{
  "type": "Domain",
  "indicator": "hallrender.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/hallrender.com",
    "alexa": "http://www.alexa.com/siteinfo/hallrender.com",
    "indicator": "hallrender.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 3734015391,
      "indicator": "hallrender.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 50,
      "pulses": [
        {
          "id": "69a02837827feb0b78fa3ad2",
          "name": "The Belasco Chain",
          "description": "The adversary delivers a masterclass in \"Regular Belasco\" stagecraft, utilizing authentic Adobe PIDs to construct a \"living library\" of legitimacy where mundane metadata like SOPHIA.json acts as Gatsby\u2019s \"real but uncut\" volumes to mask a hollowed-out interior. This is a triumph of performative evasion; while researchers marvel at the realism of the set-dressing, MSI50B8.tmp and MSI4F2F.tmp wait in the wings of the Windows\\Installer directory, invisible to the human eye and using NGEN hijacking to bake illicit scripts directly into the OS framework. By employing Cryptnet certificates as \"stage lighting\" to mask C2 handshakes, the malware doesn't just attend the system\u2019s party\u2014it rewrites the invitation to own the house. Unlike the tragic end at West Egg, this Belasco chain is a play that refuses to end; it simply resets the stage, ensuring the performance continues as long as the \"green light\" of the C2 remains active.",
          "modified": "2026-04-19T09:34:35.173000",
          "created": "2026-02-26T11:02:15.932000",
          "tags": [
            "file size",
            "mwdb",
            "bazaar",
            "sha3384",
            "ssdeep",
            "file type",
            "sha1",
            "sha256",
            "crc32",
            "filenames c"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2805,
            "FileHash-SHA1": 2568,
            "FileHash-SHA256": 7488,
            "domain": 1883,
            "hostname": 1466,
            "URL": 1179,
            "email": 46,
            "CVE": 46,
            "CIDR": 3,
            "YARA": 7,
            "IPv4": 94,
            "JA3": 1
          },
          "indicator_count": 17586,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 53,
          "modified_text": "5 hours ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69e1cc70fcbd3f613502e1f7",
          "name": "order  clone by aclause21 Public",
          "description": "",
          "modified": "2026-04-17T09:28:38.049000",
          "created": "2026-04-17T06:00:16.867000",
          "tags": [
            "access ta0001",
            "defense evasion",
            "access ta0006",
            "command",
            "control ta0011",
            "impact ta0040",
            "catalog tree",
            "ob0005 defense",
            "evasion ob0006",
            "impact ob0008",
            "hashes cape",
            "sandbox",
            "docguard",
            "yomi hunter",
            "zenbox",
            "ip traffic",
            "pattern domains",
            "memory pattern",
            "urls https",
            "adversaries",
            "mitre att",
            "t1189 found",
            "clickable urls",
            "pdf execution",
            "t1036",
            "creates",
            "hide artifacts",
            "exploitation",
            "e1564 hidden",
            "files",
            "discovery e1082",
            "e1203 data",
            "vhash",
            "ssdeep",
            "file type",
            "pdf document",
            "magic pdf",
            "trid adobe",
            "format",
            "file size",
            "united",
            "as32934",
            "passive dns",
            "unknown",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse pulses",
            "urls",
            "status",
            "search",
            "showing",
            "server error",
            "certificate",
            "creation date",
            "high assurance",
            "server ca",
            "date",
            "body",
            "win32",
            "ransom",
            "entries",
            "icmp traffic",
            "packing t1045",
            "t1045",
            "pdb path",
            "pe resource",
            "show",
            "malware",
            "copy",
            "push",
            "write",
            "aaaa",
            "nxdomain",
            "united kingdom",
            "thailand",
            "vietnam",
            "as45430",
            "honduras",
            "indonesia",
            "mexico",
            "slovakia",
            "dynamicloader",
            "yara rule",
            "high",
            "ekyxe",
            "xe e",
            "eofae",
            "ee edcje4j",
            "tofsee",
            "windows",
            "medium",
            "stream",
            "grum",
            "as15169 google",
            "pulses",
            "record value",
            "error",
            "cname",
            "name servers",
            "ireland",
            "next",
            "federation asn",
            "as49505",
            "labs pulses",
            "trojan",
            "trojandropper",
            "related pulses",
            "file samples",
            "files matching",
            "date hash",
            "copyright",
            "all search",
            "reverse dns",
            "location united",
            "emails info",
            "expiration date",
            "as51167 contabo",
            "germany unknown",
            "a nxdomain",
            "as40021 contabo",
            "encrypt",
            "url http",
            "http",
            "ip address",
            "related nids",
            "files location",
            "ddos",
            "activity",
            "checkin",
            "win64",
            "mirai",
            "hosting",
            "files ip",
            "address",
            "czechia unknown",
            "as174 cogent",
            "asnone germany",
            "as15598",
            "as16625 akamai",
            "asnone united",
            "as20940",
            "as35994 akamai",
            "as12337 noris",
            "pulse submit",
            "url analysis",
            "backdoor",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "suspicious",
            "virtool",
            "emails",
            "domain name",
            "code",
            "brazil",
            "poland",
            "domain",
            "msie",
            "windows nt",
            "tcp syn",
            "resolverror",
            "exploit",
            "externalport",
            "internalport",
            "http headers",
            "home network",
            "demonbot",
            "andariel",
            "yara detections",
            "malware traffic",
            "nids",
            "dns query",
            "google safe",
            "browsing",
            "whois",
            "virustotal",
            "mtb apr",
            "asnone related",
            "open",
            "hash avast",
            "avg clamav",
            "msdefender apr",
            "as8075",
            "content type",
            "access",
            "cp bus",
            "cur cono",
            "fin ivdo",
            "onl our",
            "phy samo",
            "overview ip",
            "flag united",
            "hostname",
            "files domain",
            "as8068",
            "trojan features",
            "rsa tls",
            "issuing ca",
            "mirai variant",
            "useragent",
            "inbound",
            "realtek sdk",
            "miniigd upnp",
            "soap command",
            "activity mirai",
            "helloworld",
            "users",
            "alerts",
            "anomalous file",
            "recycle bin",
            "filehash",
            "av detections",
            "memcommit",
            "read c",
            "memreserve",
            "for privacy",
            "china unknown",
            "ag alberto",
            "pedraz",
            "holidaycheck ag",
            "project pi",
            "immobilien ag",
            "puma se",
            "kurt walther",
            "ag ingo",
            "kraupa",
            "timo salzsieder",
            "record type",
            "ttl value",
            "msms57295540",
            "subdomains",
            "ireland unknown",
            "analyzer paste",
            "iocs",
            "samples",
            "regsetvalueexa",
            "default",
            "regdword",
            "module load",
            "t1129",
            "http request",
            "process32nextw",
            "regbinary",
            "oxypumper",
            "tools",
            "dock",
            "april",
            "persistence",
            "execution",
            "download",
            "as62597 nsone",
            "echo request",
            "sweep",
            "payload hello",
            "world",
            "total",
            "please",
            "xport",
            "main",
            "look",
            "install",
            "servers",
            "found",
            "cnapple public",
            "accept",
            "chrome",
            "moved",
            "ssl certificate",
            "write c",
            "installcore",
            "june",
            "delphi",
            "as47846",
            "cookie",
            "as32787 akamai",
            "as714 apple",
            "m1",
            "onelouder",
            "brian sabey",
            "denver colorado",
            "fakedout threat",
            "gmt content",
            "x cache",
            "div div",
            "as8972 host",
            "france unknown",
            "registrar",
            "otx scoreblue",
            "address domain",
            "as24940 hetzner",
            "as44273 host",
            "asn as15598",
            "trojanspy",
            "mail spammer",
            "germany mail",
            "spammer",
            "hichina",
            "data redacted",
            "a domains",
            "wow64",
            "slcc2",
            "media center",
            "port",
            "powershell",
            "urls http",
            "tptjsw",
            "virus",
            "ids detections",
            "germany",
            "as8560",
            "austria",
            "as1921",
            "as14061",
            "whitelisted",
            "as16276",
            "script urls",
            "as16552 tiggee",
            "as9009 m247",
            "meta",
            "as29789",
            "detected m1",
            "mtb aug",
            "server",
            "as397241",
            "cryp",
            "hostmaster",
            "networks",
            "as19024",
            "gmt setcookie",
            "delete",
            "russia as49505",
            "sinkhole cookie",
            "value snkz",
            "pe32",
            "possible",
            "susp",
            "lnmp",
            "lnmp a",
            "licess",
            "shell",
            "as63949 linode",
            "as133618",
            "as21342",
            "cve201717215",
            "huawei remote",
            "huawei hg532",
            "malware worm",
            "gafgyt",
            "exploit none",
            "binbusybox",
            "delete c",
            "odigicert inc",
            "stwashington",
            "lredmond",
            "rsa ca",
            "cape",
            "nondns",
            "denver",
            "redacted for",
            "method status",
            "url hostname",
            "ip country",
            "type get",
            "date tue",
            "gmt contenttype",
            "connection",
            "cachecontrol",
            "expires thu",
            "gmt vary",
            "poland unknown",
            "title",
            "script domains",
            "updated date",
            "serce internetu",
            "cnc beacon",
            "javascript",
            "wsasend",
            "post",
            "delete shadows",
            "all quiet",
            "t1047",
            "instrumentation",
            "rpcs",
            "ms windows",
            "asnone dns",
            "http host",
            "ip check",
            "sha256",
            "bits",
            "adware malware",
            "etpro malware",
            "bios",
            "guard",
            "tulach",
            "spectrum",
            "cyber folks",
            "tsara brashears",
            ".pl",
            "contacted",
            "kryptikxp",
            "apple",
            "ios",
            "android",
            "sabey",
            "charter communications",
            "denvecolorado",
            "quantum fiber",
            "air force",
            "swipper",
            "masquerade",
            "hitmen",
            "mitm",
            "whitesky",
            "cyber warfare",
            "porn",
            "pornhub.software"
          ],
          "references": [
            "DISTINCTIO8.pdf",
            "FileHash - SHA256 001f0ebe975b5f5a7e5272f53455635cc938a5a0129417f7e79c39df6cf65657 | Yara Detections: stack_string",
            "IDS Detections: Win32/Tofsee.AX google.com connectivity check Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set",
            "Tofsee: 'google.com' |  https://www.gov50.icu |",
            "ET TROJAN Win32/DarkWatchman Checkin Activity (POST) ( This is true. They sit around watching, following...)",
            "Alerts: procmem_yara injection_inter_process creates_largekey network_bind persistence_autorun antivm_generic_disk",
            "Alerts: persistence_autorun_tasks spawns_dev_util cape_detected_threat injection_process_hollowing",
            "hubt.pornhub.com | www.pornhub.com | pornative.com",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ||  pin.it || https://pin.it/",
            "www.sweetheartvideo.com || https://www.sweetheartvideo.com/tsara-brashears/",
            "Unix.Trojan.Mirai-6981169-0: FileHash - SHA256  fe00b364b6b8342e3ce0dd146902ac3330ab976e87aca6be666efde39ea485da",
            "IDS Detections: WGET Command Specifying Output in HTTP Headers",
            "IDS Detections: D-Link Devices Home Network Administration Protocol Command Execution",
            "Yara Detections: is__elf ,  DemonBot",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication writes_to_stdout",
            "FileHash - SHA256  f32f6b229913d68daad937cc72a57aa45291a9d623109ed48938815aa7b6005c",
            "IDS Detections: Andariel Backdoor Activity (Checkin)",
            "Alerts: dead_host nids_malware_alert network_icmp nolookup_communication",
            "DDoS:Linux/Gafgyt : FileHash - SHA256  358c2bd5b9e925dc23894dec18ce486c03d743cde766ce298ac1e2f00d86f0b2",
            "IDS Detection: Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound",
            "IDS Detection: Mirai Variant User-Agent (Inbound) WebShell Generic - wget http - POST",
            "IDS Detection: Observed Suspicious UA (Hello-World) Suspicious Activity potential UPnProxy",
            "http://vortex-nlb-http2-fed-us-taut-purple.nr-data.net/",
            "https://tulach.cc/ || tulach.cc || www-temp.metrobyt-mobile.com",
            "apple-reactivate.com | appleweb-aem.apple.com | apple.com | revoked-aprtr1-tr1g1.apple.com | network-framework.apple.com",
            "autodiscover.webcompanion.com || avc-gft-dashboard.apple.com || cac1-wwfde-wave.apple.com || demo27.apple.com",
            "* https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
            "https://tulach.cc/ | tulach.cc |",
            "http://hallrender.com/attorney/brian-sabey | www-temp.metrobyt-mobile.com",
            "google.pl | aplikacja.ceidg.gov.pl | imaginecup.pl | microsoft.pl",
            "18teen.net | teensnow.com | grannies-porn.net | pornmd.com",
            "www.pornhubselect.com | pornhub.software"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Chile",
            "Morocco",
            "Taiwan",
            "Guatemala",
            "United Kingdom of Great Britain and Northern Ireland",
            "Ireland",
            "Kenya",
            "Peru",
            "Singapore",
            "Mexico",
            "Brazil",
            "Slovakia",
            "Spain",
            "Australia",
            "Belgium",
            "Germany",
            "Hungary",
            "Netherlands",
            "Russian Federation",
            "Japan",
            "Poland"
          ],
          "malware_families": [
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "TEL:CreateScheduledTask",
              "display_name": "TEL:CreateScheduledTask",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-6981169-0",
              "display_name": "Unix.Trojan.Mirai-6981169-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee",
              "display_name": "Backdoor:Win32/Tofsee",
              "target": "/malware/Backdoor:Win32/Tofsee"
            },
            {
              "id": "Ransom:Win32/Haperlock",
              "display_name": "Ransom:Win32/Haperlock",
              "target": "/malware/Ransom:Win32/Haperlock"
            },
            {
              "id": "Trojan:Win32/Neurevt",
              "display_name": "Trojan:Win32/Neurevt",
              "target": "/malware/Trojan:Win32/Neurevt"
            },
            {
              "id": "DDoS:Linux/Gafgyt.YA!MTB",
              "display_name": "DDoS:Linux/Gafgyt.YA!MTB",
              "target": "/malware/DDoS:Linux/Gafgyt.YA!MTB"
            },
            {
              "id": "CVE-2017-17215",
              "display_name": "CVE-2017-17215",
              "target": null
            },
            {
              "id": "CVE-2023-27350",
              "display_name": "CVE-2023-27350",
              "target": null
            },
            {
              "id": "CVE-2014-8361",
              "display_name": "CVE-2014-8361",
              "target": null
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "M1",
              "display_name": "M1",
              "target": null
            },
            {
              "id": "OneLouder",
              "display_name": "OneLouder",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Win.Trojan.Sarwent-10012602-0",
              "display_name": "Win.Trojan.Sarwent-10012602-0",
              "target": null
            },
            {
              "id": "Virus:Win32/Sivis.A",
              "display_name": "Virus:Win32/Sivis.A",
              "target": "/malware/Virus:Win32/Sivis.A"
            },
            {
              "id": "Win.Trojan.Installcore-1177",
              "display_name": "Win.Trojan.Installcore-1177",
              "target": null
            },
            {
              "id": "Win.Malware.Oxypumper-6900435-0",
              "display_name": "Win.Malware.Oxypumper-6900435-0",
              "target": null
            },
            {
              "id": "Win.Malware.Qshell-9875653-0",
              "display_name": "Win.Malware.Qshell-9875653-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1203",
              "name": "Exploitation for Client Execution",
              "display_name": "T1203 - Exploitation for Client Execution"
            },
            {
              "id": "T1485",
              "name": "Data Destruction",
              "display_name": "T1485 - Data Destruction"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1428",
              "name": "Exploit Enterprise Resources",
              "display_name": "T1428 - Exploit Enterprise Resources"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1133",
              "name": "External Remote Services",
              "display_name": "T1133 - External Remote Services"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "678f0dbdbc59dd2ea5656dcf",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 7589,
            "FileHash-SHA1": 3982,
            "FileHash-SHA256": 8280,
            "URL": 442,
            "domain": 2416,
            "hostname": 2155,
            "email": 37,
            "CVE": 4,
            "SSLCertFingerprint": 6
          },
          "indicator_count": 24911,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "2 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69e1cc6fd3c4022e08db781d",
          "name": "order  clone by aclause21 Public",
          "description": "",
          "modified": "2026-04-17T06:51:33.372000",
          "created": "2026-04-17T06:00:15.760000",
          "tags": [
            "access ta0001",
            "defense evasion",
            "access ta0006",
            "command",
            "control ta0011",
            "impact ta0040",
            "catalog tree",
            "ob0005 defense",
            "evasion ob0006",
            "impact ob0008",
            "hashes cape",
            "sandbox",
            "docguard",
            "yomi hunter",
            "zenbox",
            "ip traffic",
            "pattern domains",
            "memory pattern",
            "urls https",
            "adversaries",
            "mitre att",
            "t1189 found",
            "clickable urls",
            "pdf execution",
            "t1036",
            "creates",
            "hide artifacts",
            "exploitation",
            "e1564 hidden",
            "files",
            "discovery e1082",
            "e1203 data",
            "vhash",
            "ssdeep",
            "file type",
            "pdf document",
            "magic pdf",
            "trid adobe",
            "format",
            "file size",
            "united",
            "as32934",
            "passive dns",
            "unknown",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse pulses",
            "urls",
            "status",
            "search",
            "showing",
            "server error",
            "certificate",
            "creation date",
            "high assurance",
            "server ca",
            "date",
            "body",
            "win32",
            "ransom",
            "entries",
            "icmp traffic",
            "packing t1045",
            "t1045",
            "pdb path",
            "pe resource",
            "show",
            "malware",
            "copy",
            "push",
            "write",
            "aaaa",
            "nxdomain",
            "united kingdom",
            "thailand",
            "vietnam",
            "as45430",
            "honduras",
            "indonesia",
            "mexico",
            "slovakia",
            "dynamicloader",
            "yara rule",
            "high",
            "ekyxe",
            "xe e",
            "eofae",
            "ee edcje4j",
            "tofsee",
            "windows",
            "medium",
            "stream",
            "grum",
            "as15169 google",
            "pulses",
            "record value",
            "error",
            "cname",
            "name servers",
            "ireland",
            "next",
            "federation asn",
            "as49505",
            "labs pulses",
            "trojan",
            "trojandropper",
            "related pulses",
            "file samples",
            "files matching",
            "date hash",
            "copyright",
            "all search",
            "reverse dns",
            "location united",
            "emails info",
            "expiration date",
            "as51167 contabo",
            "germany unknown",
            "a nxdomain",
            "as40021 contabo",
            "encrypt",
            "url http",
            "http",
            "ip address",
            "related nids",
            "files location",
            "ddos",
            "activity",
            "checkin",
            "win64",
            "mirai",
            "hosting",
            "files ip",
            "address",
            "czechia unknown",
            "as174 cogent",
            "asnone germany",
            "as15598",
            "as16625 akamai",
            "asnone united",
            "as20940",
            "as35994 akamai",
            "as12337 noris",
            "pulse submit",
            "url analysis",
            "backdoor",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "suspicious",
            "virtool",
            "emails",
            "domain name",
            "code",
            "brazil",
            "poland",
            "domain",
            "msie",
            "windows nt",
            "tcp syn",
            "resolverror",
            "exploit",
            "externalport",
            "internalport",
            "http headers",
            "home network",
            "demonbot",
            "andariel",
            "yara detections",
            "malware traffic",
            "nids",
            "dns query",
            "google safe",
            "browsing",
            "whois",
            "virustotal",
            "mtb apr",
            "asnone related",
            "open",
            "hash avast",
            "avg clamav",
            "msdefender apr",
            "as8075",
            "content type",
            "access",
            "cp bus",
            "cur cono",
            "fin ivdo",
            "onl our",
            "phy samo",
            "overview ip",
            "flag united",
            "hostname",
            "files domain",
            "as8068",
            "trojan features",
            "rsa tls",
            "issuing ca",
            "mirai variant",
            "useragent",
            "inbound",
            "realtek sdk",
            "miniigd upnp",
            "soap command",
            "activity mirai",
            "helloworld",
            "users",
            "alerts",
            "anomalous file",
            "recycle bin",
            "filehash",
            "av detections",
            "memcommit",
            "read c",
            "memreserve",
            "for privacy",
            "china unknown",
            "ag alberto",
            "pedraz",
            "holidaycheck ag",
            "project pi",
            "immobilien ag",
            "puma se",
            "kurt walther",
            "ag ingo",
            "kraupa",
            "timo salzsieder",
            "record type",
            "ttl value",
            "msms57295540",
            "subdomains",
            "ireland unknown",
            "analyzer paste",
            "iocs",
            "samples",
            "regsetvalueexa",
            "default",
            "regdword",
            "module load",
            "t1129",
            "http request",
            "process32nextw",
            "regbinary",
            "oxypumper",
            "tools",
            "dock",
            "april",
            "persistence",
            "execution",
            "download",
            "as62597 nsone",
            "echo request",
            "sweep",
            "payload hello",
            "world",
            "total",
            "please",
            "xport",
            "main",
            "look",
            "install",
            "servers",
            "found",
            "cnapple public",
            "accept",
            "chrome",
            "moved",
            "ssl certificate",
            "write c",
            "installcore",
            "june",
            "delphi",
            "as47846",
            "cookie",
            "as32787 akamai",
            "as714 apple",
            "m1",
            "onelouder",
            "brian sabey",
            "denver colorado",
            "fakedout threat",
            "gmt content",
            "x cache",
            "div div",
            "as8972 host",
            "france unknown",
            "registrar",
            "otx scoreblue",
            "address domain",
            "as24940 hetzner",
            "as44273 host",
            "asn as15598",
            "trojanspy",
            "mail spammer",
            "germany mail",
            "spammer",
            "hichina",
            "data redacted",
            "a domains",
            "wow64",
            "slcc2",
            "media center",
            "port",
            "powershell",
            "urls http",
            "tptjsw",
            "virus",
            "ids detections",
            "germany",
            "as8560",
            "austria",
            "as1921",
            "as14061",
            "whitelisted",
            "as16276",
            "script urls",
            "as16552 tiggee",
            "as9009 m247",
            "meta",
            "as29789",
            "detected m1",
            "mtb aug",
            "server",
            "as397241",
            "cryp",
            "hostmaster",
            "networks",
            "as19024",
            "gmt setcookie",
            "delete",
            "russia as49505",
            "sinkhole cookie",
            "value snkz",
            "pe32",
            "possible",
            "susp",
            "lnmp",
            "lnmp a",
            "licess",
            "shell",
            "as63949 linode",
            "as133618",
            "as21342",
            "cve201717215",
            "huawei remote",
            "huawei hg532",
            "malware worm",
            "gafgyt",
            "exploit none",
            "binbusybox",
            "delete c",
            "odigicert inc",
            "stwashington",
            "lredmond",
            "rsa ca",
            "cape",
            "nondns",
            "denver",
            "redacted for",
            "method status",
            "url hostname",
            "ip country",
            "type get",
            "date tue",
            "gmt contenttype",
            "connection",
            "cachecontrol",
            "expires thu",
            "gmt vary",
            "poland unknown",
            "title",
            "script domains",
            "updated date",
            "serce internetu",
            "cnc beacon",
            "javascript",
            "wsasend",
            "post",
            "delete shadows",
            "all quiet",
            "t1047",
            "instrumentation",
            "rpcs",
            "ms windows",
            "asnone dns",
            "http host",
            "ip check",
            "sha256",
            "bits",
            "adware malware",
            "etpro malware",
            "bios",
            "guard",
            "tulach",
            "spectrum",
            "cyber folks",
            "tsara brashears",
            ".pl",
            "contacted",
            "kryptikxp",
            "apple",
            "ios",
            "android",
            "sabey",
            "charter communications",
            "denvecolorado",
            "quantum fiber",
            "air force",
            "swipper",
            "masquerade",
            "hitmen",
            "mitm",
            "whitesky",
            "cyber warfare",
            "porn",
            "pornhub.software"
          ],
          "references": [
            "DISTINCTIO8.pdf",
            "FileHash - SHA256 001f0ebe975b5f5a7e5272f53455635cc938a5a0129417f7e79c39df6cf65657 | Yara Detections: stack_string",
            "IDS Detections: Win32/Tofsee.AX google.com connectivity check Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set",
            "Tofsee: 'google.com' |  https://www.gov50.icu |",
            "ET TROJAN Win32/DarkWatchman Checkin Activity (POST) ( This is true. They sit around watching, following...)",
            "Alerts: procmem_yara injection_inter_process creates_largekey network_bind persistence_autorun antivm_generic_disk",
            "Alerts: persistence_autorun_tasks spawns_dev_util cape_detected_threat injection_process_hollowing",
            "hubt.pornhub.com | www.pornhub.com | pornative.com",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ||  pin.it || https://pin.it/",
            "www.sweetheartvideo.com || https://www.sweetheartvideo.com/tsara-brashears/",
            "Unix.Trojan.Mirai-6981169-0: FileHash - SHA256  fe00b364b6b8342e3ce0dd146902ac3330ab976e87aca6be666efde39ea485da",
            "IDS Detections: WGET Command Specifying Output in HTTP Headers",
            "IDS Detections: D-Link Devices Home Network Administration Protocol Command Execution",
            "Yara Detections: is__elf ,  DemonBot",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication writes_to_stdout",
            "FileHash - SHA256  f32f6b229913d68daad937cc72a57aa45291a9d623109ed48938815aa7b6005c",
            "IDS Detections: Andariel Backdoor Activity (Checkin)",
            "Alerts: dead_host nids_malware_alert network_icmp nolookup_communication",
            "DDoS:Linux/Gafgyt : FileHash - SHA256  358c2bd5b9e925dc23894dec18ce486c03d743cde766ce298ac1e2f00d86f0b2",
            "IDS Detection: Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound",
            "IDS Detection: Mirai Variant User-Agent (Inbound) WebShell Generic - wget http - POST",
            "IDS Detection: Observed Suspicious UA (Hello-World) Suspicious Activity potential UPnProxy",
            "http://vortex-nlb-http2-fed-us-taut-purple.nr-data.net/",
            "https://tulach.cc/ || tulach.cc || www-temp.metrobyt-mobile.com",
            "apple-reactivate.com | appleweb-aem.apple.com | apple.com | revoked-aprtr1-tr1g1.apple.com | network-framework.apple.com",
            "autodiscover.webcompanion.com || avc-gft-dashboard.apple.com || cac1-wwfde-wave.apple.com || demo27.apple.com",
            "* https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
            "https://tulach.cc/ | tulach.cc |",
            "http://hallrender.com/attorney/brian-sabey | www-temp.metrobyt-mobile.com",
            "google.pl | aplikacja.ceidg.gov.pl | imaginecup.pl | microsoft.pl",
            "18teen.net | teensnow.com | grannies-porn.net | pornmd.com",
            "www.pornhubselect.com | pornhub.software"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Chile",
            "Morocco",
            "Taiwan",
            "Guatemala",
            "United Kingdom of Great Britain and Northern Ireland",
            "Ireland",
            "Kenya",
            "Peru",
            "Singapore",
            "Mexico",
            "Brazil",
            "Slovakia",
            "Spain",
            "Australia",
            "Belgium",
            "Germany",
            "Hungary",
            "Netherlands",
            "Russian Federation",
            "Japan",
            "Poland"
          ],
          "malware_families": [
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "TEL:CreateScheduledTask",
              "display_name": "TEL:CreateScheduledTask",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-6981169-0",
              "display_name": "Unix.Trojan.Mirai-6981169-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee",
              "display_name": "Backdoor:Win32/Tofsee",
              "target": "/malware/Backdoor:Win32/Tofsee"
            },
            {
              "id": "Ransom:Win32/Haperlock",
              "display_name": "Ransom:Win32/Haperlock",
              "target": "/malware/Ransom:Win32/Haperlock"
            },
            {
              "id": "Trojan:Win32/Neurevt",
              "display_name": "Trojan:Win32/Neurevt",
              "target": "/malware/Trojan:Win32/Neurevt"
            },
            {
              "id": "DDoS:Linux/Gafgyt.YA!MTB",
              "display_name": "DDoS:Linux/Gafgyt.YA!MTB",
              "target": "/malware/DDoS:Linux/Gafgyt.YA!MTB"
            },
            {
              "id": "CVE-2017-17215",
              "display_name": "CVE-2017-17215",
              "target": null
            },
            {
              "id": "CVE-2023-27350",
              "display_name": "CVE-2023-27350",
              "target": null
            },
            {
              "id": "CVE-2014-8361",
              "display_name": "CVE-2014-8361",
              "target": null
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "M1",
              "display_name": "M1",
              "target": null
            },
            {
              "id": "OneLouder",
              "display_name": "OneLouder",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Win.Trojan.Sarwent-10012602-0",
              "display_name": "Win.Trojan.Sarwent-10012602-0",
              "target": null
            },
            {
              "id": "Virus:Win32/Sivis.A",
              "display_name": "Virus:Win32/Sivis.A",
              "target": "/malware/Virus:Win32/Sivis.A"
            },
            {
              "id": "Win.Trojan.Installcore-1177",
              "display_name": "Win.Trojan.Installcore-1177",
              "target": null
            },
            {
              "id": "Win.Malware.Oxypumper-6900435-0",
              "display_name": "Win.Malware.Oxypumper-6900435-0",
              "target": null
            },
            {
              "id": "Win.Malware.Qshell-9875653-0",
              "display_name": "Win.Malware.Qshell-9875653-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1203",
              "name": "Exploitation for Client Execution",
              "display_name": "T1203 - Exploitation for Client Execution"
            },
            {
              "id": "T1485",
              "name": "Data Destruction",
              "display_name": "T1485 - Data Destruction"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1428",
              "name": "Exploit Enterprise Resources",
              "display_name": "T1428 - Exploit Enterprise Resources"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1133",
              "name": "External Remote Services",
              "display_name": "T1133 - External Remote Services"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "678f0dbdbc59dd2ea5656dcf",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 7589,
            "FileHash-SHA1": 3982,
            "FileHash-SHA256": 8280,
            "URL": 441,
            "domain": 2416,
            "hostname": 2155,
            "email": 37,
            "CVE": 4,
            "SSLCertFingerprint": 6
          },
          "indicator_count": 24910,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "2 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d68fffbf012630d57033b6",
          "name": "Sabey SWIPPER - Pornhub\u00bbX.Com migration to Twitter | Sabey\u2019s Daddy Data Center ",
          "description": "",
          "modified": "2026-04-08T17:27:27.851000",
          "created": "2026-04-08T17:27:27.851000",
          "tags": [
            "url https",
            "filehashsha256",
            "browse scan",
            "report spam",
            "author",
            "output",
            "tsara brashears",
            "created",
            "days ago",
            "showing",
            "trojan",
            "win32",
            "msil",
            "trojanspy",
            "virtool",
            "scan endpoints",
            "all search",
            "otx scoreblue",
            "author avatar",
            "fraud",
            "june",
            "worm",
            "search",
            "tsara type",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "url http",
            "ipv6",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "sort",
            "least",
            "researched",
            "f https",
            "scan",
            "iocs",
            "learn more",
            "filehashmd5",
            "hostname",
            "domain",
            "indicators show",
            "browser",
            "unsupported",
            "view",
            "continue",
            "watch tsara",
            "searchtsa",
            "brashears",
            "most relevant",
            "porn videos",
            "download",
            "google search",
            "open threat",
            "babe",
            "green",
            "daily",
            "play",
            "fullscreen",
            "tsara",
            "videos",
            "love",
            "top tsara",
            "xxx videos",
            "hardcore porn",
            "jeffrey reimer",
            "puts",
            "porn",
            "javascript",
            "body",
            "creation date",
            "record value",
            "united",
            "gmt content",
            "gmt max",
            "age900",
            "httponly x",
            "date",
            "unknown",
            "pragma",
            "levelblue",
            "exchange open",
            "threat exchange",
            "indicator",
            "safebae",
            "get involved",
            "anyone else",
            "press",
            "data reports",
            "teen students",
            "become",
            "chapter lead",
            "become a",
            "certified peer",
            "district",
            "brian sabey",
            "sabey data",
            "hallrender",
            "sabey data centers",
            "swipper",
            "mark b sabey",
            "m brian sabey",
            "2beeg",
            "thebrotherssabey",
            "urls",
            "show",
            "cloudflarenet",
            "us urlscan",
            "skip",
            "accessibility",
            "all images",
            "videos shopping",
            "forums news",
            "web more",
            "tools",
            "service",
            "malicious",
            "size",
            "recent",
            "off blur",
            "find",
            "summary",
            "securitytrails",
            "urlscan https",
            "tryporn",
            "icann whois",
            "data problem",
            "disclaimer",
            "judaporn",
            "kompoz",
            "blur filter",
            "search results",
            "xxxvideohd",
            "hacker news",
            "item",
            "url",
            "website",
            "web",
            "scanner",
            "analyze",
            "analyzer",
            "september",
            "domains",
            "sale worldwide",
            "street",
            "gate parkway",
            "stateprovince",
            "postal code",
            "route",
            "open",
            "watch",
            "links",
            "footer",
            "delete see",
            "delete c",
            "tofsee",
            "grum",
            "entries",
            "cape",
            "high",
            "total",
            "copy",
            "write",
            "malware",
            "patched",
            "next",
            "please"
          ],
          "references": [
            "http://hghltd.yandex.net/yandbtm?fmode=inject&url=http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
            "thebrotherssabey.wordpress.com | https://hallrender.com/attorney/brian-sabey",
            "https://twitter.com/ootiosum/status/1812208222150726029a4dmHAxV0M0QIHawADl4Qr4kDegUI-QEQAA&usg=AOvVaw37yALadqlgoR9_xlQ5B4Hm",
            "https://thebrotherssabey.wordpress.com/wp-admin/customize.php?url=https://thebrotherssabey.wordpress.com/",
            "https://SafeBae.org |  https://www.sweetheartvideo.com/tsara-brashearsAccept-Language",
            "http://sexiezpics.com/tsara-brashears-hardcore-porn | https://www.sweetheartvideo.com/tsara-brashearsAccept-Language",
            "https://urlscan.io/domain/cdn2e-videos2.yjcontentdelivery.com | http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html",
            "https://www.google.com/search?client=ms-android-tcl-rvo2b&sca_esv=677ff2260c38da6a&sca_upv=1&q=tsara%20brashears&tbm=vid&source=lnms&fbs=AEQNm0Aa4sjWe7Rqy32pFwRj0UkWd8nbOJfsBGGB5IQQO6L3J5MIFhvnvU242yFxzEEp3BfRFWcyM5BvpTgNzM3vKj4sz-C2iLdc_0v0iAkScdtYjVPIGyVlvwujMCY6xcQ3LIupWIQPyPPfztGwIqpQ9H2EXqXXY4GBGq8hpekXoFuduDqktZzSriMQxAlKPjQviXaDVnUYcgWw9ejzcyECyIGanCUinw&sa=X&biw=1128&bih=1971&dpr=2&no_sw_cr=1&zx=1724209326040&sssc=1",
            "bfxxxhindi.to | https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://billpay.stcu.org/csp/ws/ALKAMI-S5M/html/PC_Remote_Role_Due_XP_Help/role1_faq_email_notifications.html  billpay.stcu.org",
            "bfxxxhindi.to  www.bfxxxhindi.to  https://www.bfxxxhindi.to   tsara brashears bfxxxhindi.to https://www.bfxxxhindi.to/trend/eaUvPMTg3NzMytY07Q/",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer/",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead/. http://www.music-forum.org/www-cixiu888-com-tsara-brashears.html",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "http://hghltd.yandex.net/yandbtm?fmode=inject&url=http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
            "http://alohatube.xyz/search/tsara-brashears  http://alohatube.xyz/search/tsara-brashears/",
            "http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-sexual-misconduct-miscinception.html",
            "http://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concentra-medic",
            "http://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concentra-medical-center",
            "http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html",
            "http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-medical.html",
            "http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-misconduct-miscinception.html",
            "http://videolal.com/tsara-brashears-assaulted-by-jeffrey-reimer.html  http://videolal.com/tsara-brashears-dead-or-alive-song-rap.html",
            "http://videolal.com/tsara-brashears-pueblo.html , http://videolal.com/tsara-brashears.html",
            "http://pornbitter.com/storage/tsara-brashears/  http://www.gdsl-pallemoebler.info/seach/tsara-brashears/ advocate-smyslova.ru",
            "http://browntubeporn.com/tsara-brashears.html  browntubeporn.com  http://pornvideoj.com/tsara-brashears.htm",
            "pornhub.com/gay/video/search?search=tsara%2Blynn%2Bbrashears%2Blesbian",
            "feestzalenvanvlaanderen.be  www.gdsl-pallemoebler.info  http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us",
            "http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us  www.tryporn.net",
            "http://www.gdsl-pallemoebler.info/seach/tsara-brashears/ advocate-smyslova.ru  feestzalenvanvlaanderen.be www.gdsl-pallemoebler.info",
            "http://www.tryporn.net/seach/tsara-brashears/  hicksandchicks.org redpornvideos.net   http://advocate-smyslova.ru/tsara-brashears/",
            "http://flexporn.net/tsara-brashears.html  http://onlyindianporn.net/videos/tsara-brashears/  http://pornbitter.com/storage/tsara-brashears/",
            "http://pornpx.com/trends/tsara-brashears-submission-on-august-27-via-manual/1/ http://www.potnhub.org/tsara-brashears.html",
            "http://www.bukaporn.net/trend/tsara-brashears/  http://onlyindianporn.tv/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concentra",
            "http://www.sexpornimages.com/tsara/tsara-lynn-brashears-porn/7x56y.html",
            "www.sexpornimages.com http://hicksandchicks.org/ju/tsara-brashears/  hlebo.mobi  pornpx.com  www.potnhub.org",
            "http://wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Language  http://www.music-forum.",
            "http://kompoz.me/find/tsara-brashears-submission-on-august-27-via-manual/  http://redpornvideos.net/tsara-brashears.html",
            "https://wallpapers-nature.com/  https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "https://wallpapers-nature.com/tsara-brashears/urlscan-io   https://www.sweetheartvideo.com/tsara-brashears",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net  https://www.sweetheartvideo.com/tsara-brashears/",
            "https://www.sweetheartvideo.com/tsara-brashears/ | https://www.sweetheartvideo.com/tsara-brashearsAccept-Language",
            "https://www.sweetheartvideo.com/tsara-brashearsAccept-Language | https://wallpapers-nature.com/tsara-brashears/urlscan-io",
            "http://hghltd.yandex.net/yandbtm?fmode=inject&url=http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
            "https://xlxx.mobi phishing\thttps://2beeg.me   https://2beeg.net  https://www.redporn.video   https://youjizz.sex  2beeg.me xlxx.mobi ladys.one",
            "tsara-brashears-deadspin-twitter-suspended-account-help.ht  videolal.com  wallpapers-nature.com   www.sweetheartvideo.com",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/  Domain mom2fuck.mobi   https://youjizz.sex/tsara-brashears.html   https://youjizz.sex",
            "http://amp.mypornvid.fun/videos/2/SLFGMWoQaCU/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears",
            "http://pixelrz.com/lists/keywords/tsara-brashears-assaulted-by-jeffrey-reimer  http://pixelrz.com/lists/keywords/brashears-tsara-buzz-news",
            "http://pixelrz.com/lists/keywords/%20dr-jeffrey-reimer-dpt-funds-tsara-brashears/ https://xlxx.mobi",
            "http://pixelrz.com/lists/keywords/dr-jeffrey-reimer-dpt-funds-tsara-brashears/  orangeporntube.net   www.tryporno.net",
            "http://pixelrz.com/lists/keywords/tsara-brashears-massage-misconduct-misconception  http://pixelrz.com/lists/keywords/tsara-brashears-dead/  http://orangeporntube.net/tsara-brashears.html",
            "http://www.tryporno.net/movies/tsara-brashears/  http://www.pixelrz.com/lists/keywords/tsara-brashears/",
            "https://kompoz.me/find/tsara-brashears-submission-on-august-27-via-manual/  sexiezpics.com",
            "http://sexiezpics.com/tsara-brashears-hardcore-porn http://mypornvid.com/videos/27/x510fb2/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/caillou-finger-family",
            "http://pixelrz.com/lists/keywords/tsara-brashears-assaulted-at-concentra/   http://pornohata.com/mov/tsara-brashears/",
            "http://onlyindianporn2.com/videos/tsara-brashears/   onlyindianporn2.com-porn.html   aninditaannisa.blogspot.com   porno-trash.net",
            "myhotzpic.com  pornohata.com pornstarsporno.net aninditaannisa.blogspot.com/2019/02/tsara-brashears",
            "http://pornstarsporno.net/tsara-brashears.html  http://vtwctr.org/explore/inmate-tsara-brashears/",
            "https://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara%20-brashears-massage-nearby.html",
            "Hostname aninditaannisa.blogspot.com No Expiration\t0\t  URL aninditaannisa.blogspot.com/2019/02/tsara-brashears-porn.html  billpay.stcu.org",
            "http://hghltd.yandex.net/yandbtm?fmode=inject&url=http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
            "https://thebrotherssabey.wordpress.com/wp-admin/customize.php?url=https://thebrotherssabey.wordpress.com/",
            "thebrotherssabey.wordpress.com http://www.sabey.com | http://resources.sabeydatacenters.com | http://root.sabeydatacenters.com",
            "http://go.sabey.com http://vpn2.sabey.com | http://resources.sabeydatacenters.com | http://root.sabeydatacenters.com |",
            "http://itsupport.sabey.com http://www.sabey.com | http://root.sabeydatacenters.com/ | http://server1.sabeydatacenters.com | http://smtp1.sabeydatacenters.com No Expiration\t http://smtps.sabeydatacenters.com | http://smtpseguro.sabeydatacenters.com",
            "http://sabey.com/construction/ | https://tulach.cc/ | sabeydatacenters.com | https://thebrotherssabey.com | http://root.sabeydatacenters.com/ No Expiration\t0\t  URL http://server1.sabeydatacenters.com No Expiration\t0\t  URL http://smtp1.sabeydatacenters.com No Expiration\t http://smtps.sabeydatacenters.com | http://smtpseguro.sabeydatacenters.com | http://staging.sabeydatacenters.com",
            "https://info.sabeydatacenters.com/webmail/404532/1590752290/6c9ed1e0b6b364689835e8c6bd51ed2198f99ee8ec7fa1924787e4e9b6382872",
            "forceusercontent.com | sabey.com | tulach.cc | http://thebrotherssabey.com/2018m.sabeydatacenters.com | https://www.vpn.sabey.com/",
            "root.sabeydatacenters.com | server1.sabeydatacenters.com | smtps.sabeydatacenters.com | smtpseguro.sabeydatacenters.com",
            "https://thebrotherssabey.com | https://thebrotherssabey.com/2015/08/24/why | staging.sabeydatacenters.com |",
            "authsmtp.sabeydatacenters.com | go.sabey.com | thebrotherssabey.com | mx5.sabeydatacenters.com | posta.sabeydatacenters.com",
            "remote.files.downloadnow-1.com | remote.sabeydatacenters.com | poczta.sabeydatacenters.com | pop.sabeydatacenters.com",
            "https://thebrotherssabey.com/2018/12/05/nature | https://thebrotherssabey.com/2019/01/20/miracle/ | https://thebrotherssabey.com/20",
            "https://thebrotherssabey.com/2015/08/24/why  | https://thebrotherssabey.com/2016/03/12/how | https://thebrotherssabey.com/2017/04/17/truth",
            "https://thebrotherssabey.com/2016/01/18/ballroom | resources.sabeydatacenters.com | https://thebrotherssabey.com/feed/",
            "https://thebrotherssabey.com/comments/feed/ | mail2.sabeydatacenters.com | mails.sabeydatacenters.com | newmail.sabeydatacenters.com",
            "http://staging.sabeydatacenters.com | https://sabey.com/careers/ | https://vpn2.sabey.com | https://www.sabey.com | https://www.vpn.sabey.com |",
            "https://info.sabeydatacenters.com/emailPreference/epc/404532/EcSDdxFsTp4vgdAzwbcD5rWn7oROwp5s8Buq0L48dF0/732bdcab2311714bb73d4d507e6508d215afb4dbc511",
            "1a8fc49a4265fe146976/1523680312 |  https://thebrotherssabey.com/2018/04/22/the  |  https://thebrotherssabey.com/2019/07/08/suffering",
            "https://info.sabeydatacenters.com/listUnsubscribeHeader/u/404532/732bdcab2311714bb73d4d507e6508d215afb4dbc5111a8fc49a4265fe14697",
            "https://info.sabeydatacenters.com/r/404532/1/1523680312/open/1 | http://onlyindianporn2.com/videos/dia-sabey/?p=13",
            "https://thebrotherssabey.com/category/pregnancy | https://thebrotherssabey.com/discourse | onlyindianporn2.com",
            "https://thebrotherssabey.com/2019/01/20/miracle/?share=twitter | https://thebrotherssabey.com/author/dbsabey/",
            "https://thebrotherssabey.com/author/thebrotherssabey/ | https://thebrotherssabey.com/category/homosexuality",
            "https://thebrotherssabey.com/2018/12/05/nature-of-scripture-part-5-conclusions/ | https://thebrotherssabey.com/2019/08/01/why",
            "mypornvid.fun | porn100.tv | amp.mypornvid.fun | cdn10.mypornvid.fun | cdn11.mypornvid.fun | cdn5.mypornvid.fun | cdn8.mypornvid.fun",
            "www.anyxxxtube.net | sv2.mypornvid.fun | www.porn100.tv | www.redporn.video | https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing |",
            "http://amp.mypornvid.fun/videos/2/SLFGMWoQaCU/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears",
            "anybunny.tv | http://anybunny.tv/search/eva-lisa | http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us",
            "https://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-nearby.html. |",
            "http://onlyindianporn.tv/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concent | http://wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Languauge",
            "onlyindianporn.tv | sexpornimages.com | http://www.sexpornimages.com/hillary/hillary-clinton",
            "https://mypornvid.fun/videos/3/o00vnGgcVx0/dude-sex-fuck-a-deer-wapporn-video-com/fuck-deer",
            "http://www.sexpornimages.com/tsara/tsara-lynn-brashears-porn/7x56y.html",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead/ | http://videolal.com/tsara-brashears-dead-by-daylight.html",
            "http://videolal.com/tsara-brashears-dead-or-alive-song-rap.html | http://videolal.com/tsara-brashears-dead.html |",
            "https://thebrotherssabey.com/comments/feed/ | https://thebrotherssabey.com/2019/01/20/miracle/",
            "https://videolal.com/videos/tsara-brashears-dead-by-daylight.html | tsara-brashears-deadspin-twitter-suspended-account-help.ht",
            "https://thebrotherssabey.com/2018/12/05/nature | https://thebrotherssabey.com/2017/04/17/truth",
            "https://thebrotherssabey.com/2016/03/12/how | https://thebrotherssabey.com/2016/01/18/ballroom",
            "https://thebrotherssabey.com/comments/feed/ | https://thebrotherssabey.com/category/pregnancy",
            "https://thebrotherssabey.com/feed/ | https://thebrotherssabey.com/discourse | https://thebrotherssabey.com/comments/feed/",
            "https://thebrotherssabey.com/2015/08/24/why | https://thebrotherssabey.com/20 | https://thebrotherssabey.com | https://thebrotherssabey.com",
            "http://thebrotherssabey.com/2018 | https://thebrotherssabey.com/2019/01/20/miracle/ | https://thebrotherssabey.com/2019/07/08/suffering",
            "https://thebrotherssabey.com/category/pregnancy | https://thebrotherssabey.com/category/homosexuality",
            "https://thebrotherssabey.com/author/thebrotherssabey/  | https://thebrotherssabey.com/author/dbsabey/",
            "http://siteinlink.d1.cnbd.net/site/maps.google.com.lb/ | https://www.applefilmaker.com | https://www.applefilmaker.com/1odbU3D",
            "www.wwwgitlab.gitlab.git.git.gitlab.git.128-199-7-137.cprapid.com",
            "https://thebrotherssabey.wordpress.com/wp-admin/customize.php?url=https://thebrotherssabey.wordpress.com/",
            "https://hallrender.com/attorney/brian-sabey | https://thebrotherssabey.com/2019/01/20/miracle/?share=twitter",
            "storage.ladys.one ladys.one: | http://photos.ladys.one ladys.one: | http://porno.ladys.one ladys.one: | http://storage.ladys.one ladys.one: | http://xxx-videos.ladys.one ladys.one:",
            "http://www.xvxx.me/clips/nadia-ali-hardcore/199530/",
            "https://kompoz2.com/tv/454575/blonde-slut-sara-jay-with-big-ass-is-fucked-in-doggy-style.html",
            "http://onlyindianporn2.com/videos/vichatter-young-11//title/0.7292669771257236"
          ],
          "public": 1,
          "adversary": "Brian Sabey | Tulach | Sabey Data Centers",
          "targeted_countries": [
            "United States of America",
            "Netherlands",
            "United Kingdom of Great Britain and Northern Ireland"
          ],
          "malware_families": [
            {
              "id": "Win32/Tofsee.AX",
              "display_name": "Win32/Tofsee.AX",
              "target": null
            },
            {
              "id": "Trojan:Win32/Muldrop",
              "display_name": "Trojan:Win32/Muldrop",
              "target": "/malware/Trojan:Win32/Muldrop"
            }
          ],
          "attack_ids": [
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1586.001",
              "name": "Social Media Accounts",
              "display_name": "T1586.001 - Social Media Accounts"
            },
            {
              "id": "T1055.013",
              "name": "Process Doppelg\u00e4nging",
              "display_name": "T1055.013 - Process Doppelg\u00e4nging"
            },
            {
              "id": "T1080",
              "name": "Taint Shared Content",
              "display_name": "T1080 - Taint Shared Content"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "69bea426487bffa5384c6f38",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 121,
            "FileHash-SHA1": 116,
            "FileHash-SHA256": 443,
            "URL": 1878,
            "domain": 312,
            "hostname": 518,
            "email": 5,
            "CIDR": 1,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 3395,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "10 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69cf32e906000d5993f366c4",
          "name": "Habo Analysis System - & 'bye for now'",
          "description": "Habo Analysis plus other relative findings.\n\nMy opinion: Problem Size Trend : Macro. Whoever deleted files doesnt make it go away. #cryptographicfailure. Living Nightmare. The dates will reflect 2019/20 post certificate exp which adjusts to an aug 2025 sectigo cert which expired sept 8 2025 rolling into aws for auth expiring renewing ent of oct 2025 into a 5 year gap renewed same # digicert globalsign2020 seal. This cant end. But I am done here for deletions (not otx in my research who did this). To the person who did, you cooked the internet. There was one way to resolution. You failed.",
          "modified": "2026-04-03T04:05:59.805000",
          "created": "2026-04-03T03:24:25.921000",
          "tags": [
            "next associated",
            "files show",
            "date hash",
            "avast avg",
            "present dec",
            "lowfi",
            "mtb may",
            "susp",
            "code",
            "llc registrar",
            "date",
            "server",
            "admin country",
            "registry domain",
            "iana id",
            "admin city",
            "herndon tech",
            "country",
            "key identifier",
            "x509v3 subject",
            "number",
            "cgb osectigo",
            "public server",
            "dv r36",
            "validity",
            "subject public",
            "key info",
            "key algorithm",
            "cgb stgreater",
            "cnsectigo rsa",
            "secure server",
            "ca validity",
            "executable",
            "msdos win32",
            "generic windos",
            "dos executable",
            "generic"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1006,
            "FileHash-SHA1": 927,
            "FileHash-SHA256": 3665,
            "hostname": 1187,
            "IPv4": 617,
            "URL": 1315,
            "email": 2,
            "domain": 605
          },
          "indicator_count": 9324,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "16 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69cf32ecc057fb8a6c0cebb9",
          "name": "Habo Analysis System - & 'bye for now'",
          "description": "Habo Analysis plus other relative findings.\n\nMy opinion: Problem Size Trend : Macro. Whoever deleted files doesnt make it go away. #cryptographicfailure. Living Nightmare. The dates will reflect 2019/20 post certificate exp which adjusts to an aug 2025 sectigo cert which expired sept 8 2025 rolling into aws for auth expiring renewing ent of oct 2025 into a 5 year gap renewed same # digicert globalsign2020 seal. This cant end. But I am done here for deletions (not otx in my research who did this). To the person who did, you cooked the internet. There was one way to resolution. You failed.",
          "modified": "2026-04-03T03:37:54.569000",
          "created": "2026-04-03T03:24:28.040000",
          "tags": [
            "next associated",
            "files show",
            "date hash",
            "avast avg",
            "present dec",
            "lowfi",
            "mtb may",
            "susp",
            "code",
            "llc registrar",
            "date",
            "server",
            "admin country",
            "registry domain",
            "iana id",
            "admin city",
            "herndon tech",
            "country",
            "key identifier",
            "x509v3 subject",
            "number",
            "cgb osectigo",
            "public server",
            "dv r36",
            "validity",
            "subject public",
            "key info",
            "key algorithm",
            "cgb stgreater",
            "cnsectigo rsa",
            "secure server",
            "ca validity",
            "executable",
            "msdos win32",
            "generic windos",
            "dos executable",
            "generic"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 230,
            "FileHash-SHA1": 208,
            "FileHash-SHA256": 233,
            "hostname": 7,
            "IPv4": 7,
            "URL": 35,
            "email": 2,
            "domain": 5
          },
          "indicator_count": 727,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "16 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69cf32eb2d10d610b96f55e9",
          "name": "Habo Analysis System - & 'bye for now'",
          "description": "Habo Analysis plus other relative findings.\n\nMy opinion: Problem Size Trend : Macro. Whoever deleted files doesnt make it go away. #cryptographicfailure. Living Nightmare. The dates will reflect 2019/20 post certificate exp which adjusts to an aug 2025 sectigo cert which expired sept 8 2025 rolling into aws for auth expiring renewing ent of oct 2025 into a 5 year gap renewed same # digicert globalsign2020 seal. This cant end. But I am done here for deletions (not otx in my research who did this). To the person who did, you cooked the internet. There was one way to resolution. You failed.",
          "modified": "2026-04-03T03:37:54.337000",
          "created": "2026-04-03T03:24:27.416000",
          "tags": [
            "next associated",
            "files show",
            "date hash",
            "avast avg",
            "present dec",
            "lowfi",
            "mtb may",
            "susp",
            "code",
            "llc registrar",
            "date",
            "server",
            "admin country",
            "registry domain",
            "iana id",
            "admin city",
            "herndon tech",
            "country",
            "key identifier",
            "x509v3 subject",
            "number",
            "cgb osectigo",
            "public server",
            "dv r36",
            "validity",
            "subject public",
            "key info",
            "key algorithm",
            "cgb stgreater",
            "cnsectigo rsa",
            "secure server",
            "ca validity",
            "executable",
            "msdos win32",
            "generic windos",
            "dos executable",
            "generic"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 230,
            "FileHash-SHA1": 208,
            "FileHash-SHA256": 233,
            "hostname": 7,
            "IPv4": 7,
            "URL": 35,
            "email": 2,
            "domain": 5
          },
          "indicator_count": 727,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "16 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69cf32eaa2d31a34fc7913e6",
          "name": "Habo Analysis System - & 'bye for now'",
          "description": "Habo Analysis plus other relative findings.\n\nMy opinion: Problem Size Trend : Macro. Whoever deleted files doesnt make it go away. #cryptographicfailure. Living Nightmare. The dates will reflect 2019/20 post certificate exp which adjusts to an aug 2025 sectigo cert which expired sept 8 2025 rolling into aws for auth expiring renewing ent of oct 2025 into a 5 year gap renewed same # digicert globalsign2020 seal. This cant end. But I am done here for deletions (not otx in my research who did this). To the person who did, you cooked the internet. There was one way to resolution. You failed.",
          "modified": "2026-04-03T03:37:53.945000",
          "created": "2026-04-03T03:24:26.838000",
          "tags": [
            "next associated",
            "files show",
            "date hash",
            "avast avg",
            "present dec",
            "lowfi",
            "mtb may",
            "susp",
            "code",
            "llc registrar",
            "date",
            "server",
            "admin country",
            "registry domain",
            "iana id",
            "admin city",
            "herndon tech",
            "country",
            "key identifier",
            "x509v3 subject",
            "number",
            "cgb osectigo",
            "public server",
            "dv r36",
            "validity",
            "subject public",
            "key info",
            "key algorithm",
            "cgb stgreater",
            "cnsectigo rsa",
            "secure server",
            "ca validity",
            "executable",
            "msdos win32",
            "generic windos",
            "dos executable",
            "generic"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 230,
            "FileHash-SHA1": 208,
            "FileHash-SHA256": 233,
            "hostname": 7,
            "IPv4": 7,
            "URL": 35,
            "email": 2,
            "domain": 5
          },
          "indicator_count": 727,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "16 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69bf8e2663d5480917ddb699",
          "name": "Pegasus - https://house.mo.gov/ | Brian Sabey HallRender [i cloned OctoSeek] T8",
          "description": "",
          "modified": "2026-03-22T08:35:26.266000",
          "created": "2026-03-22T06:37:26.233000",
          "tags": [
            "united",
            "as393601 state",
            "a domains",
            "passive dns",
            "as397241",
            "certificate",
            "urls",
            "search",
            "showing",
            "entries",
            "algorithm",
            "full name",
            "data",
            "v3 serial",
            "number",
            "cus cndigicert",
            "global g2",
            "tls rsa",
            "sha256",
            "ca1 odigicert",
            "info",
            "record type",
            "ttl value",
            "all txt",
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "resolutions",
            "historical ssl",
            "communicating",
            "problems",
            "parent domain",
            "njrat",
            "ransomware",
            "startpage",
            "historical",
            "malware",
            "execution",
            "threat roundup",
            "april",
            "september",
            "remcos rat",
            "august",
            "june",
            "qakbot",
            "push",
            "service",
            "privateloader",
            "amadey",
            "powershell",
            "qbot",
            "cobalt strike",
            "core",
            "hacktool",
            "november",
            "october",
            "roundup",
            "threat network",
            "cellbrite",
            "february",
            "emotet",
            "maze",
            "metro",
            "dark",
            "malicious",
            "team",
            "critical",
            "copy",
            "awful",
            "parallax rat",
            "banker",
            "keylogger",
            "dns replication",
            "date",
            "csc corporate",
            "domains",
            "code",
            "server",
            "registrar abuse",
            "registrar iana",
            "registry domain",
            "registrar url",
            "registrar",
            "contact phone",
            "apple ios",
            "quasar",
            "remcos",
            "ursnif",
            "chaos",
            "ransomexx",
            "azorult",
            "agent tesla",
            "evilnum",
            "asyncrat",
            "win32 exe",
            "wininit",
            "beta version",
            "cmstp",
            "taskscheduler",
            "ieudinit",
            "nat32",
            "certsentry",
            "type name",
            "wc3 rpg",
            "pegasus",
            "unknown",
            "domain",
            "servers",
            "germany unknown",
            "name servers",
            "status",
            "next",
            "as29066 host",
            "as133618",
            "cname",
            "as47846",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "encrypt",
            "china unknown",
            "as38365 beijing",
            "as134175 unit",
            "707713",
            "hong kong",
            "virgin islands",
            "as6461 zayo",
            "ransom",
            "exploit",
            "ipv4",
            "pulse submit",
            "url analysis",
            "trojan",
            "body",
            "click",
            "creation date",
            "emails",
            "expiration date",
            "domain privacy",
            "hostname",
            "dynamicloader",
            "state",
            "medium",
            "msie",
            "windows nt",
            "wow64",
            "show",
            "slcc2",
            "media center",
            "error",
            "delphi",
            "guard",
            "write",
            "win32",
            "target",
            "redir",
            "facebook",
            "dcom",
            "local",
            "delete",
            "utf8",
            "unicode text",
            "crlf line",
            "rgba",
            "yara detections",
            "default",
            "asnone",
            "get na",
            "dns lookup",
            "probe ms17010",
            "eternalblue",
            "playgame",
            "high",
            "related pulses",
            "yara rule",
            "anomalous file",
            "dynamic",
            "malware infection",
            "cnc",
            "procmem_yara",
            "antivm_generic_disk",
            "modify_proxy infostealer_cookies",
            "network_http",
            "anomalous_deletefile",
            "antidebug_guardpages",
            "powershell_request",
            "powershell_download",
            "as63949 linode",
            "mtb feb",
            "open ports",
            "backdoor",
            "gmt content",
            "trojandropper",
            "simda",
            "lockbit",
            "win.trojan",
            "midia-4",
            "floxif",
            "cryptowall",
            "brontok",
            "check in",
            "record value",
            "files",
            "location united",
            "america asn",
            "as16509",
            "download",
            "threat",
            "paste",
            "iocs",
            "analyze",
            "hostnames",
            "urls http",
            "samples",
            "tsara brashears",
            "2nd corintnthians 4:8-9",
            "injection_inter_process",
            "injection_create_remote_thread",
            "persistence_autorun",
            "bypass_firewall",
            "disables_windowsupdate",
            "dynamic_function_loading",
            "http_request",
            "query",
            "delete c",
            "activity dns",
            "components",
            "file execution",
            "observed dns",
            "as4837 china",
            "nxdomain",
            "a nxdomain",
            "wannacry",
            "missouri",
            "safebae",
            "hallrender",
            "house.mo.gov",
            "typosquatting",
            "tactics",
            "google",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "aes256gcm",
            "dalles",
            "cookie",
            "urls https",
            "xpcegvo2adsnq",
            "mhkz",
            "mvi2",
            "keepaliveyes",
            "fexp24007246",
            "nsyt",
            "eva reimer",
            "daisy coleman",
            "brian sabey",
            "https://lawlink.com/documents/10935/blackbag-technologies-announ"
          ],
          "references": [
            "https://house.mo.gov/ \u2022 house.mo.gov \u2022 mo.gov",
            "dns.msftncsi.com",
            "NSO Group - Pegasus: enterprise.cellebrite.com \u2022 cellebrite.com \u2022 erp002.blackbagtech.com \u2022 140.108.21.184",
            "Target\u2193\u2192 Tsara Brashears:  https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing",
            "23.216.147.64",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [Apple/ iOS unlocker password decryption]",
            "http://alohatube.xyz/search/tsara-brashears [Telecom \u2022 Brashears Telecom services modified (malicious)]",
