{
  "type": "URL",
  "indicator": "https://e.event.target",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://e.event.target",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3166291949,
      "indicator": "https://e.event.target",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 50,
      "pulses": [
        {
          "id": "69cc876e1a85eb578af3460c",
          "name": "Gatsby.",
          "description": "The results of an analysis of data gathered from a single web address are published on the website of the University of California, San Francisco, as part of its 2016/17 Research into Open Access.<pretext.fb43553d906781edd1ae894cf50d7735a1207fcad1123eb837d55eb4d448fed4",
          "modified": "2026-04-13T23:15:43.048000",
          "created": "2026-04-01T02:48:14.165000",
          "tags": [
            "a nxdomain",
            "unknown",
            "ip address",
            "domain",
            "present jun",
            "files",
            "ip related",
            "pulses otx",
            "pulses",
            "tags",
            "number",
            "ja3s",
            "get http",
            "ja3 client",
            "ja3 server",
            "ssdeep",
            "file type",
            "magic ascii",
            "crlf line",
            "trid digital",
            "unix",
            "cache entry",
            "zstandard",
            "dictionary id",
            "extra info",
            "process",
            "performs dns",
            "urls",
            "domain ip",
            "tls version",
            "https"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 272,
            "domain": 168,
            "hostname": 281,
            "FileHash-MD5": 170,
            "FileHash-SHA1": 51,
            "FileHash-SHA256": 113,
            "IPv4": 14,
            "email": 6
          },
          "indicator_count": 1075,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "5 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ed117e2308a042e50e1e9e",
          "name": "Investigation of Distribution Vectors and Threat Network Infrastructure",
          "description": "Targets: Individual(s), University of Alberta Infrastructure, Covenant Health (Alberta Health Services), TELUS Communications (Network & Mobile infrastructure), Government of Alberta, Government of Canada. International entities spanning primarily government, healthcare, and educational institutions.",
          "modified": "2025-11-23T23:20:07.571000",
          "created": "2023-08-28T21:28:30.294000",
          "tags": [
            "Domains",
            "ip addresses",
            "URLs",
            "Files",
            "Alberta Health Services",
            "BEC",
            "Education",
            "University of Alberta",
            "Government of Alberta",
            "Covenant Health Alberta",
            "Telus Communications",
            "Canadian Universities",
            "Malicious Certificates",
            "Digital Identity Theft / Credential Theft"
          ],
          "references": [
            "https://www.virustotal.com/gui/collection/27233a89c864ba0e77e672a8909fd63b4a8b6d457c9e4ff219f2a3e47db13376",
            "https://www.virustotal.com/gui/collection/50919d9e9d6d71522b641a3907ed32093293c400a2ae4faaab142f175c48de4b",
            "https://www.virustotal.com/gui/collection/bb0c0633dbe98b659fb06e07acd6e1f51ca43d3a1b4be09b4e9bfe8b3fde0cdb",
            "https://www.virustotal.com/gui/collection/b8a6d1fcd73207ba46eae6806b946c4b539f301e718f3fba21fa4e797d4b5783",
            "https://www.virustotal.com/gui/collection/bd65940df2423788fcc8623495dfdafdfd4236d93533db0256db5ff4347b65f9",
            "https://www.virustotal.com/gui/collection/2c8e8189f77f80c97f4192dff56750f9603651db2cc6cca045f53e274f4b090e",
            "https://www.virustotal.com/gui/collection/be10f2ed2776b9b4028ac868814ab14bdd576ca5e5bce877ac2954389ba9d328",
            "https://www.virustotal.com/gui/collection/33a61b144ffdece76551464e76866ab59346f0fa3f1f97380b401c1ac3f0d305",
            "https://www.virustotal.com/gui/collection/d142f78015e1c929cedae31dba7e5b735b6dedfc31e4759d8ec5f02c16328b98",
            "https://www.virustotal.com/gui/collection/02bef6a3cf1a035ad5bfb238cac2e913f4ed9425847d7cec5e7dc4097aa3c352",
            "https://www.virustotal.com/gui/collection/343b947063e58a53ca281f5ad54a72a7fa1b9b6e4c1ca84de6202b99e3126327/summary",
            "https://www.virustotal.com/gui/collection/3bf1c0922ee6f4d041effbf9f72a21a1e9f4b38d0593cfbeaca24851cf712eac",
            "https://www.virustotal.com/gui/collection/2cdadbf6aa2ec4f9815c038b0e9375b1475ac7e049fd123861d6e925e7802c6a",
            "https://www.virustotal.com/gui/collection/ba238f4d585b87abb85c126f927090cb866facfa9e4e2e0db8e307aff553397d",
            "https://www.virustotal.com/gui/collection/385f419c1c3733dd9dd151d4403bdb38cb24d12c21f18ce8f4f41d818d7a12a5/summary",
            "https://www.virustotal.com/gui/collection/9220d9375ebb4289fdbc4a7aac232b75a5c1b01e5e27edd965982bc6fe28f0e2",
            "https://www.virustotal.com/gui/collection/343b947063e58a53ca281f5ad54a72a7fa1b9b6e4c1ca84de6202b99e3126327",
            "https://www.virustotal.com/gui/collection/fd8ebe64d72b2ad9e90773791522c3ec5863868dc3b9c58a929c6b4e01bb3042",
            "https://www.virustotal.com/gui/collection/8d65d93130b4775903adbffbb53820d40bb9425dcf1848b806ffee65ee883984",
            "https://www.virustotal.com/gui/collection/385f419c1c3733dd9dd151d4403bdb38cb24d12c21f18ce8f4f41d818d7a12a5",
            "https://www.virustotal.com/gui/collection/6434f0cf09638991baf3be289834696b46e11c4c6cbe1e7b9548f9ac27372b53",
            "https://www.virustotal.com/gui/collection/bc7e252dcc07855314e153efe890d70e7a7e9b8a743e171eac31e5951260c1b7",
            "https://www.virustotal.com/gui/collection/dbf356b0a281fa94308e2e24738d839491491bfb2defa4e6c42662646e52c8f8",
            "https://www.virustotal.com/gui/collection/f60b8061133367a1047262a1e90d54cd72de4d59885c267906c6eeb557a35500",
            "https://www.virustotal.com/gui/collection/da124f42943c08f1cafdc1c42635457b0c69ccce41b4031263af3235717996a2/summary",
