URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Submission: On May 20 via api from US

Summary

This website contacted 25 IPs in 7 countries across 21 domains to perform 99 HTTP transactions. The main IP is 192.124.249.163, located in United States and belongs to SUCURI-SEC, US. The main domain is www.hackingtutorials.org.
TLS certificate: Issued by COMODO RSA Domain Validation Secure S... on December 13th 2017. Valid for: 3 years.
This is the only time www.hackingtutorials.org was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
45 192.124.249.163 30148 (SUCURI-SEC)
1 2a00:1450:400... 15169 (GOOGLE)
5 2a00:1450:400... 15169 (GOOGLE)
2 8.27.13.75 3356 (LEVEL3)
2 35.212.97.116 19527 (GOOGLE-2)
3 2606:4700::68... 13335 (CLOUDFLAR...)
9 2a04:fa87:fff... 2635 (AUTOMATTIC)
1 192.0.77.40 2635 (AUTOMATTIC)
2 192.0.76.3 2635 (AUTOMATTIC)
1 2a03:b0c0:3:d... 14061 (DIGITALOC...)
1 2 2a00:1450:400... 15169 (GOOGLE)
4 2a00:1450:400... 15169 (GOOGLE)
1 199.232.53.140 54113 (FASTLY)
4 151.101.12.157 54113 (FASTLY)
2 2a03:2880:f02... 32934 (FACEBOOK)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
5 2a00:1450:400... 15169 (GOOGLE)
1 1 2a02:26f0:fe0... 20940 (AKAMAI-ASN1)
1 2620:119:50e4... 14413 (LINKEDIN)
1 152.199.21.147 15133 (EDGECAST)
2 151.101.36.84 54113 (FASTLY)
1 104.244.42.200 13414 (TWITTER)
1 2a03:2880:f12... 32934 (FACEBOOK)
2 2a00:1450:400... 15169 (GOOGLE)
99 25
Domain Requested by
45 www.hackingtutorials.org www.hackingtutorials.org
9 secure.gravatar.com www.hackingtutorials.org
5 googleads.g.doubleclick.net pagead2.googlesyndication.com
4 platform.twitter.com www.hackingtutorials.org
platform.twitter.com
4 fonts.gstatic.com www.hackingtutorials.org
4 pagead2.googlesyndication.com www.hackingtutorials.org
pagead2.googlesyndication.com
3 assets.pinterest.com www.hackingtutorials.org
assets.pinterest.com
2 tpc.googlesyndication.com pagead2.googlesyndication.com
tpc.googlesyndication.com
2 connect.facebook.net www.hackingtutorials.org
connect.facebook.net
2 www.google-analytics.com 1 redirects www.hackingtutorials.org
2 ad.linksynergy.com www.hackingtutorials.org
2 udemy-images.udemy.com www.hackingtutorials.org
1 log.pinterest.com assets.pinterest.com
1 www.facebook.com connect.facebook.net
1 syndication.twitter.com www.hackingtutorials.org
1 widgets.pinterest.com assets.pinterest.com
1 www.googletagservices.com pagead2.googlesyndication.com
1 pixel.wp.com www.hackingtutorials.org
1 embed.tumblr.com assets.tumblr.com
1 platform-src.linkedin.com www.hackingtutorials.org
1 platform.linkedin.com 1 redirects
1 adservice.google.com pagead2.googlesyndication.com
1 adservice.google.de pagead2.googlesyndication.com
1 www.google.de www.hackingtutorials.org
1 www.google.com 1 redirects
1 stats.g.doubleclick.net 1 redirects
1 www.reddit.com www.hackingtutorials.org
1 api.at.getsocial.io www.hackingtutorials.org
1 stats.wp.com www.hackingtutorials.org
1 assets.tumblr.com www.hackingtutorials.org
1 fonts.googleapis.com www.hackingtutorials.org
99 31
Subject Issuer Validity Valid
www.hackingtutorials.org
COMODO RSA Domain Validation Secure Server CA
2017-12-13 -
2020-12-12
3 years crt.sh
upload.video.google.com
GTS CA 1O1
2020-05-05 -
2020-07-28
3 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-04-28 -
2020-07-21
3 months crt.sh
*.udemy.com
Go Daddy Secure Certificate Authority - G2
2019-06-25 -
2021-08-24
2 years crt.sh
*.linksynergy.com
Thawte RSA CA 2018
2019-06-11 -
2021-07-18
2 years crt.sh
*.pinterest.com
DigiCert SHA2 High Assurance Server CA
2019-05-29 -
2020-06-01
a year crt.sh
*.gravatar.com
COMODO RSA Domain Validation Secure Server CA
2018-09-06 -
2020-09-05
2 years crt.sh
*.tumblr.com
Sectigo RSA Domain Validation Secure Server CA
2020-03-26 -
2022-06-28
2 years crt.sh
*.wp.com
Sectigo RSA Domain Validation Secure Server CA
2020-04-02 -
2022-07-05
2 years crt.sh
api.at.getsocial.io
Gandi Standard SSL CA 2
2019-12-04 -
2021-01-01
a year crt.sh
*.google-analytics.com
GTS CA 1O1
2020-04-28 -
2020-07-21
3 months crt.sh
*.gstatic.com
GTS CA 1O1
2020-04-28 -
2020-07-21
3 months crt.sh
*.reddit.com
DigiCert SHA2 Secure Server CA
2020-04-06 -
2020-10-03
6 months crt.sh
platform.twitter.com
DigiCert SHA2 High Assurance Server CA
2019-08-28 -
2020-09-01
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2020-04-15 -
2020-07-14
3 months crt.sh
www.google.de
GTS CA 1O1
2020-04-28 -
2020-07-21
3 months crt.sh
*.google.de
GTS CA 1O1
2020-04-28 -
2020-07-21
3 months crt.sh
*.google.com
GTS CA 1O1
2020-05-05 -
2020-07-28
3 months crt.sh
static-src.linkedin.com
DigiCert SHA2 Secure Server CA
2020-03-04 -
2020-09-04
6 months crt.sh
tumblr.com
DigiCert SHA2 Extended Validation Server CA
2020-04-09 -
2022-04-14
2 years crt.sh
syndication.twitter.com
DigiCert SHA2 High Assurance Server CA
2020-03-05 -
2021-03-02
a year crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2020-04-28 -
2020-07-21
3 months crt.sh

This page contains 12 frames:

Primary Page: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Frame ID: 73D05AEAF6034AF24D88BD3BD4959FE5
Requests: 90 HTTP requests in this frame

Frame: https://www.reddit.com/static/button/button1.html?newwindow=true&width=120&url=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&title=Basic%20Malware%20Analysis%20Tools
Frame ID: DBD77C5D1F081DA09D7A1F88E7878090
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20200514/r20190131/zrt_lookup.html
Frame ID: CECF199D043B7D3FF146C851AE0A47A3
Requests: 1 HTTP requests in this frame

Frame: https://embed.tumblr.com/widgets/share/button?canonicalUrl=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&postcontent%5Btitle%5D=Basic%20Malware%20Analysis%20Tools&postcontent%5Bcontent%5D=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F
Frame ID: 0E47BE84E6FEB8E9610514631703D0E0
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/widget_iframe.2a008290075125adde2d7b849b06a0bb.html?origin=https%3A%2F%2Fwww.hackingtutorials.org
Frame ID: C85B7C38A56860B58534C0761251EE1D
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2195678332656815&output=html&h=280&slotname=1186828480&adk=4066655462&adf=2251145695&w=728&fwrn=4&fwrnh=100&lmt=1589969953&rafmt=1&psa=0&guci=1.2.0.0.2.2.0.0&format=728x280&url=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&flash=0&fwr=0&rpe=1&resp_fmts=3&wgl=1&adsid=NT&dt=1589969953788&bpp=16&bdt=500&idt=203&shv=r20200514&cbv=r20190131&ptt=9&saldr=aa&abxe=1&correlator=2254336483226&frm=20&pv=2&ga_vid=678506765.1589969954&ga_sid=1589969954&ga_hid=896559461&ga_fc=0&iag=0&icsg=140806117916668&dssz=46&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=604&ady=46&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21066085&oid=3&pvsid=3466940796854750&pem=819&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=8336&bc=31&ifi=1&uci=a!1&fsb=1&xpc=rMB69RXNeR&p=https%3A//www.hackingtutorials.org&dtd=219
Frame ID: 1932FAF7EA5499514EA1A62D4E9C57F7
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2195678332656815&output=html&h=280&slotname=1208678084&adk=3879295622&adf=98434483&w=702&fwrn=4&fwrnh=100&lmt=1589969954&rafmt=1&psa=0&guci=1.2.0.0.2.2.0.0&format=702x280&url=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&flash=0&fwr=0&rpe=1&resp_fmts=3&wgl=1&adsid=NT&dt=1589969953804&bpp=3&bdt=515&idt=220&shv=r20200514&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=728x280&correlator=2254336483226&frm=20&pv=1&ga_vid=678506765.1589969954&ga_sid=1589969954&ga_hid=896559461&ga_fc=0&iag=0&icsg=563224464588796&dssz=48&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=254&ady=1385&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21066085&oid=3&pvsid=3466940796854750&pem=819&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=8336&bc=31&ifi=2&uci=a!2&btvi=1&fsb=1&xpc=rjORWAx1sq&p=https%3A//www.hackingtutorials.org&dtd=225
Frame ID: 36A3276D2AE03A26A92271A65808123B
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2195678332656815&output=html&h=280&slotname=7394970882&adk=3269222575&adf=4274772780&w=336&lmt=1589969954&psa=0&guci=1.2.0.0.2.2.0.0&format=336x280&url=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&flash=0&wgl=1&adsid=NT&dt=1589969953807&bpp=2&bdt=519&idt=254&shv=r20200514&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=728x280%2C702x280&correlator=2254336483226&frm=20&pv=1&ga_vid=678506765.1589969954&ga_sid=1589969954&ga_hid=896559461&ga_fc=0&iag=0&icsg=563224464588796&dssz=48&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1007&ady=1178&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21066085&oid=3&pvsid=3466940796854750&pem=819&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=8208&bc=31&ifi=3&uci=a!3&fsb=1&xpc=pLwZtDbyWP&p=https%3A//www.hackingtutorials.org&dtd=257
Frame ID: C1C153A5296B7EDEBDA626F958F7A8EE
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2195678332656815&output=html&adk=1812271804&adf=3025194257&lmt=1589969954&plat=1%3A32776%2C2%3A32776%2C8%3A32776%2C9%3A32776%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&ea=0&flash=0&pra=7&wgl=1&adsid=NT&dt=1589969953890&bpp=1&bdt=601&idt=193&shv=r20200514&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=728x280%2C702x280%2C336x280&nras=1&correlator=2254336483226&frm=20&pv=1&ga_vid=678506765.1589969954&ga_sid=1589969954&ga_hid=896559461&ga_fc=0&iag=0&icsg=564047998091248&dssz=48&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21066085&oid=3&pvsid=3466940796854750&pem=819&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=8208&bc=31&ifi=3&uci=a!3&fsb=1&dtd=199
Frame ID: CA7A65BB6A8D37E6360A97670CEB331C
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/tweet_button.2a008290075125adde2d7b849b06a0bb.en.html
Frame ID: 933BB9FB8411F28CB8EC6C6E153E0601
Requests: 1 HTTP requests in this frame