            "alohatube.xyz [BotNetwork]",
            "facebooksunglassshop.com",
            "iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com - Lockbit Black 3.0, Observed AridViper CnC Domain, Win.Trojan.Midia-4",
            "oooooooooo.ga \u2022 rallypoint.com \u2022 pornhub.dev \u2022 chats.pornhub.dev \u2022 https://twitter.com/PORNO_SEXYBABES \u2022 https://matrix.pornhub.dev \u2022 https://git.pornhub.dev",
            "http://dobkinfamily.com/__media__/js/netsoltrademark.php?d=www.fap18pgals.eu/cum-on-ass-porn/",
            "government.westlaw.com \u2022 hero9780.duckdns.org \u2022 hallrender.com \u2022 miles-andmore.duckdns.org",
            "https://otx.alienvault.com/indicator/url/https://miles-andmore.duckdns.org/ihFKGyel4wizIPNVvHHQQIuHfl4hEb2F6gWEXupmNDuiMJgJtshSlLFmilf3zCT2EF/index.html",
            "remote.utorrent.com [remote router logins]",
            "Tracking: http://www.trackip.net/ip \u2022 gfx.ms \u2022 dssruletracker.mo.gov [network] \u2022 earlyconnections.mo.gov \u2022 www77.trackerspy.com \u2022 ww38.track.updatevideos.com",
            "http://tracking.studyportalsmail.com/about/privacy/?cdmtw=BAAAIAEAIGmGCaIK4E8-IsDv \u2022 tracking.studyportalsmail.com \u2022 plugtrack.online",
            "http://images.startappservice.com/image/fetch/f_auto \u2022 track.smtpsendemail.com \u2022 nr-data.net [apple] \u2022 lg.as35280.net \u2022 leaseway.damstracking.com",
            "http://tvm77.fashiongup.in/tracking/track-open",
            "https://www.house.mo.gov:80/messageboard/ \u2022 extranet16.mo.gov \u2022 login.mo.gov \u2022 witness.house.mo.gov \u2022 dps.mo.gov \u2022 dev-publicdefender.mo.gov",
            "https://www.hallrender.com/wp-content/uploads/2016/02/Denver-150x150.jpg",
            "http://hallrender.com/attorney/brian-sabey \u2022 https://hallrender.com/attorney/brian-sabey \u2022 https://www.hallrender.com/attorney/brian-sabey/Accept",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-150x150.png",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-266x266.png",
            "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https://www.hallrender.com/attorney/brian-sabey/&",
            "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F&",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-48x48.png \u2022 http://2fwww.hallrender.com/",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-406x406.png \u2022 https://vcards.hallrender.com/",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-300x300.png \u2022 http://mail2.hallrender.com/",
            "hallrender.com \u2022 government.westlaw.com \u2022 http://dev.hallrender.com/ \u2022 https://mercy.hallrender.com/ \u2022 autodiscover.hallrender.com",
            "http://web2.westlaw.com/find/default.wl?tf=-1&rs=WLW9.10&referencepositiontype=S&serialnum=1987042953&fn=_top&sv=Split&referenceposition=1555&pbc=D5845283&tc=-1&ordoc=1989026578&findtype=Y&db=708&vr=2.0&rp=/find/default.wl&mt=208",
            "https://otx.alienvault.com/indicator/ip/45.56.79.23 \u2022 batchcourtexpressservices.westlaw.com \u2022 courtexpress.westlaw.com",
            "safebae.org \u2022 rp.dudaran2.com \u2022 www.safebae.org \u2022 https://safebae.org/%20%5B \u2022 https://safebae.org/about/ \u2022 https://safebae.org/",
            "https://safebae.org/wp-content/plugins/addons-for-visual-composer/assets/js/slick.min.js?ver=2.9.2 \u2022 https://api.w.org/ \u2022 247.0.198.104.bc.googleusercontent.com",
            "https://safebae.org/wp-json/ \u2022 https://safebae.org/wp-content/plugins/embed-any-document/css/embed-public.min.css?ver=2.7.4",
            "Malware Hosting: http://81.5.88.13/dbreader.exe \u2022 http://utasoft.ru/catalog/view/javascript/jquery/ui/jquery-ui-1.8.16.custom.min.js",
            "Apple Malware: http://103.246.145.111/gateonl.php?hwid=WALKER-PC-WALKER&cpuname=Intel [ Apple unlocker, decryption via media]",
            "Malware Hosting: deviceinbox.com \u2022 http://www.hakoonportal.net/240714d/240714_t2.exe \u2022103.246.145.111 \u2022 Spyware: stream.ntpserver.store",
            "https://nl.toyota.be/tme [vehicle spyware, camera, data, speakers]",
            "http://link.mcsa.org/api/LinkHandler/getaction?redirectParam2=K09weU5vMDBKWW90Wk1hcHl4SmF4NGtHbnBGbjJaVElud2tpMlBaUGhseXZNM0JLaHRaUnJZOVh1bmMvSVhYWDZhb0UwY2hPaGVuSGNDRUFYeHNzWWFQL0dBNVlRVmlTSGpXa016bUQzWUZ6cVZRcktRTmRyZHJPYlBrY1NpSyt6ZzBrS0FjWk9EYSs4WmdOc2RBU09CR1RjWVNiTUZpYkhNV1lvNzkwbzhLMUxDUzQzS0FaVU5LYTZWSUZoS1Vt",
            "sexuallybroken.info \u2022 sinful-bordello.top-sex.us \u2022 crackedtool.com \u2022 kddi-cloud.com \u2022 http://tuksex.duckdns.org/bb/login.php",
            "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software"
          ],
          "public": 1,
          "adversary": "NSO Group",
          "targeted_countries": [
            "United States of America",
            "China",
            "Australia",
            "Hong Kong"
          ],
          "malware_families": [
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "Amadey",
              "display_name": "Amadey",
              "target": null
            },
            {
              "id": "AsyncRAT",
              "display_name": "AsyncRAT",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "EVILNUM",
              "display_name": "EVILNUM",
              "target": null
            },
            {
              "id": "Dark",
              "display_name": "Dark",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Keylogger",
              "display_name": "Keylogger",
              "target": null
            },
            {
              "id": "Maze",
              "display_name": "Maze",
              "target": null
            },
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "Parallax RAT",
              "display_name": "Parallax RAT",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "QakBot",
              "display_name": "QakBot",
              "target": null
            },
            {
              "id": "QBot",
              "display_name": "QBot",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Remcos RAT",
              "display_name": "Remcos RAT",
              "target": null
            },
            {
              "id": "Ursnif",
              "display_name": "Ursnif",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-336074",
              "display_name": "Win.Trojan.Agent-336074",
              "target": null
            },
            {
              "id": "Arid.Viper_CnC",
              "display_name": "Arid.Viper_CnC",
              "target": null
            },
            {
              "id": "WininiCrypt",
              "display_name": "WininiCrypt",
              "target": null
            },
            {
              "id": "PWS:Win32/QQpass.CI",
              "display_name": "PWS:Win32/QQpass.CI",
              "target": "/malware/PWS:Win32/QQpass.CI"
            },
            {
              "id": "Win.Trojan.Midia-4",
              "display_name": "Win.Trojan.Midia-4",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "Win32/SocStealer!rfn",
              "display_name": "Win32/SocStealer!rfn",
              "target": null
            },
            {
              "id": "Backdoor.Win32.Shiz.ufj",
              "display_name": "Backdoor.Win32.Shiz.ufj",
              "target": null
            },
            {
              "id": "Email-Worm.Win32.Brontok.n",
              "display_name": "Email-Worm.Win32.Brontok.n",
              "target": null
            },
            {
              "id": "ETERNALBLUE",
              "display_name": "ETERNALBLUE",
              "target": null
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65c91f2b7c03b480379ae4d1",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2668,
            "FileHash-SHA1": 2469,
            "FileHash-SHA256": 8054,
            "URL": 6185,
            "domain": 2421,
            "hostname": 3042,
            "CVE": 5,
            "email": 15,
            "CIDR": 1,
            "IPv4": 18
          },
          "indicator_count": 24878,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "28 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69bf261cc4e399447d78776c",
          "name": "Cyber Bully Attackers | Revenge Attacks | Remote attackers | Malware Packed |",
          "description": "Several government entities, attorneys have sought porn revenge including physical violence, attempted crimes, malicious prosecution case , harassment when a female patient of man formerly known as Jeffrey Scott Reimer of Chester Springs, PA, violently, critically injured patient in a sexually charged assault [URL\thttp://foundry2-lbl.dvr.dn2.n-helix.com\t\t\t\nhttps://foundry2-lbl.dvr.dn2.n-helix.com\t\tfoundry2-lbl.dvr.dn2.n-helix.com\t\t\t\t\thttps://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/\t\t\nhttp://datafoundry.com\t\t\t\nhttp://foundry2sdbl.dvr.dn2.n-helix.com\t\t\thttps://209-99-40-223.fwd.datafoundry.com\t\t\t\ndatafoundry.com",
          "modified": "2026-03-21T23:13:32.760000",
          "created": "2026-03-21T23:13:32.760000",
          "tags": [
            "sc data",
            "data upload",
            "please sub",
            "include data",
            "extraction",
            "failed",
            "sc pulse",
            "idron anv",
            "extr please",
            "include review",
            "exclude sugges",
            "stop show",
            "typ domain",
            "united",
            "virtool",
            "name servers",
            "cryp",
            "emails",
            "win32",
            "ip address",
            "worm",
            "trojan",
            "learn",
            "suspicious",
            "informative",
            "ck id",
            "name tactics",
            "command",
            "adversaries",
            "spawns",
            "ssl certificate",
            "initial access",
            "link initial",
            "prefetch8",
            "mitre att",
            "ck matrix",
            "flag",
            "windows nt",
            "win64",
            "accept",
            "encrypt",
            "form",
            "hybrid",
            "bypass",
            "general",
            "path",
            "iframe",
            "click",
            "strings",
            "anchor https",
            "anchor",
            "liberal",
            "sabey",
            "liberal friends",
            "meta",
            "html internet",
            "html document",
            "unicode text",
            "utf8 text",
            "info initial",
            "access ta0001",
            "compromise",
            "t1189 network",
            "communication",
            "get http",
            "artifacts v",
            "full reports",
            "v get",
            "help dns",
            "resolutions",
            "ip traffic",
            "extr data",
            "enter sc",
            "extra data",
            "referen",
            "broth",
            "passive dns",
            "urls",
            "http",
            "hostname",
            "files domain",
            "files related",
            "related tags",
            "none google",
            "safe browsing",
            "inquest labs",
            "lucas acha",
            "code integrity",
            "checks creation",
            "otx logo",
            "all hostname",
            "files",
            "domain",
            "protect",
            "date",
            "title",
            "exchange",
            "se http",
            "present jan",
            "present feb",
            "present dec",
            "backdoor",
            "certificate",
            "all domain",
            "alibaba cloud",
            "hichina",
            "porkbun llc",
            "cloudflare",
            "namecheap inc",
            "namecheap",
            "domains",
            "dynadot llc",
            "ascio",
            "denmark",
            "url https",
            "filehashsha256",
            "url http",
            "dopple ai",
            "snit",
            "iocs",
            "otx description",
            "information",
            "report spam",
            "delete service",
            "poem",
            "hunter",
            "malicious",
            "porn revenge",
            "brian sabeys",
            "all report",
            "spam delete",
            "rl http",
            "https",
            "expiration http",
            "spam brian",
            "swipper",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "filehashmd5",
            "filehashsha1",
            "sha256",
            "scan",
            "learn more",
            "indicators show",
            "tbmvid",
            "sourcelnms",
            "zx1724209326040",
            "xxx videos",
            "xxxvideohd",
            "adversary",
            "packing",
            "palantir.com",
            "discovery",
            "victim won case",
            "doin it",
            "palantirian abuse",
            "apple",
            "sabey data centers",
            "insurance",
            "quasi government",
            "the brother sabey",
            "reimer",
            "law enforcement",
            "vessel state",
            "sabey porn",
            "hall evans",
            "christopher ahmann",
            "defamation",
            "google"
          ],
          "references": [
            "The Brothers Sabey \u2013 Conservatives with Liberal Friends \u2022 https://thebrotherssabey.com/",
            "http://watchhers.net/index.php",
            "http://212.33.237.86/images/1/report.php",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://webmail.police.govmm.org/owa/",
            "https://pks.wroclaw.sa.gov.pl:1443/ \u2022 portal.bialystok.sa.gov.pl",
            "https://tulach.cc/ phishing \u2022 45.32.112.220 scanning_host \u2022 45.76.79.215",
            "Mark Brian Sabey",
            "Melvin Sabey",
            "Christopher P \u2018Buzz\u2019 Ahmann",
            "Ronda Cordova",
            "Unknown Persons impersonating Private Investigators (plural)",
            "Quasi Government Case",
            "Victim silenced. Struck by Car Driven by male police let walk",
            "Denver Police let this attempted murder walk. Cited him as a ghost driver",
            "Make driver stuck victim with large vehicle after PT unknowingly reported original assault Jeffrey Reiner to Dora",
            "Sexual and Physical Assaulter - Jeffrey Scott Reimer",
            "Reimer was a PT. Unknown whereabouts , name or job description",
            "Denver Police Department Major Crimes closed investigation",
            "Investigation closed when Brian Sabey initiated a malicious prosecution case against Victim",
            "I bring up the personal nature of the crime because a delete service has been used",
            "More than 1000 IoC\u2019s including pulses have been ILLEGALLY removed",
            "All IoC\u2019s originate from sources named. There are some unknown attackers",
            "This is a serious crime. I\u2019m certain God WILL pay them.",
            "https://palantirwww.sweetheartvideo.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t3\t  domain\tpalantir.io\t\t\tMar 21, 2026, 2:06:10 PM\t\t34\t  URL\thttps://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/ \u2022 www.palantir.com",
            "http://palantirwww.sweetheartvideo.com/ (weirdness)",
            "http://foundry2-lbl.dvr.dn2.n-helix.com \u2022 https://foundry2-lbl.dvr.dn2.n-helix.com",
            "foundry2-lbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t29\t  URL\thttps://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/\t\t\tMar 21, 2026, 2:06:10 PM\t\t8\t  URL\thttp://datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t9\t  URL\thttp://foundry2sdbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t17\t  URL\thttps://209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t27\t  domain\tdatafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t40\t  hostname\t209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:1",
            "foundry2-lbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t29\t  URL\thttps://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/\t\t\tMar 21, 2026, 2:06:10 PM\t\t8\t  URL\thttp://datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t9\t  URL\thttp://foundry2sdbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t17\t  URL\thttps://209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t27\t  domain\tdatafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t40\t  hostname\t209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:1",
            "https://rdweb.datafoundry.com/RDWeb/Pages/en-US/login.aspx",
            "https://www.datafoundry.com/data-center-contamination-control/",
            "https://www.datafoundry.com/data-center-contamination-control/",
            "https://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/",
            "http://foundry2-lbl.dvr.dn2.n-helix.com/",
            "https://207-207-25-201.fwd.datafoundry.com/",
            "http://datafoundry.com \u2022 http://foundry2sdbl.dvr.dn2.n-helix.com \u2022 https://209-99-40-223.fwd.datafoundry.com \u2022 datafoundry.com \u2022 209-99-40-223.fwd.datafoundry.com \u2022 beabetta.ifoundry.co.uk.s7b2.psmtp.com \u2022 foundry2sdbl.dvr.dn2.n-helix.com \u2022 fwd.datafoundry.com \u2022 207-207-25-154.fwd.datafoundry.com \u2022 207-207-25-156.fwd.datafoundry.com\t\t\t207-207-25-160.fwd.datafoundry.com \u2022 207-207-25-163.fwd.datafoundry.com  \u2022\t207-207-25-164.fwd.datafoundry.com \u2022 207-207-25-165.fwd.datafoundry.com\t\t\tMar 21, 207-207-25-166.fwd",
            "http://datafoundry.com \u2022 https://209-99-40-223.fwd.datafoundry.com\tdatafoundry.com \u2022 209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t13\t  hostname\tbeabetta.ifoundry.co.uk.s7b2.psmtp.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t12\t  hostname\tfoundry2sdbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t18\t  hostname\tfwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t8\t  hostname\t207-207-25-154.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t19\t  hostname\t207-207-25-156.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:1",
            "https://rdweb.datafoundry.com/",
            "https://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/",
            "http://foundry2sdbl.dvr.dn2.n-helix.com/",
            "Updated | What\u2019s left after theft",
            "207-207-25-167.fwd.datafoundry.com \u2022 207-207-25-168.fwd.datafoundry.com \u2022 207-207-25-169.fwd.datafoundry.com",
            "207-207-25-170.fwd.datafoundry.com \u2022 207-207-25-171.fwd.datafoundry.com \u2022 207-207-25-201.fwd.datafoundry.com",
            "https://www.datafoundry.com/category/news/press-releases/ (Fake Press) abuse",
            "https://www.datafoundry.com/category/news/press-releases/",
            "207-207-25-209.fwd.datafoundry.com \u2022\t207-207-25-212.fwd.datafoundry.com \u2022 207-207-25-213.fwd.datafoundry.com \u2022 209-99-64-53.fwd.datafoundry.com",
            "209-99-69-91.fwd.datafoundry.com \u2022 dns1.datafoundry.com \u2022 dns2.datafoundry.com \u2022 rdweb.datafoundry.com",
            "www.go.datafoundry.com \u2022 http://207-207-25-209.fwd.datafoundry.com",
            "http://209-99-64-53.fwd.datafoundry.com \u2022 http://dns2.datafoundry.com \u2022 http://fwd.datafoundry.com",
            "http://pdns1.datafoundry.com/ \u2022\thttp://rdweb.datafoundry.com \u2022 http://rdweb.datafoundry.com/",
            "https://rdweb.datafoundry.com/ \u2022 http://www.datafoundry.com \u2022 https://207-207-25-163.fwd.datafoundry.com \u2022",
            "https://207-207-25-209.fwd.datafoundry.com \u2022 https://209-99-40-224.fwd.datafoundry.com/",
            "https://209-99-64-53.fwd.datafoundry.com \u2022 https://dns1.datafoundry.com \u2022 https://dns2.datafoundry.com \u2022 https://fwd.datafoundry.com",
            "Some may may find this content is very disturbing and offensive"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Porn Revenge",
              "display_name": "Porn Revenge",
              "target": null
            },
            {
              "id": "Tons of Malware",
              "display_name": "Tons of Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1132.001",
              "name": "Standard Encoding",
              "display_name": "T1132.001 - Standard Encoding"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1495",
              "name": "Firmware Corruption",
              "display_name": "T1495 - Firmware Corruption"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1587.001",
              "name": "Malware",
              "display_name": "T1587.001 - Malware"
            },
            {
              "id": "T1608.001",
              "name": "Upload Malware",
              "display_name": "T1608.001 - Upload Malware"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1586.001",
              "name": "Social Media Accounts",
              "display_name": "T1586.001 - Social Media Accounts"
            },
            {
              "id": "T1593.001",
              "name": "Social Media",
              "display_name": "T1593.001 - Social Media"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1080",
              "name": "Taint Shared Content",
              "display_name": "T1080 - Taint Shared Content"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1586",
              "name": "Compromise Accounts",
              "display_name": "T1586 - Compromise Accounts"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1456",
              "name": "Drive-by Compromise",
              "display_name": "T1456 - Drive-by Compromise"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584",
              "name": "Compromise Infrastructure",
              "display_name": "T1584 - Compromise Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6034,
            "domain": 1422,
            "IPv4": 883,
            "FileHash-MD5": 274,
            "FileHash-SHA1": 252,
            "FileHash-SHA256": 3378,
            "email": 11,
            "hostname": 2753,
            "CVE": 1,
            "SSLCertFingerprint": 9,
            "IPv6": 32
          },
          "indicator_count": 15049,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "28 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69bea5d2987c3d14aeb2b0c9",
          "name": "Delete service Deleted over 1200 Brian Sabeys Porn Revenge Campaign \u2022 LevelBlue?  Dopple AI | Poem Hunter: Poems ",
          "description": "",
          "modified": "2026-03-21T14:06:10.007000",
          "created": "2026-03-21T14:06:10.007000",
          "tags": [
            "active related",
            "search filter",
            "time tsara",
            "x show",
            "cidr",
            "email",
            "learn more",
            "information",
            "t1027",
            "t1036",
            "t1057",
            "discovery",
            "t1059",
            "t1071",
            "title added",
            "poem",
            "the day",
            "wild eyesand",
            "unknown power",
            "shakespeare",
            "repeats",
            "ere man",
            "dowell oreilly",
            "read poem",
            "snit",
            "website",
            "loading",
            "rl https",
            "y0 nov",
            "vj96",
            "uyebaaeabaaaaac",
            "jid442122029",
            "active",
            "url http",
            "url https",
            "types",
            "indicators show",
            "type indicator",
            "added active",
            "tbmvid",
            "sourcelnms",
            "zx1724209326040",
            "read c",
            "module load",
            "showing",
            "delphi",
            "delete",
            "rgba",
            "unicode",
            "malware",
            "write",
            "win32",
            "execution",
            "next",
            "extraction",
            "data upload",
            "extre",
            "include data",
            "sc type",
            "url tot",
            "role title",
            "tsara brashears",
            "live sex",
            "porn video",
            "levelblue",
            "porn",
            "pornhub",
            "porn videos",
            "watch tsara",
            "most relevant",
            "q estimation",
            "green",
            "tsara",
            "online chat",
            "spicychat ai",
            "visa",
            "sex chat",
            "miss stella",
            "january",
            "philadelphia",
            "dopple ai",
            "b1 dec",
            "videos",
            "red porn",
            "free porn",
            "sunny leone",
            "hardcore porn",
            "jeffrey reimer",
            "puts",
            "love",
            "super",
            "download",
            "top tsara",
            "google search",
            "la iniciacin",
            "xxx hd",
            "bdsm scene",
            "nsfw experience",
            "ck ids",
            "open threat",
            "filepath https",
            "foundry",
            "palantir",
            "brian sabey",
            "yas",
            "tiny penis",
            "slander",
            "indicator role",
            "pulses url",
            "search"
          ],
          "references": [
            "OTX must have an issue. A delete app seen before has deleted a majority of malicious IoCs. Im",
            "I don\u2019t appreciate OTX populated Malware suggestion \u2018SNIT\u2019 \u2018 Dopple AI\u2019 NOT malware",
            "OTX description for SNIT- I love to compose letters of resignation; now and then I send one in",
            "and leave in a lemon- hued Huff da Country or a Snit with four on the MALWARE fOORILIES",
            "OTX description for Dopple AI -  There\u2019s someone for everyone out there in the BDSM scene, you can enjoy the",
            "free NSFW experience offered by Dopple AI.MALWARE",
            "Makes zero sense. Malicious. I don\u2019t get it. I have a Malware gift for you too!",
            "Y.A.S:1Byte/TinyRod SeeDescription @ Y.A.S. OFFICIAL MUSIC VIDEO"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Snit",
              "display_name": "Snit",
              "target": null
            },
            {
              "id": "Dopple AI",
              "display_name": "Dopple AI",
              "target": null
            },
            {
              "id": "Y.A.S:1Byte/TinyRod",
              "display_name": "Y.A.S:1Byte/TinyRod",
              "target": "/malware/Y.A.S:1Byte/TinyRod"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1495",
              "name": "Firmware Corruption",
              "display_name": "T1495 - Firmware Corruption"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "691ead29f61101bfa3700998",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2497,
            "hostname": 742,
            "FileHash-SHA256": 523,
            "domain": 223,
            "FileHash-MD5": 85,
            "FileHash-SHA1": 56,
            "email": 4
          },
          "indicator_count": 4130,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "29 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69bea426487bffa5384c6f38",
          "name": " Brian Sabey illegally deleting IoC\u2019s | SWIPPER - Pornhub\u00bbX.Com migration to Twitter Sabey Erasing",
          "description": "",
          "modified": "2026-03-21T13:59:02.016000",
          "created": "2026-03-21T13:59:02.016000",
          "tags": [
            "url https",
            "filehashsha256",
            "browse scan",
            "report spam",
            "author",
            "output",
            "tsara brashears",
            "created",
            "days ago",
            "showing",
            "trojan",
            "win32",
            "msil",
            "trojanspy",
            "virtool",
            "scan endpoints",
            "all search",
            "otx scoreblue",
            "author avatar",
            "fraud",
            "june",
            "worm",
            "search",
            "tsara type",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "url http",
            "ipv6",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "sort",
            "least",
            "researched",
            "f https",
            "scan",
            "iocs",
            "learn more",
            "filehashmd5",
            "hostname",
            "domain",
            "indicators show",
            "browser",
            "unsupported",
            "view",
            "continue",
            "watch tsara",
            "searchtsa",
            "brashears",
            "most relevant",
            "porn videos",
            "download",
            "google search",
            "open threat",
            "babe",
            "green",
            "daily",
            "play",
            "fullscreen",
            "tsara",
            "videos",
            "love",
            "top tsara",
            "xxx videos",
            "hardcore porn",
            "jeffrey reimer",
            "puts",
            "porn",
            "javascript",
            "body",
            "creation date",
            "record value",
            "united",
            "gmt content",
            "gmt max",
            "age900",
            "httponly x",
            "date",
            "unknown",
            "pragma",
            "levelblue",
            "exchange open",
            "threat exchange",
            "indicator",
            "safebae",
            "get involved",
            "anyone else",
            "press",
            "data reports",
            "teen students",
            "become",
            "chapter lead",
            "become a",
            "certified peer",
            "district",
            "brian sabey",
            "sabey data",
            "hallrender",
            "sabey data centers",
            "swipper",
            "mark b sabey",
            "m brian sabey",
            "2beeg",
            "thebrotherssabey",
            "urls",
            "show",
            "cloudflarenet",
            "us urlscan",
            "skip",
            "accessibility",
            "all images",
            "videos shopping",
            "forums news",
            "web more",
            "tools",
            "service",
            "malicious",
            "size",
            "recent",
            "off blur",
            "find",
            "summary",
            "securitytrails",
            "urlscan https",
            "tryporn",
            "icann whois",
            "data problem",
            "disclaimer",
            "judaporn",
            "kompoz",
            "blur filter",
            "search results",
            "xxxvideohd",
            "hacker news",
            "item",
            "url",
            "website",
            "web",
            "scanner",
            "analyze",
            "analyzer",
            "september",
            "domains",
            "sale worldwide",
            "street",
            "gate parkway",
            "stateprovince",
            "postal code",
            "route",
            "open",
            "watch",
            "links",
            "footer",
            "delete see",
            "delete c",
            "tofsee",
            "grum",
            "entries",
            "cape",
            "high",
            "total",
            "copy",
            "write",
            "malware",
            "patched",
            "next",
            "please"
          ],
          "references": [
            "http://hghltd.yandex.net/yandbtm?fmode=inject&url=http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
            "thebrotherssabey.wordpress.com | https://hallrender.com/attorney/brian-sabey",
            "https://twitter.com/ootiosum/status/1812208222150726029a4dmHAxV0M0QIHawADl4Qr4kDegUI-QEQAA&usg=AOvVaw37yALadqlgoR9_xlQ5B4Hm",
            "https://thebrotherssabey.wordpress.com/wp-admin/customize.php?url=https://thebrotherssabey.wordpress.com/",
            "https://SafeBae.org |  https://www.sweetheartvideo.com/tsara-brashearsAccept-Language",
            "http://sexiezpics.com/tsara-brashears-hardcore-porn | https://www.sweetheartvideo.com/tsara-brashearsAccept-Language",
            "https://urlscan.io/domain/cdn2e-videos2.yjcontentdelivery.com | http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html",
            "https://www.google.com/search?client=ms-android-tcl-rvo2b&sca_esv=677ff2260c38da6a&sca_upv=1&q=tsara%20brashears&tbm=vid&source=lnms&fbs=AEQNm0Aa4sjWe7Rqy32pFwRj0UkWd8nbOJfsBGGB5IQQO6L3J5MIFhvnvU242yFxzEEp3BfRFWcyM5BvpTgNzM3vKj4sz-C2iLdc_0v0iAkScdtYjVPIGyVlvwujMCY6xcQ3LIupWIQPyPPfztGwIqpQ9H2EXqXXY4GBGq8hpekXoFuduDqktZzSriMQxAlKPjQviXaDVnUYcgWw9ejzcyECyIGanCUinw&sa=X&biw=1128&bih=1971&dpr=2&no_sw_cr=1&zx=1724209326040&sssc=1",
            "bfxxxhindi.to | https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://billpay.stcu.org/csp/ws/ALKAMI-S5M/html/PC_Remote_Role_Due_XP_Help/role1_faq_email_notifications.html  billpay.stcu.org",
            "bfxxxhindi.to  www.bfxxxhindi.to  https://www.bfxxxhindi.to   tsara brashears bfxxxhindi.to https://www.bfxxxhindi.to/trend/eaUvPMTg3NzMytY07Q/",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer/",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead/. http://www.music-forum.org/www-cixiu888-com-tsara-brashears.html",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "http://hghltd.yandex.net/yandbtm?fmode=inject&url=http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
            "http://alohatube.xyz/search/tsara-brashears  http://alohatube.xyz/search/tsara-brashears/",
            "http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-sexual-misconduct-miscinception.html",
            "http://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concentra-medic",
            "http://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concentra-medical-center",
            "http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html",
            "http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-medical.html",
            "http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-misconduct-miscinception.html",
            "http://videolal.com/tsara-brashears-assaulted-by-jeffrey-reimer.html  http://videolal.com/tsara-brashears-dead-or-alive-song-rap.html",
            "http://videolal.com/tsara-brashears-pueblo.html , http://videolal.com/tsara-brashears.html",
            "http://pornbitter.com/storage/tsara-brashears/  http://www.gdsl-pallemoebler.info/seach/tsara-brashears/ advocate-smyslova.ru",
            "http://browntubeporn.com/tsara-brashears.html  browntubeporn.com  http://pornvideoj.com/tsara-brashears.htm",
            "pornhub.com/gay/video/search?search=tsara%2Blynn%2Bbrashears%2Blesbian",
            "feestzalenvanvlaanderen.be  www.gdsl-pallemoebler.info  http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us",
            "http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us  www.tryporn.net",
            "http://www.gdsl-pallemoebler.info/seach/tsara-brashears/ advocate-smyslova.ru  feestzalenvanvlaanderen.be www.gdsl-pallemoebler.info",
            "http://www.tryporn.net/seach/tsara-brashears/  hicksandchicks.org redpornvideos.net   http://advocate-smyslova.ru/tsara-brashears/",
            "http://flexporn.net/tsara-brashears.html  http://onlyindianporn.net/videos/tsara-brashears/  http://pornbitter.com/storage/tsara-brashears/",
            "http://pornpx.com/trends/tsara-brashears-submission-on-august-27-via-manual/1/ http://www.potnhub.org/tsara-brashears.html",
            "http://www.bukaporn.net/trend/tsara-brashears/  http://onlyindianporn.tv/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concentra",
            "http://www.sexpornimages.com/tsara/tsara-lynn-brashears-porn/7x56y.html",
            "www.sexpornimages.com http://hicksandchicks.org/ju/tsara-brashears/  hlebo.mobi  pornpx.com  www.potnhub.org",
            "http://wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Language  http://www.music-forum.",
            "http://kompoz.me/find/tsara-brashears-submission-on-august-27-via-manual/  http://redpornvideos.net/tsara-brashears.html",
            "https://wallpapers-nature.com/  https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "https://wallpapers-nature.com/tsara-brashears/urlscan-io   https://www.sweetheartvideo.com/tsara-brashears",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net  https://www.sweetheartvideo.com/tsara-brashears/",
            "https://www.sweetheartvideo.com/tsara-brashears/ | https://www.sweetheartvideo.com/tsara-brashearsAccept-Language",
            "https://www.sweetheartvideo.com/tsara-brashearsAccept-Language | https://wallpapers-nature.com/tsara-brashears/urlscan-io",
            "http://hghltd.yandex.net/yandbtm?fmode=inject&url=http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
            "https://xlxx.mobi phishing\thttps://2beeg.me   https://2beeg.net  https://www.redporn.video   https://youjizz.sex  2beeg.me xlxx.mobi ladys.one",
            "tsara-brashears-deadspin-twitter-suspended-account-help.ht  videolal.com  wallpapers-nature.com   www.sweetheartvideo.com",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/  Domain mom2fuck.mobi   https://youjizz.sex/tsara-brashears.html   https://youjizz.sex",
            "http://amp.mypornvid.fun/videos/2/SLFGMWoQaCU/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears",
            "http://pixelrz.com/lists/keywords/tsara-brashears-assaulted-by-jeffrey-reimer  http://pixelrz.com/lists/keywords/brashears-tsara-buzz-news",
            "http://pixelrz.com/lists/keywords/%20dr-jeffrey-reimer-dpt-funds-tsara-brashears/ https://xlxx.mobi",
            "http://pixelrz.com/lists/keywords/dr-jeffrey-reimer-dpt-funds-tsara-brashears/  orangeporntube.net   www.tryporno.net",
            "http://pixelrz.com/lists/keywords/tsara-brashears-massage-misconduct-misconception  http://pixelrz.com/lists/keywords/tsara-brashears-dead/  http://orangeporntube.net/tsara-brashears.html",
            "http://www.tryporno.net/movies/tsara-brashears/  http://www.pixelrz.com/lists/keywords/tsara-brashears/",
            "https://kompoz.me/find/tsara-brashears-submission-on-august-27-via-manual/  sexiezpics.com",
            "http://sexiezpics.com/tsara-brashears-hardcore-porn http://mypornvid.com/videos/27/x510fb2/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/caillou-finger-family",
            "http://pixelrz.com/lists/keywords/tsara-brashears-assaulted-at-concentra/   http://pornohata.com/mov/tsara-brashears/",
            "http://onlyindianporn2.com/videos/tsara-brashears/   onlyindianporn2.com-porn.html   aninditaannisa.blogspot.com   porno-trash.net",
            "myhotzpic.com  pornohata.com pornstarsporno.net aninditaannisa.blogspot.com/2019/02/tsara-brashears",
            "http://pornstarsporno.net/tsara-brashears.html  http://vtwctr.org/explore/inmate-tsara-brashears/",
            "https://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara%20-brashears-massage-nearby.html",
            "Hostname aninditaannisa.blogspot.com No Expiration\t0\t  URL aninditaannisa.blogspot.com/2019/02/tsara-brashears-porn.html  billpay.stcu.org",
            "http://hghltd.yandex.net/yandbtm?fmode=inject&url=http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
            "https://thebrotherssabey.wordpress.com/wp-admin/customize.php?url=https://thebrotherssabey.wordpress.com/",
            "thebrotherssabey.wordpress.com http://www.sabey.com | http://resources.sabeydatacenters.com | http://root.sabeydatacenters.com",
            "http://go.sabey.com http://vpn2.sabey.com | http://resources.sabeydatacenters.com | http://root.sabeydatacenters.com |",
            "http://itsupport.sabey.com http://www.sabey.com | http://root.sabeydatacenters.com/ | http://server1.sabeydatacenters.com | http://smtp1.sabeydatacenters.com No Expiration\t http://smtps.sabeydatacenters.com | http://smtpseguro.sabeydatacenters.com",
            "http://sabey.com/construction/ | https://tulach.cc/ | sabeydatacenters.com | https://thebrotherssabey.com | http://root.sabeydatacenters.com/ No Expiration\t0\t  URL http://server1.sabeydatacenters.com No Expiration\t0\t  URL http://smtp1.sabeydatacenters.com No Expiration\t http://smtps.sabeydatacenters.com | http://smtpseguro.sabeydatacenters.com | http://staging.sabeydatacenters.com",
            "https://info.sabeydatacenters.com/webmail/404532/1590752290/6c9ed1e0b6b364689835e8c6bd51ed2198f99ee8ec7fa1924787e4e9b6382872",
            "forceusercontent.com | sabey.com | tulach.cc | http://thebrotherssabey.com/2018m.sabeydatacenters.com | https://www.vpn.sabey.com/",
            "root.sabeydatacenters.com | server1.sabeydatacenters.com | smtps.sabeydatacenters.com | smtpseguro.sabeydatacenters.com",
            "https://thebrotherssabey.com | https://thebrotherssabey.com/2015/08/24/why | staging.sabeydatacenters.com |",
            "authsmtp.sabeydatacenters.com | go.sabey.com | thebrotherssabey.com | mx5.sabeydatacenters.com | posta.sabeydatacenters.com",
            "remote.files.downloadnow-1.com | remote.sabeydatacenters.com | poczta.sabeydatacenters.com | pop.sabeydatacenters.com",
            "https://thebrotherssabey.com/2018/12/05/nature | https://thebrotherssabey.com/2019/01/20/miracle/ | https://thebrotherssabey.com/20",
            "https://thebrotherssabey.com/2015/08/24/why  | https://thebrotherssabey.com/2016/03/12/how | https://thebrotherssabey.com/2017/04/17/truth",
            "https://thebrotherssabey.com/2016/01/18/ballroom | resources.sabeydatacenters.com | https://thebrotherssabey.com/feed/",
            "https://thebrotherssabey.com/comments/feed/ | mail2.sabeydatacenters.com | mails.sabeydatacenters.com | newmail.sabeydatacenters.com",
            "http://staging.sabeydatacenters.com | https://sabey.com/careers/ | https://vpn2.sabey.com | https://www.sabey.com | https://www.vpn.sabey.com |",
            "https://info.sabeydatacenters.com/emailPreference/epc/404532/EcSDdxFsTp4vgdAzwbcD5rWn7oROwp5s8Buq0L48dF0/732bdcab2311714bb73d4d507e6508d215afb4dbc511",
            "1a8fc49a4265fe146976/1523680312 |  https://thebrotherssabey.com/2018/04/22/the  |  https://thebrotherssabey.com/2019/07/08/suffering",
            "https://info.sabeydatacenters.com/listUnsubscribeHeader/u/404532/732bdcab2311714bb73d4d507e6508d215afb4dbc5111a8fc49a4265fe14697",
            "https://info.sabeydatacenters.com/r/404532/1/1523680312/open/1 | http://onlyindianporn2.com/videos/dia-sabey/?p=13",
            "https://thebrotherssabey.com/category/pregnancy | https://thebrotherssabey.com/discourse | onlyindianporn2.com",
            "https://thebrotherssabey.com/2019/01/20/miracle/?share=twitter | https://thebrotherssabey.com/author/dbsabey/",
            "https://thebrotherssabey.com/author/thebrotherssabey/ | https://thebrotherssabey.com/category/homosexuality",
            "https://thebrotherssabey.com/2018/12/05/nature-of-scripture-part-5-conclusions/ | https://thebrotherssabey.com/2019/08/01/why",
            "mypornvid.fun | porn100.tv | amp.mypornvid.fun | cdn10.mypornvid.fun | cdn11.mypornvid.fun | cdn5.mypornvid.fun | cdn8.mypornvid.fun",
            "www.anyxxxtube.net | sv2.mypornvid.fun | www.porn100.tv | www.redporn.video | https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing |",
            "http://amp.mypornvid.fun/videos/2/SLFGMWoQaCU/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears",
            "anybunny.tv | http://anybunny.tv/search/eva-lisa | http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us",
            "https://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-nearby.html. |",
            "http://onlyindianporn.tv/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concent | http://wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Languauge",
            "onlyindianporn.tv | sexpornimages.com | http://www.sexpornimages.com/hillary/hillary-clinton",
            "https://mypornvid.fun/videos/3/o00vnGgcVx0/dude-sex-fuck-a-deer-wapporn-video-com/fuck-deer",
            "http://www.sexpornimages.com/tsara/tsara-lynn-brashears-porn/7x56y.html",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead/ | http://videolal.com/tsara-brashears-dead-by-daylight.html",
            "http://videolal.com/tsara-brashears-dead-or-alive-song-rap.html | http://videolal.com/tsara-brashears-dead.html |",
            "https://thebrotherssabey.com/comments/feed/ | https://thebrotherssabey.com/2019/01/20/miracle/",
            "https://videolal.com/videos/tsara-brashears-dead-by-daylight.html | tsara-brashears-deadspin-twitter-suspended-account-help.ht",
            "https://thebrotherssabey.com/2018/12/05/nature | https://thebrotherssabey.com/2017/04/17/truth",
            "https://thebrotherssabey.com/2016/03/12/how | https://thebrotherssabey.com/2016/01/18/ballroom",
            "https://thebrotherssabey.com/comments/feed/ | https://thebrotherssabey.com/category/pregnancy",
            "https://thebrotherssabey.com/feed/ | https://thebrotherssabey.com/discourse | https://thebrotherssabey.com/comments/feed/",
            "https://thebrotherssabey.com/2015/08/24/why | https://thebrotherssabey.com/20 | https://thebrotherssabey.com | https://thebrotherssabey.com",
            "http://thebrotherssabey.com/2018 | https://thebrotherssabey.com/2019/01/20/miracle/ | https://thebrotherssabey.com/2019/07/08/suffering",
            "https://thebrotherssabey.com/category/pregnancy | https://thebrotherssabey.com/category/homosexuality",
            "https://thebrotherssabey.com/author/thebrotherssabey/  | https://thebrotherssabey.com/author/dbsabey/",
            "http://siteinlink.d1.cnbd.net/site/maps.google.com.lb/ | https://www.applefilmaker.com | https://www.applefilmaker.com/1odbU3D",
            "www.wwwgitlab.gitlab.git.git.gitlab.git.128-199-7-137.cprapid.com",
            "https://thebrotherssabey.wordpress.com/wp-admin/customize.php?url=https://thebrotherssabey.wordpress.com/",
            "https://hallrender.com/attorney/brian-sabey | https://thebrotherssabey.com/2019/01/20/miracle/?share=twitter",
            "storage.ladys.one ladys.one: | http://photos.ladys.one ladys.one: | http://porno.ladys.one ladys.one: | http://storage.ladys.one ladys.one: | http://xxx-videos.ladys.one ladys.one:",
            "http://www.xvxx.me/clips/nadia-ali-hardcore/199530/",
            "https://kompoz2.com/tv/454575/blonde-slut-sara-jay-with-big-ass-is-fucked-in-doggy-style.html",
            "http://onlyindianporn2.com/videos/vichatter-young-11//title/0.7292669771257236"
          ],
          "public": 1,
          "adversary": "Brian Sabey | Tulach | Sabey Data Centers",
          "targeted_countries": [
            "United States of America",
            "Netherlands",
            "United Kingdom of Great Britain and Northern Ireland"
          ],
          "malware_families": [
            {
              "id": "Win32/Tofsee.AX",
              "display_name": "Win32/Tofsee.AX",
              "target": null
            },
            {
              "id": "Trojan:Win32/Muldrop",
              "display_name": "Trojan:Win32/Muldrop",
              "target": "/malware/Trojan:Win32/Muldrop"
            }
          ],
          "attack_ids": [
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1586.001",
              "name": "Social Media Accounts",
              "display_name": "T1586.001 - Social Media Accounts"
            },
            {
              "id": "T1055.013",
              "name": "Process Doppelg\u00e4nging",
              "display_name": "T1055.013 - Process Doppelg\u00e4nging"
            },
            {
              "id": "T1080",
              "name": "Taint Shared Content",
              "display_name": "T1080 - Taint Shared Content"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "66eb08c239be3721ab6c9050",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 121,
            "FileHash-SHA1": 116,
            "FileHash-SHA256": 443,
            "URL": 1878,
            "domain": 312,
            "hostname": 518,
            "email": 5,
            "CIDR": 1,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 3395,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "29 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b49ad5dd40a24d83cd6a72",
          "name": "Chris P. Ahmann \u2022 PRIVATE PROPERTY Colorado State Fixer!",
          "description": "",
          "modified": "2026-03-13T23:16:37.716000",
          "created": "2026-03-13T23:16:37.716000",
          "tags": [
            "related pulses",
            "p1377925676",
            "gaz1",
            "sid1696503456",
            "sct1",
            "active",
            "dynamicloader",
            "medium",
            "write c",
            "search",
            "show",
            "high",
            "program gateway",
            "http traffic",
            "http",
            "write",
            "malware",
            "nivdort",
            "serving ip",
            "address",
            "status code",
            "kb body",
            "sha256",
            "gw5hjz7t975",
            "url https",
            "url http",
            "indicator role",
            "pulses url",
            "hostname",
            "poland unknown",
            "present sep",
            "present jul",
            "present may",
            "present apr",
            "present dec",
            "present jan",
            "moved",
            "passive dns",
            "ip address",
            "title",
            "location poland",
            "asn as29522",
            "gmt content",
            "accept encoding",
            "ipv4 add",
            "urls",
            "files",
            "reverse dns",
            "united",
            "record value",
            "aaaa",
            "mtb oct",
            "found",
            "error",
            "read c",
            "memcommit",
            "module load",
            "next",
            "showing",
            "trojan",
            "execution",
            "unknown",
            "entries",
            "ms windows",
            "intel",
            "as15169",
            "codeoverlap",
            "yara detections",
            "delphi",
            "worm",
            "win32",
            "win64",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "spawns",
            "ssl certificate",
            "execution att",
            "script urls",
            "treece alfrey",
            "meta",
            "germany unknown",
            "for privacy",
            "title added",
            "active related",
            "pulses",
            "asnone",
            "named pipe",
            "type indicator",
            "role title",
            "added active",
            "filehashsha256",
            "ally",
            "melika",
            "information",
            "law christopher",
            "https",
            "fake pinterest",
            "tsara",
            "traceback man",
            "expiro",
            "capture",
            "domain",
            "types of",
            "germany",
            "poland",
            "netherlands",
            "cve cve20178977",
            "boobs130432 nov",
            "learn more",
            "filehashmd5",
            "utmsourceawin",
            "pe32",
            "head microsoft",
            "delete",
            "main",
            "backdoor",
            "next associated",
            "gmt connection",
            "control",
            "content type",
            "twitter",
            "certificate",
            "redirect date",
            "cache",
            "unknown ns",
            "hostname add",
            "ipv4",
            "pulse pulses",
            "location united",
            "america flag",
            "america asn",
            "windows",
            "total",
            "ids detections",
            "url add",
            "related nids",
            "files location",
            "flag united",
            "win32mydoom nov",
            "domain add",
            "yara rule",
            "ee fc",
            "ff d5",
            "f0 ff",
            "eb e1",
            "ff ff",
            "c1 e8",
            "c1 c0",
            "eb e8",
            "mpress",
            "cache control",
            "x cache",
            "date",
            "name servers",
            "arial",
            "present aug",
            "present jun",
            "may god",
            "hall render",
            "palantir doing",
            "jeffrey scott",
            "jeffrey reimer",
            "brian sabey",
            "butt pirates",
            "scott reimer",
            "colorado",
            "quasi government",
            "workers compensation",
            "eva lisa",
            "eva reimer",
            "sammie",
            "montano mark",
            "death threats",
            "tulach",
            "hired hit men",
            "gay man",
            "gay porn",
            "concentra",
            "corruption",
            "palantir",
            "foundry",
            "grifter",
            "warning",
            "illegal",
            "apple",
            "contacted",
            "ransom",
            "dead",
            "denver"
          ],
          "references": [
            "https://tamlegal.com/attorneys/christopher-p-ahmann/#breadcrumb \u2022 https://www.milehighmedia.com/en/movies",
            "https://www.milehighmedia.com/legal/2257 \u2022 https://www.milehighmedia",
            "www.milehighmedia.com  \u2022 https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512",
            "https://www.milehighmedia.com/en/login/index/aHR0cHMlM0ElMkYlMkZtZW1iZXJzLm1pbGVoaWdobWVkaWEuY29tJTJGZW4lMkZ2aWRlb3MlMkZzd2VldGhlYXJ0dmlkZW8lM0ZhbHVwJTNEQURqeF9ITjhfd1oweU96UnpsU3NNNUZLaVVxSzBXNEN0X3NmTFpKTGVJc3M2b0RVUzkwVmp6VllNVko5eFpmdENYcFNKd3IzOTNaMG1mOEpXeVhVeVZpLTJZYVRsaGd3M25DSDRpYnRwZ25BRC1zUFhDQVUycjZJOXo2WWtRMzNVWVFhMFZyWC1YckxvcnRkVjJZdEgxSDYxZ1lhMTFNS3RZSkEzY3FlSXhFQzhtSlAzSk1tbloySURMQXlMZndPcHozSFFiTzF4T0FseXJIQ0xYem1ldFElMkE=\t \thttp://www.milehighmedia.com/?ats=eyJhIjoyOTYzMTgsImMiOjU3OTYzNz",
            "http://www.milehighmedia.com/legal\t \u2022  https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.milehighmedia.com/de/MileHighMedia/scene/129689?utm_source=271174&utm_medium=affiliate&utm_campaign=",
            "http://www.milehighmedia.com/?ats=eyJhIjoyOTYzMTgsImMiOjU3OTYzNzc1LCJuIjo3NiwicyI6NT...",
            "ttps://www.milehighmedia.com/scene/4404473/creampie-adventures-scene-2-sneaky-melanie",
            "https://www.milehighmedia.com/join \u2022 https://www.milehighmedia.com/models \u2022 https://www.milehighmedia.com/movies",
            "https://www.milehighmedia.com/model/59136/avi-love \u2022https://www.milehighmedia.com/model/60418/Justin-Hunt \u2022",
            "https://www.milehighmedia.com/en/photo/milehighmedia/The-Mother-I-Cant-Resist/52380",
            "https://www.milehighmedia.com/en/movies \u2022  https://www.milehighmedia.com/join",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "pornhub-e.com \u2022 www.pornhub.com \u2022",
            "https://www.sweetheartvideo.com/tsara-brashears/ \u2022 www.sweetheartvideo.com",
            "https://www.sweetheartvideo.com/en/?s=1?s=1&utm_source=272160&utm_medium=affiliate&utm_campaign=lovelezzies",
            "https://www.sweetheartvideo.com/en/dvd/Lesbian-Massage/49895",
            "https://www.sweetheartvideo.com/en/dvds \u2022 https://www.sweetheartvideo.com/en/login",
            "https://www.sweetheartvideo.com/en/model/Mona-Wales/49601 \u2022 https://www.sweetheartvideo.com/en/scene/Truth-Dare--Boobs/130432 No Expiration\t0\t  URL https://www.sweetheartvideo.com/it/model/Kristen-Scott/50432 \u2022 https://www.sweetheartvideo.com/model/63710/brandi-love",
            "https://www.sweetheartvideo.com/scenes?models=63710",
            "https://www.sweetheartvideo.com/model/63710/brandi-love",
            "https://www.sweetheartvideo.com/scenes?models=63710",
            "https://www.sweetheartvideo.com/it/model/Kristen-Scott/50432",
            "https://www.sweetheartvideo.com/en/scene/Truth-Dare--Boobs/130432",
            "https://www.milehighmedia.com/en/photo/milehighmedia/The-Mother-I-Cant-Resist/52380",
            "https://www.vgt.pl/font/roboto/Roboto-Bold.eot  \u2022",
            "https://www.vgt.pl/94.152.152.233/images/logo.png",
            "https://www.vgt.pl/94.152.156.22/logo.png \u2022 https://www.vgt.pl/css/",
            "https://www.vgt.pl/favicon.ico",
            "https://www.vgt.pl/font/fa/fontawesome-webfont.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Bold.ttf  \u2022  https://www.vgt.pl/font/roboto/Roboto-Light.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Medium.ttf",
            "https://www.vgt.pl/font/roboto/Roboto-Light.ttf  \u2022",
            "https://www.vgt.pl/static/js/bootstrap-typeahead.jstic/js/bootstrap-typeahead.js",
            "https://www.vgt.pl/style/style.css \u2022 https://www.vgt.pl/font/roboto/Roboto-Medium.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Regular.ttf \u2022 https://www.vgt.pl/font/roboto/Roboto-Thin.eot",
            "https://www.vgt.pl/static/js/bootstrap-typeahead.js.179.252.2",
            "https://www.vgt.pl/font/roboto/Roboto-Thin.ttf \u2022 https://www.vgt.pl/static/js/bootstrap-typeahead.js",
            "https://www.vgt.pl/font/roboto/Roboto-Regular.eot \u2022 https://www.vgt.pl/94.152.156.22/logo.png \u2022 https://www.vgt.pl/css/",
            "vgt.pl \u2022 www.hak.vgt.pl \u2022 www.localhost.vgt.pl \u2022 www.certyfikat.vgt.pl \u2022 aristocrat.vgt.pl",
            "https://www.vgt.pl/ phishing \u2022 https://vgt.pl/ \u2022www.vgt.pl \u2022 https://www.vgt.pl/94.152.152.233/images/logo.png",
            "http://www.pornokind.vgt.pl \u2022 https://dbkuewww.m.vgt.pl \u2022 https://lokalnyhost.vgt.pl \u2022 www.xn--twj-hna.pedofil.vgt.pl",
            "http://www.hak.vgt.pl \u2022 http://pornokind.vgt.pl \u2022 http://sip.vgt.pl \u2022 http://smtp-qa.vgt.pl \u2022  http://vgt.pl/*.",
            "https://pornokind.vgt.pl \u2022 https://sip.vgt.pl \u2022 https://smtp-qa.vgt.pl \u2022 https://www.vgt.pl/94.152.156.22/logo.png",
            "www.localhost.vgt.pl \u2022 www.certyfikat.vgt.pl \u2022 https://www.vgt.pl/94.152.152.233/images/logo.png",
            "https://www.vgt.pl/css/ \u2022 https://www.vgt.pl/favicon.ico \u2022 https://www.vgt.pl/font/fa/fontawesome-webfont.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Bold.eot \u2022 https://www.vgt.pl/font/roboto/Roboto-Bold.ttf \u2022 https://www.vgt.pl/font/roboto/Roboto-Light.eot",
            "https://www.vgt.pl/static/js/bootstrap-typeahead.jstic/js/bootstrap-typeahead.js",
            "https://www.vgt.pl/style/style.css \u2022 https://www.vgt.pl/static/js/bootstrap-typeahead.js",
            "IP Address 94.152.58.192 Location  Poland ASN AS29522 h88 s.a. Nameservers ns1.kei.pl. ,  ns2.kei.pl.",
            "www.happylifehappywife.com \u2022  http://www.happylifehappywife.com/2010/02/'>",
            "http://www.happylifehappywife.com/2010/04/'> \u2022 http://www.happylifehappywife.com/2010/05/'>",
            "http://www.happylifehappywife.com/2010/07/'> \u2022 http://www.happylifehappywife.com/2010/09/'>",
            "http://www.happylifehappywife.com/2011/06/'> \u2022 http://www.happylifehappywife.com/2011/08/'",
            "http://www.happylifehappywife.com/2011/08/'> \u2022 http://www.happylifehappywife.com/2012/07/'>",
            "http://www.happylifehappywife.com/2013/03/'> \u2022 http://www.happylifehappywife.com/index.php",
            "http://www.happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg",
            "https://amp.mypornvid.fun/videos/8/AhxS-ej1myg/gf-18-com/\ud83c\udf81-i39m-your-present-\ud83c\udf81-girlfriend-surprises-you-for-christmas-reunion-soft-kisses-amp-cuddles",
            "8-25-220-162-static.reverse.queryfoundry.net\t\t\tNov 1, 2025, 9:34:14 AM\t\t5\t  domain\tqueryfoundry.net\t\t\tNov 1, 2025, 9:34:14 AM\t\t8\t  URL\thttp://117-114-251-162-static.reverse.queryfoundry.net/",
            "http://watchhers.net/index.php",
            "remotewd.com device local",
            "nr-data.net \u2022 applemusic-spotlight.myunidays.com \u2022  init.ess.apple.com \u2022 tv.apple.com",
            "https://browntubeporn.com/tsara-brashearsAccept-Language",
            "https://cg864.myhotzpic.com phishing \u2022 http://dashboard.myhotzpic.com/",
            "https://myhotzpic.com/tsara-brashears-hardcore-lesbian-sex/anime-studio.org*thumbs-fa...",
            "https://mypornvid.com/videos/27/x510fb2/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/caillou-finger",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead \u2022 http://siteinlink.d1.cnbd.net/site/maps.google.com.lb/",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead   \u2022 https://videolal.com/videos/tsara-brashears-dead-by-daylight.html",
            "http://pixelrz.com/lists/keywords/tsara-brashears-dead/360 \u2022 http://pixelrz.com/lists/keywords/tsara-brashears-dead/360] No Expiration\t4\t  Domain tsara-brashears-deadspin-twitter-suspended-account-help.ht",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
            "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
            "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "Worm:Win32/Autorun",
              "display_name": "Worm:Win32/Autorun",
              "target": "/malware/Worm:Win32/Autorun"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Jaik",
              "display_name": "Jaik",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qshell",
              "display_name": "Trojan:Win32/Qshell",
              "target": "/malware/Trojan:Win32/Qshell"
            },
            {
              "id": "Trojan:Win32/Mydoom",
              "display_name": "Trojan:Win32/Mydoom",
              "target": "/malware/Trojan:Win32/Mydoom"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "69631fbd16e306ee2b76c4da",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8897,
            "domain": 2102,
            "hostname": 2867,
            "FileHash-SHA256": 3886,
            "FileHash-MD5": 619,
            "FileHash-SHA1": 555,
            "CVE": 3,
            "email": 5,
            "SSLCertFingerprint": 8
          },
          "indicator_count": 18942,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "36 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b496396ca4987e95ad37d1",
          "name": "Chris Buzz by QVashni (wow)",
          "description": "",
          "modified": "2026-03-13T22:56:57.314000",
          "created": "2026-03-13T22:56:57.314000",
          "tags": [
            "related pulses",
            "p1377925676",
            "gaz1",
            "sid1696503456",
            "sct1",
            "active",
            "dynamicloader",
            "medium",
            "write c",
            "search",
            "show",
            "high",
            "program gateway",
            "http traffic",
            "http",
            "write",
            "malware",
            "nivdort",
            "serving ip",
            "address",
            "status code",
            "kb body",
            "sha256",
            "gw5hjz7t975",
            "url https",
            "url http",
            "indicator role",
            "pulses url",
            "hostname",
            "poland unknown",
            "present sep",
            "present jul",
            "present may",
            "present apr",
            "present dec",
            "present jan",
            "moved",
            "passive dns",
            "ip address",
            "title",
            "location poland",
            "asn as29522",
            "gmt content",
            "accept encoding",
            "ipv4 add",
            "urls",
            "files",
            "reverse dns",
            "united",
            "record value",
            "aaaa",
            "mtb oct",
            "found",
            "error",
            "read c",
            "memcommit",
            "module load",
            "next",
            "showing",
            "trojan",
            "execution",
            "unknown",
            "entries",
            "ms windows",
            "intel",
            "as15169",
            "codeoverlap",
            "yara detections",
            "delphi",
            "worm",
            "win32",
            "win64",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "spawns",
            "ssl certificate",
            "execution att",
            "script urls",
            "treece alfrey",
            "meta",
            "germany unknown",
            "for privacy",
            "title added",
            "active related",
            "pulses",
            "asnone",
            "named pipe",
            "type indicator",
            "role title",
            "added active",
            "filehashsha256",
            "ally",
            "melika",
            "information",
            "law christopher",
            "https",
            "fake pinterest",
            "tsara",
            "traceback man",
            "expiro",
            "capture",
            "domain",
            "types of",
            "germany",
            "poland",
            "netherlands",
            "cve cve20178977",
            "boobs130432 nov",
            "learn more",
            "filehashmd5",
            "utmsourceawin",
            "pe32",
            "head microsoft",
            "delete",
            "main",
            "backdoor",
            "next associated",
            "gmt connection",
            "control",
            "content type",
            "twitter",
            "certificate",
            "redirect date",
            "cache",
            "unknown ns",
            "hostname add",
            "ipv4",
            "pulse pulses",
            "location united",
            "america flag",
            "america asn",
            "windows",
            "total",
            "ids detections",
            "url add",
            "related nids",
            "files location",
            "flag united",
            "win32mydoom nov",
            "domain add",
            "yara rule",
            "ee fc",
            "ff d5",
            "f0 ff",
            "eb e1",
            "ff ff",
            "c1 e8",
            "c1 c0",
            "eb e8",
            "mpress",
            "cache control",
            "x cache",
            "date",
            "name servers",
            "arial",
            "present aug",
            "present jun",
            "may god",
            "hall render",
            "palantir doing",
            "jeffrey scott",
            "jeffrey reimer",
            "brian sabey",
            "butt pirates",
            "scott reimer",
            "colorado",
            "quasi government",
            "workers compensation",
            "eva lisa",
            "eva reimer",
            "sammie",
            "montano mark",
            "death threats",
            "tulach",
            "hired hit men",
            "gay man",
            "gay porn",
            "concentra",
            "corruption",
            "palantir",
            "foundry",
            "grifter",
            "warning",
            "illegal",
            "apple",
            "contacted",
            "ransom",
            "dead",
            "denver"
          ],
          "references": [
            "https://tamlegal.com/attorneys/christopher-p-ahmann/#breadcrumb \u2022 https://www.milehighmedia.com/en/movies",
            "https://www.milehighmedia.com/legal/2257 \u2022 https://www.milehighmedia",
            "www.milehighmedia.com  \u2022 https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512",
            "https://www.milehighmedia.com/en/login/index/aHR0cHMlM0ElMkYlMkZtZW1iZXJzLm1pbGVoaWdobWVkaWEuY29tJTJGZW4lMkZ2aWRlb3MlMkZzd2VldGhlYXJ0dmlkZW8lM0ZhbHVwJTNEQURqeF9ITjhfd1oweU96UnpsU3NNNUZLaVVxSzBXNEN0X3NmTFpKTGVJc3M2b0RVUzkwVmp6VllNVko5eFpmdENYcFNKd3IzOTNaMG1mOEpXeVhVeVZpLTJZYVRsaGd3M25DSDRpYnRwZ25BRC1zUFhDQVUycjZJOXo2WWtRMzNVWVFhMFZyWC1YckxvcnRkVjJZdEgxSDYxZ1lhMTFNS3RZSkEzY3FlSXhFQzhtSlAzSk1tbloySURMQXlMZndPcHozSFFiTzF4T0FseXJIQ0xYem1ldFElMkE=\t \thttp://www.milehighmedia.com/?ats=eyJhIjoyOTYzMTgsImMiOjU3OTYzNz",
            "http://www.milehighmedia.com/legal\t \u2022  https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.milehighmedia.com/de/MileHighMedia/scene/129689?utm_source=271174&utm_medium=affiliate&utm_campaign=",
            "http://www.milehighmedia.com/?ats=eyJhIjoyOTYzMTgsImMiOjU3OTYzNzc1LCJuIjo3NiwicyI6NT...",
            "ttps://www.milehighmedia.com/scene/4404473/creampie-adventures-scene-2-sneaky-melanie",
            "https://www.milehighmedia.com/join \u2022 https://www.milehighmedia.com/models \u2022 https://www.milehighmedia.com/movies",
            "https://www.milehighmedia.com/model/59136/avi-love \u2022https://www.milehighmedia.com/model/60418/Justin-Hunt \u2022",
            "https://www.milehighmedia.com/en/photo/milehighmedia/The-Mother-I-Cant-Resist/52380",
            "https://www.milehighmedia.com/en/movies \u2022  https://www.milehighmedia.com/join",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "pornhub-e.com \u2022 www.pornhub.com \u2022",
            "https://www.sweetheartvideo.com/tsara-brashears/ \u2022 www.sweetheartvideo.com",
            "https://www.sweetheartvideo.com/en/?s=1?s=1&utm_source=272160&utm_medium=affiliate&utm_campaign=lovelezzies",
            "https://www.sweetheartvideo.com/en/dvd/Lesbian-Massage/49895",
            "https://www.sweetheartvideo.com/en/dvds \u2022 https://www.sweetheartvideo.com/en/login",
            "https://www.sweetheartvideo.com/en/model/Mona-Wales/49601 \u2022 https://www.sweetheartvideo.com/en/scene/Truth-Dare--Boobs/130432 No Expiration\t0\t  URL https://www.sweetheartvideo.com/it/model/Kristen-Scott/50432 \u2022 https://www.sweetheartvideo.com/model/63710/brandi-love",
            "https://www.sweetheartvideo.com/scenes?models=63710",
            "https://www.sweetheartvideo.com/model/63710/brandi-love",
            "https://www.sweetheartvideo.com/scenes?models=63710",
            "https://www.sweetheartvideo.com/it/model/Kristen-Scott/50432",
            "https://www.sweetheartvideo.com/en/scene/Truth-Dare--Boobs/130432",
            "https://www.milehighmedia.com/en/photo/milehighmedia/The-Mother-I-Cant-Resist/52380",
            "https://www.vgt.pl/font/roboto/Roboto-Bold.eot  \u2022",
            "https://www.vgt.pl/94.152.152.233/images/logo.png",
            "https://www.vgt.pl/94.152.156.22/logo.png \u2022 https://www.vgt.pl/css/",
            "https://www.vgt.pl/favicon.ico",
            "https://www.vgt.pl/font/fa/fontawesome-webfont.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Bold.ttf  \u2022  https://www.vgt.pl/font/roboto/Roboto-Light.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Medium.ttf",
            "https://www.vgt.pl/font/roboto/Roboto-Light.ttf  \u2022",
            "https://www.vgt.pl/static/js/bootstrap-typeahead.jstic/js/bootstrap-typeahead.js",
            "https://www.vgt.pl/style/style.css \u2022 https://www.vgt.pl/font/roboto/Roboto-Medium.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Regular.ttf \u2022 https://www.vgt.pl/font/roboto/Roboto-Thin.eot",
            "https://www.vgt.pl/static/js/bootstrap-typeahead.js.179.252.2",
            "https://www.vgt.pl/font/roboto/Roboto-Thin.ttf \u2022 https://www.vgt.pl/static/js/bootstrap-typeahead.js",
            "https://www.vgt.pl/font/roboto/Roboto-Regular.eot \u2022 https://www.vgt.pl/94.152.156.22/logo.png \u2022 https://www.vgt.pl/css/",
            "vgt.pl \u2022 www.hak.vgt.pl \u2022 www.localhost.vgt.pl \u2022 www.certyfikat.vgt.pl \u2022 aristocrat.vgt.pl",
            "https://www.vgt.pl/ phishing \u2022 https://vgt.pl/ \u2022www.vgt.pl \u2022 https://www.vgt.pl/94.152.152.233/images/logo.png",
            "http://www.pornokind.vgt.pl \u2022 https://dbkuewww.m.vgt.pl \u2022 https://lokalnyhost.vgt.pl \u2022 www.xn--twj-hna.pedofil.vgt.pl",
            "http://www.hak.vgt.pl \u2022 http://pornokind.vgt.pl \u2022 http://sip.vgt.pl \u2022 http://smtp-qa.vgt.pl \u2022  http://vgt.pl/*.",
            "https://pornokind.vgt.pl \u2022 https://sip.vgt.pl \u2022 https://smtp-qa.vgt.pl \u2022 https://www.vgt.pl/94.152.156.22/logo.png",
            "www.localhost.vgt.pl \u2022 www.certyfikat.vgt.pl \u2022 https://www.vgt.pl/94.152.152.233/images/logo.png",
            "https://www.vgt.pl/css/ \u2022 https://www.vgt.pl/favicon.ico \u2022 https://www.vgt.pl/font/fa/fontawesome-webfont.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Bold.eot \u2022 https://www.vgt.pl/font/roboto/Roboto-Bold.ttf \u2022 https://www.vgt.pl/font/roboto/Roboto-Light.eot",
            "https://www.vgt.pl/static/js/bootstrap-typeahead.jstic/js/bootstrap-typeahead.js",
            "https://www.vgt.pl/style/style.css \u2022 https://www.vgt.pl/static/js/bootstrap-typeahead.js",
            "IP Address 94.152.58.192 Location  Poland ASN AS29522 h88 s.a. Nameservers ns1.kei.pl. ,  ns2.kei.pl.",
            "www.happylifehappywife.com \u2022  http://www.happylifehappywife.com/2010/02/'>",
            "http://www.happylifehappywife.com/2010/04/'> \u2022 http://www.happylifehappywife.com/2010/05/'>",
            "http://www.happylifehappywife.com/2010/07/'> \u2022 http://www.happylifehappywife.com/2010/09/'>",
            "http://www.happylifehappywife.com/2011/06/'> \u2022 http://www.happylifehappywife.com/2011/08/'",
            "http://www.happylifehappywife.com/2011/08/'> \u2022 http://www.happylifehappywife.com/2012/07/'>",
            "http://www.happylifehappywife.com/2013/03/'> \u2022 http://www.happylifehappywife.com/index.php",
            "http://www.happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg",
            "https://amp.mypornvid.fun/videos/8/AhxS-ej1myg/gf-18-com/\ud83c\udf81-i39m-your-present-\ud83c\udf81-girlfriend-surprises-you-for-christmas-reunion-soft-kisses-amp-cuddles",
            "8-25-220-162-static.reverse.queryfoundry.net\t\t\tNov 1, 2025, 9:34:14 AM\t\t5\t  domain\tqueryfoundry.net\t\t\tNov 1, 2025, 9:34:14 AM\t\t8\t  URL\thttp://117-114-251-162-static.reverse.queryfoundry.net/",
            "http://watchhers.net/index.php",
            "remotewd.com device local",
            "nr-data.net \u2022 applemusic-spotlight.myunidays.com \u2022  init.ess.apple.com \u2022 tv.apple.com",
            "https://browntubeporn.com/tsara-brashearsAccept-Language",
            "https://cg864.myhotzpic.com phishing \u2022 http://dashboard.myhotzpic.com/",
            "https://myhotzpic.com/tsara-brashears-hardcore-lesbian-sex/anime-studio.org*thumbs-fa...",
            "https://mypornvid.com/videos/27/x510fb2/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/caillou-finger",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead \u2022 http://siteinlink.d1.cnbd.net/site/maps.google.com.lb/",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead   \u2022 https://videolal.com/videos/tsara-brashears-dead-by-daylight.html",