            "https://www.virustotal.com/gui/collection/daab0521ae533cbdfeec047e51a9499aedfd27c8cc05c644950126c1947131f9",
            "https://www.virustotal.com/gui/collection/12100cb4982365cfe5122fcedda2c084d60cebe09314846cae980c36fc90fc8c/iocs",
            "https://www.virustotal.com/graph/embed/g9219350397134ff3a645319a88b67833077c9cf0f50d4979aa0239a3d0b6ecea?theme=dark",
            "https://www.virustotal.com/gui/collection/c1ea74232c607b23ded09484664f00ae58f911ccb82433d042056cbb84c9d602",
            "https://www.virustotal.com/gui/collection/c1ea74232c607b23ded09484664f00ae58f911ccb82433d042056cbb84c9d602/graph",
            "https://www.virustotal.com/gui/collection/c1ea74232c607b23ded09484664f00ae58f911ccb82433d042056cbb84c9d602/iocs",
            "https://www.virustotal.com/gui/collection/da35693aa528a682ca91aee332c8155d99ac8e4a13077cc73b2a8921c8fea36b",
            "https://www.virustotal.com/gui/collection/1497c56a475d73236c67292964eabd7f8961f88c57fa5a2e3f30720dc29a51e7",
            "https://www.virustotal.com/gui/collection/8228434e85241bd42ae063de8cf2ee2afb86f0848675ed11e3f33b967e8c3c7c",
            "https://www.virustotal.com/gui/collection/aabd4abecf7099202ccbfbc1cec130ea266329ade38b040169399c6abf97a188",
            "https://www.virustotal.com/gui/collection/6a4e699473879d39e15ed7cd130f2ee9543f842b92c9ad8b78e310968f4b086f",
            "https://www.virustotal.com/graph/embed/g3dae42eb79cc447182e3a3dd746e462f0903d71c784d4f5cacf970954deea221?theme=dark",
            "https://www.virustotal.com/graph/embed/gc0d82762363b4aa88991027c391afdbfe9585395bd8d4273bbe09907fbfaf532?theme=light",
            "https://www.virustotal.com/graph/embed/g78ea5ea9b68b4a4bbcd2bc078e23b321985e72d90da146c19d8d80ede366c1fa?theme=dark",
            "https://www.virustotal.com/gui/collection/8f89eb9579ca53d15294ec27a4c1e763998ce57d3644ea746621d9fe0cb57e55/iocs",
            "https://www.virustotal.com/graph/g994d0094226240eba65c081dfbc3e4936aa010abf4db48049e3a964e7c5ad076",
            "https://www.virustotal.com/gui/collection/86f3d77a28744357c14d92dba7ac6302d57700308c64b641513119d8fcad411f/iocs",
            "https://www.virustotal.com/graph/g38632f8b939b443ab3b69f6a3171d02ffd2696a0f3714325a84b9a5f227a7d1c",
            "https://www.virustotal.com/gui/collection/4b166c2c1752d85215da951b15a065688bfe24ea92c65228a45ded6f2d94685b/iocs",
            "https://www.virustotal.com/graph/embed/g798b5e01446c4711ba22802009d71f5ba78553df16794088a907ae7456e2a017?theme=dark",
            "https://www.virustotal.com/gui/collection/86f3d77a28744357c14d92dba7ac6302d57700308c64b641513119d8fcad411f",
            "https://www.virustotal.com/gui/collection/a6a81c8412b19ac6357a7c6e978c31a38d52a75fbb3b2e44f0f1a2bf0deb8a58/iocs",
            "https://www.virustotal.com/graph/embed/g699a7b9bfb324855859555181d01666c372310cf233441e08a095459b3394dea?theme=dark",
            "https://www.virustotal.com/graph/embed/g6a67af8ffa22446da35d6989d7d0bc47efcd295eb893471e9b4912080c1dddef?theme=dark",
            "https://www.virustotal.com/graph/embed/g23481631a7c745c6ba19f72ce9f853643d17706c08ab44eb8851eb5c56c0f073?theme=dark",
            "https://www.virustotal.com/graph/embed/g3b316b58b8c54064b322b2e186d62950d7632add2f3f408f8d8a1706563fd3c0?theme=dark",
            "https://www.virustotal.com/graph/embed/g994d0094226240eba65c081dfbc3e4936aa010abf4db48049e3a964e7c5ad076?theme=dark",
            "https://www.virustotal.com/graph/g40f442f2b5d64cba818cac88855ba4ce274d109ce4ef4fb496f1af4efb993886",
            "https://www.virustotal.com/gui/collection/0c9360cb9f8601bd6cdf912eb414d67902487f0c4eec96e952377e300ff4e983/iocs",
            "https://www.virustotal.com/gui/collection/a1866f4c7dbc79920d0c7e914a3bace0d3dc424a2aac06bf30bf724c6c8b0375/iocs",
            "https://www.virustotal.com/gui/collection/82dc29932b9184d02b037289fd4605c158e96a57f376b08a8b2b94e43d0ae18b/iocs",
            "https://viz.greynoise.io/ip/analysis/ae06b3b5-c746-4b44-b2ac-19bb3aea14a1 [11.23.25 - 1000ipv4]"
          ],
          "public": 1,
          "adversary": "Unknown APT Group(s) / Threat Actor (s)",
          "targeted_countries": [
            "Canada",
            "United States of America",
            "Philippines",
            "Panama",
            "Netherlands",
            "Anguilla",
            "Saint Vincent and the Grenadines",
            "Aruba",
            "Mexico",
            "Guatemala",
            "Costa Rica",
            "Tanzania, United Republic of"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Education",
            "Healthcare",
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 111,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 236,
            "FileHash-SHA1": 139,
            "FileHash-SHA256": 1421,
            "URL": 9580,
            "CIDR": 30,
            "domain": 10205,
            "email": 12,
            "hostname": 517612,
            "IPv4": 11,
            "CVE": 62
          },
          "indicator_count": 539308,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 145,
          "modified_text": "146 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6842489989d6db4d41fd8322",
          "name": "Vulnerable Driver Load",
          "description": "Here is the full list of malicious Windows drivers, which can be blocked with the help of a special tool, or a built-in system, if you want to know what to do with it.",
          "modified": "2025-07-06T01:00:17.231000",
          "created": "2025-06-06T01:47:05.317000",
          "tags": [
            "malicious",
            "vulnerable",
            "living",
            "land drivers",
            "premium",
            "windows",
            "feel",
            "strong",
            "json",
            "sysmon",
            "subdomains",
            "whasz",
            "html internet",
            "magia dokument",
            "html",
            "ascii",
            "z bardzo",
            "triid plik",
            "magika html",
            "rozmiar",
            "zgoszenie",
            "error",
            "100255",
            "255100",
            "number",
            "e100",
            "100i100n",
            "65535255",
            "25565535",
