33:48 GMT
Server
AmazonS3
Age
40223
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 24475cc722041223cf99f56b55432566.cloudfront.net (CloudFront)
Cache-Control
no-cache
Transfer-Encoding
chunked
X-Amz-Cf-Pop
FRA50-C1
Connection
keep-alive
X-Amz-Cf-Id
HmscXqf9tsde9HvTV8vaqKFvu1WSbk2w848X-E3l-4pLyjUZZJlnyQ==
topic_counts.php
arstechnica.com/civis/services/api/
26 B
26 B
Image
General
Full URL
https://arstechnica.com/civis/services/api/topic_counts.php?ids=1380143
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Elk Grove Village, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
nginx
x-frame-options
SAMEORIGIN
content-type
text/html; charset=UTF-8
status
200
strict-transport-security
max-age=300
x-ars-server
web205
x-xss-protection
1; mode=block
arstechnica.js
player.cnevids.com/interlude/
109 KB
28 KB
Script
General
Full URL
https://player.cnevids.com/interlude/arstechnica.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.27 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-27.fra50.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
02a9db289d960e3196e2269632ee772bbcb51333e9ab3503105ae7f3b1665062
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:46:35 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Amz-Cf-Pop
FRA50-C1
X-Cache
Hit from cloudfront
Status
200 OK
Connection
keep-alive
Content-Length
27527
X-XSS-Protection
1; mode=block
X-Request-Id
89b38240-0c5f-4210-a134-4285a3591777
X-Runtime
0.010589
X-Backend-Node
10.110.14.4
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"06d9140c43ace88c8b762d0a671836d5"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 f6c241b75ae7d21ac836339454ab90b8.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Id
UC4-CuTi3PTK16BPs-VS5RJNkXJ8VakueI2IUlWcU1X9mCc9Sv4aaQ==
conde-asa-polar-master.js
cdn.mediavoice.com/nativeads/script/condenastcorporate/
5 KB
2 KB
Script
General
Full URL
https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:da83 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
030e91b7512dbb40e9b9057f20bcf54c296a7f28c04bbcde0f2d2706dd2a3a06

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
cf-cache-status
HIT
age
2423
status
200
content-type
text/javascript
content-length
2018
via
1.1 varnish
server
cloudflare
cache-control
max-age=21600
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-varnish
1661635580 1661165417
x-country
DE
cf-ipcountry
DE
accept-ranges
bytes
cf-ray
54771524f9058cc2-VIE
100098X1555750.skimlinks.js
s.skimresources.com/js/
39 KB
15 KB
Script
General
Full URL
https://s.skimresources.com/js/100098X1555750.skimlinks.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
89a815ed46b2e278274ab7afd01d29be8dd6ef690f8e836ed26983203ca01e85

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
last-modified
Wed, 04 Dec 2019 10:32:06 GMT
server
AmazonS3
x-amz-request-id
250D04C06D3B4864
etag
"863b4482f1acdb75e20d34c1d77c0771"
x-hw
1576734454.cds003.wa1.hn,1576734454.cds006.wa1.c
content-type
application/octet-stream
status
200
cache-control
max-age=3600
accept-ranges
bytes
content-length
15223
x-amz-id-2
RTJ9y5L2WG5VylMSv+/xxrGrL7M7P54MasyPFVKNdttC6e0pAbnGg22dt2Q6EIO0kU1cPbJMFqU=
gtm.js
www.googletagmanager.com/
288 KB
71 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
0ab0c3c60a94c601dc0a963cc33a8679c737534c58598c8468cec58a3d6695b5
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
br
last-modified
Thu, 19 Dec 2019 03:00:00 GMT
server
Google Tag Manager
access-control-allow-origin
http://www.googletagmanager.com
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
content-length
72097
x-xss-protection
0
expires
Thu, 19 Dec 2019 05:47:34 GMT
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2019121002.js
securepubads.g.doubleclick.net/gpt/
163 KB
60 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
sffe /
Resource Hash
216fd62bccc74ef4e4d35292cd4874e7072a4fb30685afb6235d894a3ec1a2df
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 10 Dec 2019 17:29:18 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
60922
x-xss-protection
0
expires
Thu, 19 Dec 2019 05:47:34 GMT
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.84.93.101 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-99-84-93-101.muc50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
06b99248a163333e36980a6cfb756f1a7de60fa49517162b87b1a44d5d48f844

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com

Response headers

date
Wed, 18 Dec 2019 15:01:34 GMT
content-encoding
gzip
vary
Origin
age
53161
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Fri, 01 Nov 2019 13:46:13 GMT
server
AmazonS3
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/javascript
via
1.1 086da553b96e728b869925910597a098.cloudfront.net (CloudFront)
cache-control
public, max-age=86400
x-amz-cf-pop
MUC50-C1
x-amz-cf-id
2U6slkjnvtteFrWcI8XD4mOsjKK5JRL1uzJuv-kLZ7YBd3qICSylQg==
ads.js
arstechnica.com/hotzones/src/
0
517 B
XHR
General
Full URL
https://arstechnica.com/hotzones/src/ads.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Elk Grove Village, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
x-content-type-options
nosniff
last-modified
Wed, 18 Dec 2019 21:37:33 GMT
server
nginx
etag
"5dfa9c1d-0"
x-frame-options
SAMEORIGIN
content-type
application/javascript
status
200
content-length
0
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
strict-transport-security
max-age=300
accept-ranges
bytes
x-ars-server
web205
x-xss-protection
1; mode=block
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
78c8c364b438f0be81f1c51627902fda95b7aebdd2c04aee28c2f72cd4390207

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
357 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f95836cdd8c1af1d8261e8e198a4c1dd306e2b50ddc389fe820b56212a9cb17d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
economica-bold-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
25 KB
25 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-bold-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
5315cf641e62ac7de4a82e6003cc1bd1ff09218400d8ff5286c951e25aee966b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
25592
x-cf-tsc
1576519460
x-cf2
H
last-modified
Fri, 13 Dec 2019 21:18:36 GMT
server
CFS 0215
x-cff
B
etag
"5df4002c-63f8"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
33593
accept-ranges
bytes
x-cf-rand
18.257
expires
Thu, 13 Feb 2020 05:47:34 GMT
economica-regular-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-regular-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
c14a030b0b5ef06f710d9bbff164662d4b43c037e62f254aa6280504013caa34

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
24264
x-cf-tsc
1548820322
x-cf2
H
last-modified
Fri, 18 Jan 2019 16:37:54 GMT
server
CFS 0215
x-cff
B
etag
"5c4200e2-5ec8"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
41855
accept-ranges
bytes
expires
Thu, 13 Feb 2020 05:47:34 GMT
outbrain.js
widgets.outbrain.com/
109 KB
37 KB
Script
General
Full URL
https://widgets.outbrain.com/outbrain.js?_=1576734454547
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-21927b84b8.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.190 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-190.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cc0b53828870e1deb0a3be1884ba32174ab811c1a68fdc3522ef0d8b0fc51ceb

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:47:34 GMT
Content-Encoding
gzip
Last-Modified
Tue, 17 Dec 2019 16:18:19 GMT
Server
Apache
ETag
"f1b0442c239ca4172fad0ba46b4c99e4:1576601453"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=14400
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
37736
video_groups
api.cnevids.com/v1/
4 KB
1 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups?filters={%22channel_key%22:%22arstechnica%22}&pagesize=20&endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-21927b84b8.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.211.127.174 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-18-211-127-174.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
9f14529883aabaf69fd5def8146c294dfb581116e30c30348c437a10d2c1b8e3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:47:35 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
665
X-XSS-Protection
1; mode=block
X-Request-Id
9f99bf72-86bc-4227-bbae-144ef9a48baa
X-Runtime
0.001841
X-Backend-Node
10.110.126.151
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"6688b16d20ef165be68ad12690abea0c"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
p.js
d1z2jf7jlzjs58.cloudfront.net/
6 KB
3 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/p.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.85 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-85.fra50.r.cloudfront.net
Software
nginx /
Resource Hash
725913eab3460e2955a8ac4ec176f902c7d8d2db60757248b735cbf8698b0749

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 01:42:43 GMT
Content-Encoding
gzip
Age
14695
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Pragma
public
Last-Modified
Fri, 07 Mar 2014 00:45:07 GMT
Server
nginx
ETag
W/"53191693-19c1"
Content-Type
application/x-javascript
Via
1.1 baaf38f0a0d54e4834bf934fa5189ceb.cloudfront.net (CloudFront)
Cache-Control
max-age=86400, public
X-Amz-Cf-Pop
FRA50-C1
X-Amz-Cf-Id
xkwYfzfxc2DbQsQgt8mFeZgvAB9sQrQIIaA1U-zQN2BU4zl5XMjR1Q==
Expires
Thu, 19 Dec 2019 01:42:37 GMT
conde-nast
segment-data.zqtk.net/
507 B
491 B
Script
General
Full URL
https://segment-data.zqtk.net/conde-nast?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.76.0.5 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-76-0-5.eu-west-1.compute.amazonaws.com
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
a1c80cac2b1e1f39803c804443922b060b420ee938d0ee4b254fce9c7b7e390f

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:47:34 GMT
Content-Encoding
gzip
Last-Modified
Wed, 18 Dec 2019 17:01:54 GMT
Server
nginx/1.10.3 (Ubuntu)
Content-Type
application/javascript; charset=UTF-8
Connection
keep-alive
Content-Length
196
Expires
Thu, 19 Dec 2019 05:48:04 GMT
ixmatch.html
js-sec.indexww.com/um/ Frame A555
0
0
Document
General
Full URL
https://js-sec.indexww.com/um/ixmatch.html
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
js-sec.indexww.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/

Response headers

Server
Apache
Last-Modified
Mon, 19 Jun 2017 19:18:19 GMT
ETag
"e20015-112-55254ff6a1972"
Accept-Ranges
bytes
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Content-Type
text/html; charset=UTF-8
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
211
Date
Thu, 19 Dec 2019 05:47:34 GMT
Connection
keep-alive
ars-technica.config.js
pixel.condenastdigital.com/config/v2/production/
6 KB
2 KB
Script
General
Full URL
https://pixel.condenastdigital.com/config/v2/production/ars-technica.config.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.239 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
b8c4372ca59117502caeba7bb1417972a288bd5abc34ea866c5c04f02871dcb0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:47:34 GMT
Content-Encoding
gzip
Age
538528
Via
1.1 varnish, 1.1 varnish
X-Cache
HIT, HIT
X-Cache-Hits
1, 64
Connection
keep-alive
Content-Length
1029
x-amz-id-2
EEGchf0iLh19Z+5JHgRijUDDlXLD4DzXCbO8USh3qImYu35YKROtZ6wumlqo8cCauRYdGT6QXxc=
X-Served-By
cache-iad2151-IAD, cache-hhn4063-HHN
Last-Modified
Thu, 07 Nov 2019 15:13:43 GMT
Server
AmazonS3
X-Timer
S1576734455.642340,VS0,VE0
ETag
"ba03055adc90148c3e758315cc05b140"
Vary
Accept-Encoding
x-amz-request-id
380D82E9DD4C4533
Access-Control-Allow-Origin
*
Cache-Control
no-cache, public, max-age=604800
Accept-Ranges
bytes
Content-Type
application/javascript
Expires
Fri, 06 Dec 2019 06:11:41 GMT
truncated
/
279 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ecbfb541946a9a9437190a21d98e1c7ab7d863837d7d038a9a1e053c649c8ba

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
400 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6f261533d4b74ae931965cf3609bf47bb55001e39eb7029502d96cec73c4749a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
700 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ab499494548829e507e9b6cd57247a6cd565e7f1bc6eb55e3da445af76f1f0c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
49282a74c6ced31e99f808232188ade8d82652004df4d664dcdb98c32563dd39

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
841 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
039f13cdf684666dd973e2385f773385adb074039e8a832ec48e1ae35fb20c15

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
blockquote-afedeab761.svg
cdn.arstechnica.net/wp-content/themes/ars/assets/img/
419 B
756 B
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/img/blockquote-afedeab761.svg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
8edcf5bd609aef18638950de010699cd2765ef88aba3d019feb51a4271807662

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
419
x-cf-tsc
1576520412
x-cf2
H
last-modified
Fri, 13 Dec 2019 21:18:37 GMT
server
CFS 0215
x-cff
B
etag
"5df4002d-1a3"
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
4970
accept-ranges
bytes
x-cf-rand
97.085
expires
Thu, 13 Feb 2020 05:47:34 GMT
Dang.jpg
cdn.arstechnica.net/wp-content/uploads/2018/10/
90 KB
91 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2018/10/Dang.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
d6f350f62fc19bfd7091e3841649be70e806fb94c00a1f777dbed2ea8ecc9daa

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
92486
x-cf-tsc
1576565822
x-cf2
H
last-modified
Mon, 08 Oct 2018 19:35:22 GMT
server
CFS 0215
x-cff
B
etag
"5bbbb17a-16946"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
16899
accept-ranges
bytes
x-cf-rand
88.207
expires
Thu, 13 Feb 2020 05:47:34 GMT
channel-ars-be7bb52ba9.png
cdn.arstechnica.net/wp-content/themes/ars/assets/img/
5 KB
5 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/img/channel-ars-be7bb52ba9.png
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
08ed3bf6e73a999bafb422b878fb05b87269b00a65230c9457ce75aee10b873e

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
4809
x-cf-tsc
1548822260
x-cf2
H
last-modified
Fri, 18 Jan 2019 16:37:54 GMT
server
CFS 0215
x-cff
B
etag
"5c4200e2-12c9"
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
19
accept-ranges
bytes
expires
Thu, 13 Feb 2020 05:47:34 GMT
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c7f2558d7005dc61e343b6abb61a63da8ace760a0fdd45cb0cc124b0de5b4c2f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
18 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
62c7d2da9a5942053f17c9756e53b7cda414541619bd35c2b1441cd88c77f235

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4ec4b6769730ca98db1f40b152c52bd5bec01f61f559fb92709c307750388ac8

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
opensans-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
18 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
caa3854f28740fa98125ded826446ee4456379e8ad7c4ff46643347d1901506a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
18824
x-cf-tsc
1576519460
x-cf2
H
last-modified
Fri, 13 Dec 2019 21:18:37 GMT
server
CFS 0215
x-cff
B
etag
"5df4002d-4988"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
9180
accept-ranges
bytes
x-cf-rand
86.096
expires
Thu, 13 Feb 2020 05:47:34 GMT
bitter-italic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-italic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1193e934b76ed372f47e23f78f8a13e99d9588e564aff866e8f700e7a0650a83

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
24212
x-cf-tsc
1576519460
x-cf2
H
last-modified
Fri, 13 Dec 2019 21:18:36 GMT
server
CFS 0215
x-cff
B
etag
"5df4002c-5e94"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
33938
accept-ranges
bytes
x-cf-rand
44.001
expires
Thu, 13 Feb 2020 05:47:34 GMT
bitter-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
23 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
0186840386391fa2c0750ff7450a78e066498ba3274546a6fcf0fa9c55cd457c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
22872
x-cf-tsc
1548820322
x-cf2
H
last-modified
Fri, 18 Jan 2019 16:37:54 GMT
server
CFS 0215
x-cff
B
etag
"5c4200e2-5958"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
41855
accept-ranges
bytes
expires
Thu, 13 Feb 2020 05:47:34 GMT
opensans-semibold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1f9cd4a445ba85172da6090dd7b95edf55fd9e81ddb193e0b78093c1afa84378

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
18972
x-cf-tsc
1576519460
x-cf2
H
last-modified
Fri, 13 Dec 2019 21:18:37 GMT
server
CFS 0215
x-cff
B
etag
"5df4002d-4a1c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
5567
accept-ranges
bytes
x-cf-rand
80.463
expires
Thu, 13 Feb 2020 05:47:34 GMT
opensans-semibolditalic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibolditalic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
59201950b83489808587827b4050ffe0597992825daa88c227476cdbbf8ca282

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
20872
x-cf-tsc
1576519460
x-cf2
H
last-modified
Fri, 13 Dec 2019 21:18:37 GMT
server
CFS 0215
x-cff
B
etag
"5df4002d-5188"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
33592
accept-ranges
bytes
x-cf-rand
0.336
expires
Thu, 13 Feb 2020 05:47:34 GMT
opensans-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
86096831a70c72ac0c08f5e65ae92d98330d9fd2b7511dde65ff50b8a16bfd9a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
19516
x-cf-tsc
1548822260
x-cf2
H
last-modified
Fri, 18 Jan 2019 16:37:54 GMT
server
CFS 0215
x-cff
B
etag
"5c4200e2-4c3c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
42517
accept-ranges
bytes
expires
Thu, 13 Feb 2020 05:47:34 GMT
opensans-italic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-italic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
c46974d8f6030e4888708b18a5d9a32b25eb765a5708896e1899df449d87aab7

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
20748
x-cf-tsc
1576519460
x-cf2
H
last-modified
Fri, 13 Dec 2019 21:18:36 GMT
server
CFS 0215
x-cff
B
etag
"5df4002c-510c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
7282
accept-ranges
bytes
x-cf-rand
67.383
expires
Thu, 13 Feb 2020 05:47:34 GMT
bitter-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
22 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
807271433f80bb33654a84ec904035be3d2b34e505a051e3469a47fe39ccb752

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
22104
x-cf-tsc
1576519460
x-cf2
H
last-modified
Fri, 13 Dec 2019 21:18:36 GMT
server
CFS 0215
x-cff
B
etag
"5df4002c-5658"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
5567
accept-ranges
bytes
x-cf-rand
50.453
expires
Thu, 13 Feb 2020 05:47:34 GMT
/
r.skimresources.com/api/
Redirect Chain
  • https://r.skimresources.com/api/
  • https://r.skimresources.com/api/?xguid=01DWEB4WXRWVFFP0K75YW4CF04&persistence=1&checksum=f0ddc08327daf8d3216d198cf345d4d04b2ee7a035eb67c1029d27a3d7a0ebb6
0
-1 B
XHR
General
Full URL
https://r.skimresources.com/api/?xguid=01DWEB4WXRWVFFP0K75YW4CF04&persistence=1&checksum=f0ddc08327daf8d3216d198cf345d4d04b2ee7a035eb67c1029d27a3d7a0ebb6
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
via
1.1 google
server
openresty/1.11.2.5
access-control-allow-origin
https://arstechnica.com
location
//r.skimresources.com/api/?xguid=01DWEB4WXRWVFFP0K75YW4CF04&persistence=1&checksum=f0ddc08327daf8d3216d198cf345d4d04b2ee7a035eb67c1029d27a3d7a0ebb6
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
status
307
access-control-allow-credentials
true
content-type
text/html
alt-svc
clear
content-length
193

Redirect headers

date
Thu, 19 Dec 2019 05:47:34 GMT
via
1.1 google
server
openresty/1.11.2.5
status
307
location
//r.skimresources.com/api/?xguid=01DWEB4WXRWVFFP0K75YW4CF04&persistence=1&checksum=f0ddc08327daf8d3216d198cf345d4d04b2ee7a035eb67c1029d27a3d7a0ebb6
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
text/html
alt-svc
clear
content-length
193
robots.txt
t.skimresources.com/api/v2/ Frame 1008
0
105 B
Image
General
Full URL
https://t.skimresources.com/api/v2/robots.txt?__skimjs_preflight__please_ignore__=true&rnd=0.21625965785556245
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
206
date
Thu, 19 Dec 2019 05:47:34 GMT
via
1.1 google
server
Python/3.7 aiohttp/3.5.4
alt-svc
clear
content-length
0
content-type
text/plain charset=UTF-8
px.gif
p.skimresources.com/
43 B
488 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=1&rn=10.911158304110865
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
status
200
x-guploader-uploadid
AEnB2UpcUM9HqtOQXvkrZdErze-ssHJI9fYNF-cHfRCTwVfmem8KOXjuxJgKdhrI3GUDIwwxJ2q8EBmA4c41VQic0CQI1y7M1c4jvLe2qhjMx9Wwt7w_sfc
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1576734454.cds003.wa1.hn,1576734454.cds005.wa1.c
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
px.gif
p.skimresources.com/
43 B
107 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=2&rn=10.911158304110865
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
status
200
x-guploader-uploadid
AEnB2UpcUM9HqtOQXvkrZdErze-ssHJI9fYNF-cHfRCTwVfmem8KOXjuxJgKdhrI3GUDIwwxJ2q8EBmA4c41VQic0CQI1y7M1c4jvLe2qhjMx9Wwt7w_sfc
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1576734454.cds003.wa1.hn,1576734454.cds005.wa1.c
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
plugin.js
plugin.mediavoice.com/
337 KB
125 KB
Script
General
Full URL
https://plugin.mediavoice.com/plugin.js
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:da83 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
dad9e04af1a0939d530cab446a8b7c14ce1de7264b9e9e43f6fd43d4624cab71

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
cf-cache-status
HIT
age
27136
cf-ray
54771525c9798cc2-VIE
status
200
content-length
127463
via
1.1 varnish
x-varnish
1977959279 1977922539
last-modified
Tue, 17 Dec 2019 19:14:34 GMT
server
cloudflare
etag
W/"5df9291a-5431b"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=43200
access-control-allow-credentials
true
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Thu, 19 Dec 2019 07:14:39 GMT
condenastcorporate
polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/
181 B
604 B
XHR
General
Full URL
https://polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/condenastcorporate
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
6bd131d59efb6aa6a2d98ce4af498a811c84f74148129e140ff5a76904ca9f74

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com

Response headers

timing-allow-origin
*
date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
server
cloudflare
status
200
etag
W/"4ed41fc03a3c3b67ac78af86ee19d7f1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-Country, CF-Ray
cache-control
max-age=86400
x-country
DE
cf-ray
547715261cac599a-VIE
yi.js
mb.moatads.com/
1 KB
2 KB
Script
General
Full URL
https://mb.moatads.com/yi.js?ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&confidence=2&pcode=condenastprebidheader987326845656&callback=MoatNadoAllJsonpRequest_15521889
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/condenastprebidheader987326845656/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.8.13.5 London, United Kingdom, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-3-8-13-5.eu-west-2.compute.amazonaws.com
Software
TornadoServer/4.5.3 /
Resource Hash
9fc5993f86d39d0178f5f6b2ecb36c8542ff0272afda245d1a7d2c2d3e2cd87c

