URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Submission: On October 28 via api from US

Summary

This website contacted 38 IPs in 7 countries across 30 domains to perform 104 HTTP transactions. The main IP is 130.211.198.3, located in Mountain View, United States and belongs to GOOGLE - Google LLC, US. The main domain is blog.malwarebytes.com.
TLS certificate: Issued by DigiCert SHA2 High Assurance Server CA on April 2nd 2019. Valid for: 2 years.
This is the only time blog.malwarebytes.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
37 130.211.198.3 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
9 2600:9000:20e... 16509 (AMAZON-02)
2 52.239.137.4 8075 (MICROSOFT...)
1 2a04:fa87:fff... 2635 (AUTOMATTIC)
1 192.0.77.32 2635 (AUTOMATTIC)
1 2001:4de0:ac1... 20446 (HIGHWINDS3)
2 2a00:1450:400... 15169 (GOOGLE)
1 3 2a00:1450:400... 15169 (GOOGLE)
2 2620:1ec:c11:... 8068 (MICROSOFT...)
2 51.140.39.77 8075 (MICROSOFT...)
1 151.101.12.157 54113 (FASTLY)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 143.204.97.29 16509 (AMAZON-02)
1 2 2a00:1450:400... 15169 (GOOGLE)
1 3 2a00:1450:400... 15169 (GOOGLE)
3 2a00:1450:400... 15169 (GOOGLE)
1 104.244.42.133 13414 (TWITTER)
4 151.101.112.134 54113 (FASTLY)
1 52.36.158.183 16509 (AMAZON-02)
1 104.244.42.3 13414 (TWITTER)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
1 2 172.217.23.134 15169 (GOOGLE)
6 2606:4700::68... 13335 (CLOUDFLAR...)
5 151.101.128.134 54113 (FASTLY)
1 172.217.16.162 15169 (GOOGLE)
1 2 2a05:f500:11:... 14413 (LINKEDIN)
1 1 2a05:f500:10:... 14413 (LINKEDIN)
1 2a00:1450:400... 15169 (GOOGLE)
1 2 172.217.22.6 15169 (GOOGLE)
2 2a03:2880:f01... 32934 (FACEBOOK)
1 151.101.13.2 54113 (FASTLY)
1 2 52.214.122.164 16509 (AMAZON-02)
1 13.225.78.13 16509 (AMAZON-02)
1 34.248.255.146 16509 (AMAZON-02)
1 3.223.137.124 14618 (AMAZON-AES)
1 54.230.95.25 16509 (AMAZON-02)
2 2 52.30.193.62 16509 (AMAZON-02)
1 2 52.222.162.223 16509 (AMAZON-02)
2 2a03:2880:f11... 32934 (FACEBOOK)
104 38
Apex Domain
Subdomains
Transfer
47 malwarebytes.com
blog.malwarebytes.com
www.malwarebytes.com
genesis.malwarebytes.com
635 KB
9 disqus.com
malwarebytesunpacked.disqus.com
disqus.com
77 KB
7 doubleclick.net
stats.g.doubleclick.net
8019375.fls.doubleclick.net
googleads.g.doubleclick.net
5118230.fls.doubleclick.net
3 KB
6 disquscdn.com
c.disquscdn.com
434 KB
3 company-target.com
api.company-target.com
segments.company-target.com
2 KB
3 linkedin.com
px.ads.linkedin.com
www.linkedin.com
1 KB
3 google.de
www.google.de
374 B
3 google.com
www.google.com
456 B
3 google-analytics.com
www.google-analytics.com
18 KB
2 facebook.com
www.facebook.com
359 B
2 bidr.io
match.prod.bidr.io
754 B
2 avocet.io
ads.avocet.io
900 B
2 quora.com
a.quora.com
q.quora.com
14 KB
2 facebook.net
connect.facebook.net
87 KB
2 adsrvr.org
js.adsrvr.org
insight.adsrvr.org
3 KB
2 perk0mean.com
secure.perk0mean.com
1 KB
2 bing.com
bat.bing.com
8 KB
2 googletagmanager.com
www.googletagmanager.com
65 KB
2 windows.net
optanon.blob.core.windows.net
27 KB
1 demandbase.com
scripts.demandbase.com
16 KB
1 googleadservices.com
www.googleadservices.com
10 KB
1 licdn.com
snap.licdn.com
2 KB
1 twitter.com
analytics.twitter.com
635 B
1 t.co
t.co
449 B
1 crazyegg.com
script.crazyegg.com
7 KB
1 ads-twitter.com
static.ads-twitter.com
2 KB
1 jquery.com
code.jquery.com
30 KB
1 wp.com
s0.wp.com
3 KB
1 gravatar.com
secure.gravatar.com
13 KB
1 googleapis.com
fonts.googleapis.com
1 KB
104 30
Domain Requested by
37 blog.malwarebytes.com blog.malwarebytes.com
9 www.malwarebytes.com blog.malwarebytes.com
6 c.disquscdn.com malwarebytesunpacked.disqus.com
5 disqus.com malwarebytesunpacked.disqus.com
4 malwarebytesunpacked.disqus.com blog.malwarebytes.com
www.malwarebytes.com
3 www.google.de blog.malwarebytes.com
3 www.google.com 1 redirects blog.malwarebytes.com
3 www.google-analytics.com 1 redirects blog.malwarebytes.com
www.google-analytics.com
2 www.facebook.com connect.facebook.net
2 segments.company-target.com 1 redirects
2 match.prod.bidr.io 2 redirects
2 ads.avocet.io 1 redirects
2 connect.facebook.net blog.malwarebytes.com
connect.facebook.net
2 5118230.fls.doubleclick.net 1 redirects www.malwarebytes.com
2 px.ads.linkedin.com 1 redirects blog.malwarebytes.com
2 8019375.fls.doubleclick.net 1 redirects www.googletagmanager.com
2 stats.g.doubleclick.net 1 redirects www.google-analytics.com
2 secure.perk0mean.com www.googletagmanager.com
secure.perk0mean.com
2 bat.bing.com blog.malwarebytes.com
2 www.googletagmanager.com blog.malwarebytes.com
www.googletagmanager.com
2 optanon.blob.core.windows.net blog.malwarebytes.com
optanon.blob.core.windows.net
1 api.company-target.com scripts.demandbase.com
1 q.quora.com
1 insight.adsrvr.org js.adsrvr.org
1 scripts.demandbase.com blog.malwarebytes.com
1 a.quora.com blog.malwarebytes.com
1 googleads.g.doubleclick.net www.googleadservices.com
1 www.linkedin.com 1 redirects
1 www.googleadservices.com www.googletagmanager.com
1 snap.licdn.com blog.malwarebytes.com
1 analytics.twitter.com static.ads-twitter.com
1 genesis.malwarebytes.com www.malwarebytes.com
1 t.co blog.malwarebytes.com
1 js.adsrvr.org www.googletagmanager.com
1 script.crazyegg.com www.googletagmanager.com
1 static.ads-twitter.com blog.malwarebytes.com
1 code.jquery.com optanon.blob.core.windows.net
1 s0.wp.com blog.malwarebytes.com
1 secure.gravatar.com blog.malwarebytes.com
1 fonts.googleapis.com blog.malwarebytes.com
104 40
Subject Issuer Validity Valid
blog.malwarebytes.com
DigiCert SHA2 High Assurance Server CA
2019-04-02 -
2021-07-05
2 years crt.sh
*.googleapis.com
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh
*.malwarebytes.com
DigiCert SHA2 High Assurance Server CA
2018-12-06 -
2020-12-09
2 years crt.sh
*.blob.core.windows.net
Microsoft IT TLS CA 5
2019-05-01 -
2021-05-01
2 years crt.sh
*.gravatar.com
COMODO RSA Domain Validation Secure Server CA
2018-09-06 -
2020-09-05
2 years crt.sh
*.wp.com
Go Daddy Secure Certificate Authority - G2
2018-04-10 -
2020-05-11
2 years crt.sh
jquery.org
COMODO RSA Domain Validation Secure Server CA
2018-10-17 -
2020-10-16
2 years crt.sh
*.google-analytics.com
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh
www.bing.com
Microsoft IT TLS CA 2
2019-04-30 -
2021-04-30
2 years crt.sh
secure.norm0care.com
Sectigo RSA Domain Validation Secure Server CA
2019-03-26 -
2020-03-25
a year crt.sh
ads-twitter.com
DigiCert SHA2 High Assurance Server CA
2019-08-14 -
2020-08-18
a year crt.sh
ssl945600.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-08-20 -
2020-02-26
6 months crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh
www.google.de
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh
t.co
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
*.disqus.com
DigiCert SHA2 Secure Server CA
2018-03-28 -
2020-04-27
2 years crt.sh
*.twitter.com
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
*.licdn.com
DigiCert SHA2 Secure Server CA
2019-04-01 -
2021-05-07
2 years crt.sh
*.doubleclick.net
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh
ssl565697.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-08-25 -
2020-03-02
6 months crt.sh
www.googleadservices.com
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh
px.ads.linkedin.com
DigiCert SHA2 Secure Server CA
2019-05-29 -
2021-06-29
2 years crt.sh
*.g.doubleclick.net
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh
www.google.com
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-09-22 -
2019-12-20
3 months crt.sh
quora.com
Let's Encrypt Authority X3
2019-10-25 -
2020-01-23
3 months crt.sh
*.avocet.io
Amazon
2019-07-06 -
2020-08-06
a year crt.sh
*.demandbase.com
Go Daddy Secure Certificate Authority - G2
2018-09-20 -
2020-11-19
2 years crt.sh
*.quora.com
Let's Encrypt Authority X3
2019-09-30 -
2019-12-29
3 months crt.sh
*.company-target.com
Go Daddy Secure Certificate Authority - G2
2019-06-19 -
2021-08-18
2 years crt.sh

This page contains 8 frames:

Primary Page: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Frame ID: FFE30C57515BFF6633328A154687A063
Requests: 97 HTTP requests in this frame

Frame: https://8019375.fls.doubleclick.net/activityi;dc_pre=CKSP4tDJv-UCFRYo4AodNvoMuA;src=8019375;type=malwa000;cat=malwa0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=5205179735354.269
Frame ID: 80EEF607EA57B77163200FEAF4B9E391
Requests: 1 HTTP requests in this frame

Frame: https://disqus.com/embed/comments/?base=default&f=malwarebytesunpacked&t_i=25399%20https%3A%2F%2Fblog.malwarebytes.com%2F%3Fp%3D25399&t_u=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&t_e=Mac%20App%20Store%20apps%20are%20stealing%20user%20data&t_d=Mac%20App%20Store%20apps%20are%20stealing%20user%20data%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&t_t=Mac%20App%20Store%20apps%20are%20stealing%20user%20data&s_o=default
Frame ID: 2681D6AEF6FCDB7F28731DF8EFCA713E
Requests: 1 HTTP requests in this frame

Frame: https://5118230.fls.doubleclick.net/activityi;dc_pre=CK2KidHJv-UCFQKYdwodD9MOWw;src=5118230;type=count0;cat=secur00;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;ord=1;num=9755630376725.824
Frame ID: BF9B4E9C0FC363C0E6E27905D274F052
Requests: 1 HTTP requests in this frame

Frame: https://insight.adsrvr.org/track/up?adv=8mirph5&ref=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&upid=r8yigtp&upv=1.1.0
Frame ID: D42688B923F3F8DB8D8618B6A9FB0083
Requests: 1 HTTP requests in this frame

Frame: https://disqus.com/embed/comments/?base=default&f=malwarebytesunpacked&t_i=25399%20https%3A%2F%2Fblog.malwarebytes.com%2F%3Fp%3D25399&t_u=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&t_e=Mac%20App%20Store%20apps%20are%20stealing%20user%20data&t_d=Mac%20App%20Store%20apps%20are%20stealing%20user%20data%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&t_t=Mac%20App%20Store%20apps%20are%20stealing%20user%20data&s_o=default
Frame ID: 04E89A9EFF9A6E3E65A61014696D530A
Requests: 1 HTTP requests in this frame

Frame: https://disqus.com/embed/comments/?base=default&f=malwarebytesunpacked&t_i=25399%20https%3A%2F%2Fblog.malwarebytes.com%2F%3Fp%3D25399&t_u=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&t_e=Mac%20App%20Store%20apps%20are%20stealing%20user%20data&t_d=Mac%20App%20Store%20apps%20are%20stealing%20user%20data%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&t_t=Mac%20App%20Store%20apps%20are%20stealing%20user%20data&s_o=default
Frame ID: 7C56870B6508B7F4BA3BD0A232A045A0
Requests: 1 HTTP requests in this frame

Frame: https://www.facebook.com/tr/
Frame ID: 712F942CD71166DA34B4AFBFF2B7AAE4
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link[^>]+s\d+\.wp\.com/i
  • headers link /rel="https:\/\/api\.w\.org\/"/i
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]+s\d+\.wp\.com/i
  • headers link /rel="https:\/\/api\.w\.org\/"/i
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]+s\d+\.wp\.com/i
  • headers link /rel="https:\/\/api\.w\.org\/"/i
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Page Statistics