            "mmm d",
            "typeof window",
            "null",
            "bubble",
            "radar",
            "false",
            "click",
            "isitem",
            "dark",
            "copy",
            "shell",
            "panelbox",
            "document",
            "code",
            "body",
            "light",
            "mark",
            "date",
            "scroll",
            "target",
            "blank",
            "back",
            "main",
            "lowfi"
          ],
          "references": [
            "https://loldrivers.io/",
            "https://www.loldrivers.io/js/chart.min.js",
            "https://www.loldrivers.io/js/bundle.7cd1a644ff4540d19bfa43f193df74afce746a0213920f45d73bf720542f682d81b6ad0320242744d332512cfb63eac5790fab1a240d6e6c8cb89f25fcacfbd7.js",
            "https://www.loldrivers.io/favicons/browserconfig.xml"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1885,
            "FileHash-SHA1": 1367,
            "FileHash-SHA256": 1615,
            "hostname": 214,
            "domain": 52,
            "URL": 468,
            "CVE": 2
          },
          "indicator_count": 5603,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 123,
          "modified_text": "287 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "67a7f06a5d0f22ad92684646",
          "name": "WebForm.com.gov.pl/CEIDG/ScriptResource.axd",
          "description": "The following is the full text of the WebForm.com.gov.pl/CEIDG/ScriptResource.axd, following the following:.au, for the first time.",
          "modified": "2025-05-14T21:27:17.040000",
          "created": "2025-02-09T00:01:46.054000",
          "tags": [
            "null",
            "nie mona",
            "array",
            "input",
            "nonmsdombrowser",
            "object",
            "html",
            "component",
            "body",
            "horizontal",
            "date",
            "calendar",
            "february",
            "april",
            "june",
            "august",
            "iframe",
            "form",
            "friday",
            "explorer",
            "target",
            "error",
            "legend",
            "this",
            "type",
            "regexp",
            "elem",
            "index",
            "function",
            "handle",
            "check",
            "safari",
            "expando",
            "android",
            "false",
            "hooks",
            "copy",
            "prop",
            "class",
            "mark",
            "window",
            "code",
            "capture",
            "accept",
            "seed",
            "override",
            "hook",
            "look",
            "loop",
            "install",
            "pass",
            "enough",
            "bind",
            "core",
            "local",
            "verify",
            "done",
            "find",
            "internal",
            "inject",
            "possible",
            "hold",
            "middle",
            "guard",
            "fall",
            "stop",
            "panic",
            "back",
            "restrict",
            "speed",
            "turn",
            "grab",
            "getclass",
            "jquery",
            "bubble",
            "anchor",
            "shift"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1134",
              "name": "Access Token Manipulation",
              "display_name": "T1134 - Access Token Manipulation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1143,
            "domain": 155,
            "hostname": 523,
            "FileHash-SHA256": 151
          },
          "indicator_count": 1972,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 122,
          "modified_text": "340 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66246ff49ed29ea9bb2bf122",
          "name": "S\u0105d Rejonowy w Jeleniej Gorze  POLAND",
          "description": "Przechowywania lub dost\u0119pu do plik\u00f3w cookies w Twojej przegl\u0105darce\nhttps://www.virustotal.com/gui/domain/jelenia-gora.sr.gov.pl/relations",
          "modified": "2025-05-14T21:18:36.989000",
          "created": "2024-04-21T01:46:28.554000",
          "tags": [
            "jeleniej grze",
            "aktualnoci",
            "informacje",
            "jednostka",
            "rejonowy",
            "konkurs",
            "najczciej",
            "sd rejonowy",
            "przejd",
            "czytaj",
            "click",
            "sdzia jarosaw",
            "wydziau",
            "sdzia grzegorz",
            "katarzyna",
            "rudnicka dane",
            "kontaktowe sd",
            "jelenia gra",
            "mickiewicza",
            "zawarto",
            "html",
            "nazwa meta",
            "robotw",
            "telefon",
            "brak",
            "skala",
            "ua zgodna",
            "head body",
            "zasb",
            "cname",
            "kod odpowiedzi",
            "kodowanie treci",
            "wygasa",
            "gmt serwer",
            "pragma",
            "kontrola pamici",
            "podrcznej",
            "data",
            "gmt kontrola",
            "dostpuzezwl na",
            "czytaj wicej",
            "sd okrgowy",
            "jednostki",
            "okrgowy",
            "ogoszenia",
            "sha256",
            "vhash",
            "ssdeep",
            "https odcisk",
            "palca jarma",
            "https dane",
            "v3 numer",
            "odcisk palca",
            "tworzy katalog",
            "tworzy pliki",
            "typ pliku",
            "json",
            "ascii",
            "windows",
            "sqlite",
            "foxpro fpt",
            "links typ",
            "mapa",
            "152 x",
            "sqlite w",
            "sha1",
            "sha512",
            "file size",
            "b file",
            "testing",
            "komornik sdowy",
            "sdzie rejonowym",
            "tomasz rodacki",
            "obwieszczenie",
            "komornicze",
            "tumacza migam",