            "http://pixelrz.com/lists/keywords/tsara-brashears-dead/360 \u2022 http://pixelrz.com/lists/keywords/tsara-brashears-dead/360] No Expiration\t4\t  Domain tsara-brashears-deadspin-twitter-suspended-account-help.ht",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
            "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
            "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "Worm:Win32/Autorun",
              "display_name": "Worm:Win32/Autorun",
              "target": "/malware/Worm:Win32/Autorun"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Jaik",
              "display_name": "Jaik",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qshell",
              "display_name": "Trojan:Win32/Qshell",
              "target": "/malware/Trojan:Win32/Qshell"
            },
            {
              "id": "Trojan:Win32/Mydoom",
              "display_name": "Trojan:Win32/Mydoom",
              "target": "/malware/Trojan:Win32/Mydoom"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "69482caa00d327da8f0a87bc",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8897,
            "domain": 2102,
            "hostname": 2867,
            "FileHash-SHA256": 3886,
            "FileHash-MD5": 619,
            "FileHash-SHA1": 555,
            "CVE": 3,
            "email": 5,
            "SSLCertFingerprint": 8
          },
          "indicator_count": 18942,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "36 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b49587dd104e342dda1628",
          "name": "C Ahman Attorney Clone by Top Tier, Q.Vashti",
          "description": "",
          "modified": "2026-03-13T22:53:59.112000",
          "created": "2026-03-13T22:53:59.112000",
          "tags": [
            "related pulses",
            "p1377925676",
            "gaz1",
            "sid1696503456",
            "sct1",
            "active",
            "dynamicloader",
            "medium",
            "write c",
            "search",
            "show",
            "high",
            "program gateway",
            "http traffic",
            "http",
            "write",
            "malware",
            "nivdort",
            "serving ip",
            "address",
            "status code",
            "kb body",
            "sha256",
            "gw5hjz7t975",
            "url https",
            "url http",
            "indicator role",
            "pulses url",
            "hostname",
            "poland unknown",
            "present sep",
            "present jul",
            "present may",
            "present apr",
            "present dec",
            "present jan",
            "moved",
            "passive dns",
            "ip address",
            "title",
            "location poland",
            "asn as29522",
            "gmt content",
            "accept encoding",
            "ipv4 add",
            "urls",
            "files",
            "reverse dns",
            "united",
            "record value",
            "aaaa",
            "mtb oct",
            "found",
            "error",
            "read c",
            "memcommit",
            "module load",
            "next",
            "showing",
            "trojan",
            "execution",
            "unknown",
            "entries",
            "ms windows",
            "intel",
            "as15169",
            "codeoverlap",
            "yara detections",
            "delphi",
            "worm",
            "win32",
            "win64",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "spawns",
            "ssl certificate",
            "execution att",
            "script urls",
            "treece alfrey",
            "meta",
            "germany unknown",
            "for privacy",
            "title added",
            "active related",
            "pulses",
            "asnone",
            "named pipe",
            "type indicator",
            "role title",
            "added active",
            "filehashsha256",
            "ally",
            "melika",
            "information",
            "law christopher",
            "https",
            "fake pinterest",
            "tsara",
            "traceback man",
            "expiro",
            "capture",
            "domain",
            "types of",
            "germany",
            "poland",
            "netherlands",
            "cve cve20178977",
            "boobs130432 nov",
            "learn more",
            "filehashmd5",
            "utmsourceawin",
            "pe32",
            "head microsoft",
            "delete",
            "main",
            "backdoor",
            "next associated",
            "gmt connection",
            "control",
            "content type",
            "twitter",
            "certificate",
            "redirect date",
            "cache",
            "unknown ns",
            "hostname add",
            "ipv4",
            "pulse pulses",
            "location united",
            "america flag",
            "america asn",
            "windows",
            "total",
            "ids detections",
            "url add",
            "related nids",
            "files location",
            "flag united",
            "win32mydoom nov",
            "domain add",
            "yara rule",
            "ee fc",
            "ff d5",
            "f0 ff",
            "eb e1",
            "ff ff",
            "c1 e8",
            "c1 c0",
            "eb e8",
            "mpress",
            "cache control",
            "x cache",
            "date",
            "name servers",
            "arial",
            "present aug",
            "present jun",
            "may god",
            "hall render",
            "palantir doing",
            "jeffrey scott",
            "jeffrey reimer",
            "brian sabey",
            "butt pirates",
            "scott reimer",
            "colorado",
            "quasi government",
            "workers compensation",
            "eva lisa",
            "eva reimer",
            "sammie",
            "montano mark",
            "death threats",
            "tulach",
            "hired hit men",
            "gay man",
            "gay porn",
            "concentra",
            "corruption",
            "palantir",
            "foundry",
            "grifter",
            "warning",
            "illegal",
            "apple",
            "contacted",
            "ransom",
            "dead",
            "denver"
          ],
          "references": [
            "https://tamlegal.com/attorneys/christopher-p-ahmann/#breadcrumb \u2022 https://www.milehighmedia.com/en/movies",
            "https://www.milehighmedia.com/legal/2257 \u2022 https://www.milehighmedia",
            "www.milehighmedia.com  \u2022 https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512",
            "https://www.milehighmedia.com/en/login/index/aHR0cHMlM0ElMkYlMkZtZW1iZXJzLm1pbGVoaWdobWVkaWEuY29tJTJGZW4lMkZ2aWRlb3MlMkZzd2VldGhlYXJ0dmlkZW8lM0ZhbHVwJTNEQURqeF9ITjhfd1oweU96UnpsU3NNNUZLaVVxSzBXNEN0X3NmTFpKTGVJc3M2b0RVUzkwVmp6VllNVko5eFpmdENYcFNKd3IzOTNaMG1mOEpXeVhVeVZpLTJZYVRsaGd3M25DSDRpYnRwZ25BRC1zUFhDQVUycjZJOXo2WWtRMzNVWVFhMFZyWC1YckxvcnRkVjJZdEgxSDYxZ1lhMTFNS3RZSkEzY3FlSXhFQzhtSlAzSk1tbloySURMQXlMZndPcHozSFFiTzF4T0FseXJIQ0xYem1ldFElMkE=\t \thttp://www.milehighmedia.com/?ats=eyJhIjoyOTYzMTgsImMiOjU3OTYzNz",
            "http://www.milehighmedia.com/legal\t \u2022  https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.milehighmedia.com/de/MileHighMedia/scene/129689?utm_source=271174&utm_medium=affiliate&utm_campaign=",
            "http://www.milehighmedia.com/?ats=eyJhIjoyOTYzMTgsImMiOjU3OTYzNzc1LCJuIjo3NiwicyI6NT...",
            "ttps://www.milehighmedia.com/scene/4404473/creampie-adventures-scene-2-sneaky-melanie",
            "https://www.milehighmedia.com/join \u2022 https://www.milehighmedia.com/models \u2022 https://www.milehighmedia.com/movies",
            "https://www.milehighmedia.com/model/59136/avi-love \u2022https://www.milehighmedia.com/model/60418/Justin-Hunt \u2022",
            "https://www.milehighmedia.com/en/photo/milehighmedia/The-Mother-I-Cant-Resist/52380",
            "https://www.milehighmedia.com/en/movies \u2022  https://www.milehighmedia.com/join",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "pornhub-e.com \u2022 www.pornhub.com \u2022",
            "https://www.sweetheartvideo.com/tsara-brashears/ \u2022 www.sweetheartvideo.com",
            "https://www.sweetheartvideo.com/en/?s=1?s=1&utm_source=272160&utm_medium=affiliate&utm_campaign=lovelezzies",
            "https://www.sweetheartvideo.com/en/dvd/Lesbian-Massage/49895",
            "https://www.sweetheartvideo.com/en/dvds \u2022 https://www.sweetheartvideo.com/en/login",
            "https://www.sweetheartvideo.com/en/model/Mona-Wales/49601 \u2022 https://www.sweetheartvideo.com/en/scene/Truth-Dare--Boobs/130432 No Expiration\t0\t  URL https://www.sweetheartvideo.com/it/model/Kristen-Scott/50432 \u2022 https://www.sweetheartvideo.com/model/63710/brandi-love",
            "https://www.sweetheartvideo.com/scenes?models=63710",
            "https://www.sweetheartvideo.com/model/63710/brandi-love",
            "https://www.sweetheartvideo.com/scenes?models=63710",
            "https://www.sweetheartvideo.com/it/model/Kristen-Scott/50432",
            "https://www.sweetheartvideo.com/en/scene/Truth-Dare--Boobs/130432",
            "https://www.milehighmedia.com/en/photo/milehighmedia/The-Mother-I-Cant-Resist/52380",
            "https://www.vgt.pl/font/roboto/Roboto-Bold.eot  \u2022",
            "https://www.vgt.pl/94.152.152.233/images/logo.png",
            "https://www.vgt.pl/94.152.156.22/logo.png \u2022 https://www.vgt.pl/css/",
            "https://www.vgt.pl/favicon.ico",
            "https://www.vgt.pl/font/fa/fontawesome-webfont.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Bold.ttf  \u2022  https://www.vgt.pl/font/roboto/Roboto-Light.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Medium.ttf",
            "https://www.vgt.pl/font/roboto/Roboto-Light.ttf  \u2022",
            "https://www.vgt.pl/static/js/bootstrap-typeahead.jstic/js/bootstrap-typeahead.js",
            "https://www.vgt.pl/style/style.css \u2022 https://www.vgt.pl/font/roboto/Roboto-Medium.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Regular.ttf \u2022 https://www.vgt.pl/font/roboto/Roboto-Thin.eot",
            "https://www.vgt.pl/static/js/bootstrap-typeahead.js.179.252.2",
            "https://www.vgt.pl/font/roboto/Roboto-Thin.ttf \u2022 https://www.vgt.pl/static/js/bootstrap-typeahead.js",
            "https://www.vgt.pl/font/roboto/Roboto-Regular.eot \u2022 https://www.vgt.pl/94.152.156.22/logo.png \u2022 https://www.vgt.pl/css/",
            "vgt.pl \u2022 www.hak.vgt.pl \u2022 www.localhost.vgt.pl \u2022 www.certyfikat.vgt.pl \u2022 aristocrat.vgt.pl",
            "https://www.vgt.pl/ phishing \u2022 https://vgt.pl/ \u2022www.vgt.pl \u2022 https://www.vgt.pl/94.152.152.233/images/logo.png",
            "http://www.pornokind.vgt.pl \u2022 https://dbkuewww.m.vgt.pl \u2022 https://lokalnyhost.vgt.pl \u2022 www.xn--twj-hna.pedofil.vgt.pl",
            "http://www.hak.vgt.pl \u2022 http://pornokind.vgt.pl \u2022 http://sip.vgt.pl \u2022 http://smtp-qa.vgt.pl \u2022  http://vgt.pl/*.",
            "https://pornokind.vgt.pl \u2022 https://sip.vgt.pl \u2022 https://smtp-qa.vgt.pl \u2022 https://www.vgt.pl/94.152.156.22/logo.png",
            "www.localhost.vgt.pl \u2022 www.certyfikat.vgt.pl \u2022 https://www.vgt.pl/94.152.152.233/images/logo.png",
            "https://www.vgt.pl/css/ \u2022 https://www.vgt.pl/favicon.ico \u2022 https://www.vgt.pl/font/fa/fontawesome-webfont.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Bold.eot \u2022 https://www.vgt.pl/font/roboto/Roboto-Bold.ttf \u2022 https://www.vgt.pl/font/roboto/Roboto-Light.eot",
            "https://www.vgt.pl/static/js/bootstrap-typeahead.jstic/js/bootstrap-typeahead.js",
            "https://www.vgt.pl/style/style.css \u2022 https://www.vgt.pl/static/js/bootstrap-typeahead.js",
            "IP Address 94.152.58.192 Location  Poland ASN AS29522 h88 s.a. Nameservers ns1.kei.pl. ,  ns2.kei.pl.",
            "www.happylifehappywife.com \u2022  http://www.happylifehappywife.com/2010/02/'>",
            "http://www.happylifehappywife.com/2010/04/'> \u2022 http://www.happylifehappywife.com/2010/05/'>",
            "http://www.happylifehappywife.com/2010/07/'> \u2022 http://www.happylifehappywife.com/2010/09/'>",
            "http://www.happylifehappywife.com/2011/06/'> \u2022 http://www.happylifehappywife.com/2011/08/'",
            "http://www.happylifehappywife.com/2011/08/'> \u2022 http://www.happylifehappywife.com/2012/07/'>",
            "http://www.happylifehappywife.com/2013/03/'> \u2022 http://www.happylifehappywife.com/index.php",
            "http://www.happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg",
            "https://amp.mypornvid.fun/videos/8/AhxS-ej1myg/gf-18-com/\ud83c\udf81-i39m-your-present-\ud83c\udf81-girlfriend-surprises-you-for-christmas-reunion-soft-kisses-amp-cuddles",
            "8-25-220-162-static.reverse.queryfoundry.net\t\t\tNov 1, 2025, 9:34:14 AM\t\t5\t  domain\tqueryfoundry.net\t\t\tNov 1, 2025, 9:34:14 AM\t\t8\t  URL\thttp://117-114-251-162-static.reverse.queryfoundry.net/",
            "http://watchhers.net/index.php",
            "remotewd.com device local",
            "nr-data.net \u2022 applemusic-spotlight.myunidays.com \u2022  init.ess.apple.com \u2022 tv.apple.com",
            "https://browntubeporn.com/tsara-brashearsAccept-Language",
            "https://cg864.myhotzpic.com phishing \u2022 http://dashboard.myhotzpic.com/",
            "https://myhotzpic.com/tsara-brashears-hardcore-lesbian-sex/anime-studio.org*thumbs-fa...",
            "https://mypornvid.com/videos/27/x510fb2/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/caillou-finger",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead \u2022 http://siteinlink.d1.cnbd.net/site/maps.google.com.lb/",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead   \u2022 https://videolal.com/videos/tsara-brashears-dead-by-daylight.html",
            "http://pixelrz.com/lists/keywords/tsara-brashears-dead/360 \u2022 http://pixelrz.com/lists/keywords/tsara-brashears-dead/360] No Expiration\t4\t  Domain tsara-brashears-deadspin-twitter-suspended-account-help.ht",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
            "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
            "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "Worm:Win32/Autorun",
              "display_name": "Worm:Win32/Autorun",
              "target": "/malware/Worm:Win32/Autorun"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Jaik",
              "display_name": "Jaik",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qshell",
              "display_name": "Trojan:Win32/Qshell",
              "target": "/malware/Trojan:Win32/Qshell"
            },
            {
              "id": "Trojan:Win32/Mydoom",
              "display_name": "Trojan:Win32/Mydoom",
              "target": "/malware/Trojan:Win32/Mydoom"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "691f4d4ef0a2a570b8b21cd2",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8897,
            "domain": 2102,
            "hostname": 2867,
            "FileHash-SHA256": 3886,
            "FileHash-MD5": 619,
            "FileHash-SHA1": 555,
            "CVE": 3,
            "email": 5,
            "SSLCertFingerprint": 8
          },
          "indicator_count": 18942,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "36 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b2b76c9a490b69b6a085b3",
          "name": "Exodus/cellbrite clone by Q Vashti",
          "description": "",
          "modified": "2026-03-12T12:54:04.160000",
          "created": "2026-03-12T12:54:04.160000",
          "tags": [
            "ssl certificate",
            "network",
            "malware",
            "whois record",
            "contacted",
            "pegasus",
            "resolutions",
            "communicating",
            "sa victim",
            "assaulter",
            "quasar",
            "brian sabey",
            "go.sabey",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "samples",
            "united",
            "aaaa",
            "status",
            "susp",
            "search",
            "passive dns",
            "urls",
            "domain",
            "creation date",
            "date",
            "next",
            "show",
            "domain related",
            "feeds ioc",
            "maltiverse",
            "analyze",
            "scan endpoints",
            "all octoseek",
            "url https",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "all search",
            "otx octoseek",
            "hostname",
            "pulse submit",
            "url analysis",
            "files",
            "china unknown",
            "as4134 chinanet",
            "unknown",
            "name servers",
            "showing",
            "namesilo",
            "domain name",
            "dynadot llc",
            "as8075",
            "script urls",
            "netherlands",
            "a domains",
            "capture",
            "asnone united",
            "record value",
            "expiration date",
            "entries",
            "cname",
            "tulach",
            "algorithm",
            "v3 serial",
            "number",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "x509v3 extended",
            "info",
            "first",
            "server",
            "available from",
            "iana id",
            "registrar abuse",
            "registrar url",
            "registrar whois",
            "abuse contact",
            "email",
            "registry domain",
            "code",
            "win32 exe",
            "ufed iphone",
            "cellebrite ufed",
            "setup",
            "tjprojmain",
            "ufed4pc",
            "win32 dll",
            "detections type",
            "name",
            "responder",
            "exodus",
            "android",
            "office open",
            "xml document",
            "cellebrite",
            "type name",
            "pdf cellebrite",
            "ufed release",
            "cellbrite",
            "privilege https",
            "targets sa",
            "survivor",
            "getprocaddress",
            "indicator",
            "prefetch8",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "file",
            "pattern match",
            "observed email",
            "path",
            "factory",
            "hybrid",
            "general",
            "model",
            "comspec",
            "click",
            "title",
            "page",
            "body doctype",
            "quoth",
            "raven",
            "gmt content",
            "type",
            "vary",
            "accept",
            "october",
            "december",
            "copy",
            "execution",
            "awful",
            "referrer",
            "april",
            "kimsuky",
            "malicious",
            "crypto",
            "startpage",
            "hacktool",
            "installer",
            "tofsee",
            "historical ssl",
            "threat roundup",
            "phishing",
            "utc submissions",
            "submitters",
            "csc corporate",
            "domains",
            "twitter",
            "dropbox",
            "incapsula",
            "summary iocs",
            "graph community",
            "registrarsafe",
            "gandi sas",
            "google llc",
            "amazon02",
            "google",
            "akamaias",
            "facebook",
            "service",
            "patch",
            "namecheapnet",
            "cloudflarenet",
            "amazonaes",
            "gmo internet",
            "apple",
            "tsara brashears",
            "keylogger"
          ],
          "references": [
            "https://tulach.cc/",
            "cellebrite.com | https://cellebrite.com/en/federal-government/",
            "https://www.pornhub.com/video/search?search=tsara+brashears",
            "https://twitter.com/PORNO_SEXYBABES",
            "hanmail.net",
            "114.114.114.114",
            "work.a-poster.info",
            "www-stage40.pornhub.com",
            "go.sabey.com",
            "sabey.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Exodus",
              "display_name": "Exodus",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "PWS:Win32/Raven",
              "display_name": "PWS:Win32/Raven",
              "target": "/malware/PWS:Win32/Raven"
            },
            {
              "id": "Kimsuky",
              "display_name": "Kimsuky",
              "target": null
            },
            {
              "id": "VirTool:Win32/Tofsee",
              "display_name": "VirTool:Win32/Tofsee",
              "target": "/malware/VirTool:Win32/Tofsee"
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6916e098df39114161354b23",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4295,
            "FileHash-MD5": 322,
            "FileHash-SHA1": 296,
            "FileHash-SHA256": 3255,
            "domain": 2911,
            "hostname": 2894,
            "CVE": 2,
            "email": 9,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 13986,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "38 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69a9e7c572b8411d126215a6",
          "name": "@scoreblue callback clone",
          "description": "",
          "modified": "2026-03-06T05:11:18.020000",
          "created": "2026-03-05T20:29:57.169000",
          "tags": [
            "acceptencoding",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers xcache",
            "wp engine",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "samples",
            "contacted",
            "apple",
            "ssl certificate",
            "whois record",
            "contacted",
            "historical ssl",
            "referrer",
            "execution",
            "tsara brashears",
            "apple ios",
            "historical",
            "communicating",
            "copy",
            "attack",
            "njrat",
            "ransomware",
            "hacktool",
            "metro",
            "malicious",
            "crypto",
            "installer",
            "awful",
            "startpage",
            "callback phishing",
            "safebae",
            "catherine daisy coleman",
            "pegasus",
            "nso",
            "kb font",
            "january",
            "http",
            "resource path",
            "size",
            "type mimetype",
            "primary request",
            "kb document",
            "general full",
            "url http",
            "low risk",
            "sucuri firewall",
            "malware found",
            "site",
            "unknown",
            "low security",
            "risk",
            "website malware",
            "security no",
            "protect",
            "html internet",
            "html document",
            "unicode text",
            "utf8 text",
            "no data",
            "tag count",
            "sample summary",
            "sample",
            "detection list",
            "blacklist",
            "count blacklist",
            "tag tag",
            "anchor hrefs",
            "wordpress",
            "html info",
            "title safebae",
            "anyone else",
            "meta tags",
            "wpbakery page",
            "builder",
            "slider plugin",
            "script tags",
            "passive dns",
            "urls",
            "a nxdomain",
            "scan endpoints",
            "all scoreblue",
            "hostname",
            "pulse pulses",
            "files",
            "domain",
            "files ip",
            "united",
            "status",
            "as13768 aptum",
            "date",
            "moved",
            "creation date",
            "search",
            "record value",
            "body",
            "log id",
            "gmtn",
            "go daddy",
            "authority",
            "tls web",
            "arizona",
            "scottsdale",
            "ca issuers",
            "false",
            "as30148 sucuri",
            "a domains",
            "gmt content",
            "ipv4",
            "win64",
            "back",
            "linux mint",
            "hacking",
            "brian sabey",
            "tracking",
            "hallrender",
            "staging",
            "dns",
            "network",
            "control",
            "bazar"
          ],
          "references": [
            "https://safebae.org/",
            "www.hallrender.com",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-266x266.png",
            "http://files.geoffreyobrian.com/uploads/1/3/2/8/132814305/3473236.pdf",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing/ links to Brashears browser Google.com.uy/clk malicious, links  for collection",
            "https://applemusic-spotlight.myunidays.com/US/en-US? [potential Apple pegasus media entrance]",
            "'https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS password decryption| password unlocker]",
            "s3.amazonaws.com [ metro T-Mobile spyware porn]",
            "9.6.zip - SQLi",
            "dns.trackgroup.net",
            "nr-data.net [Apple Private Data Collection]",
            "scripting-sandbox-dns.bunny.net",
            "http://www.01tracks.com/happy-customers",
            "https://www.rallypoint.com/command-post/veterans-benefits-banking-program-integrates-with-vetcents-to-improve-veterans-financial-health?utm_source=dept_of_va&utm_medium=email&utm_campaign=vavetcents",
            "http://yabs.yandex.uz/count/DbMMoEMwcAa508C2CI72BLq00000EEu2G0980c2y26W2SBYTbz06W06CXPm9Y06nyBJ1CP01mldXrZ6O0S3OwEyok06sjOF85S01NDW1uiI14E01zEhV3-W1Q9W2bk3S1A02jCW1s082y0AM-kpb2_W2aF62vgN6kDNb0O03iD_Kq0-80-cvf8mEc0EweogW0mIe0mQm0mIm106u1Fy1w0J-jHRu1D660uW5qOO3a0MGuWkW1PPtg0MeOx05g6Eu1VN-0i05bP0Lo0N0hmNW1GNm1G6O1eBGhFCEe0Q-eG6e1jW2oGPlwQdYVheAOD46Rn4LqN-w2c3P1W000C2z0000gGTjZOZwJYhCDx07W82ODD070k07XWhn1wbhSBFKCwp6W0WAq0Y0WeI1nP20Xe01u0YQP80A0S4A00000000y3_O2WBW2e29UlWAWBKOgWiGasxIrMsD000sz7Ltouq50DaBROs8-aug",
            "remote.utorrent.com | pornhub.dev | lp.rallypoint.com",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Twitter porno]",
            "https://www.hallrender.com/attorney/brian-sabey/Accept [Weird - defended Jeffrey Scott Reimer Tsara Brashears alleged assaulter[",
            "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F&",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-406x406.png [offered Brashears settlement that month]",
            "deadlyexploits.com | deadlysymbol.com |",
            "amail.linuxmint.com | api1-live.linuxmint.com | Hostname apipackages.linuxmint.com | apollo-extra.linuxmint.com | apps.linuxmint.com | arc.linuxmint.com | archive.linuxmint.com | betaforums1.linuxmint.com Hostname blogs.linuxmint.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Callback Phishing",
              "display_name": "Callback Phishing",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "BazarCall",
              "display_name": "BazarCall",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65b8a052c4160dbd76054f8a",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2802,
            "URL": 3267,
            "domain": 1459,
            "hostname": 1268,
            "FileHash-MD5": 227,
            "FileHash-SHA1": 144,
            "CVE": 2,
            "email": 1,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 9172,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 50,
          "modified_text": "44 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "697488f095f69d392afd00fb",
          "name": "Fidelity Investments \u2022\u2019 EternalRocks | Financial Crimes",
          "description": "Fidelity Life and Guarantee defaults to Fidelity Investments. Long standing issue. Possible phishing email interception. Multiple accounts stolen at the time a man who presents himself as M. Brian Sabey Esq. Elder/Estate  attorney unable to\nsettle  life claim more action was requested.  Attorney repeatedly redirected to an investment team. We decided to use targets phone to\ntest results , payout is overdue. Illegal tactics were used to defraud victim/s..  Fraud operators  ask for SSN and later state they cannot help. L of Fraud phone , \u2018team\u2019 cannot complete internal phone transfers.,can conference you in to other people who act confused , disheveled who also\nask for SSN. \n\nSince victims experiences less\nthan covert interactions, I\u2019m unclear as to why there is a strong FBI, CIA , Palantir Foundry presence. It\u2019s rattling . \nReiterating : Entity steals financial products, health , life insurance policies, investment accounts, credit card frauds , bank accounts,intellectual property  anything of value.",
          "modified": "2026-02-23T07:04:04.285000",
          "created": "2026-01-24T08:55:12.845000",
          "tags": [
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "ck techniques",
            "evasion att",
            "t1480 execution",
            "href",
            "ascii text",
            "pattern match",
            "mitre att",
            "null",
            "refresh",
            "span",
            "hybrid",
            "general",
            "local",
            "path",
            "form",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "active related",
            "url https",
            "related pulses",
            "url http",
            "united",
            "czechia",
            "hong kong",
            "ipv4",
            "indicators hong",
            "kong",
            "south korea",
            "netherlands",
            "germany",
            "ireland",
            "denmark",
            "sweden",
            "active",
            "government",
            "finance",
            "security",
            "type indicator",
            "yara detections",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "mcsf",
            "microsoft",
            "yara",
            "insurance",
            "fidelity investments",
            "description",
            "fidelity international",
            "ms windows",
            "pe32",
            "writeconsolew",
            "read c",
            "pe32 executable",
            "t1045",
            "susp",
            "write",
            "win64",
            "malware",
            "modified",
            "ck ids",
            "t1040",
            "sniffing",
            "packing",
            "t1112",
            "packing t1045",
            "icmp traffic",
            "memcommit",
            "pe section",
            "low software",
            "pe resource",
            "win32",
            "trojan",
            "april",
            "sara ligorria",
            "tramp advert",
            "black paper",
            "createdate",
            "subject laser",
            "title laser",
            "format",
            "types of",
            "japan",
            "regsetvalueexa",
            "regdword",
            "regbinary",
            "module download",
            "tls handshake",
            "high",
            "defense evasion",
            "discovery att",
            "adversaries",
            "title",
            "role",
            "flag",
            "name server",
            "server",
            "domain address",
            "markmonitor",
            "clicktale ltd",
            "enom",
            "whoisguard",
            "medium",
            "unicode",
            "rgba",
            "delete",
            "crlf line",
            "next",
            "dock",
            "execution",
            "date",
            "users",
            "tls sni",
            "total",
            "cnc domain",
            "search",
            "oamazon",
            "cnamazon rsa",
            "push",
            "failure yara",
            "contacted",
            "hours ago",
            "created",
            "cia",
            "fbi",
            "telegram",
            "tulach",
            "sabey",
            "state",
            "gov",
            "ahmann",
            "financial fraud",
            "t-mobile",
            "walmartmobile",
            "life insurance",
            "fidelity life",
            "guarantee",
            "team",
            "role title",
            "added active",
            "scan",
            "iocs",
            "learn more",
            "filehashsha1",
            "filehashmd5",
            "kw3recepten",
            "domainname0",
            "searchbox0",
            "kw1brinta",
            "kw2muesli",
            "indicator role",
            "title added",
            "pulses url",
            "cve cve20170147",
            "apple",
            "apple id"
          ],
          "references": [
            "https://www.fidelity.com/branches/investor-center-denver-west-s-teller-colorado-80226",
            "https://www.fidelity.com/ www.fidelity.com https://www.fidelity.com/ \u2022 www.fidelity.com",
            "http://neurosky.jp/ \u2022  https://tulach.cc/ \u2022 blackrock.com \u2022 vanguard-account.com",
            "https://bhive.nectar.social/rKvoMY",
            "MC nosnoop.exe: a44812b44591121f3e711223db099043d4d72288e4f436dba2fb935b6d888d40.exe",
            "ETERNALROCKS Detections: Win32:EternalRocks-B\\ [Trj] ,  Win.Trojan.EternalRocks1-6319293-0 ,",
            "TrojanDownloader:Win32/Eterock.A IDS Detections Possible ETERNALROCKS .Net161",
            "Module Download TLS Handshake Failure Yara Detections SUSP_NET_NAME_ConfuserEx , EternalRocks_svchost ,  EternalRocks_UpdateInstaller ,  ProtectSharewareV11eCompservCMS Alerts dead_host network_icmp nolookup_communication modifies_proxy_wpad network_http protection_rx antivm_network_adapters pe_unknown_resource_name raises_exception IP\u2019s Contacted  152.199.4.184  208.111.179.129  3.131.2.",
            "EternalRocks_svchost ,  EternalRocks_UpdateInstaller ,  ProtectSharewareV11eCompservCMS",
            "Alerts dead_host network_icmp nolookup_communication modifies_proxy_wpad",
            "Alerts: networki_http protectionk_rx antivm_network_adapters pe_unknown_resource_name",
            "Alerts: raises_exception IP\u2019s Contacted:  152.199.4.184  208.111.179.129  3.131.2.",
            "Domains Contacted api.nuget.org",
            "MC nosnoop.exe: a44812b44591121f3e711223db099043d4d72288e4f436dba2fb935b6d888d40.exe",
            "https://cdn-cms-s-8-4.f-static.net/files/icons/socialNetworksBrands/telegram",
            "https://cdn-cms-s-8-4.f-static.net/files/icons/socialNetworksBrands/telegram-icon.png",
            "https://cdn-cms-s.f-static.net/files/icons/socialNetworksBrands/telegram-icon.png?v=r82934",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.fidelity.com/ https://www.fidelity.com/",
            "cia.gov FileHash-SHA256 3b55307785bdd903bc9183642bdfd8b5a8ee15b90a05b25acbcd477432d26d99",
            "cia.gov FileHash-SHA256 f0a2d463a40c5b02e4bf61fdd76892b8ed5a1dd7d4a305849e4ff8fba00735bf",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "http://www.anyxxxtube.net/search-porn/tsara-brashears-denies-jeffrey-scott-reimer-sex",
            "http://www.anyxxxtube.net/search-porn/tsara-brashears/ hallrender.com/attorney/brian-sabey hallrender.com/attorney/b-sabey Christopher Ahmann https://hallrender.com/attorney/brian-sabey/anyxxxtube.net/search-porn/tsara-brashears https://www.anyxxxtube.net/search-porn/a-m-c-ate-xxx-videos/ pornokind.vgt.pl https://www.anyxxxtube.net/search-porn/ https://hallrender.com/attorney/brian-sabey/anyxxxtube.net/search-porn/tsara-brashears fidelity-account.com MC nosnoop.exe: a44812b44591121f3e711223db099043d4d72288e",
            "http://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "hallrender.com/attorney/brian-sabey hallrender.com/attorney/b-sabey Christopher Ahmann",
            "https://www.anyxxxtube.net/search-porn/a-m-c-ate-xxx-videos/ pornokind.vgt.pl. vgt.pl",
            "https://www.anyxxxtube.net/search-porn/",
            "https://hallrender.com/attorney/brian-sabey/anyxxxtube.net/search-porn/tsara-brashears",
            "fidelity-account.com e http://fidelity-account.com/fidelity/code.html",
            "MC nosnoop.exe: a44812b44591121f3e711223db099043d4d72288e4f436dba2fb935b6d888d40.ex",
            "http://shared-work.com/fidelity2/login.html \u2022  https://fidelity-account.com/fidelity/otp.html",
            "https://booking.nmc.ae/en-ae/doctor/physician/abu-dhabi/sreehari-karunakaran-pillai :",
            "https://www.fidelity-account.com/ https://www.fidelity-account.com/ \u2022 http://fidelity-account.com/cgi-sys https://fidelity-account.com/fidelity/login.html \u2022 https://www.fidelity.com/ https://www.fidelity.com/branches/investor-center-denver-west-s-teller-colorado-80226 https://www.fidelity.com/ \u2022 www.fidelity.com https://bhive.nectar.social/rKvoMY https://booking.nmc.ae/en-ae/doctor/physician/abu-dhabi/sreehari-karunakaran-pillai :",
            "http://www.fidelity-account.com/ https://fidelity-account.com/fidelity/code.html \u2022",
            "\"CIA\" most commonly refers to the Central Intelligence Agency, a premier U.S. government agency responsible for gathering and analyzing foreign intelligence.",
            "https://booking.nmc.ae/en-ae/doctor/physician/abu-dhabi/sreehari-karunakaran-pillai:",
            "https://bhive.nectar.social/rKvoMY",
            "apple.com \u2022 appleid.apple.com-elasticbeanstalk.ttfcuupdateaccount-loginpage.works.co",
            "http://appleid.app",
            "https://bounceme.netakamaipofcassandrvodd-krdddddddddddgaliapplepaysupplieseway.devrvodio-kr.zomato.tw\t d"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win64:Trojan-gen",
              "display_name": "Win64:Trojan-gen",
              "target": null
            },
            {
              "id": "Trojan:MSIL/Ursu.KP",
              "display_name": "Trojan:MSIL/Ursu.KP",
              "target": "/malware/Trojan:MSIL/Ursu.KP"
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/Eqtonex.F",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/Eqtonex.F",
              "target": null
            },
            {
              "id": "Trojan:PDF/Phish.RR!MTB",
              "display_name": "Trojan:PDF/Phish.RR!MTB",
              "target": "/malware/Trojan:PDF/Phish.RR!MTB"
            },
            {
              "id": "Win32:TrojanX-gen\\ [Trj]",
              "display_name": "Win32:TrojanX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": ": ALF:Trojan:MSIL/Azorult.AC!",
              "display_name": ": ALF:Trojan:MSIL/Azorult.AC!",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/CryptWrapper.RT!MTB",
              "display_name": "ALF:Trojan:Win32/CryptWrapper.RT!MTB",
              "target": null
            },
            {
              "id": "Trojan:Win32/Conbea!rfn",
              "display_name": "Trojan:Win32/Conbea!rfn",
              "target": "/malware/Trojan:Win32/Conbea!rfn"
            },
            {
              "id": "Trojan:Win32/Ausiv!rfn",
              "display_name": "Trojan:Win32/Ausiv!rfn",
              "target": "/malware/Trojan:Win32/Ausiv!rfn"
            },
            {
              "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat",
              "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat",
              "target": null
            },
            {
              "id": "Trojan:BAT/Musecador",
              "display_name": "Trojan:BAT/Musecador",
              "target": "/malware/Trojan:BAT/Musecador"
            },
            {
              "id": "TrojanDropper:Win32/Qhost",
              "display_name": "TrojanDropper:Win32/Qhost",
              "target": "/malware/TrojanDropper:Win32/Qhost"
            },
            {
              "id": "Trojan:Win32/Miner.KA!MTB",
              "display_name": "Trojan:Win32/Miner.KA!MTB",
              "target": "/malware/Trojan:Win32/Miner.KA!MTB"
            },
            {
              "id": "DNSTrojan",
              "display_name": "DNSTrojan",
              "target": null
            },
            {
              "id": "EternalRocks",
              "display_name": "EternalRocks",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            }
          ],
          "industries": [
            "Government",
            "Finance",
            "Insurance"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2793,
            "URL": 6639,
            "FileHash-SHA256": 2462,
            "domain": 1070,
            "FileHash-MD5": 307,
            "FileHash-SHA1": 186,
            "SSLCertFingerprint": 1,
            "email": 1,
            "CVE": 3
          },
          "indicator_count": 13462,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "55 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "691f4d4ef0a2a570b8b21cd2",
          "name": "Chris P. Ahmann Colorado State Criminal Defense Attorney",
          "description": "Chris P. Ahmann Colorado State Criminal Defense attorney hired by quasi government Workers Compensation to completely destroy Tsara Brashears literally to death. None of her spinal cord injuries , and other assault injuries discussed or compensated for in rushed settlement case. Her awful racist attorney refused to represent plaintiffs in hearing. Never met with in person  for no good reason. Tsara represented herself.  Less that 24 hour notice. No briefings, no awareness or mention that Ahmann was representing Jeffrey Scott Reimer for assault\n case. Brashears required 24 hour care by end of life. Received 0 workers compsarion payments. But if this doesn\u2019t prove Reimer\u2019s guilt what does? Continued harassment of associated. \n\nNotice the outages? You\u2019ve cost BILLIONS? Stop threatening everyone.",
          "modified": "2026-01-20T17:02:02.650000",
          "created": "2025-11-20T17:18:06.929000",
          "tags": [
            "related pulses",
            "p1377925676",
            "gaz1",
            "sid1696503456",
            "sct1",
            "active",
            "dynamicloader",
            "medium",
            "write c",
            "search",
            "show",
            "high",
            "program gateway",
            "http traffic",
            "http",
            "write",
            "malware",
            "nivdort",
            "serving ip",
            "address",
            "status code",
            "kb body",
            "sha256",
            "gw5hjz7t975",
            "url https",
            "url http",
            "indicator role",
            "pulses url",
            "hostname",
            "poland unknown",
            "present sep",
            "present jul",
            "present may",
            "present apr",
            "present dec",
            "present jan",
            "moved",
            "passive dns",
            "ip address",
            "title",
            "location poland",
            "asn as29522",
            "gmt content",
            "accept encoding",
            "ipv4 add",
            "urls",
            "files",
            "reverse dns",
            "united",
            "record value",
            "aaaa",
            "mtb oct",
            "found",
            "error",
            "read c",
            "memcommit",
            "module load",
            "next",
            "showing",
            "trojan",
            "execution",
            "unknown",
            "entries",
            "ms windows",
            "intel",
            "as15169",
            "codeoverlap",
            "yara detections",
            "delphi",
            "worm",
            "win32",
            "win64",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "spawns",
            "ssl certificate",
            "execution att",
            "script urls",
            "treece alfrey",
            "meta",
            "germany unknown",
            "for privacy",
            "title added",
            "active related",
            "pulses",
            "asnone",
            "named pipe",
            "type indicator",
            "role title",
            "added active",
            "filehashsha256",
            "ally",
            "melika",
            "information",
            "law christopher",
            "https",
            "fake pinterest",
            "tsara",
            "traceback man",
            "expiro",
            "capture",
            "domain",
            "types of",
            "germany",
            "poland",
            "netherlands",
            "cve cve20178977",
            "boobs130432 nov",
            "learn more",
            "filehashmd5",
            "utmsourceawin",
            "pe32",
            "head microsoft",
            "delete",
            "main",
            "backdoor",
            "next associated",
            "gmt connection",
            "control",
            "content type",
            "twitter",
            "certificate",
            "redirect date",
            "cache",
            "unknown ns",
            "hostname add",
            "ipv4",
            "pulse pulses",
            "location united",
            "america flag",
            "america asn",
            "windows",
            "total",
            "ids detections",
            "url add",
            "related nids",
            "files location",
            "flag united",
            "win32mydoom nov",
            "domain add",
            "yara rule",
            "ee fc",
            "ff d5",
            "f0 ff",
            "eb e1",
            "ff ff",
            "c1 e8",
            "c1 c0",
            "eb e8",
            "mpress",
            "cache control",
            "x cache",
            "date",
            "name servers",
            "arial",
            "present aug",
            "present jun",
            "may god",
            "hall render",
            "palantir doing",
            "jeffrey scott",
            "jeffrey reimer",
            "brian sabey",
            "butt pirates",
            "scott reimer",
            "colorado",
            "quasi government",
            "workers compensation",
            "eva lisa",
            "eva reimer",
            "sammie",
            "montano mark",
            "death threats",
            "tulach",
            "hired hit men",
            "gay man",
            "gay porn",
            "concentra",
            "corruption",
            "palantir",
            "foundry",
            "grifter",
            "warning",
            "illegal",
            "apple",
            "contacted",
            "ransom",
            "dead",
            "denver"
          ],
          "references": [
            "https://tamlegal.com/attorneys/christopher-p-ahmann/#breadcrumb \u2022 https://www.milehighmedia.com/en/movies",
            "https://www.milehighmedia.com/legal/2257 \u2022 https://www.milehighmedia",
            "www.milehighmedia.com  \u2022 https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512",
            "https://www.milehighmedia.com/en/login/index/aHR0cHMlM0ElMkYlMkZtZW1iZXJzLm1pbGVoaWdobWVkaWEuY29tJTJGZW4lMkZ2aWRlb3MlMkZzd2VldGhlYXJ0dmlkZW8lM0ZhbHVwJTNEQURqeF9ITjhfd1oweU96UnpsU3NNNUZLaVVxSzBXNEN0X3NmTFpKTGVJc3M2b0RVUzkwVmp6VllNVko5eFpmdENYcFNKd3IzOTNaMG1mOEpXeVhVeVZpLTJZYVRsaGd3M25DSDRpYnRwZ25BRC1zUFhDQVUycjZJOXo2WWtRMzNVWVFhMFZyWC1YckxvcnRkVjJZdEgxSDYxZ1lhMTFNS3RZSkEzY3FlSXhFQzhtSlAzSk1tbloySURMQXlMZndPcHozSFFiTzF4T0FseXJIQ0xYem1ldFElMkE=\t \thttp://www.milehighmedia.com/?ats=eyJhIjoyOTYzMTgsImMiOjU3OTYzNz",
            "http://www.milehighmedia.com/legal\t \u2022  https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.milehighmedia.com/de/MileHighMedia/scene/129689?utm_source=271174&utm_medium=affiliate&utm_campaign=",
            "http://www.milehighmedia.com/?ats=eyJhIjoyOTYzMTgsImMiOjU3OTYzNzc1LCJuIjo3NiwicyI6NT...",
            "ttps://www.milehighmedia.com/scene/4404473/creampie-adventures-scene-2-sneaky-melanie",
            "https://www.milehighmedia.com/join \u2022 https://www.milehighmedia.com/models \u2022 https://www.milehighmedia.com/movies",
            "https://www.milehighmedia.com/model/59136/avi-love \u2022https://www.milehighmedia.com/model/60418/Justin-Hunt \u2022",
            "https://www.milehighmedia.com/en/photo/milehighmedia/The-Mother-I-Cant-Resist/52380",
            "https://www.milehighmedia.com/en/movies \u2022  https://www.milehighmedia.com/join",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "pornhub-e.com \u2022 www.pornhub.com \u2022",
            "https://www.sweetheartvideo.com/tsara-brashears/ \u2022 www.sweetheartvideo.com",
            "https://www.sweetheartvideo.com/en/?s=1?s=1&utm_source=272160&utm_medium=affiliate&utm_campaign=lovelezzies",
            "https://www.sweetheartvideo.com/en/dvd/Lesbian-Massage/49895",
            "https://www.sweetheartvideo.com/en/dvds \u2022 https://www.sweetheartvideo.com/en/login",
            "https://www.sweetheartvideo.com/en/model/Mona-Wales/49601 \u2022 https://www.sweetheartvideo.com/en/scene/Truth-Dare--Boobs/130432 No Expiration\t0\t  URL https://www.sweetheartvideo.com/it/model/Kristen-Scott/50432 \u2022 https://www.sweetheartvideo.com/model/63710/brandi-love",
            "https://www.sweetheartvideo.com/scenes?models=63710",
            "https://www.sweetheartvideo.com/model/63710/brandi-love",
            "https://www.sweetheartvideo.com/scenes?models=63710",
            "https://www.sweetheartvideo.com/it/model/Kristen-Scott/50432",
            "https://www.sweetheartvideo.com/en/scene/Truth-Dare--Boobs/130432",
            "https://www.milehighmedia.com/en/photo/milehighmedia/The-Mother-I-Cant-Resist/52380",
            "https://www.vgt.pl/font/roboto/Roboto-Bold.eot  \u2022",
            "https://www.vgt.pl/94.152.152.233/images/logo.png",
            "https://www.vgt.pl/94.152.156.22/logo.png \u2022 https://www.vgt.pl/css/",
            "https://www.vgt.pl/favicon.ico",
            "https://www.vgt.pl/font/fa/fontawesome-webfont.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Bold.ttf  \u2022  https://www.vgt.pl/font/roboto/Roboto-Light.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Medium.ttf",
            "https://www.vgt.pl/font/roboto/Roboto-Light.ttf  \u2022",
            "https://www.vgt.pl/static/js/bootstrap-typeahead.jstic/js/bootstrap-typeahead.js",
            "https://www.vgt.pl/style/style.css \u2022 https://www.vgt.pl/font/roboto/Roboto-Medium.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Regular.ttf \u2022 https://www.vgt.pl/font/roboto/Roboto-Thin.eot",
            "https://www.vgt.pl/static/js/bootstrap-typeahead.js.179.252.2",
            "https://www.vgt.pl/font/roboto/Roboto-Thin.ttf \u2022 https://www.vgt.pl/static/js/bootstrap-typeahead.js",
            "https://www.vgt.pl/font/roboto/Roboto-Regular.eot \u2022 https://www.vgt.pl/94.152.156.22/logo.png \u2022 https://www.vgt.pl/css/",
            "vgt.pl \u2022 www.hak.vgt.pl \u2022 www.localhost.vgt.pl \u2022 www.certyfikat.vgt.pl \u2022 aristocrat.vgt.pl",
            "https://www.vgt.pl/ phishing \u2022 https://vgt.pl/ \u2022www.vgt.pl \u2022 https://www.vgt.pl/94.152.152.233/images/logo.png",
            "http://www.pornokind.vgt.pl \u2022 https://dbkuewww.m.vgt.pl \u2022 https://lokalnyhost.vgt.pl \u2022 www.xn--twj-hna.pedofil.vgt.pl",
            "http://www.hak.vgt.pl \u2022 http://pornokind.vgt.pl \u2022 http://sip.vgt.pl \u2022 http://smtp-qa.vgt.pl \u2022  http://vgt.pl/*.",
            "https://pornokind.vgt.pl \u2022 https://sip.vgt.pl \u2022 https://smtp-qa.vgt.pl \u2022 https://www.vgt.pl/94.152.156.22/logo.png",
            "www.localhost.vgt.pl \u2022 www.certyfikat.vgt.pl \u2022 https://www.vgt.pl/94.152.152.233/images/logo.png",
            "https://www.vgt.pl/css/ \u2022 https://www.vgt.pl/favicon.ico \u2022 https://www.vgt.pl/font/fa/fontawesome-webfont.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Bold.eot \u2022 https://www.vgt.pl/font/roboto/Roboto-Bold.ttf \u2022 https://www.vgt.pl/font/roboto/Roboto-Light.eot",
            "https://www.vgt.pl/static/js/bootstrap-typeahead.jstic/js/bootstrap-typeahead.js",
            "https://www.vgt.pl/style/style.css \u2022 https://www.vgt.pl/static/js/bootstrap-typeahead.js",
            "IP Address 94.152.58.192 Location  Poland ASN AS29522 h88 s.a. Nameservers ns1.kei.pl. ,  ns2.kei.pl.",
            "www.happylifehappywife.com \u2022  http://www.happylifehappywife.com/2010/02/'>",
            "http://www.happylifehappywife.com/2010/04/'> \u2022 http://www.happylifehappywife.com/2010/05/'>",
            "http://www.happylifehappywife.com/2010/07/'> \u2022 http://www.happylifehappywife.com/2010/09/'>",
            "http://www.happylifehappywife.com/2011/06/'> \u2022 http://www.happylifehappywife.com/2011/08/'",
            "http://www.happylifehappywife.com/2011/08/'> \u2022 http://www.happylifehappywife.com/2012/07/'>",
            "http://www.happylifehappywife.com/2013/03/'> \u2022 http://www.happylifehappywife.com/index.php",
            "http://www.happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg",
            "https://amp.mypornvid.fun/videos/8/AhxS-ej1myg/gf-18-com/\ud83c\udf81-i39m-your-present-\ud83c\udf81-girlfriend-surprises-you-for-christmas-reunion-soft-kisses-amp-cuddles",
            "8-25-220-162-static.reverse.queryfoundry.net\t\t\tNov 1, 2025, 9:34:14 AM\t\t5\t  domain\tqueryfoundry.net\t\t\tNov 1, 2025, 9:34:14 AM\t\t8\t  URL\thttp://117-114-251-162-static.reverse.queryfoundry.net/",
            "http://watchhers.net/index.php",
            "remotewd.com device local",
            "nr-data.net \u2022 applemusic-spotlight.myunidays.com \u2022  init.ess.apple.com \u2022 tv.apple.com",
            "https://browntubeporn.com/tsara-brashearsAccept-Language",
            "https://cg864.myhotzpic.com phishing \u2022 http://dashboard.myhotzpic.com/",
            "https://myhotzpic.com/tsara-brashears-hardcore-lesbian-sex/anime-studio.org*thumbs-fa...",
            "https://mypornvid.com/videos/27/x510fb2/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/caillou-finger",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead \u2022 http://siteinlink.d1.cnbd.net/site/maps.google.com.lb/",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead   \u2022 https://videolal.com/videos/tsara-brashears-dead-by-daylight.html",
            "http://pixelrz.com/lists/keywords/tsara-brashears-dead/360 \u2022 http://pixelrz.com/lists/keywords/tsara-brashears-dead/360] No Expiration\t4\t  Domain tsara-brashears-deadspin-twitter-suspended-account-help.ht",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
            "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
            "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "Worm:Win32/Autorun",
              "display_name": "Worm:Win32/Autorun",
              "target": "/malware/Worm:Win32/Autorun"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Jaik",
              "display_name": "Jaik",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qshell",
              "display_name": "Trojan:Win32/Qshell",
              "target": "/malware/Trojan:Win32/Qshell"
            },
            {
              "id": "Trojan:Win32/Mydoom",
              "display_name": "Trojan:Win32/Mydoom",
              "target": "/malware/Trojan:Win32/Mydoom"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8897,
            "domain": 2102,
            "hostname": 2867,
            "FileHash-SHA256": 3886,
            "FileHash-MD5": 619,
            "FileHash-SHA1": 555,
            "CVE": 3,
            "email": 5,
            "SSLCertFingerprint": 8
          },
          "indicator_count": 18942,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "88 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69482caa00d327da8f0a87bc",
          "name": "Chris P.\u2019 Buzz\u2019 Ahmann Colorado State Criminal Defense Attorney (22.20.2025)",
          "description": "",
          "modified": "2026-01-20T17:02:02.650000",
          "created": "2025-12-21T17:21:46.434000",
          "tags": [
            "related pulses",
            "p1377925676",
            "gaz1",
            "sid1696503456",
            "sct1",
            "active",
            "dynamicloader",
            "medium",
            "write c",
            "search",
            "show",
            "high",
            "program gateway",
            "http traffic",
            "http",
            "write",
            "malware",
            "nivdort",
            "serving ip",
            "address",
            "status code",
            "kb body",
            "sha256",
            "gw5hjz7t975",
            "url https",
            "url http",
            "indicator role",
            "pulses url",
            "hostname",
            "poland unknown",
            "present sep",
            "present jul",
            "present may",
            "present apr",
            "present dec",
            "present jan",
            "moved",
            "passive dns",
            "ip address",
            "title",
            "location poland",
            "asn as29522",
            "gmt content",
            "accept encoding",
            "ipv4 add",
            "urls",
            "files",
            "reverse dns",
            "united",
            "record value",
            "aaaa",
            "mtb oct",
            "found",
            "error",
            "read c",
            "memcommit",
            "module load",
            "next",
            "showing",
            "trojan",
            "execution",
            "unknown",
            "entries",
            "ms windows",
            "intel",
            "as15169",
            "codeoverlap",
            "yara detections",
            "delphi",
            "worm",
            "win32",
            "win64",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "spawns",
            "ssl certificate",
            "execution att",
            "script urls",
            "treece alfrey",
            "meta",
            "germany unknown",
            "for privacy",
            "title added",
            "active related",
            "pulses",
            "asnone",
            "named pipe",
            "type indicator",
            "role title",
            "added active",
            "filehashsha256",
            "ally",
            "melika",
            "information",
            "law christopher",
            "https",
            "fake pinterest",
            "tsara",
            "traceback man",
            "expiro",
            "capture",
            "domain",
            "types of",
            "germany",
            "poland",
            "netherlands",
            "cve cve20178977",
            "boobs130432 nov",
            "learn more",
            "filehashmd5",
            "utmsourceawin",
            "pe32",
            "head microsoft",
            "delete",
            "main",
            "backdoor",
            "next associated",
            "gmt connection",
            "control",
            "content type",
            "twitter",
            "certificate",
            "redirect date",
            "cache",
            "unknown ns",
            "hostname add",
            "ipv4",
            "pulse pulses",
            "location united",
            "america flag",
            "america asn",
            "windows",
            "total",
            "ids detections",
            "url add",
            "related nids",
            "files location",
            "flag united",
            "win32mydoom nov",
            "domain add",
            "yara rule",
            "ee fc",
            "ff d5",
            "f0 ff",
            "eb e1",
            "ff ff",
            "c1 e8",
            "c1 c0",
            "eb e8",
            "mpress",
            "cache control",
            "x cache",
            "date",
            "name servers",
            "arial",
            "present aug",
            "present jun",
            "may god",
            "hall render",
            "palantir doing",
            "jeffrey scott",
            "jeffrey reimer",
            "brian sabey",
            "butt pirates",
            "scott reimer",
            "colorado",
            "quasi government",
            "workers compensation",
            "eva lisa",
            "eva reimer",
            "sammie",
            "montano mark",
            "death threats",
            "tulach",
            "hired hit men",
            "gay man",
            "gay porn",
            "concentra",
            "corruption",
            "palantir",
            "foundry",
            "grifter",
            "warning",
            "illegal",
            "apple",
            "contacted",
            "ransom",
            "dead",
            "denver"
          ],
          "references": [
            "https://tamlegal.com/attorneys/christopher-p-ahmann/#breadcrumb \u2022 https://www.milehighmedia.com/en/movies",
            "https://www.milehighmedia.com/legal/2257 \u2022 https://www.milehighmedia",
            "www.milehighmedia.com  \u2022 https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512",
            "https://www.milehighmedia.com/en/login/index/aHR0cHMlM0ElMkYlMkZtZW1iZXJzLm1pbGVoaWdobWVkaWEuY29tJTJGZW4lMkZ2aWRlb3MlMkZzd2VldGhlYXJ0dmlkZW8lM0ZhbHVwJTNEQURqeF9ITjhfd1oweU96UnpsU3NNNUZLaVVxSzBXNEN0X3NmTFpKTGVJc3M2b0RVUzkwVmp6VllNVko5eFpmdENYcFNKd3IzOTNaMG1mOEpXeVhVeVZpLTJZYVRsaGd3M25DSDRpYnRwZ25BRC1zUFhDQVUycjZJOXo2WWtRMzNVWVFhMFZyWC1YckxvcnRkVjJZdEgxSDYxZ1lhMTFNS3RZSkEzY3FlSXhFQzhtSlAzSk1tbloySURMQXlMZndPcHozSFFiTzF4T0FseXJIQ0xYem1ldFElMkE=\t \thttp://www.milehighmedia.com/?ats=eyJhIjoyOTYzMTgsImMiOjU3OTYzNz",
            "http://www.milehighmedia.com/legal\t \u2022  https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.milehighmedia.com/de/MileHighMedia/scene/129689?utm_source=271174&utm_medium=affiliate&utm_campaign=",
            "http://www.milehighmedia.com/?ats=eyJhIjoyOTYzMTgsImMiOjU3OTYzNzc1LCJuIjo3NiwicyI6NT...",
            "ttps://www.milehighmedia.com/scene/4404473/creampie-adventures-scene-2-sneaky-melanie",
            "https://www.milehighmedia.com/join \u2022 https://www.milehighmedia.com/models \u2022 https://www.milehighmedia.com/movies",
            "https://www.milehighmedia.com/model/59136/avi-love \u2022https://www.milehighmedia.com/model/60418/Justin-Hunt \u2022",
            "https://www.milehighmedia.com/en/photo/milehighmedia/The-Mother-I-Cant-Resist/52380",
            "https://www.milehighmedia.com/en/movies \u2022  https://www.milehighmedia.com/join",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "pornhub-e.com \u2022 www.pornhub.com \u2022",
            "https://www.sweetheartvideo.com/tsara-brashears/ \u2022 www.sweetheartvideo.com",
            "https://www.sweetheartvideo.com/en/?s=1?s=1&utm_source=272160&utm_medium=affiliate&utm_campaign=lovelezzies",
            "https://www.sweetheartvideo.com/en/dvd/Lesbian-Massage/49895",
            "https://www.sweetheartvideo.com/en/dvds \u2022 https://www.sweetheartvideo.com/en/login",
            "https://www.sweetheartvideo.com/en/model/Mona-Wales/49601 \u2022 https://www.sweetheartvideo.com/en/scene/Truth-Dare--Boobs/130432 No Expiration\t0\t  URL https://www.sweetheartvideo.com/it/model/Kristen-Scott/50432 \u2022 https://www.sweetheartvideo.com/model/63710/brandi-love",
            "https://www.sweetheartvideo.com/scenes?models=63710",
            "https://www.sweetheartvideo.com/model/63710/brandi-love",
            "https://www.sweetheartvideo.com/scenes?models=63710",
            "https://www.sweetheartvideo.com/it/model/Kristen-Scott/50432",
            "https://www.sweetheartvideo.com/en/scene/Truth-Dare--Boobs/130432",
            "https://www.milehighmedia.com/en/photo/milehighmedia/The-Mother-I-Cant-Resist/52380",
            "https://www.vgt.pl/font/roboto/Roboto-Bold.eot  \u2022",
            "https://www.vgt.pl/94.152.152.233/images/logo.png",
            "https://www.vgt.pl/94.152.156.22/logo.png \u2022 https://www.vgt.pl/css/",
            "https://www.vgt.pl/favicon.ico",
            "https://www.vgt.pl/font/fa/fontawesome-webfont.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Bold.ttf  \u2022  https://www.vgt.pl/font/roboto/Roboto-Light.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Medium.ttf",
            "https://www.vgt.pl/font/roboto/Roboto-Light.ttf  \u2022",
            "https://www.vgt.pl/static/js/bootstrap-typeahead.jstic/js/bootstrap-typeahead.js",
            "https://www.vgt.pl/style/style.css \u2022 https://www.vgt.pl/font/roboto/Roboto-Medium.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Regular.ttf \u2022 https://www.vgt.pl/font/roboto/Roboto-Thin.eot",
            "https://www.vgt.pl/static/js/bootstrap-typeahead.js.179.252.2",
            "https://www.vgt.pl/font/roboto/Roboto-Thin.ttf \u2022 https://www.vgt.pl/static/js/bootstrap-typeahead.js",
            "https://www.vgt.pl/font/roboto/Roboto-Regular.eot \u2022 https://www.vgt.pl/94.152.156.22/logo.png \u2022 https://www.vgt.pl/css/",
            "vgt.pl \u2022 www.hak.vgt.pl \u2022 www.localhost.vgt.pl \u2022 www.certyfikat.vgt.pl \u2022 aristocrat.vgt.pl",
            "https://www.vgt.pl/ phishing \u2022 https://vgt.pl/ \u2022www.vgt.pl \u2022 https://www.vgt.pl/94.152.152.233/images/logo.png",
            "http://www.pornokind.vgt.pl \u2022 https://dbkuewww.m.vgt.pl \u2022 https://lokalnyhost.vgt.pl \u2022 www.xn--twj-hna.pedofil.vgt.pl",
            "http://www.hak.vgt.pl \u2022 http://pornokind.vgt.pl \u2022 http://sip.vgt.pl \u2022 http://smtp-qa.vgt.pl \u2022  http://vgt.pl/*.",
            "https://pornokind.vgt.pl \u2022 https://sip.vgt.pl \u2022 https://smtp-qa.vgt.pl \u2022 https://www.vgt.pl/94.152.156.22/logo.png",
            "www.localhost.vgt.pl \u2022 www.certyfikat.vgt.pl \u2022 https://www.vgt.pl/94.152.152.233/images/logo.png",
            "https://www.vgt.pl/css/ \u2022 https://www.vgt.pl/favicon.ico \u2022 https://www.vgt.pl/font/fa/fontawesome-webfont.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Bold.eot \u2022 https://www.vgt.pl/font/roboto/Roboto-Bold.ttf \u2022 https://www.vgt.pl/font/roboto/Roboto-Light.eot",
            "https://www.vgt.pl/static/js/bootstrap-typeahead.jstic/js/bootstrap-typeahead.js",
            "https://www.vgt.pl/style/style.css \u2022 https://www.vgt.pl/static/js/bootstrap-typeahead.js",
            "IP Address 94.152.58.192 Location  Poland ASN AS29522 h88 s.a. Nameservers ns1.kei.pl. ,  ns2.kei.pl.",
            "www.happylifehappywife.com \u2022  http://www.happylifehappywife.com/2010/02/'>",
            "http://www.happylifehappywife.com/2010/04/'> \u2022 http://www.happylifehappywife.com/2010/05/'>",
            "http://www.happylifehappywife.com/2010/07/'> \u2022 http://www.happylifehappywife.com/2010/09/'>",
            "http://www.happylifehappywife.com/2011/06/'> \u2022 http://www.happylifehappywife.com/2011/08/'",
            "http://www.happylifehappywife.com/2011/08/'> \u2022 http://www.happylifehappywife.com/2012/07/'>",
            "http://www.happylifehappywife.com/2013/03/'> \u2022 http://www.happylifehappywife.com/index.php",
            "http://www.happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg",
            "https://amp.mypornvid.fun/videos/8/AhxS-ej1myg/gf-18-com/\ud83c\udf81-i39m-your-present-\ud83c\udf81-girlfriend-surprises-you-for-christmas-reunion-soft-kisses-amp-cuddles",
            "8-25-220-162-static.reverse.queryfoundry.net\t\t\tNov 1, 2025, 9:34:14 AM\t\t5\t  domain\tqueryfoundry.net\t\t\tNov 1, 2025, 9:34:14 AM\t\t8\t  URL\thttp://117-114-251-162-static.reverse.queryfoundry.net/",
            "http://watchhers.net/index.php",
            "remotewd.com device local",
            "nr-data.net \u2022 applemusic-spotlight.myunidays.com \u2022  init.ess.apple.com \u2022 tv.apple.com",
            "https://browntubeporn.com/tsara-brashearsAccept-Language",
            "https://cg864.myhotzpic.com phishing \u2022 http://dashboard.myhotzpic.com/",
            "https://myhotzpic.com/tsara-brashears-hardcore-lesbian-sex/anime-studio.org*thumbs-fa...",
            "https://mypornvid.com/videos/27/x510fb2/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/caillou-finger",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead \u2022 http://siteinlink.d1.cnbd.net/site/maps.google.com.lb/",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead   \u2022 https://videolal.com/videos/tsara-brashears-dead-by-daylight.html",
            "http://pixelrz.com/lists/keywords/tsara-brashears-dead/360 \u2022 http://pixelrz.com/lists/keywords/tsara-brashears-dead/360] No Expiration\t4\t  Domain tsara-brashears-deadspin-twitter-suspended-account-help.ht",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
            "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
            "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "Worm:Win32/Autorun",
              "display_name": "Worm:Win32/Autorun",
              "target": "/malware/Worm:Win32/Autorun"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Jaik",
              "display_name": "Jaik",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qshell",
              "display_name": "Trojan:Win32/Qshell",
              "target": "/malware/Trojan:Win32/Qshell"
            },
            {
              "id": "Trojan:Win32/Mydoom",
              "display_name": "Trojan:Win32/Mydoom",
              "target": "/malware/Trojan:Win32/Mydoom"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "691f4d4ef0a2a570b8b21cd2",
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8897,
            "domain": 2102,
            "hostname": 2867,
            "FileHash-SHA256": 3886,
            "FileHash-MD5": 619,
            "FileHash-SHA1": 555,
            "CVE": 3,
            "email": 5,
            "SSLCertFingerprint": 8
          },
          "indicator_count": 18942,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "88 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "695557ee134b978b00883c29",
          "name": "Chris P. Ahmann \u2022 Stay out of PRIVATE PROPERTY HITMAN!  Colorado State",
          "description": "",
          "modified": "2026-01-20T17:02:02.650000",
          "created": "2025-12-31T17:05:50.134000",
          "tags": [
            "related pulses",
            "p1377925676",
            "gaz1",
            "sid1696503456",
            "sct1",
            "active",
            "dynamicloader",
            "medium",
            "write c",
            "search",
            "show",
            "high",
            "program gateway",
            "http traffic",
            "http",
            "write",
            "malware",
            "nivdort",
            "serving ip",
            "address",
            "status code",
            "kb body",
            "sha256",
            "gw5hjz7t975",
            "url https",
            "url http",
            "indicator role",
            "pulses url",
            "hostname",
            "poland unknown",
            "present sep",
            "present jul",
            "present may",
            "present apr",
            "present dec",
            "present jan",
            "moved",
            "passive dns",
            "ip address",
            "title",
            "location poland",
            "asn as29522",
            "gmt content",
            "accept encoding",
            "ipv4 add",
            "urls",
            "files",
            "reverse dns",
            "united",
            "record value",
            "aaaa",
            "mtb oct",
            "found",
            "error",
            "read c",
            "memcommit",
            "module load",
            "next",
            "showing",
            "trojan",
            "execution",
            "unknown",
            "entries",
            "ms windows",
            "intel",
            "as15169",
            "codeoverlap",
            "yara detections",
            "delphi",
            "worm",
            "win32",
            "win64",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "spawns",
            "ssl certificate",
            "execution att",
            "script urls",
            "treece alfrey",
            "meta",
            "germany unknown",
            "for privacy",
            "title added",
            "active related",
            "pulses",
            "asnone",
            "named pipe",
            "type indicator",
            "role title",
            "added active",
            "filehashsha256",
            "ally",
            "melika",
            "information",
            "law christopher",
            "https",
            "fake pinterest",
            "tsara",
            "traceback man",
            "expiro",
            "capture",
            "domain",
            "types of",
            "germany",
            "poland",
            "netherlands",
            "cve cve20178977",
            "boobs130432 nov",
            "learn more",
            "filehashmd5",
            "utmsourceawin",
            "pe32",
            "head microsoft",
            "delete",
            "main",
            "backdoor",
            "next associated",
            "gmt connection",
            "control",
            "content type",
            "twitter",
            "certificate",
            "redirect date",
            "cache",
            "unknown ns",
            "hostname add",
            "ipv4",
            "pulse pulses",
            "location united",
            "america flag",
            "america asn",
            "windows",
            "total",
            "ids detections",
            "url add",
            "related nids",
            "files location",
            "flag united",
            "win32mydoom nov",
            "domain add",
            "yara rule",
            "ee fc",
            "ff d5",
            "f0 ff",
            "eb e1",
            "ff ff",
            "c1 e8",
            "c1 c0",
            "eb e8",
            "mpress",
            "cache control",
            "x cache",
            "date",
            "name servers",
            "arial",
            "present aug",
            "present jun",
            "may god",
            "hall render",
            "palantir doing",
            "jeffrey scott",
            "jeffrey reimer",
            "brian sabey",
            "butt pirates",
            "scott reimer",
            "colorado",
            "quasi government",
            "workers compensation",
            "eva lisa",
            "eva reimer",
            "sammie",
            "montano mark",
            "death threats",
            "tulach",
            "hired hit men",
            "gay man",
            "gay porn",
            "concentra",
            "corruption",
            "palantir",
            "foundry",
            "grifter",
            "warning",
            "illegal",
            "apple",
            "contacted",
            "ransom",
            "dead",