104
Requests

100 %
HTTPS

45 %
IPv6

30
Domains

40
Subdomains

38
IPs

7
Countries

1457 kB
Transfer

2768 kB
Size

6
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 59
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&a=740496578&t=pageview&_s=1&dl=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&ul=en-us&de=UTF-8&dt=Mac%20App%20Store%20apps%20are%20stealing%20user%20data%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=IEBAAEAB~&jid=1428591755&gjid=1747820065&cid=2106811706.1572287032&tid=UA-3347303-10&_gid=827006494.1572287032&_r=1&z=1806276271 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-3347303-10&cid=2106811706.1572287032&jid=1428591755&_gid=827006494.1572287032&gjid=1747820065&_v=j79&z=1806276271 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-3347303-10&cid=2106811706.1572287032&jid=1428591755&_v=j79&z=1806276271 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-3347303-10&cid=2106811706.1572287032&jid=1428591755&_v=j79&z=1806276271&slf_rd=1&random=468874236
Request Chain 67
  • https://8019375.fls.doubleclick.net/activityi;src=8019375;type=malwa000;cat=malwa0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=5205179735354.269 HTTP 302
  • https://8019375.fls.doubleclick.net/activityi;dc_pre=CKSP4tDJv-UCFRYo4AodNvoMuA;src=8019375;type=malwa000;cat=malwa0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=5205179735354.269
Request Chain 74
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=1056361&url=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&time=1572287033147 HTTP 302
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D1056361%26url%3Dhttps%253A%252F%252Fblog.malwarebytes.com%252Fthreat-analysis%252F2018%252F09%252Fmac-app-store-apps-are-stealing-user-data%252F%26time%3D1572287033147%26liSync%3Dtrue HTTP 302
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=1056361&url=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&time=1572287033147&liSync=true
Request Chain 79
  • https://5118230.fls.doubleclick.net/activityi;src=5118230;type=count0;cat=secur00;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;ord=1;num=9755630376725.824 HTTP 302
  • https://5118230.fls.doubleclick.net/activityi;dc_pre=CK2KidHJv-UCFQKYdwodD9MOWw;src=5118230;type=count0;cat=secur00;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;ord=1;num=9755630376725.824
Request Chain 83
  • https://ads.avocet.io/s?add=5b8e9b462be173e55d6569fc&ty=j HTTP 302
  • https://ads.avocet.io/s?bounce=true&add=5b8e9b462be173e55d6569fc&ty=j
Request Chain 90
  • https://match.prod.bidr.io/cookie-sync/demandbase HTTP 303
  • https://match.prod.bidr.io/cookie-sync/demandbase?_bee_ppp=1 HTTP 303
  • https://segments.company-target.com/log?vendor=choca&user_id=AALO3067bmQAABVGQ42qsw HTTP 303
  • https://segments.company-target.com/validateCookie?vendor=choca&user_id=AALO3067bmQAABVGQ42qsw&verifyHash=d7f61f8a2a55d77907cdfcdeb2af8d26db86ac57

104 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
97 KB
24 KB
Document
General
Full URL
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
bc8a31baa91ce0952dd4d1c16030bb5a7947445b7bc7aac2e758acbd9fafdc55
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:method
GET
:authority
blog.malwarebytes.com
:scheme
https
:path
/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
sec-fetch-mode
navigate
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

status
200
server
nginx
date
Mon, 28 Oct 2019 18:23:51 GMT
content-type
text/html; charset=UTF-8
vary
Accept-Encoding Accept-Encoding Accept-Encoding,Cookie
x-pingback
https://blog.malwarebytes.com/xmlrpc.php
link
<https://blog.malwarebytes.com/wp-json/>; rel="https://api.w.org/" <https://blog.malwarebytes.com/?p=25399>; rel=shortlink
x-cacheable
SHORT
cache-control
max-age=600, must-revalidate
x-cache
HIT: 2
x-pass-why
x-cache-group
normal
x-frame-options
SAMEORIGIN
content-encoding
gzip
style.min.css
blog.malwarebytes.com/wp-includes/css/dist/block-library/
25 KB
4 KB
Stylesheet
General
Full URL
https://blog.malwarebytes.com/wp-includes/css/dist/block-library/style.min.css?ver=5.1.3
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
a72261a5191d1485620242b7d3b735501757aef23dedc6d27c84919af838e756

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:51 GMT
content-encoding
gzip
last-modified
Fri, 04 Jan 2019 19:38:57 GMT
server
nginx
status
200
etag
W/"5c2fb651-629a"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
text/css
access-control-allow-origin
*
cache-control
public, max-age=31536000
prettyPhoto.css
blog.malwarebytes.com/wp-content/plugins/responsive-lightbox/assets/prettyphoto/css/
19 KB
3 KB
Stylesheet
General
Full URL
https://blog.malwarebytes.com/wp-content/plugins/responsive-lightbox/assets/prettyphoto/css/prettyPhoto.css?ver=1.7.2
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
1f504f86bc8f301e4041e744f681cce164e9ac5e8e5dfacc984a012e95e1a7cd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:51 GMT
content-encoding
gzip
last-modified
Wed, 28 Feb 2018 21:17:34 GMT
server
nginx
status
200
etag
W/"5a971c6e-4db5"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
text/css
access-control-allow-origin
*
cache-control
public, max-age=31536000
css
fonts.googleapis.com/
17 KB
1 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Source+Sans+Pro%3A300%2C400%2C700%2C300italic%2C400italic%2C700italic%7CBitter%3A400%2C700&subset=latin%2Clatin-ext
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
ebc5589e0a2738bda34487e2aaf498c3b8c05a680b4730d027614dc71ba05995
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Mon, 28 Oct 2019 18:23:51 GMT
server
ESF
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
status
200
date
Mon, 28 Oct 2019 18:23:51 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
x-xss-protection
0
expires
Mon, 28 Oct 2019 18:23:51 GMT
genericons.css
blog.malwarebytes.com/wp-content/plugins/jetpack/_inc/genericons/genericons/
28 KB
16 KB
Stylesheet
General
Full URL
https://blog.malwarebytes.com/wp-content/plugins/jetpack/_inc/genericons/genericons/genericons.css?ver=3.1
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
4ed10d0d64bb1515397e8666a63f484d640dbc5678fa62574e077b7aef1c3af2

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:51 GMT
content-encoding
gzip
last-modified
Wed, 28 Feb 2018 21:17:31 GMT
server
nginx
status
200
etag
W/"5a971c6b-6e6a"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
text/css
access-control-allow-origin
*
cache-control
public, max-age=31536000
style.css
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/
91 KB
16 KB
Stylesheet
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/style.css?ver=2013-07-18
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
fa70c6e95ad8ca466ec33b926fc41a595745bb3036a9d37c2cd5fc5702c210ff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:51 GMT
content-encoding
gzip
last-modified
Tue, 22 Oct 2019 22:06:08 GMT
server
nginx
status
200
etag
W/"5daf7d50-16d4b"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
text/css
access-control-allow-origin
*
cache-control
public, max-age=31536000
jquery.js
blog.malwarebytes.com/wp-includes/js/jquery/
95 KB
34 KB
Script
General
Full URL
https://blog.malwarebytes.com/wp-includes/js/jquery/jquery.js?ver=1.12.4
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
1db21d816296e6939ba1f42962496e4134ae2b0081e26970864c40c6d02bb1df

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:51 GMT
content-encoding
gzip
last-modified
Wed, 04 Sep 2019 21:42:46 GMT
server
nginx
status
200
etag
W/"5d702fd6-17a69"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
jquery-migrate.min.js
blog.malwarebytes.com/wp-includes/js/jquery/
10 KB
4 KB
Script
General
Full URL
https://blog.malwarebytes.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
48eb8b500ae6a38617b5738d2b3faec481922a7782246e31d2755c034a45cd5d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:51 GMT
content-encoding
gzip
last-modified
Fri, 20 May 2016 06:11:28 GMT
server
nginx
status
200
etag
W/"573eaa90-2748"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
jquery.prettyPhoto.js
blog.malwarebytes.com/wp-content/plugins/responsive-lightbox/assets/prettyphoto/js/
37 KB
10 KB
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/plugins/responsive-lightbox/assets/prettyphoto/js/jquery.prettyPhoto.js?ver=1.7.2
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
e5087adff56cd9077a7b21a01d78e2a97177cbf4872935bbf3049d06ee884826

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:51 GMT
content-encoding
gzip
last-modified
Wed, 28 Feb 2018 21:17:34 GMT
server
nginx
status
200
etag
W/"5a971c6e-94b4"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
front.js
blog.malwarebytes.com/wp-content/plugins/responsive-lightbox/js/
18 KB
4 KB
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/plugins/responsive-lightbox/js/front.js?ver=1.7.2
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
95a2c350aabb2955eaaf7a8bbfb494c2533cc20207ac4a026a0100dbac0a554a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:51 GMT
content-encoding
gzip
last-modified
Wed, 28 Feb 2018 21:17:34 GMT
server
nginx
status
200
etag
W/"5a971c6e-4711"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
style.css
www.malwarebytes.com/css/
218 KB
33 KB
Stylesheet
General
Full URL
https://www.malwarebytes.com/css/style.css?12-20-2016
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:6a00:8:d3fb:39c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
e3693b4e95ef37a3465e89481310c05793eab883c868a27517e9c86b7887484b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:53 GMT
content-encoding
gzip
last-modified
Thu, 24 Oct 2019 21:26:24 GMT
server
AmazonS3
x-amz-cf-pop
FRA2-C1
vary
Accept-Encoding
x-cache
RefreshHit from cloudfront
content-type
text/css
status
200
x-amz-cf-id
UUeaQ-JdydU7C56kwsRlGoBNYcZpRPNo1I_io6mcU4bEu0vh90Iz4w==
via
1.1 1ac3fd533bf6be1b511077f8b8e23bfd.cloudfront.net (CloudFront)
style.css
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/
91 KB
16 KB
Stylesheet
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/style.css
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
fa70c6e95ad8ca466ec33b926fc41a595745bb3036a9d37c2cd5fc5702c210ff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:51 GMT
content-encoding
gzip
last-modified
Tue, 22 Oct 2019 22:06:08 GMT
server
nginx
status
200
etag
W/"5daf7d50-16d4b"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
text/css
access-control-allow-origin
*
cache-control
public, max-age=31536000
jquery-1.11.3.min.js
www.malwarebytes.com/js/
94 KB
33 KB
Script
General
Full URL
https://www.malwarebytes.com/js/jquery-1.11.3.min.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:6a00:8:d3fb:39c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ecb916133a9376911f10bc5c659952eb0031e457f5df367cde560edbfba38fb8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:53 GMT
content-encoding
gzip
last-modified
Thu, 24 Oct 2019 21:28:12 GMT
server
AmazonS3
x-amz-cf-pop
FRA2-C1
vary
Accept-Encoding
x-cache
RefreshHit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-id
AASa3MWVfzKgugRgAQcPPV5I74y9vYdFHd2_Q-tEugl05_-j0F9Iow==
via
1.1 1ac3fd533bf6be1b511077f8b8e23bfd.cloudfront.net (CloudFront)
9530a107-0af8-4204-a2c2-217efb78222b.js
optanon.blob.core.windows.net/consent/
140 KB
21 KB
Script
General
Full URL
https://optanon.blob.core.windows.net/consent/9530a107-0af8-4204-a2c2-217efb78222b.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.239.137.4 Dublin, Ireland, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
f45fc5a4a5e43e36f2e7769629df435891a544cf9c9adc6279bec892f22ef84c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
Date
Mon, 28 Oct 2019 18:23:51 GMT
Content-Encoding
GZIP
Last-Modified
Mon, 28 Oct 2019 17:49:56 GMT
Server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
Content-MD5
ez78XT1uYDyPkWa8xJM+cw==
ETag
0x8D75BCF3E98A095
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
x-ms-request-id
72a1003e-001e-00f7-70bc-8dfe0d000000
Access-Control-Expose-Headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
Cache-Control
public, max-age=14400
x-ms-version
2009-09-19
Content-Length
20562
bootstrap.js
www.malwarebytes.com/js/
67 KB
14 KB
Script
General
Full URL
https://www.malwarebytes.com/js/bootstrap.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:6a00:8:d3fb:39c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
425328ed7a60e35938fa92fc7ba5f5af96b53f9608bb41b8a07c0f91e8bdefcd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:53 GMT
content-encoding
gzip
last-modified
Thu, 24 Oct 2019 21:28:12 GMT
server
AmazonS3
x-amz-cf-pop
FRA2-C1
vary
Accept-Encoding
x-cache
RefreshHit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-id
my06HpFQ5dos2k5ZbCgpU2SgIiLVBbMY-W4xtPXWIPMUymhnOmvZWA==
via
1.1 1ac3fd533bf6be1b511077f8b8e23bfd.cloudfront.net (CloudFront)
respond.min.js
www.malwarebytes.com/js/ie-fixes/
4 KB
2 KB
Script
General
Full URL
https://www.malwarebytes.com/js/ie-fixes/respond.min.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:6a00:8:d3fb:39c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
75f9768f79e42df5aa6183372a4b067f02682606cca5f242e06d1e07f3614c94

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:53 GMT
content-encoding
gzip
last-modified
Thu, 24 Oct 2019 21:28:12 GMT
server
AmazonS3
x-amz-cf-pop
FRA2-C1
vary
Accept-Encoding
x-cache
RefreshHit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-id
vJvbIW6Cb9Yujz09B_8hSwoNbrM5-uH4-7dpgxCd0tqoR4seAjxsnw==
via
1.1 1ac3fd533bf6be1b511077f8b8e23bfd.cloudfront.net (CloudFront)
modernizr.js
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/
17 KB
7 KB
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/modernizr.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
da819542692b3f1c2a667ba34eff3465a82d9756953a1446ab7d0772f9b1edd5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:51 GMT
content-encoding
gzip
last-modified
Tue, 22 Oct 2019 22:06:08 GMT
server
nginx
status
200
etag
W/"5daf7d50-434b"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
nav-resize.js
www.malwarebytes.com/js/
11 KB
4 KB
Script
General
Full URL
https://www.malwarebytes.com/js/nav-resize.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:6a00:8:d3fb:39c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
527f5743db62b7f9d19fb4b1910eb56d63f76f50b0e0180b63eb67d374642099