            "tumacz czynny",
            "zamknite",
            "wiadczenia",
            "schedule",
            "error",
            "javascript",
            "bakers hall",
            "ixaction",
            "script",
            "ixchatlauncher",
            "compatibility",
            "com dla",
            "t1055 pewno",
            "unikanie obrony",
            "t1036 maskarada",
            "t1082 pewno",
            "informacje o",
            "nazwa pliku",
            "dokument pdf",
            "rozmiar pliku",
            "zapowied",
            "type",
            "iii dbt",
            "utf8",
            "dziennik"
          ],
          "references": [
            "S?d Rejonowy w Jeleniej G\u00f3rze.htm",
            "II Wydzia? Karny - S?d Rejonowy w Jeleniej G\u00f3rze 1.htm",
            "http://www.jelenia-gora.so.gov.pl/",
            "https://www.jelenia-gora.so.gov.pl/",
            "http://www.jelenia-gora.sr.gov.pl/ogloszenia-komornicze",
            "https://tlumacz.migam.org/sad_rejonowy_jelenia_gora",
            "https://www.jelenia-gora.sr.gov.pl/spacer",
            "https://waf.intelix.pl/957476/Chat/Script/Compatibility"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "",
              "display_name": "",
              "target": null
            },
            {
              "id": "serwer",
              "display_name": "serwer",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 24,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "email": 71,
            "domain": 7651,
            "hostname": 7680,
            "IPv4": 331,
            "FileHash-SHA256": 16168,
            "URL": 10399,
            "FileHash-MD5": 3639,
            "FileHash-SHA1": 3468,
            "CIDR": 4,
            "CVE": 89,
            "YARA": 521,
            "SSLCertFingerprint": 25,
            "JA3": 1,
            "IPv6": 5813
          },
          "indicator_count": 55860,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "340 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6647908c09468f42bc1249f1",
          "name": "University of Alberta Azure/Entra Compromised Tenant Compromized Institution",
          "description": "Update: Academic/Non-Academic Staff Unions, 3rd party org, & some profs/students/alumni tried raising concerns to Admins/President/IST & CISO => Maintaining position they will not be looking into reported problems re: Cybersecurity under any circumstances = more time more problems? Attempts to advocate -> Harrass./Discrim./De-humanizing responses from admins (representing all folks - recorded). \nTenant ID: 718b8a9b-44d8-441a-a344-4294ea842172 = This pulse is 1 example (small) of problems.\n\nPrimary domain\nualbertaca.onmicrosoft.com\nCustom Domain Names\nualberta.ca\nVerified\nualbertaca.onmicrosoft.com",
          "modified": "2025-03-01T04:59:57.222000",
          "created": "2024-05-17T17:14:52.317000",
          "tags": [
            "false",
            "true",
            "visible",
            "application",
            "microsoft teams",
            "microsoft azure",
            "office",
            "service",
            "dynamics",
            "hidden",
            "android",
            "explorer",
            "write",
            "connector",
            "test",
            "sharepoint",
            "live",
            "meister",
            "tools",
            "desktop",
            "spark",
            "front",
            "enterprise",
            "designer",
            "atlas",
            "premium",
            "assistant",
            "allow",
            "azureadmyorg",
            "game",
            "verify",
            "microsoft power",
            "channelsurfcli",
            "mtd1",
            "file transfer",
            "magnus",
            "microsoft crm",
            "youth"
          ],
          "references": [
            "All - EnterpriseAppsList.csv",
            "AppRegistrationList.csv",
            "https://tria.ge/240517-vc7c1shc62/behavioral1",
            "https://tria.ge/240517-vdwb5shc71/behavioral1",
            "https://tria.ge/240517-vqxezaaa33/behavioral1",
            "https://tria.ge/240517-t9pc2ahb2t",
            "https://www.virustotal.com/graph/embed/g9453a2f58a3340f18120987c2b4d710dbb44ded88c434abf8894458a98c7bd4b?theme=dark",
            "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/iocs",
            "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/graph",
            "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/summary",
            "https://www.filescan.io/uploads/66479b483313f70f0afe3dbb",
            "https://www.filescan.io/uploads/664799c9d5c40bffee6106d7",
            "Thor Scan: S-I9VvMTB6cZU",
            "https://www.filescan.io/uploads/664ba368d5c40bffee63b1ee/reports/31817751-6b5d-45df-8813-472aa6c756a3/overview",
            "https://www.filescan.io/uploads/664ba8a20663ff3c2ec6428a/reports/09d3d82a-7ec1-4804-93e5-5ae691fbb7f2/overview",
            "https://imp0rtp3.wordpress.com/2021/08/12/tetris/",
            "https://www.filescan.io/uploads/664bb0cd7c9fb1468fc610c5/reports/00c78e4d-2156-4906-a106-ebf7e2723251/overview",
            "https://www.filescan.io/uploads/664bb40fbc04dffa92240ca2/reports/398074f2-c7b6-40e9-9b5c-4225cc990473/overview",
            "https://www.filescan.io/uploads/664bb683bc04dffa92241015/reports/92b70fd6-97d7-4386-8465-f3fd79043843/overview",
            "https://tria.ge/240521-q4s79agb25/static1",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906322f5af13cdfb50be",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906222f5af13cdfb5093",
            "https://www.filescan.io/uploads/666d69ff6b8dba248b414767/reports/dda2c8a1-96fd-4c00-9cbc-c64c4685a804/overview",
            "https://www.filescan.io/uploads/666d69ff6b8dba248b414767",
            "https://viz.greynoise.io/analysis/33e9b33b-b932-4c43-9be1-3e2d6f9cb4b3",
            "https://viz.greynoise.io/analysis/e51d9a15-d802-4d51-9a70-17803dc2693a",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b",