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
server
TornadoServer/4.5.3
etag
"f6fc5ae2ca1a4d1dd09c8b84dd0f940e5682a300"
content-type
text/html; charset=UTF-8
status
200
cache-control
max-age=900
timing-allow-origin
*
content-length
1524
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&t=1576734454710&de=353393266844&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatRendered=0&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=0&zMoatSafetyTargetingSet=0&zMoatEmptySlot=0&zMoatNadoDataLoadTime=Not%20Loaded&zMoatAllDataLoadTime=Not%20Loaded&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day&ac=1&bq=11&f=0&na=1108554773&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 19 Dec 2019 05:47:34 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 19 Dec 2019 05:47:34 GMT
ads
securepubads.g.doubleclick.net/gampad/
418 B
702 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3964567263106963&correlator=2964256094318075&output=ldjh&impl=fifs&adsid=NT&eid=21063635%2C21065138%2C21065310&vrg=2019121002&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20191219&iu_parts=3379%2Cconde.ars%2Cinterstitial%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=1x1&ists=1&prev_scp=pos%3Dinterstitial%26ctx_slot_type%3Dout_of_page%26ctx_slot_rn%3D0%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dout_of_page_0&eri=1&cust_params=amznbid%3D0%26amznp%3D0%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.31.8%26ctx_page_slug%3Dbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%26cnt_tags%3Dexploits%252Cmicrosoft-3%252Coffice%252Cvulnerabilities%252Cword%252Czeroday%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26m_data%3Dwaiting%26m_safety%3Dwaiting%26m_categories%3Dwaiting%26m_mv%3Dwaiting%26m_gv%3Dwaiting&cookie_enabled=1&bc=31&abxe=1&lmt=1576734454&dt=1576734454751&dlt=1576734454349&idt=348&frm=20&biw=1585&bih=1200&oid=3&adxs=0&adys=0&adks=2746652139&ucis=1&ifi=1&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&dssz=30&icsg=34403778560&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1585x1&msz=1585x1&ga_vid=1631964171.1576734455&ga_sid=1576734455&ga_hid=1531490670&fws=4&ohw=1585
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
15a21a0f49f15ccb9b41cd01b055f85de51f1c45d4ec76dbfaf04818c192c63f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
210
x-xss-protection
0
google-lineitem-id
-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2019121002.js
securepubads.g.doubleclick.net/gpt/
64 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
sffe /
Resource Hash
4c52ed8f9039265ffed7fdca0b967b2624325e6356433f437e044b0dd332cddf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 10 Dec 2019 17:29:18 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24811
x-xss-protection
0
expires
Thu, 19 Dec 2019 05:47:34 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

ads
securepubads.g.doubleclick.net/gampad/
5 KB
3 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3964567263106963&correlator=2964256094318075&output=ldjh&impl=fifs&adsid=NT&eid=21063635%2C21065138%2C21065310&vrg=2019121002&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20191219&iu_parts=3379%2Cconde.ars.native%2Clegacy%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=2x2&prev_scp=pos%3Dlegacy%26ctx_slot_type%3Dnative_xrail%26ctx_slot_rn%3D0%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dnative_xrail_0&eri=1&cust_params=amznbid%3D0%26amznp%3D0%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.31.8%26ctx_page_slug%3Dbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%26cnt_tags%3Dexploits%252Cmicrosoft-3%252Coffice%252Cvulnerabilities%252Cword%252Czeroday%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26m_data%3Dwaiting%26m_safety%3Dwaiting%26m_categories%3Dwaiting%26m_mv%3Dwaiting%26m_gv%3Dwaiting&cookie_enabled=1&bc=31&abxe=1&lmt=1576734454&dt=1576734454760&dlt=1576734454349&idt=348&frm=20&biw=1585&bih=1200&oid=3&adxs=1063&adys=786&adks=2072965525&ucis=2&ifi=2&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&dssz=31&icsg=8830496800768&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=300x0&msz=300x2&ga_vid=1631964171.1576734455&ga_sid=1576734455&ga_hid=1531490670&fws=516&ohw=300
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
f0006b5bc86dcb5e3ade2a4a1f0290cb487f070701f1e0cf3c144b051b3ce29c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2772
x-xss-protection
0
google-lineitem-id
5238066361
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138296703964
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
dbb67c620eaabf6679a314db18d3ae43037aef71ab27422e6feec08ee987cc0a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 19 Aug 2019 17:22:41 GMT
server
Golfe2
age
4437
date
Thu, 19 Dec 2019 04:33:37 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
17803
expires
Thu, 19 Dec 2019 06:33:37 GMT
otSDKStub.js
cdn.cookielaw.org/scripttemplates/
8 KB
3 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (ama/8AAA) /
Resource Hash
c2bdfd6b334593875cb7e009a4ae681f003edf8118a0ae5bb7568216ece5d1d2

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
content-md5
ZvfxeIlWENli6xTHjw4W5w==
x-cache
HIT
status
200
content-length
2682
x-ms-lease-status
unlocked
last-modified
Tue, 17 Dec 2019 20:41:29 GMT
server
ECAcc (ama/8AAA)
etag
0x8D783317E480778
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
b956e0f2-d01e-001b-5c25-b6f674000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Thu, 19 Dec 2019 09:47:34 GMT
/
r.skimresources.com/api/
152 B
460 B
XHR
General
Full URL
https://r.skimresources.com/api/?xguid=01DWEB4WXRWVFFP0K75YW4CF04&persistence=1&checksum=f0ddc08327daf8d3216d198cf345d4d04b2ee7a035eb67c1029d27a3d7a0ebb6
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
ef3aed5704402f54460852ede1dc9687c793422bfdb6d64fd00d5088707431b0
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
openresty/1.11.2.5
status
200
vary
Accept-Encoding
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&app=playerservice&cCh=videos%2Fshow&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pID=&sID=&uId=&xid=&_ts=2019-12-19T05%3A47%3A34.790Z&_c=error&_t=Interlude%20Insertion%20Error&dim1=%7B%22interludeFailure%22%3A%22unsupported%20template%22%2C%22pageTemplate%22%3A%22article%7Creport%22%2C%22url%22%3A%22information-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%22%7D&dim3=Availability%3A%20unsupported%20template
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 19 Dec 2019 05:47:35 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
/
prod-native.actionbutton.co/ Frame 6BFA
0
0
Document
General
Full URL
https://prod-native.actionbutton.co/?isNativeEmbed=true&4bbc65ed-2d94-4868-920f-c5147e96e904
Requested by
Host: embed.actionbutton.co
URL: https://embed.actionbutton.co/widget/widget.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:ce00:11:8cf6:b500:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash

Request headers

:method
GET
:authority
prod-native.actionbutton.co
:scheme
https
:path
/?isNativeEmbed=true&4bbc65ed-2d94-4868-920f-c5147e96e904
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/

Response headers

status
200
content-type
text/html
date
Tue, 17 Dec 2019 18:59:11 GMT
last-modified
Tue, 17 Dec 2019 18:58:58 GMT
cache-control
max-age=31536000,public
server
AmazonS3
content-encoding
gzip
vary
Accept-Encoding
x-cache
Hit from cloudfront
via
1.1 055d899361491602a9ef1eb0cdc5e337.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA50-C1
x-amz-cf-id
coUMIQwa4WqCbhT02uMo8RLJVTalaA-LQozTbORf3aeGgOd-ZzF5Cg==
age
125304
sparrow.min.js
pixel.condenastdigital.com/
38 KB
14 KB
Script
General
Full URL
https://pixel.condenastdigital.com/sparrow.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.239 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1dc3900687fb65b292f1e210c5fe7a931938516ab318c529e5a97433462cb7bc

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:47:34 GMT
Content-Encoding
gzip
Age
27617
Via
1.1 varnish, 1.1 varnish
X-Cache
HIT, HIT
X-Cache-Hits
1, 541
Connection
keep-alive
Content-Length
13257
x-amz-id-2
vf6gNMpMA++XXQzC6rvTwyrkJUmwCILPrImZKtomr84UhzC/j5ZMFJICYyuXSwNJn5xnGsq13FM=
X-Served-By
cache-iad2142-IAD, cache-hhn4063-HHN
Last-Modified
Wed, 20 Nov 2019 22:07:21 GMT
Server
AmazonS3
X-Timer
S1576734455.809822,VS0,VE0
ETag
"dc39378d5b3f7ed533d42c4765bc2eae"
Vary
Accept-Encoding
x-amz-request-id
26C5BF0665EAC459
Access-Control-Allow-Origin
*
Cache-Control
no-cache, public, max-age=604800
Accept-Ranges
bytes
Content-Type
application/javascript
Expires
Thu, 21 Nov 2019 04:07:20 GMT
YXJzdGVjaG5pY2EuY29t
tcheck.outbrainimg.com/tcheck/check/
16 B
476 B
XHR
General
Full URL
https://tcheck.outbrainimg.com/tcheck/check/YXJzdGVjaG5pY2EuY29t
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1576734454547
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.248.65 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-248-65.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
929701ed632814943e3df803ddd9e3f179ccf889c0ad7b7f3392bd8d109b174f
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
ETag
W/"10-us8lSJutAxKqLzf8c1+n5XstcwY"
Access-Control-Max-Age
43200
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=6815
Date
Thu, 19 Dec 2019 05:47:34 GMT
Connection
keep-alive
Access-Control-Allow-Credentials
false
Content-Length
16
Expires
Thu, 19 Dec 2019 07:41:09 GMT
arstechnica.com
srv-2019-12-19-05.config.parsely.com/config/
419 B
837 B
Script
General
Full URL
https://srv-2019-12-19-05.config.parsely.com/config/arstechnica.com
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.174.252.80 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-174-252-80.compute-1.amazonaws.com
Software
/ Express
Resource Hash
dd09613aa8c9e281f7bb772fd2ae9f70634ab08f4fb03a6292619487b1e624d7

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:47:35 GMT
Cache-Control
private, no-cache
Connection
keep-alive
X-Powered-By
Express
ETag
W/"1a3-2iezmW19w6pXWSFlPF1Qdg"
Content-Length
419
Content-Type
text/javascript; charset=utf-8
iab
api.skimlinks.mgr.consensu.org/
772 B
636 B
XHR
General
Full URL
https://api.skimlinks.mgr.consensu.org/iab?nocache=1576734454844
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.40.172 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
172.40.190.35.bc.googleusercontent.com
Software
nginx/1.14.0 /
Resource Hash
4898c2b9f8c2f931ef6a819d36e0019867931d9519af933ab4bd5edce724b2a8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
nginx/1.14.0
access-control-allow-headers
*
status
200
vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, DELETE, OPTIONS
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
/
polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/ Frame 750B
0
0
Document
General
Full URL
https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Requested by
Host: plugin.mediavoice.com
URL: https://plugin.mediavoice.com/plugin.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
polarcdn-terrax.com
:scheme
https
:path
/privacy/v1.0.0/html/optout/readwrite/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Thu, 19 Dec 2019 05:47:34 GMT
content-type
text/html; charset=utf-8
content-length
1242
set-cookie
__cfduid=d81af57519af203f0c4974726536d82f71576734454; expires=Sat, 18-Jan-20 05:47:34 GMT; path=/; domain=.polarcdn-terrax.com; HttpOnly; SameSite=Lax
vary
Accept-Encoding
access-control-allow-headers
Authorization
access-control-expose-headers
CF-IPCountry, X-Country, CF-Ray
cache-control
max-age=900
access-control-allow-origin
*
access-control-allow-methods
GET
timing-allow-origin
*
content-encoding
gzip
x-varnish
1814511931 1814496667
via
1.1 varnish
cf-cache-status
HIT
age
640
accept-ranges
bytes
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
5477152728f18caa-VIE
linkid.js
www.google-analytics.com/plugins/ua/
2 KB
1014 B
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/linkid.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
92fca55833f48b4289ac8f1cedd48752b580fce4ec4b5d81670b8193d6e51b54
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:38:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 22 Oct 2019 18:15:00 GMT
server
sffe
age
523
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
859
x-xss-protection
0
expires
Thu, 19 Dec 2019 06:38:51 GMT
publisher:getClientId
ampcid.google.com/v1/
74 B
528 B
XHR
General
Full URL
https://ampcid.google.com/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
991bfe84fec788f2b7d432b99a60c1e2aa2e799bc0137da8cf478299d0fc9a10
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
94
x-xss-protection
0
view
securepubads.g.doubleclick.net/pcs/ Frame A8B1
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvkQyAXOerDkJKoUyEu-upEBlKQsT7EQzr-ARiu0dzcGxgQnZzP3Pxqh2qhhsSlCHY1OxJNEwnFNBTddLKV4SvTq6VRI7-jADRoiywFDD2YQuVEjUeDZPvfXCKkCyfpbIQ03tqy4H9fSAd6sw5oIQelEuB56Q8PmI23PWqI1EihGxE4qHHYGy3EdeMzliEW-umVqSu5hpV-AHdlhCb0BtlGwN6bUuX6qLrcRg-IFH4W_sDLZ1oK88RkqHguHwJocrjWU7A9HNQccd0-hXpUud791_ZnpthF7KMMKFp1bP5ISdlZJi44cl5Zjt1YDw&sai=AMfl-YSDQxJdpurJX14DOBGAKNoHmOfSfV0U8itb81ID9mzWOQGFZB-3ODB9CNj92dKmP5jY2N3nkBwrqeS0IyEEU2Fw4Zi_jZY97tGENOz5&sig=Cg0ArKJSzJ-QQuKYF0U9EAE&urlfix=1&adurl=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 19 Dec 2019 05:47:34 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Thu, 19 Dec 2019 05:47:34 GMT
creative.js
static.polarcdn.com/creative/ Frame A8B1
319 KB
121 KB
Script
General
Full URL
https://static.polarcdn.com/creative/creative.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:f87e , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
6a2ea00aa7769759e4452740d1bb6fb4c53ffb2dd496c64e58e17b1799566e60

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
cf-cache-status
HIT
age
5531
status
200
cf-ipcountry
DE
content-length
122721
via
1.1 varnish
timing-allow-origin
*
x-varnish
1211481853 1211481845
last-modified
Wed, 18 Dec 2019 22:15:20 GMT
server
cloudflare
etag
W/"5dfaa4f8-4fad8"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
content-type
application/javascript
access-control-allow-origin
*
access-control-expose-headers
CF-IPCountry
cache-control
max-age=10800
access-control-allow-credentials
true
accept-ranges
bytes
cf-ray
547715279adecbbc-VIE
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Thu, 19 Dec 2019 07:15:22 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame A8B1
77 KB
29 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
44178919accac2fd92f71084d312c8ff266dd25b8b808f8e9b32fe2926aefb41
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1575654529893506"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
29272
x-xss-protection
0
expires
Thu, 19 Dec 2019 05:47:34 GMT
osd.js
www.googletagservices.com/activeview/js/current/
78 KB
29 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
63890326f558587b0840eb0a6e6377f1bf39264e015e568f4c2a03aefce3f929
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1575654529893506"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
29463
x-xss-protection
0
expires
Thu, 19 Dec 2019 05:47:34 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&t=1576734454710&de=353393266844&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatRendered=0&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=0&zMoatSafetyTargetingSet=0&zMoatEmptySlot=0&zMoatNadoDataLoadTime=Not%20Loaded&zMoatAllDataLoadTime=Not%20Loaded&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day&ac=1&bq=11&f=0&zn=0&na=209415822&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 19 Dec 2019 05:47:34 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 19 Dec 2019 05:47:34 GMT
dwce_cheq_events
log.outbrainimg.com/loggerServices/
4 B
344 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/dwce_cheq_events?timestamp=1576734454902&sessionId=e549890e-5c7a-1ce8-1941-19d5cbfc035f&url=arstechnica.com&cheqSource=1&cheqEvent=0&exitReason=2
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1576734454547
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.202.112.127 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com

Response headers

Pragma
no-cache
Date
Thu, 19 Dec 2019 05:47:35 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
X-TraceId
5c5d34d9ca738ef335d51e677f1d9465
Content-Length
4
Expires
0
bid
c.amazon-adsystem.com/e/dtb/
23 B
370 B
XHR
General
Full URL
https://c.amazon-adsystem.com/e/dtb/bid?src=3035&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pid=bVrCkcpp44sph&cb=0&ws=1600x1200&v=7.45.00&t=1000&slots=%5B%7B%22sd%22%3A%220%22%2C%22s%22%3A%5B%22728x90%22%2C%22970x250%22%5D%2C%22sn%22%3A%22hero%2Fdesktop%22%7D%2C%7B%22sd%22%3A%221%22%2C%22s%22%3A%5B%22300x250%22%2C%22300x600%22%5D%2C%22sn%22%3A%22rail%2Fdesktop%22%7D%5D&pj=%7B%22si_section%22%3A%22information-technology%22%7D&cfgv=0&gdprl=%7B%22status%22%3A%22cmp-timeout%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.84.93.101 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-99-84-93-101.muc50.r.cloudfront.net
Software
Server /
Resource Hash
745a085b52b8371ec6705413fca70a28c6d8bff0db480e6b124bd08c54e95ef8

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
via
1.1 39ed76664123c3090231ff0882467152.cloudfront.net (CloudFront)
server
Server
x-amz-cf-pop
MUC50-C1
status
200
vary
User-Agent
x-cache
Miss from cloudfront
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
timing-allow-origin
*
content-length
23
x-amz-cf-id
r9i5hX_fLircdt49dK7z5ljnjrlYXQS-AGvHxd6UJ71E3OLrZFx-iA==
/
infinityid.condenastdigital.com/
36 B
1 KB
XHR
General
Full URL
https://infinityid.condenastdigital.com/?rand=1576734454908
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.4.170.229 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-4-170-229.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
43eb46c76bbcf9ea9bf06ace0aabfcec8c79ed358d4733378e0083655b227664

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:47:35 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
transfer-encoding
chunked
content
4d.condenastdigital.com/
4 KB
2 KB
XHR
General
Full URL
https://4d.condenastdigital.com/content?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.209.40.151 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-3-209-40-151.compute-1.amazonaws.com
Software
/
Resource Hash
52c1c39777a9c4cfe7a4554624fc8bb8907c4a86483365d23658ce0c4e211507

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:47:35 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-12-19T05%3A47%3A34.909Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=exploits%7Cmicrosoft%7Coffice%7Cvulnerabilities%7CWord%7Czeroday&cCh=information%20technology&cTi=Booby-trapped%20Word%20documents%20in%20the%20wild%20exploit%20critical%20Microsoft%200-day&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&cCl=749&cId=1074069&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day&pRt=referral&pHp=%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4400&pSw=1600&pSh=1200&uID=880272b7-97c7-46cd-bb41-a5d3d98ce114&uNw=1&uUq=1&sID=798b2d0d-8f7f-47aa-b9d0-65db1b0cabd3&pID=cd29b53c-2016-4f75-8662-50a55f84b89f&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Finterstitial%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3Anull%2C%22campaignId%22%3Anull%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22_out_of_page_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Atrue%2C%22isFirstRequested%22%3Atrue%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22exploits%22%2C%22microsoft-3%22%2C%22office%22%2C%22vulnerabilities%22%2C%22word%22%2C%22zeroday%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22out_of_page_0%22%2C%22outOfPage%22%3Atrue%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%221x1%22%2C%22slug%22%3A%22booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%22%7D&dim3=%7B%22footerStart%22%3A1576734454504%2C%22headerStart%22%3A1576734454487%2C%22navigationStart%22%3A1576734453666%2C%22pubAdsReady%22%3A1576734454702%2C%22injected%22%3A1576734454895%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22interstitial%22%5D%2C%22ctx_slot_type%22%3A%5B%22out_of_page%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22out_of_page_0%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%22%5D%2C%22cnt_tags%22%3A%5B%22exploits%22%2C%22microsoft-3%22%2C%22office%22%2C%22vulnerabilities%22%2C%22word%22%2C%22zeroday%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22m_data%22%3A%5B%22waiting%22%5D%2C%22m_safety%22%3A%5B%22waiting%22%5D%2C%22m_categories%22%3A%5B%22waiting%22%5D%2C%22m_mv%22%3A%5B%22waiting%22%5D%2C%22m_gv%22%3A%5B%22waiting%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22131100%22%2C%22121100%22%2C%22112200%22%2C%22210000%22%2C%22240000%22%2C%22240003%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22_EBB19Z6KkgL_%22%5D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 19 Dec 2019 05:47:35 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-12-19T05%3A47%3A34.914Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=exploits%7Cmicrosoft%7Coffice%7Cvulnerabilities%7CWord%7Czeroday&cCh=information%20technology&cTi=Booby-trapped%20Word%20documents%20in%20the%20wild%20exploit%20critical%20Microsoft%200-day&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&cCl=749&cId=1074069&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day&pRt=referral&pHp=%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4400&pSw=1600&pSh=1200&uID=880272b7-97c7-46cd-bb41-a5d3d98ce114&sID=798b2d0d-8f7f-47aa-b9d0-65db1b0cabd3&pID=cd29b53c-2016-4f75-8662-50a55f84b89f&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars.native%2Flegacy%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4552798968%2C%22campaignId%22%3A2628350052%2C%22creativeId%22%3A138296703964%2C%22elementId%22%3A%22native_xrail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Atrue%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22exploits%22%2C%22microsoft-3%22%2C%22office%22%2C%22vulnerabilities%22%2C%22word%22%2C%22zeroday%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A5238066361%2C%22name%22%3A%22native_xrail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%222x2%22%2C%22slug%22%3A%22booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%22%7D&dim3=%7B%22footerStart%22%3A1576734454504%2C%22headerStart%22%3A1576734454487%2C%22navigationStart%22%3A1576734453666%2C%22pubAdsReady%22%3A1576734454702%2C%22injected%22%3A1576734454897%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22legacy%22%5D%2C%22ctx_slot_type%22%3A%5B%22native_xrail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22native_xrail_0%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%22%5D%2C%22cnt_tags%22%3A%5B%22exploits%22%2C%22microsoft-3%22%2C%22office%22%2C%22vulnerabilities%22%2C%22word%22%2C%22zeroday%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22m_data%22%3A%5B%22waiting%22%5D%2C%22m_safety%22%3A%5B%22waiting%22%5D%2C%22m_categories%22%3A%5B%22waiting%22%5D%2C%22m_mv%22%3A%5B%22waiting%22%5D%2C%22m_gv%22%3A%5B%22waiting%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22131100%22%2C%22121100%22%2C%22112200%22%2C%22210000%22%2C%22240000%22%2C%22240003%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22_EBB19Z6KkgL_%22%5D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 19 Dec 2019 05:47:35 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
b10882a1-8446-4e7d-bfb2-ce2c770ad910.json
cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910/
1 MB
49 KB
XHR
General
Full URL
https://cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910/b10882a1-8446-4e7d-bfb2-ce2c770ad910.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (ama/8AC1) /
Resource Hash
4b4ff0e0e2e27b45d1515bc4205b148f1fd2d373bbffcc039b11b9a7bddeb4a2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com