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:53 GMT
content-encoding
gzip
last-modified
Thu, 24 Oct 2019 21:28:13 GMT
server
AmazonS3
x-amz-cf-pop
FRA2-C1
vary
Accept-Encoding
x-cache
RefreshHit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-id
UGpRElmxmPnjmMdvQKSO1uaO_h8xMpc40aXmKVHQ-w4PP35WLtuVHw==
via
1.1 1ac3fd533bf6be1b511077f8b8e23bfd.cloudfront.net (CloudFront)
flexibility.js
www.malwarebytes.com/js/
17 KB
6 KB
Script
General
Full URL
https://www.malwarebytes.com/js/flexibility.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:6a00:8:d3fb:39c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
58c13e24cdfb6384c26836e3eac52d17701cd9d686c56ebf93efbbe9426f8cd6

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:53 GMT
content-encoding
gzip
last-modified
Thu, 24 Oct 2019 21:28:12 GMT
server
AmazonS3
x-amz-cf-pop
FRA2-C1
vary
Accept-Encoding
x-cache
RefreshHit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-id
bSfEsIKmFU6YKteg1Mi4hJZuArXXPIIthCoA9hcusC19mptMxz6-rg==
via
1.1 1ac3fd533bf6be1b511077f8b8e23bfd.cloudfront.net (CloudFront)
global.js
www.malwarebytes.com/js/
21 KB
8 KB
Script
General
Full URL
https://www.malwarebytes.com/js/global.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:6a00:8:d3fb:39c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
3c8c95f8613cbe87100d82edd55b781bc89bec31b8ffd83a93ab3c18e56ec7a9

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:53 GMT
content-encoding
gzip
last-modified
Thu, 24 Oct 2019 21:28:12 GMT
server
AmazonS3
x-amz-cf-pop
FRA2-C1
vary
Accept-Encoding
x-cache
RefreshHit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-id
XuekUlGq-MkaLzZRS2ZsHu4vx8HH_RRLSLyFPyg2fRWmFm3p_fFZXw==
via
1.1 1ac3fd533bf6be1b511077f8b8e23bfd.cloudfront.net (CloudFront)
xs.js
www.malwarebytes.com/js/
9 KB
3 KB
Script
General
Full URL
https://www.malwarebytes.com/js/xs.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:6a00:8:d3fb:39c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1a92e6b6083f7a2f3649fd949fb8c1a3e6a8f0ae9c82cf5face0a8b28a9d905d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:53 GMT
content-encoding
gzip
last-modified
Thu, 24 Oct 2019 21:28:14 GMT
server
AmazonS3
x-amz-cf-pop
FRA2-C1
vary
Accept-Encoding
x-cache
RefreshHit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-id
jjRR61CeEeaB1fteuC2B769Tl-SKNCYtd_ILP6q3qwSXpGOTLkq0sw==
via
1.1 1ac3fd533bf6be1b511077f8b8e23bfd.cloudfront.net (CloudFront)
search.js
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/js/
1 KB
743 B
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/js/search.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
1dc2b8fb26c1a74260a66519a2a5fdf37a938d1b43bbe4d8da7fcd652acc61b9

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:51 GMT
content-encoding
gzip
last-modified
Tue, 22 Oct 2019 22:06:08 GMT
server
nginx
status
200
etag
W/"5daf7d50-55e"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
NEW-NAV.css
www.malwarebytes.com/css/
22 KB
4 KB
Stylesheet
General
Full URL
https://www.malwarebytes.com/css/NEW-NAV.css
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:6a00:8:d3fb:39c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
72622641b79819e5c8b5c0543d105a45e30f13b1a6c0b5c3701e72de5b57e427

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:53 GMT
content-encoding
gzip
last-modified
Thu, 24 Oct 2019 21:26:15 GMT
server
AmazonS3
x-amz-cf-pop
FRA2-C1
vary
Accept-Encoding
x-cache
RefreshHit from cloudfront
content-type
text/css
status
200
x-amz-cf-id
ZnyfuhNjjBxcpTvoQyP2KORtNPRTCKlyPeF6S8MwhQNncLHr8YlFAw==
via
1.1 1ac3fd533bf6be1b511077f8b8e23bfd.cloudfront.net (CloudFront)
new-nav.js
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/js/
6 KB
2 KB
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/js/new-nav.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
a2b3f57762f2932505c6fa9b43932cb13856966074febc5bb048052f17100bf6

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:51 GMT
content-encoding
gzip
last-modified
Tue, 22 Oct 2019 22:06:08 GMT
server
nginx
status
200
etag
W/"5daf7d50-1703"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
search.svg
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/images/
296 B
456 B
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/images/search.svg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
8f796d398e512c5d19a2fecc943d19a204927ff3cf9ec2cb3f75a025535268cd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:51 GMT
content-encoding
gzip
last-modified
Tue, 22 Oct 2019 22:06:08 GMT
server
nginx
status
200
etag
W/"5daf7d50-128"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
public, max-age=31536000
shutterstock_1128201137-900x506.jpg
blog.malwarebytes.com/wp-content/uploads/2018/09/
73 KB
73 KB
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/uploads/2018/09/shutterstock_1128201137-900x506.jpg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
3a84768ab66c51a99464b69631930d0d6d180fb7f3b4d564c35b8130f056c7d7

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:51 GMT
last-modified
Fri, 07 Sep 2018 17:04:04 GMT
server
nginx
status
200
etag
"5b92af84-1233a"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
74554
Open-Any-Files-600x472.png
blog.malwarebytes.com/wp-content/uploads/2018/09/
79 KB
79 KB
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/uploads/2018/09/Open-Any-Files-600x472.png
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
5a59ad644c16eb8888bb2533c6a881eff29551257676e8571f9e7940786f3271

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
last-modified
Wed, 05 Sep 2018 19:14:52 GMT
server
nginx
status
200
etag
"5b902b2c-13af0"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
80624
Dr.-Antivirus-exfiltration-600x343.png
blog.malwarebytes.com/wp-content/uploads/2018/09/
97 KB
97 KB
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/uploads/2018/09/Dr.-Antivirus-exfiltration-600x343.png
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
08ced4611670e8a91869b26fec4ae00070b1c0b44445784674f0a21023344357

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
last-modified
Wed, 05 Sep 2018 19:16:10 GMT
server
nginx
status
200
etag
"5b902b7a-18415"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
99349
wp-emoji-release.min.js
blog.malwarebytes.com/wp-includes/js/
12 KB
5 KB
Script
General
Full URL
https://blog.malwarebytes.com/wp-includes/js/wp-emoji-release.min.js?ver=5.1.3
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
c533b791a8eef65604f15d20433506e1614c693eeba9df749e8a7677e43b466c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
content-encoding
gzip
last-modified
Fri, 18 Jan 2019 01:42:50 GMT
server
nginx
status
200
etag
W/"5c412f1a-2f02"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
cfbe91b99d5469c3e1c4ac9f71790998
secure.gravatar.com/avatar/
12 KB
13 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/cfbe91b99d5469c3e1c4ac9f71790998?s=96&d=identicon&r=g
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
8725673aea443a23bd74226d194696292837b4e21460bfa63811012392a978c6

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-nc
HIT vie 4
date
Mon, 28 Oct 2019 18:23:52 GMT
last-modified
Thu, 01 Feb 2018 02:14:55 GMT
server
nginx
source-age
10487542
status
200
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=300
content-disposition
inline; filename="cfbe91b99d5469c3e1c4ac9f71790998.png"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/cfbe91b99d5469c3e1c4ac9f71790998?s=96&d=identicon&r=g>; rel="canonical"
content-length
12710
expires
Mon, 28 Oct 2019 18:28:52 GMT
labs-nav.js
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/js/
493 B
453 B
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/js/labs-nav.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
19333622f176d68bc17e307d8df96b15447864fbb0bbaac495e507fa64d96077

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
content-encoding
gzip
last-modified
Tue, 22 Oct 2019 22:06:08 GMT
server
nginx
status
200
etag
W/"5daf7d50-1ed"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
contributors.svg
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/images/footer/
910 B
751 B
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/images/footer/contributors.svg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
6429fe0ed81fca5f6bb18cb0a0aacae3bd9de79192635aeed4cbda438139d75d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
content-encoding
gzip
last-modified
Tue, 22 Oct 2019 22:06:08 GMT
server
nginx
status
200
etag
W/"5daf7d50-38e"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
public, max-age=31536000
threat-center.svg
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/images/footer/
2 KB
852 B
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/images/footer/threat-center.svg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
32d4b293bb7f25a21cc44e81184d4bbcb3bdd1837e026b98ed0ad85b3b1a5292

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
content-encoding
gzip
last-modified
Tue, 22 Oct 2019 22:06:08 GMT
server
nginx
status
200
etag
W/"5daf7d50-812"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
public, max-age=31536000
glossary.svg
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/images/footer/
760 B
655 B
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/images/footer/glossary.svg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
b4e6efb587f3fdfb8155148201d0c51ac95d249a6727e8256acdfe624ade69af

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
content-encoding
gzip
last-modified
Tue, 22 Oct 2019 22:06:08 GMT
server
nginx
status
200
etag
W/"5daf7d50-2f8"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
public, max-age=31536000
scams.svg
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/images/footer/
842 B
718 B
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/images/footer/scams.svg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
05a173cb58022e81eb499529ac56df6ad7bafe1c61b8128dca8b76f300b5b60e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
content-encoding
gzip
last-modified
Tue, 22 Oct 2019 22:06:08 GMT
server
nginx
status
200
etag
W/"5daf7d50-34a"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
public, max-age=31536000
write.svg
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/images/footer/
615 B
594 B
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/images/footer/write.svg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
a6a97c4046257c7e4e063c9f76434c7ce2c1f105e46b07424fabfc054f2d4d24

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
content-encoding
gzip
last-modified
Tue, 22 Oct 2019 22:06:08 GMT
server
nginx
status
200
etag
W/"5daf7d50-267"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
public, max-age=31536000
jetpack-carousel.css
blog.malwarebytes.com/wp-content/plugins/jetpack/modules/carousel/
25 KB
5 KB
Stylesheet
General
Full URL
https://blog.malwarebytes.com/wp-content/plugins/jetpack/modules/carousel/jetpack-carousel.css?ver=20120629
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
886f70c3e30343eb48a987ba13f995c122f17d8cd5b90094369cbe42924c3e91

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
content-encoding
gzip
last-modified
Wed, 28 Feb 2018 21:17:32 GMT
server
nginx
status
200
etag
W/"5a971c6c-6483"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
text/css
access-control-allow-origin
*
cache-control
public, max-age=31536000
comment_count.js
blog.malwarebytes.com/wp-content/plugins/disqus-comment-system/public/js/
889 B
679 B
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/plugins/disqus-comment-system/public/js/comment_count.js?ver=3.0.12
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
cea0a05c5af6e21a409875328ed2e3dba79131b7c41f8ea07d0e0e02c7b7b59e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
content-encoding
gzip
last-modified
Wed, 28 Feb 2018 21:17:30 GMT
server
nginx
status
200
etag
W/"5a971c6a-379"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
comment_embed.js
blog.malwarebytes.com/wp-content/plugins/disqus-comment-system/public/js/
1 KB
744 B
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/plugins/disqus-comment-system/public/js/comment_embed.js?ver=3.0.12
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
f055e217bde76d711bd8b42af773f9f99b8a29d81ad9ed10b6379cc7e6c60452

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
content-encoding
gzip
last-modified
Wed, 28 Feb 2018 21:17:30 GMT
server
nginx
status
200
etag
W/"5a971c6a-47e"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
devicepx-jetpack.js
s0.wp.com/wp-content/js/
10 KB
3 KB
Script
General
Full URL
https://s0.wp.com/wp-content/js/devicepx-jetpack.js?ver=201944
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
f32d41f2099a0be20e6b57c5e0d1b71c079d3e1345827b0f5c5b97c6e5e3f78d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Mon, 28 Oct 2019 18:23:52 GMT
content-encoding
gzip
server
nginx
etag
W/"58674312-52b6"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Mon, 26 Oct 2020 07:56:17 GMT
functions.js
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/js/
2 KB
1 KB
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/js/functions.js?ver=2013-07-18
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
9fcb181721162ce0d395b7b9b1e5bb5ca82c5f79bde749d4d0467ec2e65fcb4a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
content-encoding
gzip
last-modified
Tue, 22 Oct 2019 22:06:08 GMT
server
nginx
status
200
etag
W/"5daf7d50-8f9"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
wp-embed.min.js
blog.malwarebytes.com/wp-includes/js/
1 KB
992 B
Script
General
Full URL
https://blog.malwarebytes.com/wp-includes/js/wp-embed.min.js?ver=5.1.3
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
2152557cac69e2bd7d6debef5037a9f554f9209cc305b8141b3329acb10c42b7

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
content-encoding
gzip
last-modified
Thu, 30 Aug 2018 12:40:26 GMT
server
nginx
status
200
etag
W/"5b87e5ba-57b"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
spin.min.js
blog.malwarebytes.com/wp-content/plugins/jetpack/_inc/build/
4 KB
2 KB
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/plugins/jetpack/_inc/build/spin.min.js?ver=1.3
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
36e3052355fd8aa03431efa1940b95f1424f6ff56a06d660a1add952c9339861