            "Above Malcore Strings: All - EnterpriseAppsList, AppRegistration, EnterpriseAppslist, exportGroup, exportUsers, HiddenApps - EnterpriseAppsList****",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00975ea31558d54fceea",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cff1a5ea31558d54fcbf6",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d0107b44401771de9ebf2",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00356dd8f43b723a915a",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cffec5ea31558d54fcda2",
            "https://www.hudsonrock.com/search?domain=ualberta.ca",
            "https://www.criminalip.io/domain/report?scan_id=13798622",
            "https://viz.greynoise.io/analysis/9635144c-db8f-47ab-a83a-5785602244cf - 07.03.24",
            "https://urlscan.io/search/#ualberta.ca",
            "https://www.virustotal.com/gui/collection/0ca12fcdd125ec5a5055180ee828b98d47b8b2e920660be559c2b602266b6b1d/iocs",
            "https://sitereport.netcraft.com/?url=http://ualberta.ca",
            "https://www.wordfence.com/blog/2022/10/threat-advisory-monitoring-cve-2022-42889-text4shell-exploit-attempts/",
            "https://tenantresolution.pingcastle.com/Search - Tenant still active (07.19.24) - Good jobs ya'll",
            "https://www.virustotal.com/graph/embed/gf1d5aa209c7f4fd086e4cb17dcd0af52421ea4bae87d49fe9b4076b382612f0e?theme=dark",
            "https://viz.greynoise.io/query/AS36351%20classification:%22malicious%22",
            "https://viz.greynoise.io/query/AS60068%20classification:%22malicious%22",
            "https://viz.greynoise.io/query/AS8075%20classification:%22malicious%22",
            "https://viz.greynoise.io/query/AS15169%20classification:%22malicious%22",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b - https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b = Hidden Apps - Enterprise Apps List"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Education",
            "Technology",
            "Healthcare",
            "Telecommunications",
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 7,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1703,
            "FileHash-SHA256": 90472,
            "URL": 99185,
            "domain": 82954,
            "hostname": 39041,
            "FileHash-SHA1": 1624,
            "email": 4658,
            "CVE": 12
          },
          "indicator_count": 319649,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "414 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "663d2869e0f3a42bbddc42ff",
          "name": "UPX executable packer.",
          "description": "A new rule has been introduced  a \"suspicious\" ELF binary that is packed with the UPX executable packer.\nSuggested ATT&CK IDs: rule SUSP_ELF_LNX_UPX_Compressed_File { meta: description = \"Detects a suspicious ELF binary with UPX compression\" author = \"Florian Roth (Nextron Systems)\" reference = \"Internal Research\" date = \"2018-12-12\" score = 40 hash1 = \"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4\" id = \"078937de-59b3-538e-a5c3-57f4e6050212\" strings: $s1 = \"PROT_EXEC|PROT_WRITE failed.\" fullword ascii $s2 = \"$Id: UPX\" fullword ascii $s3 = \"$Info: This file is packed with the UPX executable packer\" ascii $fp1 = \"check your UCL installation !\"",
          "modified": "2024-10-14T00:01:17.069000",
          "created": "2024-05-09T19:47:53.786000",
          "tags": [
            "cioch adrian",
            "centrum usug",
            "sieciowych",
            "elf binary",
            "upx compression",
            "roth",
            "nextron",
            "info",
            "javascript",
            "html",
            "office open",
            "xml document",
            "network capture",
            "win32 exe",
            "xml pakietu",
            "pdf zestawy",
            "przechwytywanie",
            "office",
            "filehashsha1",
            "url https",
            "cve cve20201070",
            "cve cve20203153",
            "cve cve20201048",
            "cve cve20211732",
            "cve20201048 apr",
            "filehashmd5",
            "cve cve20010901",
            "cve cve20021841",
            "cve20153202 apr",
            "cve cve20160728",
            "cve cve20161807",
            "cve cve20175123",
            "cve20185407 apr",
            "cve cve20054605",
            "cve cve20060745",
            "cve cve20070452",
            "cve cve20070453",
            "cve cve20070454",
            "cve cve20071355",
            "cve cve20071358",
            "cve cve20071871",
            "cve20149614 apr",
            "cve cve20151503",
            "cve cve20152080",
            "cve cve20157377",
            "cve cve20170131",
            "cve20200796 may",
            "cve cve20113403"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6861,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 5771,
            "domain": 3139,
            "URL": 14525,
            "FileHash-SHA1": 2610,
            "IPv4": 108,
            "CIDR": 40,
            "FileHash-SHA256": 10705,
            "FileHash-MD5": 3373,
            "YARA": 2,
            "CVE": 148,
            "Mutex": 7,
            "FilePath": 3,
            "SSLCertFingerprint": 3,
            "email": 23,
            "JA3": 1,
            "IPv6": 2
          },
          "indicator_count": 40460,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "552 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657096b22a51f1cc56dcfb53",
          "name": "172.217.16.232 BT home router network attack 10th May 2022 - those HTTP headers and JS scripts are taking over the world",
          "description": "",
          "modified": "2023-12-06T15:43:46.083000",
          "created": "2023-12-06T15:43:46.083000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 802,
            "hostname": 392,
            "domain": 134,
            "FileHash-SHA256": 82,
            "FileHash-MD5": 1
          },
          "indicator_count": 1411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708eb824dc4c51811f6de9",
          "name": "Indusface  - in YOUR face ;)",
          "description": "",
          "modified": "2023-12-06T15:09:44.273000",