Frame: https://www.facebook.com/v2.3/plugins/share_button.php?app_id=249643311490&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D46%23cb%3Df2f35623221754c%26domain%3Dwww.hackingtutorials.org%26origin%3Dhttps%253A%252F%252Fwww.hackingtutorials.org%252Ff3343e9130a33%26relation%3Dparent.parent&container_width=0&href=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&layout=button_count&locale=en_US&sdk=joey
Frame ID: 606123364421BC9F29B819F09014B545
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: 4098F3DD839032CEFBCF8193E5F7DD47
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\//i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Overall confidence: 100%
Detected patterns
  • script /\/\/platform\.twitter\.com\/widgets\.js/i

Page Statistics

99
Requests

100 %
HTTPS

63 %
IPv6

21
Domains

31
Subdomains

25
IPs

7
Countries

1493 kB
Transfer

2651 kB
Size

6
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 73
  • https://www.google-analytics.com/r/collect?v=1&_v=j82&a=896559461&t=pageview&_s=1&dl=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&ul=en-us&de=UTF-8&dt=Basic%20Malware%20Analysis%20Tools%20-%20Hacking%20Tutorials&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=IEBAAEAB~&jid=893324355&gjid=878134632&cid=678506765.1589969954&tid=UA-63350342-1&_gid=797603485.1589969954&_r=1&z=1650977396 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-63350342-1&cid=678506765.1589969954&jid=893324355&_gid=797603485.1589969954&gjid=878134632&_v=j82&z=1650977396 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-63350342-1&cid=678506765.1589969954&jid=893324355&_v=j82&z=1650977396 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-63350342-1&cid=678506765.1589969954&jid=893324355&_v=j82&z=1650977396&slf_rd=1&random=2100449698
Request Chain 79
  • https://platform.linkedin.com/in.js?async=true&_=1589969953515 HTTP 302
  • https://platform-src.linkedin.com/in.js

99 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
103 KB
21 KB
Document
General
Full URL
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
ec6abb688b33b1f723e06a26ddf4959e418e200e729edf27a4d6a6633052ebf7
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.hackingtutorials.org
:scheme
https
:path
/malware-analysis-tutorials/basic-malware-analysis-tools/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
server
nginx
date
Wed, 20 May 2020 10:19:12 GMT
content-type
text/html; charset=UTF-8
content-length
20735
x-sucuri-id
19013
x-xss-protection
1; mode=block
x-frame-options
SAMEORIGIN
x-content-type-options
nosniff
strict-transport-security
max-age=31536000
content-security-policy
upgrade-insecure-requests;
x-pingback
https://www.hackingtutorials.org/xmlrpc.php
link
<https://www.hackingtutorials.org/wp-json/>; rel="https://api.w.org/" <https://wp.me/p6iVdZ-bj>; rel=shortlink
vary
Accept-Encoding,User-Agent
content-encoding
gzip
cache-control
no-cache, no-store, must-revalidate
pragma
no-cache
expires
0
x-sucuri-cache
EXPIRED
style.min.css
www.hackingtutorials.org/wp-includes/css/dist/block-library/
52 KB
8 KB
Stylesheet
General
Full URL
https://www.hackingtutorials.org/wp-includes/css/dist/block-library/style.min.css?ver=fcf57795264bbec8ea4c3f491e3d6326
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
bca7af0b45b6fc6a2064e8e7a34f2041f3e77261e63f0257209bcde6bc40545d
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
7642
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sat, 09 May 2020 08:55:46 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"d159-5a53347914b69-gzip"
strict-transport-security
max-age=31536000
content-type
text/css
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
styles.css
www.hackingtutorials.org/wp-content/plugins/contact-form-7/includes/css/
2 KB
1 KB
Stylesheet
General
Full URL
https://www.hackingtutorials.org/wp-content/plugins/contact-form-7/includes/css/styles.css?ver=5.1.8
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
811e8960b8f79f14983e30df80a4ccc69d82430ccc0520d2a1a3d1405cfbb2a1
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
677
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Thu, 14 May 2020 10:51:05 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"6d2-5a59979340069-gzip"
strict-transport-security
max-age=31536000
content-type
text/css
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
frontend.css
www.hackingtutorials.org/wp-content/plugins/download-monitor/assets/css/
5 KB
2 KB
Stylesheet
General
Full URL
https://www.hackingtutorials.org/wp-content/plugins/download-monitor/assets/css/frontend.css?ver=fcf57795264bbec8ea4c3f491e3d6326
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
b8e149178358873942c6a434f9ae62dd952769a87c2abdf7e659c129acd398fd
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
1238
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sat, 06 Apr 2019 08:06:03 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"14a0-585d8131f1dd5-gzip"
strict-transport-security
max-age=31536000
content-type
text/css
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
css
fonts.googleapis.com/
14 KB
1 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Open+Sans:400,400Italic,600,700|Roboto+Slab|Merriweather:300italic&subset
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
f5ada274d930640b6d06092f37186311fae66531e3fae8652bfff5da8271d737
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Wed, 20 May 2020 10:19:13 GMT
server
ESF
date
Wed, 20 May 2020 10:19:13 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Wed, 20 May 2020 10:19:13 GMT
style.css
www.hackingtutorials.org/wp-content/themes/smart-mag/
93 KB
20 KB
Stylesheet
General
Full URL
https://www.hackingtutorials.org/wp-content/themes/smart-mag/style.css?ver=2.6.2
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
1d375ceeaefd12db969d08011ea37b7bb764630e9f6d7c198c3293e2f9a6d0a1
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
20517
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sat, 23 Apr 2016 11:28:13 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"17502-531253d25ed40-gzip"
strict-transport-security
max-age=31536000
content-type
text/css
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
responsive.css
www.hackingtutorials.org/wp-content/themes/smart-mag/css/
27 KB
6 KB
Stylesheet
General
Full URL
https://www.hackingtutorials.org/wp-content/themes/smart-mag/css/responsive.css?ver=2.6.2
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
37451233b3f51b68973758fba88625063e69143c9043a8d2d52aa1825c1da039
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
6203
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sat, 23 Apr 2016 11:28:13 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"6abf-531253d25ed40-gzip"
strict-transport-security
max-age=31536000
content-type
text/css
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
prettyPhoto.css
www.hackingtutorials.org/wp-content/themes/smart-mag/css/
19 KB
3 KB
Stylesheet
General
Full URL
https://www.hackingtutorials.org/wp-content/themes/smart-mag/css/prettyPhoto.css?ver=2.6.2
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
c63be02717683d2efdc8c887d77d289092a50b7d51210e87033045ea2b7c9eed
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
2769
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sat, 23 Apr 2016 11:28:13 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"4db0-531253d25ed40-gzip"
strict-transport-security
max-age=31536000
content-type
text/css
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
font-awesome.min.css
www.hackingtutorials.org/wp-content/themes/smart-mag/css/fontawesome/css/
26 KB
6 KB
Stylesheet
General
Full URL
https://www.hackingtutorials.org/wp-content/themes/smart-mag/css/fontawesome/css/font-awesome.min.css?ver=2.6.2
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
936ffccdc35bc55221e669d0e76034af76ba8c080c1b1149144dbbd3b5311829
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
6081
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sat, 23 Apr 2016 11:28:13 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"6857-531253d25ed40-gzip"
strict-transport-security
max-age=31536000
content-type
text/css
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
/
www.hackingtutorials.org/
91 B
463 B
Stylesheet
General
Full URL
https://www.hackingtutorials.org/?__custom_css=1&ver=fcf57795264bbec8ea4c3f491e3d6326
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
d60986708ce1367610293ce8f4d8b45dda69091b9104c927ef242f4dac5a5c74
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
vary
Accept-Encoding,User-Agent
content-length
103
x-xss-protection
1; mode=block
pragma
no-cache
server
nginx
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=31536000
content-type
text/css; charset: utf-8;charset=UTF-8
cache-control
no-cache, no-store, must-revalidate
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
expires
0
social-logos.min.css
www.hackingtutorials.org/wp-content/plugins/jetpack/_inc/social-logos/
26 KB
19 KB
Stylesheet
General
Full URL
https://www.hackingtutorials.org/wp-content/plugins/jetpack/_inc/social-logos/social-logos.min.css?ver=1
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
2e1ced1bd0736a56a0c44fd7b3bf8134850398ecddd52a0f5e6e437c5d527999
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
19001
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sat, 09 May 2020 08:56:20 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"6866-5a53349a05d96-gzip"
strict-transport-security
max-age=31536000
content-type
text/css
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
jetpack.css
www.hackingtutorials.org/wp-content/plugins/jetpack/css/
72 KB
13 KB
Stylesheet
General
Full URL
https://www.hackingtutorials.org/wp-content/plugins/jetpack/css/jetpack.css?ver=8.5
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
846b7b0b890e1e98f993628e5a93e00f3f6aaec9723ca96e299b30d2429f4fad
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
13130
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sat, 09 May 2020 08:56:20 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"12181-5a53349a0abb6-gzip"
strict-transport-security
max-age=31536000
content-type
text/css
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
jquery.js
www.hackingtutorials.org/wp-includes/js/jquery/
95 KB
33 KB
Script
General
Full URL
https://www.hackingtutorials.org/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
1db21d816296e6939ba1f42962496e4134ae2b0081e26970864c40c6d02bb1df
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
33776
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Thu, 23 May 2019 07:41:19 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"17a69-589893530b0cb-gzip"
strict-transport-security
max-age=31536000
content-type
application/javascript
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
jquery-migrate.min.js
www.hackingtutorials.org/wp-includes/js/jquery/
10 KB
4 KB
Script
General
Full URL
https://www.hackingtutorials.org/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
48eb8b500ae6a38617b5738d2b3faec481922a7782246e31d2755c034a45cd5d
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
4014
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Tue, 21 Jun 2016 19:29:25 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"2748-535ced6b0cf40-gzip"
strict-transport-security
max-age=31536000
content-type
application/javascript
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
jquery.prettyPhoto.js
www.hackingtutorials.org/wp-content/themes/smart-mag/js/
21 KB
6 KB
Script
General
Full URL
https://www.hackingtutorials.org/wp-content/themes/smart-mag/js/jquery.prettyPhoto.js?ver=fcf57795264bbec8ea4c3f491e3d6326
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
47ec7ea65620c8be7945819dd593916a9c7c892e727e645c2990819c414ff31c
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
5940
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sat, 23 Apr 2016 11:28:13 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"5402-531253d25ed40-gzip"
strict-transport-security
max-age=31536000
content-type
application/javascript
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/
107 KB
39 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
5dd33025d3204bb34465df276db9d68d10998140df5c8ef62cc0578e3ee21656
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
39268
x-xss-protection
0
server
cafe
etag
15802858585927452621
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Wed, 20 May 2020 10:19:13 GMT
Basic-Malware-Analysis-Tools.jpg
www.hackingtutorials.org/wp-content/uploads/2015/10/
58 KB
58 KB
Image
General
Full URL
https://www.hackingtutorials.org/wp-content/uploads/2015/10/Basic-Malware-Analysis-Tools.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
6913d3167d31272839313109781922fcff75f88ac4027f4e59c8bde027648754
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
59309
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Fri, 27 Nov 2015 11:19:13 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"e7ad-52583dc72ae40"
strict-transport-security
max-age=31536000
content-type
image/jpeg
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
wp-emoji-release.min.js
www.hackingtutorials.org/wp-includes/js/
14 KB
5 KB
Script
General
Full URL
https://www.hackingtutorials.org/wp-includes/js/wp-emoji-release.min.js?ver=fcf57795264bbec8ea4c3f491e3d6326
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
96d33f532112177ede6bf262dcf6d0140dbe29f05a4595d17b0be4743205b5ea
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
4653
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sat, 09 May 2020 08:55:46 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"364d-5a5334796259a-gzip"
strict-transport-security
max-age=31536000
content-type
application/javascript
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
Basic-Malware-Analysis-Tools-PEiD.jpg
www.hackingtutorials.org/wp-content/uploads/2015/10/
22 KB
22 KB
Image
General
Full URL
https://www.hackingtutorials.org/wp-content/uploads/2015/10/Basic-Malware-Analysis-Tools-PEiD.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
3c0d70c062409c160dcb729033efc1b551932efeadca659e924469831f9f2d00
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
REVALIDATED
content-length
22517
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Fri, 27 Nov 2015 11:19:35 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"57f5-52583ddc25fc0"
strict-transport-security
max-age=31536000
content-type
image/jpeg
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
Basic-Malware-Analysis-Tools-Dependency-Walker-1024x535.jpg
www.hackingtutorials.org/wp-content/uploads/2015/10/
114 KB
115 KB
Image
General
Full URL
https://www.hackingtutorials.org/wp-content/uploads/2015/10/Basic-Malware-Analysis-Tools-Dependency-Walker-1024x535.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
b8dd8083a9a13f80d908565c7bc65bb1f9e150ad12398e7b4157fc9e61714d2e
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
117135
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Fri, 27 Nov 2015 11:19:31 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"1c98f-52583dd8556c0"
strict-transport-security
max-age=31536000
content-type
image/jpeg
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
Basic-Malware-Analysis-Tools-Resource-Hacker.jpg
www.hackingtutorials.org/wp-content/uploads/2015/10/
61 KB
61 KB
Image
General
Full URL
https://www.hackingtutorials.org/wp-content/uploads/2015/10/Basic-Malware-Analysis-Tools-Resource-Hacker.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
27cd85212bf7542b14ffe955dd5008b2404735856d9247c82afbd0488fdba928
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
62318
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Fri, 27 Nov 2015 11:19:27 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"f36e-52583dd484dc0"
strict-transport-security
max-age=31536000
content-type
image/jpeg
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
Basic-Malware-Analysis-Tools-PEview.jpg
www.hackingtutorials.org/wp-content/uploads/2015/10/
97 KB
97 KB
Image
General
Full URL
https://www.hackingtutorials.org/wp-content/uploads/2015/10/Basic-Malware-Analysis-Tools-PEview.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
6cf4d2e15dcd7896c98f7e39bab30c8f0984e239391b80fc8a0bac93d600e244
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
REVALIDATED
content-length
98904
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Fri, 02 Oct 2015 12:08:05 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"18258-5211e04187340"
strict-transport-security
max-age=31536000
content-type
image/jpeg
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
Basic-Malware-Analysis-Tools-FileAlyzer.jpg
www.hackingtutorials.org/wp-content/uploads/2015/10/
51 KB
52 KB
Image
General
Full URL
https://www.hackingtutorials.org/wp-content/uploads/2015/10/Basic-Malware-Analysis-Tools-FileAlyzer.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
ca7251cbd7b4070814f3e1d1500c53645310eec57300e331e7239e6c9d7f5d50
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
52512
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Fri, 27 Nov 2015 11:19:17 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"cd20-52583dcafb740"
strict-transport-security
max-age=31536000
content-type
image/jpeg
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
VHL-Banner-2.jpg
www.hackingtutorials.org/wp-content/uploads/2020/02/
122 KB
123 KB
Image
General
Full URL
https://www.hackingtutorials.org/wp-content/uploads/2020/02/VHL-Banner-2.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
80440fc7ed492966deb1d807cc300070d3e822920f83035d805b62f0899f1123
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
124961
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Tue, 04 Feb 2020 10:57:59 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"1e821-59dbde9bfdfb3"
strict-transport-security
max-age=31536000
content-type
image/jpeg
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
472958_1b51_3.jpg
udemy-images.udemy.com/course/480x270/
14 KB
15 KB
Image
General
Full URL
https://udemy-images.udemy.com/course/480x270/472958_1b51_3.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
8.27.13.75 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
d1ffe57ae600e415b33d2e316910d711c57fe3ba30f1aa0eefaf71fd0fe41287