Response headers

x-ms-blob-type
BlockBlob
date
Thu, 19 Dec 2019 05:47:42 GMT
content-encoding
gzip
content-md5
YSaxnHrB00dkvIUp5Fjtiw==
x-cache
HIT
status
200
content-length
49502
x-ms-lease-status
unlocked
last-modified
Thu, 05 Dec 2019 20:59:21 GMT
server
ECAcc (ama/8AC1)
etag
0x8D779C600532F25
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
724a17d3-901e-013a-162a-b6dd10000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Thu, 19 Dec 2019 09:47:42 GMT
publisher:getClientId
ampcid.google.de/v1/
3 B
457 B
XHR
General
Full URL
https://ampcid.google.de/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Thu, 19 Dec 2019 05:47:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
23
x-xss-protection
0
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1576734454710&de=353393266844&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=_out_of_page_0&zMoatRendered=1&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=1&zMoatSafetyTargetingSet=1&zMoatEmptySlot=1&zMoatNadoDataLoadTime=Not%20Loaded&zMoatAllDataLoadTime=Not%20Loaded&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day&ac=1&bq=11&f=0&zn=0&na=166317224&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 19 Dec 2019 05:47:34 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 19 Dec 2019 05:47:34 GMT
collect
www.google-analytics.com/
35 B
102 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j79&a=1531490670&t=pageview&_s=1&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&dr=%2F&dp=%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&ul=en-us&de=UTF-8&dt=Booby-trapped%20Word%20documents%20in%20the%20wild%20exploit%20critical%20Microsoft%200-day%20%7C%20Ars%20Technica&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=aChAgUAjAAQC~&jid=1686073417&gjid=852318580&cid=1631964171.1576734455&tid=UA-31997-1&_gid=1715468464.1576734455&gtm=2wgc61NLXNPCQ&cg1=article%7Creport&cg2=information-technology&cg3=information%20technology&cd1=GTM-NLXNPCQ&cd2=151&cd4=&cd6=Thu%20Dec%2019%202019%2006%3A47%3A34%20GMT%2B0100%20(Central%20European%20Standard%20Time)&cd7=1576734454770.f2qym5u&cd8=-1&cd9=Mozilla%2F5.0%20(Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F74.0.3729.169%20Safari%2F537.36&cd10=English&cd11=desktop&cd12=0&cd13=Tag%20Name%3A%20GA%20-%20Pageview%20-%20Core%20Pageview%20-%20All%20Pages&cd20=none&cd25=Dan%20Goodin&cd26=1074069&cd27=749&cd28=Booby-trapped%20Word%20documents%20in%20the%20wild%20exploit%20critical%20Microsoft%200-day&cd29=web&cd32=2017-04-08T20%3A00%3A41%2B00%3A00&cd34=2017-04-11T21%3A13%3A02%2B00%3A00&cd35=exploits%7Cmicrosoft%7Coffice%7Cvulnerabilities%7CWord%7Czeroday&cd36=web&cd43=Ars%20Technica&cd45=Adblock%20Enabled%20-%20false&cd62=https%3A%2F%2Farstechnica.com%2F%3Fp%3D1074069&cd63=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&cd65=&cd72=1.0.0&cd92=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&cd93=information%20technology&cd98=article%7Creport&cd103=&cd113=data-layer-loaded&cd3=1631964171.1576734455&z=1572282926
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 21 Nov 2019 17:55:23 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
2375532
content-type
image/gif
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
no-cache, no-store, must-revalidate
access-control-allow-origin
*
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j79&tid=UA-31997-1&cid=1631964171.1576734455&jid=1686073417&gjid=852318580&_gid=1715468464.1576734455&_u=aChAgUAjAAQC~&z=1774473598
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1631964171.1576734455&jid=1686073417&_v=j79&z=1774473598
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1631964171.1576734455&jid=1686073417&_v=j79&z=1774473598&slf_rd=1&random=3951508123
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1631964171.1576734455&jid=1686073417&_v=j79&z=1774473598&slf_rd=1&random=3951508123
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:35 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:35 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1631964171.1576734455&jid=1686073417&_v=j79&z=1774473598&slf_rd=1&random=3951508123
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1576734454710&de=353393266844&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=native_xrail_0&zMoatRendered=2&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=2&zMoatSafetyTargetingSet=2&zMoatEmptySlot=1&zMoatNadoDataLoadTime=Not%20Loaded&zMoatAllDataLoadTime=Not%20Loaded&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day&ac=1&bq=11&f=0&zn=0&na=1488524226&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 19 Dec 2019 05:47:35 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 19 Dec 2019 05:47:35 GMT
/
polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/ Frame F58E
0
0
Document
General
Full URL
https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
polarcdn-terrax.com
:scheme
https
:path
/privacy/v1.0.0/html/optout/readwrite/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Thu, 19 Dec 2019 05:47:35 GMT
content-type
text/html; charset=utf-8
content-length
1242
set-cookie
__cfduid=d857352c7dd09f07f631df4b22778356a1576734455; expires=Sat, 18-Jan-20 05:47:35 GMT; path=/; domain=.polarcdn-terrax.com; HttpOnly; SameSite=Lax
vary
Accept-Encoding
access-control-allow-headers
Authorization
access-control-expose-headers
CF-IPCountry, X-Country, CF-Ray
cache-control
max-age=900
access-control-allow-origin
*
access-control-allow-methods
GET
timing-allow-origin
*
content-encoding
gzip
x-varnish
1814511931 1814496667
via
1.1 varnish
cf-cache-status
HIT
age
641
accept-ranges
bytes
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
54771528197f8caa-VIE
wt
polarcdn-pentos.com/ Frame A8B1
3 B
609 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=1&n=3&p=UNKNOWN&s=1&u=a2e31b09-ba44-4132-af51-9602cc850b7b&v=2%2F4d32dbc&w=1.176.0&y=w&z=v1.6.48&pas=asa-web&pag2=%2F3379%2Fconde.ars.native%2Flegacy&pai=5db2c&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&paio=1&pasb=1&cu=dbc6ea2c3108f81ab8520694b37ffd9d&t=arx&parcid=05a19&parid=352ce&parin=1&partm=1&par=s&maxts=0.008&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&_=1576734455015
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:35 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
age
27916
cf-ray
5477152c2d37c761-AMS
status
200
content-length
3
x-amz-id-2
ssrP9l3tvTXZZBWksQNWxHw0gv2xKEdv+31+lfuAri9mHXrgqXnm6uZ4Mc2picsnk68BLczbXHI=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
x-amz-request-id
712B38668B68D611
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
content-type
application/octet-stream
89dad9716ebf4e0688e5902095a15582
polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/creative/ Frame A8B1
15 KB
4 KB
XHR
General
Full URL
https://polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/creative/89dad9716ebf4e0688e5902095a15582
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
56b137c1dae0b5a7f0ee0e19c3651d9fecb1b022da58bedc0dd7d48503d0beec

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 19 Dec 2019 05:47:35 GMT
content-encoding
gzip
server
cloudflare
status
200
etag
W/"6ae6f999947a0bc24d0043face4213c6"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-Country, CF-Ray
cache-control
max-age=900
x-country
DE
cf-ray
547715283e4b599a-VIE
truncated
/ Frame A8B1
212 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
63ef8b2be8f4bb6fb3b398aa9dcee34c3945b8e6ee173282ee01ba2e5daee882

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
5b27ee7e8c1abc4e7900000f
api.cnevids.com/v1/video_groups/
54 KB
10 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups/5b27ee7e8c1abc4e7900000f?endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-21927b84b8.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.211.127.174 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-18-211-127-174.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
a386009b7010441f046b87ba766f8bde37ecf242d35bab76de81e8242573aaa9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:47:35 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
9302
X-XSS-Protection
1; mode=block
X-Request-Id
4340434e-a602-436a-b42e-4812964fd04a
X-Runtime
0.003077
X-Backend-Node
10.110.28.153
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"6e6bbf7b37793cd3412c578d056fdf34"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=44&t=1576734454710&de=353393266844&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatRendered=2&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=2&zMoatSafetyTargetingSet=2&zMoatEmptySlot=1&zMoatNadoDataLoadTime=261&zMoatAllDataLoadTime=261&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day&ac=1&bq=11&f=0&zn=0&if=261&na=186919900&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 19 Dec 2019 05:47:35 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 19 Dec 2019 05:47:35 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-12-19T05%3A47%3A35.085Z&_t=slot_loaded&cBr=Ars%20Technica&cKe=exploits%7Cmicrosoft%7Coffice%7Cvulnerabilities%7CWord%7Czeroday&cCh=information%20technology&cTi=Booby-trapped%20Word%20documents%20in%20the%20wild%20exploit%20critical%20Microsoft%200-day&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&cCl=749&cId=1074069&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day&pRt=referral&pHp=%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4400&pSw=1600&pSh=1200&uID=880272b7-97c7-46cd-bb41-a5d3d98ce114&sID=798b2d0d-8f7f-47aa-b9d0-65db1b0cabd3&pID=cd29b53c-2016-4f75-8662-50a55f84b89f&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars.native%2Flegacy%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4552798968%2C%22campaignId%22%3A2628350052%2C%22creativeId%22%3A138296703964%2C%22elementId%22%3A%22native_xrail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Atrue%2C%22isFirstMoneyRequested%22%3Atrue%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22exploits%22%2C%22microsoft-3%22%2C%22office%22%2C%22vulnerabilities%22%2C%22word%22%2C%22zeroday%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A5238066361%2C%22name%22%3A%22native_xrail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%222x2%22%2C%22slug%22%3A%22booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%22%7D&dim3=%7B%22footerStart%22%3A1576734454504%2C%22headerStart%22%3A1576734454487%2C%22navigationStart%22%3A1576734453666%2C%22pubAdsReady%22%3A1576734454702%2C%22injected%22%3A1576734454897%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A1576734455085%7D&dim4=%7B%22pos%22%3A%5B%22legacy%22%5D%2C%22ctx_slot_type%22%3A%5B%22native_xrail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22native_xrail_0%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%22%5D%2C%22cnt_tags%22%3A%5B%22exploits%22%2C%22microsoft-3%22%2C%22office%22%2C%22vulnerabilities%22%2C%22word%22%2C%22zeroday%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22m_data%22%3A%5B%22waiting%22%5D%2C%22m_safety%22%3A%5B%22waiting%22%5D%2C%22m_categories%22%3A%5B%22waiting%22%5D%2C%22m_mv%22%3A%5B%22waiting%22%5D%2C%22m_gv%22%3A%5B%22waiting%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22131100%22%2C%22121100%22%2C%22112200%22%2C%22210000%22%2C%22240000%22%2C%22240003%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22_EBB19Z6KkgL_%22%5D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 19 Dec 2019 05:47:35 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
page
t.skimresources.com/api/v2/
22 B
383 B
XHR
General
Full URL
https://t.skimresources.com/api/v2/page
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
text/plain

Response headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:36 GMT
via
1.1 google
x-content-type-options
nosniff
server
Python/3.7 aiohttp/3.5.4
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
alt-svc
clear
content-length
22
5deac57938d0694c4b9da428.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady37282455
player.cnevids.com/script/video/
63 KB
21 KB
Script
General
Full URL
https://player.cnevids.com/script/video/5deac57938d0694c4b9da428.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady37282455
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-21927b84b8.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.27 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-27.fra50.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
93520cd455f75c8969b9da93f7c3fdb713ab5e9892efeed9813a4af08ddcde9b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:47:35 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Amz-Cf-Pop
FRA50-C1
X-Cache
Miss from cloudfront
Status
200 OK
Connection
keep-alive
Content-Length
20743
X-XSS-Protection
1; mode=block
X-Request-Id
f174c918-577f-429f-89d4-b6b33d496c73
X-Runtime
0.006047
X-Backend-Node
10.110.120.110
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"934b033813d6f940cb61e16e6ef481d6"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 f6c241b75ae7d21ac836339454ab90b8.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Id
gvXId-sYUv52Ou04JlRRnXTOr1tgmLaY3-7QXvu3Fji7cuUAVHY--w==
arstechnica_mini-4wd-racing.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1575930137/
17 KB
18 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1575930137/arstechnica_mini-4wd-racing.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
5c57a0f6d257ca6be9e6bcb6039fea214962c35b7b30fee3dcc112b8cec18d59

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:44:55 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
167
Edge-Cache-Tag
380278988686077832122293282495365645705,404749671192515790889513374839386840902,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
17267
X-Served-By
cache-fra19157-FRA
Last-Modified
Thu, 12 Dec 2019 14:30:32 GMT
Server
cloudinary
X-Timer
S1576161035.250963,VS0,VE102
ETag
"7cfa0c5590f779efc925bf7aee626a20"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
XVcGKmwKccAPCbg8sZAr09VUnQnXRGFn9XNvy9pUZ-Oti7ZIlHlmVA==
X-Cache-Hits
0
arstechnica_war-stories-war-stories-oddworld.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1575385501/
12 KB
13 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1575385501/arstechnica_war-stories-war-stories-oddworld.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
e67634eb3e8ded1b35d409539a3dde4f53ae0a7b332c9713803e216996b70f25

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:43:50 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
232
Edge-Cache-Tag
516766467372198984987912344758962687175,404749671192515790889513374839386840902,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
12630
X-Served-By
cache-hhn4070-HHN
Last-Modified
Tue, 03 Dec 2019 16:18:09 GMT
Server
cloudinary
X-Timer
S1575389916.400537,VS0,VE111
ETag
"7f0c64819a53ef4732059f6fc6df5c8a"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
aVDMeYKvLtZGX8wkn4XgiVJn2GX1-xeTJVy8BNgKN9PPvyxYqDElTQ==
X-Cache-Hits
0
arstechnica_game-judges-you-nintendo-s-corey-olcsvary-reviews-your-mario-maker-2-levels.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1574177299/
12 KB
13 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1574177299/arstechnica_game-judges-you-nintendo-s-corey-olcsvary-reviews-your-mario-maker-2-levels.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
09598ddbbeaf9f31b2ff6f67ffccb4711d144a3795b792be68a3a176ee6c9ebe

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 19 Nov 2019 20:11:51 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
2539772
Edge-Cache-Tag
601200027999543495375406924058855020374,404749671192515790889513374839386840902,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
12324
X-Request-Id
3ca40085f6e5d3edafc3958c405ea3f5
X-Served-By
cache-hhn4080-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 19 Nov 2019 20:11:45 GMT
Server
cloudinary
X-Timer
S1574194311.928279,VS0,VE165
ETag
"9034961dde2383da30356914e81e7950"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
dM9rBMlrLPr_8j5yQeXKSJ0WVOKAWLc0PihJiXTRNg7NtXS5v6Y9eA==
X-Cache-Hits
0
arstechnica_unsolved-mysteries-bioware-answers-unsolved-mysteries-of-the-mass-effect-universe.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1573140819/
11 KB
12 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1573140819/arstechnica_unsolved-mysteries-bioware-answers-unsolved-mysteries-of-the-mass-effect-universe.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
Cloudinary /
Resource Hash
de24551bd4396fc8579b2d87ce01944553dd48fb52775d14373725a50efa0c37
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
146
X-Cache
Hit from cloudfront
Date
Thu, 19 Dec 2019 05:45:16 GMT
Server-Timing
cloudinary;dur=112;start=2019-11-08T14:35:45.689Z,cld-id;desc=555a3491395f2119db357e871f2eced0,fastly;dur=0;total=205;start=2019-11-08T14:35:45.643Z;desc=MISS,rtt;dur=0
Content-Length
11417
X-Request-Id
555a3491395f2119db357e871f2eced0
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 08 Nov 2019 14:35:23 GMT
Server
Cloudinary
Cache-Control
public, max-age=300
ETag
"3e8509d06c6610d54babcac0d91e5d93"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Server-Timing
Connection
keep-alive
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
gCSHVF8gm5YNzjSt0jsL2Kz450l5LOee22M3JR553TofQVAXG490kQ==
arstechnica_war-stories-civilization.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1569003425/
16 KB
17 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1569003425/arstechnica_war-stories-civilization.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
1c7dcc8216c6f82da2998ceeac2523632c7f9bffe510824b6d082621201f2012

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 23 Sep 2019 16:37:49 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
2293627
Edge-Cache-Tag
390602458176548494884398897259766670181,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
16236
X-Request-Id
df2afd02bed526ce
X-Served-By
cache-hhn4065-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Mon, 23 Sep 2019 11:27:54 GMT
Server
cloudinary
X-Timer
S1569256670.782884,VS0,VE192
ETag
"72002610618f7bf8bf0e52c760e39897"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
w3IcuuKOXrth9r1g5ecBz8LCUP0_fvqQnzbAPk19OSAK5YrnjoyUGw==
X-Cache-Hits
0
arstechnica_sitrep-dod-resets-ballistic-missile-interceptor-program.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1568662260/
11 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1568662260/arstechnica_sitrep-dod-resets-ballistic-missile-interceptor-program.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
7fc88c65d46e83b3f3e9f098f05fd639480332fc3718cd714725e2e4633af4e8

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 17 Sep 2019 19:55:23 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
207360
Edge-Cache-Tag
285695674967648002297586464606017083075,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
10793
X-Served-By
cache-fra19156-FRA
Last-Modified
Tue, 17 Sep 2019 19:55:15 GMT
Server
cloudinary
X-Timer
S1568750123.147762,VS0,VE109
ETag
"0e1ff58ccf6d97759de3d774a7ff835a"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
j_G-mjhj5vPM9QLS7qjVjOOyVsJbOn1RdjN9jghAaktrroGCwohi0A==
X-Cache-Hits
0
arstechnica_dead-cells-how-to-avoid-falling-to-your-death-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1563202921/
16 KB
17 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1563202921/arstechnica_dead-cells-how-to-avoid-falling-to-your-death-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
5f760e6eaa1fd8e199a7135ae74692369612ff5de37b99eb63bcb8ee7d615568

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:43:50 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
232
Edge-Cache-Tag
512786565011436188602690990842551442357,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
16016
X-Request-Id
558da5101eeb1f1f
X-Served-By
cache-fra19150-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 19 Jul 2019 15:13:07 GMT
Server
cloudinary
X-Timer
S1563549194.385414,VS0,VE180
ETag
"4dba8e36b73a44cca8375175ae0e4b39"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
BgI90ZebiImdFyjAMSpx-HMiFgLDvtq1z110Oleqx6YGYaqEBExA3Q==
X-Cache-Hits
0
arstechnica_warframe-reviews.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1561556730/
14 KB
15 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1561556730/arstechnica_warframe-reviews.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
83a366075eb2387c6d9f848f42b08df0546027333eccf5813edf95ba45709be2

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 27 Jun 2019 19:35:11 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
2244068
Edge-Cache-Tag
409825722100045817936218917770258862228,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
14837
X-Request-Id
b6ad3868f2bf03bf
X-Served-By
cache-hhn4083-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 27 Jun 2019 19:34:59 GMT
Server
cloudinary
X-Timer
S1561664111.929725,VS0,VE147
ETag
"1d90d6aef7585f963e1270a1a02a4dd4"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
GE-e1udQlw9QUHUdNssoblAyBL8koCcccr3D_n5QieDYzMWr8tcLvA==
X-Cache-Hits
0
arstechnica_war-stories-subnautica.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559747425/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559747425/arstechnica_war-stories-subnautica.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
20660a9ef7ec454c15b2dc62b3db084e0cc9f74c5bb6de71a96fb1a54aef00f8

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:43:50 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
232
Edge-Cache-Tag
384957005148579205807938476483146982592,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15222
X-Request-Id
0958d581a409116b
X-Served-By
cache-fra19136-FRA
Server
cloudinary
X-Timer
S1559756401.882584,VS0,VE537
ETag
"8c45b6c645caba59f4b14d3fbdc09062"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
5--GiVkYGsDZPUYc5TKRHZDAM35JZlBUKxwWRUb4heZCkwvBUG4AUA==
X-Cache-Hits
0
arstechnica_this-war-of-mine-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559075831/
16 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559075831/arstechnica_this-war-of-mine-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
ec84902ae04cc118d965c577e2ece816abd594431ce66bcef1afd4f745e951fd

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 03 Jun 2019 18:11:08 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
1673806
Edge-Cache-Tag
580474366038461196493179311799260666459,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15985
X-Request-Id
c8c7238dbb15b70b
X-Served-By
cache-hhn1542-HHN
Last-Modified
Mon, 03 Jun 2019 18:11:08 GMT
Server
cloudinary
X-Timer
S1559585468.501454,VS0,VE505
ETag
"42bc7816573b81a73647b6f7123944c5"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
cV7CxODoZhslzMvgIUK_FOD423RSc-QKEZl0GbUyYSpiRSPs2zhgvA==
X-Cache-Hits
0
arstechnica_obra-dinn-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1558373184/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1558373184/arstechnica_obra-dinn-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
8574074952616e0a56e5b72d9634bff0a683d658d09804c10324293811606d22

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:45:16 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
146
Edge-Cache-Tag
433557846635605494688582207268998106147,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15609
X-Request-Id
c8a15984885b6e84
X-Served-By
cache-fra19142-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 28 May 2019 17:36:10 GMT
Server
cloudinary
X-Timer
S1559065035.044774,VS0,VE231
ETag
"8becb0d5f4f7ff3e76e89c89871f465d"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
aDH2oWdoRoPuO38F8BD7YQYk6fLqqB4uVijL2nWoCwzUIIMUUYF8sw==
X-Cache-Hits
0
arstechnica_army-s-new-pistol-has-had-some-misfires.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556912500/
8 KB
9 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556912500/arstechnica_army-s-new-pistol-has-had-some-misfires.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
a91d62b47f02a7e638d1749e3791ac328b2dd89dac630578f76e65b1ed91ed89

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:43:50 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
232
Edge-Cache-Tag
575077299308468417590234438077035908298,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7863
X-Request-Id
19c9873a9e40bdc6
X-Served-By
cache-hhn1537-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Mon, 13 May 2019 19:11:27 GMT
Server
cloudinary
X-Timer
S1559434184.442899,VS0,VE232
ETag
"31902de995c98904a55c605571f06530"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
iwuu1HVmK-k1kN3laI4aFPnXCrK6BUO832REKZqSk-T1xUmjxiXVtQ==
X-Cache-Hits
0
arstechnica_war-stories-slay-the-spire-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556741487/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556741487/arstechnica_war-stories-slay-the-spire-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
f9d9e96c4439beeca49a1a10f9dffe6f5cd0b604d13aa13af170d0bc62d8ca1b