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
content-encoding
gzip
last-modified
Wed, 28 Feb 2018 21:17:31 GMT
server
nginx
status
200
etag
W/"5a971c6b-11aa"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
jquery.spin.min.js
blog.malwarebytes.com/wp-content/plugins/jetpack/_inc/build/
2 KB
934 B
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/plugins/jetpack/_inc/build/jquery.spin.min.js?ver=1.3
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
b10a8b01476da3fc060041be45e92a42f65c24115f1c64eff444735de47f2a54

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
content-encoding
gzip
last-modified
Wed, 28 Feb 2018 21:17:31 GMT
server
nginx
status
200
etag
W/"5a971c6b-70e"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
jetpack-carousel.min.js
blog.malwarebytes.com/wp-content/plugins/jetpack/_inc/build/carousel/
27 KB
8 KB
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/plugins/jetpack/_inc/build/carousel/jetpack-carousel.min.js?ver=20170209
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
df73bd6bed3e91e18f6100fbfbf4324ec49aadfc49681facb35d700f0f5bb893

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
content-encoding
gzip
last-modified
Wed, 28 Feb 2018 21:17:31 GMT
server
nginx
status
200
etag
W/"5a971c6b-6da9"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
standard-search-results-footer.js
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/js/
2 KB
812 B
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/js/standard-search-results-footer.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
1532b16aa9cd1fef51c097aaf1abeac6cb6f239b026660e7105e49f4ae6549ff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
content-encoding
gzip
last-modified
Tue, 22 Oct 2019 22:06:08 GMT
server
nginx
status
200
etag
W/"5daf7d50-704"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
optanon.css
optanon.blob.core.windows.net/skins/5.6.0/default_flat_bottom_two_button_white/v2/css/
23 KB
6 KB
Stylesheet
General
Full URL
https://optanon.blob.core.windows.net/skins/5.6.0/default_flat_bottom_two_button_white/v2/css/optanon.css
Requested by
Host: optanon.blob.core.windows.net
URL: https://optanon.blob.core.windows.net/consent/9530a107-0af8-4204-a2c2-217efb78222b.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.239.137.4 Dublin, Ireland, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
8c20518cd7e51066b82e8a8a1e8035210741cf808c02268915747960f531061c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
Date
Mon, 28 Oct 2019 18:23:51 GMT
Content-Encoding
gzip
Last-Modified
Fri, 11 Oct 2019 15:00:37 GMT
Server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
Content-MD5
9e5nJgnO2+PLGLHGDVrjYA==
ETag
0x8D74E5BC66B24E9
Content-Type
text/css
Access-Control-Allow-Origin
*
x-ms-request-id
72a100d3-001e-00f7-79bc-8dfe0d000000
Access-Control-Expose-Headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
x-ms-version
2009-09-19
Content-Length
5561
jquery-3.3.1.min.js
code.jquery.com/
85 KB
30 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.3.1.min.js
Requested by
Host: optanon.blob.core.windows.net
URL: https://optanon.blob.core.windows.net/consent/9530a107-0af8-4204-a2c2-217efb78222b.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2001:4de0:ac19::1:b:1b , Netherlands, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef

Request headers

Sec-Fetch-Mode
cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Origin
https://blog.malwarebytes.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 28 Oct 2019 18:23:52 GMT
Content-Encoding
gzip
Last-Modified
Sat, 20 Jan 2018 17:26:44 GMT
Server
nginx
ETag
W/"5a637bd4-1538f"
Vary
Accept-Encoding
X-HW
1572287032.dop123.fr8.shc,1572287032.dop123.fr8.t,1572287032.cds057.fr8.c
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
30288
Locator-Light.woff
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/css/fonts/
29 KB
29 KB
Font
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/css/fonts/Locator-Light.woff
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/modernizr.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
ed2491fc7526ff0b5cfec3fe6f4cf8153796520fc845b735286b0f42183da98a

Request headers

Sec-Fetch-Mode
cors
Referer
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/style.css?ver=2013-07-18
Origin
https://blog.malwarebytes.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
last-modified
Tue, 22 Oct 2019 22:06:09 GMT
server
nginx
status
200
etag
"5daf7d51-7330"
vary
Accept-Encoding
content-type
application/font-woff
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
29488
gtm.js
www.googletagmanager.com/
166 KB
37 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
bf4d5696390e005b424b287f890bbc3c686731abf03d93d49b41a30062bb7a29
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
content-encoding
br
last-modified
Mon, 28 Oct 2019 18:00:00 GMT
server
Google Tag Manager
access-control-allow-headers
Cache-Control
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
37322
x-xss-protection
0
expires
Mon, 28 Oct 2019 18:23:52 GMT
Locator-Medium.woff
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/css/fonts/
29 KB
29 KB
Font
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/css/fonts/Locator-Medium.woff
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
a52bbdb7b132e850fdaf5740012fcc0bc3f6ef0be520bc4b987d8761d40d015a

Request headers

Sec-Fetch-Mode
cors
Referer
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/style.css?ver=2013-07-18
Origin
https://blog.malwarebytes.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
last-modified
Tue, 22 Oct 2019 22:06:09 GMT
server
nginx
status
200
etag
"5daf7d51-734c"
vary
Accept-Encoding
content-type
application/font-woff
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
29516
socicon.woff
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/css/fonts/
20 KB
20 KB
Font
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/css/fonts/socicon.woff
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
0ed37960a59a6ec6b443f9ef043864d09a51db6fd276ae578d9166467bf986d1

Request headers

Sec-Fetch-Mode
cors
Referer
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/style.css?ver=2013-07-18
Origin
https://blog.malwarebytes.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
last-modified
Tue, 22 Oct 2019 22:06:09 GMT
server
nginx
status
200
etag
"5daf7d51-4ff8"
vary
Accept-Encoding
content-type
application/font-woff
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
20472
Locator-LightItalic.woff
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/css/fonts/
30 KB
30 KB
Font
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/css/fonts/Locator-LightItalic.woff
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
ad2cc26b0fdde8f4eb637ed12b25364e85af0bfba227dad42cb997ff4ad23eeb

Request headers

Sec-Fetch-Mode
cors
Referer
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.3.2/style.css?ver=2013-07-18
Origin
https://blog.malwarebytes.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
last-modified
Tue, 22 Oct 2019 22:06:09 GMT
server
nginx
status
200
etag
"5daf7d51-7888"
vary
Accept-Encoding
content-type
application/font-woff
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
30856
analytics.js
www.google-analytics.com/
43 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
dbb67c620eaabf6679a314db18d3ae43037aef71ab27422e6feec08ee987cc0a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 19 Aug 2019 17:22:41 GMT
server
Golfe2
age
1783
date
Mon, 28 Oct 2019 17:54:09 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
17803
expires
Mon, 28 Oct 2019 19:54:09 GMT
bat.js
bat.bing.com/
23 KB
7 KB
Script
General
Full URL
https://bat.bing.com/bat.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2620:1ec:c11::200 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
/
Resource Hash
b139982ce002c53ddfb65aec1e90704c0a3704fc5aa35247f9323b74a1d3f721

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:51 GMT
content-encoding
gzip
last-modified
Tue, 10 Sep 2019 18:57:28 GMT
x-msedge-ref
Ref A: 7876BF388E6B4B0EA4789586F3E6F794 Ref B: VIEEDGE0611 Ref C: 2019-10-28T18:23:52Z
status
200
etag
"09c5197968d51:0"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
private,max-age=1800
accept-ranges
bytes
content-length
7148
172061.js
secure.perk0mean.com/js/
1 KB
993 B
Script
General
Full URL
https://secure.perk0mean.com/js/172061.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
51.140.39.77 London, United Kingdom, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
Kestrel /
Resource Hash
490d8d8b1820654cf08954fa0faed4dad5fa0dfeb9c987f69276558fcd318a99

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 28 Oct 2019 18:23:51 GMT
Content-Encoding
gzip
Server
Kestrel
Vary
Accept-Encoding
Content-Type
text/javascript
Cache-Control
no-store, must-revalidate
Transfer-Encoding
chunked
Expires
0
uwt.js
static.ads-twitter.com/
5 KB
2 KB
Script
General
Full URL
https://static.ads-twitter.com/uwt.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.157 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
content-encoding
gzip
age
36622
x-cache
HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
1954
x-served-by
cache-fra19148-FRA
last-modified
Tue, 23 Jan 2018 20:09:00 GMT
x-timer
S1572287032.270478,VS0,VE0
etag
"b7b33882a4f3ffd5cbf07434f3137166+gzip"
vary
Accept-Encoding,Host
content-type
application/javascript; charset=utf-8
via
1.1 varnish
cache-control
no-cache
accept-ranges
bytes
js
www.googletagmanager.com/gtag/
74 KB
28 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=AW-930356311
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
1dbc3db5113da2d0dca1f649fd73000f8a842c63a1eb9dc6792f26af3ba3ec3c
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
content-encoding
br
last-modified
Mon, 28 Oct 2019 18:00:00 GMT
server
Google Tag Manager
access-control-allow-headers
Cache-Control
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28466
x-xss-protection
0
expires
Mon, 28 Oct 2019 18:23:52 GMT
2893.js
script.crazyegg.com/pages/scripts/0081/
18 KB
7 KB
Script
General
Full URL
https://script.crazyegg.com/pages/scripts/0081/2893.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:9308 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
cf5ca4d456179dd639c1e4849b3b0de99cc1d0935f7817c12ded1b5de1c9d4a0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
via
1.1 a243c19b86829b9271d382d92416109c.cloudfront.net (CloudFront)
cf-cache-status
HIT
age
5564
cf-polished
origSize=18468
x-cache
Miss from cloudfront
status
200
content-encoding
gzip
last-modified
Fri, 25 Oct 2019 03:46:56 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
private, max-age=300
x-amz-cf-pop
VIE50-C1
cf-ray
52cef17fd9c559a0-VIE
x-amz-cf-id
uklvh4WDUynVHoKwgA0EY6e8hs__V9GqKt6MM-tYO7kpCB9r0McolA==
cf-bgj
minify
up_loader.1.1.0.js
js.adsrvr.org/
6 KB
3 KB
Script
General
Full URL
https://js.adsrvr.org/up_loader.1.1.0.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.97.29 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-97-29.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
7e98e381189d908e1981b6e535bcdd7f3edceafdb0e7095f3e04292e8aac6a0c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Sun, 27 Oct 2019 19:33:41 GMT
Content-Encoding
gzip
Last-Modified
Wed, 17 Jul 2019 18:26:10 GMT
Server
AmazonS3
Age
162375
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/x-javascript
Via
1.1 1d87c34bb2f20fda8e0841bc33179769.cloudfront.net (CloudFront)
Connection
keep-alive
Transfer-Encoding
chunked
X-Amz-Cf-Pop
FRA50-C1
X-Amz-Cf-Id
jwcjC0gUV4aHgcDmcG1OEQmQ4wlJ8E-dTR3q1pR2cnmbfLmkFMyGJw==
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&a=740496578&t=pageview&_s=1&dl=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-3347303-10&cid=2106811706.1572287032&jid=1428591755&_gid=827006494.1572287032&gjid=1747820065&_v=j79&z=1806276271
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-3347303-10&cid=2106811706.1572287032&jid=1428591755&_v=j79&z=1806276271
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-3347303-10&cid=2106811706.1572287032&jid=1428591755&_v=j79&z=1806276271&slf_rd=1&random=468874236
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-3347303-10&cid=2106811706.1572287032&jid=1428591755&_v=j79&z=1806276271&slf_rd=1&random=468874236
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 28 Oct 2019 18:23:52 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 28 Oct 2019 18:23:52 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-3347303-10&cid=2106811706.1572287032&jid=1428591755&_v=j79&z=1806276271&slf_rd=1&random=468874236
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
adsct
t.co/i/
43 B
449 B
Image
General
Full URL
https://t.co/i/adsct?p_id=Twitter&p_user_id=0&txn_id=o1m5j&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.133 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=0
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
122
pragma
no-cache
last-modified
Mon, 28 Oct 2019 18:23:52 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=0
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
0c16297c6b393aa6604c8bef88c3a191
x-transaction
001788420018dd4b
expires
Tue, 31 Mar 1981 05:00:00 GMT
count.js
malwarebytesunpacked.disqus.com/
1 KB
1 KB
Script
General
Full URL
https://malwarebytesunpacked.disqus.com/count.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/wp-content/plugins/disqus-comment-system/public/js/comment_count.js?ver=3.0.12
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.134 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
3487ef2baf0c08ba660a8a143cdeb8ebeec961eea04bccd7c49096b4eb26b875
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 28 Oct 2019 18:23:52 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Age
1734519
P3P
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
871
X-XSS-Protection
1; mode=block
Last-Modified
Tue, 01 Oct 2019 21:53:32 GMT
Server
nginx
ETag
"5d93cadc-367"
Strict-Transport-Security
max-age=300; includeSubdomains
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, max-age=300
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
embed.js
malwarebytesunpacked.disqus.com/
65 KB
21 KB
Script
General
Full URL
https://malwarebytesunpacked.disqus.com/embed.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/wp-content/plugins/disqus-comment-system/public/js/comment_embed.js?ver=3.0.12
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.134 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
openresty /
Resource Hash
a96f5781c189b3e72a1919b30db501f937c3b4a63f6c35088d441f195eafd414
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 28 Oct 2019 18:23:52 GMT
Content-Encoding
gzip
Server
openresty
Age
0
Vary
Accept-Encoding
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Cache-Control
private, max-age=60
X-Service
router
Strict-Transport-Security
max-age=300; includeSubdomains
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Content-Length
21577
0
bat.bing.com/action/
0
171 B
Image
General
Full URL
https://bat.bing.com/action/0?ti=4072696&Ver=2&mid=77a3bf69-d84e-0c87-3793-12d056aad48d&pi=0&lg=en-US&sw=1600&sh=1200&sc=24&tl=Mac%20App%20Store%20apps%20are%20stealing%20user%20data%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&p=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&r=&evt=pageLoad&msclkid=N&rn=107044
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2620:1ec:c11::200 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

status
204
pragma
no-cache
date
Mon, 28 Oct 2019 18:23:52 GMT
cache-control
no-cache, must-revalidate
x-msedge-ref
Ref A: 0F14EE7C76E7452A9647E01357F8D193 Ref B: VIEEDGE0611 Ref C: 2019-10-28T18:23:52Z
access-control-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
wai.gif
genesis.malwarebytes.com/api/v1/
358 B
579 B
XHR
General
Full URL
https://genesis.malwarebytes.com/api/v1/wai.gif
Requested by
Host: www.malwarebytes.com
URL: https://www.malwarebytes.com/js/jquery-1.11.3.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.36.158.183 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-36-158-183.us-west-2.compute.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash
bf61878252cdac8c0e9fb2e6ae3beecf384c21708d64b24f23843811705e84eb