          "created": "2023-12-06T15:09:44.273000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 307,
            "hostname": 333,
            "domain": 192,
            "URL": 1143,
            "FileHash-MD5": 1
          },
          "indicator_count": 1976,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708e0d95a8c74cc715f7a2",
          "name": "West.cn",
          "description": "",
          "modified": "2023-12-06T15:06:53.350000",
          "created": "2023-12-06T15:06:53.350000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 208,
            "domain": 533,
            "hostname": 757,
            "URL": 1861,
            "FileHash-MD5": 1
          },
          "indicator_count": 3360,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c534aadf7adf4f27d77",
          "name": "enom.com & 4vendeta.com - ReduceRight malware hosting/creation",
          "description": "",
          "modified": "2023-12-06T14:59:31.122000",
          "created": "2023-12-06T14:59:31.122000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 302,
            "domain": 634,
            "URL": 2988,
            "hostname": 1208
          },
          "indicator_count": 5132,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c1c5e2cc4dfe8d0ed97",
          "name": "CPANEL-TUCOWS \u2014malware hosting",
          "description": "",
          "modified": "2023-12-06T14:58:36.254000",
          "created": "2023-12-06T14:58:36.254000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 815,
            "hostname": 3487,
            "domain": 1182,
            "URL": 10194,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 1
          },
          "indicator_count": 15682,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c13ee010f81d3f9b3af",
          "name": "Malware hosting - hostrocket.com",
          "description": "",
          "modified": "2023-12-06T14:58:27.115000",
          "created": "2023-12-06T14:58:27.115000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 232,
            "hostname": 963,
            "domain": 412,
            "URL": 2337,
            "email": 3,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 3949,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c0f5981b6d81d0fa423",
          "name": "data102 and colohouse. Malware hosting",
          "description": "",
          "modified": "2023-12-06T14:58:23.206000",
          "created": "2023-12-06T14:58:23.206000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 458,
            "domain": 557,
            "URL": 2599,
            "hostname": 952
          },
          "indicator_count": 4566,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c0791fece390b1a096e",
          "name": "Choopa.com - vultr",
          "description": "",
          "modified": "2023-12-06T14:58:15.734000",
          "created": "2023-12-06T14:58:15.734000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 453,
            "hostname": 1241,
            "domain": 430,
            "URL": 3454
          },
          "indicator_count": 5578,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708bf87a08635a650eeb9b",
          "name": "ctgserver.net",
          "description": "",
          "modified": "2023-12-06T14:58:00.096000",
          "created": "2023-12-06T14:58:00.096000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1286,
            "domain": 560,
            "hostname": 1602,
            "URL": 7975,
            "FileHash-MD5": 85,
            "FileHash-SHA1": 1
          },
          "indicator_count": 11509,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708befc4f4c7e2be4370d9",
          "name": "ctgserver.net",
          "description": "",
          "modified": "2023-12-06T14:57:51.922000",
          "created": "2023-12-06T14:57:51.922000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1286,
            "domain": 560,
            "hostname": 1602,
            "URL": 7975,
            "FileHash-MD5": 85,
            "FileHash-SHA1": 1
          },
          "indicator_count": 11509,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708bbc4c8bf557c17688e1",
          "name": "\u9ad8\u5c71tv,\u9ad8\u5c71tv,\u9ad8\u5c71tv\u5f71\u9662,\u9ad8\u5c71tv\u770b\u7247\u7f51",
          "description": "",
          "modified": "2023-12-06T14:57:00.280000",
          "created": "2023-12-06T14:57:00.280000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 233,
            "domain": 361,
            "hostname": 563,
            "URL": 1374,
            "FileHash-SHA1": 1,
            "FileHash-MD5": 1
          },
          "indicator_count": 2534,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708bae2f0c59d34f050b9e",
          "name": "Malware and bots",
          "description": "",
          "modified": "2023-12-06T14:56:46.779000",
          "created": "2023-12-06T14:56:46.779000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 168,
            "hostname": 427,
            "domain": 214,
            "URL": 1188,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1,
            "email": 1
          },
          "indicator_count": 2000,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708b5e9b8ce0f5fd87fb98",
          "name": "ewqopweowia543.ga",
          "description": "",
          "modified": "2023-12-06T14:55:26.621000",
          "created": "2023-12-06T14:55:26.621000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "hostname": 706,
            "domain": 234,
            "FileHash-SHA256": 238,
            "URL": 1386
          },
          "indicator_count": 2565,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708aa1dca4e6c505e4fc9e",
          "name": "Botnet c&c",
          "description": "",
          "modified": "2023-12-06T14:52:16.286000",
          "created": "2023-12-06T14:52:16.286000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 214,
            "hostname": 334,
            "URL": 1182,
            "FileHash-SHA256": 33
          },
          "indicator_count": 1763,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708a8b61abf1b451f2aebc",
          "name": "Botnet",
          "description": "",
          "modified": "2023-12-06T14:51:55.086000",