            "denver"
          ],
          "references": [
            "https://tamlegal.com/attorneys/christopher-p-ahmann/#breadcrumb \u2022 https://www.milehighmedia.com/en/movies",
            "https://www.milehighmedia.com/legal/2257 \u2022 https://www.milehighmedia",
            "www.milehighmedia.com  \u2022 https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512",
            "https://www.milehighmedia.com/en/login/index/aHR0cHMlM0ElMkYlMkZtZW1iZXJzLm1pbGVoaWdobWVkaWEuY29tJTJGZW4lMkZ2aWRlb3MlMkZzd2VldGhlYXJ0dmlkZW8lM0ZhbHVwJTNEQURqeF9ITjhfd1oweU96UnpsU3NNNUZLaVVxSzBXNEN0X3NmTFpKTGVJc3M2b0RVUzkwVmp6VllNVko5eFpmdENYcFNKd3IzOTNaMG1mOEpXeVhVeVZpLTJZYVRsaGd3M25DSDRpYnRwZ25BRC1zUFhDQVUycjZJOXo2WWtRMzNVWVFhMFZyWC1YckxvcnRkVjJZdEgxSDYxZ1lhMTFNS3RZSkEzY3FlSXhFQzhtSlAzSk1tbloySURMQXlMZndPcHozSFFiTzF4T0FseXJIQ0xYem1ldFElMkE=\t \thttp://www.milehighmedia.com/?ats=eyJhIjoyOTYzMTgsImMiOjU3OTYzNz",
            "http://www.milehighmedia.com/legal\t \u2022  https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.milehighmedia.com/de/MileHighMedia/scene/129689?utm_source=271174&utm_medium=affiliate&utm_campaign=",
            "http://www.milehighmedia.com/?ats=eyJhIjoyOTYzMTgsImMiOjU3OTYzNzc1LCJuIjo3NiwicyI6NT...",
            "ttps://www.milehighmedia.com/scene/4404473/creampie-adventures-scene-2-sneaky-melanie",
            "https://www.milehighmedia.com/join \u2022 https://www.milehighmedia.com/models \u2022 https://www.milehighmedia.com/movies",
            "https://www.milehighmedia.com/model/59136/avi-love \u2022https://www.milehighmedia.com/model/60418/Justin-Hunt \u2022",
            "https://www.milehighmedia.com/en/photo/milehighmedia/The-Mother-I-Cant-Resist/52380",
            "https://www.milehighmedia.com/en/movies \u2022  https://www.milehighmedia.com/join",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "pornhub-e.com \u2022 www.pornhub.com \u2022",
            "https://www.sweetheartvideo.com/tsara-brashears/ \u2022 www.sweetheartvideo.com",
            "https://www.sweetheartvideo.com/en/?s=1?s=1&utm_source=272160&utm_medium=affiliate&utm_campaign=lovelezzies",
            "https://www.sweetheartvideo.com/en/dvd/Lesbian-Massage/49895",
            "https://www.sweetheartvideo.com/en/dvds \u2022 https://www.sweetheartvideo.com/en/login",
            "https://www.sweetheartvideo.com/en/model/Mona-Wales/49601 \u2022 https://www.sweetheartvideo.com/en/scene/Truth-Dare--Boobs/130432 No Expiration\t0\t  URL https://www.sweetheartvideo.com/it/model/Kristen-Scott/50432 \u2022 https://www.sweetheartvideo.com/model/63710/brandi-love",
            "https://www.sweetheartvideo.com/scenes?models=63710",
            "https://www.sweetheartvideo.com/model/63710/brandi-love",
            "https://www.sweetheartvideo.com/scenes?models=63710",
            "https://www.sweetheartvideo.com/it/model/Kristen-Scott/50432",
            "https://www.sweetheartvideo.com/en/scene/Truth-Dare--Boobs/130432",
            "https://www.milehighmedia.com/en/photo/milehighmedia/The-Mother-I-Cant-Resist/52380",
            "https://www.vgt.pl/font/roboto/Roboto-Bold.eot  \u2022",
            "https://www.vgt.pl/94.152.152.233/images/logo.png",
            "https://www.vgt.pl/94.152.156.22/logo.png \u2022 https://www.vgt.pl/css/",
            "https://www.vgt.pl/favicon.ico",
            "https://www.vgt.pl/font/fa/fontawesome-webfont.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Bold.ttf  \u2022  https://www.vgt.pl/font/roboto/Roboto-Light.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Medium.ttf",
            "https://www.vgt.pl/font/roboto/Roboto-Light.ttf  \u2022",
            "https://www.vgt.pl/static/js/bootstrap-typeahead.jstic/js/bootstrap-typeahead.js",
            "https://www.vgt.pl/style/style.css \u2022 https://www.vgt.pl/font/roboto/Roboto-Medium.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Regular.ttf \u2022 https://www.vgt.pl/font/roboto/Roboto-Thin.eot",
            "https://www.vgt.pl/static/js/bootstrap-typeahead.js.179.252.2",
            "https://www.vgt.pl/font/roboto/Roboto-Thin.ttf \u2022 https://www.vgt.pl/static/js/bootstrap-typeahead.js",
            "https://www.vgt.pl/font/roboto/Roboto-Regular.eot \u2022 https://www.vgt.pl/94.152.156.22/logo.png \u2022 https://www.vgt.pl/css/",
            "vgt.pl \u2022 www.hak.vgt.pl \u2022 www.localhost.vgt.pl \u2022 www.certyfikat.vgt.pl \u2022 aristocrat.vgt.pl",
            "https://www.vgt.pl/ phishing \u2022 https://vgt.pl/ \u2022www.vgt.pl \u2022 https://www.vgt.pl/94.152.152.233/images/logo.png",
            "http://www.pornokind.vgt.pl \u2022 https://dbkuewww.m.vgt.pl \u2022 https://lokalnyhost.vgt.pl \u2022 www.xn--twj-hna.pedofil.vgt.pl",
            "http://www.hak.vgt.pl \u2022 http://pornokind.vgt.pl \u2022 http://sip.vgt.pl \u2022 http://smtp-qa.vgt.pl \u2022  http://vgt.pl/*.",
            "https://pornokind.vgt.pl \u2022 https://sip.vgt.pl \u2022 https://smtp-qa.vgt.pl \u2022 https://www.vgt.pl/94.152.156.22/logo.png",
            "www.localhost.vgt.pl \u2022 www.certyfikat.vgt.pl \u2022 https://www.vgt.pl/94.152.152.233/images/logo.png",
            "https://www.vgt.pl/css/ \u2022 https://www.vgt.pl/favicon.ico \u2022 https://www.vgt.pl/font/fa/fontawesome-webfont.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Bold.eot \u2022 https://www.vgt.pl/font/roboto/Roboto-Bold.ttf \u2022 https://www.vgt.pl/font/roboto/Roboto-Light.eot",
            "https://www.vgt.pl/static/js/bootstrap-typeahead.jstic/js/bootstrap-typeahead.js",
            "https://www.vgt.pl/style/style.css \u2022 https://www.vgt.pl/static/js/bootstrap-typeahead.js",
            "IP Address 94.152.58.192 Location  Poland ASN AS29522 h88 s.a. Nameservers ns1.kei.pl. ,  ns2.kei.pl.",
            "www.happylifehappywife.com \u2022  http://www.happylifehappywife.com/2010/02/'>",
            "http://www.happylifehappywife.com/2010/04/'> \u2022 http://www.happylifehappywife.com/2010/05/'>",
            "http://www.happylifehappywife.com/2010/07/'> \u2022 http://www.happylifehappywife.com/2010/09/'>",
            "http://www.happylifehappywife.com/2011/06/'> \u2022 http://www.happylifehappywife.com/2011/08/'",
            "http://www.happylifehappywife.com/2011/08/'> \u2022 http://www.happylifehappywife.com/2012/07/'>",
            "http://www.happylifehappywife.com/2013/03/'> \u2022 http://www.happylifehappywife.com/index.php",
            "http://www.happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg",
            "https://amp.mypornvid.fun/videos/8/AhxS-ej1myg/gf-18-com/\ud83c\udf81-i39m-your-present-\ud83c\udf81-girlfriend-surprises-you-for-christmas-reunion-soft-kisses-amp-cuddles",
            "8-25-220-162-static.reverse.queryfoundry.net\t\t\tNov 1, 2025, 9:34:14 AM\t\t5\t  domain\tqueryfoundry.net\t\t\tNov 1, 2025, 9:34:14 AM\t\t8\t  URL\thttp://117-114-251-162-static.reverse.queryfoundry.net/",
            "http://watchhers.net/index.php",
            "remotewd.com device local",
            "nr-data.net \u2022 applemusic-spotlight.myunidays.com \u2022  init.ess.apple.com \u2022 tv.apple.com",
            "https://browntubeporn.com/tsara-brashearsAccept-Language",
            "https://cg864.myhotzpic.com phishing \u2022 http://dashboard.myhotzpic.com/",
            "https://myhotzpic.com/tsara-brashears-hardcore-lesbian-sex/anime-studio.org*thumbs-fa...",
            "https://mypornvid.com/videos/27/x510fb2/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/caillou-finger",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead \u2022 http://siteinlink.d1.cnbd.net/site/maps.google.com.lb/",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead   \u2022 https://videolal.com/videos/tsara-brashears-dead-by-daylight.html",
            "http://pixelrz.com/lists/keywords/tsara-brashears-dead/360 \u2022 http://pixelrz.com/lists/keywords/tsara-brashears-dead/360] No Expiration\t4\t  Domain tsara-brashears-deadspin-twitter-suspended-account-help.ht",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
            "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
            "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "Worm:Win32/Autorun",
              "display_name": "Worm:Win32/Autorun",
              "target": "/malware/Worm:Win32/Autorun"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Jaik",
              "display_name": "Jaik",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qshell",
              "display_name": "Trojan:Win32/Qshell",
              "target": "/malware/Trojan:Win32/Qshell"
            },
            {
              "id": "Trojan:Win32/Mydoom",
              "display_name": "Trojan:Win32/Mydoom",
              "target": "/malware/Trojan:Win32/Mydoom"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "691f4d4ef0a2a570b8b21cd2",
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8897,
            "domain": 2102,
            "hostname": 2867,
            "FileHash-SHA256": 3886,
            "FileHash-MD5": 619,
            "FileHash-SHA1": 555,
            "CVE": 3,
            "email": 5,
            "SSLCertFingerprint": 8
          },
          "indicator_count": 18942,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "88 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69631fbd16e306ee2b76c4da",
          "name": "Chris P. Ahmann \u2022 STAY Away!f PRIVATE PROPERTY Colorado State Fixer!",
          "description": "",
          "modified": "2026-01-20T17:02:02.650000",
          "created": "2026-01-11T03:57:49.242000",
          "tags": [
            "related pulses",
            "p1377925676",
            "gaz1",
            "sid1696503456",
            "sct1",
            "active",
            "dynamicloader",
            "medium",
            "write c",
            "search",
            "show",
            "high",
            "program gateway",
            "http traffic",
            "http",
            "write",
            "malware",
            "nivdort",
            "serving ip",
            "address",
            "status code",
            "kb body",
            "sha256",
            "gw5hjz7t975",
            "url https",
            "url http",
            "indicator role",
            "pulses url",
            "hostname",
            "poland unknown",
            "present sep",
            "present jul",
            "present may",
            "present apr",
            "present dec",
            "present jan",
            "moved",
            "passive dns",
            "ip address",
            "title",
            "location poland",
            "asn as29522",
            "gmt content",
            "accept encoding",
            "ipv4 add",
            "urls",
            "files",
            "reverse dns",
            "united",
            "record value",
            "aaaa",
            "mtb oct",
            "found",
            "error",
            "read c",
            "memcommit",
            "module load",
            "next",
            "showing",
            "trojan",
            "execution",
            "unknown",
            "entries",
            "ms windows",
            "intel",
            "as15169",
            "codeoverlap",
            "yara detections",
            "delphi",
            "worm",
            "win32",
            "win64",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "spawns",
            "ssl certificate",
            "execution att",
            "script urls",
            "treece alfrey",
            "meta",
            "germany unknown",
            "for privacy",
            "title added",
            "active related",
            "pulses",
            "asnone",
            "named pipe",
            "type indicator",
            "role title",
            "added active",
            "filehashsha256",
            "ally",
            "melika",
            "information",
            "law christopher",
            "https",
            "fake pinterest",
            "tsara",
            "traceback man",
            "expiro",
            "capture",
            "domain",
            "types of",
            "germany",
            "poland",
            "netherlands",
            "cve cve20178977",
            "boobs130432 nov",
            "learn more",
            "filehashmd5",
            "utmsourceawin",
            "pe32",
            "head microsoft",
            "delete",
            "main",
            "backdoor",
            "next associated",
            "gmt connection",
            "control",
            "content type",
            "twitter",
            "certificate",
            "redirect date",
            "cache",
            "unknown ns",
            "hostname add",
            "ipv4",
            "pulse pulses",
            "location united",
            "america flag",
            "america asn",
            "windows",
            "total",
            "ids detections",
            "url add",
            "related nids",
            "files location",
            "flag united",
            "win32mydoom nov",
            "domain add",
            "yara rule",
            "ee fc",
            "ff d5",
            "f0 ff",
            "eb e1",
            "ff ff",
            "c1 e8",
            "c1 c0",
            "eb e8",
            "mpress",
            "cache control",
            "x cache",
            "date",
            "name servers",
            "arial",
            "present aug",
            "present jun",
            "may god",
            "hall render",
            "palantir doing",
            "jeffrey scott",
            "jeffrey reimer",
            "brian sabey",
            "butt pirates",
            "scott reimer",
            "colorado",
            "quasi government",
            "workers compensation",
            "eva lisa",
            "eva reimer",
            "sammie",
            "montano mark",
            "death threats",
            "tulach",
            "hired hit men",
            "gay man",
            "gay porn",
            "concentra",
            "corruption",
            "palantir",
            "foundry",
            "grifter",
            "warning",
            "illegal",
            "apple",
            "contacted",
            "ransom",
            "dead",
            "denver"
          ],
          "references": [
            "https://tamlegal.com/attorneys/christopher-p-ahmann/#breadcrumb \u2022 https://www.milehighmedia.com/en/movies",
            "https://www.milehighmedia.com/legal/2257 \u2022 https://www.milehighmedia",
            "www.milehighmedia.com  \u2022 https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512",
            "https://www.milehighmedia.com/en/login/index/aHR0cHMlM0ElMkYlMkZtZW1iZXJzLm1pbGVoaWdobWVkaWEuY29tJTJGZW4lMkZ2aWRlb3MlMkZzd2VldGhlYXJ0dmlkZW8lM0ZhbHVwJTNEQURqeF9ITjhfd1oweU96UnpsU3NNNUZLaVVxSzBXNEN0X3NmTFpKTGVJc3M2b0RVUzkwVmp6VllNVko5eFpmdENYcFNKd3IzOTNaMG1mOEpXeVhVeVZpLTJZYVRsaGd3M25DSDRpYnRwZ25BRC1zUFhDQVUycjZJOXo2WWtRMzNVWVFhMFZyWC1YckxvcnRkVjJZdEgxSDYxZ1lhMTFNS3RZSkEzY3FlSXhFQzhtSlAzSk1tbloySURMQXlMZndPcHozSFFiTzF4T0FseXJIQ0xYem1ldFElMkE=\t \thttp://www.milehighmedia.com/?ats=eyJhIjoyOTYzMTgsImMiOjU3OTYzNz",
            "http://www.milehighmedia.com/legal\t \u2022  https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "https://www.milehighmedia.com/de/MileHighMedia/scene/129689?utm_source=271174&utm_medium=affiliate&utm_campaign=",
            "http://www.milehighmedia.com/?ats=eyJhIjoyOTYzMTgsImMiOjU3OTYzNzc1LCJuIjo3NiwicyI6NT...",
            "ttps://www.milehighmedia.com/scene/4404473/creampie-adventures-scene-2-sneaky-melanie",
            "https://www.milehighmedia.com/join \u2022 https://www.milehighmedia.com/models \u2022 https://www.milehighmedia.com/movies",
            "https://www.milehighmedia.com/model/59136/avi-love \u2022https://www.milehighmedia.com/model/60418/Justin-Hunt \u2022",
            "https://www.milehighmedia.com/en/photo/milehighmedia/The-Mother-I-Cant-Resist/52380",
            "https://www.milehighmedia.com/en/movies \u2022  https://www.milehighmedia.com/join",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "pornhub-e.com \u2022 www.pornhub.com \u2022",
            "https://www.sweetheartvideo.com/tsara-brashears/ \u2022 www.sweetheartvideo.com",
            "https://www.sweetheartvideo.com/en/?s=1?s=1&utm_source=272160&utm_medium=affiliate&utm_campaign=lovelezzies",
            "https://www.sweetheartvideo.com/en/dvd/Lesbian-Massage/49895",
            "https://www.sweetheartvideo.com/en/dvds \u2022 https://www.sweetheartvideo.com/en/login",
            "https://www.sweetheartvideo.com/en/model/Mona-Wales/49601 \u2022 https://www.sweetheartvideo.com/en/scene/Truth-Dare--Boobs/130432 No Expiration\t0\t  URL https://www.sweetheartvideo.com/it/model/Kristen-Scott/50432 \u2022 https://www.sweetheartvideo.com/model/63710/brandi-love",
            "https://www.sweetheartvideo.com/scenes?models=63710",
            "https://www.sweetheartvideo.com/model/63710/brandi-love",
            "https://www.sweetheartvideo.com/scenes?models=63710",
            "https://www.sweetheartvideo.com/it/model/Kristen-Scott/50432",
            "https://www.sweetheartvideo.com/en/scene/Truth-Dare--Boobs/130432",
            "https://www.milehighmedia.com/en/photo/milehighmedia/The-Mother-I-Cant-Resist/52380",
            "https://www.vgt.pl/font/roboto/Roboto-Bold.eot  \u2022",
            "https://www.vgt.pl/94.152.152.233/images/logo.png",
            "https://www.vgt.pl/94.152.156.22/logo.png \u2022 https://www.vgt.pl/css/",
            "https://www.vgt.pl/favicon.ico",
            "https://www.vgt.pl/font/fa/fontawesome-webfont.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Bold.ttf  \u2022  https://www.vgt.pl/font/roboto/Roboto-Light.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Medium.ttf",
            "https://www.vgt.pl/font/roboto/Roboto-Light.ttf  \u2022",
            "https://www.vgt.pl/static/js/bootstrap-typeahead.jstic/js/bootstrap-typeahead.js",
            "https://www.vgt.pl/style/style.css \u2022 https://www.vgt.pl/font/roboto/Roboto-Medium.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Regular.ttf \u2022 https://www.vgt.pl/font/roboto/Roboto-Thin.eot",
            "https://www.vgt.pl/static/js/bootstrap-typeahead.js.179.252.2",
            "https://www.vgt.pl/font/roboto/Roboto-Thin.ttf \u2022 https://www.vgt.pl/static/js/bootstrap-typeahead.js",
            "https://www.vgt.pl/font/roboto/Roboto-Regular.eot \u2022 https://www.vgt.pl/94.152.156.22/logo.png \u2022 https://www.vgt.pl/css/",
            "vgt.pl \u2022 www.hak.vgt.pl \u2022 www.localhost.vgt.pl \u2022 www.certyfikat.vgt.pl \u2022 aristocrat.vgt.pl",
            "https://www.vgt.pl/ phishing \u2022 https://vgt.pl/ \u2022www.vgt.pl \u2022 https://www.vgt.pl/94.152.152.233/images/logo.png",
            "http://www.pornokind.vgt.pl \u2022 https://dbkuewww.m.vgt.pl \u2022 https://lokalnyhost.vgt.pl \u2022 www.xn--twj-hna.pedofil.vgt.pl",
            "http://www.hak.vgt.pl \u2022 http://pornokind.vgt.pl \u2022 http://sip.vgt.pl \u2022 http://smtp-qa.vgt.pl \u2022  http://vgt.pl/*.",
            "https://pornokind.vgt.pl \u2022 https://sip.vgt.pl \u2022 https://smtp-qa.vgt.pl \u2022 https://www.vgt.pl/94.152.156.22/logo.png",
            "www.localhost.vgt.pl \u2022 www.certyfikat.vgt.pl \u2022 https://www.vgt.pl/94.152.152.233/images/logo.png",
            "https://www.vgt.pl/css/ \u2022 https://www.vgt.pl/favicon.ico \u2022 https://www.vgt.pl/font/fa/fontawesome-webfont.eot",
            "https://www.vgt.pl/font/roboto/Roboto-Bold.eot \u2022 https://www.vgt.pl/font/roboto/Roboto-Bold.ttf \u2022 https://www.vgt.pl/font/roboto/Roboto-Light.eot",
            "https://www.vgt.pl/static/js/bootstrap-typeahead.jstic/js/bootstrap-typeahead.js",
            "https://www.vgt.pl/style/style.css \u2022 https://www.vgt.pl/static/js/bootstrap-typeahead.js",
            "IP Address 94.152.58.192 Location  Poland ASN AS29522 h88 s.a. Nameservers ns1.kei.pl. ,  ns2.kei.pl.",
            "www.happylifehappywife.com \u2022  http://www.happylifehappywife.com/2010/02/'>",
            "http://www.happylifehappywife.com/2010/04/'> \u2022 http://www.happylifehappywife.com/2010/05/'>",
            "http://www.happylifehappywife.com/2010/07/'> \u2022 http://www.happylifehappywife.com/2010/09/'>",
            "http://www.happylifehappywife.com/2011/06/'> \u2022 http://www.happylifehappywife.com/2011/08/'",
            "http://www.happylifehappywife.com/2011/08/'> \u2022 http://www.happylifehappywife.com/2012/07/'>",
            "http://www.happylifehappywife.com/2013/03/'> \u2022 http://www.happylifehappywife.com/index.php",
            "http://www.happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg",
            "https://amp.mypornvid.fun/videos/8/AhxS-ej1myg/gf-18-com/\ud83c\udf81-i39m-your-present-\ud83c\udf81-girlfriend-surprises-you-for-christmas-reunion-soft-kisses-amp-cuddles",
            "8-25-220-162-static.reverse.queryfoundry.net\t\t\tNov 1, 2025, 9:34:14 AM\t\t5\t  domain\tqueryfoundry.net\t\t\tNov 1, 2025, 9:34:14 AM\t\t8\t  URL\thttp://117-114-251-162-static.reverse.queryfoundry.net/",
            "http://watchhers.net/index.php",
            "remotewd.com device local",
            "nr-data.net \u2022 applemusic-spotlight.myunidays.com \u2022  init.ess.apple.com \u2022 tv.apple.com",
            "https://browntubeporn.com/tsara-brashearsAccept-Language",
            "https://cg864.myhotzpic.com phishing \u2022 http://dashboard.myhotzpic.com/",
            "https://myhotzpic.com/tsara-brashears-hardcore-lesbian-sex/anime-studio.org*thumbs-fa...",
            "https://mypornvid.com/videos/27/x510fb2/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/caillou-finger",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead \u2022 http://siteinlink.d1.cnbd.net/site/maps.google.com.lb/",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead   \u2022 https://videolal.com/videos/tsara-brashears-dead-by-daylight.html",
            "http://pixelrz.com/lists/keywords/tsara-brashears-dead/360 \u2022 http://pixelrz.com/lists/keywords/tsara-brashears-dead/360] No Expiration\t4\t  Domain tsara-brashears-deadspin-twitter-suspended-account-help.ht",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
            "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
            "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "Worm:Win32/Autorun",
              "display_name": "Worm:Win32/Autorun",
              "target": "/malware/Worm:Win32/Autorun"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Jaik",
              "display_name": "Jaik",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qshell",
              "display_name": "Trojan:Win32/Qshell",
              "target": "/malware/Trojan:Win32/Qshell"
            },
            {
              "id": "Trojan:Win32/Mydoom",
              "display_name": "Trojan:Win32/Mydoom",
              "target": "/malware/Trojan:Win32/Mydoom"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "695557ee134b978b00883c29",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8897,
            "domain": 2102,
            "hostname": 2867,
            "FileHash-SHA256": 3886,
            "FileHash-MD5": 619,
            "FileHash-SHA1": 555,
            "CVE": 3,
            "email": 5,
            "SSLCertFingerprint": 8
          },
          "indicator_count": 18942,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "88 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6944ce38344ccded23df66f5",
          "name": "Ransom - Amnesty.org - a single link in a Pegasus attack against a civilian.",
          "description": "I don\u2019t have the right words to put this together because it involves so much coercion, fraud, betrayal, manipulation , hacking, multiple business fronts, loud mouth mafia plants, working with someone under false pretenses, redhat security teams in Denver , Colorado, false implications of cyber attacks coming from foreign entities. \n\nTips come from a highly reliable sources. One link in a Pegasus attack .",
          "modified": "2026-01-18T03:05:59.836000",
          "created": "2025-12-19T04:02:00.973000",
          "tags": [
            "intel",
            "ms windows",
            "write c",
            "pe32",
            "pe32 executable",
            "copy c",
            "free",
            "benjamin",
            "write",
            "worm",
            "win32",
            "code",
            "june",
            "delphi",
            "malware",
            "benjamin",
            "tulach",
            "state of colorado",
            "christopher p. \u2018buzz\u2019 ahmann",
            "danica implants",
            "nids_malware_alert",
            "bonu$",
            "network_icmp",
            "network_irc",
            "persistence_autorun",
            "network_http",
            "nids_alert",
            "allocates_rwx",
            "hackers",
            "creates_exe",
            "brian sabey",
            "sour del",
            "packer_entropy",
            "antivm_memory_available",
            "pe_features",
            "get key",
            "crime",
            "organized crime",
            "federal crime",
            "cyber crime",
            "piracy",
            "status",
            "china unknown",
            "name servers",
            "div div",
            "ip address",
            "domain",
            "creation date",
            "record value",
            "meta",
            "title",
            "hong kong",
            "passive dns",
            "gmt content",
            "type",
            "content length",
            "ipv4 add",
            "urls",
            "files",
            "location hong",
            "twitter",
            "youtube",
            "side 3 studios",
            "denver music",
            "infiltration",
            "whistleblower",
            "getkey",
            "cyber warfare",
            "fraud",
            "financial crimes",
            "pegasus",
            "music front",
            "france unknown",
            "present feb",
            "iran unknown",
            "present nov",
            "present jun",
            "present jan",
            "hidden",
            "present jul",
            "date",
            "united",
            "flag",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "llc name",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "spawns",
            "found",
            "pattern match",
            "mitre att",
            "show technique",
            "ck matrix",
            "ascii text",
            "href",
            "show process",
            "file",
            "general",
            "local",
            "path",
            "memory dumping",
            "entries",
            "icmp delphi",
            "showing",
            "delete",
            "yara detections",
            "windows nt",
            "wow64",
            "khtml",
            "gecko",
            "dns query",
            "packing t1045",
            "ransom",
            "cve",
            "palantir",
            "remote",
            "graham"
          ],
          "references": [
            "Amnesty.org | remote.amnesty.org",
            "tulach.cc",
            "Worm:Win32/Benjamin IDS Detections: Win32.Worm.Benjamin.A CnC Checkin ICMP",
            "Alerts : nids_malware_alert network_icmp network_irc persistence_autorun network_http",
            "Alerts :  nids_alert allocates_rwx creates_exe packer_entropy antivm_memory_available",
            "Delphi Likely Precursor to Scan PING Delphi-Piette Windows Yara Detections Delphi",
            "Delphi This program must be run under Win32 Compilers",
            "More IP\u2019s Contacted  74.6.143.26 Domains Contacted benjamin.xww.de",
            "http://www.yixun.com/getkey {\"privateKey\": \"JMVRar4COFWb3eKZ\"}",
            "Server: JFE https://otx.alienvault.com/otxapi/indicators/url/screenshot/http://www.yixun.com/getkey",
            "http://www.shopsleuth.com/goal-academy/the-citadel/colorado-springs-co",
            "ipv4bot.whatismyipaddress.com",
            "helloprismatic.com",
            "https://palantir-staging.staging.candidate.app.paulsjob.ai/",
            "Brian Sabey",
            "Christopher P. \u2018Buzz\u2019 Ahmann"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Worm:Win32/Benjamin",
              "display_name": "Worm:Win32/Benjamin",
              "target": "/malware/Worm:Win32/Benjamin"
            },
            {
              "id": "Ransom:Win32/GandCrab",
              "display_name": "Ransom:Win32/GandCrab",
              "target": "/malware/Ransom:Win32/GandCrab"
            },
            {
              "id": "CVE-2023-2868",
              "display_name": "CVE-2023-2868",
              "target": null
            },
            {
              "id": "Exploit:Win32/CVE-2017-0147",
              "display_name": "Exploit:Win32/CVE-2017-0147",
              "target": "/malware/Exploit:Win32/CVE-2017-0147"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1539",
              "name": "Steal Web Session Cookie",
              "display_name": "T1539 - Steal Web Session Cookie"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 429,
            "FileHash-SHA1": 341,
            "FileHash-SHA256": 2766,
            "URL": 6976,
            "domain": 1151,
            "CVE": 2,
            "email": 3,
            "hostname": 2913,
            "SSLCertFingerprint": 4
          },
          "indicator_count": 14585,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "91 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "695ea667a062ed6688b104ab",
          "name": "Frost Security | Attorneys | Government | Crazy | Stop Tampering ",
          "description": "",
          "modified": "2026-01-07T18:31:03.104000",
          "created": "2026-01-07T18:31:03.104000",
          "tags": [
            "active",
            "type win32",
            "exe size",
            "first seen",
            "malicious avg",
            "win32",
            "gdata",
            "dynamicloader",
            "fe ff",
            "high",
            "write c",
            "data",
            "x00bx00",
            "uswv",
            "write",
            "redline",
            "stream",
            "guard",
            "malware",
            "push",
            "local",
            "crazyfrost",
            "adversarial",
            "hacker",
            "extraction",
            "enter sc",
            "data upload",
            "extre data",
            "included iocs",
            "url http",
            "url https",
            "include review",
            "exclude sugges",
            "frost security",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "contacted hosts",
            "ip address",
            "process details",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "signing defense",
            "united",
            "flag",
            "contacted",
            "http traffic",
            "file defense",
            "mitre att",
            "ck techniques",
            "evasion att",
            "belize",
            "div div",
            "passive dns",
            "link",
            "ipv4 add",
            "url analysis",
            "urls",
            "files",
            "meta",
            "ddos",
            "indicators show",
            "search",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "hostname",
            "types",
            "hosanna",
            "x show",
            "ck ids",
            "t1060",
            "run keys",
            "startup",
            "folder",
            "t1036",
            "capture",
            "cookie",
            "palantir",
            "indicator role",
            "active related",
            "description",
            "trump supporter",
            "types of",
            "germany",
            "china",
            "netherlands",
            "https",
            "notice",
            "billions",
            "stop",
            "boobs130432 no",
            "expiration",
            "location poland",
            "asn as29522",
            "learn more",
            "domain",
            "foundry",
            "hallrender",
            "brian sabey",
            "tam legal",
            "christopher p ahmann",
            "palantir",
            "quasi government",
            "pentagon"
          ],
          "references": [
            "http://www.crazyfrost.com/wp-content/uploads/2011/01/%D0%BA%D0%BE%D0%BB%D0%BB%D0%B0%D0%B68.jpg\t URL",
            "http://frostsecurity.net/frost/driver/ \u2022 http://frostsecurity.net/frost/frostupdater/",
            "https://tamlegal.com/attorneys/christopher-p-ahmann/",
            "https://www.hallrender.com/attorney/brian-sabey/Accept",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "http://mypornvid.com/videos/27/x510fb2/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/caillou-finger-family",
            "http://vtwctr.org/explore/tsara-brashears-defeats-jeffrey-reimer/ phishing",
            "http://alohatube.xyz/search/tsara-brashears No Expiration\t278\t  URL http://alohatube.xyz/search/tsara-brashears/ No Expiration\t62\t  URL http://amp.mypornvid.fun/videos/2/SLFGMWoQaCU/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears No Expiration\t49\t  URL http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us No Expiration\t27\t  URL http://browntubeporn.com/tsara-brashears.html No Expiration\t40\t  URL http://flexporn.net/tsara-brashears.html",
            "http://wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Languauge phishing",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing",
            "http://advocate-smyslova.ru/tsara-brashears/",
            "http://pixelrz.com/lists/keywords/tsara-brashears-jeffrey-reimer-porn/;0.48692189815948833",
            "http://orangeporntube.net/tsara-brashears.html",
            "http://onlyindianporn2.com/videos/tsara-brashears/",
            "http://videolal.com/tsara-brashears-dead.html",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead/",
            "http://www.music-forum.org/www-cixiu888-com-tsara-brashears.html",
            "http://wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Language",
            "http://www.bukaporn.net/trend/tsara-brashears/ No Expiration\t41\t  URL http://www.gdsl-pallemoebler.info/seach/tsara-brashears/",
            "http://www.sexpornimages.com/tsara/tsara-lynn-brashears-porn/7x56y.html No Expiration\t41\t  URL http://www.sweetheartvideo.com/tsara-brashears No Expiration\t81\t  URL http://www.tryporn.net/seach/tsara-brashears/ No Expiration\t41\t  URL http://www.tryporno.net/movies/tsara-brashears/ No Expiration\t42\t  URL https://alohatube.xyz/search/tsara-brashears No Expiration\t211\t  URL https://alohatube.xyz/search/tsara-brashears+ No Expiration\t51\t  URL https://browntubeporn.com/tsara-brashearsAccept-Language No Expiratio",
            "http://www.sexpornimages.com/tsara/tsara-lynn-brashears-porn/7x56y.html",
            "https://browntubeporn.com/tsara-brashearsAccept-Language",
            "http://www.tryporn.net/seach/tsara-brashears/",
            "https://alohatube.xyz/search/tsara-brashearsL",
            "http://onlyindianporn2.com/videos/tsara-brashears/",
            "http://orangeporntube.net/tsara-brashears.html",
            "https://www.dirtsearch.org/data/TSARA/BRASHEARS/",
            "https://youjizz.sex/tsara-brashears.html",
            "https://www.feestzalenvanvlaanderen.be/seach/tsara-brashears/",
            "https://www.xvxx.me/search/tsara-brashears/",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "https://www.sweetheartvideo.com/tsara-brashear",
            "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
            "http://www.gdsl-pallemoebler.info/seach/tsara-brashears/",
            "http://www.bukaporn.net/trend/tsara-brashears/",
            "tsara-brashears-deadspin-twitter-suspended-account-help.ht",
            "https://mom2fuck.mobi/tsara-brashears.html",
            "http://vtwctr.org/explore/tsara- brashears-defeats-jeffrey-reimer/",
            "http://www.anyxxxtube.net/search-porn/tsara-brashears",
            "www.palantir.com \u2022   palantir.io \u2022 http://datafoundry.com/",
            "http://watchhers.net/index.php \u2022  foundry2sdbl.dvr.dn2.n-helix.com",
            "https://steam.exacg.cc/ \u2022  http://tesgm.ru/_ld/5/584_steam_apidll_Th.rar",
            "Targeting Tsara Brasheras and associated",
            "Targeting Candace Owens"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Ms Defender\tALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "display_name": "Ms Defender\tALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1116",
              "name": "Code Signing",
              "display_name": "T1116 - Code Signing"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1051",
              "name": "Shared Webroot",
              "display_name": "T1051 - Shared Webroot"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1080",
              "name": "Taint Shared Content",
              "display_name": "T1080 - Taint Shared Content"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1085",
              "name": "Rundll32",
              "display_name": "T1085 - Rundll32"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1506",
              "name": "Web Session Cookie",
              "display_name": "T1506 - Web Session Cookie"
            },
            {
              "id": "T1512",
              "name": "Capture Camera",
              "display_name": "T1512 - Capture Camera"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1586",
              "name": "Compromise Accounts",
              "display_name": "T1586 - Compromise Accounts"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            }
          ],
          "industries": [
            "Government",
            "Defense",
            "Healthcare"
          ],
          "TLP": "green",
          "cloned_from": "692897a64c0e255409b5a67e",
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3709,
            "hostname": 1109,
            "FileHash-SHA256": 2872,
            "FileHash-MD5": 214,
            "FileHash-SHA1": 203,
            "domain": 557
          },
          "indicator_count": 8664,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "101 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "695ea6590a50f71a156c9a7f",
          "name": "Frost Security | Attorneys | Government | Crazy | Stop Tampering ",
          "description": "",
          "modified": "2026-01-07T18:30:49.442000",
          "created": "2026-01-07T18:30:49.442000",
          "tags": [
            "active",
            "type win32",
            "exe size",
            "first seen",
            "malicious avg",
            "win32",
            "gdata",
            "dynamicloader",
            "fe ff",
            "high",
            "write c",
            "data",
            "x00bx00",
            "uswv",
            "write",
            "redline",
            "stream",
            "guard",
            "malware",
            "push",
            "local",
            "crazyfrost",
            "adversarial",
            "hacker",
            "extraction",
            "enter sc",
            "data upload",
            "extre data",
            "included iocs",
            "url http",
            "url https",
            "include review",
            "exclude sugges",
            "frost security",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "contacted hosts",
            "ip address",
            "process details",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "signing defense",
            "united",
            "flag",
            "contacted",
            "http traffic",
            "file defense",
            "mitre att",
            "ck techniques",
            "evasion att",
            "belize",
            "div div",
            "passive dns",
            "link",
            "ipv4 add",
            "url analysis",
            "urls",
            "files",
            "meta",
            "ddos",
            "indicators show",
            "search",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "hostname",
            "types",
            "hosanna",
            "x show",
            "ck ids",
            "t1060",
            "run keys",
            "startup",
            "folder",
            "t1036",
            "capture",
            "cookie",
            "palantir",
            "indicator role",
            "active related",
            "description",
            "trump supporter",
            "types of",
            "germany",
            "china",
            "netherlands",
            "https",
            "notice",
            "billions",
            "stop",
            "boobs130432 no",
            "expiration",
            "location poland",
            "asn as29522",
            "learn more",
            "domain",
            "foundry",
            "hallrender",
            "brian sabey",
            "tam legal",
            "christopher p ahmann",
            "palantir",
            "quasi government",
            "pentagon"
          ],
          "references": [
            "http://www.crazyfrost.com/wp-content/uploads/2011/01/%D0%BA%D0%BE%D0%BB%D0%BB%D0%B0%D0%B68.jpg\t URL",
            "http://frostsecurity.net/frost/driver/ \u2022 http://frostsecurity.net/frost/frostupdater/",
            "https://tamlegal.com/attorneys/christopher-p-ahmann/",
            "https://www.hallrender.com/attorney/brian-sabey/Accept",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "http://mypornvid.com/videos/27/x510fb2/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/caillou-finger-family",
            "http://vtwctr.org/explore/tsara-brashears-defeats-jeffrey-reimer/ phishing",
            "http://alohatube.xyz/search/tsara-brashears No Expiration\t278\t  URL http://alohatube.xyz/search/tsara-brashears/ No Expiration\t62\t  URL http://amp.mypornvid.fun/videos/2/SLFGMWoQaCU/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears No Expiration\t49\t  URL http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us No Expiration\t27\t  URL http://browntubeporn.com/tsara-brashears.html No Expiration\t40\t  URL http://flexporn.net/tsara-brashears.html",
            "http://wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Languauge phishing",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing",
            "http://advocate-smyslova.ru/tsara-brashears/",
            "http://pixelrz.com/lists/keywords/tsara-brashears-jeffrey-reimer-porn/;0.48692189815948833",
            "http://orangeporntube.net/tsara-brashears.html",
            "http://onlyindianporn2.com/videos/tsara-brashears/",
            "http://videolal.com/tsara-brashears-dead.html",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead/",
            "http://www.music-forum.org/www-cixiu888-com-tsara-brashears.html",
            "http://wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Language",
            "http://www.bukaporn.net/trend/tsara-brashears/ No Expiration\t41\t  URL http://www.gdsl-pallemoebler.info/seach/tsara-brashears/",
            "http://www.sexpornimages.com/tsara/tsara-lynn-brashears-porn/7x56y.html No Expiration\t41\t  URL http://www.sweetheartvideo.com/tsara-brashears No Expiration\t81\t  URL http://www.tryporn.net/seach/tsara-brashears/ No Expiration\t41\t  URL http://www.tryporno.net/movies/tsara-brashears/ No Expiration\t42\t  URL https://alohatube.xyz/search/tsara-brashears No Expiration\t211\t  URL https://alohatube.xyz/search/tsara-brashears+ No Expiration\t51\t  URL https://browntubeporn.com/tsara-brashearsAccept-Language No Expiratio",
            "http://www.sexpornimages.com/tsara/tsara-lynn-brashears-porn/7x56y.html",
            "https://browntubeporn.com/tsara-brashearsAccept-Language",
            "http://www.tryporn.net/seach/tsara-brashears/",
            "https://alohatube.xyz/search/tsara-brashearsL",
            "http://onlyindianporn2.com/videos/tsara-brashears/",
            "http://orangeporntube.net/tsara-brashears.html",
            "https://www.dirtsearch.org/data/TSARA/BRASHEARS/",
            "https://youjizz.sex/tsara-brashears.html",
            "https://www.feestzalenvanvlaanderen.be/seach/tsara-brashears/",
            "https://www.xvxx.me/search/tsara-brashears/",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "https://www.sweetheartvideo.com/tsara-brashear",
            "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
            "http://www.gdsl-pallemoebler.info/seach/tsara-brashears/",
            "http://www.bukaporn.net/trend/tsara-brashears/",
            "tsara-brashears-deadspin-twitter-suspended-account-help.ht",
            "https://mom2fuck.mobi/tsara-brashears.html",
            "http://vtwctr.org/explore/tsara- brashears-defeats-jeffrey-reimer/",
            "http://www.anyxxxtube.net/search-porn/tsara-brashears",
            "www.palantir.com \u2022   palantir.io \u2022 http://datafoundry.com/",
            "http://watchhers.net/index.php \u2022  foundry2sdbl.dvr.dn2.n-helix.com",
            "https://steam.exacg.cc/ \u2022  http://tesgm.ru/_ld/5/584_steam_apidll_Th.rar",
            "Targeting Tsara Brasheras and associated",
            "Targeting Candace Owens"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Ms Defender\tALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "display_name": "Ms Defender\tALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1116",
              "name": "Code Signing",
              "display_name": "T1116 - Code Signing"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1051",
              "name": "Shared Webroot",
              "display_name": "T1051 - Shared Webroot"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1080",
              "name": "Taint Shared Content",
              "display_name": "T1080 - Taint Shared Content"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1085",
              "name": "Rundll32",
              "display_name": "T1085 - Rundll32"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1506",
              "name": "Web Session Cookie",
              "display_name": "T1506 - Web Session Cookie"
            },
            {
              "id": "T1512",
              "name": "Capture Camera",
              "display_name": "T1512 - Capture Camera"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1586",
              "name": "Compromise Accounts",
              "display_name": "T1586 - Compromise Accounts"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            }
          ],
          "industries": [
            "Government",
            "Defense",
            "Healthcare"
          ],
          "TLP": "green",
          "cloned_from": "692897a64c0e255409b5a67e",
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3709,
            "hostname": 1109,
            "FileHash-SHA256": 2872,
            "FileHash-MD5": 214,
            "FileHash-SHA1": 203,
            "domain": 557
          },
          "indicator_count": 8664,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "101 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6907cc66855b7dfe1306b0d8",
          "name": "Inject : Defense Counsel attaches to Apple Notebooks - Targeting",
          "description": "TAM Legal attacking Tsara Brashears and associated. Christopher P. Ahmann Esq Is the Special Counsel assigned to pester , smear, tamper with, terrorize, arrange murders, dispatch stalkers, deny care, swatting , botnets, attach to  devices , deflect award for life ending injuries to you and your Mafia, choose malicious media companies (Hall Render) to smear Jeffrey Scott Reimers assault victim. This is silencing. Not everyone has someone to speak. Back off. You\u2019re sick. Enjoying that money, while Tsara slept on air mattress during a couch tour. Demyelinating, from denied disclosed of cord compression; like George Floyd. You should turn yourself in, write a HUGA check , shut down this criminal operation , find Jesus , self exit to a place out away from you targets ,  go to your bunker forever. You are a God Forsaken terrorist hitman! You\u2019re all SO sick!\nEnd Game Now.",
          "modified": "2026-01-01T07:03:18.851000",
          "created": "2025-11-02T21:25:58.814000",
          "tags": [
            "present nov",
            "unknown aaaa",
            "ip address",
            "win32",
            "america asn",
            "twitter",
            "united states",
            "america",
            "ipv4",
            "united",
            "a domains",
            "443 ma86400",
            "super",
            "read c",
            "memcommit",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "tlsv1",
            "regsetvalueexa",
            "hack",
            "write",
            "february",
            "local",
            "unknown",
            "persistence",
            "execution",
            "xport",
            "kb body",
            "present aug",
            "present sep",
            "present oct",
            "for privacy",
            "false",
            "expirestue",
            "path",
            "p2404",
            "accept",
            "p11762282638",
            "host",
            "gmt range",
            "gmt ifnonematch",
            "p11762466264",
            "p11762417453",
            "nothing",
            "shutdown",
            "process32nextw",
            "langturkish",
            "sublangdefault",
            "regdword",
            "rtrcdata",
            "microsoft excel",
            "delphi",
            "worm",
            "malware",
            "error",
            "next",
            "format",
            "suspicious",
            "less see",
            "contacted",
            "all ip",
            "domains",
            "all related",
            "pulses otx",
            "related tags",
            "file type",
            "pexe",
            "christopher ahmann",
            "tam legal",
            "treece",
            "hacking",
            "highjacking",
            "modified",
            "quasi government",
            "ai google",
            "inject",
            "adversaries",
            "government",
            "insurance",
            "apple"
          ],
          "references": [
            "External Apple Connection: Notepad.pw",
            "Sex Tools: m.pornsexer.xxx.3.1.adiosfil.roksit.net |",
            "www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process\t h",
            "takedown-communication-api.prod-c15a-awsuse.ppops.net",
            "L\u00b0\u00b0k @ You, okay Chris\u2026abgubdf.apple.cloudns.biz \u2022 cloudns.biz \u2022 https://abgubdf.apple.cloudns",
            "http://www.mof.gov.cn.lxcvc.com/ \u2022 https://r//www.csrc.gov.cn.lxcvc.com/",
            "http://www.mohurd.gov.cn.lxcvc.com/",
            "config.uca.cloud.unity3d.com",
            "0.0.iphone.8dyf8rf5k3.fr.mobiletrend.rtl2.adsenseformobileapps.com",
            "http://mp7tf.best-cell-phone-plans-for-seniors.cfd/",
            "sipphone.com",
            "uk5seki2ygz3kyfgliqe37477miq6jsf.nlsexolehxry4opotgpq"
          ],
          "public": 1,
          "adversary": "TAM Legal Christopher P. Ahmann Chief Terrorist",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win.Malware.004bf-6866449-0",
              "display_name": "Win.Malware.004bf-6866449-0",
              "target": null
            },
            {
              "id": "Custom Malware",
              "display_name": "Custom Malware",
              "target": null
            },
            {
              "id": "Worn:Win32/AutoRun.XXY!bit",
              "display_name": "Worn:Win32/AutoRun.XXY!bit",
              "target": "/malware/Worn:Win32/AutoRun.XXY!bit"
            }
          ],
          "attack_ids": [
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1055.001",
              "name": "Dynamic-link Library Injection",
              "display_name": "T1055.001 - Dynamic-link Library Injection"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1122",
              "name": "Component Object Model Hijacking",
              "display_name": "T1122 - Component Object Model Hijacking"
            }
          ],
          "industries": [
            "Legal",
            "Government",
            "Healthcare",
            "Technology",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2615,
            "URL": 7521,
            "hostname": 1775,
            "domain": 689,
            "FileHash-MD5": 448,
            "FileHash-SHA1": 295,
            "SSLCertFingerprint": 12,
            "email": 1
          },
          "indicator_count": 13356,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "108 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "692897a64c0e255409b5a67e",
          "name": "Frost Security | Attorneys | Government | Crazy",
          "description": "Dangerous. Being abused by the usual quasi government suspects. Affecting many targets including Candace Owens. Who can you turn to when your own government is 100% corrupt. \n\nCall me crazy. Idk. DJT was likely shot with a High Velocity Paint Ball. Why isn\u2019t anyone interviewing the families of the 3 \u2018allegedly\u2019 successfully assassinated. \n\nIs Charlie Kirk Dead or in hiding, an alien that doesn\u2019t bleed? \n\nLook it up. High Velocity Paint Ball is a very intensely underrated, nharsky spoken about sport enjoyed by gun enthusiast , snipers , military, civilians. Something weird is going on and it\u2019s actually obvious because they just want results.\n There\u2019s more disturbing things to come. I think more people are being taken out this way than we know.\nBy now I\u2019m under too much surveillance to just leave out casually. \nTerrifying for sure. I know Hos of the Bible is bigger.",
          "modified": "2025-12-27T17:01:06.155000",
          "created": "2025-11-27T18:25:42.570000",
          "tags": [
            "active",
            "type win32",
            "exe size",
            "first seen",
            "malicious avg",
            "win32",
            "gdata",
            "dynamicloader",
            "fe ff",
            "high",
            "write c",
            "data",
            "x00bx00",
            "uswv",
            "write",
            "redline",
            "stream",
            "guard",
            "malware",
            "push",
            "local",
            "crazyfrost",
            "adversarial",
            "hacker",
            "extraction",
            "enter sc",
            "data upload",
            "extre data",
            "included iocs",
            "url http",
            "url https",
            "include review",
            "exclude sugges",
            "frost security",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "contacted hosts",
            "ip address",
            "process details",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "signing defense",
            "united",
            "flag",
            "contacted",
            "http traffic",
            "file defense",
            "mitre att",
            "ck techniques",
            "evasion att",
            "belize",
            "div div",
            "passive dns",
            "link",
            "ipv4 add",
            "url analysis",
            "urls",
            "files",
            "meta",
            "ddos",
            "indicators show",
            "search",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "hostname",
            "types",
            "hosanna",
            "x show",
            "ck ids",
            "t1060",
            "run keys",
            "startup",
            "folder",
            "t1036",
            "capture",
            "cookie",
            "palantir",
            "indicator role",
            "active related",
            "description",
            "trump supporter",
            "types of",
            "germany",
            "china",
            "netherlands",
            "https",
            "notice",
            "billions",
            "stop",
            "boobs130432 no",
            "expiration",
            "location poland",
            "asn as29522",
            "learn more",
            "domain",
            "foundry",
            "hallrender",
            "brian sabey",
            "tam legal",
            "christopher p ahmann",
            "palantir",
            "quasi government",
            "pentagon"
          ],
          "references": [
            "http://www.crazyfrost.com/wp-content/uploads/2011/01/%D0%BA%D0%BE%D0%BB%D0%BB%D0%B0%D0%B68.jpg\t URL",
            "http://frostsecurity.net/frost/driver/ \u2022 http://frostsecurity.net/frost/frostupdater/",
            "https://tamlegal.com/attorneys/christopher-p-ahmann/",
            "https://www.hallrender.com/attorney/brian-sabey/Accept",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "http://mypornvid.com/videos/27/x510fb2/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/caillou-finger-family",
            "http://vtwctr.org/explore/tsara-brashears-defeats-jeffrey-reimer/ phishing",
            "http://alohatube.xyz/search/tsara-brashears No Expiration\t278\t  URL http://alohatube.xyz/search/tsara-brashears/ No Expiration\t62\t  URL http://amp.mypornvid.fun/videos/2/SLFGMWoQaCU/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears No Expiration\t49\t  URL http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us No Expiration\t27\t  URL http://browntubeporn.com/tsara-brashears.html No Expiration\t40\t  URL http://flexporn.net/tsara-brashears.html",
            "http://wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Languauge phishing",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing",
            "http://advocate-smyslova.ru/tsara-brashears/",
            "http://pixelrz.com/lists/keywords/tsara-brashears-jeffrey-reimer-porn/;0.48692189815948833",
            "http://orangeporntube.net/tsara-brashears.html",
            "http://onlyindianporn2.com/videos/tsara-brashears/",
            "http://videolal.com/tsara-brashears-dead.html",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead/",
            "http://www.music-forum.org/www-cixiu888-com-tsara-brashears.html",
            "http://wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Language",
            "http://www.bukaporn.net/trend/tsara-brashears/ No Expiration\t41\t  URL http://www.gdsl-pallemoebler.info/seach/tsara-brashears/",
            "http://www.sexpornimages.com/tsara/tsara-lynn-brashears-porn/7x56y.html No Expiration\t41\t  URL http://www.sweetheartvideo.com/tsara-brashears No Expiration\t81\t  URL http://www.tryporn.net/seach/tsara-brashears/ No Expiration\t41\t  URL http://www.tryporno.net/movies/tsara-brashears/ No Expiration\t42\t  URL https://alohatube.xyz/search/tsara-brashears No Expiration\t211\t  URL https://alohatube.xyz/search/tsara-brashears+ No Expiration\t51\t  URL https://browntubeporn.com/tsara-brashearsAccept-Language No Expiratio",
            "http://www.sexpornimages.com/tsara/tsara-lynn-brashears-porn/7x56y.html",
            "https://browntubeporn.com/tsara-brashearsAccept-Language",
            "http://www.tryporn.net/seach/tsara-brashears/",
            "https://alohatube.xyz/search/tsara-brashearsL",
            "http://onlyindianporn2.com/videos/tsara-brashears/",
            "http://orangeporntube.net/tsara-brashears.html",
            "https://www.dirtsearch.org/data/TSARA/BRASHEARS/",
            "https://youjizz.sex/tsara-brashears.html",
            "https://www.feestzalenvanvlaanderen.be/seach/tsara-brashears/",
            "https://www.xvxx.me/search/tsara-brashears/",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "https://www.sweetheartvideo.com/tsara-brashear",
            "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
            "http://www.gdsl-pallemoebler.info/seach/tsara-brashears/",
            "http://www.bukaporn.net/trend/tsara-brashears/",
            "tsara-brashears-deadspin-twitter-suspended-account-help.ht",
            "https://mom2fuck.mobi/tsara-brashears.html",
            "http://vtwctr.org/explore/tsara- brashears-defeats-jeffrey-reimer/",
            "http://www.anyxxxtube.net/search-porn/tsara-brashears",
            "www.palantir.com \u2022   palantir.io \u2022 http://datafoundry.com/",
            "http://watchhers.net/index.php \u2022  foundry2sdbl.dvr.dn2.n-helix.com",
            "https://steam.exacg.cc/ \u2022  http://tesgm.ru/_ld/5/584_steam_apidll_Th.rar",
            "Targeting Tsara Brasheras and associated",
            "Targeting Candace Owens"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Ms Defender\tALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "display_name": "Ms Defender\tALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1116",
              "name": "Code Signing",
              "display_name": "T1116 - Code Signing"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1051",
              "name": "Shared Webroot",
              "display_name": "T1051 - Shared Webroot"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1080",
              "name": "Taint Shared Content",
              "display_name": "T1080 - Taint Shared Content"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1085",
              "name": "Rundll32",
              "display_name": "T1085 - Rundll32"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1506",
              "name": "Web Session Cookie",
              "display_name": "T1506 - Web Session Cookie"
            },
            {
              "id": "T1512",
              "name": "Capture Camera",
              "display_name": "T1512 - Capture Camera"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1586",
              "name": "Compromise Accounts",
              "display_name": "T1586 - Compromise Accounts"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            }
          ],
          "industries": [
            "Government",
            "Defense",
            "Healthcare"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3709,
            "hostname": 1109,
            "FileHash-SHA256": 2872,
            "FileHash-MD5": 214,
            "FileHash-SHA1": 203,
            "domain": 557
          },
          "indicator_count": 8664,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "112 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "691ead29f61101bfa3700998",
          "name": "Dopple AI | Poem Hunter: Poems - Poets - Poetry",
          "description": "Online  terms that sexulize SA victim : Tsara brashears slander red porn videos ,\nHardcore porn, is pornography that features detailed depictions of sexual organs or sexual acts such as vaginal, anal or oral intercourse, fingering, brashears , Red Porn Videos , Tsara brashears slandered red porn\nyoujizz sex\n,  Tsara brashears submission on august 27 via manual free , College fuck fest Super japanese hd compilation , \none kinky student fucks tsara brashears porn xxx porn , the best internet porn site\n, tsara brashears slandered,  porn video uploaded to hardcore ,\nxxxxxxxxxx sex videos\nsearch ,  xxxxxxxxxx hd porn. tsara brashears\u09ac\u09b2\u09a6\u09b6\u09b0 \u09a8\u09a4\u09a8 \u09ad\u09acfrench retro gangbang in the hotel room,  You will Tsara brashears porn ,\nChunky babe loves to be on top Hot Milf , xxx Movies,  updates hourly.\n tsara brashears slandered,\nfrench retro gangbang in the hotel room , free porn videos. You will Tsara brashears porn   jeffrey reimer puts his love on top tsara brashears  brother",
          "modified": "2025-12-20T03:00:41.407000",
          "created": "2025-11-20T05:54:49.968000",
          "tags": [
            "active related",
            "search filter",
            "time tsara",
            "x show",
            "cidr",
            "email",
            "learn more",
            "information",
            "t1027",
            "t1036",
            "t1057",
            "discovery",
            "t1059",
            "t1071",
            "title added",
            "poem",
            "the day",
            "wild eyesand",
            "unknown power",
            "shakespeare",
            "repeats",
            "ere man",
            "dowell oreilly",
            "read poem",
            "snit",
            "website",
            "loading",
            "rl https",
            "y0 nov",
            "vj96",
            "uyebaaeabaaaaac",
            "jid442122029",
            "active",
            "url http",
            "url https",
            "types",
            "indicators show",
            "type indicator",
            "added active",
            "tbmvid",
            "sourcelnms",
            "zx1724209326040",
            "read c",
            "module load",
            "showing",
            "delphi",
            "delete",
            "rgba",
            "unicode",
            "malware",
            "write",
            "win32",
            "execution",
            "next",
            "extraction",
            "data upload",
            "extre",
            "include data",
            "sc type",
            "url tot",
            "role title",
            "tsara brashears",
            "live sex",
            "porn video",
            "levelblue",
            "porn",
            "pornhub",
            "porn videos",
            "watch tsara",
            "most relevant",
            "q estimation",
            "green",
            "tsara",
            "online chat",
            "spicychat ai",
            "visa",
            "sex chat",
            "miss stella",
            "january",
            "philadelphia",
            "dopple ai",
            "b1 dec",
            "videos",
            "red porn",
            "free porn",
            "sunny leone",
            "hardcore porn",
            "jeffrey reimer",
            "puts",
            "love",
            "super",
            "download",
            "top tsara",
            "google search",
            "la iniciacin",
            "xxx hd",
            "bdsm scene",
            "nsfw experience",
            "ck ids",
            "open threat",
            "filepath https",
            "foundry",
            "palantir",
            "brian sabey",
            "yas",
            "tiny penis",
            "slander",
            "indicator role",
            "pulses url",
            "search"
          ],
          "references": [
            "OTX must have an issue. A delete app seen before has deleted a majority of malicious IoCs. Im",
            "I don\u2019t appreciate OTX populated Malware suggestion \u2018SNIT\u2019 \u2018 Dopple AI\u2019 NOT malware",
            "OTX description for SNIT- I love to compose letters of resignation; now and then I send one in",
            "and leave in a lemon- hued Huff da Country or a Snit with four on the MALWARE fOORILIES",
            "OTX description for Dopple AI -  There\u2019s someone for everyone out there in the BDSM scene, you can enjoy the",
            "free NSFW experience offered by Dopple AI.MALWARE",
            "Makes zero sense. Malicious. I don\u2019t get it. I have a Malware gift for you too!",
            "Y.A.S:1Byte/TinyRod SeeDescription @ Y.A.S. OFFICIAL MUSIC VIDEO"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Snit",
              "display_name": "Snit",
              "target": null
            },
            {
              "id": "Dopple AI",
              "display_name": "Dopple AI",
              "target": null
            },
            {
              "id": "Y.A.S:1Byte/TinyRod",
              "display_name": "Y.A.S:1Byte/TinyRod",
              "target": "/malware/Y.A.S:1Byte/TinyRod"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1495",
              "name": "Firmware Corruption",
              "display_name": "T1495 - Firmware Corruption"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2497,
            "hostname": 742,
            "FileHash-SHA256": 523,
            "domain": 223,
            "FileHash-MD5": 85,
            "FileHash-SHA1": 56,
            "email": 4
          },
          "indicator_count": 4130,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "120 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "691e2279ac1ef8b9dbfbc2b3",
          "name": "Mirai \u2022 Neurotox Institute",
          "description": "Found in peripheral. Lazarus. Related tomOperation Endgame. Strangely related to the entertainment industry. \nRelated to treatments facilities where a target I\u2019ve been researching received \u2018care\u2019. Also links to Major Entertainment conglomerate : not surprisingly Hall Render and Foundry.\nPage was stated to expire 11/21 | expired after I was able to capture a live screenshot (not updated for years) \n\n[The Neurotoxin Institute (NTI) is a multidisciplinary organization created to serve as a comprehensive independent source of information related to the basic science and the clinical applications of neurotoxins. The Institute fosters the learning and teaching of both theory and practical techniques, and encourages further research in support of these goals.\nExperimental Biology (EB)\nwww.aapmr.org]",
          "modified": "2025-12-19T19:00:18.927000",
          "created": "2025-11-19T20:03:05.195000",
          "tags": [
            "united",
            "link",
            "virtool",
            "meta",
            "atom",
            "pragma",
            "dynamicloader",
            "msie",
            "windows nt",
            "tls handshake",
            "failure",
            "tlsv1",
            "forbidden",
            "ogoogle trust",
            "encrypt",
            "possible",
            "write",
            "malware",
            "consumed",
            "netherlands",
            "united kingdom",
            "read c",
            "sality",
            "delphi",
            "win32",
            "strings",
            "xserver",
            "post http",
            "post method",
            "cryptexportkey",
            "ocloudflare",
            "cryptgenkey",
            "calgrc4",
            "persistence",
            "execution",
            "div div",
            "script script",
            "span a",
            "a li",
            "unknown ns",
            "span",
            "april",
            "passive dns",
            "hosting",
            "reverse dns",
            "hostname add",
            "files ip",
            "asn as32475",
            "address domain",
            "mirai",
            "united states",
            "facebook",
            "twitter",
            "youtube",
            "ck ids",
            "mh may",
            "t1204 technique",
            "user execution",
            "suggested",
            "port",
            "destination",
            "telnet login",
            "high",
            "tcp syn",
            "infectednight",
            "resolverror",
            "suspicious path",
            "ids detections",
            "yara detections",
            "sinkhole cookie",
            "file score",
            "detections sf",
            "value snkz",
            "forbidden tls",
            "et trojan",
            "value",
            "et info",
            "et",
            "present oct",
            "domain",
            "title",
            "present sep",
            "moved",
            "server",
            "next associated",
            "ipv4 add",
            "urls",
            "files",
            "trojan",
            "cookie",
            "predict70 sep",
            "next http",
            "scans record",
            "forbidden date",
            "gmt content",
            "type",
            "unix",
            "namecheap url",
            "forward elf",
            "md5 add",
            "less see",
            "contacted",
            "pulse pulses",
            "av detections",
            "analysis date",
            "virus",
            "ee fc",
            "unknown",
            "yara rule",
            "ff d5",
            "search",
            "show",
            "suspicious",
            "fbq object",
            "ide value",
            "source level",
            "url text",
            "line",
            "allow attribute",
            "mootools",
            "class function",
            "chain",
            "options",
            "elements",
            "garbage",
            "drag",
            "xhr function",
            "ajax",
            "itemid14",
            "kb image",
            "kb script",
            "b image",
            "b stylesheet",
            "b script",
            "kb stylesheet",
            "stylesheet",
            "redirect chain",
            "path size",
            "type mimetype",
            "resource",
            "general full",
            "montreal",
            "canada",
            "asn16276",
            "debian",
            "url http",
            "hash",
            "main",
            "cookie object",
            "dns any",
            "date",
            "entries",
            "url https",
            "Foundry",
            "Lazarus",
            "Endgame",
            "Neurotoxin Institute",
            "Hall Render",
            "Brian Sabey",
            "UC Health",
            "Britney Spears Official"
          ],
          "references": [
            "https://www.neurotoxininstitute.com/",
            "Backdoor.Win32.Pushdo.s Checkin",
            "IDS Detections: Backdoor.Win32.Pushdo.s Checkin Possible Compromised Host AnubisNetworks",
            "IDS Detections: Sinkhole Cookie Value Snkz 403 Forbidden TLS Handshake Failure",
            "IDS Detections: ET TROJAN Possible Compromised Host AnubisNetworks Sinkhole",
            "IDS Detections: Cookie Value btst ET INFO Namecheap URL Forward",
            "IDS Detections : SUSPICIOUS Path to BusyBox root login TELNET login failed",
            "http://appelfarm.org",
            "IDS Signatures : root login 175.203.174.23 \u2022 192.168.122.52",
            "IDS Signatures :TELNET login failed\t77.66.206.206 \u2022 192.168.122.52",
            "IDS Signatures :  SUSPICIOUS Path to BusyBox\t192.168.122.52\t\u2022 77.66.206.206",
            "Interesting Strings : 13.79.87.163",
            "https://urlscan.io/screenshots/32b0614f-1148-49ea-aed4-4f23afd33e56.png",
            "https://otx.alienvault.com/pulse/68d0f099f60e98e6c4ffc1e5",
            "https://otx.alienvault.com/pulse/68b5e672f492fdc96cf997aa",
            "https://otx.alienvault.com/pulse/68d12dd7e357755235f007e8",
            "https://britneyspears.com/",
            "hallrender.com \u2022  https://hallrender.com/resources/blog/ \u2022 https://urlmail.hallrender.com \u2022 https://urlwww.hallrender.com",
            "https://citrix.hallrender.com/vpn/install/ \u2022  https://citrix.hallrender.com/vpn/install/mac.htm \u2022 https://www.hallrender.com/attorney/brian-sabey/Accept",
            "http://hallrender.com/attorney/brian-sabey \u2022 http://hallrender.com/attorney/brian-sabey/",
            "http://elite.hallrender.com/TE_3E_PROD/web/ui/dashboard/ActionList_CCC",
            "https://elite.hallrender.com \u2022  https://hallrender.com/attorney/gregg-m-wallander/",
            "brian-sabey-anyxxxtube.net \u2022 hallrender.com",
            "dev.hallrender.com \u2022 elite.hallrender.com \u2022 image.marketing.hallrender.com",