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 20 May 2020 10:19:13 GMT
Last-Modified
Fri, 19 Jun 2015 17:09:24 GMT
Server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:48/gname:apache/uname:apache/gid:48/mode:33188/mtime:1434733763/atime:1434733763/md5:566d6f77c0081853ddd986f54458ea3f/ctime:1434733763
x-amz-request-id
00635992B5F076F3
ETag
"566d6f77c0081853ddd986f54458ea3f"
Content-Type
image/jpeg
access-control-allow-origin
*
Cache-Control
public
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
14839
x-amz-id-2
TgLXuK+P6Nu0jJ67D4funjd+IYploshSqqwQBiz279TDQ8PqRg7oIT6qTv6YGeNZMEbuu30Sv5s=
Expires
Mon, 01 Jun 2020 10:04:20 GMT
show
ad.linksynergy.com/fs-bin/
43 B
471 B
Image
General
Full URL
https://ad.linksynergy.com/fs-bin/show?id=XhHfvFHk7Zc&bids=323058.472958&type=2&subid=0
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.212.97.116 Mountain View, United States, ASN19527 (GOOGLE-2, US),
Reverse DNS
116.97.212.35.bc.googleusercontent.com
Software
/
Resource Hash
d3005a63604dec4786aa3e3aa7620601a0f247dd87ecaaef827910e883b02783

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 20 May 2020 10:19:13 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa OUR BUS STA"
Cache-Control
no-store
Connection
close
Content-Type
image/gif
Content-Length
43
Expires
Wed, 20 May 2020 12:19:13 GMT
331420_fd1a_2.jpg
udemy-images.udemy.com/course/480x270/
62 KB
63 KB
Image
General
Full URL
https://udemy-images.udemy.com/course/480x270/331420_fd1a_2.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
8.27.13.75 , United States, ASN3356 (LEVEL3, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
e1e25d5e047bcbbbd8bf18b49763a9da28e5f1bbc31dee073c8b2456a398424b

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 20 May 2020 10:19:13 GMT
Last-Modified
Tue, 04 Nov 2014 07:08:00 GMT
Server
AmazonS3
x-amz-request-id
94DF1C12877FA7C0
ETag
"bbaec4ffc5fb514fdcd7853f1fe37fc2"
Content-Type
image/jpeg
access-control-allow-origin
*
Cache-Control
public
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
63585
x-amz-id-2
HQssSQlzBgsjEj/HrCGykoRvS+okL8jUoxZwLVjh7LMvdOhlmeZ5hfjsvvlwqv770XAS+PFe0pk=
Expires
Mon, 08 Jun 2020 15:57:06 GMT
show
ad.linksynergy.com/fs-bin/
43 B
471 B
Image
General
Full URL
https://ad.linksynergy.com/fs-bin/show?id=XhHfvFHk7Zc&bids=323058.331420&type=2&subid=0
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.212.97.116 Mountain View, United States, ASN19527 (GOOGLE-2, US),
Reverse DNS
116.97.212.35.bc.googleusercontent.com
Software
/
Resource Hash
d3005a63604dec4786aa3e3aa7620601a0f247dd87ecaaef827910e883b02783

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 20 May 2020 10:19:13 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa OUR BUS STA"
Cache-Control
no-store
Connection
close
Content-Type
image/gif
Content-Length
43
Expires
Wed, 20 May 2020 12:19:13 GMT
pinit_fg_en_rect_gray_20.png
assets.pinterest.com/images/pidgets/
908 B
1 KB
Image
General
Full URL
https://assets.pinterest.com/images/pidgets/pinit_fg_en_rect_gray_20.png
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:eb0 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3aec2b233c010f1f2213ecf8360d509f3eeca34f69d162335aefa01fe0035e2f

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-cdn
cloudflare
status
200
content-length
908
cf-request-id
02d3313b1a00000605a910d200000001
server
cloudflare
etag
"8a25277cfdf72f8f916b4cdc34052149"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding, Origin
access-control-allow-methods
GET
content-type
image/png
access-control-allow-origin
*
access-control-expose-headers
x-cdn
cache-control
max-age=300
accept-ranges
bytes
cf-ray
59655171cc150605-FRA
how-does-antivirus-software-work-artwork-e1463047022503.jpg
www.hackingtutorials.org/wp-content/uploads/2016/04/
52 KB
53 KB
Image
General
Full URL
https://www.hackingtutorials.org/wp-content/uploads/2016/04/how-does-antivirus-software-work-artwork-e1463047022503.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
db8ee96827e67698d30b624d68f2c3d4a878187326e166b6e192de7f88e4a457
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
53651
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sun, 05 Jun 2016 12:48:29 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"d193-534875f616140"
strict-transport-security
max-age=31536000
content-type
image/jpeg
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
Malware-Types-explained-e1463047084767.jpg
www.hackingtutorials.org/wp-content/uploads/2015/10/
51 KB
51 KB
Image
General
Full URL
https://www.hackingtutorials.org/wp-content/uploads/2015/10/Malware-Types-explained-e1463047084767.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
35c395afd62d791bd620015c630cb070bd5d7bcbd914dc4aae9b58b4ee2e5040
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
52058
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sun, 05 Jun 2016 12:48:46 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"cb5a-534876064c780"
strict-transport-security
max-age=31536000
content-type
image/jpeg
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
Dynamic-Malware-Analysis-Tools-240x125.jpg
www.hackingtutorials.org/wp-content/uploads/2015/10/
11 KB
12 KB
Image
General
Full URL
https://www.hackingtutorials.org/wp-content/uploads/2015/10/Dynamic-Malware-Analysis-Tools-240x125.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
47654251d20ef2e23fa5502b3496445e70a0fc2178d1fd8d695da17103f2e21c
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
REVALIDATED
content-length
11484
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Fri, 27 Nov 2015 11:19:08 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"2cdc-52583dc266300"
strict-transport-security
max-age=31536000
content-type
image/jpeg
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
cbec0fdb4855d1a19959667bc9425ab2
secure.gravatar.com/avatar/
983 B
1 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/cbec0fdb4855d1a19959667bc9425ab2?s=40&d=mm&r=g
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
fe72e710fa08ea724842080b779a946a2ef297a1337c14e53423fc53269fe98f

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Wed, 20 May 2020 10:19:13 GMT
last-modified
Wed, 11 Jan 1984 08:00:00 GMT
server
nginx
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=300
content-disposition
inline; filename="cbec0fdb4855d1a19959667bc9425ab2.png"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/cbec0fdb4855d1a19959667bc9425ab2?s=40&d=mm&r=g>; rel="canonical"
content-length
983
expires
Wed, 20 May 2020 10:24:13 GMT
650336e7d8ffcedf031b3263baf5357a
secure.gravatar.com/avatar/
1 KB
2 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/650336e7d8ffcedf031b3263baf5357a?s=40&d=mm&r=g
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
bea72e436aeb10814422b337f149d3e3194dff7b8bb87bc5b932272dc0bd0524