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Mon, 28 Oct 2019 18:23:52 GMT
server
Apache-Coyote/1.1
status
200
access-control-allow-methods
GET, POST
content-type
application/json
access-control-allow-origin
*
access-control-allow-credentials
true
access-control-allow-headers
origin, content-type, accept, authorization
adsct
analytics.twitter.com/i/
31 B
635 B
Script
General
Full URL
https://analytics.twitter.com/i/adsct?p_id=Twitter&p_user_id=0&txn_id=o1m5j&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0&tpx_cb=twttr.conversion.loadPixels&tw_document_href=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F
Requested by
Host: static.ads-twitter.com
URL: https://static.ads-twitter.com/uwt.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.3 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
df3e003cc30e9bdd0313100e8ee5d468070b4b34d11ad355f276a356d4b9c7bf
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
57
x-xss-protection
0
x-response-time
119
pragma
no-cache
last-modified
Mon, 28 Oct 2019 18:23:53 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
content-type
application/javascript;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
ea424b38ad7c644276998eb9e9a99cc1
x-transaction
00f6f3cc0039825b
expires
Tue, 31 Mar 1981 05:00:00 GMT
insight.min.js
snap.licdn.com/li.lms-analytics/
3 KB
2 KB
Script
General
Full URL
https://snap.licdn.com/li.lms-analytics/insight.min.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:296::25ea , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
41dd5e421fe221a7d2921d6fa2b36e8b01a9f2c054aaef5fad866fe896c1d1e0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 28 Oct 2019 18:23:53 GMT
Content-Encoding
gzip
Last-Modified
Mon, 07 Oct 2019 16:41:31 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=54579
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1576
activityi;dc_pre=CKSP4tDJv-UCFRYo4AodNvoMuA;src=8019375;type=malwa000;cat=malwa0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=5205179735354.269
8019375.fls.doubleclick.net/ Frame 80EE
Redirect Chain
  • https://8019375.fls.doubleclick.net/activityi;src=8019375;type=malwa000;cat=malwa0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=5205179735354.269?
  • https://8019375.fls.doubleclick.net/activityi;dc_pre=CKSP4tDJv-UCFRYo4AodNvoMuA;src=8019375;type=malwa000;cat=malwa0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=5205179735354....
0
0
Document
General
Full URL
https://8019375.fls.doubleclick.net/activityi;dc_pre=CKSP4tDJv-UCFRYo4AodNvoMuA;src=8019375;type=malwa000;cat=malwa0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=5205179735354.269?
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.134 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f134.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=21600
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
8019375.fls.doubleclick.net
:scheme
https
:path
/activityi;dc_pre=CKSP4tDJv-UCFRYo4AodNvoMuA;src=8019375;type=malwa000;cat=malwa0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=5205179735354.269?
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
accept-encoding
gzip, deflate, br
cookie
test_cookie=CheckForPermission
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
date
Mon, 28 Oct 2019 18:23:53 GMT
expires
Mon, 28 Oct 2019 18:23:53 GMT
cache-control
private, max-age=0
strict-transport-security
max-age=21600
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
427
x-xss-protection
0
set-cookie
IDE=AHWqTUlJTQrsOv29gYAGoBn3AAErqjFijDT5ySXxPqg3ZKOXB30vVnGB_K13ASSZ; expires=Sat, 21-Nov-2020 18:23:53 GMT; path=/; domain=.doubleclick.net; HttpOnly test_cookie=; domain=.doubleclick.net; path=/; expires=Mon, 21 Jul 2008 23:59:00 GMT
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000

Redirect headers

status
302
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
date
Mon, 28 Oct 2019 18:23:53 GMT
pragma
no-cache
expires
Fri, 01 Jan 1990 00:00:00 GMT
cache-control
no-cache, must-revalidate
follow-only-when-prerender-shown
1
strict-transport-security
max-age=21600
location
https://8019375.fls.doubleclick.net/activityi;dc_pre=CKSP4tDJv-UCFRYo4AodNvoMuA;src=8019375;type=malwa000;cat=malwa0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=5205179735354.269?
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
server
cafe
content-length
0
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Mon, 28-Oct-2019 18:38:53 GMT; path=/; domain=.doubleclick.net
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
lounge.953a2bd009935f47a8e815c3ee2bfc5a.css
c.disquscdn.com/next/embed/styles/
0
21 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/styles/lounge.953a2bd009935f47a8e815c3ee2bfc5a.css
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:4ca6 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
2308263
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
21493
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Wed, 02 Oct 2019 01:07:45 GMT
server
cloudflare
etag
"5d93f861-53f5"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
cf-ray
52cef1854ef55946-VIE
expires
Thu, 01 Oct 2020 01:12:47 GMT
common.bundle.9ae27258a9490b17fbb3b9cdf530aff0.js
c.disquscdn.com/next/embed/
0
89 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/common.bundle.9ae27258a9490b17fbb3b9cdf530aff0.js
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:4ca6 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
492961
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
90428
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Wed, 23 Oct 2019 01:20:44 GMT
server
cloudflare
etag
"5dafaaec-1613c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
cf-ray
52cef1854ef75946-VIE
expires
Thu, 22 Oct 2020 01:27:45 GMT
lounge.bundle.0adc4cfceff8c3ab4259d467d6ea3419.js
c.disquscdn.com/next/embed/
0
107 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/lounge.bundle.0adc4cfceff8c3ab4259d467d6ea3419.js
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:4ca6 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
492961
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
109409
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Wed, 23 Oct 2019 01:20:44 GMT
server
cloudflare
etag
"5dafaaec-1ab61"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
cf-ray
52cef1854ef95946-VIE
expires
Thu, 22 Oct 2020 01:27:45 GMT
config.js
disqus.com/next/
0
5 KB
Other
General
Full URL
https://disqus.com/next/config.js
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.128.134 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 28 Oct 2019 18:23:53 GMT
X-Content-Type-Options
nosniff
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Server
nginx
Age
13
X-Frame-Options
SAMEORIGIN
Strict-Transport-Security
max-age=300; includeSubdomains
Content-Type
application/javascript; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
public, stale-while-revalidate=300, s-stalewhilerevalidate=3600, max-age=60
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
5005
X-XSS-Protection
1; mode=block
Capture.aspx
secure.perk0mean.com/Track/
0
92 B
Script
General
Full URL
https://secure.perk0mean.com/Track/Capture.aspx?retType=js&trk_uid=&trk_user=172061&trk_sw=1600&trk_sh=1200&trk_ref=&trk_tit=Mac%20App%20Store%20apps%20are%20stealing%20user%20data%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&trk_loc=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&trk_agn=Netscape&trk_agv=Mozilla%2F5.0%20(Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F78.0.3904.70%20Safari%2F537.36.lfcd24.lflngen-US&trk_dom=blog.malwarebytes.com&trk_cookie=NA
Requested by
Host: secure.perk0mean.com
URL: https://secure.perk0mean.com/js/172061.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
51.140.39.77 London, United Kingdom, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
Kestrel /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 28 Oct 2019 18:23:52 GMT
Content-Length
0
Server
Kestrel
conversion_async.js
www.googleadservices.com/pagead/
24 KB
10 KB
Script
General
Full URL
https://www.googleadservices.com/pagead/conversion_async.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=AW-930356311
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.162 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s11-in-f2.1e100.net
Software
cafe /
Resource Hash
16d64f53167596e3b279e203618e79e279f0b06c294a6a64100acab05f596654
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
9200
x-xss-protection
0
server
cafe
etag
994047167040605454
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Mon, 28 Oct 2019 18:23:53 GMT
collect
px.ads.linkedin.com/
Redirect Chain
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=1056361&url=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&time=1572287033147
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D1056361%26url%3Dhttps%253A%252F%252Fblog.malwarebytes.com%252Fthreat-analysis%252...
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=1056361&url=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&time=1572287033147&li...
0
87 B
Image
General
Full URL
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=1056361&url=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&time=1572287033147&liSync=true
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:11:101::b93f:9005 , Ireland, ASN14413 (LINKEDIN - LinkedIn Corporation, US),
Reverse DNS
Software
Play /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:53 GMT
content-encoding
gzip
server
Play
vary
Accept-Encoding
x-li-fabric
prod-lor1
status
200
x-li-proto
http/2
x-li-pop
prod-tln1
content-type
application/javascript
content-length
20
x-li-uuid
P7X7Brri0RXQ9wbviCsAAA==

Redirect headers

date
Mon, 28 Oct 2019 18:23:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
302
vary
Accept-Encoding
content-length
20
x-li-uuid
2gaa/Lni0RUwQb4sWisAAA==
server
Play
pragma
no-cache
x-li-pop
prod-efr5
x-frame-options
sameorigin
expect-ct
max-age=86400, report-uri="https://www.linkedin.com/platform-telemetry/ct"
strict-transport-security
max-age=2592000
x-li-fabric
prod-lor1
location
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=1056361&url=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&time=1572287033147&liSync=true
x-xss-protection
1; mode=block
cache-control
no-cache, no-store
content-security-policy
default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id https://lnkd.demdex.net/event blob:; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' platform.linkedin.com spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com https://snap.licdn.com/li.lms-analytics/insight.min.js; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'
x-li-proto
http/2
expires
Thu, 01 Jan 1970 00:00:00 GMT
/
googleads.g.doubleclick.net/pagead/viewthroughconversion/930356311/
2 KB
2 KB
Script
General
Full URL
https://googleads.g.doubleclick.net/pagead/viewthroughconversion/930356311/?random=1572287033171&cv=9&fst=1572287033171&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=60&u_java=false&u_nplug=0&u_nmime=0&gtm=2oaaa0&sendb=1&ig=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&tiba=Mac%20App%20Store%20apps%20are%20stealing%20user%20data%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&async=1&rfmt=3&fmt=4
Requested by
Host: www.googleadservices.com
URL: https://www.googleadservices.com/pagead/conversion_async.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
cbb737ca5a5a1160cf9790f7132f537fd44101ae5528e3f64ea1fe07fe0fad90
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 28 Oct 2019 18:23:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-cache, must-revalidate
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
1024
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
disqus.com/embed/comments/ Frame 2681
0
0
Document
General
Full URL
https://disqus.com/embed/comments/?base=default&f=malwarebytesunpacked&t_i=25399%20https%3A%2F%2Fblog.malwarebytes.com%2F%3Fp%3D25399&t_u=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&t_e=Mac%20App%20Store%20apps%20are%20stealing%20user%20data&t_d=Mac%20App%20Store%20apps%20are%20stealing%20user%20data%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&t_t=Mac%20App%20Store%20apps%20are%20stealing%20user%20data&s_o=default
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.128.134 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ 'unsafe-inline' https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ https://apis.google.com https://www.google.com/recaptcha/ https://disqus.com
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Host
disqus.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/