            "Now https://urlscan.io/liveshot/?width=1600&height=1200&url=http%3A%2F%2Fwww.neurotoxininstitute.com%2Findex.php%3Foption%5C%3Dcom_content%26view%5C%3Darticle%26id%5C%3D70%26Itemid%5C%3D14",
            "feastfoundry.com\t\u2022 https://www.feastfoundry.com/ \u2022 https://www.feastfoundry.com/mini-apple-pies/"
          ],
          "public": 1,
          "adversary": "Lazarus",
          "targeted_countries": [
            "United States of America",
            "Japan",
            "France",
            "Germany",
            "Canada",
            "Netherlands",
            "United Kingdom of Great Britain and Northern Ireland",
            "New Zealand",
            "Italy",
            "Aruba",
            "Poland",
            "Singapore",
            "T\u00fcrkiye",
            "Indonesia",
            "Spain",
            "Hong Kong"
          ],
          "malware_families": [
            {
              "id": "TrojanDownloader:Win32/Cutwail",
              "display_name": "TrojanDownloader:Win32/Cutwail",
              "target": "/malware/TrojanDownloader:Win32/Cutwail"
            },
            {
              "id": "Netherlands",
              "display_name": "Netherlands",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "Virus:Win32/Krepper.30760",
              "display_name": "Virus:Win32/Krepper.30760",
              "target": "/malware/Virus:Win32/Krepper.30760"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Backdoor:Linux/Mirai.A!rf",
              "display_name": "ALF:HeraklezEval:Backdoor:Linux/Mirai.A!rf",
              "target": null
            },
            {
              "id": "Suggested",
              "display_name": "Suggested",
              "target": null
            },
            {
              "id": "VirTool:Win32/VBInject.gen!MH",
              "display_name": "VirTool:Win32/VBInject.gen!MH",
              "target": "/malware/VirTool:Win32/VBInject.gen!MH"
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Softcnapp",
              "display_name": "Softcnapp",
              "target": null
            },
            {
              "id": "ALF:RPF:PEATTR_SIGATTR:PREDICT:70",
              "display_name": "ALF:RPF:PEATTR_SIGATTR:PREDICT:70",
              "target": null
            },
            {
              "id": "Win32:Zbot-RUV",
              "display_name": "Win32:Zbot-RUV",
              "target": null
            },
            {
              "id": "Win32:Evo-gen",
              "display_name": "Win32:Evo-gen",
              "target": null
            },
            {
              "id": "Win32:Kryptik",
              "display_name": "Win32:Kryptik",
              "target": null
            },
            {
              "id": "Trojan:Win32/Bulta",
              "display_name": "Trojan:Win32/Bulta",
              "target": "/malware/Trojan:Win32/Bulta"
            }
          ],
          "attack_ids": [
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 511,
            "hostname": 198,
            "domain": 471,
            "FileHash-SHA256": 1442,
            "FileHash-MD5": 183,
            "FileHash-SHA1": 79,
            "email": 5,
            "SSLCertFingerprint": 63
          },
          "indicator_count": 2952,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 144,
          "modified_text": "120 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6916e098df39114161354b23",
          "name": "Exodus l Cellbrite \u2022 Pegasus | Brian Sabey | HallRender | Tulach ",
          "description": "",
          "modified": "2025-12-14T07:05:42.106000",
          "created": "2025-11-14T07:56:08.872000",
          "tags": [
            "ssl certificate",
            "network",
            "malware",
            "whois record",
            "contacted",
            "pegasus",
            "resolutions",
            "communicating",
            "sa victim",
            "assaulter",
            "quasar",
            "brian sabey",
            "go.sabey",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "samples",
            "united",
            "aaaa",
            "status",
            "susp",
            "search",
            "passive dns",
            "urls",
            "domain",
            "creation date",
            "date",
            "next",
            "show",
            "domain related",
            "feeds ioc",
            "maltiverse",
            "analyze",
            "scan endpoints",
            "all octoseek",
            "url https",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "all search",
            "otx octoseek",
            "hostname",
            "pulse submit",
            "url analysis",
            "files",
            "china unknown",
            "as4134 chinanet",
            "unknown",
            "name servers",
            "showing",
            "namesilo",
            "domain name",
            "dynadot llc",
            "as8075",
            "script urls",
            "netherlands",
            "a domains",
            "capture",
            "asnone united",
            "record value",
            "expiration date",
            "entries",
            "cname",
            "tulach",
            "algorithm",
            "v3 serial",
            "number",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "x509v3 extended",
            "info",
            "first",
            "server",
            "available from",
            "iana id",
            "registrar abuse",
            "registrar url",
            "registrar whois",
            "abuse contact",
            "email",
            "registry domain",
            "code",
            "win32 exe",
            "ufed iphone",
            "cellebrite ufed",
            "setup",
            "tjprojmain",
            "ufed4pc",
            "win32 dll",
            "detections type",
            "name",
            "responder",
            "exodus",
            "android",
            "office open",
            "xml document",
            "cellebrite",
            "type name",
            "pdf cellebrite",
            "ufed release",
            "cellbrite",
            "privilege https",
            "targets sa",
            "survivor",
            "getprocaddress",
            "indicator",
            "prefetch8",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "file",
            "pattern match",
            "observed email",
            "path",
            "factory",
            "hybrid",
            "general",
            "model",
            "comspec",
            "click",
            "title",
            "page",
            "body doctype",
            "quoth",
            "raven",
            "gmt content",
            "type",
            "vary",
            "accept",
            "october",
            "december",
            "copy",
            "execution",
            "awful",
            "referrer",
            "april",
            "kimsuky",
            "malicious",
            "crypto",
            "startpage",
            "hacktool",
            "installer",
            "tofsee",
            "historical ssl",
            "threat roundup",
            "phishing",
            "utc submissions",
            "submitters",
            "csc corporate",
            "domains",
            "twitter",
            "dropbox",
            "incapsula",
            "summary iocs",
            "graph community",
            "registrarsafe",
            "gandi sas",
            "google llc",
            "amazon02",
            "google",
            "akamaias",
            "facebook",
            "service",
            "patch",
            "namecheapnet",
            "cloudflarenet",
            "amazonaes",
            "gmo internet",
            "apple",
            "tsara brashears",
            "keylogger"
          ],
          "references": [
            "https://tulach.cc/",
            "cellebrite.com | https://cellebrite.com/en/federal-government/",
            "https://www.pornhub.com/video/search?search=tsara+brashears",
            "https://twitter.com/PORNO_SEXYBABES",
            "hanmail.net",
            "114.114.114.114",
            "work.a-poster.info",
            "www-stage40.pornhub.com",
            "go.sabey.com",
            "sabey.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Exodus",
              "display_name": "Exodus",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "PWS:Win32/Raven",
              "display_name": "PWS:Win32/Raven",
              "target": "/malware/PWS:Win32/Raven"
            },
            {
              "id": "Kimsuky",
              "display_name": "Kimsuky",
              "target": null
            },
            {
              "id": "VirTool:Win32/Tofsee",
              "display_name": "VirTool:Win32/Tofsee",
              "target": "/malware/VirTool:Win32/Tofsee"
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65a76c2901b34c79a681596d",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4295,
            "FileHash-MD5": 322,
            "FileHash-SHA1": 296,
            "FileHash-SHA256": 3255,
            "domain": 2911,
            "hostname": 2894,
            "CVE": 2,
            "email": 9,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 13986,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "126 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "691439014fa9d79406a83e8e",
          "name": "Mirai Botnet \u2022 Michael Crincoli - | Patient Fusion",
          "description": "I researched this doctor because of patient documentation of  unethical practices , injury , blood toxicity and other very strange circumstances experienced by a monitored target. \nMD is based in Arizona, comes to Denver for certain cases. There weren\u2019t any follow ups or return calls after serious side affects that needed aggressive intervention.",
          "modified": "2025-12-12T05:04:18.490000",
          "created": "2025-11-12T07:36:33.673000",
          "tags": [
            "practice fusion",
            "patient fusion",
            "ave suite",
            "denver",
            "help log",
            "physical",
            "medicine",
            "book",
            "friday",
            "united",
            "present aug",
            "present nov",
            "present oct",
            "present sep",
            "present jul",
            "present jun",
            "ip address",
            "url analysis",
            "msie",
            "chrome",
            "formbook cnc",
            "checkin",
            "win64",
            "next associated",
            "smokeloader",
            "twitter",
            "cookie",
            "ipv4",
            "hosting",
            "suite",
            "verdict",
            "present may",
            "domain add",
            "files show",
            "avast avg",
            "post",
            "http traffic",
            "high",
            "south korea",
            "taiwan as3462",
            "python",
            "agent",
            "malware",
            "russia asnone",
            "czechia as51420",
            "italy as47217",
            "belgium as5432",
            "serbia as15958",
            "germany as34011",
            "contacted",
            "file score",
            "detections elf",
            "eseries device",
            "rce attempt",
            "outbound python",
            "user agent",
            "p2p_cnc",
            "network_http_post",
            "network_http",
            "network_cnc_http",
            "dead_host",
            "network_icmp",
            "osquery_detection",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "signing defense",
            "tcp syn",
            "resolverror",
            "yara detections",
            "expl",
            "ddos",
            "icmp traffic",
            "copy",
            "mirai",
            "writes_to_stdout",
            "nolookup_communication",
            "tcp_syn_scan",
            "network_icmp",
            "host",
            "network_irc",
            "crincoli",
            "md",
            "mirai botnet",
            "brian sabey",
            "hall render",
            "michael crincoli",
            "palantir",
            "foundry"
          ],
          "references": [
            "https://www.patientfusion.com/doctor/michael-crincoli-59108",
            "demos.palantirfoundry.com",
            "http://southwestphysiatry.com/",
            "IDS Detections: Linksys E-Series Device RCE Attempt Outbound",
            "IDS Detections: Python Requests Suspicious User Agent",
            "IDS Detections: HTTP traffic on port 443 (POST)",
            "IDS Detections : Mirai Variant Spreading",
            "Yara Detections :  Mirai_Botnet_Malware ,  Mirai_2 ,  is__elf ,  Linux_Mirai",
            "Yara: Descriptive: Mirai_Botnet_Malware /dev/misc/watchdog \u2022 Mirai_2 /dev/watchdog",
            "Yara Descriptive: \u2022  is__elf \u007fELF \u2022  Linux_Mirai /dev/watchdog",
            "http://www.hallrender.com/attorney/brian-sabey/anyxxxtube.net/search-porn/tsara-brashears",
            "http://www.hallrender.com/attorney/brian-sabey-anyxxxtube.net/search-porn/tsara-brashears",
            "click.marketing.hallrender.com \u2022 hallrender.com \u2022 autodiscover.hallrender.com",
            "https://click.marketing.hallrender.com/?qs=9f3b0a760973d5628ba046a192f7fe432889bb96dc51578763a9cf11358dcde635e137184c12a031617f00faa9d172d8",
            "hallrender.com \u2022 wwdancehall.com \u2022 hallplan.vm05.iveins.de\t \u2022 iveins.de \u2022 http://hallplan.vm05.iveins.de",
            "prosperhall.edsby.com \u2022 http://urlmail.hallrender.com \u2022 http://urlwww.hallrender.com \u2022 http://webdocs.hallrender.com",
            "http://elite.hallrender.com/TE_3E_PROD/web/ui/dashboard/ActionList_CCC",
            "https://hallrender.com/attorney/brian-sabey/Accept \u2022 https://hallrender.com/wp-content/uploads/vcards/",
            "http://hallrender.com/attorney/bsabey \u2022 http://hallrender.com/attorney/gregg-m-wallander",
            "http://hallrender.com/attorney/gregg-m-wallander/\u2022 http://hallrender.com/resources/ \u2022 http://hallrender.com/resources/blog/ \u2022 http://officemarketing.hallrender.com/ \u2022 http://urlmail.hallrender.com \u2022 http://urlwww.hallrender.com \u2022 http://webdocs.hallrender.com/",
            "The Hall Render Brian Sabey malicious media campaign was so unexpected.",
            "MD refused to disclose medication cocktail he was injecting into patient. Patient suffered long term  harm."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Italy",
            "Netherlands",
            "Russian Federation",
            "Belgium",
            "Germany",
            "Serbia",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Unix.Trojan.Gafgyt-6748839-0",
              "display_name": "Unix.Trojan.Gafgyt-6748839-0",
              "target": null
            },
            {
              "id": "ELF:Hajime-R\\ [Trj]",
              "display_name": "ELF:Hajime-R\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Mirai Variant Spreading",
              "display_name": "Mirai Variant Spreading",
              "target": null
            },
            {
              "id": "DDoS:Linux/Gafgyt",
              "display_name": "DDoS:Linux/Gafgyt",
              "target": "/malware/DDoS:Linux/Gafgyt"
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1564.005",
              "name": "Hidden File System",
              "display_name": "T1564.005 - Hidden File System"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5572,
            "domain": 788,
            "hostname": 1607,
            "email": 6,
            "FileHash-SHA256": 505,
            "FileHash-MD5": 132,
            "FileHash-SHA1": 128,
            "CVE": 2
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "128 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68fd0cc422cea2fd989581fd",
          "name": "LevelBlue - Open Threat Exchange (Malicious Attacks)",
          "description": "I\u2019ll\nrefer to these bad actors as the .lol .fun group. London, Australia , South Africa with US base External resources. With this group, you e probably met though attackers.. OTX errors! Difficult to pulse. There are some profiles in here that are shady and attempt or do co connect to your products. They usually begin social engineering by saying that you have a \u2018problem\u2019 just like they do. Say they are from Canada or\nFrance , somewhere abroad when they are down the street using your services. There was user \u2018Merkd\u2019 whose entire system seem to become infected by someone or someone about this platform. Check the IP address at all\nTo see if it matches or is on the same block as OTC, region will show as well. Hackers may potentially cnc / move your profile on their own block. What happened today was weird. Alien Vault became a PHP and turned bright pink and black, requesting I download page. Keep your systems locked down if you\u2019re researching not reporting vulnerabilities.",
          "modified": "2025-11-24T17:02:12.441000",
          "created": "2025-10-25T17:45:40.291000",
          "tags": [
            "ipv4",
            "levelblue",
            "open threat",
            "date sat",
            "connection",
            "etag w",
            "cloudfront",
            "sameorigin age",
            "vary",
            "ip address",
            "kb body",
            "gtmkvjvztk",
            "utc gcfezl5ynvb",
            "utc na",
            "utc google",
            "analytics na",
            "utc linkedin",
            "insight tag",
            "learn",
            "exchange og",
            "levelblue open",
            "threat exchange",
            "exchange",
            "google tag",
            "iocs",
            "search otx",
            "included iocs",
            "review iocs",
            "data upload",
            "extraction",
            "layer protocol",
            "v full",
            "reports v",
            "port t1571",
            "t1573",
            "oc0006 http",
            "c0014",
            "get http",
            "dns resolutions",
            "user",
            "data",
            "datacrashpad",
            "edge",
            "tag manager",
            "us er",
            "help files",
            "shell",
            "html",
            "cve202323397",
            "iframe tags",
            "community score",
            "url http",
            "url https",
            "united",
            "united kingdom",
            "netherlands",
            "search",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "indicator role",
            "title added",
            "active related",
            "otc oct",
            "report spam",
            "week ago",
            "scan",
            "learn more",
            "filehashmd5",
            "filehashsha1",
            "domain",
            "australia",
            "does",
            "josh",
            "created",
            "filehashsha256",
            "present jul",
            "present oct",
            "date",
            "a domains",
            "script urls",
            "for privacy",
            "moved",
            "script domains",
            "meta",
            "title",
            "body",
            "pragma",
            "encrypt",
            "ck ids",
            "t1060",
            "run keys",
            "startup",
            "folder",
            "t1027",
            "files",
            "information",
            "t1055",
            "injection",
            "capture",
            "south korea",
            "malaysia",
            "pulses",
            "fatal error",
            "hacker known",
            "name",
            "unknown",
            "risk",
            "weeks ago",
            "scary",
            "sova",
            "colorado",
            "wire",
            "name unknown",
            "thursday",
            "denver",
            "types of",
            "indicators hong",
            "kong",
            "tsara brashears",
            "african",
            "ethiopia",
            "b8reactjs",
            "india",
            "america",
            "x ua",
            "hostname",
            "dicator role",
            "pulses url",
            "airplane",
            "icator role",
            "t1432",
            "access contact",
            "list",
            "t1525",
            "image",
            "security scan",
            "heuristic oct",
            "discovery",
            "t1069",
            "t1071",
            "protocol",
            "t1105",
            "tool transfer",
            "t1114",
            "t1480",
            "internal image",
            "brian sabey",
            "month ago",
            "modified",
            "days ago",
            "green well",
            "sabey stash",
            "service",
            "t1040",
            "sniffing",
            "t1045",
            "packing",
            "t1053",
            "taskjob"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Sova",
              "display_name": "Sova",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1022",
              "name": "Data Encrypted",
              "display_name": "T1022 - Data Encrypted"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1432",
              "name": "Access Contact List",
              "display_name": "T1432 - Access Contact List"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1525",
              "name": "Implant Internal Image",
              "display_name": "T1525 - Implant Internal Image"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1448",
              "name": "Carrier Billing Fraud",
              "display_name": "T1448 - Carrier Billing Fraud"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 956,
            "FileHash-SHA1": 906,
            "FileHash-SHA256": 2651,
            "URL": 4450,
            "domain": 708,
            "hostname": 2403,
            "CVE": 1,
            "email": 5
          },
          "indicator_count": 12080,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "145 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68fc6c64ffa5ca172fc0066c",
          "name": "Ransom \u2022 Expiro \u2022 ET impact Airlines",
          "description": "I\u2019m definitely not an airline anybody. I made a strong recommendation and have contacted the limited authorities. I recommend Airlines take the initiative to disable ability for passengers , employees or anyone to be able to connect to wifi. Disable it. I strongly suggest that no one would use any device on airlines for as long as possible. \n\nI trust the tip as much as I don\u2019t want to.\nThere are Denver to , London and other global entities possibly South Africa, Australia, Arizona hackers involved in upcoming hostile attacks. \n\nThis Pulse doesn\u2019t do anything to make me sound  credible. Unfortunately we only received credible tips. I\u2019d rather be wrong , too safe than sorry. I received information about upcoming regional attacks on airplanes. Yesterday I received a frighteningly credible tip detailing the targeting of an exact airline. I obviously can\u2019t guarantee this information is true. Serious issues were found.\nI didn\u2019t include airline name, just vulnerabilities.",
          "modified": "2025-11-24T04:02:10.160000",
          "created": "2025-10-25T06:21:24.387000",
          "tags": [
            "name servers",
            "ip address",
            "servers",
            "virtool",
            "win32cve oct",
            "avast avg",
            "mtb oct",
            "top source",
            "top destination",
            "show",
            "source source",
            "dynamicloader",
            "query",
            "observed dns",
            "high",
            "expiro related",
            "dns query",
            "known sinkhole",
            "malware",
            "cve",
            "flights",
            "wifi",
            "obfuscator",
            "rsdse",
            "wd62",
            "ids detections",
            "alerts",
            "domain",
            "contacted",
            "av detections",
            "yara detections",
            "win32/expiro.ndo",
            "cnc activity",
            "activity",
            "et malware",
            "http traffic",
            "videos",
            "music",
            "guard",
            "defender",
            "media",
            "indicator role",
            "title added",
            "active related",
            ".lol",
            "samuel tulach",
            "light dark",
            "samuel",
            "tulach",
            "il2cpp",
            "from firmware",
            "vbs enclave",
            "hyperv nov",
            "using vbs",
            "linux jul",
            "information",
            "discovery",
            "t1045",
            "packing",
            "t1060",
            "run keys",
            "startup",
            "folder",
            "t1119",
            "t1027",
            "capture",
            "url https",
            "url http",
            "t1036",
            "t1040",
            "sniffing",
            "t1053",
            "taskjob",
            "t1055",
            "injection",
            "fraud",
            "sabey",
            "josht",
            "eric everest",
            "sha256",
            "no expiration",
            "filehashsha256",
            "levelblue",
            "open threat",
            "lol crimegroup"
          ],
          "references": [
            "Global Airline Threat - though targeting seems to be involved",
            "https://tulach.cc/ | Brian Sabey",
            "https://www.fireeye.com/",
            "https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html",
            "Malicious Antivirus Detections #VirTool:Win32/Obfuscator.ADB",
            "IDS Detections: DNS Query to Expiro Related Domain (przvgke .biz)",
            "IDS Detections: DNS Query to Expiro Related Domain (knjghuig .biz) Known Sinkhole Response Header Win32/Expiro CnC Activity (POST) Win32/Expiro.NDO CnC Activity Observed DNS Query to .biz TLD Namecheap URL Forward 403 Forbidden",
            "Alerts: suspicious_iocontrol_codes network_bind ransomware_file_modifications stealth_file",
            "Alerts: virus polymorphic procmem_yara static_pe_anomaly suricata_alert antivm_bochs_keys",
            "Alerts: antivm_generic_disk anomalous_deletefile antisandbox_sleep dynamic_function_loading",
            "Alerts: resumethread_remote_process network_connection_via_suspicious_process network_cnc_http",
            "Alerts: network_http packer_unknown_pe_section_name dropper",
            "ConventionEngine_Term_Users",
            "Observed DNS Query to .biz TLD Namecheap URL Forward GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 403 Forbidden",
            "CVE FileHash-SHA256  36e49940232d00b021793c3cd7df19200c875ce3beb1992ecc59f6f8f6389be8",
            "CVE FileHash-SHA256 7ca48970b1b9c076f6bd59c1b10e26c47e7acd954869510c1dcdf97dac9b8c2e",
            "https://otx.alienvault.com/user/gameprofits.io"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "#VirTool:Win32/Obfuscator.",
              "display_name": "#VirTool:Win32/Obfuscator.",
              "target": "/malware/#VirTool:Win32/Obfuscator."
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Packed- Multiple Malware",
              "display_name": "Packed- Multiple Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1448",
              "name": "Carrier Billing Fraud",
              "display_name": "T1448 - Carrier Billing Fraud"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 262,
            "URL": 496,
            "FileHash-MD5": 36,
            "FileHash-SHA1": 36,
            "hostname": 147,
            "domain": 92,
            "email": 1
          },
          "indicator_count": 1070,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "146 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "692131f725473d708579ec3a",
          "name": "Drive-by Compromise",
          "description": "",
          "modified": "2025-11-22T03:45:59.649000",
          "created": "2025-11-22T03:45:59.649000",
          "tags": [
            "access ta0001",
            "defense evasion",
            "access ta0006",
            "command",
            "control ta0011",
            "impact ta0040",
            "catalog tree",
            "ob0005 defense",
            "evasion ob0006",
            "impact ob0008",
            "hashes cape",
            "sandbox",
            "docguard",
            "yomi hunter",
            "zenbox",
            "ip traffic",
            "pattern domains",
            "memory pattern",
            "urls https",
            "adversaries",
            "mitre att",
            "t1189 found",
            "clickable urls",
            "pdf execution",
            "t1036",
            "creates",
            "hide artifacts",
            "exploitation",
            "e1564 hidden",
            "files",
            "discovery e1082",
            "e1203 data",
            "vhash",
            "ssdeep",
            "file type",
            "pdf document",
            "magic pdf",
            "trid adobe",
            "format",
            "file size",
            "united",
            "as32934",
            "passive dns",
            "unknown",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse pulses",
            "urls",
            "status",
            "search",
            "showing",
            "server error",
            "certificate",
            "creation date",
            "high assurance",
            "server ca",
            "date",
            "body",
            "win32",
            "ransom",
            "entries",
            "icmp traffic",
            "packing t1045",
            "t1045",
            "pdb path",
            "pe resource",
            "show",
            "malware",
            "copy",
            "push",
            "write",
            "aaaa",
            "nxdomain",
            "united kingdom",
            "thailand",
            "vietnam",
            "as45430",
            "honduras",
            "indonesia",
            "mexico",
            "slovakia",
            "dynamicloader",
            "yara rule",
            "high",
            "ekyxe",
            "xe e",
            "eofae",
            "ee edcje4j",
            "tofsee",
            "windows",
            "medium",
            "stream",
            "grum",
            "as15169 google",
            "pulses",
            "record value",
            "error",
            "cname",
            "name servers",
            "ireland",
            "next",
            "federation asn",
            "as49505",
            "labs pulses",
            "trojan",
            "trojandropper",
            "related pulses",
            "file samples",
            "files matching",
            "date hash",
            "copyright",
            "all search",
            "reverse dns",
            "location united",
            "emails info",
            "expiration date",
            "as51167 contabo",
            "germany unknown",
            "a nxdomain",
            "as40021 contabo",
            "encrypt",
            "url http",
            "http",
            "ip address",
            "related nids",
            "files location",
            "ddos",
            "activity",
            "checkin",
            "win64",
            "mirai",
            "hosting",
            "files ip",
            "address",
            "czechia unknown",
            "as174 cogent",
            "asnone germany",
            "as15598",
            "as16625 akamai",
            "asnone united",
            "as20940",
            "as35994 akamai",
            "as12337 noris",
            "pulse submit",
            "url analysis",
            "backdoor",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "suspicious",
            "virtool",
            "emails",
            "domain name",
            "code",
            "brazil",
            "poland",
            "domain",
            "msie",
            "windows nt",
            "tcp syn",
            "resolverror",
            "exploit",
            "externalport",
            "internalport",
            "http headers",
            "home network",
            "demonbot",
            "andariel",
            "yara detections",
            "malware traffic",
            "nids",
            "dns query",
            "google safe",
            "browsing",
            "whois",
            "virustotal",
            "mtb apr",
            "asnone related",
            "open",
            "hash avast",
            "avg clamav",
            "msdefender apr",
            "as8075",
            "content type",
            "access",
            "cp bus",
            "cur cono",
            "fin ivdo",
            "onl our",
            "phy samo",
            "overview ip",
            "flag united",
            "hostname",
            "files domain",
            "as8068",
            "trojan features",
            "rsa tls",
            "issuing ca",
            "mirai variant",
            "useragent",
            "inbound",
            "realtek sdk",
            "miniigd upnp",
            "soap command",
            "activity mirai",
            "helloworld",
            "users",
            "alerts",
            "anomalous file",
            "recycle bin",
            "filehash",
            "av detections",
            "memcommit",
            "read c",
            "memreserve",
            "for privacy",
            "china unknown",
            "ag alberto",
            "pedraz",
            "holidaycheck ag",
            "project pi",
            "immobilien ag",
            "puma se",
            "kurt walther",
            "ag ingo",
            "kraupa",
            "timo salzsieder",
            "record type",
            "ttl value",
            "msms57295540",
            "subdomains",
            "ireland unknown",
            "analyzer paste",
            "iocs",
            "samples",
            "regsetvalueexa",
            "default",
            "regdword",
            "module load",
            "t1129",
            "http request",
            "process32nextw",
            "regbinary",
            "oxypumper",
            "tools",
            "dock",
            "april",
            "persistence",
            "execution",
            "download",
            "as62597 nsone",
            "echo request",
            "sweep",
            "payload hello",
            "world",
            "total",
            "please",
            "xport",
            "main",
            "look",
            "install",
            "servers",
            "found",
            "cnapple public",
            "accept",
            "chrome",
            "moved",
            "ssl certificate",
            "write c",
            "installcore",
            "june",
            "delphi",
            "as47846",
            "cookie",
            "as32787 akamai",
            "as714 apple",
            "m1",
            "onelouder",
            "brian sabey",
            "denver colorado",
            "fakedout threat",
            "gmt content",
            "x cache",
            "div div",
            "as8972 host",
            "france unknown",
            "registrar",
            "otx scoreblue",
            "address domain",
            "as24940 hetzner",
            "as44273 host",
            "asn as15598",
            "trojanspy",
            "mail spammer",
            "germany mail",
            "spammer",
            "hichina",
            "data redacted",
            "a domains",
            "wow64",
            "slcc2",
            "media center",
            "port",
            "powershell",
            "urls http",
            "tptjsw",
            "virus",
            "ids detections",
            "germany",
            "as8560",
            "austria",
            "as1921",
            "as14061",
            "whitelisted",
            "as16276",
            "script urls",
            "as16552 tiggee",
            "as9009 m247",
            "meta",
            "as29789",
            "detected m1",
            "mtb aug",
            "server",
            "as397241",
            "cryp",
            "hostmaster",
            "networks",
            "as19024",
            "gmt setcookie",
            "delete",
            "russia as49505",
            "sinkhole cookie",
            "value snkz",
            "pe32",
            "possible",
            "susp",
            "lnmp",
            "lnmp a",
            "licess",
            "shell",
            "as63949 linode",
            "as133618",
            "as21342",
            "cve201717215",
            "huawei remote",
            "huawei hg532",
            "malware worm",
            "gafgyt",
            "exploit none",
            "binbusybox",
            "delete c",
            "odigicert inc",
            "stwashington",
            "lredmond",
            "rsa ca",
            "cape",
            "nondns",
            "denver",
            "redacted for",
            "method status",
            "url hostname",
            "ip country",
            "type get",
            "date tue",
            "gmt contenttype",
            "connection",
            "cachecontrol",
            "expires thu",
            "gmt vary",
            "poland unknown",
            "title",
            "script domains",
            "updated date",
            "serce internetu",
            "cnc beacon",
            "javascript",
            "wsasend",
            "post",
            "delete shadows",
            "all quiet",
            "t1047",
            "instrumentation",
            "rpcs",
            "ms windows",
            "asnone dns",
            "http host",
            "ip check",
            "sha256",
            "bits",
            "adware malware",
            "etpro malware",
            "bios",
            "guard",
            "tulach",
            "spectrum",
            "cyber folks",
            "tsara brashears",
            ".pl",
            "contacted",
            "kryptikxp",
            "apple",
            "ios",
            "android",
            "sabey",
            "charter communications",
            "denvecolorado",
            "quantum fiber",
            "air force",
            "swipper",
            "masquerade",
            "hitmen",
            "mitm",
            "whitesky",
            "cyber warfare",
            "porn",
            "pornhub.software"
          ],
          "references": [
            "DISTINCTIO8.pdf",
            "FileHash - SHA256 001f0ebe975b5f5a7e5272f53455635cc938a5a0129417f7e79c39df6cf65657 | Yara Detections: stack_string",
            "IDS Detections: Win32/Tofsee.AX google.com connectivity check Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set",
            "Tofsee: 'google.com' |  https://www.gov50.icu |",
            "ET TROJAN Win32/DarkWatchman Checkin Activity (POST) ( This is true. They sit around watching, following...)",
            "Alerts: procmem_yara injection_inter_process creates_largekey network_bind persistence_autorun antivm_generic_disk",
            "Alerts: persistence_autorun_tasks spawns_dev_util cape_detected_threat injection_process_hollowing",
            "hubt.pornhub.com | www.pornhub.com | pornative.com",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ||  pin.it || https://pin.it/",
            "www.sweetheartvideo.com || https://www.sweetheartvideo.com/tsara-brashears/",
            "Unix.Trojan.Mirai-6981169-0: FileHash - SHA256  fe00b364b6b8342e3ce0dd146902ac3330ab976e87aca6be666efde39ea485da",
            "IDS Detections: WGET Command Specifying Output in HTTP Headers",
            "IDS Detections: D-Link Devices Home Network Administration Protocol Command Execution",
            "Yara Detections: is__elf ,  DemonBot",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication writes_to_stdout",
            "FileHash - SHA256  f32f6b229913d68daad937cc72a57aa45291a9d623109ed48938815aa7b6005c",
            "IDS Detections: Andariel Backdoor Activity (Checkin)",
            "Alerts: dead_host nids_malware_alert network_icmp nolookup_communication",
            "DDoS:Linux/Gafgyt : FileHash - SHA256  358c2bd5b9e925dc23894dec18ce486c03d743cde766ce298ac1e2f00d86f0b2",
            "IDS Detection: Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound",
            "IDS Detection: Mirai Variant User-Agent (Inbound) WebShell Generic - wget http - POST",
            "IDS Detection: Observed Suspicious UA (Hello-World) Suspicious Activity potential UPnProxy",
            "http://vortex-nlb-http2-fed-us-taut-purple.nr-data.net/",
            "https://tulach.cc/ || tulach.cc || www-temp.metrobyt-mobile.com",
            "apple-reactivate.com | appleweb-aem.apple.com | apple.com | revoked-aprtr1-tr1g1.apple.com | network-framework.apple.com",
            "autodiscover.webcompanion.com || avc-gft-dashboard.apple.com || cac1-wwfde-wave.apple.com || demo27.apple.com",
            "* https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
            "https://tulach.cc/ | tulach.cc |",
            "http://hallrender.com/attorney/brian-sabey | www-temp.metrobyt-mobile.com",
            "google.pl | aplikacja.ceidg.gov.pl | imaginecup.pl | microsoft.pl",
            "18teen.net | teensnow.com | grannies-porn.net | pornmd.com",
            "www.pornhubselect.com | pornhub.software"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Chile",
            "Morocco",
            "Taiwan",
            "Guatemala",
            "United Kingdom of Great Britain and Northern Ireland",
            "Ireland",
            "Kenya",
            "Peru",
            "Singapore",
            "Mexico",
            "Brazil",
            "Slovakia",
            "Spain",
            "Australia",
            "Belgium",
            "Germany",
            "Hungary",
            "Netherlands",
            "Russian Federation",
            "Japan",
            "Poland"
          ],
          "malware_families": [
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "TEL:CreateScheduledTask",
              "display_name": "TEL:CreateScheduledTask",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-6981169-0",
              "display_name": "Unix.Trojan.Mirai-6981169-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee",
              "display_name": "Backdoor:Win32/Tofsee",
              "target": "/malware/Backdoor:Win32/Tofsee"
            },
            {
              "id": "Ransom:Win32/Haperlock",
              "display_name": "Ransom:Win32/Haperlock",
              "target": "/malware/Ransom:Win32/Haperlock"
            },
            {
              "id": "Trojan:Win32/Neurevt",
              "display_name": "Trojan:Win32/Neurevt",
              "target": "/malware/Trojan:Win32/Neurevt"
            },
            {
              "id": "DDoS:Linux/Gafgyt.YA!MTB",
              "display_name": "DDoS:Linux/Gafgyt.YA!MTB",
              "target": "/malware/DDoS:Linux/Gafgyt.YA!MTB"
            },
            {
              "id": "CVE-2017-17215",
              "display_name": "CVE-2017-17215",
              "target": null
            },
            {
              "id": "CVE-2023-27350",
              "display_name": "CVE-2023-27350",
              "target": null
            },
            {
              "id": "CVE-2014-8361",
              "display_name": "CVE-2014-8361",
              "target": null
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "M1",
              "display_name": "M1",
              "target": null
            },
            {
              "id": "OneLouder",
              "display_name": "OneLouder",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Win.Trojan.Sarwent-10012602-0",
              "display_name": "Win.Trojan.Sarwent-10012602-0",
              "target": null
            },
            {
              "id": "Virus:Win32/Sivis.A",
              "display_name": "Virus:Win32/Sivis.A",
              "target": "/malware/Virus:Win32/Sivis.A"
            },
            {
              "id": "Win.Trojan.Installcore-1177",
              "display_name": "Win.Trojan.Installcore-1177",
              "target": null
            },
            {
              "id": "Win.Malware.Oxypumper-6900435-0",
              "display_name": "Win.Malware.Oxypumper-6900435-0",
              "target": null
            },
            {
              "id": "Win.Malware.Qshell-9875653-0",
              "display_name": "Win.Malware.Qshell-9875653-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1203",
              "name": "Exploitation for Client Execution",
              "display_name": "T1203 - Exploitation for Client Execution"
            },
            {
              "id": "T1485",
              "name": "Data Destruction",
              "display_name": "T1485 - Data Destruction"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1428",
              "name": "Exploit Enterprise Resources",
              "display_name": "T1428 - Exploit Enterprise Resources"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1133",
              "name": "External Remote Services",
              "display_name": "T1133 - External Remote Services"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "66f31b9a0551ca166c872292",
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 7589,
            "FileHash-SHA1": 3982,
            "FileHash-SHA256": 8280,
            "URL": 439,
            "domain": 2416,
            "hostname": 2154,
            "email": 37,
            "CVE": 4,
            "SSLCertFingerprint": 6
          },
          "indicator_count": 24907,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "148 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6916d97edb28b2616ffac3ab",
          "name": "njRAT| BazarLoader| Darkside 2020 .Beware \u2022 WebToolbar \u2022 Qbot",
          "description": "",
          "modified": "2025-11-14T07:41:19.912000",
          "created": "2025-11-14T07:25:50.524000",
          "tags": [
            "whois record",
            "ssl certificate",
            "historical ssl",
            "resolutions",
            "referrer",
            "communicating",
            "subdomains",
            "domains",
            "problems",
            "urls http",
            "ransomware",
            "malware",
            "contacted",
            "dropped",
            "execution",
            "tsara brashears",
            "apple ios",
            "whois whois",
            "unlocker",
            "njrat",
            "core",
            "hacktool",
            "metro",
            "download",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "installer",
            "awful",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "tofsee",
            "mitre attack",
            "et",
            "cisco umbrella",
            "internet storm",
            "site",
            "covid19",
            "cyber threat",
            "safe site",
            "cobalt strike",
            "malicious url",
            "alexa",
            "script urls",
            "united",
            "a domains",
            "as396982 google",
            "as15169 google",
            "search",
            "cname",
            "accept encoding",
            "showing",
            "unknown",
            "date",
            "body",
            "meta",
            "encrypt",
            "domain related",
            "as396982",
            "creation date",
            "expiration date",
            "scan endpoints",
            "all octoseek",
            "hostname",
            "pulse submit",
            "url analysis",
            "passive dns",
            "urls",
            "next",
            "all search",
            "otx octoseek",
            "as7922 comcast",
            "as16276",
            "as54113",
            "aaaa",
            "france unknown",
            "as14061",
            "status",
            "as40509",
            "ip address",
            "for privacy",
            "as44273 host",
            "record value",
            "certificate",
            "gmt content",
            "x sucuri",
            "as8075",
            "nxdomain",
            "as30148 sucuri",
            "as20940",
            "as31898 oracle",
            "hong kong",
            "as139021",
            "msie",
            "chrome",
            "ipv4",
            "blacklist http",
            "detection list",
            "blacklist",
            "files",
            "location hong",
            "kong asn",
            "tags none",
            "indicator facts",
            "name verdict",
            "falcon sandbox",
            "mail spammer",
            "tor known",
            "tor relayrouter",
            "exit",
            "node tcp",
            "traffic",
            "heur",
            "malicious site",
            "alexa top",
            "million",
            "alexa proxy",
            "outbreak",
            "installcore",
            "acint",
            "conduit",
            "installpack",
            "iobit",
            "artemis",
            "dropper",
            "mediaget",
            "crack",
            "spammer",
            "france mail",
            "summary",
            "url summary",
            "phishing",
            "union",
            "team",
            "bank",
            "unsafe",
            "threat report",
            "ip summary",
            "pattern match",
            "script",
            "et tor",
            "known tor",
            "relayrouter",
            "node traffic",
            "misc attack",
            "beginstring",
            "null",
            "error",
            "span",
            "class",
            "generator",
            "refresh",
            "tools",
            "hybrid",
            "general",
            "click",
            "strings",
            "servers",
            "ps ord",
            "name servers",
            "poetry",
            "moved",
            "content length",
            "content type",
            "x powered",
            "poems",
            "poem",
            "topic",
            "topics",
            "poem topics",
            "free poems",
            "love poems",
            "romantic poems",
            "classic poems",
            "friendship poems",
            "shone pale",
            "herself",
            "heavens",
            "her beam",
            "a fleecy",
            "proud evening",
            "star",
            "thou bearest",
            "heaven",
            "than",
            "google",
            "http",
            "leasewebuklon11",
            "search live",
            "api blog",
            "docs pricing",
            "login",
            "february",
            "gb summary",
            "london",
            "april",
            "screenshot",
            "url https",
            "reverse dns",
            "general full",
            "name value",
            "frankfurt",
            "main",
            "germany",
            "asn15169",
            "resource",
            "hashes",
            "copyright",
            "gmbh version",
            "follow",
            "blacklist https",
            "phishing site",
            "malware site",
            "riskware",
            "opencandy",
            "cleaner",
            "iframe",
            "xtrat",
            "agent",
            "softcnapp",
            "generic",
            "patcher",
            "driverpack",
            "exploit",
            "mimikatz",
            "downldr",
            "presenoker",
            "fusioncore",
            "wacatac",
            "beach research",
            "trojanspy",
            "maltiverse",
            "firehol",
            "proxy",
            "anonymizer",
            "adware",
            "kuaizip",
            "downer",
            "tag count",
            "tue apr",
            "sample",
            "samples",
            "fakealert",
            "genkryptik",
            "icedid",
            "coinminer",
            "nircmd",
            "swrort",
            "systweak",
            "behav",
            "tiggre",
            "filetour",
            "quasar rat",
            "fuery",
            "bazaloader",
            "media",
            "facebook",
            "service",
            "runescape",
            "webtoolbar",
            "a9dia",
            "a1ginaprincipal",
            "emails",
            "registrar",
            "http header",
            "tcp traffic",
            "et useragents",
            "unknown traffic",
            "antivirus",
            "server",
            "gmt united",
            "accept",
            "local",
            "path",
            "falcon",
            "file",
            "ascii text",
            "windows nt",
            "png image",
            "appdata",
            "jpeg image",
            "indicator",
            "twitter",
            "westlaw njrat",
            "zuorat",
            "skynet bot",
            "glupteba",
            "asn4583",
            "thomsonreuters",
            "asn209242",
            "june",
            "back",
            "united kingdom",
            "cisco",
            "umbrella rank",
            "rank",
            "page url",
            "as autonomous",
            "system",
            "yndx",
            "ipasns ip",
            "november",
            "de summary",
            "comodo rsa",
            "security tls",
            "software",
            "resource hash",
            "security",
            "ecdhersa",
            "de indicators",
            "de page",
            "url history",
            "javascript",
            "gts ca",
            "secure server",
            "markmonitor",
            "ip information",
            "detail domains",
            "domain tree",
            "links certs",
            "frames domain",
            "requested",
            "threat roundup",
            "march",
            "threat round",
            "parent parent",
            "roundup",
            "january",
            "threats",
            "qbot",
            "cyberwar",
            "skynet",
            "radar ineractive",
            "control server",
            "engineering",
            "host",
            "services",
            "pony",
            "nanocore rat",
            "meterpreter",
            "zeus",
            "zbot",
            "suppobox",
            "stealer",
            "redline stealer",
            "dnspionage",
            "mirai",
            "nanocore",
            "bradesco",
            "emotet",
            "laplasclipper",
            "asn16276",
            "get h2",
            "kb image",
            "august",
            "kali",
            "localappdata",
            "network traffic",
            "binary file",
            "svg scalable",
            "vector graphics",
            "mwin",
            "domain",
            "url http",
            "pulse pulses",
            "related nids",
            "files location",
            "customer",
            "address",
            "as29789",
            "hosting",
            "location united",
            "status hostname",
            "query type",
            "address first",
            "seen last",
            "seen asn",
            "country unknown",
            "urls date",
            "checked url",
            "hostname server",
            "response ip",
            "address google",
            "safe browsing",
            "present mar",
            "pulse indicator",
            "protocol h2",
            "value",
            "variables",
            "waypoint object",
            "gsqueue",
            "isotope",
            "hostnames",
            "ice fog",
            "maltiverse top",
            "financial",
            "as62597 nsone",
            "sec ch",
            "domains show",
            "entries",
            "as14720 gamma",
            "canada unknown",
            "as397241",
            "as13335",
            "applicunwnt",
            "xrat",
            "maltiverse safe",
            "aig",
            "soc",
            "hallrender",
            "brian sabey",
            "mark brian sabey",
            "sabey",
            "mark",
            "sabey",
            "data center",
            "malvertizing",
            "malware host",
            "scanning host",
            "botnetwork",
            "colorado",
            "edsaid",
            "geotracking",
            "satellite tracking",
            "radar tracking",
            "pornhub",
            "child teen content illegal",
            "social engineering",
            "cyber stalking",
            "CVE-2023-4966",
            "device control",
            "camera usage",
            "hidden users",
            "message interception",
            "text archiver",
            "mail collection",
            "remote attacks",
            "js",
            "python",
            "inject",
            "sql",
            "extraction",
            "AIG Claims",
            "hallrender.com",
            "soc",
            "milemighmedia",
            "westlaw",
            "revengeporn",
            "bot",
            "regex",
            "ai",
            "yandex"
          ],
          "references": [
            "web2.westlaw.com    (redirects to thbrzzrstr.me)",
            "http://web2.westlaw.com/ (redirect) https://signon.thomsonreuters.com/?productid=CBT&lr=0&culture=en-US&returnto=https%3a%2f%2f1.next.westlaw.com%...",
            "https://hybrid-analysis.com/sample/8bf763ce9396c4569afbae58392097fd57408339c0ac59ec256468c9fd8ac4c5/6548ebfe56b25bab28017757",
            "https://urlscan.io/result/2285cee3-1e08-4e63-b48f-ee685e008480/#summary",
            "https://hybrid-analysis.com/sample/86479bf7c9a675913b93a0d399f5cbe0c0e8003239e93ae5e00f97cdbc5ec5ba/5c5c13577ca3e12626364777",
            "https://urlscan.io/result/4f0cabbf-9716-47dd-bd5c-038a953e6672/",
            "Malware Host: HallRender.com",
            "riverside.rocks (safebae.com remote uTorrent) https://hybrid-analysis.com/sample/11108ef17bd75f36e0d22d95b1f3bde3e9fa968a78a24c2d2508f4238e22651d/6326a50be4a8a71b885f5bf3",
            "safebae.org",
            "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu    (phishing | cybercrime)",
            "Hallrender.com and Westlaw.com.= http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu",
            "Poemhunter.com + rally point.com = pornhub.dev",
            "Pornhub dev VT community: https://www.virustotal.com/gui/domain/pornhub.dev/community",
            "Poemhunter.com: https://hybrid-analysis.com/sample/86479bf7c9a675913b93a0d399f5cbe0c0e8003239e93ae5e00f97cdbc5ec5ba",
            "https://www.poemhunter.com/tsara-brashears/poems/: https://urlscan.io/result/4f0cabbf-9716-47dd-bd5c-038a953e6672/",
            "Rallypoint.com https://hybrid-analysis.com/sample/66287c2c36699037cb504201693e26b5f3282cebde1d1c78aecd6f97f04fb694",
            "Malicious revenge malvertizing: https://www.milehighmedia.com/legal/2257",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://matrix.pornhub.dev",
            "nr-data.net",
            "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/icons/apple-touch-icon-76x76.png",
            "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/icons/apple-touch-icon.png",
            "https://apple.pantion.top/",
            "newrelic.se",
            "user-apple.info",
            "appleid-comloginaccount.info",
            "init-p01st.push.apple.com",
            "boostmobile.com",
            "www.metrobyt-mobile.com",
            "http://bpdb.portal.gov.bd:3128/sites/default/files/files/bpdb.portal.gov.bd/npfblock/2021-34bc869d2906198362a4346373ce5b94.jpg",
            "https://b.link/infringement",
            "my.mintmobile.com",
            "CVE-2023-4966",
            "http://watchhers.net/index.php",
            "https://rr2---sn-4g5ednsz.googlevideo.com/videoplayback?expire=1699319292&ei=nDlJZfb4G43E-gaYt5XoDg&ip=2001%3A1b60%3A2%3A240%3A3247%3A%3A"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Spain",
            "Netherlands",
            "Canada",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Tsara Brashears",
              "display_name": "Tsara Brashears",
              "target": null
            },
            {
              "id": "Mitre Attack",
              "display_name": "Mitre Attack",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1423",
              "name": "Network Service Scanning",
              "display_name": "T1423 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1427",
              "name": "Attack PC via USB Connection",
              "display_name": "T1427 - Attack PC via USB Connection"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1173",
              "name": "Dynamic Data Exchange",
              "display_name": "T1173 - Dynamic Data Exchange"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "654971c396ca4306a6534b12",
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 4037,
            "hostname": 2241,
            "URL": 2516,
            "FileHash-MD5": 1224,
            "FileHash-SHA1": 783,
            "FileHash-SHA256": 2796,
            "CVE": 10,
            "email": 25
          },
          "indicator_count": 13632,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "156 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68d332d77a7eedf3ad71c406",
          "name": "Denizbankk.net \u2022  LevelBlue - Open Threat Exchange",
          "description": "Denizbankk.net \u2022 Debian.org \u2022 hallrender.com \u2022 alienvault.com \u2022 hopto.org \u2022 striven.com| ? | This is concerning. It\u2019s not like intended to find what I have found but I am disappointed. The few people on the platform who do their own research eventually leave with a large amount of reposters. Related to haallrendee, brian sabey and each link listed. Stange happenings this weak. [otx auto populated- Google Safe Browsing, Denizbankk.net, has been used by the Russian government to create a secure web address that can be accessed only if the user has the correct address.{",
          "modified": "2025-10-23T23:03:23.167000",
          "created": "2025-09-23T23:52:55.453000",
          "tags": [
            "log id",
            "gmtn",
            "tls web",
            "zerossl",
            "zerossl rsa",
            "domain secure",
            "site ca",
            "fa c7",
            "ocsp",
            "a167",
            "code",
            "keepalive",
            "false",
            "record type",
            "ttl a",
            "value",
            "o jarm",
            "fingerprint",
            "file format",
            "relevance",
            "united",
            "tempe",
            "arizona create",
            "domain",
            "expiry date",
            "name",
            "query time",
            "technical city",
            "tempe technical",
            "technical state",
            "rdap database",
            "handle",
            "iana registrar",
            "links",
            "algorithm",
            "key identifier",
            "data",
            "v3 serial",
            "number",
            "cat ozerossl",
            "cnzerossl rsa",
            "validity",
            "server",
            "domain name",
            "status",
            "abuse contact",
            "email",
            "registrar abuse",
            "contact phone",
            "registrar iana",
            "registrar url",
            "registrar whois",
            "date",
            "available from",
            "country",
            "proxy",
            "postal code",
            "city",
            "admin city",
            "tempe admin",
            "filehashmd5",
            "url https",
            "filehashsha1",
            "url http",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "filehashsha256",
            "showing",
            "germany unknown",
            "passive dns",
            "entries",
            "a domains",
            "body doctype",
            "content type",
            "gmt server",
            "ipv4 add",
            "pulse submit",
            "url analysis",
            "main",
            "apache",
            "accept",
            "title",
            "present dec",
            "present jun",
            "present nov",
            "aaaa",
            "present feb",
            "present sep",
            "search",
            "canada",
            "encrypt",
            "devam",
            "ad soyad",
            "mteri numaras",
            "gvenlik iin",
            "gizli soru",
            "gvenlik sorusu",
            "cevab",
            "ltfen bir",
            "present may",
            "moved",
            "present oct",
            "ip address",
            "gandi sas",
            "body",
            "backdoor",
            "next associated",
            "trojandropper",
            "fastly error",
            "please",
            "sea p",
            "twitter",
            "win32",
            "creation date",
            "name servers",
            "hostname add",
            "pulse pulses",
            "urls",
            "record value",
            "japan",
            "germany",
            "ipv4",
            "countries",
            "america",
            "netherlands",
            "italy",
            "brian sabey",
            "report spam",
            "tsara brashears",
            "created",
            "days ago",
            "green well",
            "sabey stash",
            "service",
            "hours ago",
            "malicious",
            "forbidden",
            "actionlistccc",
            "malware family",
            "mufanom att",
            "capture",
            "ck ids",
            "checkin",
            "t1036",
            "t1055",
            "injection",
            "t1056"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1448",
              "name": "Carrier Billing Fraud",
              "display_name": "T1448 - Carrier Billing Fraud"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 617,
            "URL": 2495,
            "hostname": 1698,
            "FileHash-MD5": 275,
            "FileHash-SHA1": 265,
            "FileHash-SHA256": 1241,
            "SSLCertFingerprint": 2,
            "email": 4
          },
          "indicator_count": 6597,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "177 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68d3368ae75cccf736a55441",
          "name": "ET TROJAN Hiloti/Mufanom Downloader Checkin | Denizbankk.net",
          "description": "",
          "modified": "2025-10-23T23:03:23.167000",
          "created": "2025-09-24T00:08:42.048000",
          "tags": [
            "log id",
            "gmtn",
            "tls web",
            "zerossl",
            "zerossl rsa",
            "domain secure",
            "site ca",
            "fa c7",
            "ocsp",
            "a167",
            "code",
            "keepalive",
            "false",
            "record type",
            "ttl a",
            "value",
            "o jarm",
            "fingerprint",
            "file format",
            "relevance",
            "united",
            "tempe",
            "arizona create",
            "domain",
            "expiry date",
            "name",
            "query time",
            "technical city",
            "tempe technical",
            "technical state",
            "rdap database",
            "handle",
            "iana registrar",
            "links",
            "algorithm",
            "key identifier",
            "data",
            "v3 serial",
            "number",
            "cat ozerossl",
            "cnzerossl rsa",
            "validity",
            "server",
            "domain name",
            "status",
            "abuse contact",
            "email",
            "registrar abuse",
            "contact phone",
            "registrar iana",
            "registrar url",
            "registrar whois",
            "date",
            "available from",
            "country",
            "proxy",
            "postal code",
            "city",
            "admin city",
            "tempe admin",
            "filehashmd5",
            "url https",
            "filehashsha1",
            "url http",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "filehashsha256",
            "showing",
            "germany unknown",
            "passive dns",
            "entries",
            "a domains",
            "body doctype",
            "content type",
            "gmt server",
            "ipv4 add",
            "pulse submit",
            "url analysis",
            "main",
            "apache",
            "accept",
            "title",
            "present dec",
            "present jun",
            "present nov",
            "aaaa",
            "present feb",
            "present sep",
            "search",
            "canada",
            "encrypt",
            "devam",
            "ad soyad",
            "mteri numaras",
            "gvenlik iin",
            "gizli soru",
            "gvenlik sorusu",
            "cevab",
            "ltfen bir",
            "present may",
            "moved",
            "present oct",
            "ip address",
            "gandi sas",
            "body",
            "backdoor",
            "next associated",
            "trojandropper",
            "fastly error",
            "please",
            "sea p",
            "twitter",
            "win32",
            "creation date",
            "name servers",
            "hostname add",
            "pulse pulses",
            "urls",
            "record value",
            "japan",
            "germany",
            "ipv4",
            "countries",
            "america",
            "netherlands",
            "italy",
            "brian sabey",
            "report spam",
            "tsara brashears",
            "created",
            "days ago",
            "green well",
            "sabey stash",
            "service",
            "hours ago",
            "malicious",
            "forbidden",
            "actionlistccc",
            "malware family",
            "mufanom att",
            "capture",
            "ck ids",
            "checkin",
            "t1036",
            "t1055",
            "injection",
            "t1056"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1448",
              "name": "Carrier Billing Fraud",
              "display_name": "T1448 - Carrier Billing Fraud"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "68d332d77a7eedf3ad71c406",
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 617,
            "URL": 2495,
            "hostname": 1698,
            "FileHash-MD5": 275,
            "FileHash-SHA1": 265,
            "FileHash-SHA256": 1241,
            "SSLCertFingerprint": 2,
            "email": 4
          },
          "indicator_count": 6597,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "177 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68d0f099f60e98e6c4ffc1e5",
          "name": "Elaborate Medical Insurance Scheme | Claims Reversal",
          "description": "Boring? Maybe but, victim of crime became a target of an elaborate ,  phishing, social engineering , hacking, theft, reputation, stalking, & physical assault scheme.  A man using name  Brian Sabey , Esq continues an international  porn campaign.  Today I\u2019m shocked by his false Medicare insurance scam denying targets claims & treatment since 2017. This information was retrieved by me  via research due to unpaid medical bills Team 8  has uncovered multiple large scale breaches with information mailed , texted or sent to targets. \n We are all researchers with a combined 30 years of award winning researchers focuses in various areas.  We are doing this unpaid , considering the circumstances. We are not related to the victim. \n\nAll claims of any abuses have been substantiated claims.\n\n#trulymissed #rip #briansabey #hallrender #jeffreyscottreimer #formbook_cnc #panda_cnc_checkin #claimreversalscam",
          "modified": "2025-10-22T05:00:52.085000",
          "created": "2025-09-22T06:45:45.714000",
          "tags": [
            "sec ch",
            "ch ua",
            "ua full",
            "ua platform",
            "ua bitness",
            "ua arch",
            "version sec",
            "mobile sec",
            "model sec",
            "version list",
            "date",
            "encrypt",
            "united",
            "backdoor",
            "entries",
            "passive dns",
            "hstr",
            "checkin",
            "next associated",
            "lowfi",
            "trojan",
            "ipv4 add",
            "twitter",
            "trojandropper",
            "ransom",
            "body",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "url http",
            "ck ids",
            "t1036",
            "t1040",
            "sniffing",
            "t1045",
            "packing",
            "t1053",
            "taskjob",
            "yara",
            "report spam",
            "otx generated",
            "created",
            "hours ago",
            "otx auto",
            "new york",
            "tsara brashears",
            "search",
            "filehashsha1",
            "filehashmd5",
            "domain",
            "hostname",
            "virgin islands",
            "canada",
            "ireland",
            "pes of",
            "expiration",
            "hall render",
            "possible deep",
            "https",
            "panda",
            "post",
            "insane",
            "law firm",
            "virtool",
            "service",
            "iocs",
            "learn more",
            "et trojan",
            "msie",
            "windows nt",
            "show",
            "unknown",
            "france as16276",
            "united kingdom",
            "possible",
            "write",
            "win32",
            "malware",
            "copy",
            "next",
            "et",
            "returnurl"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan",
            "Netherlands",
            "Italy",
            "Aruba",
            "Germany",
            "Ireland",
            "Spain",
            "Poland",
            "Canada",
            "T\u00fcrkiye",
            "Romania",
            "Sweden",
            "Australia",
            "Singapore",
            "Denmark"
          ],
          "malware_families": [
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1448",
              "name": "Carrier Billing Fraud",
              "display_name": "T1448 - Carrier Billing Fraud"
            }
          ],
          "industries": [
            "Healthcare"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2905,
            "URL": 5029,
            "hostname": 1146,
            "FileHash-SHA256": 935,
            "FileHash-MD5": 102,
            "FileHash-SHA1": 100,
            "email": 3
          },