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Wed, 20 May 2020 10:19:13 GMT
last-modified
Tue, 02 May 2017 15:13:21 GMT
server
nginx
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=300
content-disposition
inline; filename="650336e7d8ffcedf031b3263baf5357a.jpeg"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/650336e7d8ffcedf031b3263baf5357a?s=40&d=mm&r=g>; rel="canonical"
content-length
1309
expires
Wed, 20 May 2020 10:24:13 GMT
0826544f6d4f87222df1b4b1f4a92b3f
secure.gravatar.com/avatar/
983 B
1 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/0826544f6d4f87222df1b4b1f4a92b3f?s=40&d=mm&r=g
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
ca775cd8ab837239f9497e8afe90403d78cb37581c0adfe4003012d24bea020e

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Wed, 20 May 2020 10:19:13 GMT
last-modified
Wed, 11 Jan 1984 08:00:00 GMT
server
nginx
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=300
content-disposition
inline; filename="0826544f6d4f87222df1b4b1f4a92b3f.png"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/0826544f6d4f87222df1b4b1f4a92b3f?s=40&d=mm&r=g>; rel="canonical"
content-length
983
expires
Wed, 20 May 2020 10:24:13 GMT
d05caead4711072dd9a70b990c6a839d
secure.gravatar.com/avatar/
983 B
1 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/d05caead4711072dd9a70b990c6a839d?s=40&d=mm&r=g
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
ca775cd8ab837239f9497e8afe90403d78cb37581c0adfe4003012d24bea020e

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Wed, 20 May 2020 10:19:13 GMT
last-modified
Wed, 11 Jan 1984 08:00:00 GMT
server
nginx
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=300
content-disposition
inline; filename="d05caead4711072dd9a70b990c6a839d.png"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/d05caead4711072dd9a70b990c6a839d?s=40&d=mm&r=g>; rel="canonical"
content-length
983
expires
Wed, 20 May 2020 10:24:13 GMT
a7bb858354aac8b05c4cfc2bb8dbaa07
secure.gravatar.com/avatar/
2 KB
2 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/a7bb858354aac8b05c4cfc2bb8dbaa07?s=40&d=mm&r=g
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
3a0e8f572bb986f4520d69716aad439fcf071ac2cf1bd6a4bd1e297f850ebc6e

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Wed, 20 May 2020 10:19:13 GMT
last-modified
Wed, 26 Oct 2016 06:10:44 GMT
server
nginx
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=300
content-disposition
inline; filename="a7bb858354aac8b05c4cfc2bb8dbaa07.jpeg"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/a7bb858354aac8b05c4cfc2bb8dbaa07?s=40&d=mm&r=g>; rel="canonical"
content-length
1610
expires
Wed, 20 May 2020 10:24:13 GMT
2ba98bf8a8177a34ec593e09cbba41b4
secure.gravatar.com/avatar/
2 KB
2 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/2ba98bf8a8177a34ec593e09cbba41b4?s=40&d=mm&r=g
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
d9e3655f062a18a0a1e2a9a8b3e911d770331193d064666abdd8053bb1d90841

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Wed, 20 May 2020 10:19:13 GMT
last-modified
Fri, 02 Nov 2018 08:09:38 GMT
server
nginx
status
200
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=300
content-disposition
inline; filename="2ba98bf8a8177a34ec593e09cbba41b4.png"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/2ba98bf8a8177a34ec593e09cbba41b4?s=40&d=mm&r=g>; rel="canonical"
content-length
1939
expires
Wed, 20 May 2020 10:24:13 GMT
b9a57d4fa4ca4ebe4d7caa3e6b588fdf
secure.gravatar.com/avatar/
1 KB
1 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/b9a57d4fa4ca4ebe4d7caa3e6b588fdf?s=40&d=mm&r=g
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
bea72e436aeb10814422b337f149d3e3194dff7b8bb87bc5b932272dc0bd0524

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Wed, 20 May 2020 10:19:13 GMT
last-modified
Tue, 02 May 2017 15:13:21 GMT
server
nginx
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=300
content-disposition
inline; filename="b9a57d4fa4ca4ebe4d7caa3e6b588fdf.jpeg"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/b9a57d4fa4ca4ebe4d7caa3e6b588fdf?s=40&d=mm&r=g>; rel="canonical"
content-length
1309
expires
Wed, 20 May 2020 10:24:13 GMT
9d6ef57c34aabbc2ed7ebe8416b47113
secure.gravatar.com/avatar/
983 B
1 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/9d6ef57c34aabbc2ed7ebe8416b47113?s=40&d=mm&r=g
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
ca775cd8ab837239f9497e8afe90403d78cb37581c0adfe4003012d24bea020e

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Wed, 20 May 2020 10:19:13 GMT
last-modified
Wed, 11 Jan 1984 08:00:00 GMT
server
nginx
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=300
content-disposition
inline; filename="9d6ef57c34aabbc2ed7ebe8416b47113.png"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/9d6ef57c34aabbc2ed7ebe8416b47113?s=40&d=mm&r=g>; rel="canonical"
content-length
983
expires
Wed, 20 May 2020 10:24:13 GMT
cee7b4a92d8d583def824c1d9bdc084e
secure.gravatar.com/avatar/
983 B
1 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/cee7b4a92d8d583def824c1d9bdc084e?s=40&d=mm&r=g
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
fe72e710fa08ea724842080b779a946a2ef297a1337c14e53423fc53269fe98f