Response headers

Server
nginx
Content-Type
text/html; charset=utf-8
Content-Security-Policy
script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ 'unsafe-inline' https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ https://apis.google.com https://www.google.com/recaptcha/ https://disqus.com
Last-Modified
Mon, 12 Aug 2019 23:53:09 GMT
ETag
W/"lounge:view:6899033144.b38982ddcf1e89c2f85e9be5510d4116.2"
Link
<https://c.disquscdn.com>;rel=preconnect,<https://c.disquscdn.com>;rel=dns-prefetch
Cache-Control
stale-if-error=3600, s-stalewhilerevalidate=3600, stale-while-revalidate=30, no-cache, must-revalidate, public, s-maxage=5
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Timing-Allow-Origin
*
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Content-Encoding
gzip
Content-Length
7007
Date
Mon, 28 Oct 2019 18:23:53 GMT
Age
0
Connection
keep-alive
Vary
Accept-Encoding
Strict-Transport-Security
max-age=300; includeSubdomains
/
www.google.com/pagead/1p-user-list/930356311/
42 B
167 B
Image
General
Full URL
https://www.google.com/pagead/1p-user-list/930356311/?random=1572287033171&cv=9&fst=1572285600000&num=1&bg=ffffff&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=60&u_java=false&u_nplug=0&u_nmime=0&gtm=2oaaa0&sendb=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&tiba=Mac%20App%20Store%20apps%20are%20stealing%20user%20data%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&async=1&fmt=3&is_vtc=1&random=2287393960&resp=GooglemKTybQhCsO&rmt_tld=0&ipr=y
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Content-Security-Policy script-src 'none'; object-src 'none'
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 28 Oct 2019 18:23:53 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-security-policy
script-src 'none'; object-src 'none'
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
www.google.de/pagead/1p-user-list/930356311/
42 B
156 B
Image
General
Full URL
https://www.google.de/pagead/1p-user-list/930356311/?random=1572287033171&cv=9&fst=1572285600000&num=1&bg=ffffff&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=60&u_java=false&u_nplug=0&u_nmime=0&gtm=2oaaa0&sendb=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&tiba=Mac%20App%20Store%20apps%20are%20stealing%20user%20data%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&async=1&fmt=3&is_vtc=1&random=2287393960&resp=GooglemKTybQhCsO&rmt_tld=1&ipr=y
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Content-Security-Policy script-src 'none'; object-src 'none'
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 28 Oct 2019 18:23:53 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-security-policy
script-src 'none'; object-src 'none'
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activityi;dc_pre=CK2KidHJv-UCFQKYdwodD9MOWw;src=5118230;type=count0;cat=secur00;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;ord=1;num=9755630376725.824
5118230.fls.doubleclick.net/ Frame BF9B
Redirect Chain
  • https://5118230.fls.doubleclick.net/activityi;src=5118230;type=count0;cat=secur00;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;ord=1;num=9755630376725.824?
  • https://5118230.fls.doubleclick.net/activityi;dc_pre=CK2KidHJv-UCFQKYdwodD9MOWw;src=5118230;type=count0;cat=secur00;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;ord=1;num=9755630376725.824?
0
0
Document
General
Full URL
https://5118230.fls.doubleclick.net/activityi;dc_pre=CK2KidHJv-UCFQKYdwodD9MOWw;src=5118230;type=count0;cat=secur00;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;ord=1;num=9755630376725.824?
Requested by
Host: www.malwarebytes.com
URL: https://www.malwarebytes.com/js/jquery-1.11.3.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.6 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f6.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=21600
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
5118230.fls.doubleclick.net
:scheme
https
:path
/activityi;dc_pre=CK2KidHJv-UCFQKYdwodD9MOWw;src=5118230;type=count0;cat=secur00;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;ord=1;num=9755630376725.824?
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
accept-encoding
gzip, deflate, br
cookie
IDE=AHWqTUnxHi2sTSekAnFFGNXZ3S4xg2AIdwZTQyJhgPJMbaMh5dUCjARUkVVxl95i
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
date
Mon, 28 Oct 2019 18:23:53 GMT
expires
Mon, 28 Oct 2019 18:23:53 GMT
cache-control
private, max-age=0
strict-transport-security
max-age=21600
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
377
x-xss-protection
0
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000

Redirect headers

status
302
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
date
Mon, 28 Oct 2019 18:23:53 GMT
pragma
no-cache
expires
Fri, 01 Jan 1990 00:00:00 GMT
cache-control
no-cache, must-revalidate
follow-only-when-prerender-shown
1
strict-transport-security
max-age=21600
location
https://5118230.fls.doubleclick.net/activityi;dc_pre=CK2KidHJv-UCFQKYdwodD9MOWw;src=5118230;type=count0;cat=secur00;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;ord=1;num=9755630376725.824?
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
server
cafe
content-length
0
x-xss-protection
0
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
embed.js
malwarebytesunpacked.disqus.com/
65 KB
21 KB
Script
General
Full URL
https://malwarebytesunpacked.disqus.com/embed.js?_=1572287032149
Requested by
Host: www.malwarebytes.com
URL: https://www.malwarebytes.com/js/jquery-1.11.3.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.134 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
openresty /
Resource Hash
f21d7c7d356cf030f5ff71d3652b8d61d903b54b296575ad05b27381fb04a34a
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 28 Oct 2019 18:23:54 GMT
Content-Encoding
gzip
Server
openresty
Age
0
Vary
Accept-Encoding
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Cache-Control
private, max-age=60
X-Service
router
Strict-Transport-Security
max-age=300; includeSubdomains
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Content-Length
21577
fbevents.js
connect.facebook.net/en_US/
103 KB
22 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
b02eb6a63bca577aa26a3d54c450cd179dab7b63e08cb8830411bca8f853c002
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
22456
x-xss-protection
0
pragma
public
x-fb-debug
3eDdDxapfZmwwL1s5EyTOC0U8eYFGEc1oYEDr//TCnA5T2nGLaNLGrg0dNsU0PafMQvYMo4cOshFveiLBCPIcg==
x-fb-trip-id
1850256238
x-frame-options
DENY
date
Mon, 28 Oct 2019 18:23:53 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
qevents.js
a.quora.com/
39 KB
14 KB
Script
General
Full URL
https://a.quora.com/qevents.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.13.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ef6de6beb1cf5bf809eccfe10f99aea0e0969c71d4eab5446410fef72695679f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
s3LlaOWABX1LUjiLldBNr49lVAylKDRo
content-encoding
gzip
etag
"f32ebb1e93a72c0a57add6d07f688510"
age
3051
x-cache
HIT
status
200
content-length
13681
x-amz-id-2
zQAAngX4bjjK1T8QyGsms189DMHe38t08Rol4m2IV5IYXTpoCoWK1HOdDq7meaP1YJfyyQc+w6E=
x-served-by
cache-fra19153-FRA
last-modified
Fri, 25 Oct 2019 19:28:38 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
atime:1572031715/ctime:1572031714/gid:1000000/gname:employee/md5:f32ebb1e93a72c0a57add6d07f688510/mode:33188/mtime:1149709104/uid:1000332/uname:tzhou
x-timer
S1572287034.761868,VS0,VE0
date
Mon, 28 Oct 2019 18:23:53 GMT
vary
Accept-Encoding
x-amz-request-id
1C9CBC521FCEE95F
via
1.1 varnish
cache-control
max-age=7200
accept-ranges
bytes
content-type
text/plain
x-cache-hits
592
s
ads.avocet.io/
Redirect Chain
  • https://ads.avocet.io/s?add=5b8e9b462be173e55d6569fc&ty=j
  • https://ads.avocet.io/s?bounce=true&add=5b8e9b462be173e55d6569fc&ty=j
0
417 B
Script
General
Full URL
https://ads.avocet.io/s?bounce=true&add=5b8e9b462be173e55d6569fc&ty=j
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.214.122.164 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-214-122-164.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 28 Oct 2019 18:23:53 GMT
Connection
keep-alive
P3p
policyref="http://cdn.avocet.io/w3c/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Content-Length
0
Content-Type
application/javascript

Redirect headers

Location
/s?bounce=true&add=5b8e9b462be173e55d6569fc&ty=j
Date
Mon, 28 Oct 2019 18:23:53 GMT
Connection
keep-alive
P3p
policyref="http://cdn.avocet.io/w3c/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Content-Length
79
Content-Type
text/html; charset=utf-8
embed.js
malwarebytesunpacked.disqus.com/
65 KB
21 KB
Script
General
Full URL
https://malwarebytesunpacked.disqus.com/embed.js?_=1572287032150
Requested by
Host: www.malwarebytes.com
URL: https://www.malwarebytes.com/js/jquery-1.11.3.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.134 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
openresty /
Resource Hash
f21d7c7d356cf030f5ff71d3652b8d61d903b54b296575ad05b27381fb04a34a
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 28 Oct 2019 18:23:54 GMT
Content-Encoding
gzip
Server
openresty
Age
0
Vary
Accept-Encoding
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Cache-Control
private, max-age=60
X-Service
router
Strict-Transport-Security
max-age=300; includeSubdomains
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Content-Length
21577
HWyTnY16.min.js
scripts.demandbase.com/
58 KB
16 KB
Script
General
Full URL
https://scripts.demandbase.com/HWyTnY16.min.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.13 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-13.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
3508d469f8e08c1767a1c9803b3f1fa4df8e776e7a372facfe9a6a24d5c3307f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
gPNEdnHHi5j7YC8vBq4RIPxMzPWJ3fnM
content-encoding
gzip
last-modified
Tue, 15 Oct 2019 15:21:49 GMT
server
AmazonS3
age
1627
date
Mon, 28 Oct 2019 17:56:47 GMT
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=3600
x-amz-cf-pop
FRA2-C2
x-amz-cf-id
cahUCqz3jWh9WQTGIZwVdJX5BseKJoV_7u4RbrxFDjd1PLF8snaObw==
via
1.1 2f194b62c8c43859cbf5af8e53a8d2a7.cloudfront.net (CloudFront)
up
insight.adsrvr.org/track/ Frame D426
0
0
Document
General
Full URL
https://insight.adsrvr.org/track/up?adv=8mirph5&ref=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&upid=r8yigtp&upv=1.1.0
Requested by
Host: js.adsrvr.org
URL: https://js.adsrvr.org/up_loader.1.1.0.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.248.255.146 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-248-255-146.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

:method
GET
:authority
insight.adsrvr.org
:scheme
https
:path
/track/up?adv=8mirph5&ref=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&upid=r8yigtp&upv=1.1.0
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/

Response headers

status
200
date
Mon, 28 Oct 2019 18:23:53 GMT
content-type
text/html
cache-control
private,no-cache, must-revalidate
pragma
no-cache
x-aspnet-version
4.0.30319
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
1480959392203028
connect.facebook.net/signals/config/
281 KB
65 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/1480959392203028?v=2.9.5&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
f645dd12cfba6c548a048cd1dfa39bf518d815fb579bebe58f5048bfe0aafb6f
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
66295
x-xss-protection
0
pragma
public
x-fb-debug
PBgCgkm6FWs47xI4YGQC6rVBZwAY9O0phjkrsSsWmzfUo5Wg+sVRUOFpZYM1UoJEMIXLA9DKSANWt9w5mt6foQ==
x-fb-trip-id
1850256238
x-frame-options
DENY
date
Mon, 28 Oct 2019 18:23:53 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
pixel
q.quora.com/_/ad/64fab857ca52427587d3bd14a8d437b7/
43 B
455 B
Image
General
Full URL
https://q.quora.com/_/ad/64fab857ca52427587d3bd14a8d437b7/pixel?j=1&u=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&tag=ViewContent&ts=1572287033782
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.223.137.124 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-3-223-137-124.compute-1.amazonaws.com
Software
nginx /
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 28 Oct 2019 18:23:54 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
X-Q-Stat
81,5bbbd8e89489b38ceb23feff7fa5b606,10.0.4.51,41968,144.76.109.30,,8702942841,1,1572287034.100,0.002,,.,0,0,0.000,0.004,-,0,0,304,321,160,10,26847,,,,,,,
Content-Type
image/gif
ip.json
api.company-target.com/api/v2/
423 B
927 B
XHR
General
Full URL
https://api.company-target.com/api/v2/ip.json?referrer=&page=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&page_title=Mac%20App%20Store%20apps%20are%20stealing%20user%20data%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&key=5527c2aa519592df7d44a24d0105731b&src=tag
Requested by
Host: scripts.demandbase.com
URL: https://scripts.demandbase.com/HWyTnY16.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.95.25 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-95-25.fra2.r.cloudfront.net
Software
nginx /
Resource Hash
5b4f7ddf2cbd5ef8611f5fd90529a7c0b42bedb4c6f5a8f08d1c328b55043372

Request headers

Sec-Fetch-Mode
cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:53 GMT
content-encoding
gzip
x-amz-cf-pop
FRA2
x-cache
Miss from cloudfront
status
200
access-control-max-age
1728000
request-id
3acf5ec3-ccaa-4547-9b90-4d7cad3eb2e5
x-amz-cf-id
EhGNPy9zv3A-Nw7jISRd4kTiHZZliUnWhlukDIqEYTtm-aCD-32KbQ==
pragma
no-cache
access-control-allow-origin
https://blog.malwarebytes.com
server
nginx
vary
Accept-Encoding, Origin
access-control-allow-methods
GET, POST, OPTIONS
content-type
application/json;charset=utf-8
via
1.1 a7cfc7facd5206ba992dff0c0b5504da.cloudfront.net (CloudFront)
access-control-expose-headers
cache-control
no-cache, no-store, max-age=0, must-revalidate
access-control-allow-credentials
true
api-version
v2
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
identification-source
CENTRAL
expires
Sun, 27 Oct 2019 18:23:53 GMT
validateCookie
segments.company-target.com/
Redirect Chain
  • https://match.prod.bidr.io/cookie-sync/demandbase
  • https://match.prod.bidr.io/cookie-sync/demandbase?_bee_ppp=1
  • https://segments.company-target.com/log?vendor=choca&user_id=AALO3067bmQAABVGQ42qsw
  • https://segments.company-target.com/validateCookie?vendor=choca&user_id=AALO3067bmQAABVGQ42qsw&verifyHash=d7f61f8a2a55d77907cdfcdeb2af8d26db86ac57
26 B
406 B
Image
General
Full URL
https://segments.company-target.com/validateCookie?vendor=choca&user_id=AALO3067bmQAABVGQ42qsw&verifyHash=d7f61f8a2a55d77907cdfcdeb2af8d26db86ac57
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.162.223 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-162-223.fra54.r.cloudfront.net
Software
/
Resource Hash
3b7b8a4b411ddf8db9bacc2f3aabf406f8e4c0c087829b336ca331c40adfdff1