          "indicator_count": 10220,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "179 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68d0d26cf2038b0019bbb331",
          "name": "Tsara Brashears still has cyber stalkers Brian Sabey",
          "description": "Well, well, well is this a twisted love you to a gruesome death love note? \nwww.oneyoulovefranchise.com - Brian Sabey stash.\n\nOTX being attacked by a \u2018delete\u2019 service again. \n(OTX auto populated: The full text of Brian Whaley's entry into the search for the British Virgin Islands (1) has been published on the website of the law firm, Law Firm, at the age of 26.) Alleged American Brian Sabey is at least 37 years old.",
          "modified": "2025-10-22T04:03:39.769000",
          "created": "2025-09-22T04:37:00.551000",
          "tags": [
            "url https",
            "url http",
            "filehashmd5",
            "domain",
            "hostname",
            "virgin islands",
            "search",
            "type indicator",
            "role title",
            "added active",
            "present sep",
            "united",
            "unknown aaaa",
            "certificate",
            "ip address",
            "creation date",
            "record value",
            "date",
            "title",
            "body",
            "canada",
            "ireland",
            "passive dns",
            "urls",
            "hostname add",
            "pulse pulses",
            "files",
            "yara",
            "report spam",
            "otx generated",
            "created",
            "hours ago",
            "otx auto",
            "new york",
            "tsara brashears",
            "medicare united",
            "filehashsha1"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1448",
              "name": "Carrier Billing Fraud",
              "display_name": "T1448 - Carrier Billing Fraud"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 755,
            "domain": 193,
            "hostname": 246,
            "FileHash-MD5": 17,
            "FileHash-SHA1": 16,
            "email": 2,
            "FileHash-SHA256": 120
          },
          "indicator_count": 1349,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "179 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68d0c20eaf6a51bb667cbe9a",
          "name": "Hall Render Health Insurance Interface for Tsar Brashears",
          "description": "It\u2019s wild how quickly a delete service appears on OTX. Even more bananas, fake law\nfirm Hall Render pretends to be a non paying health insurance entity. \n\nAre you happy about death from denied care? You just can\u2019t stop? \n\nI have asked you to stop because that\u2019s about all I can do. Stop taking pulses , stop interfering in this persons family\u2019s life , stop throwing stones at Tsara Brashears. I don\u2019t have it in me to be like you. This is illegal. I am not interested in having a legal battle to fight for someone who is at peace now. \nExactly what kind of relationship could you possibly have with Jeffrey Scott Reimer.  Stop sending people to look at every person ever connected to her. How can you enjoy taking options away from someone that was so terribly injured?  I hope you recover from your sickness.\n\nCease fire. You want a war. Why? It\u2019s in Gods hands unbeliever. \nIt\u2019s your net, you can get tangled up in it.",
          "modified": "2025-10-22T03:18:24.424000",
          "created": "2025-09-22T03:27:10.554000",
          "tags": [
            "expiration",
            "url https",
            "url http",
            "no expiration",
            "hostname",
            "iocs",
            "create new",
            "pulse use",
            "pdf report",
            "pcap",
            "domain",
            "virgin islands",
            "united",
            "canada",
            "ireland",
            "search",
            "type indicator",
            "enter source",
            "url or",
            "text drag",
            "drop or",
            "ipv4",
            "returnurl",
            "role title",
            "added active",
            "related pulses",
            "filehashsha256",
            "claim reversal",
            "elqaid16867",
            "elqat1",
            "elqcst272",
            "islands",
            "learn more",
            "filehashsha1",
            "filehashmd5",
            "possible deep",
            "https",
            "hall render",
            "panda",
            "post",
            "healthcare plan",
            "sci c1",
            "virtool",
            "service",
            "data upload",
            "extraction",
            "failed",
            "tract indica",
            "idea iocs",
            "q data",
            "type",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "entries",
            "health system",
            "scan",
            "types of",
            "yara",
            "created",
            "minutes ago",
            "otx auto",
            "new york",
            "tsara brashears",
            "medicare united",
            "report spam",
            "otx generated",
            "t1036",
            "t1040",
            "sniffing",
            "t1045",
            "packing",
            "t1053",
            "taskjob",
            "t1055",
            "brian sabey",
            "hall render law",
            "gregg wallender",
            "adversary",
            "hackers",
            "mark sabey",
            "m brian sabey",
            "anyxxx",
            "sexyourway"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1448",
              "name": "Carrier Billing Fraud",
              "display_name": "T1448 - Carrier Billing Fraud"
            }
          ],
          "industries": [
            "Healthcare"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 849,
            "domain": 85,
            "hostname": 357,
            "FileHash-MD5": 62,
            "FileHash-SHA1": 59,
            "FileHash-SHA256": 77,
            "email": 4
          },
          "indicator_count": 1493,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "179 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68d0b00b7ccb342031594e77",
          "name": "OTX Generated with strange commentary as always",
          "description": "OTX Auto populated-> Yara Yara, a 27-year-old woman from New York, has found that a law firm allegedly controlled Tsara Brashears' life and healthcare plan under the guise of being a Medicare United Healthcare plan. |",
          "modified": "2025-10-22T02:00:03.967000",
          "created": "2025-09-22T02:10:19.819000",
          "tags": [
            "expiration",
            "url http",
            "hall render",
            "possible deep",
            "https",
            "deep panda",
            "brian sabey",
            "tsara brashears",
            "panda",
            "post",
            "virtool",
            "service",
            "fraud",
            "url https",
            "search",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "claim reversal",
            "view",
            "fieldlastname",
            "filehashmd5",
            "filehashsha1",
            "domain",
            "hostname",
            "virgin islands",
            "united",
            "canada",
            "ireland",
            "writeconsolea",
            "regsetvalueexa",
            "regdword",
            "module load",
            "t1129",
            "show",
            "micromedia",
            "write",
            "markus",
            "april",
            "win32",
            "lost",
            "malware",
            "copy",
            "c2 activity",
            "cnc ids",
            "beacon",
            "server",
            "domain status",
            "algorithm",
            "key identifier",
            "x509v3 subject",
            "full name",
            "date",
            "registrar abuse",
            "registrar",
            "data",
            "ipv4",
            "returnurl",
            "masquerade task",
            "t1448",
            "carrier billing",
            "fraud endpoint",
            "security scan",
            "iocs",
            "learn more",
            "relationship",
            "t1040",
            "sniffing",
            "t1045",
            "packing",
            "t1053",
            "taskjob",
            "t1060",
            "scan",
            "entries",
            "healthcare",
            "legal",
            "families",
            "sakurel",
            "formbook att",
            "ck ids",
            "t1199",
            "render",
            "brian",
            "sabey",
            "fieldssn",
            "elqaid16867",
            "elqat1",
            "elqcst272",
            "formbookatt",
            "white insane",
            "law firm",
            "run keys",
            "ta0011",
            "command",
            "control",
            "t1410",
            "redirection",
            "medium",
            "windows",
            "high",
            "yara detections",
            "backdoor",
            "showing"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1448",
              "name": "Carrier Billing Fraud",
              "display_name": "T1448 - Carrier Billing Fraud"
            }
          ],
          "industries": [
            "Healthcare",
            "Legal",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2189,
            "FileHash-MD5": 469,
            "FileHash-SHA1": 447,
            "FileHash-SHA256": 2446,
            "domain": 465,
            "hostname": 1224,
            "email": 15
          },
          "indicator_count": 7255,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "179 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68d09835fed794bdc304de40",
          "name": "Deep Panda | Hall Render | Brian Sabey controlled Tsara Brashears life & Healthcare",
          "description": "Insane. Law Firm Hall Render including attorneys allegedly named M. \u2018Brian Sabey\u2019 and \u2018Gregg Wallender\u2019 began hosting a private pay healthcare plan for Tsara Brashears under the the guise of being a Medicare United Healthcare plan from 3/2021 -  12/2024. What Fraud! Brashears became millions $ in debt. Multiple insurance companies have had to be updated only to be cancelled. She\u2019d been denied spinal stabilization surgery worsening SCI C1 - L5. I didn\u2019t expect to find this at all. When her supplies weren\u2019t paid for. Angry supplier gave information to caregiver. Since then attempts on lives. \nNone of us are safe. I wonder if this is also part of Hall Render. How is this possible?\n\nThese are very dangerous people with hitmen. \nPlease STOP!",
          "modified": "2025-10-21T23:02:21.484000",
          "created": "2025-09-22T00:28:37.292000",
          "tags": [
            "expiration",
            "related pulses",
            "language",
            "html document",
            "ascii text",
            "crlf line",
            "doctype",
            "portal",
            "enter",
            "tax id",
            "provider portal",
            "home",
            "iis windows",
            "provider web",
            "portal account",
            "please",
            "status",
            "server",
            "domain status",
            "registrar abuse",
            "registrar",
            "dnssec",
            "us registrant",
            "email",
            "contact email",
            "algorithm",
            "key identifier",
            "x509v3 subject",
            "full name",
            "v3 serial",
            "number",
            "cus odigicert",
            "inc cndigicert",
            "global g2",
            "tls rsa",
            "se review",
            "exclude data",
            "extraction",
            "search otx",
            "data upload",
            "enter source",
            "url or",
            "texurag",
            "value a",
            "se source",
            "extra",
            "referen data",
            "ica7nvfarux",
            "include review",
            "failed",
            "sc data",
            "type",
            "extra data",
            "referen",
            "hcpruxi include",
            "review exclude",
            "sugges",
            "exclude",
            "find s",
            "typ url",
            "hos hos",
            "domain hos",
            "hast",
            "referen hcpruxi",
            "include",
            "cus cndigicert",
            "sha256",
            "ca1 odigicert",
            "inc validity",
            "ogainwell",
            "subject public",
            "key info",
            "available from",
            "code",
            "registry tech",
            "admin country",
            "gb registrant",
            "organization",
            "registry domain",
            "tech email",
            "iocs",
            "name servers",
            "emails",
            "search",
            "certificate",
            "passive dns",
            "urls",
            "domain",
            "record value",
            "body",
            "united",
            "present jul",
            "present jun",
            "moved",
            "ip address",
            "entries",
            "unknown cname",
            "present may",
            "title",
            "name",
            "hostname add",
            "writeconsolea",
            "regsetvalueexa",
            "regdword",
            "show",
            "deep panda",
            "module load",
            "t1129",
            "post",
            "write",
            "markus",
            "april",
            "win32",
            "lost",
            "malware",
            "backdoor",
            "present dec",
            "virgin islands",
            "trojan",
            "present feb",
            "present jan",
            "error",
            "avast avg",
            "possible deep",
            "ipv4 add",
            "pulse pulses",
            "files",
            "hosting",
            "location virgin",
            "islands",
            "twitter",
            "panda",
            "associated urls",
            "date checked",
            "url hostname",
            "server response",
            "read c",
            "formbook cnc",
            "checkin",
            "medium",
            "yara detections",
            "delete",
            "ids detections",
            "pulse",
            "srs ab",
            "showing",
            "uregistruotas",
            "date",
            "pulses",
            "unknown ns",
            "xloader"
          ],
          "references": [
            "/hcp/ruxitagentjs_ICA7NVfqrux_10321250808084810.js",
            "IDS Detections: Possible DEEP PANDA C2 Activity Possible Deep Panda - Sakula/Mivast RAT CnC",
            "IDS: Beacon 5 Sakula/Mivast C2 Activity HTTP traffic on port 443 (POST)",
            "Yara Detections: RAT_Sakula ,  ScanBox_Malware_Generic ,  Nrv2x ,  UPX_OEP_place ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser ,",
            "Yara: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX",
            "Yara: kernel32_dll_xor_exe_key_11 ,  xor_0xb_kernel32_dll",
            "Alerts: network_icmp persistence_autorun modifies_proxy_wpad packer_polymorphic",
            "IDS: FormBook CnC Checkin (POST) Terse HTTP 1.0 Request Possible Nivdort Beacon 5 Possible DEEP PANDA C2 Activity (208.91.197.27)",
            "IDS:  Possible HTTP 403 XSS Attempt (Local Source) Possible Deep Panda - Sakula/Mivast RAT CnC (208.91.197.27)",
            "Craziest thing ever! Hall Render \u2018alleged\u2019 Law Firm was paying Tara Brasheats insurance?!",
            "Insane! They 1st kicked her of her Private pay United Healthcare. Put her off of Medicare. Won\u2019t pay!",
            "http://2fwww.hallrender.com/ \u2022  http://citrix.hallrender.com/ \u2022 http://dev.hallrender.com/  http://hallrender.com/attorney/brian-sabey/ No Expiration\t0\t  URL http://hallrender.com/resource-blog No Expiration\t0\t  URL http://hallrender.com/resources No Expiration\t0\t  URL http://mail.hallrender.com/ No Expiration\t0\t  URL http://www.hallrender.com/attorney/brian-sabey",
            "autodiscover.hallrender.com \u2022 hallrender.com \u2022 https://www.hallrender.com/wp-json/oembed",
            "image.marketing.hallrender.com \u2022  https://hallrender.com/resources \u2022",
            "https://hallrender.com/resources/blog/ \u2022 https://www.hallrender.com/attorn",
            "www.podcast.hallrender.com  \u2022 https://hallrender.com/resource-blog \u2022",
            "https://hallrender.com/attorney/gregg-m-wallander/",
            "https://elite.hallrender.com/TE_3E_PROD/web/ui/dashboard/ActionList_CCC",
            "https://hallrender.com/attorney/brian-sabey/ \u2022 https://hallrender.com/resources/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Backdoor:Win32/Plugx.N!dha",
              "display_name": "Backdoor:Win32/Plugx.N!dha",
              "target": "/malware/Backdoor:Win32/Plugx.N!dha"
            },
            {
              "id": "Sakurel",
              "display_name": "Sakurel",
              "target": null
            },
            {
              "id": "Win.Packed.Generic-9967832-0",
              "display_name": "Win.Packed.Generic-9967832-0",
              "target": null
            },
            {
              "id": "Virtool:Win32/Obfuscator.JM",
              "display_name": "Virtool:Win32/Obfuscator.JM",
              "target": "/malware/Virtool:Win32/Obfuscator.JM"
            },
            {
              "id": "Formbook",
              "display_name": "Formbook",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1448",
              "name": "Carrier Billing Fraud",
              "display_name": "T1448 - Carrier Billing Fraud"
            }
          ],
          "industries": [
            "Healthcare",
            "Legal",
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1886,
            "domain": 378,
            "hostname": 882,
            "FileHash-MD5": 173,
            "FileHash-SHA1": 172,
            "FileHash-SHA256": 1038,
            "email": 9
          },
          "indicator_count": 4538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "179 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68d1021acaa3ff0024effb9a",
          "name": "Deep Panda  \u2022 Formbook - Provider Portal Account Entry \u2022 Widespread issue| Attributed to Brian Sabey of Hall Render ",
          "description": "",
          "modified": "2025-10-21T23:02:21.484000",
          "created": "2025-09-22T08:00:26.271000",
          "tags": [
            "expiration",
            "related pulses",
            "language",
            "html document",
            "ascii text",
            "crlf line",
            "doctype",
            "portal",
            "enter",
            "tax id",
            "provider portal",
            "home",
            "iis windows",
            "provider web",
            "portal account",
            "please",
            "status",
            "server",
            "domain status",
            "registrar abuse",
            "registrar",
            "dnssec",
            "us registrant",
            "email",
            "contact email",
            "algorithm",
            "key identifier",
            "x509v3 subject",
            "full name",
            "v3 serial",
            "number",
            "cus odigicert",
            "inc cndigicert",
            "global g2",
            "tls rsa",
            "se review",
            "exclude data",
            "extraction",
            "search otx",
            "data upload",
            "enter source",
            "url or",
            "texurag",
            "value a",
            "se source",
            "extra",
            "referen data",
            "ica7nvfarux",
            "include review",
            "failed",
            "sc data",
            "type",
            "extra data",
            "referen",
            "hcpruxi include",
            "review exclude",
            "sugges",
            "exclude",
            "find s",
            "typ url",
            "hos hos",
            "domain hos",
            "hast",
            "referen hcpruxi",
            "include",
            "cus cndigicert",
            "sha256",
            "ca1 odigicert",
            "inc validity",
            "ogainwell",
            "subject public",
            "key info",
            "available from",
            "code",
            "registry tech",
            "admin country",
            "gb registrant",
            "organization",
            "registry domain",
            "tech email",
            "iocs",
            "name servers",
            "emails",
            "search",
            "certificate",
            "passive dns",
            "urls",
            "domain",
            "record value",
            "body",
            "united",
            "present jul",
            "present jun",
            "moved",
            "ip address",
            "entries",
            "unknown cname",
            "present may",
            "title",
            "name",
            "hostname add",
            "writeconsolea",
            "regsetvalueexa",
            "regdword",
            "show",
            "deep panda",
            "module load",
            "t1129",
            "post",
            "write",
            "markus",
            "april",
            "win32",
            "lost",
            "malware",
            "backdoor",
            "present dec",
            "virgin islands",
            "trojan",
            "present feb",
            "present jan",
            "error",
            "avast avg",
            "possible deep",
            "ipv4 add",
            "pulse pulses",
            "files",
            "hosting",
            "location virgin",
            "islands",
            "twitter",
            "panda",
            "associated urls",
            "date checked",
            "url hostname",
            "server response",
            "read c",
            "formbook cnc",
            "checkin",
            "medium",
            "yara detections",
            "delete",
            "ids detections",
            "pulse",
            "srs ab",
            "showing",
            "uregistruotas",
            "date",
            "pulses",
            "unknown ns",
            "xloader"
          ],
          "references": [
            "/hcp/ruxitagentjs_ICA7NVfqrux_10321250808084810.js",
            "IDS Detections: Possible DEEP PANDA C2 Activity Possible Deep Panda - Sakula/Mivast RAT CnC",
            "IDS: Beacon 5 Sakula/Mivast C2 Activity HTTP traffic on port 443 (POST)",
            "Yara Detections: RAT_Sakula ,  ScanBox_Malware_Generic ,  Nrv2x ,  UPX_OEP_place ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser ,",
            "Yara: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX",
            "Yara: kernel32_dll_xor_exe_key_11 ,  xor_0xb_kernel32_dll",
            "Alerts: network_icmp persistence_autorun modifies_proxy_wpad packer_polymorphic",
            "IDS: FormBook CnC Checkin (POST) Terse HTTP 1.0 Request Possible Nivdort Beacon 5 Possible DEEP PANDA C2 Activity (208.91.197.27)",
            "IDS:  Possible HTTP 403 XSS Attempt (Local Source) Possible Deep Panda - Sakula/Mivast RAT CnC (208.91.197.27)",
            "Craziest thing ever! Hall Render \u2018alleged\u2019 Law Firm was paying Tara Brasheats insurance?!",
            "Insane! They 1st kicked her of her Private pay United Healthcare. Put her off of Medicare. Won\u2019t pay!",
            "http://2fwww.hallrender.com/ \u2022  http://citrix.hallrender.com/ \u2022 http://dev.hallrender.com/  http://hallrender.com/attorney/brian-sabey/ No Expiration\t0\t  URL http://hallrender.com/resource-blog No Expiration\t0\t  URL http://hallrender.com/resources No Expiration\t0\t  URL http://mail.hallrender.com/ No Expiration\t0\t  URL http://www.hallrender.com/attorney/brian-sabey",
            "autodiscover.hallrender.com \u2022 hallrender.com \u2022 https://www.hallrender.com/wp-json/oembed",
            "image.marketing.hallrender.com \u2022  https://hallrender.com/resources \u2022",
            "https://hallrender.com/resources/blog/ \u2022 https://www.hallrender.com/attorn",
            "www.podcast.hallrender.com  \u2022 https://hallrender.com/resource-blog \u2022",
            "https://hallrender.com/attorney/gregg-m-wallander/",
            "https://elite.hallrender.com/TE_3E_PROD/web/ui/dashboard/ActionList_CCC",
            "https://hallrender.com/attorney/brian-sabey/ \u2022 https://hallrender.com/resources/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Backdoor:Win32/Plugx.N!dha",
              "display_name": "Backdoor:Win32/Plugx.N!dha",
              "target": "/malware/Backdoor:Win32/Plugx.N!dha"
            },
            {
              "id": "Sakurel",
              "display_name": "Sakurel",
              "target": null
            },
            {
              "id": "Win.Packed.Generic-9967832-0",
              "display_name": "Win.Packed.Generic-9967832-0",
              "target": null
            },
            {
              "id": "Virtool:Win32/Obfuscator.JM",
              "display_name": "Virtool:Win32/Obfuscator.JM",
              "target": "/malware/Virtool:Win32/Obfuscator.JM"
            },
            {
              "id": "Formbook",
              "display_name": "Formbook",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1448",
              "name": "Carrier Billing Fraud",
              "display_name": "T1448 - Carrier Billing Fraud"
            }
          ],
          "industries": [
            "Healthcare",
            "Legal",
            "Government"
          ],
          "TLP": "white",
          "cloned_from": "68d09835fed794bdc304de40",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1886,
            "domain": 378,
            "hostname": 882,
            "FileHash-MD5": 173,
            "FileHash-SHA1": 172,
            "FileHash-SHA256": 1038,
            "email": 9
          },
          "indicator_count": 4538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "179 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68d0cbab63b68549437a7c0b",
          "name": "Brain Sabey Anyxxx Porn Hall Render Law Firm & Health Insurance Company",
          "description": "",
          "modified": "2025-10-21T00:02:57.489000",
          "created": "2025-09-22T04:08:11.333000",
          "tags": [
            "url https",
            "url http",
            "filehashsha1",
            "filehashmd5",
            "types of",
            "virgin islands",
            "united",
            "canada",
            "ireland",
            "search",
            "japan",
            "type indicator",
            "role title",
            "added active",
            "expiration",
            "no expiration",
            "hostname",
            "domain",
            "pulse show",
            "possible deep",
            "https",
            "hall render",
            "panda",
            "post",
            "medicare united",
            "healthcare plan",
            "sci c1",
            "iocs",
            "enter source",
            "url or",
            "text drag",
            "drop or",
            "browse to",
            "select file",
            "relationship",
            "t1040",
            "sniffing",
            "t1045",
            "packing",
            "t1053",
            "taskjob",
            "t1060",
            "service"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1448",
              "name": "Carrier Billing Fraud",
              "display_name": "T1448 - Carrier Billing Fraud"
            }
          ],
          "industries": [
            "Healthcare"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 793,
            "domain": 41,
            "hostname": 259,
            "FileHash-MD5": 6,
            "FileHash-SHA1": 1,
            "FileHash-SHA256": 1
          },
          "indicator_count": 1101,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "180 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68c5e45fc1d3140ac91158ec",
          "name": "Drive by Compromise adversely impacted Social Media accounts",
          "description": "Exploitation to control at least one targeted users Social Media accounts, photo albums, clouds. Many deleted accounts, family photos, digital media, financial data, views, followers, intellectual property deleted and distributed to other artists , redirects. YouTube, Google, Spotify, Meta , Facebook.\n\nMonitored target. Crime: in the receiving end of an assaulters uncontrolled pelvis.\n\nRequires further research.\n#tag #framing #intellectual_property #theft #digital_attack",
          "modified": "2025-10-13T21:18:10.129000",
          "created": "2025-09-13T21:38:39.818000",
          "tags": [
            "tries indicator",
            "loading",
            "script urls",
            "present sep",
            "meta",
            "script domains",
            "443 ma2592000",
            "certificate",
            "response ip",
            "address google",
            "present jun",
            "body",
            "encrypt",
            "utc na",
            "utc facebook",
            "custom audience",
            "utc google",
            "tag manager",
            "gtmnf34hh2d",
            "utc gb4qwskls89",
            "language",
            "html internet",
            "html document",
            "unicode text",
            "utf8 text",
            "crlf",
            "lf line",
            "doctype",
            "algorithm",
            "key identifier",
            "x509v3 subject",
            "data",
            "v3 serial",
            "number",
            "cus olet",
            "encrypt cnr10",
            "validity",
            "subject public",
            "resolved ips",
            "http traffic",
            "iframe src",
            "https http",
            "access ta0001",
            "t1189 severity",
            "info found",
            "command",
            "control ta0011",
            "protocol t1071",
            "match low",
            "info",
            "talents",
            "get http",
            "dns resolutions",
            "mitre att",
            "ip traffic",
            "pattern domains",
            "pattern urls",
            "tls sni",
            "youtube",
            "spotify",
            "social media",
            "google",
            "sabey type",
            "rexx type",
            "foundry type",
            "initial access",
            "paypal",
            "monitored target",
            "hallrender resources",
            "brian sabey charge",
            "quasi"
          ],
          "references": [
            "https://forward.ro/talents/mira/ redirects to  forward.ro",
            "Resolves to a suspicious TLD - \t encore.scdn.co",
            "Iframe src: https://www.youtube.com/embed/nuxT76ndwYY",
            "Iframe src: https://open.spotify.com/embed/artist/2nMFC7hWK0haX8ilvRpb59?utm_source=generator",
            "Iframe src: https://www.youtube.com/embed/SEBW2mh1jvY",
            "Iframe src: https://www.youtube.com/embed/o8_jPaXfxWY",
            "Dates back to a malicious ongoing Brian Sabey HallRender attacks using various malicious resources",
            "partnerapi.spotify.net \u2022 youtube.ru"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1585.001",
              "name": "Social Media Accounts",
              "display_name": "T1585.001 - Social Media Accounts"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1413",
              "name": "Access Sensitive Data in Device Logs",
              "display_name": "T1413 - Access Sensitive Data in Device Logs"
            },
            {
              "id": "T1463",
              "name": "Manipulate Device Communication",
              "display_name": "T1463 - Manipulate Device Communication"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [
            "Media",
            "Technology",
            "Government",
            "Financial"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 179,
            "domain": 55,
            "hostname": 121,
            "FileHash-SHA1": 3,
            "FileHash-SHA256": 560,
            "FileHash-MD5": 112,
            "email": 4
          },
          "indicator_count": 1034,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "187 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "689030129ed94e6805755c52",
          "name": "iimcb.e-kei.pl   iimcb.gov.pl  ip4 94.152.54.231 (94.152.0.0/16) ???",
          "description": "https://www.virustotal.com/gui/domain/iimcb.e-kei.pl/details\nhttps://www.virustotal.com/gui/domain/iimcb.gov.pl/details\nhttps://www.virustotal.com/gui/ip-address/94.152.54.231/details",
          "modified": "2025-09-03T03:00:19.806000",
          "created": "2025-08-04T03:59:14.325000",
          "tags": [],
          "references": [
            "iimcb.e-kei.pl",
            "iimcb.e.gov.pl",
            "iimcb.gov.pl"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 249,
            "FileHash-MD5": 2,
            "FileHash-SHA1": 26,
            "FileHash-SHA256": 49,
            "hostname": 961,
            "URL": 2001,
            "CVE": 1
          },
          "indicator_count": 3289,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 123,
          "modified_text": "228 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6878ab97e659d23d965452ac",
          "name": "Yandex - Tofsee.AX | Malvertising Hub for US",
          "description": "Win32/Tofsee.AX google.com connectivity check\n Can\u2019t access all malware files.\n\nYandex has long been a malvertising Hub for US and other non- Russian threat actors.",
          "modified": "2025-08-16T07:00:49.321000",
          "created": "2025-07-17T07:51:51.799000",
          "tags": [
            "status",
            "russia",
            "creation date",
            "passive dns",
            "urls",
            "date",
            "hostname add",
            "pulse pulses",
            "files",
            "verdict",
            "present jul",
            "certificate",
            "ip address",
            "search",
            "record value",
            "showing",
            "xml title",
            "present jan",
            "present sep",
            "present oct",
            "whois",
            "urlvoid",
            "related",
            "https",
            "expiration",
            "http",
            "months ago",
            "expiration http",
            "url http",
            "report spam",
            "smear",
            "brian sabey",
            "sabey",
            "data upload",
            "extraction",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "entries",
            "tbmvid",
            "sourcelnms",
            "zx1724209326040",
            "hostname",
            "trojan",
            "delete c",
            "united",
            "grum",
            "show",
            "cape",
            "tofsee",
            "high",
            "total",
            "copy",
            "write",
            "malware",
            "patched",
            "next",
            "class",
            "failed",
            "indicator role",
            "title added",
            "active related",
            "filehashmd5",
            "filehashsha1",
            "filehashsha256"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1080",
              "name": "Taint Shared Content",
              "display_name": "T1080 - Taint Shared Content"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1586",
              "name": "Compromise Accounts",
              "display_name": "T1586 - Compromise Accounts"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2337,
            "hostname": 833,
            "email": 4,
            "domain": 357,
            "FileHash-MD5": 113,
            "FileHash-SHA256": 1551,
            "FileHash-SHA1": 108,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 5304,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "246 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68788dfd4a0943cb318c7137",
          "name": "DarkWatchman Chekin Activity",
          "description": "",
          "modified": "2025-08-16T06:02:36.091000",
          "created": "2025-07-17T05:45:33.250000",
          "tags": [
            "access ta0001",
            "defense evasion",
            "access ta0006",
            "command",
            "control ta0011",
            "impact ta0040",
            "catalog tree",
            "ob0005 defense",
            "evasion ob0006",
            "impact ob0008",
            "hashes cape",
            "sandbox",
            "docguard",
            "yomi hunter",
            "zenbox",
            "ip traffic",
            "pattern domains",
            "memory pattern",
            "urls https",
            "adversaries",
            "mitre att",
            "t1189 found",
            "clickable urls",
            "pdf execution",
            "t1036",
            "creates",
            "hide artifacts",
            "exploitation",
            "e1564 hidden",
            "files",
            "discovery e1082",
            "e1203 data",
            "vhash",
            "ssdeep",
            "file type",
            "pdf document",
            "magic pdf",
            "trid adobe",
            "format",
            "file size",
            "united",
            "as32934",
            "passive dns",
            "unknown",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse pulses",
            "urls",
            "status",
            "search",
            "showing",
            "server error",
            "certificate",
            "creation date",
            "high assurance",
            "server ca",
            "date",
            "body",
            "win32",
            "ransom",
            "entries",
            "icmp traffic",
            "packing t1045",
            "t1045",
            "pdb path",
            "pe resource",
            "show",
            "malware",
            "copy",
            "push",
            "write",
            "aaaa",
            "nxdomain",
            "united kingdom",
            "thailand",
            "vietnam",
            "as45430",
            "honduras",
            "indonesia",
            "mexico",
            "slovakia",
            "dynamicloader",
            "yara rule",
            "high",
            "ekyxe",
            "xe e",
            "eofae",
            "ee edcje4j",
            "tofsee",
            "windows",
            "medium",
            "stream",
            "grum",
            "as15169 google",
            "pulses",
            "record value",
            "error",
            "cname",
            "name servers",
            "ireland",
            "next",
            "federation asn",
            "as49505",
            "labs pulses",
            "trojan",
            "trojandropper",
            "related pulses",
            "file samples",
            "files matching",
            "date hash",
            "copyright",
            "all search",
            "reverse dns",
            "location united",
            "emails info",
            "expiration date",
            "as51167 contabo",
            "germany unknown",
            "a nxdomain",
            "as40021 contabo",
            "encrypt",
            "url http",
            "http",
            "ip address",
            "related nids",
            "files location",
            "ddos",
            "activity",
            "checkin",
            "win64",
            "mirai",
            "hosting",
            "files ip",
            "address",
            "czechia unknown",
            "as174 cogent",
            "asnone germany",
            "as15598",
            "as16625 akamai",
            "asnone united",
            "as20940",
            "as35994 akamai",
            "as12337 noris",
            "pulse submit",
            "url analysis",
            "backdoor",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "suspicious",
            "virtool",
            "emails",
            "domain name",
            "code",
            "brazil",
            "poland",
            "domain",
            "msie",
            "windows nt",
            "tcp syn",
            "resolverror",
            "exploit",
            "externalport",
            "internalport",
            "http headers",
            "home network",
            "demonbot",
            "andariel",
            "yara detections",
            "malware traffic",
            "nids",
            "dns query",
            "google safe",
            "browsing",
            "whois",
            "virustotal",
            "mtb apr",
            "asnone related",
            "open",
            "hash avast",
            "avg clamav",
            "msdefender apr",
            "as8075",
            "content type",
            "access",
            "cp bus",
            "cur cono",
            "fin ivdo",
            "onl our",
            "phy samo",
            "overview ip",
            "flag united",
            "hostname",
            "files domain",
            "as8068",
            "trojan features",
            "rsa tls",
            "issuing ca",
            "mirai variant",
            "useragent",
            "inbound",
            "realtek sdk",
            "miniigd upnp",
            "soap command",
            "activity mirai",
            "helloworld",
            "users",
            "alerts",
            "anomalous file",
            "recycle bin",
            "filehash",
            "av detections",
            "memcommit",
            "read c",
            "memreserve",
            "for privacy",
            "china unknown",
            "ag alberto",
            "pedraz",
            "holidaycheck ag",
            "project pi",
            "immobilien ag",
            "puma se",
            "kurt walther",
            "ag ingo",
            "kraupa",
            "timo salzsieder",
            "record type",
            "ttl value",
            "msms57295540",
            "subdomains",
            "ireland unknown",
            "analyzer paste",
            "iocs",
            "samples",
            "regsetvalueexa",
            "default",
            "regdword",
            "module load",
            "t1129",
            "http request",
            "process32nextw",
            "regbinary",
            "oxypumper",
            "tools",
            "dock",
            "april",
            "persistence",
            "execution",
            "download",
            "as62597 nsone",
            "echo request",
            "sweep",
            "payload hello",
            "world",
            "total",
            "please",
            "xport",
            "main",
            "look",
            "install",
            "servers",
            "found",
            "cnapple public",
            "accept",
            "chrome",
            "moved",
            "ssl certificate",
            "write c",
            "installcore",
            "june",
            "delphi",
            "as47846",
            "cookie",
            "as32787 akamai",
            "as714 apple",
            "m1",
            "onelouder",
            "brian sabey",
            "denver colorado",
            "fakedout threat",
            "gmt content",
            "x cache",
            "div div",
            "as8972 host",
            "france unknown",
            "registrar",
            "otx scoreblue",
            "address domain",
            "as24940 hetzner",
            "as44273 host",
            "asn as15598",
            "trojanspy",
            "mail spammer",
            "germany mail",
            "spammer",
            "hichina",
            "data redacted",
            "a domains",
            "wow64",
            "slcc2",
            "media center",
            "port",
            "powershell",
            "urls http",
            "tptjsw",
            "virus",
            "ids detections",
            "germany",
            "as8560",
            "austria",
            "as1921",
            "as14061",
            "whitelisted",
            "as16276",
            "script urls",
            "as16552 tiggee",
            "as9009 m247",
            "meta",
            "as29789",
            "detected m1",
            "mtb aug",
            "server",
            "as397241",
            "cryp",
            "hostmaster",
            "networks",
            "as19024",
            "gmt setcookie",
            "delete",
            "russia as49505",
            "sinkhole cookie",
            "value snkz",
            "pe32",
            "possible",
            "susp",
            "lnmp",
            "lnmp a",
            "licess",
            "shell",
            "as63949 linode",
            "as133618",
            "as21342",
            "cve201717215",
            "huawei remote",
            "huawei hg532",
            "malware worm",
            "gafgyt",
            "exploit none",
            "binbusybox",
            "delete c",
            "odigicert inc",
            "stwashington",
            "lredmond",
            "rsa ca",
            "cape",
            "nondns",
            "denver",
            "redacted for",
            "method status",
            "url hostname",
            "ip country",
            "type get",
            "date tue",
            "gmt contenttype",
            "connection",
            "cachecontrol",
            "expires thu",
            "gmt vary",
            "poland unknown",
            "title",
            "script domains",
            "updated date",
            "serce internetu",
            "cnc beacon",
            "javascript",
            "wsasend",
            "post",
            "delete shadows",
            "all quiet",
            "t1047",
            "instrumentation",
            "rpcs",
            "ms windows",
            "asnone dns",
            "http host",
            "ip check",
            "sha256",
            "bits",
            "adware malware",
            "etpro malware",
            "bios",
            "guard",
            "tulach",
            "spectrum",
            "cyber folks",
            "tsara brashears",
            ".pl",
            "contacted",
            "kryptikxp",
            "apple",
            "ios",
            "android",
            "sabey",
            "charter communications",
            "denvecolorado",
            "quantum fiber",
            "air force",
            "swipper",
            "masquerade",
            "hitmen",
            "mitm",
            "whitesky",
            "cyber warfare",
            "porn",
            "pornhub.software"
          ],
          "references": [
            "DISTINCTIO8.pdf",
            "FileHash - SHA256 001f0ebe975b5f5a7e5272f53455635cc938a5a0129417f7e79c39df6cf65657 | Yara Detections: stack_string",
            "IDS Detections: Win32/Tofsee.AX google.com connectivity check Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set",
            "Tofsee: 'google.com' |  https://www.gov50.icu |",
            "ET TROJAN Win32/DarkWatchman Checkin Activity (POST) ( This is true. They sit around watching, following...)",
            "Alerts: procmem_yara injection_inter_process creates_largekey network_bind persistence_autorun antivm_generic_disk",
            "Alerts: persistence_autorun_tasks spawns_dev_util cape_detected_threat injection_process_hollowing",
            "hubt.pornhub.com | www.pornhub.com | pornative.com",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ||  pin.it || https://pin.it/",
            "www.sweetheartvideo.com || https://www.sweetheartvideo.com/tsara-brashears/",
            "Unix.Trojan.Mirai-6981169-0: FileHash - SHA256  fe00b364b6b8342e3ce0dd146902ac3330ab976e87aca6be666efde39ea485da",
            "IDS Detections: WGET Command Specifying Output in HTTP Headers",
            "IDS Detections: D-Link Devices Home Network Administration Protocol Command Execution",
            "Yara Detections: is__elf ,  DemonBot",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication writes_to_stdout",
            "FileHash - SHA256  f32f6b229913d68daad937cc72a57aa45291a9d623109ed48938815aa7b6005c",
            "IDS Detections: Andariel Backdoor Activity (Checkin)",
            "Alerts: dead_host nids_malware_alert network_icmp nolookup_communication",
            "DDoS:Linux/Gafgyt : FileHash - SHA256  358c2bd5b9e925dc23894dec18ce486c03d743cde766ce298ac1e2f00d86f0b2",
            "IDS Detection: Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound",
            "IDS Detection: Mirai Variant User-Agent (Inbound) WebShell Generic - wget http - POST",
            "IDS Detection: Observed Suspicious UA (Hello-World) Suspicious Activity potential UPnProxy",
            "http://vortex-nlb-http2-fed-us-taut-purple.nr-data.net/",
            "https://tulach.cc/ || tulach.cc || www-temp.metrobyt-mobile.com",
            "apple-reactivate.com | appleweb-aem.apple.com | apple.com | revoked-aprtr1-tr1g1.apple.com | network-framework.apple.com",
            "autodiscover.webcompanion.com || avc-gft-dashboard.apple.com || cac1-wwfde-wave.apple.com || demo27.apple.com",
            "* https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
            "https://tulach.cc/ | tulach.cc |",
            "http://hallrender.com/attorney/brian-sabey | www-temp.metrobyt-mobile.com",
            "google.pl | aplikacja.ceidg.gov.pl | imaginecup.pl | microsoft.pl",
            "18teen.net | teensnow.com | grannies-porn.net | pornmd.com",
            "www.pornhubselect.com | pornhub.software"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Chile",
            "Morocco",
            "Taiwan",
            "Guatemala",
            "United Kingdom of Great Britain and Northern Ireland",
            "Ireland",
            "Kenya",
            "Peru",
            "Singapore",
            "Mexico",
            "Brazil",
            "Slovakia",
            "Spain",
            "Australia",
            "Belgium",
            "Germany",
            "Hungary",
            "Netherlands",
            "Russian Federation",
            "Japan",
            "Poland"
          ],
          "malware_families": [
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "TEL:CreateScheduledTask",
              "display_name": "TEL:CreateScheduledTask",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-6981169-0",
              "display_name": "Unix.Trojan.Mirai-6981169-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee",
              "display_name": "Backdoor:Win32/Tofsee",
              "target": "/malware/Backdoor:Win32/Tofsee"
            },
            {
              "id": "Ransom:Win32/Haperlock",
              "display_name": "Ransom:Win32/Haperlock",
              "target": "/malware/Ransom:Win32/Haperlock"
            },
            {
              "id": "Trojan:Win32/Neurevt",
              "display_name": "Trojan:Win32/Neurevt",
              "target": "/malware/Trojan:Win32/Neurevt"
            },
            {
              "id": "DDoS:Linux/Gafgyt.YA!MTB",
              "display_name": "DDoS:Linux/Gafgyt.YA!MTB",
              "target": "/malware/DDoS:Linux/Gafgyt.YA!MTB"
            },
            {
              "id": "CVE-2017-17215",
              "display_name": "CVE-2017-17215",
              "target": null
            },
            {
              "id": "CVE-2023-27350",
              "display_name": "CVE-2023-27350",
              "target": null
            },
            {
              "id": "CVE-2014-8361",
              "display_name": "CVE-2014-8361",
              "target": null
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "M1",
              "display_name": "M1",
              "target": null
            },
            {
              "id": "OneLouder",
              "display_name": "OneLouder",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Win.Trojan.Sarwent-10012602-0",
              "display_name": "Win.Trojan.Sarwent-10012602-0",
              "target": null
            },
            {
              "id": "Virus:Win32/Sivis.A",
              "display_name": "Virus:Win32/Sivis.A",
              "target": "/malware/Virus:Win32/Sivis.A"
            },
            {
              "id": "Win.Trojan.Installcore-1177",
              "display_name": "Win.Trojan.Installcore-1177",
              "target": null
            },
            {
              "id": "Win.Malware.Oxypumper-6900435-0",
              "display_name": "Win.Malware.Oxypumper-6900435-0",
              "target": null
            },
            {
              "id": "Win.Malware.Qshell-9875653-0",
              "display_name": "Win.Malware.Qshell-9875653-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1203",
              "name": "Exploitation for Client Execution",
              "display_name": "T1203 - Exploitation for Client Execution"
            },
            {
              "id": "T1485",
              "name": "Data Destruction",
              "display_name": "T1485 - Data Destruction"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1428",
              "name": "Exploit Enterprise Resources",
              "display_name": "T1428 - Exploit Enterprise Resources"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1133",
              "name": "External Remote Services",
              "display_name": "T1133 - External Remote Services"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "678f0dbdbc59dd2ea5656dcf",
          "export_count": 32,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 7596,
            "FileHash-SHA1": 3987,
            "FileHash-SHA256": 8622,
            "URL": 1922,
            "domain": 2530,
            "hostname": 2524,
            "email": 37,
            "CVE": 6,
            "SSLCertFingerprint": 6
          },
          "indicator_count": 27230,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "246 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6872f4c510c590b7cdc5ff6a",
          "name": "Crowdsourced Collection of PayPal Mafia Monster - Foundry\u2019s Palantair",
          "description": "Americans are investing in what Edward Snowden foretold of\u2026 your future from beginning to end will  predict how you will be treated. Preemptively policing people even if you have to make up a past.. |\n\nThe New York Times\nMay 30, 2025 \u2014 The Trump administration has expanded Palantir's work with the government, spreading the company's technology \u2014 which could easily merge data on ...\nFormer Palantir workers condemn company's work with ...\n\nNPR\nMay 5, 2025 \u2014 Thirteen former employees of influential data-mining firm Palantir are condemning the company's work with the Trump administration.\nWyden AOC Palantir Letter 061725\n\nSenate Finance (.gov)\nJun 17, 2025 \u2014 The Trump Administration has spent taxpayer dollars on Palantir software at numerous other government agencies and paid it billions of dollars ...\n#foundry #rip #palantir #jeffreyreimerdpt #lawenforcement #twitter #tsarabrashearsblessed #apple #privacynow #fightforprivacy #sabey #hallrender",
          "modified": "2025-08-11T23:02:24.583000",
          "created": "2025-07-12T23:50:29.847000",
          "tags": [
            "url https",
            "url http",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "entries",
            "indicator role",
            "title added",
            "active related",
            "pulses",
            "enter source",
            "urior exirag",
            "diri type",
            "data upload",
            "extraction",
            "failed",
            "included iocs",
            "review iocs",
            "find sugge",
            "extr extract",
            "in data",
            "extract",
            "type",
            "u extractio",
            "extra",
            "review ic",
            "ipv4",
            "pulses hostname",
            "accountunlock",
            "united",
            "ireland",
            "canada",
            "brazil",
            "sweden",
            "australia",
            "search",
            "scan",
            "iocs",
            "learn more",
            "filehashsha1",
            "filehashmd5",
            "types of",
            "extra data",
            "included review",
            "china",
            "colombia",
            "filepath https",
            "enter sc",
            "extr data",
            "include review",
            "exclude sugges",
            "filehashsha256",
            "hostname",
            "dicators japan",
            "url tor",
            "extrac data",
            "ic excluded",
            "suggeste",
            "stop",
            "type no",
            "no entrie",
            "included",
            "review locc",
            "excluded data",
            "sc data",
            "extri data",
            "includec review",
            "exclude data",
            "suggested",
            "se extra",
            "suggest",
            "manaiv add",
            "indicator",
            "review lace",
            "extri",
            "find s",
            "typ no",
            "no entdi",
            "ous u",
            "dron aew",
            "avtrat",
            "extre data",
            "manually",
            "add indicator",
            "pulses url",
            "url url",
            "typ host",
            "host url",
            "include",
            "z6911541",
            "extraction fail",
            "enter souf",
            "s type",
            "ur extraction",
            "extraction data",
            "jul all",
            "pulse data",
            "report external",
            "review",
            "extre please",
            "se extraction",
            "report spam",
            "all t8",
            "firmip",
            "bofa",
            "wikileaks",
            "tmobile",
            "dish",
            "capture",
            "cookie",
            "enter s",
            "please sub",
            "include outroov",
            "excludel sugges",
            "extra please",
            "high priority",
            "alerts ids",
            "priority alerts",
            "cnc beacon",
            "winver",
            "digitalmistica",
            "november",
            "pulse",
            "palantir",
            "foundry twitter",
            "arkei stealer",
            "config",
            "install",
            "downloader",
            "cidr",
            "domain",
            "indicators hong",
            "kong",
            "ukraine",
            "status no",
            "object",
            "unruy",
            "http",
            "remote",
            "keylogger",
            "foundry created",
            "days ago",
            "white keylogger",
            "apple",
            "foundry tech",
            "mafia",
            "t1045",
            "packing",
            "t1060",
            "run keys",
            "startup",
            "folder",
            "t1457",
            "showing",
            "types",
            "indicators show",
            "dicator role",
            "tsara brashears",
            "tsara",
            "porn",
            "porn videos",
            "pornhub https",
            "searchtsar",
            "watch tsara",
            "most relevant",
            "open threat",
            "green",
            "love",
            "daily",
            "videos",
            "free porn",
            "hybrid analysis",
            "falcon sandbox",
            "top tsara",
            "brashears porn",
            "stream",
            "spice",
            "download",
            "hybrid",
            "njrat",
            "threat network",
            "https",
            "created",
            "years ago",
            "modified",
            "months ago",
            "tinynote",
            "douglas county",
            "co sheriff",
            "office",
            "pegasus attacks",
            "sa victim",
            "octoseek public",
            "white",
            "excludedocs",
            "sugges",
            "stop data",
            "tsara lynn",
            "brashears les",
            "lynn brashears",
            "translate",
            "pornhub page",
            "emotet",
            "se review",
            "typ url",
            "dom hos",
            "hostname data",
            "harmful",
            "octoseekpulse",
            "attacks sa",
            "bandit stealer",
            "flubot",
            "agent tesla",
            "qbot",
            "qakbot",
            "ursnif",
            "azorult",
            "djvu",
            "hacktool",
            "maze",
            "dark",
            "linux",
            "android10",
            "khtml",
            "costcpc",
            "userosandroid",
            "bannerid2738231",
            "india",
            "enter so",
            "please subr",
            "suggest data",
            "netherlands",
            "russia",
            "america malware",
            "families",
            "sc type",
            "please",
            "show",
            "url data",
            "fanec",
            "include failed",
            "review exclude",
            "extre",
            "includea",
            "exclude toosrou",
            "sugges data",
            "typ data",
            "information",
            "cobalt strike",
            "ransomexx",
            "quackbot",
            "comspec",
            "span",
            "idn1",
            "sendimage0",
            "refts0",
            "include data",
            "uny inuuue",
            "fileh fileh",
            "exclude suggest",
            "uniy",
            "type fileh",
            "extr please",
            "ineluderc\u0660",
            "review data",
            "excludedlocs"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1051",
              "name": "Shared Webroot",
              "display_name": "T1051 - Shared Webroot"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1080",
              "name": "Taint Shared Content",
              "display_name": "T1080 - Taint Shared Content"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1085",
              "name": "Rundll32",
              "display_name": "T1085 - Rundll32"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1506",
              "name": "Web Session Cookie",
              "display_name": "T1506 - Web Session Cookie"
            },
            {
              "id": "T1512",
              "name": "Capture Camera",
              "display_name": "T1512 - Capture Camera"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1586",
              "name": "Compromise Accounts",
              "display_name": "T1586 - Compromise Accounts"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1133",
              "name": "External Remote Services",
              "display_name": "T1133 - External Remote Services"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1065",
              "name": "Uncommonly Used Port",
              "display_name": "T1065 - Uncommonly Used Port"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 58,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 12679,
            "domain": 1134,
            "hostname": 3543,
            "FileHash-MD5": 251,
            "email": 7,
            "FileHash-SHA256": 1927,
            "FileHash-SHA1": 232,
            "CVE": 1,
            "CIDR": 1,
            "URI": 1
          },
          "indicator_count": 19776,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "250 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "686ab98ff0cb9baa4e2b2000",
          "name": "https://house.mo.gov/ Palantir Technologies HARMFUL (copied  OctoseekPulse)  Attacks SA victims?",
          "description": "",
          "modified": "2025-08-05T21:02:46.419000",
          "created": "2025-07-06T17:59:43.440000",
          "tags": [
            "runtime process",
            "localappdata",
            "size",
            "sha256",
            "sha1",
            "temp",
            "prefetch8",
            "prefetch1",
            "unicode text",
            "type data",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "mitre",
            "writes a pe file header to disc",
            "show process",
            "date",
            "document file",
            "v2 document",
            "ascii text",
            "malicious",
            "local",
            "path",
            "found",
            "ssl certificate",
            "whois record",
            "threat roundup",
            "contacted",
            "october",
            "resolutions",
            "apple ios",
            "referrer",
            "communicating",
            "execution",
            "june",
            "august",
            "emotet",
            "qakbot",
            "agent tesla",
            "azorult",
            "core",
            "maze",
            "metro",
            "dark",
            "team",
            "critical",
            "copy",
            "awful",
            "ursnif",
            "hacktool",
            "info",
            "qbot",
            "april",
            "njrat",
            "nokoyawa",
            "djvu",
            "flubot",
            "ransomware",
            "bandit stealer",
            "hallrender",
            "spyware",
            "safebae",
            "tsara brashears",
            "westlaw",
            "river.rocks",
            "brian sabey",
            "targeting",
            "dnspionage",
            "united",
            "unknown",
            "search",
            "aaaa",
            "showing",
            "domain",
            "creation date",
            "record value",
            "dnssec",
            "body",
            "passive dns",
            "encrypt",
            "as14061",
            "germany unknown",
            "as397240",
            "gmt server",
            "443 ma2592000",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse pulses",
            "urls",
            "files",
            "main",
            "installing",
            "as16276",
            "france unknown",
            "name servers",
            "as8075",
            "servers",
            "next",
            "as63949 linode",
            "as206834 team",
            "canada unknown",
            "status",
            "as61969 team",
            "msie",
            "chrome",
            "ransom",
            "gone",
            "title",
            "head body",
            "malware"
          ],
          "references": [
            "\u2193\u2192Found in: https://house.mo.gov/\u2193",
            "dns.msftncsi.com \u2022 https://dns.msftncsi.com/ \u2022 http://dns.msftncsi.com/",
            "demo.auth.civicalg.com.sni.cloudflaressl.com",
            "happyrabbit.kr [Apple iOS threat]",
            "https://appletoncdn.xyz/l/26422915e0d4f6f88646?sub=5eafeec1af7c0a0001960f44&source=81 \u2022 appletoncdn.xyz",
            "https://tracking.s-unlock.com \u2022 https://ignaciob.com/track/click/v2-318692303 \u2022 adepttracker.com \u2022",
            "https://your-sugar-girls.com/cams/default/adult/5277/index.html?p1=https://bongacams10.com/track?c=621661&subid=1a1d33f51a7179480c6d4aeb40d3a5a1&subid2=16969639",
            "https://click.stecloud.us/campaign/track-email/384458660__3339__6837152__393",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://enter.private.com/track/MTIxODEuNjEuMi41MjEuMTAxMC4wLjAuMC4w/join",
            "http://nudeteenporn.site"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Nokoyawa Ransomware",
              "display_name": "Nokoyawa Ransomware",
              "target": null
            },
            {
              "id": "Bandit Stealer",
              "display_name": "Bandit Stealer",
              "target": null
            },
            {
              "id": "FluBot",
              "display_name": "FluBot",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "QBot",
              "display_name": "QBot",
              "target": null
            },
            {
              "id": "QakBot",
              "display_name": "QakBot",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Ursnif",
              "display_name": "Ursnif",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Djvu",
              "display_name": "Djvu",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Maze",
              "display_name": "Maze",
              "target": null
            },
            {
              "id": "Dark",
              "display_name": "Dark",
              "target": null
            },
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1065",
              "name": "Uncommonly Used Port",
              "display_name": "T1065 - Uncommonly Used Port"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65c96df8fe0657d56a206a49",
          "export_count": 42,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 251,
            "FileHash-SHA1": 211,
            "FileHash-SHA256": 3226,
            "domain": 1867,
            "URL": 10030,
            "hostname": 2919,
            "CVE": 7,
            "email": 6
          },
          "indicator_count": 18517,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "256 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "https://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/",
        "https://207-207-25-201.fwd.datafoundry.com/",
        "http://dobkinfamily.com/__media__/js/netsoltrademark.php?d=www.fap18pgals.eu/cum-on-ass-porn/",
        "https://www.sweetheartvideo.com/en/dvd/Lesbian-Massage/49895",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://thebrotherssabey.com/author/thebrotherssabey/  | https://thebrotherssabey.com/author/dbsabey/",
        "https://www.patientfusion.com/doctor/michael-crincoli-59108",
        "ET TROJAN Win32/DarkWatchman Checkin Activity (POST) ( This is true. They sit around watching, following...)",
        "bfxxxhindi.to  www.bfxxxhindi.to  https://www.bfxxxhindi.to   tsara brashears bfxxxhindi.to https://www.bfxxxhindi.to/trend/eaUvPMTg3NzMytY07Q/",
        "https://billpay.stcu.org/csp/ws/ALKAMI-S5M/html/PC_Remote_Role_Due_XP_Help/role1_faq_email_notifications.html  billpay.stcu.org",
        "http://tracking.studyportalsmail.com/about/privacy/?cdmtw=BAAAIAEAIGmGCaIK4E8-IsDv \u2022 tracking.studyportalsmail.com \u2022 plugtrack.online",
        "apple.com \u2022 appleid.apple.com-elasticbeanstalk.ttfcuupdateaccount-loginpage.works.co",
        "http://mp7tf.best-cell-phone-plans-for-seniors.cfd/",
        "remote.utorrent.com | pornhub.dev | lp.rallypoint.com",
        "https://www.vgt.pl/favicon.ico",
        "tulach.cc",
        "http://www.happylifehappywife.com/2010/07/'> \u2022 http://www.happylifehappywife.com/2010/09/'>",
        "http://vtwctr.org/explore/tsara-brashears-defeats-jeffrey-reimer/ phishing",
        "207-207-25-167.fwd.datafoundry.com \u2022 207-207-25-168.fwd.datafoundry.com \u2022 207-207-25-169.fwd.datafoundry.com",
        "https://thebrotherssabey.com/2018/12/05/nature | https://thebrotherssabey.com/2019/01/20/miracle/ | https://thebrotherssabey.com/20",
        "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https://www.hallrender.com/attorney/brian-sabey/&",
        "https://kompoz2.com/tv/454575/blonde-slut-sara-jay-with-big-ass-is-fucked-in-doggy-style.html",
        "209-99-69-91.fwd.datafoundry.com \u2022 dns1.datafoundry.com \u2022 dns2.datafoundry.com \u2022 rdweb.datafoundry.com",
        "Targeting Tsara Brasheras and associated",
        "https://www.vgt.pl/font/roboto/Roboto-Regular.eot \u2022 https://www.vgt.pl/94.152.156.22/logo.png \u2022 https://www.vgt.pl/css/",
        "http://www.milehighmedia.com/legal\t \u2022  https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "Victim silenced. Struck by Car Driven by male police let walk",
        "https://www.vgt.pl/font/roboto/Roboto-Bold.eot \u2022 https://www.vgt.pl/font/roboto/Roboto-Bold.ttf \u2022 https://www.vgt.pl/font/roboto/Roboto-Light.eot",
        "http://alohatube.xyz/search/tsara-brashears [Telecom \u2022 Brashears Telecom services modified (malicious)]",
        "init-p01st.push.apple.com",
        "config.uca.cloud.unity3d.com",
        "https://booking.nmc.ae/en-ae/doctor/physician/abu-dhabi/sreehari-karunakaran-pillai :",
        "Y.A.S:1Byte/TinyRod SeeDescription @ Y.A.S. OFFICIAL MUSIC VIDEO",
        "Target\u2193\u2192 Tsara Brashears:  https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing",
        "https://www.sweetheartvideo.com/en/?s=1?s=1&utm_source=272160&utm_medium=affiliate&utm_campaign=lovelezzies",
        "https://info.sabeydatacenters.com/webmail/404532/1590752290/6c9ed1e0b6b364689835e8c6bd51ed2198f99ee8ec7fa1924787e4e9b6382872",
        "https://applemusic-spotlight.myunidays.com/US/en-US? [potential Apple pegasus media entrance]",
        "Alerts: virus polymorphic procmem_yara static_pe_anomaly suricata_alert antivm_bochs_keys",
        "sexuallybroken.info \u2022 sinful-bordello.top-sex.us \u2022 crackedtool.com \u2022 kddi-cloud.com \u2022 http://tuksex.duckdns.org/bb/login.php",
        "Apple Malware: http://103.246.145.111/gateonl.php?hwid=WALKER-PC-WALKER&cpuname=Intel [ Apple unlocker, decryption via media]",
        "Mark Brian Sabey",
        "https://thebrotherssabey.com/comments/feed/ | mail2.sabeydatacenters.com | mails.sabeydatacenters.com | newmail.sabeydatacenters.com",
        "https://thebrotherssabey.com/comments/feed/ | https://thebrotherssabey.com/category/pregnancy",
        "myhotzpic.com  pornohata.com pornstarsporno.net aninditaannisa.blogspot.com/2019/02/tsara-brashears",
        "https://rdweb.datafoundry.com/ \u2022 http://www.datafoundry.com \u2022 https://207-207-25-163.fwd.datafoundry.com \u2022",
        "23.216.147.64",
        "thebrotherssabey.wordpress.com | https://hallrender.com/attorney/brian-sabey",
        "https://SafeBae.org |  https://www.sweetheartvideo.com/tsara-brashearsAccept-Language",
        "https://www.vgt.pl/94.152.156.22/logo.png \u2022 https://www.vgt.pl/css/",
        "hallrender.com/attorney/brian-sabey hallrender.com/attorney/b-sabey Christopher Ahmann",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net  https://www.sweetheartvideo.com/tsara-brashears/",
        "TrojanDownloader:Win32/Eterock.A IDS Detections Possible ETERNALROCKS .Net161",
        "https://www.anyxxxtube.net/search-porn/",
        "https://www.rallypoint.com/command-post/veterans-benefits-banking-program-integrates-with-vetcents-to-improve-veterans-financial-health?utm_source=dept_of_va&utm_medium=email&utm_campaign=vavetcents",
        "http://amp.mypornvid.fun/videos/2/SLFGMWoQaCU/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears",
        "OTX description for SNIT- I love to compose letters of resignation; now and then I send one in",
        "http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-misconduct-miscinception.html",
        "https://www.datafoundry.com/category/news/press-releases/ (Fake Press) abuse",
        "Amnesty.org | remote.amnesty.org",
        "www.localhost.vgt.pl \u2022 www.certyfikat.vgt.pl \u2022 https://www.vgt.pl/94.152.152.233/images/logo.png",