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 May 2019 00:05:34 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
1878124
Edge-Cache-Tag
515397136805965062020045600075132664421,404749671192515790889513374839386840902,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15634
X-Request-Id
2d0da7ec326501f4
X-Served-By
cache-fra19145-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 02 May 2019 18:45:52 GMT
Server
cloudinary
X-Timer
S1559088335.611581,VS0,VE1
ETag
"abee90e53f29ba0127fca9442ab50902"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
BETkLsxMfzzThMU7hLnSvGBxwzz52Az1Eoep1KzzQUCtvgdE0rQc9w==
X-Cache-Hits
1
arstechnica_war-stories-amnesia-the-dark-descent-the-horror-facade.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1555359865/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1555359865/arstechnica_war-stories-amnesia-the-dark-descent-the-horror-facade.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
1defb6bc54a7ee9c066136908360e8455c23ee9ad0dec9924e7255d7948cd4be

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:43:50 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
232
Edge-Cache-Tag
587193118310891607619753694455047488726,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15251
X-Request-Id
4a753e904b5f7094
X-Served-By
cache-hhn1539-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 16 Apr 2019 18:59:19 GMT
Server
cloudinary
X-Timer
S1558397317.096357,VS0,VE232
ETag
"3e7cdc13e718680bf5e1efa64468b560"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
ON3td8iLFdzD6qj4fdBY5szQ2300Xd0Og7nM_dLBEvu1UTn4wJSizw==
X-Cache-Hits
0
arstechnica_war-stories-c-and-c-tiberian-sun.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1551193450/
19 KB
19 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1551193450/arstechnica_war-stories-c-and-c-tiberian-sun.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
27348ba4b98bd80f1038496ec5dea6ad865680540058fb085b8ca199b8aaf4c5

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 25 Aug 2019 00:07:25 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
2266675
Edge-Cache-Tag
313687566273846460968749706722669918033,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
19022
X-Request-Id
ab5ed3b65acb0664
X-Served-By
cache-hhn4032-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Wed, 27 Feb 2019 16:48:24 GMT
Server
cloudinary
X-Timer
S1566691646.760823,VS0,VE200
ETag
"fe52b9acd391d8bee8de15a0f429b377"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
3yFMpUVu7q-2QvRRxdu9BV7ZKH4CGNh1AzoLtSty5wZVa91p_YkDtw==
X-Cache-Hits
0
arstechnica_army-s-next-vertical-lift-en-route.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550680609/
5 KB
6 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550680609/arstechnica_army-s-next-vertical-lift-en-route.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
4868ca91bcd0d492c501ec5b8d44ac78d3e1226977ae14ff598f5efe78751951

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:43:50 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
232
Edge-Cache-Tag
312535560964408758261298476626669868625,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
4867
X-Request-Id
e3f346bec24d7ff3
X-Served-By
cache-hhn1532-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 21 Feb 2019 15:50:43 GMT
Server
cloudinary
X-Timer
S1559089107.834583,VS0,VE286
ETag
"90ad4d692f7209c01596b99729f26e7b"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
kxSp6vwzZ2GRQ6HtaTYqyXmPetXO4dB9Z2ZJxTC6Qk53XHSEDaldAQ==
X-Cache-Hits
0
arstechnica_war-stories-blade-runner-skinjobs-voxels-and-future-noir.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550244434/
18 KB
19 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550244434/arstechnica_war-stories-blade-runner-skinjobs-voxels-and-future-noir.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
8b72952d3fd656ee6594f0d9735d928113ad1d590705b14f77abf75f1d4d5d69

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 May 2019 00:11:29 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
2262900
Edge-Cache-Tag
292757494989914907279105994976263969890,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
18172
X-Request-Id
c3e7d96bbe014b80
X-Served-By
cache-hhn1535-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 15 Feb 2019 15:34:33 GMT
Server
cloudinary
X-Timer
S1559088690.594713,VS0,VE388
ETag
"32f1b8954559c8d598e9861f5b8360b9"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
-irkULv8VQFf2VDafR0Fvnc47eqnX4grVK-PP8XbqS5wSWfwIoIyyA==
X-Cache-Hits
0
arstechnica_war-stories-dead-space-the-drag-tentacle.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1546889545/
7 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1546889545/arstechnica_war-stories-dead-space-the-drag-tentacle.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
9933997608e86beaf1e7f7188a5c657cdad8ccd9d20eb7b1a46adaa83fa850ab

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 02 Jun 2019 00:19:02 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
817923
Edge-Cache-Tag
561334743792169660751574031162860899763,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7393
X-Served-By
cache-hhn1525-HHN
Last-Modified
Tue, 08 Jan 2019 16:38:58 GMT
Server
cloudinary
X-Timer
S1559434743.785754,VS0,VE1
ETag
"17a6e4b5eb75eb12f5d8c89eb3d0ace8"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
RHvIojaEiO14RT4aCFdxc3PMO3cId6CAt7U65vgC0YuACa31mY56ng==
X-Cache-Hits
1
arstechnica_teach-the-controversy-flat-earthers.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1541592304/
10 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1541592304/arstechnica_teach-the-controversy-flat-earthers.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
7364fcbb6c5d775f07816712af8a6419db99268f72c337a4977f706dc3423bb3

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:47:43 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA50-C1
Edge-Cache-Tag
522150850958368321191235208678465217967,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
RefreshHit from cloudfront
Connection
keep-alive
Content-Length
10595
X-Request-Id
98a54be49b866b53
X-Served-By
cache-hhn1521-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 09 Nov 2018 14:44:53 GMT
Server
cloudinary
X-Timer
S1559436315.461747,VS0,VE1
ETag
"6c0c4f8a9d61ed2b5863a8058c624a37"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
YkUtAzgFju-YoMaVOKJn9yje-Z78sFBAcf4g3eztWOrik6PleWB4nA==
X-Cache-Hits
2
arstechnica_delta-v-the-burgeoning-world-of-small-rockets-paul-allen-s-huge-plane-and-spacex-get-s-a-crucial-green-light.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1537406983/
12 KB
13 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1537406983/arstechnica_delta-v-the-burgeoning-world-of-small-rockets-paul-allen-s-huge-plane-and-spacex-get-s-a-crucial-green-light.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
16f86804dd013db340fee4020a539d3e9d6e5a03d6841e431e50c428e99c26e8

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:43:50 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
233
Edge-Cache-Tag
389498626973997838808844380914497340413,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
12509
X-Request-Id
ec5f066ff382a9d5
X-Served-By
cache-fra19162-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 21 Sep 2018 16:51:30 GMT
Server
cloudinary
X-Timer
S1559434364.715908,VS0,VE304
ETag
"b9c502ffc902b60d0eb13698b37a945d"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
Ra8_MK--sBoqE8YhyNrwCXpkRJtDCh3HcgLvG85O1lhjXVxRbGD2gw==
X-Cache-Hits
0
arstechnica_chris-hadfield-explains-his-space-oddity-video.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1522031130/
7 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1522031130/arstechnica_chris-hadfield-explains-his-space-oddity-video.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
3ce7e824185893264ab44fbf8370a8f1262831c4c6c367b15f7d4f1e88fadc8c

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 20 May 2019 18:19:04 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
2386018
Edge-Cache-Tag
294316597633303263276952824544497226127,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7181
X-Served-By
cache-fra19129-FRA
Last-Modified
Fri, 06 Jul 2018 12:23:22 GMT
Server
cloudinary
X-Timer
S1558376344.111767,VS0,VE1
ETag
"0549828edcecd339d8d10ebe6119de70"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
VZk-crkJQrQVArorP-M8J8Eak4-e1dRqvNtg8TKNwBoIaTG_l6LAng==
X-Cache-Hits
1
arstechnica_apollo-mission-episode-1.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1512424612/
14 KB
15 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1512424612/arstechnica_apollo-mission-episode-1.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
82cd1a97f81e5b63a621311be2993916eea0907b5eadd53bb6b280f4bb0f8391

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 May 2019 00:21:15 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
2264260
Edge-Cache-Tag
424632948265147424317824738369264083785,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
14040
X-Request-Id
37d0301184b1a283
X-Served-By
cache-hhn1547-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 05 Dec 2017 01:52:25 GMT
Server
cloudinary
X-Timer
S1559089275.724502,VS0,VE297
ETag
"ecc047c6eed3dc571a78eab647201220"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
hgUds4A6BzO1rQSmdaZc-aybwHDCPX_Y3BjAyD6GGz68zBThfe9Eew==
X-Cache-Hits
0
arstechnica_richard-garriot-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1513807048/
14 KB
14 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1513807048/arstechnica_richard-garriot-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
4980853759711c8e9e2779239acd62e9e802fba38371763c65ecdd016a83fdbd

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:45:16 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
147
Edge-Cache-Tag
489732375708630852448407029403767769375,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
13885
X-Request-Id
d31de44e9add354e
X-Served-By
cache-hhn4057-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 06 Jul 2018 19:56:42 GMT
Server
cloudinary
X-Timer
S1563408556.165750,VS0,VE1
ETag
"13d45a1733ad4d2f3ae707584d6a8a32"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
cxbm3HlCJsGVhU7L_41fMoVGlBZJwnIdRU3lCJf8mT_l3f6knHwigg==
X-Cache-Hits
1
truncated
/
408 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c21029f21dc145723d40362da85504ee5a5bd33f5db6636beae3a01c7aba1fa2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
publishertag.js
static.criteo.net/js/ld/
87 KB
27 KB
Script
General
Full URL
https://static.criteo.net/js/ld/publishertag.js
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.2.130 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
nginx /
Resource Hash
30524ff4955653cc592d92ff6faff230d201fe166242858d5aa5027e9f1fe429

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:35 GMT
content-encoding
gzip
last-modified
Tue, 05 Nov 2019 14:27:47 GMT
server
nginx
access-control-allow-origin
*
etag
W/"5dc186e3-15c08"
content-type
text/javascript
status
200
cache-control
max-age=86400, public
timing-allow-origin
*
expires
Fri, 20 Dec 2019 05:47:35 GMT
idsv2
mid.rkdms.com/
0
0
XHR
General
Full URL
https://mid.rkdms.com/idsv2?ptk=17c1789b-e660-493b-aa74-3c8fb990dc5f&pubid=CONDENAST
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.32.8.22 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-32-8-22.muc51.r.cloudfront.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

rid
match.adsrvr.org/track/
109 B
536 B
XHR
General
Full URL
https://match.adsrvr.org/track/rid?ttd_pid=casale&fmt=json&p=183973
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
63.32.144.14 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-63-32-144-14.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
df93fb1d9805250135bba79b9d734e19ef381dbfe1a46fba35be9abd0f041555

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Thu, 19 Dec 2019 05:47:35 GMT
x-aspnet-version
4.0.30319
status
200
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
cache-control
private
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Content-Length, Content-Encoding, Vary, Cache-Control, Accept
content-length
109
expires
Sat, 18 Jan 2020 05:47:35 GMT
ptrack-v1.4.0-engagedtime-slots.js
d1z2jf7jlzjs58.cloudfront.net/code/
39 KB
16 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/code/ptrack-v1.4.0-engagedtime-slots.js
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.85 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-85.fra50.r.cloudfront.net
Software
nginx /
Resource Hash
5c66cbe33a007920cdea231069727d9420e5e4a751378d2adb7777a03fe716bd

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Sep 2019 21:15:08 GMT
Content-Encoding
gzip
Age
7806747
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Pragma
public
Last-Modified
Thu, 19 Sep 2019 16:47:30 GMT
Server
nginx
ETag
W/"5d83b122-9c0d"
Content-Type
application/x-javascript
Via
1.1 baaf38f0a0d54e4834bf934fa5189ceb.cloudfront.net (CloudFront)
Cache-Control
max-age=315360000, public
X-Amz-Cf-Pop
FRA50-C1
X-Amz-Cf-Id
K0HV2VcEkg9O_LJJCkqhytdvg8RKPIWlC4MMRBxjXR_njsIWPcSwGw==
Expires
Thu, 31 Dec 2037 23:55:55 GMT
embed-api.json
player.cnevids.com/
6 KB
3 KB
Fetch
General
Full URL
https://player.cnevids.com/embed-api.json?videoId=5deac57938d0694c4b9da428&embedLocation=arstechnica
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5deac57938d0694c4b9da428.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady37282455
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.27 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-27.fra50.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
b49c714246c3fa6b1facb6654458807e74aa081a48b305b9c3d5afdd87563960
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com

Response headers

Date
Thu, 19 Dec 2019 05:47:26 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Amz-Cf-Pop
FRA50-C1
X-Cache
Hit from cloudfront
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
2094
X-XSS-Protection
1; mode=block
X-Request-Id
f70f25c0-d0d1-41f0-a742-0bd9e6f93e9b
X-Runtime
0.006908
X-Backend-Node
10.110.120.110
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"5b4880132bf9b1dfc5272addc9ec7d6c"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Access-Control-Allow-Methods
GET, OPTIONS
Content-Type
application/json; charset=utf-8
Via
1.1 479d15a99f4dd073131fba1516541469.cloudfront.net (CloudFront)
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
Access-Control-Allow-Origin
*
X-Amz-Cf-Id
LxkZGkyADMQzF3GLb1MGRxi8WIVH5Toxd491P3ozDQRlwHzk1IAyaw==
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 5E20
267 KB
91 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5deac57938d0694c4b9da428.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady37282455
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
918c4485a28931feb333074355c2f4c2e915ffa51fe70b8797e9432c37b22b8f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
92690
x-xss-protection
0
expires
Thu, 19 Dec 2019 05:47:35 GMT
gpt_proxy.js
imasdk.googleapis.com/js/sdkloader/
68 KB
25 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/gpt_proxy.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5deac57938d0694c4b9da428.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady37282455
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
ae8afd45bd3a01aad1810f8f3183df0adfb03e9bfc64185aec928d6a8d679cb1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:46:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 10 Dec 2019 23:00:54 GMT
server
sffe
age
94
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
25057
x-xss-protection
0
expires
Thu, 19 Dec 2019 06:01:01 GMT
player-style-3b3a013ac40046610e8f2fefe02c3b07.css
d2c8v52ll5s99u.cloudfront.net/player/ Frame 5E20
74 KB
12 KB
Stylesheet
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-3b3a013ac40046610e8f2fefe02c3b07.css
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5deac57938d0694c4b9da428.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady37282455
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.84.87.154 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-99-84-87-154.muc50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
596b76b93c7801ba85fb53f2f6e2281d4dbffc96ddc18bb056e8cb0e94be34fd

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 21:38:14 GMT
Content-Encoding
gzip
Age
5040562
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
11365
Last-Modified
Wed, 05 Jun 2019 16:03:54 GMT
Server
AmazonS3
ETag
"cff060eda5015972d532696ec91d375b"
Content-Type
text/css; charset=utf-8
Via
1.1 ea6cdb5ba8bfb6f6aa18ec6651e5bc43.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
X-Amz-Cf-Pop
MUC50-C1
Accept-Ranges
bytes
X-Amz-Cf-Id
m8Ebr-rqaBf0plJQ8g-d8aYwaw6a6AMmBaV2Y9siYgbOH92iYabI1g==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
main-0b9a5b23a348cb67e59a.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame 5E20
915 KB
230 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/main-0b9a5b23a348cb67e59a.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5deac57938d0694c4b9da428.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady37282455
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.84.87.154 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-99-84-87-154.muc50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
cdfd09dbaae17335098dba6b4f05e29f55d733a92907955cb77e59bba2420a50

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 18:58:38 GMT
Content-Encoding
gzip
Age
2630938
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
234799
Last-Modified
Mon, 18 Nov 2019 17:52:06 GMT
Server
AmazonS3
ETag
"297dd452524d88da21b4e97dc6050991"
Content-Type
application/javascript
Via
1.1 ea6cdb5ba8bfb6f6aa18ec6651e5bc43.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
X-Amz-Cf-Pop
MUC50-C1
Accept-Ranges
bytes
X-Amz-Cf-Id
-BDubi_LMzx9GrHK1aKFNQNCD8PgKEjPdglsJODyvE89aqY0jE5Weg==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
/
srv-2019-12-19-05.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2019-12-19-05.pixel.parsely.com/plogger/?rand=1576734455357&plid=21925518&idsite=arstechnica.com&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%22parsely_uuid%22%3A%225f16b4a1-ee46-4049-b9bf-af053f729cf0%22%2C%22parsely_site_uuid%22%3A%2289c171ca-2fb8-4f43-b77f-b3cf0ffae19f%22%7D&sid=1&surl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&sref=&sts=1576734455355&slts=0&title=Booby-trapped+Word+documents+in+the+wild+exploit+critical+Microsoft+0-day+%7C+Ars+Technica&date=Thu+Dec+19+2019+06%3A47%3A35+GMT%2B0100+(Central+European+Standard+Time)&action=pageview&pvid=48171818&u=89c171ca-2fb8-4f43-b77f-b3cf0ffae19f
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.203.142.184 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-203-142-184.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:47:37 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
get
odb.outbrain.com/utils/
15 KB
9 KB
Script
General
Full URL
https://odb.outbrain.com/utils/get?url=http%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&srcUrl=http%3A%2F%2Ffeeds.arstechnica.com%2Farstechnica%2Findex%2F&settings=true&recs=true&widgetJSId=JS_1&key=NANOWDGT01&idx=0&version=104097&apv=false&sig=cpAheBPt&format=vjapi&va=true&rand=81797&pdobuid=-1&osLang=en-US&winW=1600&winH=1200&scrW=1600&scrH=1200&adblck=false&secured=true&cmpStat=1&ref=
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1576734454547
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
41bb9fbfa51eccf2a473c49b9bb5ee0d26e03ab6e3a9257f1e5addef93391e52
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=0; includeSubDomains;
content-encoding
gzip
traffic-path
CHIDC2, MDW, HHN, Europe2
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-traceid
a86cd9e25b236d39991270ee8f8554d6
content-length
8989
x-served-by
cache-mdw17380-MDW, cache-hhn4065-HHN
pragma
no-cache
x-timer
S1576734455.499006,VS0,VE221
date
Thu, 19 Dec 2019 05:47:35 GMT
vary
Accept-Encoding, User-Agent
content-type
text/x-json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
expires
Thu, 01 Jan 1970 00:00:00 GMT
cache-control
no-cache
backend-ip
157.52.75.80
accept-ranges
bytes, bytes
x-cache-hits
0, 0
070473e8-eb58-4d13-95f1-1010a2f456bc
https://arstechnica.com/ Frame 5E20
31 B
0
Other
General
Full URL
blob:https://arstechnica.com/070473e8-eb58-4d13-95f1-1010a2f456bc
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-0b9a5b23a348cb67e59a.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7725538fe2f71147bffeba7452b434c826aef9009666cb4360c605d0b2a91d1d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
31
Content-Type
application/javascript
user
4d.condenastdigital.com/
67 B
422 B
XHR
General
Full URL
https://4d.condenastdigital.com/user?xid=82ff3600-abbe-4326-92ff-3b0bf79c45f5
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.209.40.151 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-3-209-40-151.compute-1.amazonaws.com
Software
/
Resource Hash
58eedf385219fcd13f1f21659299af6992273759e7c142f87e2a4c2ef4e1f041

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:47:35 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
wt
polarcdn-pentos.com/ Frame A8B1
3 B
66 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=2&n=3&p=NA-ARSTECH-11238837&s=1&u=a2e31b09-ba44-4132-af51-9602cc850b7b&v=2%2F4d32dbc&w=1.176.0&y=w&z=v1.6.48&pas=asa-web&pag2=%2F3379%2Fconde.ars.native%2Flegacy&pai=5db2c&d=arstechnica.com&l=Key-native_xrail+%5BXrail%5D&pajs=body&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&paio=1&pasb=1&pecy=DE&c=ed94e0b73a17478a900b6e25ffa5c37b&pacexp=0770e6398b7a41d78649e87c66854107&t=i&pasp=6fe1dded4b5f4d1a8a01dfa8492cbdab&papss=a&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&_=1576734455016
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:35 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
age
27916
cf-ray
5477152c2d3ac761-AMS
status
200
content-length
3
x-amz-id-2
ssrP9l3tvTXZZBWksQNWxHw0gv2xKEdv+31+lfuAri9mHXrgqXnm6uZ4Mc2picsnk68BLczbXHI=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
x-amz-request-id
712B38668B68D611
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
content-type
application/octet-stream
5de565bc48e3edcb2311969e
polarcdn-terrax.com/image/v1.0.0/bin/
3 KB
4 KB
Image
General
Full URL
https://polarcdn-terrax.com/image/v1.0.0/bin/5de565bc48e3edcb2311969e?v=026ed&w=300
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
37b2c5053f2b0a55d8263cf719a444b8f1e3aa65e042f3992266d600b81e7ef0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:35 GMT
via
1.1 varnish
cf-cache-status
HIT
age
258255
cf-ray
5477152bfbd28caa-VIE
status
200
access-control-max-age
432000
content-length
3378
x-varnish
1805859659 1805743188
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=432000
accept-ranges
bytes
timing-allow-origin
*
sf-ui-display-medium-webfont.woff2
d2c8v52ll5s99u.cloudfront.net/assets/fonts/ Frame 5E20
29 KB
30 KB
Font
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/assets/fonts/sf-ui-display-medium-webfont.woff2
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.84.87.154 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-99-84-87-154.muc50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
d281c9d6bae645f3da6d2f0769a2cf0668709fd28e2021ce74821cdd8c7117b3

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-3b3a013ac40046610e8f2fefe02c3b07.css
Origin
https://arstechnica.com

Response headers

Date
Thu, 19 Dec 2019 05:47:37 GMT
Content-Encoding
gzip
X-Amz-Cf-Pop
MUC50-C1
X-Cache
RefreshHit from cloudfront
Access-Control-Max-Age
3000
Connection
keep-alive
Content-Length
29632
Via
1.1 847372cac152a2575995d0b13be85a88.cloudfront.net (CloudFront)
Last-Modified
Mon, 26 Jun 2017 15:24:42 GMT
Server
AmazonS3
ETag
"7d18db04f980971f2a9c5026bbc34bed"
Vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
Access-Control-Allow-Methods
GET
Content-Type
application/font-woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=63072000, public
Accept-Ranges
bytes
X-Amz-Cf-Id
NA8EWynjSdCMoBhuWkyQxpp1hTfaRRq30OJkoEMHJtNtplm2LWsjgA==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
bridge3.355.3_en.html
imasdk.googleapis.com/js/core/ Frame 7296
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.355.3_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.355.3_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
196406
date
Tue, 17 Dec 2019 14:12:52 GMT
expires
Wed, 16 Dec 2020 14:12:52 GMT
last-modified
Tue, 10 Dec 2019 22:57:51 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
142483
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame 5E20
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Thu, 19 Dec 2019 05:47:35 GMT
integrator.js
adservice.google.com/adsid/ Frame 5E20
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
fbevents.js
connect.facebook.net/en_US/ Frame 5E20
126 KB
30 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-0b9a5b23a348cb67e59a.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f0ff:1a:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
1ada5b4d0b63b06d2bd668cd7d6597689796da41a434a675cfdbd2a1bddf251a
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-24=":443"; ma=3600
content-length
30426
x-xss-protection
0
pragma
public
x-fb-debug
wME5FirWQTLwxicN/JcH8XFhJsnDEKB7DMtn/Gn15JtSx+XXvmeQCrfVuXJ7z60S59ivmpz9lGHeEEra4xK6Ow==
date
Thu, 19 Dec 2019 05:47:35 GMT
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
vary
Accept-Encoding
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
comscore-min.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame 5E20
38 KB
11 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/comscore-min.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-0b9a5b23a348cb67e59a.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.84.87.154 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-99-84-87-154.muc50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
833a86642252016b29f08dd45ffd27f9e00ca237f28d8c5f0147a6e15d009377