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Wed, 20 May 2020 10:19:13 GMT
last-modified
Wed, 11 Jan 1984 08:00:00 GMT
server
nginx
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=300
content-disposition
inline; filename="cee7b4a92d8d583def824c1d9bdc084e.png"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/cee7b4a92d8d583def824c1d9bdc084e?s=40&d=mm&r=g>; rel="canonical"
content-length
983
expires
Wed, 20 May 2020 10:24:13 GMT
Hacking-with-netcat-part-2-Bind-shells-and-Reverse-shells-fi-110x96.jpg
www.hackingtutorials.org/wp-content/uploads/2016/11/
5 KB
5 KB
Image
General
Full URL
https://www.hackingtutorials.org/wp-content/uploads/2016/11/Hacking-with-netcat-part-2-Bind-shells-and-Reverse-shells-fi-110x96.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
c56b1359b3c00a6e5fc2d41852d4cec63bbfe1150928e30d6c33439d4410efbc
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
5084
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Tue, 08 Nov 2016 15:49:19 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"13dc-540cc155c240e"
strict-transport-security
max-age=31536000
content-type
image/jpeg
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
Metasploit-commands-fi-2-110x96.jpg
www.hackingtutorials.org/wp-content/uploads/2016/04/
4 KB
4 KB
Image
General
Full URL
https://www.hackingtutorials.org/wp-content/uploads/2016/04/Metasploit-commands-fi-2-110x96.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
ebc54b95a36c5c24572b02b4cefb9cb1eef74acd7999a7d7e940add1b4b1aabe
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
3865
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Thu, 05 May 2016 13:02:03 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"f19-53217f2d168c0"
strict-transport-security
max-age=31536000
content-type
image/jpeg
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
Top-10-Wifi-Hacking-Tools-in-Kali-Linux-140x78.jpg
www.hackingtutorials.org/wp-content/uploads/2015/07/
5 KB
5 KB
Image
General
Full URL
https://www.hackingtutorials.org/wp-content/uploads/2015/07/Top-10-Wifi-Hacking-Tools-in-Kali-Linux-140x78.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
81a9314b946d543c08f563545a64532d71bcf6069ba2875896ff6ee44c40362a
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
4862
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Fri, 27 Nov 2015 11:21:10 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"12fe-52583e36bf580"
strict-transport-security
max-age=31536000
content-type
image/jpeg
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
Installing-VPN-on-Kali-Linux-Banner-140x93.jpg
www.hackingtutorials.org/wp-content/uploads/2015/06/
8 KB
8 KB
Image
General
Full URL
https://www.hackingtutorials.org/wp-content/uploads/2015/06/Installing-VPN-on-Kali-Linux-Banner-140x93.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
36176ae3d86cb3961bf5da220b5b81ae93a906cc8d31f5efb3779fd095e70fcd
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
8289
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Fri, 27 Nov 2015 11:21:39 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"2061-52583e52676c0"
strict-transport-security
max-age=31536000
content-type
image/jpeg
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
wpscan-140x92.jpg
www.hackingtutorials.org/wp-content/uploads/2015/06/
7 KB
7 KB
Image
General
Full URL
https://www.hackingtutorials.org/wp-content/uploads/2015/06/wpscan-140x92.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
ea905e782352ba8e6708483dc8066c858eb950f3db8f8dfd80b12ab6f0560615
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
7264
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Fri, 27 Nov 2015 11:31:54 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"1c60-5258409ce9e80"
strict-transport-security
max-age=31536000
content-type
image/jpeg
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
start-140x78.jpg
www.hackingtutorials.org/wp-content/uploads/2015/05/
5 KB
5 KB
Image
General
Full URL
https://www.hackingtutorials.org/wp-content/uploads/2015/05/start-140x78.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
a7b90a0ccf433608dd8702f9e4af9d767e50dc21de084e751edc3267f12c68ad
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
4815
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Fri, 27 Nov 2015 11:31:05 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"12cf-5258406e2f040"
strict-transport-security
max-age=31536000
content-type
image/jpeg
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
VHL-Banner.jpg
www.hackingtutorials.org/wp-content/uploads/2020/02/
38 KB
38 KB
Image
General
Full URL
https://www.hackingtutorials.org/wp-content/uploads/2020/02/VHL-Banner.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
8455a9dcdd5728fb198b6a6d5890451090a8b8930e4510e00496b93adebcbf53
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
38735
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Tue, 04 Feb 2020 10:58:00 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"974f-59dbde9cd9b55"
strict-transport-security
max-age=31536000
content-type
image/jpeg
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
OSCP-Offensive-Security-Certified-Professional-2-110x96.jpg
www.hackingtutorials.org/wp-content/uploads/2016/09/
5 KB
5 KB
Image
General
Full URL
https://www.hackingtutorials.org/wp-content/uploads/2016/09/OSCP-Offensive-Security-Certified-Professional-2-110x96.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
5897340a2adbed84c5f9a924dea8bfd632132121d4520085ef22cd80d4babff8
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
4938
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Fri, 02 Sep 2016 08:48:31 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"134a-53b82651621f3"
strict-transport-security
max-age=31536000
content-type
image/jpeg
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
Exploiting-Eternalblue-for-shell-with-Empire-ft-wm-110x96.jpg
www.hackingtutorials.org/wp-content/uploads/2017/04/
3 KB
4 KB
Image
General
Full URL
https://www.hackingtutorials.org/wp-content/uploads/2017/04/Exploiting-Eternalblue-for-shell-with-Empire-ft-wm-110x96.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
e1acd2262598afffe8994575218d3df6e081d83f3786412ce9916d55835077ac
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
3557
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Tue, 18 Apr 2017 13:36:19 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"de5-54d70fe2711c0"
strict-transport-security
max-age=31536000
content-type
image/jpeg
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
Installing-VPN-on-Kali-Linux-2016-rolling-fim-150x94.jpg
www.hackingtutorials.org/wp-content/uploads/2016/03/
6 KB
7 KB
Image
General
Full URL
https://www.hackingtutorials.org/wp-content/uploads/2016/03/Installing-VPN-on-Kali-Linux-2016-rolling-fim-150x94.jpg
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
f45afdd2b306866a8490c55bd03a2c9861da9b7bb5b2eedd6544c033d8d23bd0
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
6478
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sat, 23 Apr 2016 15:32:13 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"194e-53128a5c29940"
strict-transport-security
max-age=31536000
content-type
image/jpeg
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
share-button.js
assets.tumblr.com/
11 KB
4 KB
Script
General
Full URL
https://assets.tumblr.com/share-button.js
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.40 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
assets.tumblr.com
Software
nginx /
Resource Hash
b62a206455df49fa026e77fcc0b89cca653ebf0679693394bcb0bf1cade7d5db
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT ams 1
date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
br
last-modified
Thu, 07 May 2020 05:05:25 GMT
server
nginx
status
200
etag
W/"5eb39715-2d2f"
strict-transport-security
max-age=31536000; preload
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=315360000, immutable
timing-allow-origin
*
expires
Thu, 31 Dec 2037 23:55:55 GMT
loading.gif
www.hackingtutorials.org/wp-content/plugins/jetpack/modules/sharedaddy/images/
2 KB
3 KB
Image
General
Full URL
https://www.hackingtutorials.org/wp-content/plugins/jetpack/modules/sharedaddy/images/loading.gif
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
3fa54e29f88aee644eaaac38e11681ea07858eb1ea76b1baae12597aae83fe82
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
2530
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sat, 09 May 2020 08:56:19 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"9e2-5a53349924434"
strict-transport-security
max-age=31536000
content-type
image/gif
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
comment-reply.min.js
www.hackingtutorials.org/wp-includes/js/
2 KB
2 KB
Script
General
Full URL
https://www.hackingtutorials.org/wp-includes/js/comment-reply.min.js?ver=fcf57795264bbec8ea4c3f491e3d6326
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
a37ca4608218cccdfb8b6d4edbdfbf375d0e1368b46397e3b7049e0cbf5bc1f6
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
1159
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sat, 09 May 2020 08:55:46 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"974-5a533479389a1-gzip"
strict-transport-security
max-age=31536000
content-type
application/javascript
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
scripts.js
www.hackingtutorials.org/wp-content/plugins/contact-form-7/includes/js/
14 KB
4 KB
Script
General
Full URL
https://www.hackingtutorials.org/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=5.1.8
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
72ebfeb1ce24b152349b7a231f6fc29ff2a2b7a5ede91dcdb80d6b9de1779046
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
4039
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Thu, 14 May 2020 10:51:05 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"3923-5a59979346211-gzip"
strict-transport-security
max-age=31536000
content-type
application/javascript
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
bunyad-theme.js
www.hackingtutorials.org/wp-content/themes/smart-mag/js/
45 KB
14 KB
Script
General
Full URL
https://www.hackingtutorials.org/wp-content/themes/smart-mag/js/bunyad-theme.js?ver=2.6.2
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
3c6933fe4f3e40e78ca2bc6ec08b61b6cfe1d2650f61b7c8297e516e25a5283a
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
13697
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sat, 23 Apr 2016 11:28:13 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"b4dd-531253d25ed40-gzip"
strict-transport-security
max-age=31536000
content-type
application/javascript
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
jquery.flexslider-min.js
www.hackingtutorials.org/wp-content/themes/smart-mag/js/
21 KB
7 KB
Script
General
Full URL
https://www.hackingtutorials.org/wp-content/themes/smart-mag/js/jquery.flexslider-min.js?ver=2.6.2
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
9de08fb3db12e95040c5403ae6b58f8639d98dbb4e65f6be6186df82e049410f
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
6272
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sat, 23 Apr 2016 11:28:13 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"5486-531253d25ed40-gzip"
strict-transport-security
max-age=31536000
content-type
application/javascript
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
jquery.sticky-sidebar.min.js
www.hackingtutorials.org/wp-content/themes/smart-mag/js/
4 KB
2 KB
Script
General
Full URL
https://www.hackingtutorials.org/wp-content/themes/smart-mag/js/jquery.sticky-sidebar.min.js?ver=2.6.2
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
414a7bc8e17fd1829f3603a0f8203e9bd598c47d6220722d6866a83a83cd592c
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
1396
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sat, 23 Apr 2016 11:28:13 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"108f-531253d25ed40-gzip"
strict-transport-security
max-age=31536000
content-type
application/javascript
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
wp-embed.min.js
www.hackingtutorials.org/wp-includes/js/
1 KB
1 KB
Script
General
Full URL
https://www.hackingtutorials.org/wp-includes/js/wp-embed.min.js?ver=fcf57795264bbec8ea4c3f491e3d6326
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
6ebcda7a3a41ef97f0b4071160ceb1020e540fdc0f790079a5c2ef01ab654fe0
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
769
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sat, 09 May 2020 08:55:46 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"59a-5a533479385b9-gzip"
strict-transport-security
max-age=31536000
content-type
application/javascript
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
form.js
www.hackingtutorials.org/wp-content/plugins/akismet/_inc/
700 B
751 B
Script
General
Full URL
https://www.hackingtutorials.org/wp-content/plugins/akismet/_inc/form.js?ver=4.1.5
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
0515cbd1f8aee97e1c8e0d1d015ca96c86def13e90d2e73bf813072ccc23d531
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
318
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Wed, 29 Apr 2020 17:00:59 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"2bc-5a470e4753e95-gzip"
strict-transport-security
max-age=31536000
content-type
application/javascript
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
sharing.min.js
www.hackingtutorials.org/wp-content/plugins/jetpack/_inc/build/sharedaddy/
8 KB
3 KB
Script
General
Full URL
https://www.hackingtutorials.org/wp-content/plugins/jetpack/_inc/build/sharedaddy/sharing.min.js?ver=8.5
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
1e99034e4b75a1fb7ba372a3a950fa19ff4688d8561479b1a34dfcbde83ff3d8
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
2612
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sat, 09 May 2020 08:56:20 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"1f5b-5a533499bd186-gzip"
strict-transport-security
max-age=31536000
content-type
application/javascript
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
e-202021.js
stats.wp.com/
9 KB
3 KB
Script
General
Full URL
https://stats.wp.com/e-202021.js
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.76.3 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
0ebbc7fba9a50d36ef5422345f624431710db4528f25749d1d438c2c10bb69f2

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
server
nginx
etag
W/"5c6340e3-350a"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=31536000
expires
Sun, 16 May 2021 22:07:51 GMT
gs_async.js
api.at.getsocial.io/get/v1/127582/
0
0
Script
General
Full URL
https://api.at.getsocial.io/get/v1/127582/gs_async.js
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a03:b0c0:3:d0::21:f001 Frankfurt am Main, Germany, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
Software
nginx + Phusion Passenger 5.3.7 / Phusion Passenger 5.3.7
Resource Hash
Security Headers
Name Value
X-Frame-Options ALLOWALL

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-powered-by
Phusion Passenger 5.3.7
p3p
CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
status
403, 403 Forbidden
access-control-request-method
*
x-request-id
eea4ebd2-efee-4ed7-95af-8fd7b4e5eceb
x-runtime
0.004852
server
nginx + Phusion Passenger 5.3.7
x-frame-options
ALLOWALL
vary
Accept-Encoding
access-control-allow-methods
GET, POST
content-type
text/javascript; charset=utf-8
access-control-allow-origin
https://hackingtutorials.org
cache-control
no-cache
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Accept, Authorization
analytics.js
www.google-analytics.com/
45 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
2f1fd973e6c48489ae07c467e3278635b856c698d1f502e06af3ab555937deac
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 30 Apr 2020 21:54:13 GMT
server
Golfe2
age
4974
date
Wed, 20 May 2020 08:56:19 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18433
expires
Wed, 20 May 2020 10:56:19 GMT
mem8YaGs126MiZpBA-UFVZ0bf8pkAg.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem8YaGs126MiZpBA-UFVZ0bf8pkAg.woff2
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
54c64f3c66372027154f01fc9f24b4e25fdfe405b70d1994c79abbc2576ff775
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:400,400Italic,600,700|Roboto+Slab|Merriweather:300italic&subset
Origin
https://www.hackingtutorials.org

Response headers

date
Tue, 19 May 2020 19:36:40 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:49 GMT
server
sffe
age
52953
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
9132
x-xss-protection
0
expires
Wed, 19 May 2021 19:36:40 GMT
fontawesome-webfont.woff2
www.hackingtutorials.org/wp-content/themes/smart-mag/css/fontawesome/fonts/
63 KB
63 KB
Font
General
Full URL
https://www.hackingtutorials.org/wp-content/themes/smart-mag/css/fontawesome/fonts/fontawesome-webfont.woff2?v=4.4.0
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.124.249.163 , United States, ASN30148 (SUCURI-SEC, US),
Reverse DNS
cloudproxy10163.sucuri.net
Software
nginx /
Resource Hash
3c4a1bb7ce3234407184f0d80cc4dec075e4ad616b44dcc5778e1cfb1bc24019
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.hackingtutorials.org/wp-content/themes/smart-mag/css/fontawesome/css/font-awesome.min.css?ver=2.6.2
Origin
https://www.hackingtutorials.org

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
MISS
vary
Accept-Encoding,User-Agent
content-length
64466
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Sat, 23 Apr 2016 11:28:13 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"fbd0-531253d25ed40-gzip"
strict-transport-security
max-age=31536000
cache-control
max-age=315360000
x-sucuri-id
19013
content-security-policy
upgrade-insecure-requests;
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
mem5YaGs126MiZpBA-UN7rgOUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UN7rgOUuhpKKSTjw.woff2
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a48a6e4b14fe55f750c0a3dfb5a6f4941bdc06af0aa542b90de25c30c2b4625c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:400,400Italic,600,700|Roboto+Slab|Merriweather:300italic&subset
Origin
https://www.hackingtutorials.org

Response headers

date
Wed, 20 May 2020 07:39:04 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:31:11 GMT
server
sffe
age
9609
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
9080
x-xss-protection
0
expires
Thu, 20 May 2021 07:39:04 GMT
BngbUXZYTXPIvIBgJJSb6s3BzlRRfKOFbvjojISmb2RlV9Su1cai.woff
fonts.gstatic.com/s/robotoslab/v11/
15 KB
15 KB
Font
General
Full URL
https://fonts.gstatic.com/s/robotoslab/v11/BngbUXZYTXPIvIBgJJSb6s3BzlRRfKOFbvjojISmb2RlV9Su1cai.woff
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
ce677696c57a6b97fee81d149546716b76f236cf7bb35845fa771feb91914f95
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:400,400Italic,600,700|Roboto+Slab|Merriweather:300italic&subset
Origin
https://www.hackingtutorials.org

Response headers

date
Sun, 17 May 2020 09:34:14 GMT
x-content-type-options
nosniff
last-modified
Tue, 04 Feb 2020 23:46:05 GMT
server
sffe
age
261899
status
200
content-type
font/woff
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
15244
x-xss-protection
0
expires
Mon, 17 May 2021 09:34:14 GMT
button1.html
www.reddit.com/static/button/ Frame DBD7
0
0
Document
General
Full URL
https://www.reddit.com/static/button/button1.html?newwindow=true&width=120&url=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&title=Basic%20Malware%20Analysis%20Tools
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.232.53.140 Manchester, United Kingdom, ASN54113 (FASTLY, US),
Reverse DNS
Software
snooserv /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload

Request headers

:method
GET
:authority
www.reddit.com
:scheme
https
:path
/static/button/button1.html?newwindow=true&width=120&url=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&title=Basic%20Malware%20Analysis%20Tools
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/

Response headers

status
200
content-type
text/html
last-modified
Wed, 30 Jul 2014 19:09:19 GMT
etag
W/"ce91c4f683d32f8907f0e97f3fb93696"
content-encoding
gzip
x-moose
majestic
accept-ranges
bytes
date
Wed, 20 May 2020 10:19:13 GMT
via
1.1 varnish
age
12267
x-served-by
cache-man4142-MAN
x-cache
HIT
x-cache-hits
1
x-timer
S1589969954.704977,VS0,VE1
set-cookie
edgebucket=w8veFJCnwDDlLVj3et; Domain=reddit.com; Max-Age=63071999; Path=/; secure
cache-control
private, max-age=3600
strict-transport-security
max-age=15552000; includeSubDomains; preload
server
snooserv
content-length
1801
mem5YaGs126MiZpBA-UNirkOUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UNirkOUuhpKKSTjw.woff2
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b8e23a845bc6b7fd417d29182e0e38d353e64b5e12e06bb1de2b5ce063db1dcc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:400,400Italic,600,700|Roboto+Slab|Merriweather:300italic&subset
Origin
https://www.hackingtutorials.org

Response headers

date
Wed, 20 May 2020 07:37:44 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:44 GMT
server
sffe
age
9689
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
9180
x-xss-protection
0
expires
Thu, 20 May 2021 07:37:44 GMT
truncated
/
18 KB
18 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
895964971ebdb56ee76d08850bcb4c5a88ec4c65e6a235882304e8ff6767cd7c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
Origin
https://www.hackingtutorials.org

Response headers

Content-Type
application/font-woff;charset=utf-8
widgets.js
platform.twitter.com/
96 KB
29 KB
Script
General
Full URL
https://platform.twitter.com/widgets.js
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.157 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
cb88bf7a67ba917b5ee7b4a1cc593d8bfe94cf2670cb24df338308ec8a573ec3

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-cache
HIT, HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
29223
x-served-by
cache-bwi5129-BWI, cache-fra19170-FRA
last-modified
Tue, 12 May 2020 17:25:55 GMT
etag
"580310dcde7e145486d79be6e5257680+gzip"
vary
Accept-Encoding
access-control-allow-methods
GET
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=1800
accept-ranges
bytes
tw-cdn
FT
sdk.js
connect.facebook.net/en_US/
3 KB
2 KB
Script
General
Full URL
https://connect.facebook.net/en_US/sdk.js
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
fbf7f6e43add205fca62445f4e4939ba20549424ef19578df9a3b896e0ee9777
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
8n+q/k94dJVbM5jS5K0dJQ==
status
200
alt-svc
h3-27=":443"; ma=3600
content-length
1780
etag
"2539027517087b0af3a0025438c992e6"
x-fb-debug
58xk+ueCg0aPZCd/GamfTA8pHOqE5oaEpWiYRdFPQiOzc9bj2eoBSigKHklSlZa1r8KfL0WaNZWT3hbzHlcIqQ==
x-fb-trip-id
1781455057
x-fb-content-md5
27ecccc4fb580b7a49eb28efdb6525a4
x-frame-options
DENY
date
Wed, 20 May 2020 10:19:13 GMT, Wed, 20 May 2020 10:19:13 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
cache-control
public,max-age=1200,stale-while-revalidate=3600
timing-allow-origin
*
expires
Wed, 20 May 2020 10:21:22 GMT
pinit.js
assets.pinterest.com/js/
355 B
366 B
Script
General
Full URL
https://assets.pinterest.com/js/pinit.js
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:eb0 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
31cf7e28d0a95e6f680dfdb9ef70f9d7cbda866cb3c6385c4ed5b8238ff78687

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
br
x-cdn
cloudflare
status
200
etag
W/"931070e36fce60f2d86c78abe608ca38"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
x-cdn
cache-control
max-age=300
cf-ray
59655172cf880605-FRA
cf-request-id
02d3313bbd00000605a911c200000001
server
cloudflare
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j82&a=896559461&t=pageview&_s=1&dl=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&ul=en-us&d...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-63350342-1&cid=678506765.1589969954&jid=893324355&_gid=797603485.1589969954&gjid=878134632&_v=j82&z=1650977396
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-63350342-1&cid=678506765.1589969954&jid=893324355&_v=j82&z=1650977396
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-63350342-1&cid=678506765.1589969954&jid=893324355&_v=j82&z=1650977396&slf_rd=1&random=2100449698
42 B
535 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-63350342-1&cid=678506765.1589969954&jid=893324355&_v=j82&z=1650977396&slf_rd=1&random=2100449698
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 20 May 2020 10:19:14 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 20 May 2020 10:19:13 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-63350342-1&cid=678506765.1589969954&jid=893324355&_v=j82&z=1650977396&slf_rd=1&random=2100449698
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
integrator.js
adservice.google.de/adsid/
109 B
952 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.hackingtutorials.org
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
952 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.hackingtutorials.org
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
104
x-xss-protection
0
show_ads_impl_fy2019.js
pagead2.googlesyndication.com/pagead/js/r20200514/r20190131/
218 KB
82 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20200514/r20190131/show_ads_impl_fy2019.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0d769a26113e68d52352b16bf0f63952dc29938608428e5af473429c445a2d71
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
84044
x-xss-protection
0
server
cafe
etag
17186817996459559813
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Wed, 20 May 2020 10:19:13 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20200514/r20190131/ Frame CECF
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20200514/r20190131/zrt_lookup.html
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20200514/r20190131/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Wed, 20 May 2020 07:42:20 GMT
expires
Wed, 03 Jun 2020 07:42:20 GMT
content-type
text/html; charset=UTF-8
etag
17826495148367054107
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
4284
x-xss-protection
0
cache-control
public, max-age=1209600
age
9413
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
sdk.js
connect.facebook.net/en_US/
197 KB
60 KB
Script
General
Full URL
https://connect.facebook.net/en_US/sdk.js?hash=6e1be4b331405a4395b8f3e3d145de0f&ua=modern_es6
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/sdk.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
943896ef417aceecb6b9c74363dac24e460d4274e74f985f73358c62ef2bee30
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Origin
https://www.hackingtutorials.org

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
n/3jYzhyymp2sH1GaWm7Jg==
status
200
alt-svc
h3-27=":443"; ma=3600
content-length
60905
etag
"d8809d145d2eefd4020cc2cded543d39"
x-fb-debug
jNuHdxme8didqAlcwnK4wS9GryrjFNj9rDjETcoXelC59BXCPb9PQmobvfMxqHT5dg6UjuU7X0i/bXLDn6YF7g==
x-fb-trip-id
1781455057
x-fb-content-md5
4e83290f9475b76bac2d681d58d030d1
x-frame-options
DENY
date
Wed, 20 May 2020 10:19:13 GMT, Wed, 20 May 2020 10:19:13 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
cache-control
public,max-age=31536000,stale-while-revalidate=3600,immutable
timing-allow-origin
*
expires
Thu, 20 May 2021 09:29:21 GMT
in.js
platform-src.linkedin.com/
Redirect Chain
  • https://platform.linkedin.com/in.js?async=true&_=1589969953515
  • https://platform-src.linkedin.com/in.js
181 KB
55 KB
Script
General
Full URL
https://platform-src.linkedin.com/in.js
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2620:119:50e4:101::6cae:b58 , United States, ASN14413 (LINKEDIN, US),
Reverse DNS
Software
Play /
Resource Hash
9a9285426a94bb895f4e1b03b7686dd49eeb765708f544b21ab375817cd58169

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:14 GMT
content-encoding
gzip
server
Play
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
status
200
cache-control
public, max-age=3600
x-li-pop
prod-edc2
x-li-proto
http/2
content-length
55596
x-li-uuid
PaoB1D+1EBZQ7Np8PisAAA==
x-li-fabric
prod-lva1
expires
Wed, 20 May 2020 11:19:14 GMT

Redirect headers

X-LI-UUID
oz32QnCY6xVQwiK9RysAAA==
Date
Wed, 20 May 2020 10:19:13 GMT
X-CDN-CLIENT-IP-VERSION
IPV6
X-Li-Pop
prod-tln1
X-Li-Fabric
prod-lor1
Location
https://platform-src.linkedin.com/in.js
X-LI-Proto
http/1.1
Connection
keep-alive
Content-Length
0
X-CDN
AKAM
button
embed.tumblr.com/widgets/share/ Frame 0E47
0
0
Document
General
Full URL
https://embed.tumblr.com/widgets/share/button?canonicalUrl=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&postcontent%5Btitle%5D=Basic%20Malware%20Analysis%20Tools&postcontent%5Bcontent%5D=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F
Requested by
Host: assets.tumblr.com
URL: https://assets.tumblr.com/share-button.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.147 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (dcc/435D) /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
embed.tumblr.com
:scheme
https
:path
/widgets/share/button?canonicalUrl=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&postcontent%5Btitle%5D=Basic%20Malware%20Analysis%20Tools&postcontent%5Bcontent%5D=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/

Response headers

status
200
content-encoding
gzip
age
0
cache-control
max-age=120
content-type
text/html; charset=UTF-8
date
Wed, 20 May 2020 10:19:14 GMT
last-modified
Wed, 20 May 2020 10:19:14 GMT
p3p
CP="Tumblr's privacy policy is available here: https://www.tumblr.com/policy/en/privacy"
server
ECAcc (dcc/435D)
strict-transport-security
max-age=31536000; preload
vary
Accept-Encoding
x-cache
HIT
x-content-type-options
nosniff
x-rid
127327076738237531677276875936561803699
x-robots-tag
noindex
x-ua-compatible
IE=Edge,chrome=1
x-xss-protection
1; mode=block
content-length
2679
widget_iframe.2a008290075125adde2d7b849b06a0bb.html
platform.twitter.com/widgets/ Frame C85B
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/widget_iframe.2a008290075125adde2d7b849b06a0bb.html?origin=https%3A%2F%2Fwww.hackingtutorials.org
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.157 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash

Request headers

:method
GET
:authority
platform.twitter.com
:scheme
https
:path
/widgets/widget_iframe.2a008290075125adde2d7b849b06a0bb.html?origin=https%3A%2F%2Fwww.hackingtutorials.org
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/

Response headers

status
200
last-modified
Tue, 12 May 2020 17:24:25 GMT
cache-control
public, max-age=315360000
content-type
text/html; charset=utf-8
etag
"9fa476ae827f556d5b037fe43632370d+gzip"
content-encoding
gzip
access-control-allow-methods
GET
access-control-allow-origin
*
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
accept-ranges
bytes
date
Wed, 20 May 2020 10:19:13 GMT
x-served-by
cache-bwi5136-BWI, cache-fra19170-FRA
x-cache
HIT, HIT
vary
Accept-Encoding
tw-cdn
FT
content-length
5825
g.gif
pixel.wp.com/
50 B
92 B
Image
General
Full URL
https://pixel.wp.com/g.gif?v=ext&j=1%3A8.5&blog=93167895&post=701&tz=1&srv=www.hackingtutorials.org&host=www.hackingtutorials.org&ref=&fcp=802&rand=0.267721501627624
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.76.3 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
f3a8992acb9ab911e0fa4ae12f4b85ef8e61008619f13ee51c7a121ff87f63b1