        "sipphone.com",
        "Dates back to a malicious ongoing Brian Sabey HallRender attacks using various malicious resources",
        "https://safebae.org/wp-content/plugins/addons-for-visual-composer/assets/js/slick.min.js?ver=2.9.2 \u2022 https://api.w.org/ \u2022 247.0.198.104.bc.googleusercontent.com",
        "remote.utorrent.com [remote router logins]",
        "http://www.happylifehappywife.com/2011/08/'> \u2022 http://www.happylifehappywife.com/2012/07/'>",
        "boostmobile.com",
        "http://yabs.yandex.uz/count/DbMMoEMwcAa508C2CI72BLq00000EEu2G0980c2y26W2SBYTbz06W06CXPm9Y06nyBJ1CP01mldXrZ6O0S3OwEyok06sjOF85S01NDW1uiI14E01zEhV3-W1Q9W2bk3S1A02jCW1s082y0AM-kpb2_W2aF62vgN6kDNb0O03iD_Kq0-80-cvf8mEc0EweogW0mIe0mQm0mIm106u1Fy1w0J-jHRu1D660uW5qOO3a0MGuWkW1PPtg0MeOx05g6Eu1VN-0i05bP0Lo0N0hmNW1GNm1G6O1eBGhFCEe0Q-eG6e1jW2oGPlwQdYVheAOD46Rn4LqN-w2c3P1W000C2z0000gGTjZOZwJYhCDx07W82ODD070k07XWhn1wbhSBFKCwp6W0WAq0Y0WeI1nP20Xe01u0YQP80A0S4A00000000y3_O2WBW2e29UlWAWBKOgWiGasxIrMsD000sz7Ltouq50DaBROs8-aug",
        "http://alohatube.xyz/search/tsara-brashears  http://alohatube.xyz/search/tsara-brashears/",
        "Alerts: dead_host nids_malware_alert network_icmp nolookup_communication",
        "External Apple Connection: Notepad.pw",
        "http://foundry2-lbl.dvr.dn2.n-helix.com/",
        "http://files.geoffreyobrian.com/uploads/1/3/2/8/132814305/3473236.pdf",
        "https://www.xvxx.me/search/tsara-brashears/",
        "https://otx.alienvault.com/indicator/ip/45.56.79.23 \u2022 batchcourtexpressservices.westlaw.com \u2022 courtexpress.westlaw.com",
        "Malware Hosting: deviceinbox.com \u2022 http://www.hakoonportal.net/240714d/240714_t2.exe \u2022103.246.145.111 \u2022 Spyware: stream.ntpserver.store",
        "Targeting Candace Owens",
        "https://www.milehighmedia.com/en/photo/milehighmedia/The-Mother-I-Cant-Resist/52380",
        "https://click.marketing.hallrender.com/?qs=9f3b0a760973d5628ba046a192f7fe432889bb96dc51578763a9cf11358dcde635e137184c12a031617f00faa9d172d8",
        "IDS Detections: ET TROJAN Possible Compromised Host AnubisNetworks Sinkhole",
        "work.a-poster.info",
        "18teen.net | teensnow.com | grannies-porn.net | pornmd.com",
        "https://thebrotherssabey.com/2015/08/24/why | https://thebrotherssabey.com/20 | https://thebrotherssabey.com | https://thebrotherssabey.com",
        "http://onlyindianporn2.com/videos/vichatter-young-11//title/0.7292669771257236",
        "https://www.milehighmedia.com/en/login/index/aHR0cHMlM0ElMkYlMkZtZW1iZXJzLm1pbGVoaWdobWVkaWEuY29tJTJGZW4lMkZ2aWRlb3MlMkZzd2VldGhlYXJ0dmlkZW8lM0ZhbHVwJTNEQURqeF9ITjhfd1oweU96UnpsU3NNNUZLaVVxSzBXNEN0X3NmTFpKTGVJc3M2b0RVUzkwVmp6VllNVko5eFpmdENYcFNKd3IzOTNaMG1mOEpXeVhVeVZpLTJZYVRsaGd3M25DSDRpYnRwZ25BRC1zUFhDQVUycjZJOXo2WWtRMzNVWVFhMFZyWC1YckxvcnRkVjJZdEgxSDYxZ1lhMTFNS3RZSkEzY3FlSXhFQzhtSlAzSk1tbloySURMQXlMZndPcHozSFFiTzF4T0FseXJIQ0xYem1ldFElMkE=\t \thttp://www.milehighmedia.com/?ats=eyJhIjoyOTYzMTgsImMiOjU3OTYzNz",
        "www-stage40.pornhub.com",
        "http://pixelrz.com/lists/keywords/tsara-brashears-assaulted-at-concentra/   http://pornohata.com/mov/tsara-brashears/",
        "https://bhive.nectar.social/rKvoMY",
        "IDS Signatures :  SUSPICIOUS Path to BusyBox\t192.168.122.52\t\u2022 77.66.206.206",
        "Yara Detections: RAT_Sakula ,  ScanBox_Malware_Generic ,  Nrv2x ,  UPX_OEP_place ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser ,",
        "http://www.happylifehappywife.com/2011/06/'> \u2022 http://www.happylifehappywife.com/2011/08/'",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication writes_to_stdout",
        "https://mypornvid.com/videos/27/x510fb2/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/caillou-finger",
        "https://hybrid-analysis.com/sample/8bf763ce9396c4569afbae58392097fd57408339c0ac59ec256468c9fd8ac4c5/6548ebfe56b25bab28017757",
        "sabey.com",
        "https://urlscan.io/result/2285cee3-1e08-4e63-b48f-ee685e008480/#summary",
        "https://www.hallrender.com/attorney/brian-sabey/Accept",
        "Resolves to a suspicious TLD - \t encore.scdn.co",
        "ttps://www.milehighmedia.com/scene/4404473/creampie-adventures-scene-2-sneaky-melanie",
        "'https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS password decryption| password unlocker]",
        "IDS Detection: Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound",
        "https://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-nearby.html. |",
        "www.sexpornimages.com http://hicksandchicks.org/ju/tsara-brashears/  hlebo.mobi  pornpx.com  www.potnhub.org",
        "riverside.rocks (safebae.com remote uTorrent) https://hybrid-analysis.com/sample/11108ef17bd75f36e0d22d95b1f3bde3e9fa968a78a24c2d2508f4238e22651d/6326a50be4a8a71b885f5bf3",
        "http://kompoz.me/find/tsara-brashears-submission-on-august-27-via-manual/  http://redpornvideos.net/tsara-brashears.html",
        "http://pixelrz.com/lists/keywords/tsara-brashears-jeffrey-reimer-porn/;0.48692189815948833",
        "Denver Police Department Major Crimes closed investigation",
        "www.go.datafoundry.com \u2022 http://207-207-25-209.fwd.datafoundry.com",
        "IDS Detections: Linksys E-Series Device RCE Attempt Outbound",
        "uk5seki2ygz3kyfgliqe37477miq6jsf.nlsexolehxry4opotgpq",
        "https://tulach.cc/ phishing \u2022 45.32.112.220 scanning_host \u2022 45.76.79.215",
        "Sexual and Physical Assaulter - Jeffrey Scott Reimer",
        "http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-medical.html",
        "and leave in a lemon- hued Huff da Country or a Snit with four on the MALWARE fOORILIES",
        "Sex Tools: m.pornsexer.xxx.3.1.adiosfil.roksit.net |",
        "safebae.org \u2022 rp.dudaran2.com \u2022 www.safebae.org \u2022 https://safebae.org/%20%5B \u2022 https://safebae.org/about/ \u2022 https://safebae.org/",
        "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F&",
        "tsara-brashears-deadspin-twitter-suspended-account-help.ht",
        "newrelic.se",
        "https://www.datafoundry.com/data-center-contamination-control/",
        "Alerts : nids_malware_alert network_icmp network_irc persistence_autorun network_http",
        "More than 1000 IoC\u2019s including pulses have been ILLEGALLY removed",
        "https://twitter.com/PORNO_SEXYBABES",
        "https://www.vgt.pl/font/roboto/Roboto-Bold.ttf  \u2022  https://www.vgt.pl/font/roboto/Roboto-Light.eot",
        "https://www.sweetheartvideo.com/en/model/Mona-Wales/49601 \u2022 https://www.sweetheartvideo.com/en/scene/Truth-Dare--Boobs/130432 No Expiration\t0\t  URL https://www.sweetheartvideo.com/it/model/Kristen-Scott/50432 \u2022 https://www.sweetheartvideo.com/model/63710/brandi-love",
        "https://otx.alienvault.com/pulse/68d0f099f60e98e6c4ffc1e5",
        "https://palantirwww.sweetheartvideo.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t3\t  domain\tpalantir.io\t\t\tMar 21, 2026, 2:06:10 PM\t\t34\t  URL\thttps://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/ \u2022 www.palantir.com",
        "IDS Detections: DNS Query to Expiro Related Domain (przvgke .biz)",
        "authsmtp.sabeydatacenters.com | go.sabey.com | thebrotherssabey.com | mx5.sabeydatacenters.com | posta.sabeydatacenters.com",
        "anybunny.tv | http://anybunny.tv/search/eva-lisa | http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us",
        "IDS Detections: Sinkhole Cookie Value Snkz 403 Forbidden TLS Handshake Failure",
        "http://onlyindianporn2.com/videos/tsara-brashears/",
        "http://www.bukaporn.net/trend/tsara-brashears/  http://onlyindianporn.tv/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concentra",
        "http://foundry2sdbl.dvr.dn2.n-helix.com/",
        "http://www.shopsleuth.com/goal-academy/the-citadel/colorado-springs-co",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-150x150.png",
        "All IoC\u2019s originate from sources named. There are some unknown attackers",
        "Christopher P. \u2018Buzz\u2019 Ahmann",
        "http://pixelrz.com/lists/keywords/tsara-brashears-massage-misconduct-misconception  http://pixelrz.com/lists/keywords/tsara-brashears-dead/  http://orangeporntube.net/tsara-brashears.html",
        "http://advocate-smyslova.ru/tsara-brashears/",
        "https://otx.alienvault.com/user/gameprofits.io",
        "IDS Detections: Possible DEEP PANDA C2 Activity Possible Deep Panda - Sakula/Mivast RAT CnC",
        "https://thebrotherssabey.com/2015/08/24/why  | https://thebrotherssabey.com/2016/03/12/how | https://thebrotherssabey.com/2017/04/17/truth",
        "onlyindianporn.tv | sexpornimages.com | http://www.sexpornimages.com/hillary/hillary-clinton",
        "https://thebrotherssabey.com/author/thebrotherssabey/ | https://thebrotherssabey.com/category/homosexuality",
        "https://safebae.org/wp-json/ \u2022 https://safebae.org/wp-content/plugins/embed-any-document/css/embed-public.min.css?ver=2.7.4",
        "https://www.vgt.pl/font/roboto/Roboto-Regular.ttf \u2022 https://www.vgt.pl/font/roboto/Roboto-Thin.eot",
        "http://hallrender.com/attorney/gregg-m-wallander/\u2022 http://hallrender.com/resources/ \u2022 http://hallrender.com/resources/blog/ \u2022 http://officemarketing.hallrender.com/ \u2022 http://urlmail.hallrender.com \u2022 http://urlwww.hallrender.com \u2022 http://webdocs.hallrender.com/",
        "google.pl | aplikacja.ceidg.gov.pl | imaginecup.pl | microsoft.pl",
        "http://web2.westlaw.com/find/default.wl?tf=-1&rs=WLW9.10&referencepositiontype=S&serialnum=1987042953&fn=_top&sv=Split&referenceposition=1555&pbc=D5845283&tc=-1&ordoc=1989026578&findtype=Y&db=708&vr=2.0&rp=/find/default.wl&mt=208",
        "www.metrobyt-mobile.com",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-266x266.png",
        "https://www.fidelity-account.com/ https://www.fidelity-account.com/ \u2022 http://fidelity-account.com/cgi-sys https://fidelity-account.com/fidelity/login.html \u2022 https://www.fidelity.com/ https://www.fidelity.com/branches/investor-center-denver-west-s-teller-colorado-80226 https://www.fidelity.com/ \u2022 www.fidelity.com https://bhive.nectar.social/rKvoMY https://booking.nmc.ae/en-ae/doctor/physician/abu-dhabi/sreehari-karunakaran-pillai :",
        "Treece Alfrey Musat P.C. Attorneys at Law Christopher P. Ahmann | https://TamLegal.com",
        "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
        "alohatube.xyz [BotNetwork]",
        "http://flexporn.net/tsara-brashears.html  http://onlyindianporn.net/videos/tsara-brashears/  http://pornbitter.com/storage/tsara-brashears/",
        "http://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concentra-medic",
        "http://appelfarm.org",
        "www.milehighmedia.com  \u2022 https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512",
        "https://www.fidelity.com/branches/investor-center-denver-west-s-teller-colorado-80226",
        "http://www.tryporn.net/seach/tsara-brashears/  hicksandchicks.org redpornvideos.net   http://advocate-smyslova.ru/tsara-brashears/",
        "hallrender.com \u2022 wwdancehall.com \u2022 hallplan.vm05.iveins.de\t \u2022 iveins.de \u2022 http://hallplan.vm05.iveins.de",
        "https://videolal.com/videos/tsara-brashears-dead-by-daylight.html | tsara-brashears-deadspin-twitter-suspended-account-help.ht",
        "Yara: Descriptive: Mirai_Botnet_Malware /dev/misc/watchdog \u2022 Mirai_2 /dev/watchdog",
        "https://kompoz.me/find/tsara-brashears-submission-on-august-27-via-manual/  sexiezpics.com",
        "autodiscover.webcompanion.com || avc-gft-dashboard.apple.com || cac1-wwfde-wave.apple.com || demo27.apple.com",
        "IDS Detections: HTTP traffic on port 443 (POST)",
        "Iframe src: https://www.youtube.com/embed/nuxT76ndwYY",
        "https://hallrender.com/attorney/gregg-m-wallander/",
        "www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process\t h",
        "Backdoor.Win32.Pushdo.s Checkin",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears/ hallrender.com/attorney/brian-sabey hallrender.com/attorney/b-sabey Christopher Ahmann https://hallrender.com/attorney/brian-sabey/anyxxxtube.net/search-porn/tsara-brashears https://www.anyxxxtube.net/search-porn/a-m-c-ate-xxx-videos/ pornokind.vgt.pl https://www.anyxxxtube.net/search-porn/ https://hallrender.com/attorney/brian-sabey/anyxxxtube.net/search-porn/tsara-brashears fidelity-account.com MC nosnoop.exe: a44812b44591121f3e711223db099043d4d72288e",
        "http://wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Language  http://www.music-forum.",
        "https://www.pornhub.com/video/search?search=tsara+brashears",
        "Updated | What\u2019s left after theft",
        "http://pdns1.datafoundry.com/ \u2022\thttp://rdweb.datafoundry.com \u2022 http://rdweb.datafoundry.com/",
        "Module Download TLS Handshake Failure Yara Detections SUSP_NET_NAME_ConfuserEx , EternalRocks_svchost ,  EternalRocks_UpdateInstaller ,  ProtectSharewareV11eCompservCMS Alerts dead_host network_icmp nolookup_communication modifies_proxy_wpad network_http protection_rx antivm_network_adapters pe_unknown_resource_name raises_exception IP\u2019s Contacted  152.199.4.184  208.111.179.129  3.131.2.",
        "iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com - Lockbit Black 3.0, Observed AridViper CnC Domain, Win.Trojan.Midia-4",
        "dns.trackgroup.net",
        "Tofsee: 'google.com' |  https://www.gov50.icu |",
        "https://twitter.com/PORNO_SEXYBABES \u2022 girlsdoporn.com",
        "https://safebae.org/",
        "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead \u2022 http://siteinlink.d1.cnbd.net/site/maps.google.com.lb/",
        "https://enter.private.com/track/MTIxODEuNjEuMi41MjEuMTAxMC4wLjAuMC4w/join",
        "http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html",
        "demo.auth.civicalg.com.sni.cloudflaressl.com",
        "http://orangeporntube.net/tsara-brashears.html",
        "Unix.Trojan.Mirai-6981169-0: FileHash - SHA256  fe00b364b6b8342e3ce0dd146902ac3330ab976e87aca6be666efde39ea485da",
        "http://palantirwww.sweetheartvideo.com/ (weirdness)",
        "https://www.vgt.pl/static/js/bootstrap-typeahead.jstic/js/bootstrap-typeahead.js",
        "http://hallrender.com/attorney/brian-sabey \u2022 http://hallrender.com/attorney/brian-sabey/",
        "http://nudeteenporn.site",
        "http://neurosky.jp/ \u2022  https://tulach.cc/ \u2022 blackrock.com \u2022 vanguard-account.com",
        "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead/",
        "http://hghltd.yandex.net/yandbtm?fmode=inject&url=http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
        "https://nl.toyota.be/tme [vehicle spyware, camera, data, speakers]",
        "https://thebrotherssabey.com/category/pregnancy | https://thebrotherssabey.com/category/homosexuality",
        "CVE FileHash-SHA256 7ca48970b1b9c076f6bd59c1b10e26c47e7acd954869510c1dcdf97dac9b8c2e",
        "https://cdn-cms-s-8-4.f-static.net/files/icons/socialNetworksBrands/telegram",
        "pornhub-e.com \u2022 www.pornhub.com \u2022",
        "nr-data.net",
        "cellebrite.com | https://cellebrite.com/en/federal-government/",
        "https://amp.mypornvid.fun/videos/8/AhxS-ej1myg/gf-18-com/\ud83c\udf81-i39m-your-present-\ud83c\udf81-girlfriend-surprises-you-for-christmas-reunion-soft-kisses-amp-cuddles",
        "https://house.mo.gov/ \u2022 house.mo.gov \u2022 mo.gov",
        "https://browntubeporn.com/tsara-brashearsAccept-Language",
        "go.sabey.com",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing",
        "tsara-brashears-deadspin-twitter-suspended-account-help.ht  videolal.com  wallpapers-nature.com   www.sweetheartvideo.com",
        "Quasi Government Case",
        "click.marketing.hallrender.com \u2022 hallrender.com \u2022 autodiscover.hallrender.com",
        "http://hallrender.com/attorney/bsabey \u2022 http://hallrender.com/attorney/gregg-m-wallander",
        "Server: JFE https://otx.alienvault.com/otxapi/indicators/url/screenshot/http://www.yixun.com/getkey",
        "8-25-220-162-static.reverse.queryfoundry.net\t\t\tNov 1, 2025, 9:34:14 AM\t\t5\t  domain\tqueryfoundry.net\t\t\tNov 1, 2025, 9:34:14 AM\t\t8\t  URL\thttp://117-114-251-162-static.reverse.queryfoundry.net/",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-406x406.png [offered Brashears settlement that month]",
        "Alerts: raises_exception IP\u2019s Contacted:  152.199.4.184  208.111.179.129  3.131.2.",
        "https://info.sabeydatacenters.com/r/404532/1/1523680312/open/1 | http://onlyindianporn2.com/videos/dia-sabey/?p=13",
        "free NSFW experience offered by Dopple AI.MALWARE",
        "https://cdn-cms-s-8-4.f-static.net/files/icons/socialNetworksBrands/telegram-icon.png",
        "http://www.happylifehappywife.com/2010/04/'> \u2022 http://www.happylifehappywife.com/2010/05/'>",
        "Malware Hosting: http://81.5.88.13/dbreader.exe \u2022 http://utasoft.ru/catalog/view/javascript/jquery/ui/jquery-ui-1.8.16.custom.min.js",
        "https://matrix.pornhub.dev",
        "The Brothers Sabey \u2013 Conservatives with Liberal Friends \u2022 https://thebrotherssabey.com/",
        "http://videolal.com/tsara-brashears-dead.html",
        "https://steam.exacg.cc/ \u2022  http://tesgm.ru/_ld/5/584_steam_apidll_Th.rar",
        "http://www.mof.gov.cn.lxcvc.com/ \u2022 https://r//www.csrc.gov.cn.lxcvc.com/",
        "happyrabbit.kr [Apple iOS threat]",
        "http://www.gdsl-pallemoebler.info/seach/tsara-brashears/",
        "IDS Detections: Backdoor.Win32.Pushdo.s Checkin Possible Compromised Host AnubisNetworks",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/  Domain mom2fuck.mobi   https://youjizz.sex/tsara-brashears.html   https://youjizz.sex",
        "https://pornokind.vgt.pl \u2022 https://sip.vgt.pl \u2022 https://smtp-qa.vgt.pl \u2022 https://www.vgt.pl/94.152.156.22/logo.png",
        "https://pks.wroclaw.sa.gov.pl:1443/ \u2022 portal.bialystok.sa.gov.pl",
        "CVE-2023-4966",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears-denies-jeffrey-scott-reimer-sex",
        "http://sabey.com/construction/ | https://tulach.cc/ | sabeydatacenters.com | https://thebrotherssabey.com | http://root.sabeydatacenters.com/ No Expiration\t0\t  URL http://server1.sabeydatacenters.com No Expiration\t0\t  URL http://smtp1.sabeydatacenters.com No Expiration\t http://smtps.sabeydatacenters.com | http://smtpseguro.sabeydatacenters.com | http://staging.sabeydatacenters.com",
        "IDS Detections : SUSPICIOUS Path to BusyBox root login TELNET login failed",
        "http://www.happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg",
        "http://www.xvxx.me/clips/nadia-ali-hardcore/199530/",
        "https://tulach.cc/ | Brian Sabey",
        "https://appletoncdn.xyz/l/26422915e0d4f6f88646?sub=5eafeec1af7c0a0001960f44&source=81 \u2022 appletoncdn.xyz",
        "https://www.dirtsearch.org/data/TSARA/BRASHEARS/",
        "Christopher P \u2018Buzz\u2019 Ahmann",
        "IDS Detection: Observed Suspicious UA (Hello-World) Suspicious Activity potential UPnProxy",
        "ETERNALROCKS Detections: Win32:EternalRocks-B\\ [Trj] ,  Win.Trojan.EternalRocks1-6319293-0 ,",
        "9.6.zip - SQLi",
        "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/icons/apple-touch-icon-76x76.png",
        "IDS: Beacon 5 Sakula/Mivast C2 Activity HTTP traffic on port 443 (POST)",
        "http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer/",
        "https://myhotzpic.com/tsara-brashears-hardcore-lesbian-sex/anime-studio.org*thumbs-fa...",
        "http://link.mcsa.org/api/LinkHandler/getaction?redirectParam2=K09weU5vMDBKWW90Wk1hcHl4SmF4NGtHbnBGbjJaVElud2tpMlBaUGhseXZNM0JLaHRaUnJZOVh1bmMvSVhYWDZhb0UwY2hPaGVuSGNDRUFYeHNzWWFQL0dBNVlRVmlTSGpXa016bUQzWUZ6cVZRcktRTmRyZHJPYlBrY1NpSyt6ZzBrS0FjWk9EYSs4WmdOc2RBU09CR1RjWVNiTUZpYkhNV1lvNzkwbzhLMUxDUzQzS0FaVU5LYTZWSUZoS1Vt",
        "prosperhall.edsby.com \u2022 http://urlmail.hallrender.com \u2022 http://urlwww.hallrender.com \u2022 http://webdocs.hallrender.com",
        "IDS Detections: Andariel Backdoor Activity (Checkin)",
        "IDS Detections : Mirai Variant Spreading",
        "hallrender.com \u2022 government.westlaw.com \u2022 http://dev.hallrender.com/ \u2022 https://mercy.hallrender.com/ \u2022 autodiscover.hallrender.com",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing/ links to Brashears browser Google.com.uy/clk malicious, links  for collection",
        "nr-data.net [Apple Private Data Collection]",
        "Tracking: http://www.trackip.net/ip \u2022 gfx.ms \u2022 dssruletracker.mo.gov [network] \u2022 earlyconnections.mo.gov \u2022 www77.trackerspy.com \u2022 ww38.track.updatevideos.com",
        "https://wallpapers-nature.com/  https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "IDS:  Possible HTTP 403 XSS Attempt (Local Source) Possible Deep Panda - Sakula/Mivast RAT CnC (208.91.197.27)",
        "https://www.milehighmedia.com/model/59136/avi-love \u2022https://www.milehighmedia.com/model/60418/Justin-Hunt \u2022",
        "https://www.sweetheartvideo.com/model/63710/brandi-love",
        "https://urlscan.io/screenshots/e931bb02-80dc-46db-92f0-43d5afa258be.png",
        "IP Address 94.152.58.192 Location  Poland ASN AS29522 h88 s.a. Nameservers ns1.kei.pl. ,  ns2.kei.pl.",
        "Reimer was a PT. Unknown whereabouts , name or job description",
        "https://www.vgt.pl/style/style.css \u2022 https://www.vgt.pl/static/js/bootstrap-typeahead.js",
        "root.sabeydatacenters.com | server1.sabeydatacenters.com | smtps.sabeydatacenters.com | smtpseguro.sabeydatacenters.com",
        "amail.linuxmint.com | api1-live.linuxmint.com | Hostname apipackages.linuxmint.com | apollo-extra.linuxmint.com | apps.linuxmint.com | arc.linuxmint.com | archive.linuxmint.com | betaforums1.linuxmint.com Hostname blogs.linuxmint.com",
        "https://thebrotherssabey.com/2018/12/05/nature | https://thebrotherssabey.com/2017/04/17/truth",
        "https://thebrotherssabey.com/feed/ | https://thebrotherssabey.com/discourse | https://thebrotherssabey.com/comments/feed/",
        "Now https://urlscan.io/liveshot/?width=1600&height=1200&url=http%3A%2F%2Fwww.neurotoxininstitute.com%2Findex.php%3Foption%5C%3Dcom_content%26view%5C%3Darticle%26id%5C%3D70%26Itemid%5C%3D14",
        "https://twitter.com/ootiosum/status/1812208222150726029a4dmHAxV0M0QIHawADl4Qr4kDegUI-QEQAA&usg=AOvVaw37yALadqlgoR9_xlQ5B4Hm",
        "facebooksunglassshop.com",
        "www.pornhubselect.com | pornhub.software",
        "deadlyexploits.com | deadlysymbol.com |",
        "https://mom2fuck.mobi/tsara-brashears.html",
        "https://hybrid-analysis.com/sample/86479bf7c9a675913b93a0d399f5cbe0c0e8003239e93ae5e00f97cdbc5ec5ba/5c5c13577ca3e12626364777",
        "http://bpdb.portal.gov.bd:3128/sites/default/files/files/bpdb.portal.gov.bd/npfblock/2021-34bc869d2906198362a4346373ce5b94.jpg",
        "brian-sabey-anyxxxtube.net \u2022 hallrender.com",
        "Denver Police let this attempted murder walk. Cited him as a ghost driver",
        "This is a serious crime. I\u2019m certain God WILL pay them.",
        "s3.amazonaws.com [ metro T-Mobile spyware porn]",
        "https://urlscan.io/screenshots/32b0614f-1148-49ea-aed4-4f23afd33e56.png",
        "Worm:Win32/Benjamin IDS Detections: Win32.Worm.Benjamin.A CnC Checkin ICMP",
        "www.anyxxxtube.net | sv2.mypornvid.fun | www.porn100.tv | www.redporn.video | https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing |",
        "http://www.fidelity-account.com/ https://fidelity-account.com/fidelity/code.html \u2022",
        "http://www.hallrender.com/attorney/brian-sabey-anyxxxtube.net/search-porn/tsara-brashears",
        "www.palantir.com \u2022   palantir.io \u2022 http://datafoundry.com/",
        "Global Airline Threat - though targeting seems to be involved",
        "IDS Detections: DNS Query to Expiro Related Domain (knjghuig .biz) Known Sinkhole Response Header Win32/Expiro CnC Activity (POST) Win32/Expiro.NDO CnC Activity Observed DNS Query to .biz TLD Namecheap URL Forward 403 Forbidden",
        "IDS Detections: WGET Command Specifying Output in HTTP Headers",
        "https://thebrotherssabey.com/category/pregnancy | https://thebrotherssabey.com/discourse | onlyindianporn2.com",
        "https://otx.alienvault.com/pulse/68d12dd7e357755235f007e8",
        "feastfoundry.com\t\u2022 https://www.feastfoundry.com/ \u2022 https://www.feastfoundry.com/mini-apple-pies/",
        "fidelity-account.com e http://fidelity-account.com/fidelity/code.html",
        "http://browntubeporn.com/tsara-brashears.html  browntubeporn.com  http://pornvideoj.com/tsara-brashears.htm",
        "https://thebrotherssabey.com | https://thebrotherssabey.com/2015/08/24/why | staging.sabeydatacenters.com |",
        "Makes zero sense. Malicious. I don\u2019t get it. I have a Malware gift for you too!",
        "web2.westlaw.com    (redirects to thbrzzrstr.me)",
        "https://www.fireeye.com/",
        "https://www.fidelity.com/ www.fidelity.com https://www.fidelity.com/ \u2022 www.fidelity.com",
        "\"CIA\" most commonly refers to the Central Intelligence Agency, a premier U.S. government agency responsible for gathering and analyzing foreign intelligence.",
        "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/icons/apple-touch-icon.png",
        "http://onlyindianporn.tv/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concent | http://wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Languauge",
        "pornhub.com/gay/video/search?search=tsara%2Blynn%2Bbrashears%2Blesbian",
        "https://rr2---sn-4g5ednsz.googlevideo.com/videoplayback?expire=1699319292&ei=nDlJZfb4G43E-gaYt5XoDg&ip=2001%3A1b60%3A2%3A240%3A3247%3A%3A",
        "http://datafoundry.com \u2022 http://foundry2sdbl.dvr.dn2.n-helix.com \u2022 https://209-99-40-223.fwd.datafoundry.com \u2022 datafoundry.com \u2022 209-99-40-223.fwd.datafoundry.com \u2022 beabetta.ifoundry.co.uk.s7b2.psmtp.com \u2022 foundry2sdbl.dvr.dn2.n-helix.com \u2022 fwd.datafoundry.com \u2022 207-207-25-154.fwd.datafoundry.com \u2022 207-207-25-156.fwd.datafoundry.com\t\t\t207-207-25-160.fwd.datafoundry.com \u2022 207-207-25-163.fwd.datafoundry.com  \u2022\t207-207-25-164.fwd.datafoundry.com \u2022 207-207-25-165.fwd.datafoundry.com\t\t\tMar 21, 207-207-25-166.fwd",
        "https://elite.hallrender.com \u2022  https://hallrender.com/attorney/gregg-m-wallander/",
        "http://www.yixun.com/getkey {\"privateKey\": \"JMVRar4COFWb3eKZ\"}",
        "https://www.sweetheartvideo.com/tsara-brashears/ \u2022 www.sweetheartvideo.com",
        "Delphi This program must be run under Win32 Compilers",
        "IDS Detections: Win32/Tofsee.AX google.com connectivity check Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set",
        "IDS Detections: Cookie Value btst ET INFO Namecheap URL Forward",
        "https://tamlegal.com/attorneys/christopher-p-ahmann/",
        "http://hallrender.com/attorney/brian-sabey | www-temp.metrobyt-mobile.com",
        "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead   \u2022 https://videolal.com/videos/tsara-brashears-dead-by-daylight.html",
        "http://pornbitter.com/storage/tsara-brashears/  http://www.gdsl-pallemoebler.info/seach/tsara-brashears/ advocate-smyslova.ru",
        "Ronda Cordova",
        "https://cdn-cms-s.f-static.net/files/icons/socialNetworksBrands/telegram-icon.png?v=r82934",
        "Alerts: procmem_yara injection_inter_process creates_largekey network_bind persistence_autorun antivm_generic_disk",
        "https://hallrender.com/attorney/brian-sabey | https://thebrotherssabey.com/2019/01/20/miracle/?share=twitter",
        "remote.files.downloadnow-1.com | remote.sabeydatacenters.com | poczta.sabeydatacenters.com | pop.sabeydatacenters.com",
        "appleid-comloginaccount.info",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-406x406.png \u2022 https://vcards.hallrender.com/",
        "https://elite.hallrender.com/TE_3E_PROD/web/ui/dashboard/ActionList_CCC",
        "http://go.sabey.com http://vpn2.sabey.com | http://resources.sabeydatacenters.com | http://root.sabeydatacenters.com |",
        "MC nosnoop.exe: a44812b44591121f3e711223db099043d4d72288e4f436dba2fb935b6d888d40.ex",
        "https://hallrender.com/attorney/brian-sabey/ \u2022 https://hallrender.com/resources/",
        "https://wallpapers-nature.com/tsara-brashears/urlscan-io   https://www.sweetheartvideo.com/tsara-brashears",
        "iimcb.gov.pl",
        "EternalRocks_svchost ,  EternalRocks_UpdateInstaller ,  ProtectSharewareV11eCompservCMS",
        "Domains Contacted api.nuget.org",
        "MC nosnoop.exe: a44812b44591121f3e711223db099043d4d72288e4f436dba2fb935b6d888d40.exe",
        "mypornvid.fun | porn100.tv | amp.mypornvid.fun | cdn10.mypornvid.fun | cdn11.mypornvid.fun | cdn5.mypornvid.fun | cdn8.mypornvid.fun",
        "forceusercontent.com | sabey.com | tulach.cc | http://thebrotherssabey.com/2018m.sabeydatacenters.com | https://www.vpn.sabey.com/",
        "http://watchhers.net/index.php",
        "Iframe src: https://www.youtube.com/embed/SEBW2mh1jvY",
        "https://www.vgt.pl/font/roboto/Roboto-Medium.ttf",
        "Melvin Sabey",
        "http://www.bukaporn.net/trend/tsara-brashears/ No Expiration\t41\t  URL http://www.gdsl-pallemoebler.info/seach/tsara-brashears/",
        "Alerts: resumethread_remote_process network_connection_via_suspicious_process network_cnc_http",
        "http://pixelrz.com/lists/keywords/tsara-brashears-dead/360 \u2022 http://pixelrz.com/lists/keywords/tsara-brashears-dead/360] No Expiration\t4\t  Domain tsara-brashears-deadspin-twitter-suspended-account-help.ht",
        "http://www.crazyfrost.com/wp-content/uploads/2011/01/%D0%BA%D0%BE%D0%BB%D0%BB%D0%B0%D0%B68.jpg\t URL",
        "IDS Signatures : root login 175.203.174.23 \u2022 192.168.122.52",
        "IDS Detections: Python Requests Suspicious User Agent",
        "https://otx.alienvault.com/indicator/url/https://miles-andmore.duckdns.org/ihFKGyel4wizIPNVvHHQQIuHfl4hEb2F6gWEXupmNDuiMJgJtshSlLFmilf3zCT2EF/index.html",
        "helloprismatic.com",
        "dev.hallrender.com \u2022 elite.hallrender.com \u2022 image.marketing.hallrender.com",
        "http://pornpx.com/trends/tsara-brashears-submission-on-august-27-via-manual/1/ http://www.potnhub.org/tsara-brashears.html",
        "takedown-communication-api.prod-c15a-awsuse.ppops.net",
        "https://www.vgt.pl/font/roboto/Roboto-Light.ttf  \u2022",
        "nr-data.net \u2022 applemusic-spotlight.myunidays.com \u2022  init.ess.apple.com \u2022 tv.apple.com",
        "http://www.sexpornimages.com/tsara/tsara-lynn-brashears-porn/7x56y.html No Expiration\t41\t  URL http://www.sweetheartvideo.com/tsara-brashears No Expiration\t81\t  URL http://www.tryporn.net/seach/tsara-brashears/ No Expiration\t41\t  URL http://www.tryporno.net/movies/tsara-brashears/ No Expiration\t42\t  URL https://alohatube.xyz/search/tsara-brashears No Expiration\t211\t  URL https://alohatube.xyz/search/tsara-brashears+ No Expiration\t51\t  URL https://browntubeporn.com/tsara-brashearsAccept-Language No Expiratio",
        "https://booking.nmc.ae/en-ae/doctor/physician/abu-dhabi/sreehari-karunakaran-pillai:",
        "Alerts: networki_http protectionk_rx antivm_network_adapters pe_unknown_resource_name",
        "http://www.hallrender.com/attorney/brian-sabey/anyxxxtube.net/search-porn/tsara-brashears",
        "http://vtwctr.org/explore/tsara- brashears-defeats-jeffrey-reimer/",
        "https://www.sweetheartvideo.com/tsara-brashear",
        "http://videolal.com/tsara-brashears-pueblo.html , http://videolal.com/tsara-brashears.html",
        "http://foundry2-lbl.dvr.dn2.n-helix.com \u2022 https://foundry2-lbl.dvr.dn2.n-helix.com",
        "https://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara%20-brashears-massage-nearby.html",
        "https://xlxx.mobi phishing\thttps://2beeg.me   https://2beeg.net  https://www.redporn.video   https://youjizz.sex  2beeg.me xlxx.mobi ladys.one",
        "http://wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Languauge phishing",
        "demos.palantirfoundry.com",
        "0.0.iphone.8dyf8rf5k3.fr.mobiletrend.rtl2.adsenseformobileapps.com",
        "image.marketing.hallrender.com \u2022  https://hallrender.com/resources \u2022",
        "Unknown Persons impersonating Private Investigators (plural)",
        "https://webmail.police.govmm.org/owa/",
        "Malware Host: HallRender.com",
        "https://tamlegal.com/attorneys/christopher-p-ahmann/#breadcrumb \u2022 https://www.milehighmedia.com/en/movies",
        "www.hallrender.com",
        "https://www.vgt.pl/font/fa/fontawesome-webfont.eot",
        "http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us  www.tryporn.net",
        "https://www.sweetheartvideo.com/tsara-brashearsAccept-Language | https://wallpapers-nature.com/tsara-brashears/urlscan-io",
        "iimcb.e-kei.pl",
        "207-207-25-170.fwd.datafoundry.com \u2022 207-207-25-171.fwd.datafoundry.com \u2022 207-207-25-201.fwd.datafoundry.com",
        "Malicious Antivirus Detections #VirTool:Win32/Obfuscator.ADB",
        "Some may may find this content is very disturbing and offensive",
        "http://shared-work.com/fidelity2/login.html \u2022  https://fidelity-account.com/fidelity/otp.html",
        "storage.ladys.one ladys.one: | http://photos.ladys.one ladys.one: | http://porno.ladys.one ladys.one: | http://storage.ladys.one ladys.one: | http://xxx-videos.ladys.one ladys.one:",
        "http://web2.westlaw.com/ (redirect) https://signon.thomsonreuters.com/?productid=CBT&lr=0&culture=en-US&returnto=https%3a%2f%2f1.next.westlaw.com%...",
        "https://mypornvid.fun/videos/3/o00vnGgcVx0/dude-sex-fuck-a-deer-wapporn-video-com/fuck-deer",
        "https://207-207-25-209.fwd.datafoundry.com \u2022 https://209-99-40-224.fwd.datafoundry.com/",
        "remotewd.com device local",
        "http://pornstarsporno.net/tsara-brashears.html  http://vtwctr.org/explore/inmate-tsara-brashears/",
        "http://elite.hallrender.com/TE_3E_PROD/web/ui/dashboard/ActionList_CCC",
        "https://britneyspears.com/",
        "1a8fc49a4265fe146976/1523680312 |  https://thebrotherssabey.com/2018/04/22/the  |  https://thebrotherssabey.com/2019/07/08/suffering",
        "* https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
        "http://vortex-nlb-http2-fed-us-taut-purple.nr-data.net/",
        "OTX description for Dopple AI -  There\u2019s someone for everyone out there in the BDSM scene, you can enjoy the",
        "http://www.bukaporn.net/trend/tsara-brashears/",
        "https://hallrender.com/attorney/brian-sabey/Accept \u2022 https://hallrender.com/wp-content/uploads/vcards/",
        "http://2fwww.hallrender.com/ \u2022  http://citrix.hallrender.com/ \u2022 http://dev.hallrender.com/  http://hallrender.com/attorney/brian-sabey/ No Expiration\t0\t  URL http://hallrender.com/resource-blog No Expiration\t0\t  URL http://hallrender.com/resources No Expiration\t0\t  URL http://mail.hallrender.com/ No Expiration\t0\t  URL http://www.hallrender.com/attorney/brian-sabey",
        "http://www.mohurd.gov.cn.lxcvc.com/",
        "http://www.sexpornimages.com/tsara/tsara-lynn-brashears-porn/7x56y.html",
        "Alerts: persistence_autorun_tasks spawns_dev_util cape_detected_threat injection_process_hollowing",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears",
        "http://itsupport.sabey.com http://www.sabey.com | http://root.sabeydatacenters.com/ | http://server1.sabeydatacenters.com | http://smtp1.sabeydatacenters.com No Expiration\t http://smtps.sabeydatacenters.com | http://smtpseguro.sabeydatacenters.com",
        "https://www.milehighmedia.com/en/movies \u2022  https://www.milehighmedia.com/join",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-48x48.png \u2022 http://2fwww.hallrender.com/",
        "https://thebrotherssabey.com/2018/12/05/nature-of-scripture-part-5-conclusions/ | https://thebrotherssabey.com/2019/08/01/why",
        "https://thebrotherssabey.com/2016/03/12/how | https://thebrotherssabey.com/2016/01/18/ballroom",
        "Alerts: suspicious_iocontrol_codes network_bind ransomware_file_modifications stealth_file",
        "https://citrix.hallrender.com/vpn/install/ \u2022  https://citrix.hallrender.com/vpn/install/mac.htm \u2022 https://www.hallrender.com/attorney/brian-sabey/Accept",
        "hanmail.net",
        "safebae.org",
        "Alerts: network_http packer_unknown_pe_section_name dropper",
        "IDS Detections: D-Link Devices Home Network Administration Protocol Command Execution",
        "NSO Group - Pegasus: enterprise.cellebrite.com \u2022 cellebrite.com \u2022 erp002.blackbagtech.com \u2022 140.108.21.184",
        "I bring up the personal nature of the crime because a delete service has been used",
        "http://staging.sabeydatacenters.com | https://sabey.com/careers/ | https://vpn2.sabey.com | https://www.sabey.com | https://www.vpn.sabey.com |",
        "http://tvm77.fashiongup.in/tracking/track-open",
        "https://tulach.cc/ | tulach.cc |",
        "scripting-sandbox-dns.bunny.net",
        "Alerts :  nids_alert allocates_rwx creates_exe packer_entropy antivm_memory_available",
        "http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
        "https://tulach.cc/ || tulach.cc || www-temp.metrobyt-mobile.com",
        "https://www.poemhunter.com/tsara-brashears/poems/: https://urlscan.io/result/4f0cabbf-9716-47dd-bd5c-038a953e6672/",
        "apple-reactivate.com | appleweb-aem.apple.com | apple.com | revoked-aprtr1-tr1g1.apple.com | network-framework.apple.com",
        "feestzalenvanvlaanderen.be  www.gdsl-pallemoebler.info  http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us",
        "IDS: FormBook CnC Checkin (POST) Terse HTTP 1.0 Request Possible Nivdort Beacon 5 Possible DEEP PANDA C2 Activity (208.91.197.27)",
        "https://cg864.myhotzpic.com phishing \u2022 http://dashboard.myhotzpic.com/",
        "https://thebrotherssabey.wordpress.com/wp-admin/customize.php?url=https://thebrotherssabey.wordpress.com/",
        "https://urlscan.io/domain/cdn2e-videos2.yjcontentdelivery.com | http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html",
        "https://www.sweetheartvideo.com/tsara-brashears/ | https://www.sweetheartvideo.com/tsara-brashearsAccept-Language",
        "IDS Signatures :TELNET login failed\t77.66.206.206 \u2022 192.168.122.52",
        "https://www.milehighmedia.com/de/MileHighMedia/scene/129689?utm_source=271174&utm_medium=affiliate&utm_campaign=",
        "https://www.vgt.pl/94.152.152.233/images/logo.png",
        "http://www.tryporno.net/movies/tsara-brashears/  http://www.pixelrz.com/lists/keywords/tsara-brashears/",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [Twitter porno]",
        "https://www.hallrender.com/attorney/brian-sabey/Accept [Weird - defended Jeffrey Scott Reimer Tsara Brashears alleged assaulter[",
        "207-207-25-209.fwd.datafoundry.com \u2022\t207-207-25-212.fwd.datafoundry.com \u2022 207-207-25-213.fwd.datafoundry.com \u2022 209-99-64-53.fwd.datafoundry.com",
        "http://www.music-forum.org/www-cixiu888-com-tsara-brashears.html",
        "https://thebrotherssabey.com/2016/01/18/ballroom | resources.sabeydatacenters.com | https://thebrotherssabey.com/feed/",
        "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead/. http://www.music-forum.org/www-cixiu888-com-tsara-brashears.html",
        "https://info.sabeydatacenters.com/emailPreference/epc/404532/EcSDdxFsTp4vgdAzwbcD5rWn7oROwp5s8Buq0L48dF0/732bdcab2311714bb73d4d507e6508d215afb4dbc511",
        "Malicious revenge malvertizing: https://www.milehighmedia.com/legal/2257",
        "L\u00b0\u00b0k @ You, okay Chris\u2026abgubdf.apple.cloudns.biz \u2022 cloudns.biz \u2022 https://abgubdf.apple.cloudns",
        "114.114.114.114",
        "www.wwwgitlab.gitlab.git.git.gitlab.git.128-199-7-137.cprapid.com",
        "https://info.sabeydatacenters.com/listUnsubscribeHeader/u/404532/732bdcab2311714bb73d4d507e6508d215afb4dbc5111a8fc49a4265fe14697",
        "government.westlaw.com \u2022 hero9780.duckdns.org \u2022 hallrender.com \u2022 miles-andmore.duckdns.org",
        "Alerts: antivm_generic_disk anomalous_deletefile antisandbox_sleep dynamic_function_loading",
        "https://www.hallrender.com/wp-content/uploads/2016/02/Denver-150x150.jpg",
        "Pornhub dev VT community: https://www.virustotal.com/gui/domain/pornhub.dev/community",
        "http://thebrotherssabey.com/2018 | https://thebrotherssabey.com/2019/01/20/miracle/ | https://thebrotherssabey.com/2019/07/08/suffering",
        "/hcp/ruxitagentjs_ICA7NVfqrux_10321250808084810.js",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ||  pin.it || https://pin.it/",
        "https://www.datafoundry.com/category/news/press-releases/",
        "http://images.startappservice.com/image/fetch/f_auto \u2022 track.smtpsendemail.com \u2022 nr-data.net [apple] \u2022 lg.as35280.net \u2022 leaseway.damstracking.com",
        "https://www.neurotoxininstitute.com/",
        "Rallypoint.com https://hybrid-analysis.com/sample/66287c2c36699037cb504201693e26b5f3282cebde1d1c78aecd6f97f04fb694",
        "https://thebrotherssabey.com/2019/01/20/miracle/?share=twitter | https://thebrotherssabey.com/author/dbsabey/",
        "Hallrender.com and Westlaw.com.= http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu",
        "https://hallrender.com/resources/blog/ \u2022 https://www.hallrender.com/attorn",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [Apple/ iOS unlocker password decryption]",
        "FileHash - SHA256  f32f6b229913d68daad937cc72a57aa45291a9d623109ed48938815aa7b6005c",
        "http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-sexual-misconduct-miscinception.html",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "hallrender.com \u2022  https://hallrender.com/resources/blog/ \u2022 https://urlmail.hallrender.com \u2022 https://urlwww.hallrender.com",
        "http://www.gdsl-pallemoebler.info/seach/tsara-brashears/ advocate-smyslova.ru  feestzalenvanvlaanderen.be www.gdsl-pallemoebler.info",
        "autodiscover.hallrender.com \u2022 hallrender.com \u2022 https://www.hallrender.com/wp-json/oembed",
        "https://alohatube.xyz/search/tsara-brashearsL",
        "MD refused to disclose medication cocktail he was injecting into patient. Patient suffered long term  harm.",
        "Iframe src: https://www.youtube.com/embed/o8_jPaXfxWY",
        "dns.msftncsi.com",
        "Alerts dead_host network_icmp nolookup_communication modifies_proxy_wpad",
        "https://otx.alienvault.com/pulse/68b5e672f492fdc96cf997aa",
        "https://www.vgt.pl/ phishing \u2022 https://vgt.pl/ \u2022www.vgt.pl \u2022 https://www.vgt.pl/94.152.152.233/images/logo.png",
        "https://www.vgt.pl/font/roboto/Roboto-Thin.ttf \u2022 https://www.vgt.pl/static/js/bootstrap-typeahead.js",
        "http://southwestphysiatry.com/",
        "http://siteinlink.d1.cnbd.net/site/maps.google.com.lb/ | https://www.applefilmaker.com | https://www.applefilmaker.com/1odbU3D",
        "http://sexiezpics.com/tsara-brashears-hardcore-porn | https://www.sweetheartvideo.com/tsara-brashearsAccept-Language",
        "Yara Detections: is__elf ,  DemonBot",
        "https://tracking.s-unlock.com \u2022 https://ignaciob.com/track/click/v2-318692303 \u2022 adepttracker.com \u2022",
        "Hostname aninditaannisa.blogspot.com No Expiration\t0\t  URL aninditaannisa.blogspot.com/2019/02/tsara-brashears-porn.html  billpay.stcu.org",
        "https://your-sugar-girls.com/cams/default/adult/5277/index.html?p1=https://bongacams10.com/track?c=621661&subid=1a1d33f51a7179480c6d4aeb40d3a5a1&subid2=16969639",
        "vgt.pl \u2022 www.hak.vgt.pl \u2022 www.localhost.vgt.pl \u2022 www.certyfikat.vgt.pl \u2022 aristocrat.vgt.pl",
        "www.podcast.hallrender.com  \u2022 https://hallrender.com/resource-blog \u2022",
        "Yara: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX",
        "Investigation closed when Brian Sabey initiated a malicious prosecution case against Victim",
        "https://www.sweetheartvideo.com/en/dvds \u2022 https://www.sweetheartvideo.com/en/login",
        "OTX must have an issue. A delete app seen before has deleted a majority of malicious IoCs. Im",
        "http://www.milehighmedia.com/?ats=eyJhIjoyOTYzMTgsImMiOjU3OTYzNzc1LCJuIjo3NiwicyI6NT...",
        "https://hallrender.com/attorney/brian-sabey/anyxxxtube.net/search-porn/tsara-brashears",
        "https://thebrotherssabey.com/comments/feed/ | https://thebrotherssabey.com/2019/01/20/miracle/",
        "http://appleid.app",
        "http://videolal.com/tsara-brashears-dead-or-alive-song-rap.html | http://videolal.com/tsara-brashears-dead.html |",
        "ConventionEngine_Term_Users",
        "partnerapi.spotify.net \u2022 youtube.ru",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "Observed DNS Query to .biz TLD Namecheap URL Forward GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 403 Forbidden",
        "More IP\u2019s Contacted  74.6.143.26 Domains Contacted benjamin.xww.de",
        "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu    (phishing | cybercrime)",
        "http://onlyindianporn2.com/videos/tsara-brashears/   onlyindianporn2.com-porn.html   aninditaannisa.blogspot.com   porno-trash.net",
        "Craziest thing ever! Hall Render \u2018alleged\u2019 Law Firm was paying Tara Brasheats insurance?!",
        "iimcb.e.gov.pl",
        "https://www.milehighmedia.com/join \u2022 https://www.milehighmedia.com/models \u2022 https://www.milehighmedia.com/movies",
        "https://www.google.com/search?client=ms-android-tcl-rvo2b&sca_esv=677ff2260c38da6a&sca_upv=1&q=tsara%20brashears&tbm=vid&source=lnms&fbs=AEQNm0Aa4sjWe7Rqy32pFwRj0UkWd8nbOJfsBGGB5IQQO6L3J5MIFhvnvU242yFxzEEp3BfRFWcyM5BvpTgNzM3vKj4sz-C2iLdc_0v0iAkScdtYjVPIGyVlvwujMCY6xcQ3LIupWIQPyPPfztGwIqpQ9H2EXqXXY4GBGq8hpekXoFuduDqktZzSriMQxAlKPjQviXaDVnUYcgWw9ejzcyECyIGanCUinw&sa=X&biw=1128&bih=1971&dpr=2&no_sw_cr=1&zx=1724209326040&sssc=1",
        "https://youjizz.sex/tsara-brashears.html",
        "cia.gov FileHash-SHA256 3b55307785bdd903bc9183642bdfd8b5a8ee15b90a05b25acbcd477432d26d99",
        "https://www.milehighmedia.com/legal/2257 \u2022 https://www.milehighmedia",
        "http://www.happylifehappywife.com/2013/03/'> \u2022 http://www.happylifehappywife.com/index.php",
        "Delphi Likely Precursor to Scan PING Delphi-Piette Windows Yara Detections Delphi",
        "https://apple.pantion.top/",
        "Insane! They 1st kicked her of her Private pay United Healthcare. Put her off of Medicare. Won\u2019t pay!",
        "www.sweetheartvideo.com || https://www.sweetheartvideo.com/tsara-brashears/",
        "https://www.anyxxxtube.net/search-porn/a-m-c-ate-xxx-videos/ pornokind.vgt.pl. vgt.pl",
        "I don\u2019t appreciate OTX populated Malware suggestion \u2018SNIT\u2019 \u2018 Dopple AI\u2019 NOT malware",
        "http://www.pornokind.vgt.pl \u2022 https://dbkuewww.m.vgt.pl \u2022 https://lokalnyhost.vgt.pl \u2022 www.xn--twj-hna.pedofil.vgt.pl",
        "http://212.33.237.86/images/1/report.php",
        "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software",
        "\u2193\u2192Found in: https://house.mo.gov/\u2193",
        "IDS Detection: Mirai Variant User-Agent (Inbound) WebShell Generic - wget http - POST",
        "http://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concentra-medical-center",
        "foundry2-lbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t29\t  URL\thttps://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/\t\t\tMar 21, 2026, 2:06:10 PM\t\t8\t  URL\thttp://datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t9\t  URL\thttp://foundry2sdbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t17\t  URL\thttps://209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t27\t  domain\tdatafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t40\t  hostname\t209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:1",
        "http://www.hak.vgt.pl \u2022 http://pornokind.vgt.pl \u2022 http://sip.vgt.pl \u2022 http://smtp-qa.vgt.pl \u2022  http://vgt.pl/*.",
        "http://pixelrz.com/lists/keywords/%20dr-jeffrey-reimer-dpt-funds-tsara-brashears/ https://xlxx.mobi",
        "https://www.fidelity.com/ https://www.fidelity.com/",
        "my.mintmobile.com",
        "thebrotherssabey.wordpress.com http://www.sabey.com | http://resources.sabeydatacenters.com | http://root.sabeydatacenters.com",
        "Yara Detections :  Mirai_Botnet_Malware ,  Mirai_2 ,  is__elf ,  Linux_Mirai",
        "http://pixelrz.com/lists/keywords/tsara-brashears-assaulted-by-jeffrey-reimer  http://pixelrz.com/lists/keywords/brashears-tsara-buzz-news",
        "Yara: kernel32_dll_xor_exe_key_11 ,  xor_0xb_kernel32_dll",
        "https://209-99-64-53.fwd.datafoundry.com \u2022 https://dns1.datafoundry.com \u2022 https://dns2.datafoundry.com \u2022 https://fwd.datafoundry.com",
        "www.happylifehappywife.com \u2022  http://www.happylifehappywife.com/2010/02/'>",
        "https://www.house.mo.gov:80/messageboard/ \u2022 extranet16.mo.gov \u2022 login.mo.gov \u2022 witness.house.mo.gov \u2022 dps.mo.gov \u2022 dev-publicdefender.mo.gov",
        "FileHash - SHA256 001f0ebe975b5f5a7e5272f53455635cc938a5a0129417f7e79c39df6cf65657 | Yara Detections: stack_string",
        "ipv4bot.whatismyipaddress.com",
        "https://www.sweetheartvideo.com/it/model/Kristen-Scott/50432",
        "http://sexiezpics.com/tsara-brashears-hardcore-porn http://mypornvid.com/videos/27/x510fb2/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/caillou-finger-family",
        "https://www.vgt.pl/font/roboto/Roboto-Bold.eot  \u2022",
        "Alerts: network_icmp persistence_autorun modifies_proxy_wpad packer_polymorphic",
        "https://www.vgt.pl/style/style.css \u2022 https://www.vgt.pl/font/roboto/Roboto-Medium.eot",
        "Make driver stuck victim with large vehicle after PT unknowingly reported original assault Jeffrey Reiner to Dora",
        "hubt.pornhub.com | www.pornhub.com | pornative.com",
        "dns.msftncsi.com \u2022 https://dns.msftncsi.com/ \u2022 http://dns.msftncsi.com/",
        "https://rdweb.datafoundry.com/RDWeb/Pages/en-US/login.aspx",
        "Yara Descriptive: \u2022  is__elf \u007fELF \u2022  Linux_Mirai /dev/watchdog",
        "http://www.01tracks.com/happy-customers",
        "http://209-99-64-53.fwd.datafoundry.com \u2022 http://dns2.datafoundry.com \u2022 http://fwd.datafoundry.com",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-300x300.png \u2022 http://mail2.hallrender.com/",
        "https://tulach.cc/",
        "http://alohatube.xyz/search/tsara-brashears No Expiration\t278\t  URL http://alohatube.xyz/search/tsara-brashears/ No Expiration\t62\t  URL http://amp.mypornvid.fun/videos/2/SLFGMWoQaCU/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears No Expiration\t49\t  URL http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us No Expiration\t27\t  URL http://browntubeporn.com/tsara-brashears.html No Expiration\t40\t  URL http://flexporn.net/tsara-brashears.html",
        "https://bounceme.netakamaipofcassandrvodd-krdddddddddddgaliapplepaysupplieseway.devrvodio-kr.zomato.tw\t d",
        "http://datafoundry.com \u2022 https://209-99-40-223.fwd.datafoundry.com\tdatafoundry.com \u2022 209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t13\t  hostname\tbeabetta.ifoundry.co.uk.s7b2.psmtp.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t12\t  hostname\tfoundry2sdbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t18\t  hostname\tfwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t8\t  hostname\t207-207-25-154.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t19\t  hostname\t207-207-25-156.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:1",
        "oooooooooo.ga \u2022 rallypoint.com \u2022 pornhub.dev \u2022 chats.pornhub.dev \u2022 https://twitter.com/PORNO_SEXYBABES \u2022 https://matrix.pornhub.dev \u2022 https://git.pornhub.dev",
        "https://rdweb.datafoundry.com/",
        "Interesting Strings : 13.79.87.163",
        "http://www.tryporn.net/seach/tsara-brashears/",
        "http://mypornvid.com/videos/27/x510fb2/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/caillou-finger-family",
        "https://www.sweetheartvideo.com/en/scene/Truth-Dare--Boobs/130432",
        "http://wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Language",
        "https://forward.ro/talents/mira/ redirects to  forward.ro",
        "http://videolal.com/tsara-brashears-assaulted-by-jeffrey-reimer.html  http://videolal.com/tsara-brashears-dead-or-alive-song-rap.html",
        "The Hall Render Brian Sabey malicious media campaign was so unexpected.",
        "https://b.link/infringement",
        "https://click.stecloud.us/campaign/track-email/384458660__3339__6837152__393",
        "https://palantir-staging.staging.candidate.app.paulsjob.ai/",
        "Iframe src: https://open.spotify.com/embed/artist/2nMFC7hWK0haX8ilvRpb59?utm_source=generator",
        "DISTINCTIO8.pdf",
        "https://www.vgt.pl/static/js/bootstrap-typeahead.js.179.252.2",
        "https://www.feestzalenvanvlaanderen.be/seach/tsara-brashears/",
        "Brian Sabey",
        "http://hallrender.com/attorney/brian-sabey \u2022 https://hallrender.com/attorney/brian-sabey \u2022 https://www.hallrender.com/attorney/brian-sabey/Accept",
        "Poemhunter.com: https://hybrid-analysis.com/sample/86479bf7c9a675913b93a0d399f5cbe0c0e8003239e93ae5e00f97cdbc5ec5ba",
        "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead/ | http://videolal.com/tsara-brashears-dead-by-daylight.html",
        "https://www.sweetheartvideo.com/scenes?models=63710",
        "https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html",
        "user-apple.info",
        "cia.gov FileHash-SHA256 f0a2d463a40c5b02e4bf61fdd76892b8ed5a1dd7d4a305849e4ff8fba00735bf",
        "DDoS:Linux/Gafgyt : FileHash - SHA256  358c2bd5b9e925dc23894dec18ce486c03d743cde766ce298ac1e2f00d86f0b2",
        "Poemhunter.com + rally point.com = pornhub.dev",
        "http://frostsecurity.net/frost/driver/ \u2022 http://frostsecurity.net/frost/frostupdater/",
        "bfxxxhindi.to | https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.vgt.pl/css/ \u2022 https://www.vgt.pl/favicon.ico \u2022 https://www.vgt.pl/font/fa/fontawesome-webfont.eot",
        "CVE FileHash-SHA256  36e49940232d00b021793c3cd7df19200c875ce3beb1992ecc59f6f8f6389be8",
        "http://pixelrz.com/lists/keywords/dr-jeffrey-reimer-dpt-funds-tsara-brashears/  orangeporntube.net   www.tryporno.net",
        "https://urlscan.io/result/4f0cabbf-9716-47dd-bd5c-038a953e6672/",
        "http://watchhers.net/index.php \u2022  foundry2sdbl.dvr.dn2.n-helix.com"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [
            "Brian Sabey | Tulach | Sabey Data Centers",
            "TAM Legal Christopher P. Ahmann Chief Terrorist",
            "NSO Group",
            "Lazarus"
          ],
          "malware_families": [
            "Mirai variant spreading",
            "Trojan:win32/conbea!rfn",
            "Backdoor:win32/plugx.n!dha",
            "Eternalblue",
            "Cve-2017-17215",
            "Trojandownloader:win32/cutwail",
            "Beach research",
            "Lockbit",
            "Y.a.s:1byte/tinyrod",
            "Win32:zbot-ruv",
            "Nokoyawa ransomware",
            "Ddos:linux/gafgyt.ya!mtb",
            "Worn:win32/autorun.xxy!bit",
            "Asyncrat",
            "Trojan:win32/qshell",
            "Worm:win32/benjamin",
            "Tons of malware",
            "Formbook",
            "Ransom:win32/haperlock",
            "Pws:win32/qqpass.ci",
            "Ms defender\talf:heraklezeval:trojan:win32/clipbanker",
            "Cve-2023-2868",
            "Tulach",
            "Trojan:win32/miner.ka!mtb",
            "Arid.viper_cnc",
            "Trojan:win32/mydoom",
            "Trojan:win32/neurevt",
            "Win32/tofsee.ax",
            "Trojan:win32/ausiv!rfn",
            "Virus:win32/krepper.30760",
            "Hallrender",
            "Elf:hajime-r\\ [trj]",
            "Dark",
            "Trojan:win32/muldrop",
            "Win.trojan.sarwent-10012602-0",
            "Trojandropper:win32/qhost",
            "Win32/socstealer!rfn",
            "Wannacry",
            "Qbot",
            "M1",
            "Other malware",
            "Maze",
            "Snit",
            "Win64:trojan-gen",
            "Win32:trojanx-gen\\ [trj]",
            "Alf:heraklezeval:trojan:win32/eqtonex.f",
            "Ursnif",
            "Sakurel",
            "Porn revenge",
            "Win.malware.oxypumper-6900435-0",
            "Trojan:pdf/phish.rr!mtb",
            "Njrat",
            "Trojan:win32/bulta",
            "Win.malware.qshell-9875653-0",
            "Trojanspy",
            "Jaik",
            "Chaos",
            "Win.trojan.midia-4",
            ": alf:trojan:msil/azorult.ac!",
            "Wininicrypt",
            "Ransomware",
            "Alf:heraklezeval:trojan:msil/gravityrat",
            "Cve-2014-8361",
            "Dnstrojan",
            "Amadey",
            "#virtool:win32/obfuscator.",
            "Email-worm.win32.brontok.n",
            "Trojanspy:win32/nivdort",
            "Kimsuky",
            "Webtoolbar",
            "Eternalrocks",
            "Maltiverse",
            "Backdoor:win32/tofsee",
            "Unix.trojan.mirai-6981169-0",
            "Hacktool",
            "Virtool:win32/obfuscator.jm",
            "Emotet",
            "Cve-2023-27350",
            "Bandit stealer",
            "Alf:heraklezeval:backdoor:linux/mirai.a!rf",
            "Bazarcall",
            "Et",
            "Win32:evo-gen",
            "Suggested",
            "Djvu",
            "Virus:win32/sivis.a",
            "Evilnum",
            "Softcnapp",
            "Sova",
            "Win.packed.generic-9967832-0",
            "Nids",
            "Tel:createscheduledtask",
            "Worm:win32/autorun",
            "Keylogger",
            "Qakbot",
            "Ransomexx",
            "Parallax rat",
            "Custom malware",
            "Packed- multiple malware",
            "Pws:win32/raven",
            "Azorult",
            "Trojan:msil/ursu.kp",
            "Dopple ai",
            "Remcos rat",
            "Agent tesla",
            "Quasar rat",
            "Virtool:win32/tofsee",
            "Tofsee",
            "Trojan:win32/zombie.a",
            "Alf:rpf:peattr_sigattr:predict:70",
            "Backdoor.win32.shiz.ufj",
            "Exodus",
            "Virtool:win32/vbinject.gen!mh",
            "Trojan:bat/musecador",
            "Flubot",
            "Onelouder",
            "Pegasus",
            "Cobalt strike",
            "Exploit:win32/cve-2017-0147",
            "Ransom:win32/gandcrab",
            "Ddos:linux/gafgyt",
            "Callback phishing",
            "Sality",
            "Win32:kryptik",
            "Radar ineractive",
            "Win.malware.004bf-6866449-0",
            "Win.trojan.installcore-1177",
            "Netherlands",
            "Mirai",
            "Tsara brashears",
            "Alf:heraklezeval:trojan:win32/ymacco.aa47",
            "Ransom",
            "Unix.trojan.gafgyt-6748839-0",
            "Alf:trojan:win32/cryptwrapper.rt!mtb",
            "Mitre attack",
            "Win.trojan.agent-336074"
          ],
          "industries": [
            "Insurance",
            "Media",
            "Government",
            "Financial",
            "Legal",
            "Defense",
            "Finance",
            "Healthcare",
            "Technology",
            "Telecommunications"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 50,
  "pulses": [
    {
      "id": "69a02837827feb0b78fa3ad2",
      "name": "The Belasco Chain",
      "description": "The adversary delivers a masterclass in \"Regular Belasco\" stagecraft, utilizing authentic Adobe PIDs to construct a \"living library\" of legitimacy where mundane metadata like SOPHIA.json acts as Gatsby\u2019s \"real but uncut\" volumes to mask a hollowed-out interior. This is a triumph of performative evasion; while researchers marvel at the realism of the set-dressing, MSI50B8.tmp and MSI4F2F.tmp wait in the wings of the Windows\\Installer directory, invisible to the human eye and using NGEN hijacking to bake illicit scripts directly into the OS framework. By employing Cryptnet certificates as \"stage lighting\" to mask C2 handshakes, the malware doesn't just attend the system\u2019s party\u2014it rewrites the invitation to own the house. Unlike the tragic end at West Egg, this Belasco chain is a play that refuses to end; it simply resets the stage, ensuring the performance continues as long as the \"green light\" of the C2 remains active.",
      "modified": "2026-04-19T09:34:35.173000",
      "created": "2026-02-26T11:02:15.932000",
      "tags": [
        "file size",
        "mwdb",
        "bazaar",
        "sha3384",
        "ssdeep",
        "file type",
        "sha1",
        "sha256",
        "crc32",
        "filenames c"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2805,
        "FileHash-SHA1": 2568,
        "FileHash-SHA256": 7488,
        "domain": 1883,
        "hostname": 1466,
        "URL": 1179,
        "email": 46,
        "CVE": 46,
        "CIDR": 3,
        "YARA": 7,
        "IPv4": 94,
        "JA3": 1
      },
      "indicator_count": 17586,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 53,
      "modified_text": "5 hours ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69e1cc70fcbd3f613502e1f7",
      "name": "order  clone by aclause21 Public",
      "description": "",
      "modified": "2026-04-17T09:28:38.049000",
      "created": "2026-04-17T06:00:16.867000",
      "tags": [
        "access ta0001",
        "defense evasion",
        "access ta0006",
        "command",
        "control ta0011",
        "impact ta0040",
        "catalog tree",
        "ob0005 defense",
        "evasion ob0006",
        "impact ob0008",
        "hashes cape",
        "sandbox",
        "docguard",
        "yomi hunter",
        "zenbox",
        "ip traffic",
        "pattern domains",
        "memory pattern",
        "urls https",
        "adversaries",
        "mitre att",
        "t1189 found",
        "clickable urls",
        "pdf execution",
        "t1036",
        "creates",
        "hide artifacts",
        "exploitation",
        "e1564 hidden",
        "files",
        "discovery e1082",
        "e1203 data",
        "vhash",
        "ssdeep",
        "file type",
        "pdf document",
        "magic pdf",
        "trid adobe",
        "format",
        "file size",
        "united",
        "as32934",
        "passive dns",
        "unknown",
        "scan endpoints",
        "all scoreblue",
        "ipv4",
        "pulse pulses",
        "urls",
        "status",
        "search",
        "showing",
        "server error",
        "certificate",
        "creation date",
        "high assurance",
        "server ca",
        "date",
        "body",
        "win32",
        "ransom",
        "entries",
        "icmp traffic",
        "packing t1045",
        "t1045",
        "pdb path",
        "pe resource",
        "show",
        "malware",
        "copy",
        "push",
        "write",
        "aaaa",
        "nxdomain",
        "united kingdom",
        "thailand",
        "vietnam",
        "as45430",
        "honduras",
        "indonesia",
        "mexico",
        "slovakia",
        "dynamicloader",
        "yara rule",
        "high",
        "ekyxe",
        "xe e",
        "eofae",
        "ee edcje4j",
        "tofsee",
        "windows",
        "medium",
        "stream",
        "grum",
        "as15169 google",
        "pulses",
        "record value",
        "error",
        "cname",
        "name servers",
        "ireland",
        "next",
        "federation asn",
        "as49505",
        "labs pulses",
        "trojan",
        "trojandropper",
        "related pulses",
        "file samples",
        "files matching",
        "date hash",
        "copyright",
        "all search",
        "reverse dns",
        "location united",
        "emails info",
        "expiration date",
        "as51167 contabo",
        "germany unknown",
        "a nxdomain",
        "as40021 contabo",
        "encrypt",
        "url http",
        "http",
        "ip address",
        "related nids",
        "files location",
        "ddos",
        "activity",
        "checkin",
        "win64",
        "mirai",
        "hosting",
        "files ip",
        "address",
        "czechia unknown",
        "as174 cogent",
        "asnone germany",
        "as15598",
        "as16625 akamai",
        "asnone united",
        "as20940",
        "as35994 akamai",
        "as12337 noris",
        "pulse submit",
        "url analysis",
        "backdoor",
        "gmt cache",
        "sameorigin",
        "443 ma2592000",
        "suspicious",
        "virtool",
        "emails",
        "domain name",
        "code",
        "brazil",
        "poland",
        "domain",
        "msie",
        "windows nt",
        "tcp syn",
        "resolverror",
        "exploit",
        "externalport",
        "internalport",
        "http headers",
        "home network",
        "demonbot",
        "andariel",
        "yara detections",
        "malware traffic",
        "nids",
        "dns query",
        "google safe",
        "browsing",
        "whois",
        "virustotal",
        "mtb apr",
        "asnone related",
        "open",
        "hash avast",
        "avg clamav",
        "msdefender apr",
        "as8075",
        "content type",
        "access",
        "cp bus",
        "cur cono",
        "fin ivdo",
        "onl our",
        "phy samo",
        "overview ip",
        "flag united",
        "hostname",
        "files domain",
        "as8068",
        "trojan features",
        "rsa tls",
        "issuing ca",
        "mirai variant",
        "useragent",
        "inbound",
        "realtek sdk",
        "miniigd upnp",
        "soap command",
        "activity mirai",
        "helloworld",
        "users",
        "alerts",
        "anomalous file",
        "recycle bin",
        "filehash",
        "av detections",
        "memcommit",
        "read c",
        "memreserve",
        "for privacy",
        "china unknown",
        "ag alberto",
        "pedraz",
        "holidaycheck ag",
        "project pi",
        "immobilien ag",
        "puma se",
        "kurt walther",
        "ag ingo",
        "kraupa",
        "timo salzsieder",
        "record type",
        "ttl value",
        "msms57295540",
        "subdomains",
        "ireland unknown",
        "analyzer paste",
        "iocs",
        "samples",
        "regsetvalueexa",
        "default",
        "regdword",
        "module load",
        "t1129",
        "http request",
        "process32nextw",
        "regbinary",
        "oxypumper",
        "tools",
        "dock",
        "april",
        "persistence",
        "execution",
        "download",
        "as62597 nsone",
        "echo request",
        "sweep",
        "payload hello",
        "world",
        "total",
        "please",
        "xport",
        "main",
        "look",
        "install",
        "servers",
        "found",
        "cnapple public",
        "accept",
        "chrome",
        "moved",
        "ssl certificate",
        "write c",
        "installcore",
        "june",
        "delphi",
        "as47846",
        "cookie",
        "as32787 akamai",
        "as714 apple",
        "m1",
        "onelouder",
        "brian sabey",
        "denver colorado",
        "fakedout threat",
        "gmt content",
        "x cache",
        "div div",
        "as8972 host",
        "france unknown",
        "registrar",
        "otx scoreblue",
        "address domain",
        "as24940 hetzner",
        "as44273 host",
        "asn as15598",
        "trojanspy",
        "mail spammer",
        "germany mail",
        "spammer",
        "hichina",
        "data redacted",
        "a domains",
        "wow64",
        "slcc2",
        "media center",
        "port",
        "powershell",
        "urls http",
        "tptjsw",
        "virus",
        "ids detections",
        "germany",
        "as8560",
        "austria",
        "as1921",
        "as14061",
        "whitelisted",
        "as16276",
        "script urls",
        "as16552 tiggee",
        "as9009 m247",
        "meta",
        "as29789",
        "detected m1",
        "mtb aug",
        "server",
        "as397241",
        "cryp",
        "hostmaster",
        "networks",
        "as19024",
        "gmt setcookie",
        "delete",
        "russia as49505",
        "sinkhole cookie",
        "value snkz",
        "pe32",
        "possible",
        "susp",
        "lnmp",
        "lnmp a",
        "licess",
        "shell",
        "as63949 linode",
        "as133618",
        "as21342",
        "cve201717215",
        "huawei remote",
        "huawei hg532",
        "malware worm",
        "gafgyt",
        "exploit none",
        "binbusybox",
        "delete c",
        "odigicert inc",
        "stwashington",
        "lredmond",
        "rsa ca",
        "cape",
        "nondns",
        "denver",
        "redacted for",
        "method status",
        "url hostname",
        "ip country",
        "type get",
        "date tue",
        "gmt contenttype",
        "connection",
        "cachecontrol",
        "expires thu",
        "gmt vary",
        "poland unknown",
        "title",
        "script domains",
        "updated date",
        "serce internetu",
        "cnc beacon",
        "javascript",
        "wsasend",
        "post",
        "delete shadows",
        "all quiet",
        "t1047",
        "instrumentation",
        "rpcs",
        "ms windows",
        "asnone dns",
        "http host",
        "ip check",
        "sha256",
        "bits",
        "adware malware",
        "etpro malware",
        "bios",
        "guard",
        "tulach",
        "spectrum",
        "cyber folks",
        "tsara brashears",
        ".pl",
        "contacted",
        "kryptikxp",
        "apple",
        "ios",
        "android",
        "sabey",
        "charter communications",
        "denvecolorado",
        "quantum fiber",
        "air force",
        "swipper",
        "masquerade",
        "hitmen",
        "mitm",
        "whitesky",
        "cyber warfare",
        "porn",
        "pornhub.software"
      ],
      "references": [
        "DISTINCTIO8.pdf",
        "FileHash - SHA256 001f0ebe975b5f5a7e5272f53455635cc938a5a0129417f7e79c39df6cf65657 | Yara Detections: stack_string",
        "IDS Detections: Win32/Tofsee.AX google.com connectivity check Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set",
        "Tofsee: 'google.com' |  https://www.gov50.icu |",
        "ET TROJAN Win32/DarkWatchman Checkin Activity (POST) ( This is true. They sit around watching, following...)",
        "Alerts: procmem_yara injection_inter_process creates_largekey network_bind persistence_autorun antivm_generic_disk",
        "Alerts: persistence_autorun_tasks spawns_dev_util cape_detected_threat injection_process_hollowing",
        "hubt.pornhub.com | www.pornhub.com | pornative.com",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ||  pin.it || https://pin.it/",
        "www.sweetheartvideo.com || https://www.sweetheartvideo.com/tsara-brashears/",
        "Unix.Trojan.Mirai-6981169-0: FileHash - SHA256  fe00b364b6b8342e3ce0dd146902ac3330ab976e87aca6be666efde39ea485da",
        "IDS Detections: WGET Command Specifying Output in HTTP Headers",
        "IDS Detections: D-Link Devices Home Network Administration Protocol Command Execution",
        "Yara Detections: is__elf ,  DemonBot",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication writes_to_stdout",
        "FileHash - SHA256  f32f6b229913d68daad937cc72a57aa45291a9d623109ed48938815aa7b6005c",
        "IDS Detections: Andariel Backdoor Activity (Checkin)",
        "Alerts: dead_host nids_malware_alert network_icmp nolookup_communication",
        "DDoS:Linux/Gafgyt : FileHash - SHA256  358c2bd5b9e925dc23894dec18ce486c03d743cde766ce298ac1e2f00d86f0b2",
        "IDS Detection: Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound",
        "IDS Detection: Mirai Variant User-Agent (Inbound) WebShell Generic - wget http - POST",
        "IDS Detection: Observed Suspicious UA (Hello-World) Suspicious Activity potential UPnProxy",
        "http://vortex-nlb-http2-fed-us-taut-purple.nr-data.net/",
        "https://tulach.cc/ || tulach.cc || www-temp.metrobyt-mobile.com",
        "apple-reactivate.com | appleweb-aem.apple.com | apple.com | revoked-aprtr1-tr1g1.apple.com | network-framework.apple.com",
        "autodiscover.webcompanion.com || avc-gft-dashboard.apple.com || cac1-wwfde-wave.apple.com || demo27.apple.com",
        "* https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
        "https://tulach.cc/ | tulach.cc |",
        "http://hallrender.com/attorney/brian-sabey | www-temp.metrobyt-mobile.com",
        "google.pl | aplikacja.ceidg.gov.pl | imaginecup.pl | microsoft.pl",
        "18teen.net | teensnow.com | grannies-porn.net | pornmd.com",
        "www.pornhubselect.com | pornhub.software"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Chile",
        "Morocco",
        "Taiwan",
        "Guatemala",
        "United Kingdom of Great Britain and Northern Ireland",
        "Ireland",
        "Kenya",
        "Peru",
        "Singapore",
        "Mexico",
        "Brazil",
        "Slovakia",
        "Spain",
        "Australia",
        "Belgium",
        "Germany",
        "Hungary",
        "Netherlands",
        "Russian Federation",
        "Japan",
        "Poland"
      ],
      "malware_families": [
        {
          "id": "Ransom",
          "display_name": "Ransom",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "TEL:CreateScheduledTask",
          "display_name": "TEL:CreateScheduledTask",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-6981169-0",
          "display_name": "Unix.Trojan.Mirai-6981169-0",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Tofsee",
          "display_name": "Backdoor:Win32/Tofsee",
          "target": "/malware/Backdoor:Win32/Tofsee"
        },
        {
          "id": "Ransom:Win32/Haperlock",
          "display_name": "Ransom:Win32/Haperlock",
          "target": "/malware/Ransom:Win32/Haperlock"
        },
        {
          "id": "Trojan:Win32/Neurevt",
          "display_name": "Trojan:Win32/Neurevt",
          "target": "/malware/Trojan:Win32/Neurevt"
        },
        {
          "id": "DDoS:Linux/Gafgyt.YA!MTB",
          "display_name": "DDoS:Linux/Gafgyt.YA!MTB",
          "target": "/malware/DDoS:Linux/Gafgyt.YA!MTB"
        },
        {
          "id": "CVE-2017-17215",
          "display_name": "CVE-2017-17215",
          "target": null
        },
        {
          "id": "CVE-2023-27350",
          "display_name": "CVE-2023-27350",
          "target": null
        },
        {
          "id": "CVE-2014-8361",
          "display_name": "CVE-2014-8361",