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:42:49 GMT
Content-Encoding
gzip
Last-Modified
Wed, 24 May 2017 18:19:15 GMT
Server
AmazonS3
Age
287
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
text/javascript
Via
1.1 ea6cdb5ba8bfb6f6aa18ec6651e5bc43.cloudfront.net (CloudFront)
Transfer-Encoding
chunked
X-Amz-Cf-Pop
MUC50-C1
Connection
keep-alive
X-Amz-Cf-Id
zKlIB6bnGDH2S0CEaewXCWrTUE57FrEw-EfpsNdwyeQ2Tjix-1aJEQ==
collect
www.google-analytics.com/r/
35 B
123 B
Other
General
Full URL
https://www.google-analytics.com/r/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:35 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://arstechnica.com
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/ Frame 5E20
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-12-19T05%3A47%3A35.674Z&_c=&_t=Player%20Requested&sID=798b2d0d-8f7f-47aa-b9d0-65db1b0cabd3&pID=cd29b53c-2016-4f75-8662-50a55f84b89f&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 19 Dec 2019 05:47:35 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
arstechnica_mini-4wd-racing.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1575930137/ Frame 5E20
77 KB
78 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1575930137/arstechnica_mini-4wd-racing.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
00e3bdc033f31eee3294bbfa68d03bc0968b4f86507e68ff9d19d9890039c89c

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:45:08 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
155
Edge-Cache-Tag
380278988686077832122293282495365645705,504486728181076666154556403696563473843,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
78622
X-Served-By
cache-hhn4040-HHN
Last-Modified
Tue, 10 Dec 2019 16:07:04 GMT
Server
cloudinary
X-Timer
S1575994072.752642,VS0,VE127
ETag
"bc88b9555531b7b8cfae6ecc1581a7f7"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
kRmpP2Axd6yYOBDbWWLeFw4W4TCYAIqR7nxAxnyjaljNEKAkS_iMjA==
X-Cache-Hits
0
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-12-19T05%3A47%3A35.837Z&_t=pageview&cBr=Ars%20Technica&cKe=exploits%7Cmicrosoft%7Coffice%7Cvulnerabilities%7CWord%7Czeroday&cCh=information%20technology&cTi=Booby-trapped%20Word%20documents%20in%20the%20wild%20exploit%20critical%20Microsoft%200-day&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932&cEnt=microsoft%2C%20page%20layout%2C%20zero-day%20attack%2C%20mcafee%2C%20malware%2C%20fireeye%2C%20html%20application%2C%20windows%20registry%2C%20dan%20goodin%2C%20e-mail%2C%20rich%20text%20format%2C%20utc%2C%20california%2C%20windows%2010%2C%20operating%20system%2C%20macro%2C%20people%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20black%20hat%20usa&cEnw=1%2C%200.6784015477110633%2C%200.6268754530888921%2C%200.6112050352517427%2C%200.5769415477213082%2C%200.5278673858966411%2C%200.4876640019841165%2C%200.4251233242626762%2C%200.4219554491828688%2C%200.4055303805005162%2C%200.4003259436441344%2C%200.391641659880906%2C%200.36639663721428006%2C%200.3631841362436009%2C%200.36076348914452483%2C%200.3556732396947552%2C%200.3498922968926395%2C%200.3410893830977022%2C%200.30540966836663985%2C%200.2996590443923909&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&cCl=749&cId=1074069&cPd=2017-04-08T20%3A00%3A41.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day&pRt=referral&pHp=%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pWw=1600&pWh=1200&pPw=1600&pPh=5000&pSw=1600&pSh=1200&uID=880272b7-97c7-46cd-bb41-a5d3d98ce114&sID=798b2d0d-8f7f-47aa-b9d0-65db1b0cabd3&pID=cd29b53c-2016-4f75-8662-50a55f84b89f&uDt=desktop&_o=ars-technica&_c=general&xID=82ff3600-abbe-4326-92ff-3b0bf79c45f5&cKh=microsoft%2Cvulnerability%2Cbooby-trapped%20word%20document%2Cpage%20layout%2Czero-day%20attack%2Cmcafee
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 19 Dec 2019 05:47:35 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
21b60411-41b1-4740-8528-630500e6af3ethumbs.mp4
dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/ Frame 5E20
111 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/21b60411-41b1-4740-8528-630500e6af3ethumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.76 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-76.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

Date
Wed, 18 Dec 2019 15:56:54 GMT
Via
1.1 a148356b14492df0e216c234ac2c2308.cloudfront.net (CloudFront)
Last-Modified
Fri, 06 Dec 2019 21:47:42 GMT
Server
AmazonS3
Age
49842
ETag
"3c4c69d175578a2c5dcb4d064f187efb"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-1999682/1999683
Connection
keep-alive
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Content-Length
1999683
X-Amz-Cf-Id
11N3Ot8bObnZdv_EegG17TmPKnJwEi3f7xzCWxLIygQv5lacMhT6cQ==
21b60411-41b1-4740-8528-630500e6af3ethumbs.mp4
dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/ Frame 5E20
15 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/21b60411-41b1-4740-8528-630500e6af3ethumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.76 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-76.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

Date
Wed, 18 Dec 2019 15:56:54 GMT
Via
1.1 1f49a084ca923f375f74b42fa36ef429.cloudfront.net (CloudFront)
Last-Modified
Fri, 06 Dec 2019 21:47:42 GMT
Server
AmazonS3
Age
49846
ETag
"3c4c69d175578a2c5dcb4d064f187efb"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-1999682/1999683
Connection
keep-alive
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Content-Length
1999683
X-Amz-Cf-Id
HSm56LRGXlMkfYEDCcpJkofUTPuDS0z_O91fas0xON1FukNi7fTj0Q==
track
capture.condenastdigital.com/ Frame 5E20
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-12-19T05%3A47%3A35.879Z&_c=Player%20Event&_t=Player%20Loaded&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=https%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fcustomizing-mini-4wd-racers-for-high-speeds-on-a-small-scale%2F&cId=5deac57938d0694c4b9da428&cKe=hobbies%2Crace%20car%2Crace%20cars%2Cracing&cPd=2019-12-10T16%3A00%3A00%2B00%3A00&cTi=Customizing%20Mini%204WD%20Racers%20For%20High%20Speeds%20On%20A%20Small%20Scale&mDu=655&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pID=cd29b53c-2016-4f75-8662-50a55f84b89f&pWw=540&pWh=303.75&sID=798b2d0d-8f7f-47aa-b9d0-65db1b0cabd3&uId=880272b7-97c7-46cd-bb41-a5d3d98ce114&xid=82ff3600-abbe-4326-92ff-3b0bf79c45f5&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22gitBranch%22%3A%22master%22%2C%22gitSha%22%3A%2210ec1cd%22%2C%22guid%22%3A%2212d7da6-cec1-389a-16cb-3b425ce1ba5%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A3693.953125%2C%22playerType%22%3A%22video-continuous%22%2C%22playsOnPage%22%3A0%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22isRightRail%22%3Afalse%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Creport%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3A%22OUT_OF_VIEWPORT%22%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%2C%22podIndex%22%3A%22%22%7D&adId=&pageType=article%7Creport
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 19 Dec 2019 05:47:35 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
2f0407ee-29eb-45c3-baaa-4afb0b4eb946
https://arstechnica.com/ Frame 5E20
5 KB
0
Other
General
Full URL
blob:https://arstechnica.com/2f0407ee-29eb-45c3-baaa-4afb0b4eb946
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-0b9a5b23a348cb67e59a.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d5f3418a3fa657175d5341b5e032be036cb4d5818de5d1497f2175be5a7e3701

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
5463
Content-Type
application/javascript
21b60411-41b1-4740-8528-630500e6af3emanifest-ios.m3u8
dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/ Frame 5E20
918 B
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/21b60411-41b1-4740-8528-630500e6af3emanifest-ios.m3u8?videoIndex=0&requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-0b9a5b23a348cb67e59a.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.76 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-76.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
28a54fd477ae1a0ad0b5104a4bf2875d20b528c9bfaedf1afd863deef25813f1

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com

Response headers

Date
Wed, 18 Dec 2019 14:37:02 GMT
Via
1.1 1f49a084ca923f375f74b42fa36ef429.cloudfront.net (CloudFront)
Vary
Origin
Age
54634
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
918
Last-Modified
Fri, 06 Dec 2019 21:45:39 GMT
Server
AmazonS3
ETag
"b28fce536bde8d5b45f75f7b99f52cec"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
X-Amz-Cf-Id
qXRGic5as5Gog9WdhzBY7AreWDIV90Z2ts2P3pZ6cKYGmBjlN0JjXQ==
obUserSync.html
widgets.outbrain.com/widgetOBUserSync/ Frame 2C3E
0
0
Document
General
Full URL
https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1576734454547
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.190 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-190.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
widgets.outbrain.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Accept-Encoding
gzip, deflate, br
Cookie
akacd_widgets_routing=3754187253~rv=100~id=d363a8b417baf445123c915ef0b56bb3; recs_29c40239fc475e2984fd60c444cfafd5=0B1925901673A1956936647A2381962422A2193899666A2382238975A2284600761ACD1; obuid=ca2a84d2-6f90-443c-a341-73ed4efab5f0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/

Response headers

Server
Apache
ETag
"f0398404fbb6af5fde01a97a5947d5e8:1575990207"
Last-Modified
Tue, 10 Dec 2019 15:01:13 GMT
Accept-Ranges
bytes
Content-Type
text/html
Vary
Accept-Encoding
Content-Encoding
gzip
Cache-Control
max-age=604800
Date
Thu, 19 Dec 2019 05:47:35 GMT
Content-Length
3499
Connection
keep-alive
Timing-Allow-Origin
*
Access-Control-Allow-Credentials
false
Access-Control-Allow-Methods
GET,POST
Access-Control-Allow-Origin
*
l
mcdp-chidc2.outbrain.com/
4 B
377 B
XHR
General
Full URL
https://mcdp-chidc2.outbrain.com/l?token=31872ca617bd1b4eb4d1f0252a848fdb_6817_1576734455653&tm=1082&eT=0&wRV=104097&pVis=0&lsd=ca2a84d2-6f90-443c-a341-73ed4efab5f0&eIdx=&cheq=0&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1576734454547
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
50.31.142.127 Chicago, United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
chi.outbrain.com
Software
/
Resource Hash
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com

Response headers

Date
Thu, 19 Dec 2019 05:47:39 GMT
content-encoding
gzip
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
content-range
Connection
close
X-TraceId
82334bc52488941d51c7f3c12b040df8
Content-Length
30
eyJpdSI6IjlhOWUwMDAwYjBmMmFjNGNiOTY2NjI1NTczNDhjYjRiMzA1NTNiYTkyZDY3NjM4MTdiZTc4YzAyZDVkZTc0YjMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
3 KB
4 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjlhOWUwMDAwYjBmMmFjNGNiOTY2NjI1NTczNDhjYjRiMzA1NTNiYTkyZDY3NjM4MTdiZTc4YzAyZDVkZTc0YjMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ec4f9cb92382a86382d7d8be4447c7c97bcec7e8136cdbf4d88a11b2f64e9e30
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Fri, 15 Nov 2019 17:47:01 GMT
Date
Thu, 19 Dec 2019 05:47:36 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1601968
Connection
keep-alive
X-TraceId
f5de19c77ecaba1415ef47ff1f5d187c
Timing-Allow-Origin
*
Content-Length
3478
eyJpdSI6IjQ4YWY0YTY3NDc3MWNmNTU1ZTYwZDBkMThlOThlYzBlN2U5N2RlYTViYTZhMmNiODRkMDI5MDhhMWZiM2IxMGIiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
6 KB
6 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjQ4YWY0YTY3NDc3MWNmNTU1ZTYwZDBkMThlOThlYzBlN2U5N2RlYTViYTZhMmNiODRkMDI5MDhhMWZiM2IxMGIiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
34d52628ce8dda5eeb8a832e9f76938742d14d40b52c6fa08f309dcb4113b9e1
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Tue, 26 Nov 2019 16:07:13 GMT
Date
Thu, 19 Dec 2019 05:47:36 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2120318
Connection
keep-alive
X-TraceId
e6fcd45a297c8ee9df2ffba323b79227
Timing-Allow-Origin
*
Content-Length
6172
eyJpdSI6IjNhODhkOTI3NWQwZmU5ZGFhMDE2ZmNhYjAzMGRhNTNlNThjMDQ0ODM4OThlMTI3ZTBiZWQ3N2IyMGU5YjQ0N2IiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
3 KB
4 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjNhODhkOTI3NWQwZmU5ZGFhMDE2ZmNhYjAzMGRhNTNlNThjMDQ0ODM4OThlMTI3ZTBiZWQ3N2IyMGU5YjQ0N2IiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ea8bd06c0bf1361814686ce0ef7467b6ffc7a493eb0f908ff6201e97d5466743
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Sun, 01 Dec 2019 06:56:20 GMT
Date
Thu, 19 Dec 2019 05:47:36 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2462400
Connection
keep-alive
X-TraceId
9bd5c1d9273dc1b0d9e90423e7d529d5
Timing-Allow-Origin
*
Content-Length
3574
eyJpdSI6ImYwMTM4ZGViNTU1Y2E3MGRkNDNhMzM0MWRkMjNiOTA0MjU1ZGI5MjM2MGNjZGEwOGRlOTczMWJmYmVhMGZiYjIiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
9 KB
10 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImYwMTM4ZGViNTU1Y2E3MGRkNDNhMzM0MWRkMjNiOTA0MjU1ZGI5MjM2MGNjZGEwOGRlOTczMWJmYmVhMGZiYjIiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f3f4cd70f0f1eeae516f24bbefd20f266b5e1a0c8a1e0f7b1bc32ed1915faabf
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Sun, 01 Dec 2019 00:22:49 GMT
Date
Thu, 19 Dec 2019 05:47:36 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1711585
Connection
keep-alive
X-TraceId
c2411bb62e758f339d7bc7bf4b2797a1
Timing-Allow-Origin
*
Content-Length
9648
eyJpdSI6IjY1MGYzZGQ0ODFhNmY2MDI2N2YzY2Y5YTZhZjYzZjRkYjU2N2RjMzg0ZDUxZGY4MjhkODI4M2UxM2RiNGYxMjIiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
9 KB
9 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjY1MGYzZGQ0ODFhNmY2MDI2N2YzY2Y5YTZhZjYzZjRkYjU2N2RjMzg0ZDUxZGY4MjhkODI4M2UxM2RiNGYxMjIiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4317c320fea145340b743a6735b00462bb919afb1bdd1fbdf74403be1feb2815
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Tue, 03 Dec 2019 06:55:01 GMT
Date
Thu, 19 Dec 2019 05:47:36 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2462400
Connection
keep-alive
X-TraceId
91d0d5b962900bed5dad48579f1d989b
Timing-Allow-Origin
*
Content-Length
9270
eyJpdSI6IjkxYzk1ODBkNmU4NmZlODZiYzQwNjhjOGU2NDU4YTljOGY0MDg5ZmM4M2RhYjE5MTYxMWFlNzgxNzVkMzMwNmEiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
11 KB
11 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjkxYzk1ODBkNmU4NmZlODZiYzQwNjhjOGU2NDU4YTljOGY0MDg5ZmM4M2RhYjE5MTYxMWFlNzgxNzVkMzMwNmEiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
080a60a502154de277b87954d3698edfe2c46ef68f6b5bfecaf6b9db451640db
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Thu, 28 Nov 2019 03:54:14 GMT
Date
Thu, 19 Dec 2019 05:47:36 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2462400
Connection
keep-alive
X-TraceId
2d6ecf87a8f1e02d8b662951ff5ffe04
Timing-Allow-Origin
*
Content-Length
11120
1663130473914833
connect.facebook.net/signals/config/ Frame 5E20
447 KB
112 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/1663130473914833?v=2.9.15&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f0ff:1a:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
7ed50c95fbc229d3a9e94ad67a3eab19277f344e0fd228333390962b38998fd0
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
public
x-fb-debug
PVIPRgpI8hefqOUMpHpHVMnsWCKGwDAla0FNgtjz47uJbV27ejQTpmRaXzZ7U8LEYhsguJlpK3eBZzPETuIhRQ==
content-encoding
gzip
x-content-type-options
nosniff
date
Thu, 19 Dec 2019 05:47:35 GMT
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
status
200
vary
Accept-Encoding
cache-control
public, max-age=1200
strict-transport-security
max-age=31536000; preload; includeSubDomains
alt-svc
h3-24=":443"; ma=3600
content-length
114918
x-xss-protection
0
expires
Sat, 01 Jan 2000 00:00:00 GMT
21b60411-41b1-4740-8528-630500e6af3efile-1422k-128-48000-768.m3u8
dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/ Frame 5E20
9 KB
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/21b60411-41b1-4740-8528-630500e6af3efile-1422k-128-48000-768.m3u8?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-0b9a5b23a348cb67e59a.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.76 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-76.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
95f4f5090eababa4dad68068640228a63058d9756f252d83669758464daf7e19

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com

Response headers

Date
Wed, 18 Dec 2019 14:41:15 GMT
Content-Encoding
gzip
Vary
Origin
Age
54381
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Access-Control-Allow-Origin
*
Last-Modified
Fri, 06 Dec 2019 21:49:50 GMT
Server
AmazonS3
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Via
1.1 1f49a084ca923f375f74b42fa36ef429.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA50-C1
X-Amz-Cf-Id
FJDwf4qfoqdqbquYPQMlTyeVjjkdbC8PfpPv7-RnDgtPxDyVJoDAFA==
e904af35-0cdc-42b4-88e9-3f9297c299e4
https://arstechnica.com/ Frame 5E20
64 KB
0
Other
General
Full URL
blob:https://arstechnica.com/e904af35-0cdc-42b4-88e9-3f9297c299e4
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-0b9a5b23a348cb67e59a.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4b188a568fa90fa61d4bbe76dd6cf523abe65787e0ac3dc6b5c44db5e823685b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
65790
Content-Type
application/javascript
21b60411-41b1-4740-8528-630500e6af3efile-1422k-128-48000-768-00001.ts
dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/ Frame 5E20
737 KB
738 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/21b60411-41b1-4740-8528-630500e6af3efile-1422k-128-48000-768-00001.ts?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-0b9a5b23a348cb67e59a.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.76 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-76.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
86ca318ca88169e6206b93695ef6091e9fc42a1061344fdcfe78310390c83997

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com

Response headers

Date
Wed, 18 Dec 2019 14:41:16 GMT
Via
1.1 1f49a084ca923f375f74b42fa36ef429.cloudfront.net (CloudFront)
Vary
Origin
Age
54381
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
755008
Last-Modified
Fri, 06 Dec 2019 21:49:42 GMT
Server
AmazonS3
ETag
"e39a265b0e43ceb94cfff3fe218e4eb0"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
X-Amz-Cf-Id
_eSugsu6lsUTKurjgLUG_ShhJpefMK6iTFQar7bjIwTW9eHlFaKcdA==
events
wren.condenastdigital.com/1.0/conde/
0
732 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.194.193.74 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-194-193-74.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Thu, 19 Dec 2019 05:47:37 GMT
strict-transport-security
max-age=15768000; preload
x-content-type-options
nosniff
Server
nginx/1.15.8
x-download-options
noopen
x-frame-options
DENY
Content-Type
image/gif
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
vary
origin
x-xss-protection
1; mode=block
ads
securepubads.g.doubleclick.net/gampad/
5 KB
3 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3964567263106963&correlator=2964256094318075&output=ldjh&impl=fifs&adsid=NT&eid=21063635%2C21065138%2C21065310&vrg=2019121002&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20191219&iu_parts=3379%2Cconde.ars%2Chero%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=728x90%7C970x250%7C9x1%7C10x1&prev_scp=pos%3Dhero%26ctx_slot_type%3Dpost_nav%26ctx_slot_rn%3D0%26amznbid%3D2%26amznp%3D2%26m_mv%3DslotNoHistData%26m_gv%3DslotNoHistData%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dpost_nav_0&eri=1&cust_params=env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.31.8%26ctx_page_slug%3Dbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%26cnt_tags%3Dexploits%252Cmicrosoft-3%252Coffice%252Cvulnerabilities%252Cword%252Czeroday%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26m_data%3D1%26m_safety%3Dsafe%26m_categories%3Dmoat_safe%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26vnd_prx_segments%3D300003%252C131100%252C121100%252C112200%252C210000%252C240000%252C240003%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252C_EBB19Z6KkgL_&cookie=ID%3D56cb4b939023e779%3AT%3D1576734454%3AS%3DALNI_MbCTCNqRTdNIuoyLyz4NUuyiY5p3g&cookie_enabled=1&bc=31&abxe=1&lmt=1576734456&dt=1576734456275&dlt=1576734454349&idt=348&frm=20&biw=1585&bih=1200&oid=3&adxs=0&adys=80&adks=2385402828&ucis=3&ifi=3&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&dssz=43&icsg=565151795249152&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1585x90&msz=1585x90&ga_vid=1631964171.1576734455&ga_sid=1576734455&ga_hid=1531490670&fws=4&ohw=1585
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
4f91d1df687ed0afb034e7200950798aa052d95c94b4d9d8d2b63eaaad2cf00c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com