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 20 May 2020 10:19:13 GMT
cache-control
no-cache
server
nginx
content-length
50
content-type
image/gif
pinit_main.js
assets.pinterest.com/js/
65 KB
20 KB
Script
General
Full URL
https://assets.pinterest.com/js/pinit_main.js?0.028098018350805054
Requested by
Host: assets.pinterest.com
URL: https://assets.pinterest.com/js/pinit.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:eb0 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
03d7c05eeb32a80208bba6a6977305749a7becd232c463549b5a1e7a6885a456

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:13 GMT
content-encoding
br
x-cdn
cloudflare
status
200
etag
W/"8e815b2e3dab60eb301e4080345e1bb3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
x-cdn
cache-control
max-age=300
cf-ray
596551746ca30605-FRA
cf-request-id
02d3313cbc00000605a9137200000001
server
cloudflare
ads
googleads.g.doubleclick.net/pagead/ Frame 1932
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2195678332656815&output=html&h=280&slotname=1186828480&adk=4066655462&adf=2251145695&w=728&fwrn=4&fwrnh=100&lmt=1589969953&rafmt=1&psa=0&guci=1.2.0.0.2.2.0.0&format=728x280&url=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&flash=0&fwr=0&rpe=1&resp_fmts=3&wgl=1&adsid=NT&dt=1589969953788&bpp=16&bdt=500&idt=203&shv=r20200514&cbv=r20190131&ptt=9&saldr=aa&abxe=1&correlator=2254336483226&frm=20&pv=2&ga_vid=678506765.1589969954&ga_sid=1589969954&ga_hid=896559461&ga_fc=0&iag=0&icsg=140806117916668&dssz=46&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=604&ady=46&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21066085&oid=3&pvsid=3466940796854750&pem=819&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=8336&bc=31&ifi=1&uci=a!1&fsb=1&xpc=rMB69RXNeR&p=https%3A//www.hackingtutorials.org&dtd=219
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200514/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-2195678332656815&output=html&h=280&slotname=1186828480&adk=4066655462&adf=2251145695&w=728&fwrn=4&fwrnh=100&lmt=1589969953&rafmt=1&psa=0&guci=1.2.0.0.2.2.0.0&format=728x280&url=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&flash=0&fwr=0&rpe=1&resp_fmts=3&wgl=1&adsid=NT&dt=1589969953788&bpp=16&bdt=500&idt=203&shv=r20200514&cbv=r20190131&ptt=9&saldr=aa&abxe=1&correlator=2254336483226&frm=20&pv=2&ga_vid=678506765.1589969954&ga_sid=1589969954&ga_hid=896559461&ga_fc=0&iag=0&icsg=140806117916668&dssz=46&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=604&ady=46&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21066085&oid=3&pvsid=3466940796854750&pem=819&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=8336&bc=31&ifi=1&uci=a!1&fsb=1&xpc=rMB69RXNeR&p=https%3A//www.hackingtutorials.org&dtd=219
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 20 May 2020 10:19:14 GMT
server
cafe
content-length
21853
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 20-May-2020 10:34:14 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
expires
Wed, 20 May 2020 10:19:14 GMT
cache-control
private
osd.js
www.googletagservices.com/activeview/js/current/
73 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200514/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
68f50ad4adddfb9ee17ec226fcdd65b9ef15b0461d380ce20011e2df6a34157b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1589820192905838"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
27732
x-xss-protection
0
expires
Wed, 20 May 2020 10:19:14 GMT
button.a9e51eea566eab199c00950f37200d0b.js
platform.twitter.com/js/
7 KB
2 KB
Script
General
Full URL
https://platform.twitter.com/js/button.a9e51eea566eab199c00950f37200d0b.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.157 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
592e35a583c401384ba6166b860a346ea7853f17287296c6a7c0c2468567330c

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:14 GMT
content-encoding
gzip
x-cache
HIT, HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
2297
x-served-by
cache-bwi5123-BWI, cache-fra19170-FRA
last-modified
Tue, 12 May 2020 17:24:15 GMT
etag
"92aacddeeb64a7dc76de732a636030f4+gzip"
vary
Accept-Encoding
access-control-allow-methods
GET
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=315360000
accept-ranges
bytes
tw-cdn
FT
ads
googleads.g.doubleclick.net/pagead/ Frame 36A3
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2195678332656815&output=html&h=280&slotname=1208678084&adk=3879295622&adf=98434483&w=702&fwrn=4&fwrnh=100&lmt=1589969954&rafmt=1&psa=0&guci=1.2.0.0.2.2.0.0&format=702x280&url=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&flash=0&fwr=0&rpe=1&resp_fmts=3&wgl=1&adsid=NT&dt=1589969953804&bpp=3&bdt=515&idt=220&shv=r20200514&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=728x280&correlator=2254336483226&frm=20&pv=1&ga_vid=678506765.1589969954&ga_sid=1589969954&ga_hid=896559461&ga_fc=0&iag=0&icsg=563224464588796&dssz=48&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=254&ady=1385&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21066085&oid=3&pvsid=3466940796854750&pem=819&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=8336&bc=31&ifi=2&uci=a!2&btvi=1&fsb=1&xpc=rjORWAx1sq&p=https%3A//www.hackingtutorials.org&dtd=225
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200514/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-2195678332656815&output=html&h=280&slotname=1208678084&adk=3879295622&adf=98434483&w=702&fwrn=4&fwrnh=100&lmt=1589969954&rafmt=1&psa=0&guci=1.2.0.0.2.2.0.0&format=702x280&url=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&flash=0&fwr=0&rpe=1&resp_fmts=3&wgl=1&adsid=NT&dt=1589969953804&bpp=3&bdt=515&idt=220&shv=r20200514&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=728x280&correlator=2254336483226&frm=20&pv=1&ga_vid=678506765.1589969954&ga_sid=1589969954&ga_hid=896559461&ga_fc=0&iag=0&icsg=563224464588796&dssz=48&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=254&ady=1385&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21066085&oid=3&pvsid=3466940796854750&pem=819&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=8336&bc=31&ifi=2&uci=a!2&btvi=1&fsb=1&xpc=rjORWAx1sq&p=https%3A//www.hackingtutorials.org&dtd=225
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 20 May 2020 10:19:14 GMT
server
cafe
content-length
21027
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 20-May-2020 10:34:14 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
expires
Wed, 20 May 2020 10:19:14 GMT
cache-control
private
ads
googleads.g.doubleclick.net/pagead/ Frame C1C1
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2195678332656815&output=html&h=280&slotname=7394970882&adk=3269222575&adf=4274772780&w=336&lmt=1589969954&psa=0&guci=1.2.0.0.2.2.0.0&format=336x280&url=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&flash=0&wgl=1&adsid=NT&dt=1589969953807&bpp=2&bdt=519&idt=254&shv=r20200514&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=728x280%2C702x280&correlator=2254336483226&frm=20&pv=1&ga_vid=678506765.1589969954&ga_sid=1589969954&ga_hid=896559461&ga_fc=0&iag=0&icsg=563224464588796&dssz=48&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1007&ady=1178&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21066085&oid=3&pvsid=3466940796854750&pem=819&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=8208&bc=31&ifi=3&uci=a!3&fsb=1&xpc=pLwZtDbyWP&p=https%3A//www.hackingtutorials.org&dtd=257
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200514/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-2195678332656815&output=html&h=280&slotname=7394970882&adk=3269222575&adf=4274772780&w=336&lmt=1589969954&psa=0&guci=1.2.0.0.2.2.0.0&format=336x280&url=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&flash=0&wgl=1&adsid=NT&dt=1589969953807&bpp=2&bdt=519&idt=254&shv=r20200514&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=728x280%2C702x280&correlator=2254336483226&frm=20&pv=1&ga_vid=678506765.1589969954&ga_sid=1589969954&ga_hid=896559461&ga_fc=0&iag=0&icsg=563224464588796&dssz=48&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1007&ady=1178&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21066085&oid=3&pvsid=3466940796854750&pem=819&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=8208&bc=31&ifi=3&uci=a!3&fsb=1&xpc=pLwZtDbyWP&p=https%3A//www.hackingtutorials.org&dtd=257
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 20 May 2020 10:19:14 GMT
server
cafe
content-length
19827
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 20-May-2020 10:34:14 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
expires
Wed, 20 May 2020 10:19:14 GMT
cache-control
private
count.json
widgets.pinterest.com/v1/urls/
142 B
352 B
Script
General
Full URL
https://widgets.pinterest.com/v1/urls/count.json?url=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&callback=PIN_1589969954075.f.callback[0]
Requested by
Host: assets.pinterest.com
URL: https://assets.pinterest.com/js/pinit_main.js?0.028098018350805054
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.36.84 Amsterdam, Netherlands, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
d0d0feabad54a8199f1ca3f29bfc57ba5289cb3e388b0bc36ae82e3d8d54f6f6
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:14 GMT
content-encoding
br
x-content-type-options
nosniff
age
0
status
200
vary
accept-encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
must-revalidate, max-age=887
x-envoy-upstream-service-time
1
accept-ranges
none
x-pinterest-rid
1866850595303291
expires
Wed, 20 May 2020 10:34:14 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame CA7A
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2195678332656815&output=html&adk=1812271804&adf=3025194257&lmt=1589969954&plat=1%3A32776%2C2%3A32776%2C8%3A32776%2C9%3A32776%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&ea=0&flash=0&pra=7&wgl=1&adsid=NT&dt=1589969953890&bpp=1&bdt=601&idt=193&shv=r20200514&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=728x280%2C702x280%2C336x280&nras=1&correlator=2254336483226&frm=20&pv=1&ga_vid=678506765.1589969954&ga_sid=1589969954&ga_hid=896559461&ga_fc=0&iag=0&icsg=564047998091248&dssz=48&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21066085&oid=3&pvsid=3466940796854750&pem=819&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=8208&bc=31&ifi=3&uci=a!3&fsb=1&dtd=199
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200514/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-2195678332656815&output=html&adk=1812271804&adf=3025194257&lmt=1589969954&plat=1%3A32776%2C2%3A32776%2C8%3A32776%2C9%3A32776%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&ea=0&flash=0&pra=7&wgl=1&adsid=NT&dt=1589969953890&bpp=1&bdt=601&idt=193&shv=r20200514&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=728x280%2C702x280%2C336x280&nras=1&correlator=2254336483226&frm=20&pv=1&ga_vid=678506765.1589969954&ga_sid=1589969954&ga_hid=896559461&ga_fc=0&iag=0&icsg=564047998091248&dssz=48&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21066085&oid=3&pvsid=3466940796854750&pem=819&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=8208&bc=31&ifi=3&uci=a!3&fsb=1&dtd=199
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
date
Wed, 20 May 2020 10:19:14 GMT
server
cafe
content-length
0
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 20-May-2020 10:34:14 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
expires
Wed, 20 May 2020 10:19:14 GMT
cache-control
private
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
859adbfc48bb0b06c58fe109db4909585fbca5df398d49185fc0f486bad1ac96

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
tweet_button.2a008290075125adde2d7b849b06a0bb.en.html
platform.twitter.com/widgets/ Frame 933B
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/tweet_button.2a008290075125adde2d7b849b06a0bb.en.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.157 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash