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 28 Oct 2019 18:23:54 GMT
Via
1.1 fabe381dacc990f9c402cdc69b69dd26.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA54
Vary
Origin
X-Cache
Miss from cloudfront
Content-Type
image/gif
Transfer-Encoding
chunked
Connection
keep-alive
trace-id
a9deb8e3e55441b8
X-Amz-Cf-Id
oYRDVNWkXQzU-P_dvolNSmkc9kkuLb9oFAC9AvhOcRS2-y1zSEP7LQ==

Redirect headers

Date
Mon, 28 Oct 2019 18:23:54 GMT
Via
1.1 fabe381dacc990f9c402cdc69b69dd26.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA54
Vary
Origin
X-Cache
Miss from cloudfront
Location
/validateCookie?vendor=choca&user_id=AALO3067bmQAABVGQ42qsw&verifyHash=d7f61f8a2a55d77907cdfcdeb2af8d26db86ac57
Connection
keep-alive
trace-id
baeb127493cba912
Content-Length
0
X-Amz-Cf-Id
vNbWImWsH0hQWlgCVFLsAvWkV5dOXy7G93L8ThYbs9DbTsKYEOkF_g==
/
www.facebook.com/tr/
44 B
359 B
Image
General
Full URL
https://www.facebook.com/tr/?id=1480959392203028&ev=ViewContent&dl=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&rl=&if=false&ts=1572287033806&sw=1600&sh=1200&v=2.9.5&r=stable&ec=0&o=30&fbp=fb.1.1572287033804.56022999&it=1572287033775&coo=false&rqm=GET
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:53 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
alt-svc
h3-23=":443"; ma=3600
content-length
44
expires
Mon, 28 Oct 2019 18:23:53 GMT
collect
www.google-analytics.com/j/
2 B
128 B
XHR
General
Full URL
https://www.google-analytics.com/j/collect?v=1&_v=j79&a=740496578&t=event&ni=1&_s=2&dl=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&ul=en-us&de=UTF-8&dt=Mac%20App%20Store%20apps%20are%20stealing%20user%20data%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&ec=Demandbase&ea=API%20Resolution&el=IP%20API&_u=aHBAAMABAAAAAC~&jid=1234518313&gjid=304257458&cid=2106811706.1572287032&tid=UA-3347303-10&_gid=827006494.1572287032&_r=1&cd2=(Non-Company%20Visitor)&cd3=Bot&cd4=(Non-Company%20Visitor)&cd5=(Non-Company%20Visitor)&cd6=(Non-Company%20Visitor)&cd7=(Non-Company%20Visitor)&cd8=(Non-Company%20Visitor)&cd9=(Non-Company%20Visitor)&cd10=(Non-Company%20Visitor)&cd11=(Non-Company%20Visitor)&cd12=(Non-Company%20Visitor)&cd13=(Non-Company%20Visitor)&cd14=(Non-Company%20Visitor)&cd15=(Non-Company%20Visitor)&cd16=(Non-Company%20Visitor)&cd17=DE&cd18=(Non-Company%20Visitor)&z=2033268674
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
de3246094525b21a870fc7d2a67490d0132535c6fa5993755c549f1a9d1bd8af
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Mon, 28 Oct 2019 18:23:53 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
text/plain
access-control-allow-origin
https://blog.malwarebytes.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
stats.g.doubleclick.net/j/
4 B
154 B
XHR
General
Full URL
https://stats.g.doubleclick.net/j/collect?t=dc&aip=1&_r=3&v=1&_v=j79&tid=UA-3347303-10&cid=2106811706.1572287032&jid=1234518313&gjid=304257458&_gid=827006494.1572287032&_u=aHBAAMABAAAAAC~&z=1191843897
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:400c:c00::9d Brussels, Belgium, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
84e01419bd81f32ac6df0f75f49c604fda9172000a3ae432b3c47b2a6a712d80
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
strict-transport-security
max-age=10886400; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
date
Mon, 28 Oct 2019 18:23:53 GMT
status
200
content-type
text/plain
access-control-allow-origin
https://blog.malwarebytes.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
4
expires
Fri, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.com/ads/
42 B
109 B
Image
General
Full URL
https://www.google.com/ads/ga-audiences?t=sr&aip=1&_r=4&slf_rd=1&v=1&_v=j79&tid=UA-3347303-10&cid=2106811706.1572287032&jid=1234518313&_u=aHBAAMABAAAAAC~&z=1421020163
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 28 Oct 2019 18:23:53 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?t=sr&aip=1&_r=4&slf_rd=1&v=1&_v=j79&tid=UA-3347303-10&cid=2106811706.1572287032&jid=1234518313&_u=aHBAAMABAAAAAC~&z=1421020163
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 28 Oct 2019 18:23:53 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
lounge.953a2bd009935f47a8e815c3ee2bfc5a.css
c.disquscdn.com/next/embed/styles/
0
21 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/styles/lounge.953a2bd009935f47a8e815c3ee2bfc5a.css
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js?_=1572287032149
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:4ca6 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
2308264
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
21493
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Wed, 02 Oct 2019 01:07:45 GMT
server
cloudflare
etag
"5d93f861-53f5"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
cf-ray
52cef18abada5946-VIE
expires
Thu, 01 Oct 2020 01:12:47 GMT
common.bundle.9ae27258a9490b17fbb3b9cdf530aff0.js
c.disquscdn.com/next/embed/
0
88 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/common.bundle.9ae27258a9490b17fbb3b9cdf530aff0.js
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js?_=1572287032149
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:4ca6 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
492962
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
90428
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Wed, 23 Oct 2019 01:20:44 GMT
server
cloudflare
etag
"5dafaaec-1613c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
cf-ray
52cef18abadc5946-VIE
expires
Thu, 22 Oct 2020 01:27:45 GMT
lounge.bundle.0adc4cfceff8c3ab4259d467d6ea3419.js
c.disquscdn.com/next/embed/
0
107 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/lounge.bundle.0adc4cfceff8c3ab4259d467d6ea3419.js
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js?_=1572287032149
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:4ca6 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 28 Oct 2019 18:23:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
492962
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
109409
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Wed, 23 Oct 2019 01:20:44 GMT
server
cloudflare
etag
"5dafaaec-1ab61"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
cf-ray
52cef18abadd5946-VIE
expires
Thu, 22 Oct 2020 01:27:45 GMT
config.js
disqus.com/next/
0
5 KB
Other
General
Full URL
https://disqus.com/next/config.js
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js?_=1572287032149
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.128.134 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 28 Oct 2019 18:23:54 GMT
X-Content-Type-Options
nosniff
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Server
nginx
Age
14
X-Frame-Options
SAMEORIGIN
Strict-Transport-Security
max-age=300; includeSubdomains
Content-Type
application/javascript; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
public, stale-while-revalidate=300, s-stalewhilerevalidate=3600, max-age=60
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
5005
X-XSS-Protection
1; mode=block
/
disqus.com/embed/comments/ Frame 04E8
0
0
Document
General
Full URL
https://disqus.com/embed/comments/?base=default&f=malwarebytesunpacked&t_i=25399%20https%3A%2F%2Fblog.malwarebytes.com%2F%3Fp%3D25399&t_u=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&t_e=Mac%20App%20Store%20apps%20are%20stealing%20user%20data&t_d=Mac%20App%20Store%20apps%20are%20stealing%20user%20data%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&t_t=Mac%20App%20Store%20apps%20are%20stealing%20user%20data&s_o=default
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.128.134 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ 'unsafe-inline' https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ https://apis.google.com https://www.google.com/recaptcha/ https://disqus.com
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Host
disqus.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/

Response headers

Server
nginx
Content-Type
text/html; charset=utf-8
Content-Security-Policy
script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ 'unsafe-inline' https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ https://apis.google.com https://www.google.com/recaptcha/ https://disqus.com
Last-Modified
Mon, 12 Aug 2019 23:53:09 GMT
ETag
W/"lounge:view:6899033144.b38982ddcf1e89c2f85e9be5510d4116.2"
Link
<https://c.disquscdn.com>;rel=preconnect,<https://c.disquscdn.com>;rel=dns-prefetch
Cache-Control
stale-if-error=3600, s-stalewhilerevalidate=3600, stale-while-revalidate=30, no-cache, must-revalidate, public, s-maxage=5
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Timing-Allow-Origin
*
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Content-Encoding
gzip
Content-Length
7007
Date
Mon, 28 Oct 2019 18:23:54 GMT
Age
1
Connection
keep-alive
Vary
Accept-Encoding
Strict-Transport-Security
max-age=300; includeSubdomains
/
disqus.com/embed/comments/ Frame 7C56
0
0
Document
General
Full URL
https://disqus.com/embed/comments/?base=default&f=malwarebytesunpacked&t_i=25399%20https%3A%2F%2Fblog.malwarebytes.com%2F%3Fp%3D25399&t_u=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2018%2F09%2Fmac-app-store-apps-are-stealing-user-data%2F&t_e=Mac%20App%20Store%20apps%20are%20stealing%20user%20data&t_d=Mac%20App%20Store%20apps%20are%20stealing%20user%20data%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&t_t=Mac%20App%20Store%20apps%20are%20stealing%20user%20data&s_o=default
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.128.134 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ 'unsafe-inline' https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ https://apis.google.com https://www.google.com/recaptcha/ https://disqus.com
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Host
disqus.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/

Response headers

Server
nginx
Content-Type
text/html; charset=utf-8
Content-Security-Policy
script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ 'unsafe-inline' https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ https://apis.google.com https://www.google.com/recaptcha/ https://disqus.com
Last-Modified
Mon, 12 Aug 2019 23:53:09 GMT
ETag
W/"lounge:view:6899033144.b38982ddcf1e89c2f85e9be5510d4116.2"
Link
<https://c.disquscdn.com>;rel=preconnect,<https://c.disquscdn.com>;rel=dns-prefetch
Cache-Control
stale-if-error=3600, s-stalewhilerevalidate=3600, stale-while-revalidate=30, no-cache, must-revalidate, public, s-maxage=5
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Timing-Allow-Origin
*
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Content-Encoding
gzip
Content-Length
7007
Date
Mon, 28 Oct 2019 18:23:54 GMT
Age
1
Connection
keep-alive
Vary
Accept-Encoding
Strict-Transport-Security
max-age=300; includeSubdomains
/
www.facebook.com/tr/ Frame 712F
0
0
Document
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

:method
POST
:authority
www.facebook.com
:scheme
https
:path
/tr/
content-length
6213
pragma
no-cache
cache-control
no-cache
origin
https://blog.malwarebytes.com
upgrade-insecure-requests
1
content-type
application/x-www-form-urlencoded
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/
accept-encoding
gzip, deflate, br
Origin
https://blog.malwarebytes.com
Upgrade-Insecure-Requests
1
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/

Response headers

status
200
content-type
text/plain
access-control-allow-origin
https://blog.malwarebytes.com
access-control-allow-credentials
true
strict-transport-security
max-age=31536000; includeSubDomains
content-length
0
server
proxygen-bolt
alt-svc
h3-23=":443"; ma=3600
date
Mon, 28 Oct 2019 18:23:54 GMT

Verdicts & Comments Add Verdict or Comment

133 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| _wpemojiSettings function| $ function| jQuery boolean| pp_alreadyInitialized object| rlArgs number| a undefined| c function| jsonFeed object| OneTrust object| Optanon string| OnetrustActiveGroups string| OptanonActiveGroups object| dataLayer function| OptanonWrapper object| jQuery111303068823262253868 boolean| alertFallback object| respond object| Modernizr object| html5 function| yepnope object| BackgroundCheck object| flexibility function| readCookie object| acceptCookies undefined| setCookie function| overlay function| overlayexp97 function| getVariable boolean| isAdw boolean| uuid boolean| uuidParam object| uuidCookie object| cookieSettings function| EventEmitter object| eventie function| imagesLoaded object| mbamFreeValues object| mbamPremiumValues object| webpageValues undefined| midCookie object| playfairLsd boolean| midValue boolean| xsourceValue boolean| playfairValue boolean| refpage boolean| mktoLs undefined| lsCookie undefined| xsourceCookie undefined| playfairCookie function| applyXSource function| modURLParam string| urlID object| google_tag_manager function| postscribe number| hshInterval string| GoogleAnalyticsObject function| ga object| uetq function| twq object| twttr object| google_tag_data object| gaplugins object| gaGlobal object| gaData object| countVars string| disqus_shortname object| embedVars string| disqus_url string| disqus_identifier string| disqus_container_id string| disqus_title undefined| disqus_config_custom function| disqus_config object| wpcom_img_zoomer object| detectZoom string| homeLink object| wp function| Spinner function| UET object| jetpackCarouselStrings function| submitSearchFooter function| submitSearchNav function| submitSearchrightrail undefined| countryError string| country undefined| xdr function| rl_view_image function| rl_hide_image boolean| doresize object| scroll_pos object| jQuery1124010176181902354053 boolean| hashtag function| closeSearchBar string| amphtml number| deviceWidth boolean| isMacLike object| preferredLanguage boolean| isMac boolean| isWindows boolean| isAndroid boolean| isiPhone boolean| isiPad boolean| isChromeOS function| showCurrentTab function| moveLabsNav string| _linkedin_partner_id object| _linkedin_data_partner_ids string| axel object| DISQUS object| twemoji object| DISQUSWIDGETS undefined| disqus_domain function| gtag object| CE2 function| ttd_dom_ready function| TTDUniversalPixelApi function| lintrk boolean| _already_called_lintrk function| GooglemKTybQhCsO function| google_trackConversion object| GooglebQhCsO boolean| cp function| fbq function| _fbq function| qp object| qevents function| __extends object| Demandbase object| __db function| DBSegment undefined| demandbaseMarketoFormId