Response headers

date
Thu, 19 Dec 2019 05:47:36 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2488
x-xss-protection
0
google-lineitem-id
5046266783
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138269621953
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
5 KB
3 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3964567263106963&correlator=2964256094318075&output=ldjh&impl=fifs&adsid=NT&eid=21063635%2C21065138%2C21065310&vrg=2019121002&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20191219&iu_parts=3379%2Cconde.ars%2Crail%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=300x250%7C300x600&prev_scp=pos%3Drail%26ctx_slot_type%3Dsiderail%26ctx_slot_rn%3D0%26amznbid%3D2%26amznp%3D2%26m_mv%3DslotNoHistData%26m_gv%3DslotNoHistData%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dsiderail_0&eri=1&cust_params=env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.31.8%26ctx_page_slug%3Dbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%26cnt_tags%3Dexploits%252Cmicrosoft-3%252Coffice%252Cvulnerabilities%252Cword%252Czeroday%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26m_data%3D1%26m_safety%3Dsafe%26m_categories%3Dmoat_safe%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26vnd_prx_segments%3D300003%252C131100%252C121100%252C112200%252C210000%252C240000%252C240003%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252C_EBB19Z6KkgL_&cookie=ID%3D56cb4b939023e779%3AT%3D1576734454%3AS%3DALNI_MbCTCNqRTdNIuoyLyz4NUuyiY5p3g&cookie_enabled=1&bc=31&abxe=1&lmt=1576734456&dt=1576734456280&dlt=1576734454349&idt=348&frm=20&biw=1585&bih=1200&oid=3&adxs=1063&adys=370&adks=1483574547&ucis=4&ifi=4&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&dssz=43&icsg=565151795249152&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=300x250&msz=300x250&ga_vid=1631964171.1576734455&ga_sid=1576734455&ga_hid=1531490670&fws=516&ohw=300
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
ecc7bc0c173b01826950a10236cfd26f7013cc5c6b80e9bd52c82e5a01c4602a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com

Response headers

date
Thu, 19 Dec 2019 05:47:36 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2501
x-xss-protection
0
google-lineitem-id
5040599734
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138267908808
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame A80C
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvGADQy-lSxVF8JYaXBNigcEWn6v0DAkp1q9HgZknGH_vjT3gXtlVtRNLHzmzLAboX0QhaK1FySd5Z9d5ZG2F23uNqVJ0uKbeOD63SXjZQsBFgDkPU5c7wKltG_ldo__QOp2IoEk1XSU70UcmGOefZEiHN4zlwIr-nGJVhWcBMZFIJdFXJa4yXHCN7XzwRMrHYlWUYpslKSLSO_OtuKoD8Fr62BUEJ9tFhZfbVWSjvfCVF0u5hqFIN3PG_ZgcWpHAU9KRYYanUB6kjCWzenbraK7BhD4etYWO7Wtu95vWaxP9ywLzQPcA&sig=Cg0ArKJSzGi9wWuzze8nEAE&urlfix=1&adurl=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 19 Dec 2019 05:47:36 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame A80C
77 KB
29 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
44178919accac2fd92f71084d312c8ff266dd25b8b808f8e9b32fe2926aefb41
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1575654529893506"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
29272
x-xss-protection
0
expires
Thu, 19 Dec 2019 05:47:36 GMT
moatad.js
z.moatads.com/condenastdfp9588492144/ Frame A80C
296 KB
99 KB
Script
General
Full URL
https://z.moatads.com/condenastdfp9588492144/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
c384a8c6e9e2121279c05ed476db15b0162182fe6d2e02dcdf29dce0c8c01fd4

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:47:36 GMT
Content-Encoding
gzip
Last-Modified
Tue, 10 Dec 2019 16:24:59 GMT
Server
AmazonS3
x-amz-request-id
F74B16DA2C63B8B4
ETag
"7bf85e3e648bdfe94a1eda4280efd6c9"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=29030
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
101000
x-amz-id-2
p43BCw8bcyHSFGcjFwzvWxAwNtoAN2K6hg6aI+YOvK8Pz93Msv3AxpW1l/LWl826rYK7Lq0zrG0=
imgad
tpc.googlesyndication.com/pagead/ Frame A80C
67 KB
67 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/imgad?id=CICAgKCHmubapwEQARgBMgg4NdFLNo8gZQ
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
455fb02f490bd8f98119164a015899080c02af7605e908e00110ebfa41c93e1d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 17 Dec 2019 00:08:03 GMT
x-content-type-options
nosniff
server
cafe
age
193173
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=604800
content-disposition
attachment; filename="image.png"
content-type
image/png
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
68291
x-xss-protection
0
expires
Tue, 24 Dec 2019 00:08:03 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1576734454710&de=353393266844&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=post_nav_0&zMoatRendered=3&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=1&zMoatPageDataTargetingSet=3&zMoatSafetyTargetingSet=3&zMoatEmptySlot=1&zMoatNadoDataLoadTime=261&zMoatAllDataLoadTime=261&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day&ac=1&bq=11&f=0&zn=0&if=261&na=1305283275&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 19 Dec 2019 05:47:36 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 19 Dec 2019 05:47:36 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-12-19T05%3A47%3A36.485Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=exploits%7Cmicrosoft%7Coffice%7Cvulnerabilities%7CWord%7Czeroday&cCh=information%20technology&cTi=Booby-trapped%20Word%20documents%20in%20the%20wild%20exploit%20critical%20Microsoft%200-day&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932&cEnt=microsoft%2C%20page%20layout%2C%20zero-day%20attack%2C%20mcafee%2C%20malware%2C%20fireeye%2C%20html%20application%2C%20windows%20registry%2C%20dan%20goodin%2C%20e-mail%2C%20rich%20text%20format%2C%20utc%2C%20california%2C%20windows%2010%2C%20operating%20system%2C%20macro%2C%20people%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20black%20hat%20usa&cEnw=1%2C%200.6784015477110633%2C%200.6268754530888921%2C%200.6112050352517427%2C%200.5769415477213082%2C%200.5278673858966411%2C%200.4876640019841165%2C%200.4251233242626762%2C%200.4219554491828688%2C%200.4055303805005162%2C%200.4003259436441344%2C%200.391641659880906%2C%200.36639663721428006%2C%200.3631841362436009%2C%200.36076348914452483%2C%200.3556732396947552%2C%200.3498922968926395%2C%200.3410893830977022%2C%200.30540966836663985%2C%200.2996590443923909&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&cCl=749&cId=1074069&cPd=2017-04-08T20%3A00%3A41.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day&pRt=referral&pHp=%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pWw=1600&pWh=1200&pPw=1600&pPh=5200&pSw=1600&pSh=1200&uID=880272b7-97c7-46cd-bb41-a5d3d98ce114&sID=798b2d0d-8f7f-47aa-b9d0-65db1b0cabd3&pID=cd29b53c-2016-4f75-8662-50a55f84b89f&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&xID=82ff3600-abbe-4326-92ff-3b0bf79c45f5&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4552798968%2C%22campaignId%22%3A2532006886%2C%22creativeId%22%3A138269621953%2C%22elementId%22%3A%22post_nav_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22exploits%22%2C%22microsoft-3%22%2C%22office%22%2C%22vulnerabilities%22%2C%22word%22%2C%22zeroday%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A5046266783%2C%22name%22%3A%22post_nav_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22728x90%22%2C%22slug%22%3A%22booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%22%7D&dim3=%7B%22footerStart%22%3A1576734454504%2C%22headerStart%22%3A1576734454487%2C%22navigationStart%22%3A1576734453666%2C%22pubAdsReady%22%3A1576734454702%2C%22injected%22%3A1576734456485%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22post_nav%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22post_nav_0%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%22%5D%2C%22cnt_tags%22%3A%5B%22exploits%22%2C%22microsoft-3%22%2C%22office%22%2C%22vulnerabilities%22%2C%22word%22%2C%22zeroday%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22131100%22%2C%22121100%22%2C%22112200%22%2C%22210000%22%2C%22240000%22%2C%22240003%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22_EBB19Z6KkgL_%22%5D%7D&cKh=microsoft%2Cvulnerability%2Cbooby-trapped%20word%20document%2Cpage%20layout%2Czero-day%20attack%2Cmcafee
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 19 Dec 2019 05:47:36 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
truncated
/ Frame A80C
220 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3c4c0dd2b9e5d4d7d0e39b8d95552ee423289de8fc56be3189283c571172d6ef

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-12-19T05%3A47%3A36.567Z&_t=slot_loaded&cBr=Ars%20Technica&cKe=exploits%7Cmicrosoft%7Coffice%7Cvulnerabilities%7CWord%7Czeroday&cCh=information%20technology&cTi=Booby-trapped%20Word%20documents%20in%20the%20wild%20exploit%20critical%20Microsoft%200-day&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932&cEnt=microsoft%2C%20page%20layout%2C%20zero-day%20attack%2C%20mcafee%2C%20malware%2C%20fireeye%2C%20html%20application%2C%20windows%20registry%2C%20dan%20goodin%2C%20e-mail%2C%20rich%20text%20format%2C%20utc%2C%20california%2C%20windows%2010%2C%20operating%20system%2C%20macro%2C%20people%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20black%20hat%20usa&cEnw=1%2C%200.6784015477110633%2C%200.6268754530888921%2C%200.6112050352517427%2C%200.5769415477213082%2C%200.5278673858966411%2C%200.4876640019841165%2C%200.4251233242626762%2C%200.4219554491828688%2C%200.4055303805005162%2C%200.4003259436441344%2C%200.391641659880906%2C%200.36639663721428006%2C%200.3631841362436009%2C%200.36076348914452483%2C%200.3556732396947552%2C%200.3498922968926395%2C%200.3410893830977022%2C%200.30540966836663985%2C%200.2996590443923909&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&cCl=749&cId=1074069&cPd=2017-04-08T20%3A00%3A41.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day&pRt=referral&pHp=%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pWw=1600&pWh=1200&pPw=1600&pPh=5200&pSw=1600&pSh=1200&uID=74956b41-71bc-4ed7-a5ac-4c6ee13aad6f&uNw=1&uUq=1&pID=0d020451-7c46-4c1e-91ce-e5b61e1254d1&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&xID=82ff3600-abbe-4326-92ff-3b0bf79c45f5&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4552798968%2C%22campaignId%22%3A2532006886%2C%22creativeId%22%3A138269621953%2C%22elementId%22%3A%22post_nav_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22exploits%22%2C%22microsoft-3%22%2C%22office%22%2C%22vulnerabilities%22%2C%22word%22%2C%22zeroday%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A5046266783%2C%22name%22%3A%22post_nav_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22728x90%22%2C%22slug%22%3A%22booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%22%7D&dim3=%7B%22footerStart%22%3A1576734454504%2C%22headerStart%22%3A1576734454487%2C%22navigationStart%22%3A1576734453666%2C%22pubAdsReady%22%3A1576734454702%2C%22injected%22%3A1576734456485%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A1576734456567%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22post_nav%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22post_nav_0%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%22%5D%2C%22cnt_tags%22%3A%5B%22exploits%22%2C%22microsoft-3%22%2C%22office%22%2C%22vulnerabilities%22%2C%22word%22%2C%22zeroday%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22131100%22%2C%22121100%22%2C%22112200%22%2C%22210000%22%2C%22240000%22%2C%22240003%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22_EBB19Z6KkgL_%22%5D%7D&cKh=microsoft%2Cvulnerability%2Cbooby-trapped%20word%20document%2Cpage%20layout%2Czero-day%20attack%2Cmcafee
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 19 Dec 2019 05:47:36 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
view
securepubads.g.doubleclick.net/pcs/ Frame F11E
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjss8rToGEP-YIXc3Xi60Mb15eaXJ__AWj4pZ_MYQB9vqOqPnywJ5t1VpQVipGRALqXbBAYLSIZS2SsmzgZ6M-EduMmAy7nKF_2E53L0AaM1YQl0U9dQZEdex3U6nxIZnQfpXhBz_VcFWpQwhn0bTCP2qJd1rzCaoeImVmM--hY_AiOymaCf6QHJpcO-bg6uhVPnxLzCIJLMbDMUSb3a_hCIdy7JnNQdMs5V0BtXkfXBfZx_gOKXwujp8z8SX4ljHIqphr6fFiVJgTSBwzKv3hji9yX5nNqwFHuyqxMx3FVE88KrXudqOuw&sig=Cg0ArKJSzBFOpwUO0wcYEAE&urlfix=1&adurl=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 19 Dec 2019 05:47:36 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Thu, 19 Dec 2019 05:47:36 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame F11E
77 KB
29 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
44178919accac2fd92f71084d312c8ff266dd25b8b808f8e9b32fe2926aefb41
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1575654529893506"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
29272
x-xss-protection
0
expires
Thu, 19 Dec 2019 05:47:36 GMT
moatad.js
z.moatads.com/condenastdfp9588492144/ Frame F11E
296 KB
99 KB
Script
General
Full URL
https://z.moatads.com/condenastdfp9588492144/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
c384a8c6e9e2121279c05ed476db15b0162182fe6d2e02dcdf29dce0c8c01fd4

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:47:36 GMT
Content-Encoding
gzip
Last-Modified
Tue, 10 Dec 2019 16:24:59 GMT
Server
AmazonS3
x-amz-request-id
F74B16DA2C63B8B4
ETag
"7bf85e3e648bdfe94a1eda4280efd6c9"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=29030
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
101000
x-amz-id-2
p43BCw8bcyHSFGcjFwzvWxAwNtoAN2K6hg6aI+YOvK8Pz93Msv3AxpW1l/LWl826rYK7Lq0zrG0=
imgad
tpc.googlesyndication.com/pagead/ Frame F11E
31 KB
31 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/imgad?id=CICAgKCHrInzLhABGAEyCE_JzlIUVS3K
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
5e73548c352971d890ba2741893f05b90b512ad6174dec6272afb6e07b6949b5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 17 Dec 2019 15:54:50 GMT
x-content-type-options
nosniff
server
cafe
age
136366
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=604800
content-disposition
attachment; filename="image.png"
content-type
image/png
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
31662
x-xss-protection
0
expires
Tue, 24 Dec 2019 15:54:50 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-12-19T05%3A47%3A36.584Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=exploits%7Cmicrosoft%7Coffice%7Cvulnerabilities%7CWord%7Czeroday&cCh=information%20technology&cTi=Booby-trapped%20Word%20documents%20in%20the%20wild%20exploit%20critical%20Microsoft%200-day&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932&cEnt=microsoft%2C%20page%20layout%2C%20zero-day%20attack%2C%20mcafee%2C%20malware%2C%20fireeye%2C%20html%20application%2C%20windows%20registry%2C%20dan%20goodin%2C%20e-mail%2C%20rich%20text%20format%2C%20utc%2C%20california%2C%20windows%2010%2C%20operating%20system%2C%20macro%2C%20people%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20black%20hat%20usa&cEnw=1%2C%200.6784015477110633%2C%200.6268754530888921%2C%200.6112050352517427%2C%200.5769415477213082%2C%200.5278673858966411%2C%200.4876640019841165%2C%200.4251233242626762%2C%200.4219554491828688%2C%200.4055303805005162%2C%200.4003259436441344%2C%200.391641659880906%2C%200.36639663721428006%2C%200.3631841362436009%2C%200.36076348914452483%2C%200.3556732396947552%2C%200.3498922968926395%2C%200.3410893830977022%2C%200.30540966836663985%2C%200.2996590443923909&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&cCl=749&cId=1074069&cPd=2017-04-08T20%3A00%3A41.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day&pRt=referral&pHp=%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pWw=1600&pWh=1200&pPw=1600&pPh=5200&pSw=1600&pSh=1200&uID=74956b41-71bc-4ed7-a5ac-4c6ee13aad6f&sID=3a328989-f192-4bb0-b12f-a769b95f2f10&pID=0d020451-7c46-4c1e-91ce-e5b61e1254d1&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&xID=82ff3600-abbe-4326-92ff-3b0bf79c45f5&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4552798968%2C%22campaignId%22%3A2530329078%2C%22creativeId%22%3A138267908808%2C%22elementId%22%3A%22siderail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22exploits%22%2C%22microsoft-3%22%2C%22office%22%2C%22vulnerabilities%22%2C%22word%22%2C%22zeroday%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A5040599734%2C%22name%22%3A%22siderail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x250%22%2C%22slug%22%3A%22booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%22%7D&dim3=%7B%22footerStart%22%3A1576734454504%2C%22headerStart%22%3A1576734454487%2C%22navigationStart%22%3A1576734453666%2C%22pubAdsReady%22%3A1576734454702%2C%22injected%22%3A1576734456584%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22siderail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22siderail_0%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%22%5D%2C%22cnt_tags%22%3A%5B%22exploits%22%2C%22microsoft-3%22%2C%22office%22%2C%22vulnerabilities%22%2C%22word%22%2C%22zeroday%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22131100%22%2C%22121100%22%2C%22112200%22%2C%22210000%22%2C%22240000%22%2C%22240003%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22_EBB19Z6KkgL_%22%5D%7D&cKh=microsoft%2Cvulnerability%2Cbooby-trapped%20word%20document%2Cpage%20layout%2Czero-day%20attack%2Cmcafee
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 19 Dec 2019 05:47:36 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
truncated
/ Frame F11E
214 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
68b58e51f377d6c94ff25a1ec20249127d02d87c5005de771dac0d3a5ec04ee3