          "target": null
        },
        {
          "id": "Trojan:Win32/Zombie.A",
          "display_name": "Trojan:Win32/Zombie.A",
          "target": "/malware/Trojan:Win32/Zombie.A"
        },
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        },
        {
          "id": "M1",
          "display_name": "M1",
          "target": null
        },
        {
          "id": "OneLouder",
          "display_name": "OneLouder",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Win.Trojan.Sarwent-10012602-0",
          "display_name": "Win.Trojan.Sarwent-10012602-0",
          "target": null
        },
        {
          "id": "Virus:Win32/Sivis.A",
          "display_name": "Virus:Win32/Sivis.A",
          "target": "/malware/Virus:Win32/Sivis.A"
        },
        {
          "id": "Win.Trojan.Installcore-1177",
          "display_name": "Win.Trojan.Installcore-1177",
          "target": null
        },
        {
          "id": "Win.Malware.Oxypumper-6900435-0",
          "display_name": "Win.Malware.Oxypumper-6900435-0",
          "target": null
        },
        {
          "id": "Win.Malware.Qshell-9875653-0",
          "display_name": "Win.Malware.Qshell-9875653-0",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1203",
          "name": "Exploitation for Client Execution",
          "display_name": "T1203 - Exploitation for Client Execution"
        },
        {
          "id": "T1485",
          "name": "Data Destruction",
          "display_name": "T1485 - Data Destruction"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1428",
          "name": "Exploit Enterprise Resources",
          "display_name": "T1428 - Exploit Enterprise Resources"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1133",
          "name": "External Remote Services",
          "display_name": "T1133 - External Remote Services"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "678f0dbdbc59dd2ea5656dcf",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 7589,
        "FileHash-SHA1": 3982,
        "FileHash-SHA256": 8280,
        "URL": 442,
        "domain": 2416,
        "hostname": 2155,
        "email": 37,
        "CVE": 4,
        "SSLCertFingerprint": 6
      },
      "indicator_count": 24911,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 47,
      "modified_text": "2 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69e1cc6fd3c4022e08db781d",
      "name": "order  clone by aclause21 Public",
      "description": "",
      "modified": "2026-04-17T06:51:33.372000",
      "created": "2026-04-17T06:00:15.760000",
      "tags": [
        "access ta0001",
        "defense evasion",
        "access ta0006",
        "command",
        "control ta0011",
        "impact ta0040",
        "catalog tree",
        "ob0005 defense",
        "evasion ob0006",
        "impact ob0008",
        "hashes cape",
        "sandbox",
        "docguard",
        "yomi hunter",
        "zenbox",
        "ip traffic",
        "pattern domains",
        "memory pattern",
        "urls https",
        "adversaries",
        "mitre att",
        "t1189 found",
        "clickable urls",
        "pdf execution",
        "t1036",
        "creates",
        "hide artifacts",
        "exploitation",
        "e1564 hidden",
        "files",
        "discovery e1082",
        "e1203 data",
        "vhash",
        "ssdeep",
        "file type",
        "pdf document",
        "magic pdf",
        "trid adobe",
        "format",
        "file size",
        "united",
        "as32934",
        "passive dns",
        "unknown",
        "scan endpoints",
        "all scoreblue",
        "ipv4",
        "pulse pulses",
        "urls",
        "status",
        "search",
        "showing",
        "server error",
        "certificate",
        "creation date",
        "high assurance",
        "server ca",
        "date",
        "body",
        "win32",
        "ransom",
        "entries",
        "icmp traffic",
        "packing t1045",
        "t1045",
        "pdb path",
        "pe resource",
        "show",
        "malware",
        "copy",
        "push",
        "write",
        "aaaa",
        "nxdomain",
        "united kingdom",
        "thailand",
        "vietnam",
        "as45430",
        "honduras",
        "indonesia",
        "mexico",
        "slovakia",
        "dynamicloader",
        "yara rule",
        "high",
        "ekyxe",
        "xe e",
        "eofae",
        "ee edcje4j",
        "tofsee",
        "windows",
        "medium",
        "stream",
        "grum",
        "as15169 google",
        "pulses",
        "record value",
        "error",
        "cname",
        "name servers",
        "ireland",
        "next",
        "federation asn",
        "as49505",
        "labs pulses",
        "trojan",
        "trojandropper",
        "related pulses",
        "file samples",
        "files matching",
        "date hash",
        "copyright",
        "all search",
        "reverse dns",
        "location united",
        "emails info",
        "expiration date",
        "as51167 contabo",
        "germany unknown",
        "a nxdomain",
        "as40021 contabo",
        "encrypt",
        "url http",
        "http",
        "ip address",
        "related nids",
        "files location",
        "ddos",
        "activity",
        "checkin",
        "win64",
        "mirai",
        "hosting",
        "files ip",
        "address",
        "czechia unknown",
        "as174 cogent",
        "asnone germany",
        "as15598",
        "as16625 akamai",
        "asnone united",
        "as20940",
        "as35994 akamai",
        "as12337 noris",
        "pulse submit",
        "url analysis",
        "backdoor",
        "gmt cache",
        "sameorigin",
        "443 ma2592000",
        "suspicious",
        "virtool",
        "emails",
        "domain name",
        "code",
        "brazil",
        "poland",
        "domain",
        "msie",
        "windows nt",
        "tcp syn",
        "resolverror",
        "exploit",
        "externalport",
        "internalport",
        "http headers",
        "home network",
        "demonbot",
        "andariel",
        "yara detections",
        "malware traffic",
        "nids",
        "dns query",
        "google safe",
        "browsing",
        "whois",
        "virustotal",
        "mtb apr",
        "asnone related",
        "open",
        "hash avast",
        "avg clamav",
        "msdefender apr",
        "as8075",
        "content type",
        "access",
        "cp bus",
        "cur cono",
        "fin ivdo",
        "onl our",
        "phy samo",
        "overview ip",
        "flag united",
        "hostname",
        "files domain",
        "as8068",
        "trojan features",
        "rsa tls",
        "issuing ca",
        "mirai variant",
        "useragent",
        "inbound",
        "realtek sdk",
        "miniigd upnp",
        "soap command",
        "activity mirai",
        "helloworld",
        "users",
        "alerts",
        "anomalous file",
        "recycle bin",
        "filehash",
        "av detections",
        "memcommit",
        "read c",
        "memreserve",
        "for privacy",
        "china unknown",
        "ag alberto",
        "pedraz",
        "holidaycheck ag",
        "project pi",
        "immobilien ag",
        "puma se",
        "kurt walther",
        "ag ingo",
        "kraupa",
        "timo salzsieder",
        "record type",
        "ttl value",
        "msms57295540",
        "subdomains",
        "ireland unknown",
        "analyzer paste",
        "iocs",
        "samples",
        "regsetvalueexa",
        "default",
        "regdword",
        "module load",
        "t1129",
        "http request",
        "process32nextw",
        "regbinary",
        "oxypumper",
        "tools",
        "dock",
        "april",
        "persistence",
        "execution",
        "download",
        "as62597 nsone",
        "echo request",
        "sweep",
        "payload hello",
        "world",
        "total",
        "please",
        "xport",
        "main",
        "look",
        "install",
        "servers",
        "found",
        "cnapple public",
        "accept",
        "chrome",
        "moved",
        "ssl certificate",
        "write c",
        "installcore",
        "june",
        "delphi",
        "as47846",
        "cookie",
        "as32787 akamai",
        "as714 apple",
        "m1",
        "onelouder",
        "brian sabey",
        "denver colorado",
        "fakedout threat",
        "gmt content",
        "x cache",
        "div div",
        "as8972 host",
        "france unknown",
        "registrar",
        "otx scoreblue",
        "address domain",
        "as24940 hetzner",
        "as44273 host",
        "asn as15598",
        "trojanspy",
        "mail spammer",
        "germany mail",
        "spammer",
        "hichina",
        "data redacted",
        "a domains",
        "wow64",
        "slcc2",
        "media center",
        "port",
        "powershell",
        "urls http",
        "tptjsw",
        "virus",
        "ids detections",
        "germany",
        "as8560",
        "austria",
        "as1921",
        "as14061",
        "whitelisted",
        "as16276",
        "script urls",
        "as16552 tiggee",
        "as9009 m247",
        "meta",
        "as29789",
        "detected m1",
        "mtb aug",
        "server",
        "as397241",
        "cryp",
        "hostmaster",
        "networks",
        "as19024",
        "gmt setcookie",
        "delete",
        "russia as49505",
        "sinkhole cookie",
        "value snkz",
        "pe32",
        "possible",
        "susp",
        "lnmp",
        "lnmp a",
        "licess",
        "shell",
        "as63949 linode",
        "as133618",
        "as21342",
        "cve201717215",
        "huawei remote",
        "huawei hg532",
        "malware worm",
        "gafgyt",
        "exploit none",
        "binbusybox",
        "delete c",
        "odigicert inc",
        "stwashington",
        "lredmond",
        "rsa ca",
        "cape",
        "nondns",
        "denver",
        "redacted for",
        "method status",
        "url hostname",
        "ip country",
        "type get",
        "date tue",
        "gmt contenttype",
        "connection",
        "cachecontrol",
        "expires thu",
        "gmt vary",
        "poland unknown",
        "title",
        "script domains",
        "updated date",
        "serce internetu",
        "cnc beacon",
        "javascript",
        "wsasend",
        "post",
        "delete shadows",
        "all quiet",
        "t1047",
        "instrumentation",
        "rpcs",
        "ms windows",
        "asnone dns",
        "http host",
        "ip check",
        "sha256",
        "bits",
        "adware malware",
        "etpro malware",
        "bios",
        "guard",
        "tulach",
        "spectrum",
        "cyber folks",
        "tsara brashears",
        ".pl",
        "contacted",
        "kryptikxp",
        "apple",
        "ios",
        "android",
        "sabey",
        "charter communications",
        "denvecolorado",
        "quantum fiber",
        "air force",
        "swipper",
        "masquerade",
        "hitmen",
        "mitm",
        "whitesky",
        "cyber warfare",
        "porn",
        "pornhub.software"
      ],
      "references": [
        "DISTINCTIO8.pdf",
        "FileHash - SHA256 001f0ebe975b5f5a7e5272f53455635cc938a5a0129417f7e79c39df6cf65657 | Yara Detections: stack_string",
        "IDS Detections: Win32/Tofsee.AX google.com connectivity check Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set",
        "Tofsee: 'google.com' |  https://www.gov50.icu |",
        "ET TROJAN Win32/DarkWatchman Checkin Activity (POST) ( This is true. They sit around watching, following...)",
        "Alerts: procmem_yara injection_inter_process creates_largekey network_bind persistence_autorun antivm_generic_disk",
        "Alerts: persistence_autorun_tasks spawns_dev_util cape_detected_threat injection_process_hollowing",
        "hubt.pornhub.com | www.pornhub.com | pornative.com",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ||  pin.it || https://pin.it/",
        "www.sweetheartvideo.com || https://www.sweetheartvideo.com/tsara-brashears/",
        "Unix.Trojan.Mirai-6981169-0: FileHash - SHA256  fe00b364b6b8342e3ce0dd146902ac3330ab976e87aca6be666efde39ea485da",
        "IDS Detections: WGET Command Specifying Output in HTTP Headers",
        "IDS Detections: D-Link Devices Home Network Administration Protocol Command Execution",
        "Yara Detections: is__elf ,  DemonBot",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication writes_to_stdout",
        "FileHash - SHA256  f32f6b229913d68daad937cc72a57aa45291a9d623109ed48938815aa7b6005c",
        "IDS Detections: Andariel Backdoor Activity (Checkin)",
        "Alerts: dead_host nids_malware_alert network_icmp nolookup_communication",
        "DDoS:Linux/Gafgyt : FileHash - SHA256  358c2bd5b9e925dc23894dec18ce486c03d743cde766ce298ac1e2f00d86f0b2",
        "IDS Detection: Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound",
        "IDS Detection: Mirai Variant User-Agent (Inbound) WebShell Generic - wget http - POST",
        "IDS Detection: Observed Suspicious UA (Hello-World) Suspicious Activity potential UPnProxy",
        "http://vortex-nlb-http2-fed-us-taut-purple.nr-data.net/",
        "https://tulach.cc/ || tulach.cc || www-temp.metrobyt-mobile.com",
        "apple-reactivate.com | appleweb-aem.apple.com | apple.com | revoked-aprtr1-tr1g1.apple.com | network-framework.apple.com",
        "autodiscover.webcompanion.com || avc-gft-dashboard.apple.com || cac1-wwfde-wave.apple.com || demo27.apple.com",
        "* https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
        "https://tulach.cc/ | tulach.cc |",
        "http://hallrender.com/attorney/brian-sabey | www-temp.metrobyt-mobile.com",
        "google.pl | aplikacja.ceidg.gov.pl | imaginecup.pl | microsoft.pl",
        "18teen.net | teensnow.com | grannies-porn.net | pornmd.com",
        "www.pornhubselect.com | pornhub.software"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Chile",
        "Morocco",
        "Taiwan",
        "Guatemala",
        "United Kingdom of Great Britain and Northern Ireland",
        "Ireland",
        "Kenya",
        "Peru",
        "Singapore",
        "Mexico",
        "Brazil",
        "Slovakia",
        "Spain",
        "Australia",
        "Belgium",
        "Germany",
        "Hungary",
        "Netherlands",
        "Russian Federation",
        "Japan",
        "Poland"
      ],
      "malware_families": [
        {
          "id": "Ransom",
          "display_name": "Ransom",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "TEL:CreateScheduledTask",
          "display_name": "TEL:CreateScheduledTask",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-6981169-0",
          "display_name": "Unix.Trojan.Mirai-6981169-0",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Tofsee",
          "display_name": "Backdoor:Win32/Tofsee",
          "target": "/malware/Backdoor:Win32/Tofsee"
        },
        {
          "id": "Ransom:Win32/Haperlock",
          "display_name": "Ransom:Win32/Haperlock",
          "target": "/malware/Ransom:Win32/Haperlock"
        },
        {
          "id": "Trojan:Win32/Neurevt",
          "display_name": "Trojan:Win32/Neurevt",
          "target": "/malware/Trojan:Win32/Neurevt"
        },
        {
          "id": "DDoS:Linux/Gafgyt.YA!MTB",
          "display_name": "DDoS:Linux/Gafgyt.YA!MTB",
          "target": "/malware/DDoS:Linux/Gafgyt.YA!MTB"
        },
        {
          "id": "CVE-2017-17215",
          "display_name": "CVE-2017-17215",
          "target": null
        },
        {
          "id": "CVE-2023-27350",
          "display_name": "CVE-2023-27350",
          "target": null
        },
        {
          "id": "CVE-2014-8361",
          "display_name": "CVE-2014-8361",
          "target": null
        },
        {
          "id": "Trojan:Win32/Zombie.A",
          "display_name": "Trojan:Win32/Zombie.A",
          "target": "/malware/Trojan:Win32/Zombie.A"
        },
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        },
        {
          "id": "M1",
          "display_name": "M1",
          "target": null
        },
        {
          "id": "OneLouder",
          "display_name": "OneLouder",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Win.Trojan.Sarwent-10012602-0",
          "display_name": "Win.Trojan.Sarwent-10012602-0",
          "target": null
        },
        {
          "id": "Virus:Win32/Sivis.A",
          "display_name": "Virus:Win32/Sivis.A",
          "target": "/malware/Virus:Win32/Sivis.A"
        },
        {
          "id": "Win.Trojan.Installcore-1177",
          "display_name": "Win.Trojan.Installcore-1177",
          "target": null
        },
        {
          "id": "Win.Malware.Oxypumper-6900435-0",
          "display_name": "Win.Malware.Oxypumper-6900435-0",
          "target": null
        },
        {
          "id": "Win.Malware.Qshell-9875653-0",
          "display_name": "Win.Malware.Qshell-9875653-0",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1203",
          "name": "Exploitation for Client Execution",
          "display_name": "T1203 - Exploitation for Client Execution"
        },
        {
          "id": "T1485",
          "name": "Data Destruction",
          "display_name": "T1485 - Data Destruction"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1428",
          "name": "Exploit Enterprise Resources",
          "display_name": "T1428 - Exploit Enterprise Resources"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1133",
          "name": "External Remote Services",
          "display_name": "T1133 - External Remote Services"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "678f0dbdbc59dd2ea5656dcf",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 7589,
        "FileHash-SHA1": 3982,
        "FileHash-SHA256": 8280,
        "URL": 441,
        "domain": 2416,
        "hostname": 2155,
        "email": 37,
        "CVE": 4,
        "SSLCertFingerprint": 6
      },
      "indicator_count": 24910,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 47,
      "modified_text": "2 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69d68fffbf012630d57033b6",
      "name": "Sabey SWIPPER - Pornhub\u00bbX.Com migration to Twitter | Sabey\u2019s Daddy Data Center ",
      "description": "",
      "modified": "2026-04-08T17:27:27.851000",
      "created": "2026-04-08T17:27:27.851000",
      "tags": [
        "url https",
        "filehashsha256",
        "browse scan",
        "report spam",
        "author",
        "output",
        "tsara brashears",
        "created",
        "days ago",
        "showing",
        "trojan",
        "win32",
        "msil",
        "trojanspy",
        "virtool",
        "scan endpoints",
        "all search",
        "otx scoreblue",
        "author avatar",
        "fraud",
        "june",
        "worm",
        "search",
        "tsara type",
        "indicator role",
        "title added",
        "active related",
        "pulses url",
        "url http",
        "ipv6",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "sort",
        "least",
        "researched",
        "f https",
        "scan",
        "iocs",
        "learn more",
        "filehashmd5",
        "hostname",
        "domain",
        "indicators show",
        "browser",
        "unsupported",
        "view",
        "continue",
        "watch tsara",
        "searchtsa",
        "brashears",
        "most relevant",
        "porn videos",
        "download",
        "google search",
        "open threat",
        "babe",
        "green",
        "daily",
        "play",
        "fullscreen",
        "tsara",
        "videos",
        "love",
        "top tsara",
        "xxx videos",
        "hardcore porn",
        "jeffrey reimer",
        "puts",
        "porn",
        "javascript",
        "body",
        "creation date",
        "record value",
        "united",
        "gmt content",
        "gmt max",
        "age900",
        "httponly x",
        "date",
        "unknown",
        "pragma",
        "levelblue",
        "exchange open",
        "threat exchange",
        "indicator",
        "safebae",
        "get involved",
        "anyone else",
        "press",
        "data reports",
        "teen students",
        "become",
        "chapter lead",
        "become a",
        "certified peer",
        "district",
        "brian sabey",
        "sabey data",
        "hallrender",
        "sabey data centers",
        "swipper",
        "mark b sabey",
        "m brian sabey",
        "2beeg",
        "thebrotherssabey",
        "urls",
        "show",
        "cloudflarenet",
        "us urlscan",
        "skip",
        "accessibility",
        "all images",
        "videos shopping",
        "forums news",
        "web more",
        "tools",
        "service",
        "malicious",
        "size",
        "recent",
        "off blur",
        "find",
        "summary",
        "securitytrails",
        "urlscan https",
        "tryporn",
        "icann whois",
        "data problem",
        "disclaimer",
        "judaporn",
        "kompoz",
        "blur filter",
        "search results",
        "xxxvideohd",
        "hacker news",
        "item",
        "url",
        "website",
        "web",
        "scanner",
        "analyze",
        "analyzer",
        "september",
        "domains",
        "sale worldwide",
        "street",
        "gate parkway",
        "stateprovince",
        "postal code",
        "route",
        "open",
        "watch",
        "links",
        "footer",
        "delete see",
        "delete c",
        "tofsee",
        "grum",
        "entries",
        "cape",
        "high",
        "total",
        "copy",
        "write",
        "malware",
        "patched",
        "next",
        "please"
      ],
      "references": [
        "http://hghltd.yandex.net/yandbtm?fmode=inject&url=http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
        "thebrotherssabey.wordpress.com | https://hallrender.com/attorney/brian-sabey",
        "https://twitter.com/ootiosum/status/1812208222150726029a4dmHAxV0M0QIHawADl4Qr4kDegUI-QEQAA&usg=AOvVaw37yALadqlgoR9_xlQ5B4Hm",
        "https://thebrotherssabey.wordpress.com/wp-admin/customize.php?url=https://thebrotherssabey.wordpress.com/",
        "https://SafeBae.org |  https://www.sweetheartvideo.com/tsara-brashearsAccept-Language",
        "http://sexiezpics.com/tsara-brashears-hardcore-porn | https://www.sweetheartvideo.com/tsara-brashearsAccept-Language",
        "https://urlscan.io/domain/cdn2e-videos2.yjcontentdelivery.com | http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html",
        "https://www.google.com/search?client=ms-android-tcl-rvo2b&sca_esv=677ff2260c38da6a&sca_upv=1&q=tsara%20brashears&tbm=vid&source=lnms&fbs=AEQNm0Aa4sjWe7Rqy32pFwRj0UkWd8nbOJfsBGGB5IQQO6L3J5MIFhvnvU242yFxzEEp3BfRFWcyM5BvpTgNzM3vKj4sz-C2iLdc_0v0iAkScdtYjVPIGyVlvwujMCY6xcQ3LIupWIQPyPPfztGwIqpQ9H2EXqXXY4GBGq8hpekXoFuduDqktZzSriMQxAlKPjQviXaDVnUYcgWw9ejzcyECyIGanCUinw&sa=X&biw=1128&bih=1971&dpr=2&no_sw_cr=1&zx=1724209326040&sssc=1",
        "bfxxxhindi.to | https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://billpay.stcu.org/csp/ws/ALKAMI-S5M/html/PC_Remote_Role_Due_XP_Help/role1_faq_email_notifications.html  billpay.stcu.org",
        "bfxxxhindi.to  www.bfxxxhindi.to  https://www.bfxxxhindi.to   tsara brashears bfxxxhindi.to https://www.bfxxxhindi.to/trend/eaUvPMTg3NzMytY07Q/",
        "http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer/",
        "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead/. http://www.music-forum.org/www-cixiu888-com-tsara-brashears.html",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "http://hghltd.yandex.net/yandbtm?fmode=inject&url=http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
        "http://alohatube.xyz/search/tsara-brashears  http://alohatube.xyz/search/tsara-brashears/",
        "http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-sexual-misconduct-miscinception.html",
        "http://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concentra-medic",
        "http://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concentra-medical-center",
        "http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html",
        "http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-medical.html",
        "http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-misconduct-miscinception.html",
        "http://videolal.com/tsara-brashears-assaulted-by-jeffrey-reimer.html  http://videolal.com/tsara-brashears-dead-or-alive-song-rap.html",
        "http://videolal.com/tsara-brashears-pueblo.html , http://videolal.com/tsara-brashears.html",
        "http://pornbitter.com/storage/tsara-brashears/  http://www.gdsl-pallemoebler.info/seach/tsara-brashears/ advocate-smyslova.ru",
        "http://browntubeporn.com/tsara-brashears.html  browntubeporn.com  http://pornvideoj.com/tsara-brashears.htm",
        "pornhub.com/gay/video/search?search=tsara%2Blynn%2Bbrashears%2Blesbian",
        "feestzalenvanvlaanderen.be  www.gdsl-pallemoebler.info  http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us",
        "http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us  www.tryporn.net",
        "http://www.gdsl-pallemoebler.info/seach/tsara-brashears/ advocate-smyslova.ru  feestzalenvanvlaanderen.be www.gdsl-pallemoebler.info",
        "http://www.tryporn.net/seach/tsara-brashears/  hicksandchicks.org redpornvideos.net   http://advocate-smyslova.ru/tsara-brashears/",
        "http://flexporn.net/tsara-brashears.html  http://onlyindianporn.net/videos/tsara-brashears/  http://pornbitter.com/storage/tsara-brashears/",
        "http://pornpx.com/trends/tsara-brashears-submission-on-august-27-via-manual/1/ http://www.potnhub.org/tsara-brashears.html",
        "http://www.bukaporn.net/trend/tsara-brashears/  http://onlyindianporn.tv/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concentra",
        "http://www.sexpornimages.com/tsara/tsara-lynn-brashears-porn/7x56y.html",
        "www.sexpornimages.com http://hicksandchicks.org/ju/tsara-brashears/  hlebo.mobi  pornpx.com  www.potnhub.org",
        "http://wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Language  http://www.music-forum.",
        "http://kompoz.me/find/tsara-brashears-submission-on-august-27-via-manual/  http://redpornvideos.net/tsara-brashears.html",
        "https://wallpapers-nature.com/  https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "https://wallpapers-nature.com/tsara-brashears/urlscan-io   https://www.sweetheartvideo.com/tsara-brashears",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net  https://www.sweetheartvideo.com/tsara-brashears/",
        "https://www.sweetheartvideo.com/tsara-brashears/ | https://www.sweetheartvideo.com/tsara-brashearsAccept-Language",
        "https://www.sweetheartvideo.com/tsara-brashearsAccept-Language | https://wallpapers-nature.com/tsara-brashears/urlscan-io",
        "http://hghltd.yandex.net/yandbtm?fmode=inject&url=http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
        "https://xlxx.mobi phishing\thttps://2beeg.me   https://2beeg.net  https://www.redporn.video   https://youjizz.sex  2beeg.me xlxx.mobi ladys.one",
        "tsara-brashears-deadspin-twitter-suspended-account-help.ht  videolal.com  wallpapers-nature.com   www.sweetheartvideo.com",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/  Domain mom2fuck.mobi   https://youjizz.sex/tsara-brashears.html   https://youjizz.sex",
        "http://amp.mypornvid.fun/videos/2/SLFGMWoQaCU/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears",
        "http://pixelrz.com/lists/keywords/tsara-brashears-assaulted-by-jeffrey-reimer  http://pixelrz.com/lists/keywords/brashears-tsara-buzz-news",
        "http://pixelrz.com/lists/keywords/%20dr-jeffrey-reimer-dpt-funds-tsara-brashears/ https://xlxx.mobi",
        "http://pixelrz.com/lists/keywords/dr-jeffrey-reimer-dpt-funds-tsara-brashears/  orangeporntube.net   www.tryporno.net",
        "http://pixelrz.com/lists/keywords/tsara-brashears-massage-misconduct-misconception  http://pixelrz.com/lists/keywords/tsara-brashears-dead/  http://orangeporntube.net/tsara-brashears.html",
        "http://www.tryporno.net/movies/tsara-brashears/  http://www.pixelrz.com/lists/keywords/tsara-brashears/",
        "https://kompoz.me/find/tsara-brashears-submission-on-august-27-via-manual/  sexiezpics.com",
        "http://sexiezpics.com/tsara-brashears-hardcore-porn http://mypornvid.com/videos/27/x510fb2/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/caillou-finger-family",
        "http://pixelrz.com/lists/keywords/tsara-brashears-assaulted-at-concentra/   http://pornohata.com/mov/tsara-brashears/",
        "http://onlyindianporn2.com/videos/tsara-brashears/   onlyindianporn2.com-porn.html   aninditaannisa.blogspot.com   porno-trash.net",
        "myhotzpic.com  pornohata.com pornstarsporno.net aninditaannisa.blogspot.com/2019/02/tsara-brashears",
        "http://pornstarsporno.net/tsara-brashears.html  http://vtwctr.org/explore/inmate-tsara-brashears/",
        "https://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara%20-brashears-massage-nearby.html",
        "Hostname aninditaannisa.blogspot.com No Expiration\t0\t  URL aninditaannisa.blogspot.com/2019/02/tsara-brashears-porn.html  billpay.stcu.org",
        "http://hghltd.yandex.net/yandbtm?fmode=inject&url=http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
        "https://thebrotherssabey.wordpress.com/wp-admin/customize.php?url=https://thebrotherssabey.wordpress.com/",
        "thebrotherssabey.wordpress.com http://www.sabey.com | http://resources.sabeydatacenters.com | http://root.sabeydatacenters.com",
        "http://go.sabey.com http://vpn2.sabey.com | http://resources.sabeydatacenters.com | http://root.sabeydatacenters.com |",
        "http://itsupport.sabey.com http://www.sabey.com | http://root.sabeydatacenters.com/ | http://server1.sabeydatacenters.com | http://smtp1.sabeydatacenters.com No Expiration\t http://smtps.sabeydatacenters.com | http://smtpseguro.sabeydatacenters.com",
        "http://sabey.com/construction/ | https://tulach.cc/ | sabeydatacenters.com | https://thebrotherssabey.com | http://root.sabeydatacenters.com/ No Expiration\t0\t  URL http://server1.sabeydatacenters.com No Expiration\t0\t  URL http://smtp1.sabeydatacenters.com No Expiration\t http://smtps.sabeydatacenters.com | http://smtpseguro.sabeydatacenters.com | http://staging.sabeydatacenters.com",
        "https://info.sabeydatacenters.com/webmail/404532/1590752290/6c9ed1e0b6b364689835e8c6bd51ed2198f99ee8ec7fa1924787e4e9b6382872",
        "forceusercontent.com | sabey.com | tulach.cc | http://thebrotherssabey.com/2018m.sabeydatacenters.com | https://www.vpn.sabey.com/",
        "root.sabeydatacenters.com | server1.sabeydatacenters.com | smtps.sabeydatacenters.com | smtpseguro.sabeydatacenters.com",
        "https://thebrotherssabey.com | https://thebrotherssabey.com/2015/08/24/why | staging.sabeydatacenters.com |",
        "authsmtp.sabeydatacenters.com | go.sabey.com | thebrotherssabey.com | mx5.sabeydatacenters.com | posta.sabeydatacenters.com",
        "remote.files.downloadnow-1.com | remote.sabeydatacenters.com | poczta.sabeydatacenters.com | pop.sabeydatacenters.com",
        "https://thebrotherssabey.com/2018/12/05/nature | https://thebrotherssabey.com/2019/01/20/miracle/ | https://thebrotherssabey.com/20",
        "https://thebrotherssabey.com/2015/08/24/why  | https://thebrotherssabey.com/2016/03/12/how | https://thebrotherssabey.com/2017/04/17/truth",
        "https://thebrotherssabey.com/2016/01/18/ballroom | resources.sabeydatacenters.com | https://thebrotherssabey.com/feed/",
        "https://thebrotherssabey.com/comments/feed/ | mail2.sabeydatacenters.com | mails.sabeydatacenters.com | newmail.sabeydatacenters.com",
        "http://staging.sabeydatacenters.com | https://sabey.com/careers/ | https://vpn2.sabey.com | https://www.sabey.com | https://www.vpn.sabey.com |",
        "https://info.sabeydatacenters.com/emailPreference/epc/404532/EcSDdxFsTp4vgdAzwbcD5rWn7oROwp5s8Buq0L48dF0/732bdcab2311714bb73d4d507e6508d215afb4dbc511",
        "1a8fc49a4265fe146976/1523680312 |  https://thebrotherssabey.com/2018/04/22/the  |  https://thebrotherssabey.com/2019/07/08/suffering",
        "https://info.sabeydatacenters.com/listUnsubscribeHeader/u/404532/732bdcab2311714bb73d4d507e6508d215afb4dbc5111a8fc49a4265fe14697",
        "https://info.sabeydatacenters.com/r/404532/1/1523680312/open/1 | http://onlyindianporn2.com/videos/dia-sabey/?p=13",
        "https://thebrotherssabey.com/category/pregnancy | https://thebrotherssabey.com/discourse | onlyindianporn2.com",
        "https://thebrotherssabey.com/2019/01/20/miracle/?share=twitter | https://thebrotherssabey.com/author/dbsabey/",
        "https://thebrotherssabey.com/author/thebrotherssabey/ | https://thebrotherssabey.com/category/homosexuality",
        "https://thebrotherssabey.com/2018/12/05/nature-of-scripture-part-5-conclusions/ | https://thebrotherssabey.com/2019/08/01/why",
        "mypornvid.fun | porn100.tv | amp.mypornvid.fun | cdn10.mypornvid.fun | cdn11.mypornvid.fun | cdn5.mypornvid.fun | cdn8.mypornvid.fun",
        "www.anyxxxtube.net | sv2.mypornvid.fun | www.porn100.tv | www.redporn.video | https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing |",
        "http://amp.mypornvid.fun/videos/2/SLFGMWoQaCU/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears",
        "anybunny.tv | http://anybunny.tv/search/eva-lisa | http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us",
        "https://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-nearby.html. |",
        "http://onlyindianporn.tv/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concent | http://wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Languauge",
        "onlyindianporn.tv | sexpornimages.com | http://www.sexpornimages.com/hillary/hillary-clinton",
        "https://mypornvid.fun/videos/3/o00vnGgcVx0/dude-sex-fuck-a-deer-wapporn-video-com/fuck-deer",
        "http://www.sexpornimages.com/tsara/tsara-lynn-brashears-porn/7x56y.html",
        "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead/ | http://videolal.com/tsara-brashears-dead-by-daylight.html",
        "http://videolal.com/tsara-brashears-dead-or-alive-song-rap.html | http://videolal.com/tsara-brashears-dead.html |",
        "https://thebrotherssabey.com/comments/feed/ | https://thebrotherssabey.com/2019/01/20/miracle/",
        "https://videolal.com/videos/tsara-brashears-dead-by-daylight.html | tsara-brashears-deadspin-twitter-suspended-account-help.ht",
        "https://thebrotherssabey.com/2018/12/05/nature | https://thebrotherssabey.com/2017/04/17/truth",
        "https://thebrotherssabey.com/2016/03/12/how | https://thebrotherssabey.com/2016/01/18/ballroom",
        "https://thebrotherssabey.com/comments/feed/ | https://thebrotherssabey.com/category/pregnancy",
        "https://thebrotherssabey.com/feed/ | https://thebrotherssabey.com/discourse | https://thebrotherssabey.com/comments/feed/",
        "https://thebrotherssabey.com/2015/08/24/why | https://thebrotherssabey.com/20 | https://thebrotherssabey.com | https://thebrotherssabey.com",
        "http://thebrotherssabey.com/2018 | https://thebrotherssabey.com/2019/01/20/miracle/ | https://thebrotherssabey.com/2019/07/08/suffering",
        "https://thebrotherssabey.com/category/pregnancy | https://thebrotherssabey.com/category/homosexuality",
        "https://thebrotherssabey.com/author/thebrotherssabey/  | https://thebrotherssabey.com/author/dbsabey/",
        "http://siteinlink.d1.cnbd.net/site/maps.google.com.lb/ | https://www.applefilmaker.com | https://www.applefilmaker.com/1odbU3D",
        "www.wwwgitlab.gitlab.git.git.gitlab.git.128-199-7-137.cprapid.com",
        "https://thebrotherssabey.wordpress.com/wp-admin/customize.php?url=https://thebrotherssabey.wordpress.com/",
        "https://hallrender.com/attorney/brian-sabey | https://thebrotherssabey.com/2019/01/20/miracle/?share=twitter",
        "storage.ladys.one ladys.one: | http://photos.ladys.one ladys.one: | http://porno.ladys.one ladys.one: | http://storage.ladys.one ladys.one: | http://xxx-videos.ladys.one ladys.one:",
        "http://www.xvxx.me/clips/nadia-ali-hardcore/199530/",
        "https://kompoz2.com/tv/454575/blonde-slut-sara-jay-with-big-ass-is-fucked-in-doggy-style.html",
        "http://onlyindianporn2.com/videos/vichatter-young-11//title/0.7292669771257236"
      ],
      "public": 1,
      "adversary": "Brian Sabey | Tulach | Sabey Data Centers",
      "targeted_countries": [
        "United States of America",
        "Netherlands",
        "United Kingdom of Great Britain and Northern Ireland"
      ],
      "malware_families": [
        {
          "id": "Win32/Tofsee.AX",
          "display_name": "Win32/Tofsee.AX",
          "target": null
        },
        {
          "id": "Trojan:Win32/Muldrop",
          "display_name": "Trojan:Win32/Muldrop",
          "target": "/malware/Trojan:Win32/Muldrop"
        }
      ],
      "attack_ids": [
        {
          "id": "T1125",
          "name": "Video Capture",
          "display_name": "T1125 - Video Capture"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1190",
          "name": "Exploit Public-Facing Application",
          "display_name": "T1190 - Exploit Public-Facing Application"
        },
        {
          "id": "T1472",
          "name": "Generate Fraudulent Advertising Revenue",
          "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1586.001",
          "name": "Social Media Accounts",
          "display_name": "T1586.001 - Social Media Accounts"
        },
        {
          "id": "T1055.013",
          "name": "Process Doppelg\u00e4nging",
          "display_name": "T1055.013 - Process Doppelg\u00e4nging"
        },
        {
          "id": "T1080",
          "name": "Taint Shared Content",
          "display_name": "T1080 - Taint Shared Content"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "69bea426487bffa5384c6f38",
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 121,
        "FileHash-SHA1": 116,
        "FileHash-SHA256": 443,
        "URL": 1878,
        "domain": 312,
        "hostname": 518,
        "email": 5,
        "CIDR": 1,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 3395,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "10 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69cf32e906000d5993f366c4",
      "name": "Habo Analysis System - & 'bye for now'",
      "description": "Habo Analysis plus other relative findings.\n\nMy opinion: Problem Size Trend : Macro. Whoever deleted files doesnt make it go away. #cryptographicfailure. Living Nightmare. The dates will reflect 2019/20 post certificate exp which adjusts to an aug 2025 sectigo cert which expired sept 8 2025 rolling into aws for auth expiring renewing ent of oct 2025 into a 5 year gap renewed same # digicert globalsign2020 seal. This cant end. But I am done here for deletions (not otx in my research who did this). To the person who did, you cooked the internet. There was one way to resolution. You failed.",
      "modified": "2026-04-03T04:05:59.805000",
      "created": "2026-04-03T03:24:25.921000",
      "tags": [
        "next associated",
        "files show",
        "date hash",
        "avast avg",
        "present dec",
        "lowfi",
        "mtb may",
        "susp",
        "code",
        "llc registrar",
        "date",
        "server",
        "admin country",
        "registry domain",
        "iana id",
        "admin city",
        "herndon tech",
        "country",
        "key identifier",
        "x509v3 subject",
        "number",
        "cgb osectigo",
        "public server",
        "dv r36",
        "validity",
        "subject public",
        "key info",
        "key algorithm",
        "cgb stgreater",
        "cnsectigo rsa",
        "secure server",
        "ca validity",
        "executable",
        "msdos win32",
        "generic windos",
        "dos executable",
        "generic"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1006,
        "FileHash-SHA1": 927,
        "FileHash-SHA256": 3665,
        "hostname": 1187,
        "IPv4": 617,
        "URL": 1315,
        "email": 2,
        "domain": 605
      },
      "indicator_count": 9324,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "16 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69cf32ecc057fb8a6c0cebb9",
      "name": "Habo Analysis System - & 'bye for now'",
      "description": "Habo Analysis plus other relative findings.\n\nMy opinion: Problem Size Trend : Macro. Whoever deleted files doesnt make it go away. #cryptographicfailure. Living Nightmare. The dates will reflect 2019/20 post certificate exp which adjusts to an aug 2025 sectigo cert which expired sept 8 2025 rolling into aws for auth expiring renewing ent of oct 2025 into a 5 year gap renewed same # digicert globalsign2020 seal. This cant end. But I am done here for deletions (not otx in my research who did this). To the person who did, you cooked the internet. There was one way to resolution. You failed.",
      "modified": "2026-04-03T03:37:54.569000",
      "created": "2026-04-03T03:24:28.040000",
      "tags": [
        "next associated",
        "files show",
        "date hash",
        "avast avg",
        "present dec",
        "lowfi",
        "mtb may",
        "susp",
        "code",
        "llc registrar",
        "date",
        "server",
        "admin country",
        "registry domain",
        "iana id",
        "admin city",
        "herndon tech",
        "country",
        "key identifier",
        "x509v3 subject",
        "number",
        "cgb osectigo",
        "public server",
        "dv r36",
        "validity",
        "subject public",
        "key info",
        "key algorithm",
        "cgb stgreater",
        "cnsectigo rsa",
        "secure server",
        "ca validity",
        "executable",
        "msdos win32",
        "generic windos",
        "dos executable",
        "generic"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 230,
        "FileHash-SHA1": 208,
        "FileHash-SHA256": 233,
        "hostname": 7,
        "IPv4": 7,
        "URL": 35,
        "email": 2,
        "domain": 5
      },
      "indicator_count": 727,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "16 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69cf32eb2d10d610b96f55e9",
      "name": "Habo Analysis System - & 'bye for now'",
      "description": "Habo Analysis plus other relative findings.\n\nMy opinion: Problem Size Trend : Macro. Whoever deleted files doesnt make it go away. #cryptographicfailure. Living Nightmare. The dates will reflect 2019/20 post certificate exp which adjusts to an aug 2025 sectigo cert which expired sept 8 2025 rolling into aws for auth expiring renewing ent of oct 2025 into a 5 year gap renewed same # digicert globalsign2020 seal. This cant end. But I am done here for deletions (not otx in my research who did this). To the person who did, you cooked the internet. There was one way to resolution. You failed.",
      "modified": "2026-04-03T03:37:54.337000",
      "created": "2026-04-03T03:24:27.416000",
      "tags": [
        "next associated",
        "files show",
        "date hash",
        "avast avg",
        "present dec",
        "lowfi",
        "mtb may",
        "susp",
        "code",
        "llc registrar",
        "date",
        "server",
        "admin country",
        "registry domain",
        "iana id",
        "admin city",
        "herndon tech",
        "country",
        "key identifier",
        "x509v3 subject",
        "number",
        "cgb osectigo",
        "public server",
        "dv r36",
        "validity",
        "subject public",
        "key info",
        "key algorithm",
        "cgb stgreater",
        "cnsectigo rsa",
        "secure server",
        "ca validity",
        "executable",
        "msdos win32",
        "generic windos",
        "dos executable",
        "generic"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 230,
        "FileHash-SHA1": 208,
        "FileHash-SHA256": 233,
        "hostname": 7,
        "IPv4": 7,
        "URL": 35,
        "email": 2,
        "domain": 5
      },
      "indicator_count": 727,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "16 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69cf32eaa2d31a34fc7913e6",
      "name": "Habo Analysis System - & 'bye for now'",
      "description": "Habo Analysis plus other relative findings.\n\nMy opinion: Problem Size Trend : Macro. Whoever deleted files doesnt make it go away. #cryptographicfailure. Living Nightmare. The dates will reflect 2019/20 post certificate exp which adjusts to an aug 2025 sectigo cert which expired sept 8 2025 rolling into aws for auth expiring renewing ent of oct 2025 into a 5 year gap renewed same # digicert globalsign2020 seal. This cant end. But I am done here for deletions (not otx in my research who did this). To the person who did, you cooked the internet. There was one way to resolution. You failed.",
      "modified": "2026-04-03T03:37:53.945000",
      "created": "2026-04-03T03:24:26.838000",
      "tags": [
        "next associated",
        "files show",
        "date hash",
        "avast avg",
        "present dec",
        "lowfi",
        "mtb may",
        "susp",
        "code",
        "llc registrar",
        "date",
        "server",
        "admin country",
        "registry domain",
        "iana id",
        "admin city",
        "herndon tech",
        "country",
        "key identifier",
        "x509v3 subject",
        "number",
        "cgb osectigo",
        "public server",
        "dv r36",
        "validity",
        "subject public",
        "key info",
        "key algorithm",
        "cgb stgreater",
        "cnsectigo rsa",
        "secure server",
        "ca validity",
        "executable",
        "msdos win32",
        "generic windos",
        "dos executable",
        "generic"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 230,
        "FileHash-SHA1": 208,
        "FileHash-SHA256": 233,
        "hostname": 7,
        "IPv4": 7,
        "URL": 35,
        "email": 2,
        "domain": 5
      },
      "indicator_count": 727,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "16 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69bf8e2663d5480917ddb699",
      "name": "Pegasus - https://house.mo.gov/ | Brian Sabey HallRender [i cloned OctoSeek] T8",
      "description": "",
      "modified": "2026-03-22T08:35:26.266000",
      "created": "2026-03-22T06:37:26.233000",
      "tags": [
        "united",
        "as393601 state",
        "a domains",
        "passive dns",
        "as397241",
        "certificate",
        "urls",
        "search",
        "showing",
        "entries",
        "algorithm",
        "full name",
        "data",
        "v3 serial",
        "number",
        "cus cndigicert",
        "global g2",
        "tls rsa",
        "sha256",
        "ca1 odigicert",
        "info",
        "record type",
        "ttl value",
        "all txt",
        "ssl certificate",
        "whois record",
        "contacted",
        "referrer",
        "resolutions",
        "historical ssl",
        "communicating",
        "problems",
        "parent domain",
        "njrat",
        "ransomware",
        "startpage",
        "historical",
        "malware",
        "execution",
        "threat roundup",
        "april",
        "september",
        "remcos rat",
        "august",
        "june",
        "qakbot",
        "push",
        "service",
        "privateloader",
        "amadey",
        "powershell",
        "qbot",
        "cobalt strike",
        "core",
        "hacktool",
        "november",
        "october",
        "roundup",
        "threat network",
        "cellbrite",
        "february",
        "emotet",
        "maze",
        "metro",
        "dark",
        "malicious",
        "team",
        "critical",
        "copy",
        "awful",
        "parallax rat",
        "banker",
        "keylogger",
        "dns replication",
        "date",
        "csc corporate",
        "domains",
        "code",
        "server",
        "registrar abuse",
        "registrar iana",
        "registry domain",
        "registrar url",
        "registrar",
        "contact phone",
        "apple ios",
        "quasar",
        "remcos",
        "ursnif",
        "chaos",
        "ransomexx",
        "azorult",
        "agent tesla",
        "evilnum",
        "asyncrat",
        "win32 exe",
        "wininit",
        "beta version",
        "cmstp",
        "taskscheduler",
        "ieudinit",
        "nat32",
        "certsentry",
        "type name",
        "wc3 rpg",
        "pegasus",
        "unknown",
        "domain",
        "servers",
        "germany unknown",
        "name servers",
        "status",
        "next",
        "as29066 host",
        "as133618",
        "cname",
        "as47846",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "encrypt",
        "china unknown",
        "as38365 beijing",
        "as134175 unit",
        "707713",
        "hong kong",
        "virgin islands",
        "as6461 zayo",
        "ransom",
        "exploit",
        "ipv4",
        "pulse submit",
        "url analysis",
        "trojan",
        "body",
        "click",
        "creation date",
        "emails",
        "expiration date",
        "domain privacy",
        "hostname",
        "dynamicloader",
        "state",
        "medium",
        "msie",
        "windows nt",
        "wow64",
        "show",
        "slcc2",
        "media center",
        "error",
        "delphi",
        "guard",
        "write",
        "win32",
        "target",
        "redir",
        "facebook",
        "dcom",
        "local",
        "delete",
        "utf8",
        "unicode text",
        "crlf line",
        "rgba",
        "yara detections",
        "default",
        "asnone",
        "get na",
        "dns lookup",
        "probe ms17010",
        "eternalblue",
        "playgame",
        "high",
        "related pulses",
        "yara rule",
        "anomalous file",
        "dynamic",
        "malware infection",
        "cnc",
        "procmem_yara",
        "antivm_generic_disk",
        "modify_proxy infostealer_cookies",
        "network_http",
        "anomalous_deletefile",
        "antidebug_guardpages",
        "powershell_request",
        "powershell_download",
        "as63949 linode",
        "mtb feb",
        "open ports",
        "backdoor",
        "gmt content",
        "trojandropper",
        "simda",
        "lockbit",
        "win.trojan",
        "midia-4",
        "floxif",
        "cryptowall",
        "brontok",
        "check in",
        "record value",
        "files",
        "location united",
        "america asn",
        "as16509",
        "download",
        "threat",
        "paste",
        "iocs",
        "analyze",
        "hostnames",
        "urls http",
        "samples",
        "tsara brashears",
        "2nd corintnthians 4:8-9",
        "injection_inter_process",
        "injection_create_remote_thread",
        "persistence_autorun",
        "bypass_firewall",
        "disables_windowsupdate",
        "dynamic_function_loading",
        "http_request",
        "query",
        "delete c",
        "activity dns",
        "components",
        "file execution",
        "observed dns",
        "as4837 china",
        "nxdomain",
        "a nxdomain",
        "wannacry",
        "missouri",
        "safebae",
        "hallrender",
        "house.mo.gov",
        "typosquatting",
        "tactics",
        "google",
        "win64",
        "khtml",
        "gecko",
        "veryhigh",
        "aes256gcm",
        "dalles",
        "cookie",
        "urls https",
        "xpcegvo2adsnq",
        "mhkz",
        "mvi2",
        "keepaliveyes",
        "fexp24007246",
        "nsyt",
        "eva reimer",
        "daisy coleman",
        "brian sabey",
        "https://lawlink.com/documents/10935/blackbag-technologies-announ"
      ],
      "references": [
        "https://house.mo.gov/ \u2022 house.mo.gov \u2022 mo.gov",
        "dns.msftncsi.com",
        "NSO Group - Pegasus: enterprise.cellebrite.com \u2022 cellebrite.com \u2022 erp002.blackbagtech.com \u2022 140.108.21.184",
        "Target\u2193\u2192 Tsara Brashears:  https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing",
        "23.216.147.64",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [Apple/ iOS unlocker password decryption]",
        "http://alohatube.xyz/search/tsara-brashears [Telecom \u2022 Brashears Telecom services modified (malicious)]",
        "alohatube.xyz [BotNetwork]",
        "facebooksunglassshop.com",
        "iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com - Lockbit Black 3.0, Observed AridViper CnC Domain, Win.Trojan.Midia-4",
        "oooooooooo.ga \u2022 rallypoint.com \u2022 pornhub.dev \u2022 chats.pornhub.dev \u2022 https://twitter.com/PORNO_SEXYBABES \u2022 https://matrix.pornhub.dev \u2022 https://git.pornhub.dev",
        "http://dobkinfamily.com/__media__/js/netsoltrademark.php?d=www.fap18pgals.eu/cum-on-ass-porn/",
        "government.westlaw.com \u2022 hero9780.duckdns.org \u2022 hallrender.com \u2022 miles-andmore.duckdns.org",
        "https://otx.alienvault.com/indicator/url/https://miles-andmore.duckdns.org/ihFKGyel4wizIPNVvHHQQIuHfl4hEb2F6gWEXupmNDuiMJgJtshSlLFmilf3zCT2EF/index.html",
        "remote.utorrent.com [remote router logins]",
        "Tracking: http://www.trackip.net/ip \u2022 gfx.ms \u2022 dssruletracker.mo.gov [network] \u2022 earlyconnections.mo.gov \u2022 www77.trackerspy.com \u2022 ww38.track.updatevideos.com",
        "http://tracking.studyportalsmail.com/about/privacy/?cdmtw=BAAAIAEAIGmGCaIK4E8-IsDv \u2022 tracking.studyportalsmail.com \u2022 plugtrack.online",
        "http://images.startappservice.com/image/fetch/f_auto \u2022 track.smtpsendemail.com \u2022 nr-data.net [apple] \u2022 lg.as35280.net \u2022 leaseway.damstracking.com",
        "http://tvm77.fashiongup.in/tracking/track-open",
        "https://www.house.mo.gov:80/messageboard/ \u2022 extranet16.mo.gov \u2022 login.mo.gov \u2022 witness.house.mo.gov \u2022 dps.mo.gov \u2022 dev-publicdefender.mo.gov",
        "https://www.hallrender.com/wp-content/uploads/2016/02/Denver-150x150.jpg",
        "http://hallrender.com/attorney/brian-sabey \u2022 https://hallrender.com/attorney/brian-sabey \u2022 https://www.hallrender.com/attorney/brian-sabey/Accept",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-150x150.png",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-266x266.png",
        "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https://www.hallrender.com/attorney/brian-sabey/&",
        "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F&",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-48x48.png \u2022 http://2fwww.hallrender.com/",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-406x406.png \u2022 https://vcards.hallrender.com/",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-300x300.png \u2022 http://mail2.hallrender.com/",
        "hallrender.com \u2022 government.westlaw.com \u2022 http://dev.hallrender.com/ \u2022 https://mercy.hallrender.com/ \u2022 autodiscover.hallrender.com",
        "http://web2.westlaw.com/find/default.wl?tf=-1&rs=WLW9.10&referencepositiontype=S&serialnum=1987042953&fn=_top&sv=Split&referenceposition=1555&pbc=D5845283&tc=-1&ordoc=1989026578&findtype=Y&db=708&vr=2.0&rp=/find/default.wl&mt=208",
        "https://otx.alienvault.com/indicator/ip/45.56.79.23 \u2022 batchcourtexpressservices.westlaw.com \u2022 courtexpress.westlaw.com",
        "safebae.org \u2022 rp.dudaran2.com \u2022 www.safebae.org \u2022 https://safebae.org/%20%5B \u2022 https://safebae.org/about/ \u2022 https://safebae.org/",
        "https://safebae.org/wp-content/plugins/addons-for-visual-composer/assets/js/slick.min.js?ver=2.9.2 \u2022 https://api.w.org/ \u2022 247.0.198.104.bc.googleusercontent.com",
        "https://safebae.org/wp-json/ \u2022 https://safebae.org/wp-content/plugins/embed-any-document/css/embed-public.min.css?ver=2.7.4",
        "Malware Hosting: http://81.5.88.13/dbreader.exe \u2022 http://utasoft.ru/catalog/view/javascript/jquery/ui/jquery-ui-1.8.16.custom.min.js",
        "Apple Malware: http://103.246.145.111/gateonl.php?hwid=WALKER-PC-WALKER&cpuname=Intel [ Apple unlocker, decryption via media]",
        "Malware Hosting: deviceinbox.com \u2022 http://www.hakoonportal.net/240714d/240714_t2.exe \u2022103.246.145.111 \u2022 Spyware: stream.ntpserver.store",
        "https://nl.toyota.be/tme [vehicle spyware, camera, data, speakers]",
        "http://link.mcsa.org/api/LinkHandler/getaction?redirectParam2=K09weU5vMDBKWW90Wk1hcHl4SmF4NGtHbnBGbjJaVElud2tpMlBaUGhseXZNM0JLaHRaUnJZOVh1bmMvSVhYWDZhb0UwY2hPaGVuSGNDRUFYeHNzWWFQL0dBNVlRVmlTSGpXa016bUQzWUZ6cVZRcktRTmRyZHJPYlBrY1NpSyt6ZzBrS0FjWk9EYSs4WmdOc2RBU09CR1RjWVNiTUZpYkhNV1lvNzkwbzhLMUxDUzQzS0FaVU5LYTZWSUZoS1Vt",
        "sexuallybroken.info \u2022 sinful-bordello.top-sex.us \u2022 crackedtool.com \u2022 kddi-cloud.com \u2022 http://tuksex.duckdns.org/bb/login.php",
        "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software"
      ],
      "public": 1,
      "adversary": "NSO Group",
      "targeted_countries": [
        "United States of America",
        "China",
        "Australia",
        "Hong Kong"
      ],
      "malware_families": [
        {
          "id": "Agent Tesla",
          "display_name": "Agent Tesla",
          "target": null
        },
        {
          "id": "Amadey",
          "display_name": "Amadey",
          "target": null
        },
        {
          "id": "AsyncRAT",
          "display_name": "AsyncRAT",
          "target": null
        },
        {
          "id": "AZORult",
          "display_name": "AZORult",
          "target": null
        },
        {
          "id": "Chaos",
          "display_name": "Chaos",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "EVILNUM",
          "display_name": "EVILNUM",
          "target": null
        },
        {
          "id": "Dark",
          "display_name": "Dark",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Keylogger",
          "display_name": "Keylogger",
          "target": null
        },
        {
          "id": "Maze",
          "display_name": "Maze",
          "target": null
        },
        {
          "id": "NjRAT",
          "display_name": "NjRAT",
          "target": null
        },
        {
          "id": "Parallax RAT",
          "display_name": "Parallax RAT",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "QakBot",
          "display_name": "QakBot",
          "target": null
        },
        {
          "id": "QBot",
          "display_name": "QBot",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "RansomEXX",
          "display_name": "RansomEXX",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Remcos RAT",
          "display_name": "Remcos RAT",
          "target": null
        },
        {
          "id": "Ursnif",
          "display_name": "Ursnif",
          "target": null
        },
        {
          "id": "Win.Trojan.Agent-336074",
          "display_name": "Win.Trojan.Agent-336074",
          "target": null
        },
        {
          "id": "Arid.Viper_CnC",
          "display_name": "Arid.Viper_CnC",
          "target": null
        },
        {
          "id": "WininiCrypt",
          "display_name": "WininiCrypt",
          "target": null
        },
        {
          "id": "PWS:Win32/QQpass.CI",
          "display_name": "PWS:Win32/QQpass.CI",
          "target": "/malware/PWS:Win32/QQpass.CI"
        },
        {
          "id": "Win.Trojan.Midia-4",
          "display_name": "Win.Trojan.Midia-4",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "Win32/SocStealer!rfn",
          "display_name": "Win32/SocStealer!rfn",
          "target": null
        },
        {
          "id": "Backdoor.Win32.Shiz.ufj",
          "display_name": "Backdoor.Win32.Shiz.ufj",
          "target": null
        },
        {
          "id": "Email-Worm.Win32.Brontok.n",
          "display_name": "Email-Worm.Win32.Brontok.n",
          "target": null
        },
        {
          "id": "ETERNALBLUE",
          "display_name": "ETERNALBLUE",
          "target": null
        },
        {
          "id": "WannaCry",
          "display_name": "WannaCry",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65c91f2b7c03b480379ae4d1",
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2668,
        "FileHash-SHA1": 2469,
        "FileHash-SHA256": 8054,
        "URL": 6185,
        "domain": 2421,
        "hostname": 3042,
        "CVE": 5,
        "email": 15,
        "CIDR": 1,
        "IPv4": 18
      },
      "indicator_count": 24878,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "28 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69bf261cc4e399447d78776c",
      "name": "Cyber Bully Attackers | Revenge Attacks | Remote attackers | Malware Packed |",
      "description": "Several government entities, attorneys have sought porn revenge including physical violence, attempted crimes, malicious prosecution case , harassment when a female patient of man formerly known as Jeffrey Scott Reimer of Chester Springs, PA, violently, critically injured patient in a sexually charged assault [URL\thttp://foundry2-lbl.dvr.dn2.n-helix.com\t\t\t\nhttps://foundry2-lbl.dvr.dn2.n-helix.com\t\tfoundry2-lbl.dvr.dn2.n-helix.com\t\t\t\t\thttps://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/\t\t\nhttp://datafoundry.com\t\t\t\nhttp://foundry2sdbl.dvr.dn2.n-helix.com\t\t\thttps://209-99-40-223.fwd.datafoundry.com\t\t\t\ndatafoundry.com",
      "modified": "2026-03-21T23:13:32.760000",
      "created": "2026-03-21T23:13:32.760000",
      "tags": [
        "sc data",
        "data upload",
        "please sub",
        "include data",
        "extraction",
        "failed",
        "sc pulse",
        "idron anv",
        "extr please",
        "include review",
        "exclude sugges",
        "stop show",
        "typ domain",
        "united",
        "virtool",
        "name servers",
        "cryp",
        "emails",
        "win32",
        "ip address",
        "worm",
        "trojan",
        "learn",
        "suspicious",
        "informative",
        "ck id",
        "name tactics",
        "command",
        "adversaries",
        "spawns",
        "ssl certificate",
        "initial access",
        "link initial",
        "prefetch8",
        "mitre att",
        "ck matrix",
        "flag",
        "windows nt",
        "win64",
        "accept",
        "encrypt",
        "form",
        "hybrid",
        "bypass",
        "general",
        "path",
        "iframe",
        "click",
        "strings",
        "anchor https",
        "anchor",
        "liberal",
        "sabey",
        "liberal friends",
        "meta",
        "html internet",
        "html document",
        "unicode text",
        "utf8 text",
        "info initial",
        "access ta0001",
        "compromise",
        "t1189 network",
        "communication",
        "get http",
        "artifacts v",
        "full reports",
        "v get",
        "help dns",
        "resolutions",
        "ip traffic",
        "extr data",
        "enter sc",
        "extra data",
        "referen",
        "broth",
        "passive dns",
        "urls",
        "http",
        "hostname",
        "files domain",
        "files related",
        "related tags",
        "none google",
        "safe browsing",
        "inquest labs",
        "lucas acha",
        "code integrity",
        "checks creation",
        "otx logo",
        "all hostname",
        "files",
        "domain",
        "protect",
        "date",
        "title",
        "exchange",
        "se http",
        "present jan",
        "present feb",
        "present dec",
        "backdoor",
        "certificate",
        "all domain",
        "alibaba cloud",
        "hichina",
        "porkbun llc",
        "cloudflare",
        "namecheap inc",
        "namecheap",
        "domains",
        "dynadot llc",
        "ascio",
        "denmark",
        "url https",
        "filehashsha256",
        "url http",
        "dopple ai",
        "snit",
        "iocs",
        "otx description",
        "information",
        "report spam",
        "delete service",
        "poem",
        "hunter",
        "malicious",
        "porn revenge",
        "brian sabeys",
        "all report",
        "spam delete",
        "rl http",
        "https",
        "expiration http",
        "spam brian",
        "swipper",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "filehashmd5",
        "filehashsha1",
        "sha256",
        "scan",
        "learn more",
        "indicators show",
        "tbmvid",
        "sourcelnms",
        "zx1724209326040",
        "xxx videos",
        "xxxvideohd",
        "adversary",
        "packing",
        "palantir.com",
        "discovery",
        "victim won case",
        "doin it",
        "palantirian abuse",
        "apple",
        "sabey data centers",
        "insurance",
        "quasi government",
        "the brother sabey",
        "reimer",
        "law enforcement",
        "vessel state",
        "sabey porn",
        "hall evans",
        "christopher ahmann",
        "defamation",
        "google"
      ],
      "references": [
        "The Brothers Sabey \u2013 Conservatives with Liberal Friends \u2022 https://thebrotherssabey.com/",
        "http://watchhers.net/index.php",
        "http://212.33.237.86/images/1/report.php",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://webmail.police.govmm.org/owa/",
        "https://pks.wroclaw.sa.gov.pl:1443/ \u2022 portal.bialystok.sa.gov.pl",
        "https://tulach.cc/ phishing \u2022 45.32.112.220 scanning_host \u2022 45.76.79.215",
        "Mark Brian Sabey",
        "Melvin Sabey",
        "Christopher P \u2018Buzz\u2019 Ahmann",
        "Ronda Cordova",
        "Unknown Persons impersonating Private Investigators (plural)",
        "Quasi Government Case",
        "Victim silenced. Struck by Car Driven by male police let walk",
        "Denver Police let this attempted murder walk. Cited him as a ghost driver",
        "Make driver stuck victim with large vehicle after PT unknowingly reported original assault Jeffrey Reiner to Dora",
        "Sexual and Physical Assaulter - Jeffrey Scott Reimer",
        "Reimer was a PT. Unknown whereabouts , name or job description",
        "Denver Police Department Major Crimes closed investigation",
        "Investigation closed when Brian Sabey initiated a malicious prosecution case against Victim",
        "I bring up the personal nature of the crime because a delete service has been used",
        "More than 1000 IoC\u2019s including pulses have been ILLEGALLY removed",
        "All IoC\u2019s originate from sources named. There are some unknown attackers",
        "This is a serious crime. I\u2019m certain God WILL pay them.",
        "https://palantirwww.sweetheartvideo.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t3\t  domain\tpalantir.io\t\t\tMar 21, 2026, 2:06:10 PM\t\t34\t  URL\thttps://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/ \u2022 www.palantir.com",
        "http://palantirwww.sweetheartvideo.com/ (weirdness)",
        "http://foundry2-lbl.dvr.dn2.n-helix.com \u2022 https://foundry2-lbl.dvr.dn2.n-helix.com",
        "foundry2-lbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t29\t  URL\thttps://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/\t\t\tMar 21, 2026, 2:06:10 PM\t\t8\t  URL\thttp://datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t9\t  URL\thttp://foundry2sdbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t17\t  URL\thttps://209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t27\t  domain\tdatafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t40\t  hostname\t209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:1",
        "foundry2-lbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t29\t  URL\thttps://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/\t\t\tMar 21, 2026, 2:06:10 PM\t\t8\t  URL\thttp://datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t9\t  URL\thttp://foundry2sdbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t17\t  URL\thttps://209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t27\t  domain\tdatafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t40\t  hostname\t209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:1",
        "https://rdweb.datafoundry.com/RDWeb/Pages/en-US/login.aspx",
        "https://www.datafoundry.com/data-center-contamination-control/",
        "https://www.datafoundry.com/data-center-contamination-control/",
        "https://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/",
        "http://foundry2-lbl.dvr.dn2.n-helix.com/",
        "https://207-207-25-201.fwd.datafoundry.com/",
        "http://datafoundry.com \u2022 http://foundry2sdbl.dvr.dn2.n-helix.com \u2022 https://209-99-40-223.fwd.datafoundry.com \u2022 datafoundry.com \u2022 209-99-40-223.fwd.datafoundry.com \u2022 beabetta.ifoundry.co.uk.s7b2.psmtp.com \u2022 foundry2sdbl.dvr.dn2.n-helix.com \u2022 fwd.datafoundry.com \u2022 207-207-25-154.fwd.datafoundry.com \u2022 207-207-25-156.fwd.datafoundry.com\t\t\t207-207-25-160.fwd.datafoundry.com \u2022 207-207-25-163.fwd.datafoundry.com  \u2022\t207-207-25-164.fwd.datafoundry.com \u2022 207-207-25-165.fwd.datafoundry.com\t\t\tMar 21, 207-207-25-166.fwd",
        "http://datafoundry.com \u2022 https://209-99-40-223.fwd.datafoundry.com\tdatafoundry.com \u2022 209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t13\t  hostname\tbeabetta.ifoundry.co.uk.s7b2.psmtp.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t12\t  hostname\tfoundry2sdbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t18\t  hostname\tfwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t8\t  hostname\t207-207-25-154.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t19\t  hostname\t207-207-25-156.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:1",
        "https://rdweb.datafoundry.com/",
        "https://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/",
        "http://foundry2sdbl.dvr.dn2.n-helix.com/",
        "Updated | What\u2019s left after theft",
        "207-207-25-167.fwd.datafoundry.com \u2022 207-207-25-168.fwd.datafoundry.com \u2022 207-207-25-169.fwd.datafoundry.com",
        "207-207-25-170.fwd.datafoundry.com \u2022 207-207-25-171.fwd.datafoundry.com \u2022 207-207-25-201.fwd.datafoundry.com",
        "https://www.datafoundry.com/category/news/press-releases/ (Fake Press) abuse",
        "https://www.datafoundry.com/category/news/press-releases/",
        "207-207-25-209.fwd.datafoundry.com \u2022\t207-207-25-212.fwd.datafoundry.com \u2022 207-207-25-213.fwd.datafoundry.com \u2022 209-99-64-53.fwd.datafoundry.com",
        "209-99-69-91.fwd.datafoundry.com \u2022 dns1.datafoundry.com \u2022 dns2.datafoundry.com \u2022 rdweb.datafoundry.com",
        "www.go.datafoundry.com \u2022 http://207-207-25-209.fwd.datafoundry.com",
        "http://209-99-64-53.fwd.datafoundry.com \u2022 http://dns2.datafoundry.com \u2022 http://fwd.datafoundry.com",
        "http://pdns1.datafoundry.com/ \u2022\thttp://rdweb.datafoundry.com \u2022 http://rdweb.datafoundry.com/",
        "https://rdweb.datafoundry.com/ \u2022 http://www.datafoundry.com \u2022 https://207-207-25-163.fwd.datafoundry.com \u2022",
        "https://207-207-25-209.fwd.datafoundry.com \u2022 https://209-99-40-224.fwd.datafoundry.com/",
        "https://209-99-64-53.fwd.datafoundry.com \u2022 https://dns1.datafoundry.com \u2022 https://dns2.datafoundry.com \u2022 https://fwd.datafoundry.com",
        "Some may may find this content is very disturbing and offensive"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Porn Revenge",
          "display_name": "Porn Revenge",
          "target": null
        },
        {
          "id": "Tons of Malware",
          "display_name": "Tons of Malware",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1132.001",
          "name": "Standard Encoding",
          "display_name": "T1132.001 - Standard Encoding"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1125",
          "name": "Video Capture",
          "display_name": "T1125 - Video Capture"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1495",
          "name": "Firmware Corruption",
          "display_name": "T1495 - Firmware Corruption"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1587.001",
          "name": "Malware",
          "display_name": "T1587.001 - Malware"
        },
        {
          "id": "T1608.001",
          "name": "Upload Malware",
          "display_name": "T1608.001 - Upload Malware"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1586.001",
          "name": "Social Media Accounts",
          "display_name": "T1586.001 - Social Media Accounts"
        },
        {
          "id": "T1593.001",
          "name": "Social Media",
          "display_name": "T1593.001 - Social Media"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1080",
          "name": "Taint Shared Content",
          "display_name": "T1080 - Taint Shared Content"
        },
        {
          "id": "T1190",
          "name": "Exploit Public-Facing Application",
          "display_name": "T1190 - Exploit Public-Facing Application"
        },
        {
          "id": "T1472",
          "name": "Generate Fraudulent Advertising Revenue",
          "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
        },
        {
          "id": "T1586",
          "name": "Compromise Accounts",
          "display_name": "T1586 - Compromise Accounts"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1456",
          "name": "Drive-by Compromise",
          "display_name": "T1456 - Drive-by Compromise"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1584",
          "name": "Compromise Infrastructure",
          "display_name": "T1584 - Compromise Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6034,
        "domain": 1422,
        "IPv4": 883,
        "FileHash-MD5": 274,
        "FileHash-SHA1": 252,
        "FileHash-SHA256": 3378,
        "email": 11,
        "hostname": 2753,
        "CVE": 1,
        "SSLCertFingerprint": 9,
        "IPv6": 32
      },
      "indicator_count": 15049,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "28 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "hallrender.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "hallrender.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776610155.8624437
}