6 Cookies

Domain/Path Name / Value
.mathtag.com/ Name: mt_mop
Value:
.mathtag.com/ Name: mt_misc
Value: mt_bt:1
.mathtag.com/ Name: uuidc
Value: J7nGiOu7xsp3RBa/vI2j0cimvYqjZUxvZFQASMy4PWW3yx6O2wZBswOgTJ89qxI+Km5i4NvMPCO76smbqQ/KzTGA2jvd+cZAeHMAsvbKZBI=
.doubleclick.net/ Name: IDE
Value: AHWqTUnxHi2sTSekAnFFGNXZ3S4xg2AIdwZTQyJhgPJMbaMh5dUCjARUkVVxl95i
.mathtag.com/ Name: uuid
Value: bf1d5db7-2ec9-4100-99eb-215be42a0790
.malwarebytes.com/ Name: OptanonConsent
Value: groups=1%3A1%2C0_165071%3A1%2C101%3A1%2C2%3A1%2C3%3A1%2C102%3A1%2C103%3A1%2C4%3A1%2C104%3A1%2C105%3A1%2C106%3A1%2C107%3A1%2C109%3A1%2C110%3A1%2C112%3A1%2C113%3A1%2C114%3A1%2C115%3A1%2C116%3A1%2C117%3A1%2C118%3A1%2C0_165051%3A1%2C0_165052%3A1%2C0_165053%3A1%2C0_165054%3A1%2C0_165055%3A1%2C0_165056%3A1%2C0_165057%3A1%2C0_165058%3A1%2C0_165059%3A1%2C0_165060%3A1%2C0_165061%3A1%2C0_165062%3A1%2C0_165063%3A1%2C0_165064%3A1%2C0_165065%3A1%2C0_165066%3A1%2C0_165067%3A1%2C0_165068%3A1%2C0_165069%3A1%2C0_165070%3A1%2C0_165072%3A1%2C0_165073%3A1%2C0_165074%3A1%2C0_168809%3A1%2C0_168810%3A1%2C0_171059%3A1%2C0_171060%3A1%2C0_171061%3A1%2C0_171062%3A1%2C0_171063%3A1%2C0_171064%3A1%2C0_172264%3A1%2C0_172327%3A1%2C0_179764%3A1%2C0_172332%3A1%2C0_172328%3A1%2C0_172329%3A1%2C108%3A1%2C111%3A1&datestamp=Mon+Oct+28+2019+19%3A23%3A53+GMT%2B0100+(Central+European+Standard+Time)&version=5.6.0

4 Console Messages

Source Level URL
Text
console-api log URL: https://blog.malwarebytes.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1(Line 2)
Message:
JQMIGRATE: Migrate is installed, version 1.4.1
console-api log URL: https://www.malwarebytes.com/js/nav-resize.js(Line 268)
Message:
There is no hero section
console-api log URL: https://malwarebytesunpacked.disqus.com/embed.js(Line 39)
Message:
Use DISQUS.reset instead of reloading embed.js please.
console-api log URL: https://malwarebytesunpacked.disqus.com/embed.js(Line 39)
Message:
See https://help.disqus.com/customer/portal/articles/472107-using-disqus-on-ajax-sites

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Frame-Options SAMEORIGIN

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

5118230.fls.doubleclick.net
8019375.fls.doubleclick.net
a.quora.com
ads.avocet.io
analytics.twitter.com
api.company-target.com
bat.bing.com
blog.malwarebytes.com
c.disquscdn.com
code.jquery.com
connect.facebook.net
disqus.com
fonts.googleapis.com
genesis.malwarebytes.com
googleads.g.doubleclick.net
insight.adsrvr.org
js.adsrvr.org
malwarebytesunpacked.disqus.com
match.prod.bidr.io
optanon.blob.core.windows.net
px.ads.linkedin.com
q.quora.com
s0.wp.com
script.crazyegg.com
scripts.demandbase.com
secure.gravatar.com
secure.perk0mean.com
segments.company-target.com
snap.licdn.com
static.ads-twitter.com
stats.g.doubleclick.net
t.co
www.facebook.com
www.google-analytics.com
www.google.com
www.google.de
www.googleadservices.com
www.googletagmanager.com
www.linkedin.com
www.malwarebytes.com
104.244.42.133
104.244.42.3
13.225.78.13
130.211.198.3
143.204.97.29
151.101.112.134
151.101.12.157
151.101.128.134
151.101.13.2
172.217.16.162
172.217.22.6
172.217.23.134
192.0.77.32
2001:4de0:ac19::1:b:1b
2600:9000:20eb:6a00:8:d3fb:39c0:93a1
2606:4700::6810:4ca6
2606:4700::6813:9308
2620:1ec:c11::200
2a00:1450:4001:806::2008
2a00:1450:4001:808::200e
2a00:1450:4001:80b::2003
2a00:1450:4001:817::2004
2a00:1450:4001:81b::2002
2a00:1450:4001:825::200a
2a00:1450:400c:c00::9d
2a02:26f0:6c00:296::25ea
2a03:2880:f01c:8012:face:b00c:0:3
2a03:2880:f11c:8183:face:b00c:0:25de
2a04:fa87:fffe::c000:4902
2a05:f500:10:101::b93f:9101
2a05:f500:11:101::b93f:9005
3.223.137.124
34.248.255.146
51.140.39.77
52.214.122.164
52.222.162.223
52.239.137.4
52.30.193.62
52.36.158.183
54.230.95.25
05a173cb58022e81eb499529ac56df6ad7bafe1c61b8128dca8b76f300b5b60e
08ced4611670e8a91869b26fec4ae00070b1c0b44445784674f0a21023344357
0ed37960a59a6ec6b443f9ef043864d09a51db6fd276ae578d9166467bf986d1
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
1532b16aa9cd1fef51c097aaf1abeac6cb6f239b026660e7105e49f4ae6549ff
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
16d64f53167596e3b279e203618e79e279f0b06c294a6a64100acab05f596654
19333622f176d68bc17e307d8df96b15447864fbb0bbaac495e507fa64d96077
1a92e6b6083f7a2f3649fd949fb8c1a3e6a8f0ae9c82cf5face0a8b28a9d905d
1db21d816296e6939ba1f42962496e4134ae2b0081e26970864c40c6d02bb1df
1dbc3db5113da2d0dca1f649fd73000f8a842c63a1eb9dc6792f26af3ba3ec3c
1dc2b8fb26c1a74260a66519a2a5fdf37a938d1b43bbe4d8da7fcd652acc61b9
1f504f86bc8f301e4041e744f681cce164e9ac5e8e5dfacc984a012e95e1a7cd
2152557cac69e2bd7d6debef5037a9f554f9209cc305b8141b3329acb10c42b7
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5
32d4b293bb7f25a21cc44e81184d4bbcb3bdd1837e026b98ed0ad85b3b1a5292
3487ef2baf0c08ba660a8a143cdeb8ebeec961eea04bccd7c49096b4eb26b875
3508d469f8e08c1767a1c9803b3f1fa4df8e776e7a372facfe9a6a24d5c3307f
36e3052355fd8aa03431efa1940b95f1424f6ff56a06d660a1add952c9339861
3a84768ab66c51a99464b69631930d0d6d180fb7f3b4d564c35b8130f056c7d7
3b7b8a4b411ddf8db9bacc2f3aabf406f8e4c0c087829b336ca331c40adfdff1
3c8c95f8613cbe87100d82edd55b781bc89bec31b8ffd83a93ab3c18e56ec7a9
41dd5e421fe221a7d2921d6fa2b36e8b01a9f2c054aaef5fad866fe896c1d1e0
425328ed7a60e35938fa92fc7ba5f5af96b53f9608bb41b8a07c0f91e8bdefcd
48eb8b500ae6a38617b5738d2b3faec481922a7782246e31d2755c034a45cd5d
490d8d8b1820654cf08954fa0faed4dad5fa0dfeb9c987f69276558fcd318a99
4ed10d0d64bb1515397e8666a63f484d640dbc5678fa62574e077b7aef1c3af2
527f5743db62b7f9d19fb4b1910eb56d63f76f50b0e0180b63eb67d374642099
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87
58c13e24cdfb6384c26836e3eac52d17701cd9d686c56ebf93efbbe9426f8cd6
5a59ad644c16eb8888bb2533c6a881eff29551257676e8571f9e7940786f3271
5b4f7ddf2cbd5ef8611f5fd90529a7c0b42bedb4c6f5a8f08d1c328b55043372
6429fe0ed81fca5f6bb18cb0a0aacae3bd9de79192635aeed4cbda438139d75d
72622641b79819e5c8b5c0543d105a45e30f13b1a6c0b5c3701e72de5b57e427
75f9768f79e42df5aa6183372a4b067f02682606cca5f242e06d1e07f3614c94
7e98e381189d908e1981b6e535bcdd7f3edceafdb0e7095f3e04292e8aac6a0c
84e01419bd81f32ac6df0f75f49c604fda9172000a3ae432b3c47b2a6a712d80
8725673aea443a23bd74226d194696292837b4e21460bfa63811012392a978c6
886f70c3e30343eb48a987ba13f995c122f17d8cd5b90094369cbe42924c3e91
8c20518cd7e51066b82e8a8a1e8035210741cf808c02268915747960f531061c
8f796d398e512c5d19a2fecc943d19a204927ff3cf9ec2cb3f75a025535268cd
95a2c350aabb2955eaaf7a8bbfb494c2533cc20207ac4a026a0100dbac0a554a
9fcb181721162ce0d395b7b9b1e5bb5ca82c5f79bde749d4d0467ec2e65fcb4a
a2b3f57762f2932505c6fa9b43932cb13856966074febc5bb048052f17100bf6
a52bbdb7b132e850fdaf5740012fcc0bc3f6ef0be520bc4b987d8761d40d015a
a6a97c4046257c7e4e063c9f76434c7ce2c1f105e46b07424fabfc054f2d4d24
a72261a5191d1485620242b7d3b735501757aef23dedc6d27c84919af838e756
a96f5781c189b3e72a1919b30db501f937c3b4a63f6c35088d441f195eafd414
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
ad2cc26b0fdde8f4eb637ed12b25364e85af0bfba227dad42cb997ff4ad23eeb
b02eb6a63bca577aa26a3d54c450cd179dab7b63e08cb8830411bca8f853c002
b10a8b01476da3fc060041be45e92a42f65c24115f1c64eff444735de47f2a54
b139982ce002c53ddfb65aec1e90704c0a3704fc5aa35247f9323b74a1d3f721
b4e6efb587f3fdfb8155148201d0c51ac95d249a6727e8256acdfe624ade69af
bc8a31baa91ce0952dd4d1c16030bb5a7947445b7bc7aac2e758acbd9fafdc55
bf4d5696390e005b424b287f890bbc3c686731abf03d93d49b41a30062bb7a29
bf61878252cdac8c0e9fb2e6ae3beecf384c21708d64b24f23843811705e84eb
c533b791a8eef65604f15d20433506e1614c693eeba9df749e8a7677e43b466c
cbb737ca5a5a1160cf9790f7132f537fd44101ae5528e3f64ea1fe07fe0fad90
cea0a05c5af6e21a409875328ed2e3dba79131b7c41f8ea07d0e0e02c7b7b59e
cf5ca4d456179dd639c1e4849b3b0de99cc1d0935f7817c12ded1b5de1c9d4a0
da819542692b3f1c2a667ba34eff3465a82d9756953a1446ab7d0772f9b1edd5
dbb67c620eaabf6679a314db18d3ae43037aef71ab27422e6feec08ee987cc0a
de3246094525b21a870fc7d2a67490d0132535c6fa5993755c549f1a9d1bd8af
df3e003cc30e9bdd0313100e8ee5d468070b4b34d11ad355f276a356d4b9c7bf
df73bd6bed3e91e18f6100fbfbf4324ec49aadfc49681facb35d700f0f5bb893
e3693b4e95ef37a3465e89481310c05793eab883c868a27517e9c86b7887484b
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e5087adff56cd9077a7b21a01d78e2a97177cbf4872935bbf3049d06ee884826
ebc5589e0a2738bda34487e2aaf498c3b8c05a680b4730d027614dc71ba05995
ecb916133a9376911f10bc5c659952eb0031e457f5df367cde560edbfba38fb8
ed2491fc7526ff0b5cfec3fe6f4cf8153796520fc845b735286b0f42183da98a
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
ef6de6beb1cf5bf809eccfe10f99aea0e0969c71d4eab5446410fef72695679f
f055e217bde76d711bd8b42af773f9f99b8a29d81ad9ed10b6379cc7e6c60452
f21d7c7d356cf030f5ff71d3652b8d61d903b54b296575ad05b27381fb04a34a
f32d41f2099a0be20e6b57c5e0d1b71c079d3e1345827b0f5c5b97c6e5e3f78d
f45fc5a4a5e43e36f2e7769629df435891a544cf9c9adc6279bec892f22ef84c
f645dd12cfba6c548a048cd1dfa39bf518d815fb579bebe58f5048bfe0aafb6f
fa70c6e95ad8ca466ec33b926fc41a595745bb3036a9d37c2cd5fc5702c210ff