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-12-19T05%3A47%3A36.630Z&_t=slot_loaded&cBr=Ars%20Technica&cKe=exploits%7Cmicrosoft%7Coffice%7Cvulnerabilities%7CWord%7Czeroday&cCh=information%20technology&cTi=Booby-trapped%20Word%20documents%20in%20the%20wild%20exploit%20critical%20Microsoft%200-day&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932&cEnt=microsoft%2C%20page%20layout%2C%20zero-day%20attack%2C%20mcafee%2C%20malware%2C%20fireeye%2C%20html%20application%2C%20windows%20registry%2C%20dan%20goodin%2C%20e-mail%2C%20rich%20text%20format%2C%20utc%2C%20california%2C%20windows%2010%2C%20operating%20system%2C%20macro%2C%20people%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20black%20hat%20usa&cEnw=1%2C%200.6784015477110633%2C%200.6268754530888921%2C%200.6112050352517427%2C%200.5769415477213082%2C%200.5278673858966411%2C%200.4876640019841165%2C%200.4251233242626762%2C%200.4219554491828688%2C%200.4055303805005162%2C%200.4003259436441344%2C%200.391641659880906%2C%200.36639663721428006%2C%200.3631841362436009%2C%200.36076348914452483%2C%200.3556732396947552%2C%200.3498922968926395%2C%200.3410893830977022%2C%200.30540966836663985%2C%200.2996590443923909&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&cCl=749&cId=1074069&cPd=2017-04-08T20%3A00%3A41.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day&pRt=referral&pHp=%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pWw=1600&pWh=1200&pPw=1600&pPh=5200&pSw=1600&pSh=1200&uID=74956b41-71bc-4ed7-a5ac-4c6ee13aad6f&sID=3a328989-f192-4bb0-b12f-a769b95f2f10&pID=0d020451-7c46-4c1e-91ce-e5b61e1254d1&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&xID=82ff3600-abbe-4326-92ff-3b0bf79c45f5&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4552798968%2C%22campaignId%22%3A2530329078%2C%22creativeId%22%3A138267908808%2C%22elementId%22%3A%22siderail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22exploits%22%2C%22microsoft-3%22%2C%22office%22%2C%22vulnerabilities%22%2C%22word%22%2C%22zeroday%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A5040599734%2C%22name%22%3A%22siderail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x250%22%2C%22slug%22%3A%22booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%22%7D&dim3=%7B%22footerStart%22%3A1576734454504%2C%22headerStart%22%3A1576734454487%2C%22navigationStart%22%3A1576734453666%2C%22pubAdsReady%22%3A1576734454702%2C%22injected%22%3A1576734456584%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A1576734456629%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22siderail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22siderail_0%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%22%5D%2C%22cnt_tags%22%3A%5B%22exploits%22%2C%22microsoft-3%22%2C%22office%22%2C%22vulnerabilities%22%2C%22word%22%2C%22zeroday%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22131100%22%2C%22121100%22%2C%22112200%22%2C%22210000%22%2C%22240000%22%2C%22240003%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22_EBB19Z6KkgL_%22%5D%7D&cKh=microsoft%2Cvulnerability%2Cbooby-trapped%20word%20document%2Cpage%20layout%2Czero-day%20attack%2Cmcafee
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 19 Dec 2019 05:47:37 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1576734454710&de=353393266844&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=siderail_0&zMoatRendered=4&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=2&zMoatPageDataTargetingSet=4&zMoatSafetyTargetingSet=4&zMoatEmptySlot=1&zMoatNadoDataLoadTime=261&zMoatAllDataLoadTime=261&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day&ac=1&bq=11&f=0&zn=0&if=261&na=817444728&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 19 Dec 2019 05:47:37 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 19 Dec 2019 05:47:37 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-12-19T05%3A47%3A37.626Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cKe=exploits%7Cmicrosoft%7Coffice%7Cvulnerabilities%7CWord%7Czeroday&cCh=information%20technology&cTi=Booby-trapped%20Word%20documents%20in%20the%20wild%20exploit%20critical%20Microsoft%200-day&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932&cEnt=microsoft%2C%20page%20layout%2C%20zero-day%20attack%2C%20mcafee%2C%20malware%2C%20fireeye%2C%20html%20application%2C%20windows%20registry%2C%20dan%20goodin%2C%20e-mail%2C%20rich%20text%20format%2C%20utc%2C%20california%2C%20windows%2010%2C%20operating%20system%2C%20macro%2C%20people%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20black%20hat%20usa&cEnw=1%2C%200.6784015477110633%2C%200.6268754530888921%2C%200.6112050352517427%2C%200.5769415477213082%2C%200.5278673858966411%2C%200.4876640019841165%2C%200.4251233242626762%2C%200.4219554491828688%2C%200.4055303805005162%2C%200.4003259436441344%2C%200.391641659880906%2C%200.36639663721428006%2C%200.3631841362436009%2C%200.36076348914452483%2C%200.3556732396947552%2C%200.3498922968926395%2C%200.3410893830977022%2C%200.30540966836663985%2C%200.2996590443923909&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&cCl=749&cId=1074069&cPd=2017-04-08T20%3A00%3A41.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day&pRt=referral&pHp=%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pWw=1600&pWh=1200&pPw=1600&pPh=5200&pSw=1600&pSh=1200&uID=74956b41-71bc-4ed7-a5ac-4c6ee13aad6f&sID=3a328989-f192-4bb0-b12f-a769b95f2f10&pID=0d020451-7c46-4c1e-91ce-e5b61e1254d1&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&xID=82ff3600-abbe-4326-92ff-3b0bf79c45f5&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4552798968%2C%22campaignId%22%3A2532006886%2C%22creativeId%22%3A138269621953%2C%22elementId%22%3A%22post_nav_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Afalse%2C%22isFirstImpressionViewable%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Afalse%2C%22isFirstMoneyImpressionViewable%22%3Atrue%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22exploits%22%2C%22microsoft-3%22%2C%22office%22%2C%22vulnerabilities%22%2C%22word%22%2C%22zeroday%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A5046266783%2C%22name%22%3A%22post_nav_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22728x90%22%2C%22slug%22%3A%22booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%22%7D&dim3=%7B%22footerStart%22%3A1576734454504%2C%22headerStart%22%3A1576734454487%2C%22navigationStart%22%3A1576734453666%2C%22pubAdsReady%22%3A1576734454702%2C%22injected%22%3A1576734456485%2C%22viewable%22%3A1576734457626%2C%22viewport%22%3A%22%22%2C%22impression%22%3A1576734456567%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22post_nav%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22post_nav_0%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%22%5D%2C%22cnt_tags%22%3A%5B%22exploits%22%2C%22microsoft-3%22%2C%22office%22%2C%22vulnerabilities%22%2C%22word%22%2C%22zeroday%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22131100%22%2C%22121100%22%2C%22112200%22%2C%22210000%22%2C%22240000%22%2C%22240003%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22_EBB19Z6KkgL_%22%5D%7D&cKh=microsoft%2Cvulnerability%2Cbooby-trapped%20word%20document%2Cpage%20layout%2Czero-day%20attack%2Cmcafee
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 19 Dec 2019 05:47:37 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
activeview
pagead2.googlesyndication.com/pcs/ Frame A80C
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsvAcP7eUzl-wDL6btDfowGR5-uiFlU5VOOjOnD-eFzEqBRkhXANWebsdybKc393Mp7p_HwFdlUKYeUInZhmwS-h60D92QMepNm1XUH4uwg&sig=Cg0ArKJSzPKJyH8TTPYgEAE&adk=2385402828&tt=-1&bs=1585%2C1200&mtos=1033,1033,1033,1033,1033&tos=1033,0,0,0,0&p=80,429,170,1157&mcvt=1033&rs=0&ht=0&tfs=103&tls=1136&mc=1&lte=1&bas=0&bac=0&met=ie&avms=nio&exg=1&md=2&lm=2&rst=1576734456483&dlt&rpt=23&isd=0&msd=0&ext&imams=1&xdi=0&ps=1585%2C5177&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-6-12-2-11-11-0-0-0&tvt=1136&is=728%2C90&iframe_loc=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&r=v&id=osdim&vs=4&uc=12&upc=1&tgt=DIV&cl=1&cec=1&clc=1&wf=0&cac=1&cd=0x0&itpl=19&v=20191206
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:37 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-12-19T05%3A47%3A37.728Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cKe=exploits%7Cmicrosoft%7Coffice%7Cvulnerabilities%7CWord%7Czeroday&cCh=information%20technology&cTi=Booby-trapped%20Word%20documents%20in%20the%20wild%20exploit%20critical%20Microsoft%200-day&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932&cEnt=microsoft%2C%20page%20layout%2C%20zero-day%20attack%2C%20mcafee%2C%20malware%2C%20fireeye%2C%20html%20application%2C%20windows%20registry%2C%20dan%20goodin%2C%20e-mail%2C%20rich%20text%20format%2C%20utc%2C%20california%2C%20windows%2010%2C%20operating%20system%2C%20macro%2C%20people%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20black%20hat%20usa&cEnw=1%2C%200.6784015477110633%2C%200.6268754530888921%2C%200.6112050352517427%2C%200.5769415477213082%2C%200.5278673858966411%2C%200.4876640019841165%2C%200.4251233242626762%2C%200.4219554491828688%2C%200.4055303805005162%2C%200.4003259436441344%2C%200.391641659880906%2C%200.36639663721428006%2C%200.3631841362436009%2C%200.36076348914452483%2C%200.3556732396947552%2C%200.3498922968926395%2C%200.3410893830977022%2C%200.30540966836663985%2C%200.2996590443923909&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&cCl=749&cId=1074069&cPd=2017-04-08T20%3A00%3A41.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day&pRt=referral&pHp=%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pWw=1600&pWh=1200&pPw=1600&pPh=5200&pSw=1600&pSh=1200&uID=74956b41-71bc-4ed7-a5ac-4c6ee13aad6f&sID=3a328989-f192-4bb0-b12f-a769b95f2f10&pID=0d020451-7c46-4c1e-91ce-e5b61e1254d1&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&xID=82ff3600-abbe-4326-92ff-3b0bf79c45f5&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4552798968%2C%22campaignId%22%3A2530329078%2C%22creativeId%22%3A138267908808%2C%22elementId%22%3A%22siderail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Afalse%2C%22isFirstImpressionViewable%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Afalse%2C%22isFirstMoneyImpressionViewable%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22exploits%22%2C%22microsoft-3%22%2C%22office%22%2C%22vulnerabilities%22%2C%22word%22%2C%22zeroday%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A5040599734%2C%22name%22%3A%22siderail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x250%22%2C%22slug%22%3A%22booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%22%7D&dim3=%7B%22footerStart%22%3A1576734454504%2C%22headerStart%22%3A1576734454487%2C%22navigationStart%22%3A1576734453666%2C%22pubAdsReady%22%3A1576734454702%2C%22injected%22%3A1576734456584%2C%22viewable%22%3A1576734457727%2C%22viewport%22%3A%22%22%2C%22impression%22%3A1576734456629%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22siderail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22siderail_0%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%22%5D%2C%22cnt_tags%22%3A%5B%22exploits%22%2C%22microsoft-3%22%2C%22office%22%2C%22vulnerabilities%22%2C%22word%22%2C%22zeroday%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22131100%22%2C%22121100%22%2C%22112200%22%2C%22210000%22%2C%22240000%22%2C%22240003%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22_EBB19Z6KkgL_%22%5D%7D&cKh=microsoft%2Cvulnerability%2Cbooby-trapped%20word%20document%2Cpage%20layout%2Czero-day%20attack%2Cmcafee
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 19 Dec 2019 05:47:37 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
activeview
pagead2.googlesyndication.com/pcs/ Frame F11E
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsuSj_Uf_Sb3C5zGY_xfa9KrBUjYJiGe5r8AlaZXZx_8wClXCkt31ohoHVp76iIrygyltylfUWTgeC8mSP5TuzhFE1qG768HR8h4Eo_wkFQ&sig=Cg0ArKJSzPVy-8m7IWF4EAE&adk=1483574547&tt=-1&bs=1585%2C1200&mtos=0,1033,1033,1033,1033&tos=0,1033,0,0,0&p=370,1063,620,1363&mcvt=1033&rs=0&ht=0&tfs=103&tls=1136&mc=0.99&lte=1&bas=0&bac=0&met=ie&avms=nio&exg=1&md=2&lm=2&rst=1576734456581&dlt&rpt=22&isd=0&msd=0&ext&imams=1&xdi=0&ps=1585%2C5177&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-6-12-2-11-11-0-0-0&tvt=1135&is=300%2C250&iframe_loc=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&r=v&id=osdim&vs=4&uc=12&upc=1&tgt=DIV&cl=1&cec=1&clc=1&wf=0&cac=1&cd=0x0&itpl=19&v=20191206
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:37 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
pubads.g.doubleclick.net/gampad/ Frame 5E20
4 KB
2 KB
XHR
General
Full URL
https://pubads.g.doubleclick.net/gampad/ads?sz=640x480|480x70&iu=/3379/conde.ars/player/information-technology/article&ciu_szs=300x60&gdfp_req=1&env=vp&output=vmap&unviewed_position_start=1&cust_params=env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.31.8%26ctx_page_slug%3Dbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%26cnt_tags%3Dexploits%252Cmicrosoft-3%252Coffice%252Cvulnerabilities%252Cword%252Czeroday%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26m_data%3D1%26m_safety%3Dsafe%26m_categories%3Dmoat_safe%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26vnd_prx_segments%3D300003%252C131100%252C121100%252C112200%252C210000%252C240000%252C240003%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252C_EBB19Z6KkgL_%26ctx_line_items%3D%26height%3D304%26muted%3D0%26right_rail%3D0%26sensitive%3D0%26width%3D540&correlator=2964256094318075&description_url=https%3A%2F%2Fthescene.com%2Fwatch%2Farstechnica%2Fcustomizing-mini-4wd-racers-for-high-speeds-on-a-small-scale&vid=5deac57938d0694c4b9da428&cmsid=1495&ppid=82ff3600abbe432692ff3b0bf79c45f5
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-0b9a5b23a348cb67e59a.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
8ed9f16f19e39eef73db3ddba11390bc405ffa25b302f9bd17c18db2cb9a1e1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com

Response headers

date
Thu, 19 Dec 2019 05:47:38 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
1053
x-xss-protection
0
google-lineitem-id
0
pragma
no-cache
server
cafe
google-creative-id
0
content-type
text/xml; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/ Frame 5E20
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-12-19T05%3A47%3A38.733Z&_c=timedOut&_t=gptData&sID=798b2d0d-8f7f-47aa-b9d0-65db1b0cabd3&pID=cd29b53c-2016-4f75-8662-50a55f84b89f&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&dim1=%7B%22adBlocked%22%3Afalse%2C%22adUnits%22%3A%5B%223379%2Fconde.ars%2Finterstitial%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F2%22%2C%223379%2Fconde.ars%2Fmid-content%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars.native%2Flegacy%2Finformation-technology%2Farticle%2F1%22%5D%2C%22embedLocation%22%3A%22arstechnica%22%2C%22error%22%3A%22%22%2C%22lineItems%22%3A%5B%5D%2C%22publicaEnabled%22%3Afalse%2C%22videoId%22%3A%225deac57938d0694c4b9da428%22%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 19 Dec 2019 05:47:38 GMT
Connection
keep-alive
transfer-encoding
chunked
Content-Type
image/gif
events
wren.condenastdigital.com/1.0/conde/
0
732 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.194.193.74 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-194-193-74.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Thu, 19 Dec 2019 05:47:38 GMT
strict-transport-security
max-age=15768000; preload
x-content-type-options
nosniff
Server
nginx/1.15.8
x-download-options
noopen
x-frame-options
DENY
Content-Type
image/gif
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
vary
origin
x-xss-protection
1; mode=block
collect
www.google-analytics.com/r/
35 B
106 B
Other
General
Full URL
https://www.google-analytics.com/r/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:38 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://arstechnica.com
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
moatvideo.js
z.moatads.com/condenastjsvideocontent160527792519/ Frame 5E20
282 KB
95 KB
Script
General
Full URL
https://z.moatads.com/condenastjsvideocontent160527792519/moatvideo.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-0b9a5b23a348cb67e59a.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
5a7df58304a66d5ecd564904b0f001a3b75740b26d8924d721455161fd874220

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:47:38 GMT
Content-Encoding
gzip
Last-Modified
Tue, 10 Dec 2019 16:25:05 GMT
Server
AmazonS3
x-amz-request-id
410E586D4F66E938
ETag
"2d94b7a59b22aa8fe63dc651bd19cd4a"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=29296
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
96518
x-amz-id-2
rRVz2IX0Q5uhrWqfLmWtTyEi1IDPI/sxzNmzIJ3OS4fCW8CUHNIfj+da69DDiAqHgWPEuqSg4qg=
track
capture.condenastdigital.com/ Frame 5E20
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-12-19T05%3A47%3A38.903Z&_c=Video%20Ad&_t=Ad%20Call%20Made&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=https%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fcustomizing-mini-4wd-racers-for-high-speeds-on-a-small-scale%2F&cId=5deac57938d0694c4b9da428&cKe=hobbies%2Crace%20car%2Crace%20cars%2Cracing&cPd=2019-12-10T16%3A00%3A00%2B00%3A00&cTi=Customizing%20Mini%204WD%20Racers%20For%20High%20Speeds%20On%20A%20Small%20Scale&cTy=%2F3379%2Fconde.ars%2Fplayer%2Finformation-technology%2Farticle&mDu=655&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pID=cd29b53c-2016-4f75-8662-50a55f84b89f&pWw=540&pWh=303.75&sID=798b2d0d-8f7f-47aa-b9d0-65db1b0cabd3&uId=880272b7-97c7-46cd-bb41-a5d3d98ce114&xid=82ff3600-abbe-4326-92ff-3b0bf79c45f5&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22gitBranch%22%3A%22master%22%2C%22gitSha%22%3A%2210ec1cd%22%2C%22guid%22%3A%2212d7da6-cec1-389a-16cb-3b425ce1ba5%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A3693.953125%2C%22playerType%22%3A%22video-continuous%22%2C%22playsOnPage%22%3A0%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22isRightRail%22%3Afalse%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Creport%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3A%22OUT_OF_VIEWPORT%22%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%2C%22podIndex%22%3A%22%22%7D&videoViews=1&adId=&pageType=article%7Creport
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 19 Dec 2019 05:47:38 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDEVIDEOCONTENT1&hp=1&wf=1&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=8&f=0&j=&t=1576734458957&de=492748698959&m=0&ar=5d15d450ed-clean&iw=3aed878&q=9&cb=0&ym=0&cu=1576734458957&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=Customizing%20Mini%204WD%20Racers%20For%20High%20Speeds%20On%20A%20Small%20Scale%3A%2F3379%2Fconde.ars%2Fplayer%2Finformation-technology%2Farticle%3Aundefined%3Aundefined&zMoatVideoId=5deac57938d0694c4b9da428&zMoatAP=-&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&id=1&zMoatDomain=arstechnica.com&zMoatSubdomain=arstechnica.com&gw=condenastjsvideocontent160527792519&fd=1&ac=1&it=500&ti=0&ih=1&fs=174970&na=1647636692&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 19 Dec 2019 05:47:39 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 19 Dec 2019 05:47:39 GMT
21b60411-41b1-4740-8528-630500e6af3ethumbs.mp4
dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/ Frame 5E20
32 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/21b60411-41b1-4740-8528-630500e6af3ethumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.76 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-76.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=98304-

Response headers

Date
Wed, 18 Dec 2019 15:56:54 GMT
Via
1.1 fa5a3d5abd34c6fac657b045a4dcbdc5.cloudfront.net (CloudFront)
Last-Modified
Fri, 06 Dec 2019 21:47:42 GMT
Server
AmazonS3
Age
49846
ETag
"3c4c69d175578a2c5dcb4d064f187efb"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 98304-1999682/1999683
Connection
keep-alive
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Content-Length
1901379
X-Amz-Cf-Id
hsVlEHpR8po8KYFPek0oiIZi4p6HL-cj4tyaMsfNM2ON4fsYon-FCw==
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-12-19T05%3A47%3A41.340Z&_t=timespent&cBr=Ars%20Technica&cKe=exploits%7Cmicrosoft%7Coffice%7Cvulnerabilities%7CWord%7Czeroday&cCh=information%20technology&cTi=Booby-trapped%20Word%20documents%20in%20the%20wild%20exploit%20critical%20Microsoft%200-day&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.46503489989435565%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932%2C%200.1858646133202932&cEnt=microsoft%2C%20page%20layout%2C%20zero-day%20attack%2C%20mcafee%2C%20malware%2C%20fireeye%2C%20html%20application%2C%20windows%20registry%2C%20dan%20goodin%2C%20e-mail%2C%20rich%20text%20format%2C%20utc%2C%20california%2C%20windows%2010%2C%20operating%20system%2C%20macro%2C%20people%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20black%20hat%20usa&cEnw=1%2C%200.6784015477110633%2C%200.6268754530888921%2C%200.6112050352517427%2C%200.5769415477213082%2C%200.5278673858966411%2C%200.4876640019841165%2C%200.4251233242626762%2C%200.4219554491828688%2C%200.4055303805005162%2C%200.4003259436441344%2C%200.391641659880906%2C%200.36639663721428006%2C%200.3631841362436009%2C%200.36076348914452483%2C%200.3556732396947552%2C%200.3498922968926395%2C%200.3410893830977022%2C%200.30540966836663985%2C%200.2996590443923909&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&cCl=749&cId=1074069&cPd=2017-04-08T20%3A00%3A41.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day&pRt=referral&pHp=%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&pWw=1600&pWh=1200&pPw=1600&pPh=5500&pSw=1600&pSh=1200&uID=1502b9de-a9e7-4fcf-8170-9a225fc5f02a&uNw=1&uUq=1&pID=16f205b9-6428-4c99-beda-aec03b82ad3d&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=general&xID=82ff3600-abbe-4326-92ff-3b0bf79c45f5&_v=5000&cKh=microsoft%2Cvulnerability%2Cbooby-trapped%20word%20document%2Cpage%20layout%2Czero-day%20attack%2Cmcafee
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 19 Dec 2019 05:47:41 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
otBannerSdk.js
cdn.cookielaw.org/scripttemplates/5.8.0/
325 KB
80 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/5.8.0/otBannerSdk.js
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (ama/8B1F) /
Resource Hash
68ef50c5c08ba5d3e3d445cdd02d8c75a5b84b06c727adf39351302fb98e64a9

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Thu, 19 Dec 2019 05:47:42 GMT
content-encoding
gzip
content-md5
8lJMJve9631xgsfFYtFWIg==
x-cache
HIT
status
200
content-length
81387
x-ms-lease-status
unlocked
last-modified
Tue, 19 Nov 2019 18:51:03 GMT
server
ECAcc (ama/8B1F)
etag
0x8D76D216D3FCFC4
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
b6f20979-101e-00c1-0c25-b6535f000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Thu, 19 Dec 2019 09:47:42 GMT
location
geolocation.onetrust.com/cookieconsentpub/v1/geo/
115 B
452 B
Script
General
Full URL
https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.8.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:b844 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
6109d5731632d64df9eb483fcde4fb912fbe0e95eab63b7db6739f7a3f6ee757
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains; preload

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 19 Dec 2019 05:47:42 GMT
content-encoding
gzip
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
status
200
strict-transport-security
max-age=0; includeSubDomains; preload
cf-ray
547715563e8ccbc0-VIE
en.json
cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910/ef17d20e-0b37-40e7-a82c-27f698052aea/
60 KB
11 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910/ef17d20e-0b37-40e7-a82c-27f698052aea/en.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.8.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (ama/8B0C) /
Resource Hash
d7507c5cc6aa791851d21f0ff62323699dd541325eb10fd6e607e2df81292bd9

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com

Response headers

x-ms-blob-type
BlockBlob
date
Thu, 19 Dec 2019 05:47:42 GMT
content-encoding
gzip
content-md5
1wTl5cHFD6IINDiZLD9QyQ==
x-cache
HIT
status
200
content-length
10832
x-ms-lease-status
unlocked
last-modified
Thu, 05 Dec 2019 21:24:42 GMT
server
ECAcc (ama/8B0C)
etag
0x8D779C98B40898C
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
9e26bdb5-201e-002c-042a-b65adb000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Thu, 19 Dec 2019 09:47:42 GMT
otFlat.json
cdn.cookielaw.org/scripttemplates/5.8.0/assets/
15 KB
3 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/scripttemplates/5.8.0/assets/otFlat.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.8.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (ama/8A97) /
Resource Hash
4d9e3b8db4c77de2ba265ef418dd527b110cc2e8511fe41629497fa14a03fdf2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com

Response headers

x-ms-blob-type
BlockBlob
date
Thu, 19 Dec 2019 05:47:42 GMT
content-encoding
gzip
content-md5
mhZI9HgQXGbYO9dHay6OOg==
x-cache
HIT
status
200
content-length
2772
x-ms-lease-status
unlocked
last-modified
Tue, 19 Nov 2019 18:51:00 GMT
server
ECAcc (ama/8A97)
etag
0x8D76D216BD3ECA4
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
x-ms-request-id
fa99475c-c01e-00c8-2925-b649d1000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Thu, 19 Dec 2019 09:47:42 GMT
otPcCenter.json
cdn.cookielaw.org/scripttemplates/5.8.0/assets/
77 KB
13 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/scripttemplates/5.8.0/assets/otPcCenter.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.8.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (ama/8AF5) /
Resource Hash
982edb214b1458e3972bd7395bb311bae25a07d7dd28c3147ef5ec6cc8bbc9bb

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com

Response headers

x-ms-blob-type
BlockBlob
date
Thu, 19 Dec 2019 05:47:42 GMT
content-encoding
gzip
content-md5
BMuFH9M7O9D7RGsVMm228g==
x-cache
HIT
status
200
content-length
13446
x-ms-lease-status
unlocked
last-modified
Tue, 19 Nov 2019 18:51:00 GMT
server
ECAcc (ama/8AF5)
etag
0x8D76D216BF780FC
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
x-ms-request-id
4955a743-e01e-017a-6925-b6f4fe000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Thu, 19 Dec 2019 09:47:42 GMT
identity
api.rlcdn.com/api/
0
203 B
XHR
General
Full URL
https://api.rlcdn.com/api/identity?pid=2&rt=envelope&cv=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA&ct=1
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.244.174.68 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
68.174.244.35.bc.googleusercontent.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Thu, 19 Dec 2019 05:47:42 GMT
via
1.1 google
alt-svc
clear
status
204
access-control-allow-methods
GET, OPTIONS
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
access-control-allow-headers
Cookie, Accept, Origin, Authorization, Content-Type
truncated
/
817 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
db311174b0e3c340727b63c055cfb5b317808e909503e1bda11cc58af444f12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
fastlane.json
fastlane.rubiconproject.com/a/api/
260 B
743 B
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=2&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&p_screen_res=1600x1200&site_id=217438&zone_id=1070068&kw=rp.fastlane&tk_flint=index&rand=0.460236746994485&gdpr=1&gdpr_consent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA&alt_size_ids=57
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.140 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
43231d38bbbf522407bfa245a0a4c431a3a6d70c71c01ffa82cb78225712d935

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Thu, 19 Dec 2019 05:47:42 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=376
Content-Length
260
Expires
Wed, 17 Sep 1975 21:32:10 GMT
ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._Zv69l88G;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_Nuzv...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._Zv69l88G;gdpr=1;eucon...
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._Zv69l88G;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:43 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._Zv69l88G;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:43 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._Zv69l88G;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._irCmVfTI;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_Nuzv...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._irCmVfTI;gdpr=1;eucon...
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._irCmVfTI;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:43 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._irCmVfTI;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:43 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._irCmVfTI;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
cygnus
as-sec.casalemedia.com/
66 B
478 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=321388&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A84088559%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%227%22%2C%22siteID%22%3A%22375847%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%228%22%2C%22siteID%22%3A%22375847%22%7D%2C%22id%22%3A%222%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%2218ad9782-6934-4c20-83c5-1891701a95aa%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222019-12-19T05%3A47%3A35%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%2C%22ext%22%3A%7B%22consent%22%3A%22BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA%22%7D%7D%2C%22regs%22%3A%7B%22ext%22%3A%7B%22gdpr%22%3A1%7D%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
7290bce443c9c7e3c47691df75e0a7c6186fcf7ed64874e6084d9d2d32ec2d5f