Request headers

:method
GET
:authority
platform.twitter.com
:scheme
https
:path
/widgets/tweet_button.2a008290075125adde2d7b849b06a0bb.en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/

Response headers

status
200
last-modified
Tue, 12 May 2020 17:24:22 GMT
cache-control
public, max-age=315360000
content-type
text/html; charset=utf-8
etag
"fe8d5f869d606d995e529aabaf4d70a5+gzip"
content-encoding
gzip
access-control-allow-methods
GET
access-control-allow-origin
*
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
accept-ranges
bytes
date
Wed, 20 May 2020 10:19:14 GMT
x-served-by
cache-bwi5125-BWI, cache-fra19170-FRA
x-cache
HIT, HIT
vary
Accept-Encoding
tw-cdn
FT
content-length
12396
jot
syndication.twitter.com/i/
43 B
337 B
Image
General
Full URL
https://syndication.twitter.com/i/jot?l=%7B%22widget_origin%22%3A%22https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F%22%2C%22widget_frame%22%3Afalse%2C%22widget_site_screen_name%22%3A%22HackingTutors%22%2C%22widget_creator_screen_name%22%3A%22HackingTutors%22%2C%22language%22%3A%22en%22%2C%22message%22%3A%22m%3Anocount%3A%22%2C%22_category_%22%3A%22tfw_client_event%22%2C%22triggered_on%22%3A1589969954297%2C%22dnt%22%3Afalse%2C%22client_version%22%3A%22c4096c4b%3A1589303485003%22%2C%22format_version%22%3A1%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22button%22%2C%22section%22%3A%22share%22%2C%22action%22%3A%22impression%22%7D%7D
Requested by
Host: www.hackingtutorials.org
URL: https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.200 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
111
pragma
no-cache
last-modified
Wed, 20 May 2020 10:19:14 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=631138519
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
34d45e9a53d9c14af718c7ca4fe8b722
x-transaction
006a1c4100c39b8d
expires
Tue, 31 Mar 1981 05:00:00 GMT
sodar
pagead2.googlesyndication.com/getconfig/
7 KB
6 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gda&tv=r20200514&st=env
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200514/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
af92b82583ce94890f7c6294af3f881d3a627504fd9cd537e1454414f7844a4c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 20 May 2020 10:19:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
5509
x-xss-protection
0
share_button.php
www.facebook.com/v2.3/plugins/ Frame 6061
0
0
Document
General
Full URL
https://www.facebook.com/v2.3/plugins/share_button.php?app_id=249643311490&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D46%23cb%3Df2f35623221754c%26domain%3Dwww.hackingtutorials.org%26origin%3Dhttps%253A%252F%252Fwww.hackingtutorials.org%252Ff3343e9130a33%26relation%3Dparent.parent&container_width=0&href=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&layout=button_count&locale=en_US&sdk=joey
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/sdk.js?hash=6e1be4b331405a4395b8f3e3d145de0f&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.facebook.com
:scheme
https
:path
/v2.3/plugins/share_button.php?app_id=249643311490&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D46%23cb%3Df2f35623221754c%26domain%3Dwww.hackingtutorials.org%26origin%3Dhttps%253A%252F%252Fwww.hackingtutorials.org%252Ff3343e9130a33%26relation%3Dparent.parent&container_width=0&href=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&layout=button_count&locale=en_US&sdk=joey
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/

Response headers

status
200
cache-control
private, no-cache, no-store, must-revalidate
expires
Sat, 01 Jan 2000 00:00:00 GMT
pragma
no-cache
strict-transport-security
max-age=15552000; preload
content-encoding
br
timing-allow-origin
*
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
vary
Accept-Encoding
x-content-type-options
nosniff
facebook-api-version
v3.0
x-xss-protection
0
content-type
text/html; charset="utf-8"
x-fb-debug
arnrGv+UBcJUmhBGnSeTUyZqOfypgGmP0+HSvvD1ukvRPiDh88ngi+kyN1Ckmq6H4aklD5+u02AtTZ8rs6lBMA==
date
Wed, 20 May 2020 10:19:14 GMT Wed, 20 May 2020 10:19:14 GMT
alt-svc
h3-27=":443"; ma=3600
sodar2.js
tpc.googlesyndication.com/sodar/
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200514/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5456
x-xss-protection
0
expires
Wed, 20 May 2020 10:19:14 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame 4098
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Wed, 20 May 2020 09:26:27 GMT
expires
Thu, 20 May 2021 09:26:27 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
3167
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
gen_204
pagead2.googlesyndication.com/pagead/
0
120 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gda_r20200514&jk=3466940796854750&bg=!kZKlkopY0sBnQ2_FOgoCAAAApVIAAAAPmQGAQwXBYnQlki0vhw2EzRpZo2UInK-qMHoriS67_Qnnr6nsz9RkLj4It-vuhurPv_SjWghdPxZtcdib8XDE69O-Bua0HDXLcdnoBExqaTlMFRvQwDJM77u5ikECEnOMKf37SeiMbZiyKNTsqoukvjP_5QOSqc78pr2RxWt-MhO4RC4GlFH9Sd8fWfltN6JuCO2O-rUKPqDQ0x10W-ByeRt1VtXWjN605jhh0tSt1kXOPmP56-Gq7jaxc63Gcfz_zk0MVa3MDdaV-0x-qLhFu15AfD-6HPuR93sDq0-aufpL2bssgvy2KqKfhoVysAMNDDGShSPJ7DK3krVq3qj7hrnPe2iR_zaKee9RZPzzYC9FdZT1R-iiiIjNRSUNNO08JFiKb7frMLfUgTTTNS-8mHApkJyGGiVB0UCLHxBE6EmLaA8Ev3ot8yZjo1qMQu0RAQszm3lZBDXeL0ewfNS2inJ66_aZCIlSTXiwpSecDvsZHeEOsXGn3BAGMgQ-vj4dqd2Z
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 20 May 2020 10:19:15 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
log.pinterest.com/
0
401 B
Script
General
Full URL
https://log.pinterest.com/?type=pidget&guid=PXrq3TiDVDR0&tv=2019040401&event=init&sub=www&button_count=3&follow_count=0&pin_count=0&button_hover=1&profile_count=0&board_count=0&section_count=0&lang=en&nvl=en-US&via=https%3A%2F%2Fwww.hackingtutorials.org%2Fmalware-analysis-tutorials%2Fbasic-malware-analysis-tools%2F&callback=PIN_1589969954075.f.callback[1]
Requested by
Host: assets.pinterest.com
URL: https://assets.pinterest.com/js/pinit_main.js?0.028098018350805054
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.36.84 Amsterdam, Netherlands, ASN54113 (FASTLY, US),
Reverse DNS
Software
envoy /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.hackingtutorials.org/malware-analysis-tutorials/basic-malware-analysis-tools/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 10:19:15 GMT
via
1.1 varnish
server
envoy
x-timer
S1589969955.086076,VS0,VE102
x-served-by
cache-ams21083-AMS
x-cache
MISS
status
200
x-envoy-upstream-service-time
8
x-pinterest-rid
1474636993072236
accept-ranges
bytes
content-length
0
x-cache-hits
0

Verdicts & Comments Add Verdict or Comment

89 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| _wpemojiSettings undefined| $ function| jQuery boolean| pp_alreadyInitialized string| GETSOCIAL_VERSION function| loadGsLib string| GoogleAnalyticsObject function| ga object| adsbygoogle object| WPCOM_sharing_counts object| s object| x object| jQuery112406783016929486554 object| addComment object| wpcf7 object| Bunyad object| Bunyad_Theme object| Bunyad_Live_Search object| google_tag_data object| gaplugins object| gaGlobal object| gaData object| google_js_reporting_queue number| google_srt object| google_ad_modifications object| google_logging_queue object| ggeac boolean| google_measure_js_timing object| googleToken object| googleIMState function| processGoogleToken object| google_reactive_ads_global_state boolean| _gfp_a_ object| google_sa_queue object| google_sl_win function| google_process_slots boolean| google_apltlad boolean| _gfp_p_ function| google_spfd number| google_lpabyc number| google_unique_id object| google_sv_map object| google_t12n_vars object| FB number| PIN_18402 object| wp object| sharing_js_options object| WPCOMSharing undefined| windowOpen object| _stq boolean| doresize object| scroll_pos boolean| hashtag object| __twttrll object| twttr object| __twttr function| st_go function| linktracker_init object| wpcom function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter function| google_sa_impl object| google_persistent_state_async object| __google_ad_urls number| google_global_correlator number| __google_ad_urls_id object| google_prev_clients object| google_jobrunner object| ampInaboxIframes object| ampInaboxPendingMessages boolean| google_osd_loaded boolean| google_onload_fired object| twemoji object| ak_js object| commentForm undefined| replyRowContainer undefined| children object| PIN_1589969954075 object| PinUtils function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| __core-js_shared__ object| Sslac object| IN object| GoogleGcLKhOms object| google_image_requests

6 Cookies

Domain/Path Name / Value
.doubleclick.net/ Name: DSID
Value: NO_DATA
.reddit.com/ Name: edgebucket
Value: w8veFJCnwDDlLVj3et
.hackingtutorials.org/ Name: _ga
Value: GA1.2.678506765.1589969954
.doubleclick.net/ Name: IDE
Value: AHWqTUmRlOgOqD7YgtD75KNwRBFc8HANTgqZ9tZotAk5C9sW51uZC-6GBSzunHFL
.hackingtutorials.org/ Name: _gat
Value: 1
.hackingtutorials.org/ Name: _gid
Value: GA1.2.797603485.1589969954

1 Console Messages

Source Level URL
Text
console-api log URL: https://www.hackingtutorials.org/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1(Line 2)
Message:
JQMIGRATE: Migrate is installed, version 1.4.1

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy upgrade-insecure-requests;
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

ad.linksynergy.com
adservice.google.com
adservice.google.de
api.at.getsocial.io
assets.pinterest.com
assets.tumblr.com
connect.facebook.net
embed.tumblr.com
fonts.googleapis.com
fonts.gstatic.com
googleads.g.doubleclick.net
log.pinterest.com
pagead2.googlesyndication.com
pixel.wp.com
platform-src.linkedin.com
platform.linkedin.com
platform.twitter.com
secure.gravatar.com
stats.g.doubleclick.net
stats.wp.com
syndication.twitter.com
tpc.googlesyndication.com
udemy-images.udemy.com
widgets.pinterest.com
www.facebook.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagservices.com
www.hackingtutorials.org
www.reddit.com
104.244.42.200
151.101.12.157
151.101.36.84
152.199.21.147
192.0.76.3
192.0.77.40
192.124.249.163
199.232.53.140
2606:4700::6812:eb0
2620:119:50e4:101::6cae:b58
2a00:1450:4001:800::2002
2a00:1450:4001:801::2003
2a00:1450:4001:815::2001
2a00:1450:4001:816::2004
2a00:1450:4001:81b::2002
2a00:1450:4001:81d::2002
2a00:1450:4001:81d::200e
2a00:1450:4001:821::200a
2a00:1450:4001:825::2003
2a00:1450:400c:c00::9a
2a02:26f0:fe00:199::25eb
2a03:2880:f02d:12:face:b00c:0:3
2a03:2880:f12d:83:face:b00c:0:25de
2a03:b0c0:3:d0::21:f001
2a04:fa87:fffe::c000:4902
35.212.97.116
8.27.13.75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