          "created": "2023-12-06T14:51:55.086000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "hostname": 619,
            "URL": 1547,
            "domain": 246,
            "FileHash-SHA256": 124
          },
          "indicator_count": 2538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708a87eeed875a212dff0a",
          "name": "Botnet",
          "description": "",
          "modified": "2023-12-06T14:51:51.546000",
          "created": "2023-12-06T14:51:51.546000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "hostname": 619,
            "URL": 1547,
            "domain": 246,
            "FileHash-SHA256": 124
          },
          "indicator_count": 2538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708090c5fea4fa6aff5dd2",
          "name": "https://unisynvoting.com/wp-includes/js/jquery/jquery.min.js",
          "description": "",
          "modified": "2023-12-06T14:09:20.755000",
          "created": "2023-12-06T14:09:20.755000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 175,
            "hostname": 27,
            "URL": 76,
            "domain": 7
          },
          "indicator_count": 285,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707fe17dfdfe16066d16de",
          "name": "Bexar.org",
          "description": "",
          "modified": "2023-12-06T14:06:25.800000",
          "created": "2023-12-06T14:06:25.800000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1735,
            "hostname": 1833,
            "domain": 1025,
            "URL": 4668,
            "email": 4,
            "FileHash-MD5": 133,
            "FileHash-SHA1": 6,
            "CIDR": 5
          },
          "indicator_count": 9409,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707f8475d8a8785dfc5a2f",
          "name": "Zetalytics API",
          "description": "",
          "modified": "2023-12-06T14:04:52.250000",
          "created": "2023-12-06T14:04:52.250000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 754,
            "hostname": 833,
            "domain": 441,
            "URL": 2375,
            "CIDR": 5,
            "FileHash-MD5": 2,
            "email": 1
          },
          "indicator_count": 4411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "63dbbf6ae4f5433c2bab52e9",
          "name": "172.217.16.232 BT home router network attack 10th May 2022 - those HTTP headers and JS scripts are taking over the world",
          "description": "A guide to some of the key methods used by the web browser, jQuery, to create web pages and add links to the search engine and other parts of its web address system, as well as the address bar.",
          "modified": "2023-03-04T13:00:43.098000",
          "created": "2023-02-02T13:49:30.620000",
          "tags": [
            "null",
            "copyright",
            "jan sorgalla",
            "built",
            "bill scott",
            "http",
            "error",
            "function",
            "title",
            "method",
            "play",
            "fast",
            "click",
            "return",
            "href",
            "target",
            "span",
            "pass",
            "linear",
            "timebuff",
            "block",
            "trigger",
            "nivoslider",
            "display",
            "width",
            "show",
            "next",
            "arrow",
            "restart",
            "stop",
            "iframe",
            "alpha",
            "factory",
            "type",
            "handle",
            "sizzle",
            "match",
            "check",
            "make sure",
            "elem",
            "name",
            "regexp",
            "hooks",
            "false",
            "date",
            "class",
            "internal",
            "done",
            "bind",
            "test",
            "body",
            "copy",
            "hold",
            "mozilla",
            "logic",
            "flash",
            "jquery",
            "fall",
            "bubble",
            "prop",
            "meta",
            "middle",
            "mark",
            "thus",
            "form",
            "script script",
            "a li",
            "div div",
            "mua bn",
            "link",
            "a div",
            "trang ch",
            "gii thiu",
            "tin tc",
            "header http2",
            "gmt cache",
            "gmt server",
            "litespeed",
            "443 ma2592000",
            "172.217.16.232",
            "http://lhr48s28-in-f8.1e100.net"
          ],
          "references": [
            "[object Object] is a string representation of an object instance. Take this example: When the alert runs, it returns [object Object] in the alert modal. It tries to return a string representation of what was passed into alert, but because the engine sees this as an object, and not a string, it tells us that its an instance of an Object instead.",
            "443 Header\tHTTP/2 200 x powered by: PHP/7.4.29 set cookie: PHPSESSID=9158e16820bdbb5be0d1faa520b7dc19 path=/ expires: Thu 19 Nov 1981 08:52:00 GMT cache control: no store no cache must revalidate pragma: no cache content type: text/html charset=UTF 8 date: Thu 02 Feb 2023 13:37:37 GMT server: LiteSpeed alt svc: quic= :443 ma=2592000 v= 35 39 43 44",
            "whitelists are really not the way forward unless you validate the integrity often Speedtest are also being screwed with ie allowing your neural controlled network out on a temp basis to prevent you from ousting the APT controlling your home broadband / wifi network",
            "xml version= 1.0 encoding= utf 8 DOCTYPE html PUBLIC //WAPFORUM//DTD XHTML Mobile 1.0//EN http://www.wapforum.org/DTD/xhtml mobile10.dtd html xmlns= http://www.w3.org/1999/xhtml head meta http equiv= Content Type content= text/html charset=utf 8 / title mua bn nh t cho thu nh t sang nhng sang nhng ca hng /title meta name= copyright content= 2010 2020 bds247.vn / meta name= google site verification content= suyiBYZARDnZ4zGeoAiF VajqMQ0pgLGnEm69aZ aIY / meta name= robots content= index follow / meta name= key",