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Thu, 19 Dec 2019 05:47:44 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
86
Expires
Thu, 19 Dec 2019 05:47:44 GMT
cdb
bidder.criteo.com/
0
145 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=77&profileId=154&cb=66005878396
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.2.152 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

status
204
date
Thu, 19 Dec 2019 05:47:43 GMT
access-control-allow-credentials
true
server
Finatra
access-control-allow-origin
https://arstechnica.com
timing-allow-origin
*
vary
Origin
placementbid.json
an.facebook.com/v2/
96 B
1 KB
XHR
General
Full URL
https://an.facebook.com/v2/placementbid.json?sdk=5.5.web&placementids%5B%5D=2038188213062675_2473096466238512&adformats%5B%5D=300x250&cachebuster=2qA82bxeoK6ZHx4wlljH7txZFAazT4NF1EbQom9uRa0G9hAXcvvII4EC&platform=2061185240785516&adapterver=2.1.0
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:800e:face:b00c:0:2 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
8cfaa27da7c106f19b2a80a7bc3fcc422e8a11d092bb10a846278a0020821a04
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

strict-transport-security
max-age=15552000; preload
content-encoding
br
x-content-type-options
nosniff
x-fb-an-errors
access-control-expose-headers
X-FB-AN-Request-ID, X-FB-AN-Errors, X-FB-AN-Bid-Count
x-fb-an-request-id
6366051699474705884
status
200
alt-svc
h3-24=":443"; ma=3600
x-xss-protection
0
pragma
no-cache
x-fb-debug
gxGlwEf+lBdSjjOYefKdLhrSd2GgchSeDTCyAurzGh2WoYkmfqK5/U1QmWdbMz7SyVI5G7sNIH01REzYFqdpCA==
x-frame-options
DENY
date
Thu, 19 Dec 2019 05:47:42 GMT
vary
Accept-Encoding
content-type
text/javascript; charset=utf-8
access-control-allow-origin
https://arstechnica.com
x-fb-an-bid-count
0
cache-control
private, no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
261 B
744 B
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=15&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&p_screen_res=1600x1200&site_id=217438&zone_id=1070068&kw=rp.fastlane&tk_flint=index&rand=0.9161450401921722&gdpr=1&gdpr_consent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA&alt_size_ids=10
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.140 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
e4bb252bb06b70d47de19a412610a99a2bcdeb511e749f1f01905bfc26f60dce

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Thu, 19 Dec 2019 05:47:42 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=426
Content-Length
261
Expires
Wed, 17 Sep 1975 21:32:10 GMT
cygnus
as-sec.casalemedia.com/
66 B
478 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=321388&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A53638107%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2233%22%2C%22siteID%22%3A%22375863%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2231%22%2C%22siteID%22%3A%22375863%22%7D%2C%22id%22%3A%222%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%2218ad9782-6934-4c20-83c5-1891701a95aa%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222019-12-19T05%3A47%3A35%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%2C%22ext%22%3A%7B%22consent%22%3A%22BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA%22%7D%7D%2C%22regs%22%3A%7B%22ext%22%3A%7B%22gdpr%22%3A1%7D%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
bc4fcff0ea3fb1ed17519857774393bc0eb116b8a34dd53f81a76df9d37d0522

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Thu, 19 Dec 2019 05:47:44 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
86
Expires
Thu, 19 Dec 2019 05:47:44 GMT
cdb
bidder.criteo.com/
0
145 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=77&profileId=154&cb=82055173438
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.2.152 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

status
204
date
Thu, 19 Dec 2019 05:47:42 GMT
access-control-allow-credentials
true
server
Finatra
access-control-allow-origin
https://arstechnica.com
timing-allow-origin
*
vary
Origin
ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._rX8CjxhX;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_Nuzv...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._rX8CjxhX;gdpr=1;eucon...
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._rX8CjxhX;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:43 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._rX8CjxhX;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:43 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._rX8CjxhX;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._Fd8XUgii;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_Nuzv...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._Fd8XUgii;gdpr=1;eucon...
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._Fd8XUgii;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:43 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._Fd8XUgii;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:43 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._Fd8XUgii;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
arstechnica_mini-4wd-racing.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1575930137/ Frame 5E20
77 KB
78 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1575930137/arstechnica_mini-4wd-racing.jpg
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-0b9a5b23a348cb67e59a.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
00e3bdc033f31eee3294bbfa68d03bc0968b4f86507e68ff9d19d9890039c89c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com

Response headers

Date
Thu, 19 Dec 2019 05:45:08 GMT
Via
1.1 varnish, 1.1 6ea9fcffa719a56ee2be748a73d37974.cloudfront.net (CloudFront)
Age
155
Edge-Cache-Tag
380278988686077832122293282495365645705,504486728181076666154556403696563473843,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
78622
X-Served-By
cache-hhn4040-HHN
Last-Modified
Tue, 10 Dec 2019 16:07:04 GMT
Server
cloudinary
X-Timer
S1575994072.752642,VS0,VE127
ETag
"bc88b9555531b7b8cfae6ecc1581a7f7"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
BK6UNSQBnmrcTc7y80wSDgI_OEHU6y-rE4O1HQtZ31M3XCfdrnx_Qg==
X-Cache-Hits
0
arstechnica_mini-4wd-racing.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1575930137/ Frame 5E20
77 KB
78 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1575930137/arstechnica_mini-4wd-racing.jpg
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.2 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-2.fra50.r.cloudfront.net
Software
cloudinary /
Resource Hash
00e3bdc033f31eee3294bbfa68d03bc0968b4f86507e68ff9d19d9890039c89c

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:45:08 GMT
Via
1.1 varnish, 1.1 d627b75d0c1aedd3691390ac8498d3b0.cloudfront.net (CloudFront)
Age
155
Edge-Cache-Tag
380278988686077832122293282495365645705,504486728181076666154556403696563473843,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
78622
X-Served-By
cache-hhn4040-HHN
Last-Modified
Tue, 10 Dec 2019 16:07:04 GMT
Server
cloudinary
X-Timer
S1575994072.752642,VS0,VE127
ETag
"bc88b9555531b7b8cfae6ecc1581a7f7"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
MSGX-Hh_J4rrdEP9HVwHxeSvQcpUObI_n6G__EvEpuPDOO6w1OH-tw==
X-Cache-Hits
0
ADTECH;apid=1A1378944a-2223-11ea-8343-12bdedcc1230;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._Fd8XUgii;gdpr=1;euconsent=BOrz...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1A1378944a-2223-11ea-8343-12bdedcc1230;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1A1378944a-2223-11ea-8343-12bdedcc1230;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._Fd8XUgii;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:43 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1A1378944a-2223-11ea-8343-12bdedcc1230;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._Fd8XUgii;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:43 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1A1378944a-2223-11ea-8343-12bdedcc1230;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._Fd8XUgii;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A13a03f04-2223-11ea-ad2d-1204ea82ed4e;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._irCmVfTI;gdpr=1;euconsent=BOrz...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1A13a03f04-2223-11ea-ad2d-1204ea82ed4e;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1A13a03f04-2223-11ea-ad2d-1204ea82ed4e;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._irCmVfTI;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:43 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1A13a03f04-2223-11ea-ad2d-1204ea82ed4e;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._irCmVfTI;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:43 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1A13a03f04-2223-11ea-ad2d-1204ea82ed4e;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._irCmVfTI;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A13a1430e-2223-11ea-93c9-12eca44d2d72;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._rX8CjxhX;gdpr=1;euconsent=BOrz...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1A13a1430e-2223-11ea-93c9-12eca44d2d72;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1A13a1430e-2223-11ea-93c9-12eca44d2d72;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._rX8CjxhX;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:43 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1A13a1430e-2223-11ea-93c9-12eca44d2d72;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._rX8CjxhX;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:43 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1A13a1430e-2223-11ea-93c9-12eca44d2d72;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._rX8CjxhX;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A137ac44a-2223-11ea-af32-12b295be6374;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._Zv69l88G;gdpr=1;euconsent=BOrz...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1A137ac44a-2223-11ea-af32-12b295be6374;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1A137ac44a-2223-11ea-af32-12b295be6374;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._Zv69l88G;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:43 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1A137ac44a-2223-11ea-af32-12b295be6374;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._Zv69l88G;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:43 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1A137ac44a-2223-11ea-af32-12b295be6374;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._Zv69l88G;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A1378944a-2223-11ea-8343-12bdedcc1230;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._Fd8XUgii;gdpr=1;euconsent=BOrz...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/
1 KB
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1A1378944a-2223-11ea-8343-12bdedcc1230;cfp=1;rndc=1576734462;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._Fd8XUgii;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
c6db15e21e91c347f4aa791e2573401d969b502e2db20828986cca393e210156

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:43 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
1112
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A137ac44a-2223-11ea-af32-12b295be6374;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._Zv69l88G;gdpr=1;euconsent=BOrz...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/
1 KB
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1A137ac44a-2223-11ea-af32-12b295be6374;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._Zv69l88G;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
c3cf6a9ffe92e4114877cb2baf61e3a6d7db0631c1682dfdc6572a013a54826d

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:43 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
1110
expires
Mon, 15 Jun 1998 00:00:00 GMT
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=321388&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Thu, 19 Dec 2019 05:47:43 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Thu, 19 Dec 2019 05:47:43 GMT
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=321388&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Thu, 19 Dec 2019 05:47:43 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Thu, 19 Dec 2019 05:47:43 GMT
ADTECH;apid=1A13a03f04-2223-11ea-ad2d-1204ea82ed4e;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._irCmVfTI;gdpr=1;euconsent=BOrz...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/
1 KB
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1A13a03f04-2223-11ea-ad2d-1204ea82ed4e;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462682;callback=window.headertag.AolHtb.adResponseCallbacks._irCmVfTI;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
2d749c10d75f7c87cd7f4036e67b5ece5fd770cf9c81a2bbd74fc3e376b6d1ef

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:44 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
1112
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A13a1430e-2223-11ea-93c9-12eca44d2d72;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._rX8CjxhX;gdpr=1;euconsent=BOrz...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/
1 KB
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1A13a1430e-2223-11ea-93c9-12eca44d2d72;cfp=1;rndc=1576734463;cmd=bid;cors=yes;v=2;misc=1576734462689;callback=window.headertag.AolHtb.adResponseCallbacks._rX8CjxhX;gdpr=1;euconsent=BOrzpXxOrzpXxAcABBDECwAAAAAsxrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprxz3bEw-KgAAAAAAAAAAA
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
97c1d940bff95ed45bba045815a539f9ce8aff477ce48ebb77618c453f4ddf4b

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 19 Dec 2019 05:47:44 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
1111
expires
Mon, 15 Jun 1998 00:00:00 GMT
events
wren.condenastdigital.com/1.0/conde/
0
732 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.194.193.74 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-194-193-74.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Thu, 19 Dec 2019 05:47:44 GMT
strict-transport-security
max-age=15768000; preload
x-content-type-options
nosniff
Server
nginx/1.15.8
x-download-options
noopen
x-frame-options
DENY
Content-Type
image/gif
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
vary
origin
x-xss-protection
1; mode=block
/
srv-2019-12-19-05.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2019-12-19-05.pixel.parsely.com/plogger/?rand=1576734465857&plid=21925518&idsite=arstechnica.com&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%22parsely_uuid%22%3A%225f16b4a1-ee46-4049-b9bf-af053f729cf0%22%2C%22parsely_site_uuid%22%3A%2289c171ca-2fb8-4f43-b77f-b3cf0ffae19f%22%7D&sid=1&surl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&sref=&sts=1576734465857&slts=0&date=Thu+Dec+19+2019+06%3A47%3A45+GMT%2B0100+(Central+European+Standard+Time)&action=heartbeat&inc=5&tt=4900&pvid=48171818&u=89c171ca-2fb8-4f43-b77f-b3cf0ffae19f
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.203.142.184 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-203-142-184.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Dec 2019 05:47:24 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
events
wren.condenastdigital.com/1.0/conde/
0
732 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.194.193.74 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-194-193-74.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Thu, 19 Dec 2019 05:47:48 GMT
strict-transport-security
max-age=15768000; preload
x-content-type-options
nosniff
Server
nginx/1.15.8
x-download-options
noopen
x-frame-options
DENY
Content-Type
image/gif
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
vary
origin
x-xss-protection
1; mode=block
pixel.gif
v4.moatads.com/
43 B
312 B
Image
General
Full URL
https://v4.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&vb=6&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fpagead%2Fimgad%3Fid%3DCICAgKCHrInzLhABGAEyCE_JzlIUVS3K&i=CONDECW3&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=0&g=7&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&id=1&cm=0&f=0&j=&t=1576734456618&de=123087374408&cu=1576734456618&m=15115&ar=5d15d450ed-clean&iw=658a6b0&cb=0&ym=0&ll=2&lm=0&ln=1&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5539&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&as=1&ag=15110&an=10088&gi=1&gf=15110&gg=10088&ix=15110&ic=15110&ez=1&ck=1011&kw=808&aj=1&pg=100&pf=100&ib=0&cc=1&bw=15110&bx=10088&ci=1011&jz=808&dj=1&aa=1&ad=15011&cn=9989&gn=1&gk=15011&gl=9989&ik=15011&co=1116&cp=1012&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=14909&cd=9888&ah=14909&am=9888&rf=0&re=1&ft=5055&fv=5055&fw=2711&wb=2&cl=0&at=0&d=4552798968%3A2530329078%3A5040599734%3A138267908808&zMoatPlacID=21711241635&bo=21698048816&bp=21711241635&bd=Undefined&zMoatPT=article&zMoatST=siderail&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatRFSH=Refresh%20Not%20Defined&zMoatNoRFSH=true&dfp=0%2C1&la=21711241635&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&gw=condenastdfp9588492144&zMoatOrigSlicer1=21698048816&zMoatOrigSlicer2=21711241635&zMoatPS=siderail_0&zMoatCNS=6.31.8&zMoatSZ=300x250&zMoatKWPos=Undefined&zMoatPlat=wordpress&zMoatMMV_MAX=na&dfpSlotId=siderail_0&zMoatCURL=arstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day&zMoatDev=Desktop&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=siderail_0&iq=na&tt=na&tc=0&fs=174970&zid=CICAgKCHrInzLhABGAEyCE_JzlIUVS3K&na=1109369622&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
34.230.71.126 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-230-71-126.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 19 Dec 2019 05:47:52 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:01 GMT
pixel.gif
v4.moatads.com/
43 B
312 B
Image
General
Full URL
https://v4.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&vb=6&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fpagead%2Fimgad%3Fid%3DCICAgKCHmubapwEQARgBMgg4NdFLNo8gZQ&i=CONDECW3&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=0&g=6&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day%2F&id=1&cm=0&f=0&j=&t=1576734456543&de=572242617984&cu=1576734456543&m=15197&ar=5d15d450ed-clean&iw=658a6b0&cb=0&ym=0&ll=2&lm=0&ln=1&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5539&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&as=1&ag=15184&an=10156&gi=1&gf=15184&gg=10156&ix=15184&ic=15184&ez=1&ck=1199&kw=1001&aj=1&pg=100&pf=100&ib=0&cc=1&bw=15184&bx=10156&ci=1199&jz=1001&dj=1&aa=1&ad=15086&cn=10058&gn=1&gk=15086&gl=10058&ik=15086&co=1101&cp=1001&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=14981&cd=9959&ah=14981&am=9959&rf=0&re=1&ft=7349&fv=7349&fw=1101&wb=2&cl=0&at=0&d=4552798968%3A2532006886%3A5046266783%3A138269621953&zMoatPlacID=21711241029&bo=21698048816&bp=21711241029&bd=Undefined&zMoatPT=article&zMoatST=post_nav&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatRFSH=Refresh%20Not%20Defined&zMoatNoRFSH=true&dfp=0%2C1&la=21711241029&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&gw=condenastdfp9588492144&zMoatOrigSlicer1=21698048816&zMoatOrigSlicer2=21711241029&zMoatPS=post_nav_0&zMoatCNS=6.31.8&zMoatSZ=728x90&zMoatKWPos=Undefined&zMoatPlat=wordpress&zMoatMMV_MAX=na&dfpSlotId=post_nav_0&zMoatCURL=arstechnica.com%2Finformation-technology%2F2017%2F04%2Fbooby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day&zMoatDev=Desktop&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=post_nav_0&iq=na&tt=na&tc=0&fs=174970&zid=CICAgKCHmubapwEQARgBMgg4NdFLNo8gZQ&na=873700211&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
34.230.71.126 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-230-71-126.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2017/04/booby-trapped-word-documents-in-the-wild-exploit-critical-microsoft-0day/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 19 Dec 2019 05:47:52 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:01 GMT

Verdicts & Comments Add Verdict or Comment

138 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| ars object| dataLayer object| googletag object| cns object| sparrowQueue object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken boolean| apstagLOADED object| apstag object| cnBus function| moatYieldReady object| _perfRefForUserTimingPolyfill object| __core-js_shared__ object| core object| fastdom object| BOOMR_mq object| regeneratorRuntime object| headertag object| Twig object| Arrive function| FPCountdown function| $ function| jQuery function| moment function| UAParser function| purl function| twig function| EvEmitter function| imagesLoaded function| easydropdown function| m function| transitionEnd string| $queryString function| arsVideoModulePlayerReady37282455 object| CN object| __SKIM_JS_GLOBAL__ object| skimlinksAPI object| _cne function| __cmp object| PolarConde object| NATIVEADS object| NATIVEADS_QUEUE object| google_tag_manager function| postscribe string| hash number| google_srt undefined| google_measure_js_timing boolean| google_noFetch number| __google_ad_urls_id function| gotSegmentData undefined| ct undefined| et undefined| hourElapsed undefined| msg undefined| pixelDomain undefined| isDomless undefined| documentReferrer undefined| isBeta undefined| viewHash undefined| pxSrc undefined| px object| Moat#G26 object| MoatSuperV26 object| MoatNadoAllJsonpRequest_15521889 object| Moat#PML#26#1.2 boolean| Moat#EVA object| moatPrebidApi number| google_unique_id object| gaGlobal string| referrer object| urlParams string| queryString string| fullUrl object| myParam string| GoogleAnalyticsObject function| ga string| b object| h function| getVisitNumCustom number| d object| ActionButton object| SparrowConfigV2 object| PARSELY object| OBR string| OB_releaseVer function| OBR$ object| outbrain object| outbrain_rater object| NATIVEADS_STORE object| google_tag_data object| gaplugins function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter object| __google_ad_urls object| ampInaboxIframes object| ampInaboxPendingMessages boolean| google_osd_loaded boolean| google_onload_fired object| SparrowCache function| Sparrow boolean| sparrowInitialize object| _4d object| sparrow object| OneTrustStub string| OnetrustActiveGroups string| OptanonActiveGroups function| OptanonWrapper function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| gaData boolean| ab_isEventListenerAddedForWidgetVisible_action-button-react-iframe object| Criteo function| headertag_render object| rubicontag object| criteo_pubtag function| mb object| _google_rum_ns_ object| google_persistent_state_async number| google_global_correlator object| closure_lm_854197 object| google string| key object| closure_lm_824094 object| otStubData function| jsonFeed object| Optanon object| OneTrust function| arrive function| unbindArrive function| leave function| unbindLeave

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

4d.condenastdigital.com
adserver-us.adtech.advertising.com
adservice.google.com
adservice.google.de
ampcid.google.com
ampcid.google.de
an.facebook.com
api.cnevids.com
api.rlcdn.com
api.skimlinks.mgr.consensu.org
arstechnica.com
as-sec.casalemedia.com
bidder.criteo.com
c.amazon-adsystem.com
capture.condenastdigital.com
cdn.arstechnica.net
cdn.cookielaw.org
cdn.mediavoice.com
connect.facebook.net
d1z2jf7jlzjs58.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
dwgyu36up6iuz.cloudfront.net
embed.actionbutton.co
fastlane.rubiconproject.com
geolocation.onetrust.com
images.outbrainimg.com
imasdk.googleapis.com
infinityid.condenastdigital.com
js-sec.indexww.com
log.outbrainimg.com
match.adsrvr.org
mb.moatads.com
mcdp-chidc2.outbrain.com
mid.rkdms.com
odb.outbrain.com
p.skimresources.com
pagead2.googlesyndication.com
pixel.condenastdigital.com
player.cnevids.com
plugin.mediavoice.com
polarcdn-pentos.com
polarcdn-terrax.com
prod-native.actionbutton.co
pubads.g.doubleclick.net
px.moatads.com
r.skimresources.com
s.skimresources.com
s0.2mdn.net
securepubads.g.doubleclick.net
segment-data.zqtk.net
srv-2019-12-19-05.config.parsely.com
srv-2019-12-19-05.pixel.parsely.com
static.criteo.net
static.polarcdn.com
stats.g.doubleclick.net
t.skimresources.com
tcheck.outbrainimg.com
tpc.googlesyndication.com
v4.moatads.com
widgets.outbrain.com
wren.condenastdigital.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
z.moatads.com
104.17.192.78
13.32.8.22
143.204.101.27
143.204.101.48
143.204.101.76
143.204.98.2
143.204.98.85
151.101.112.239
151.101.114.2
151.139.128.10
152.195.132.202
152.199.21.89
172.217.16.194
178.250.2.130
178.250.2.152
18.211.127.174
2.18.232.28
2.18.234.190
2.18.234.21
2.18.235.40
205.234.175.175
216.58.207.66
23.210.248.65
2600:9000:2156:ce00:11:8cf6:b500:93a1
2606:4700:10::6814:b844
2606:4700::6811:4132
2606:4700::6813:da83
2606:4700::6813:f87e
2a00:1450:4001:800::200e
2a00:1450:4001:806::2001
2a00:1450:4001:806::2006
2a00:1450:4001:814::200e
2a00:1450:4001:815::2002
2a00:1450:4001:815::200a
2a00:1450:4001:815::200e
2a00:1450:4001:81e::2002
2a00:1450:4001:81e::2008
2a00:1450:4001:81f::2002
2a00:1450:4001:820::2004
2a00:1450:4001:824::2003
2a00:1450:400c:c04::9a
2a03:2880:f01c:800e:face:b00c:0:2
2a03:2880:f0ff:1a:face:b00c:0:3
3.209.40.151
3.8.13.5
34.194.193.74
34.230.71.126
35.190.40.172
35.190.59.101
35.201.67.47
35.244.174.68
50.31.142.127
50.31.169.131
52.203.142.184
52.4.170.229
54.173.157.53
54.174.252.80
54.76.0.5
63.32.144.14
64.202.112.127
69.173.144.140
99.84.87.154
99.84.93.101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