            "https://m.bds247.vn//view/js/jquery6_1.js 443",
            "https://www.googletagmanager.com/gtag/js?id=G-56M7ZWVN9L",
            "https://m.bds247.vn/lib/nivo-slider/slider.js 443 Script",
            "https://m.bds247.vn/view/js/page.js 443 Script",
            "https://m.bds247.vn/lib/pikachoose/lib/jquery.jcarousel.min.js 443 Script",
            "https://m.bds247.vn/lib/pikachoose/lib/jquery.pikachoose.js",
            "This is the full text of the XHTML mobile10.dtd.xml, which is based on the code created by the developers of Google's search engine, iPlayer and other sites.",
            "https://m.bds247.vn//view/js/jquery6_1.js",
            "https://m.bds247.vn/lib/nivo-slider/slider.js",
            "https://m.bds247.vn/lib/pikachoose/lib/jquery.jcarousel.min.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 802,
            "hostname": 392,
            "FileHash-SHA256": 82,
            "domain": 134,
            "FileHash-MD5": 1
          },
          "indicator_count": 1411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 93,
          "modified_text": "1142 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "628ce74526894454664e1bab",
          "name": "cloudron.io",
          "description": "function ar(aw,av,au,at) is a new version of the Matomo tracker, which allows users to track where a tracker has been located, and when it is activated.",
          "modified": "2022-06-23T00:03:28.624000",
          "created": "2022-05-24T14:10:13.562000",
          "tags": [
            "span",
            "type",
            "href",
            "tbody",
            "tfoot",
            "thead",
            "input",
            "helvetica neue",
            "helvetica",
            "arial",
            "twitter",
            "date",
            "docviewtop",
            "shadow",
            "rocketchat",
            "sogo",
            "gitlab",
            "wordpress",
            "matomo",
            "kanboard",
            "taiga",
            "ninja",
            "slow",
            "scroll",
            "dom exception",
            "google",
            "regexp",
            "mmm d",
            "mmmm d",
            "null",
            "this",
            "number",
            "destroy",
            "controller",
            "array",
            "error",
            "android",
            "false",
            "function",
            "index",
            "slickcenter",
            "slick",
            "object",
            "translate",
            "translate3d",
            "jquery",
            "typeof c",
            "copyright",
            "bootstrap",
            "javascript",
            "azaz",
            "popover",
            "typeof f",
            "typeof b",
            "width",
            "pseudo",
            "child",
            "sufeffxa0",
            "class",
            "accept",
            "string",
            "please",
            "blob",
            "post",
            "link",
            "license"
          ],
          "references": [
            "https://analytics.cloudron.io/piwik.js",
            "https://www.cloudron.io/3rdparty/jquery-1.11.0.js",
            "https://www.cloudron.io/3rdparty/bootstrap.min.js",
            "https://www.cloudron.io/3rdparty/slick.js",
            "https://www.cloudron.io/3rdparty/angular.min.js",
            "https://www.cloudron.io/3rdparty/angular-loader.min.js",
            "https://www.cloudron.io/3rdparty/angular-route.min.js",
            "https://www.cloudron.io/3rdparty/angular-base64.min.js",
            "https://www.cloudron.io/index.js",
            "https://www.cloudron.io/3rdparty/bootstrap.min.css"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 541,
            "URL": 1300,
            "domain": 180,
            "FileHash-SHA256": 72,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2094,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "1396 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6280267248a96d765fe2d7c1",
          "name": "weide.net",
          "description": "Here is the full text of the code for the new Firefox browser, created with the help of a few key elements:d, E, F, A, B, J, M, C.",
          "modified": "2022-06-13T00:00:32.864000",
          "created": "2022-05-14T22:00:18.122000",
          "tags": [
            "please",
            "vult",
            "validator",
            "method",
            "name",
            "d1dd2",
            "value",
            "function",
            "number",
            "param",
            "form",
            "meta",
            "class",
            "false",
            "date",
            "newzipcode",
            "de heer",
            "geachte heer",
            "mevrouw",
            "geachte mevrouw",
            "set referrer",
            "value function",
            "regexp",
            "array",
            "attr",
            "css1compat",
            "null",
            "string",
            "error",
            "invalid json",
            "zoeken naar",
            "zoeken",
            "basenet",
            "pers faq",
            "contact",
            "domainsharing",
            "vraag",
            "als bedrijf",
            "als particulier",
            "voor meer"
          ],
          "references": [
            "xfe-IP-185.165.31.131-stix2-2.1-export.json",
            "https://ajax.googleapis.com/ajax/libs/jquery/1.7.1/jquery.min.js",
            "http://www.weide.net",
            "http://ajax.googleapis.com/ajax/libs/jquery/1.7.1/jquery.min.js",
            "http://www.weide.net/js/formfieldformatting.js",
            "http://www.weide.net/js/jquery.validate.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Vult",
              "display_name": "Vult",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 231,
            "URL": 512,
            "FileHash-SHA256": 39,
            "domain": 149
          },
          "indicator_count": 931,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1406 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6280398780fbe64692dd54fd",
          "name": "West.cn",
          "description": "If you want to know more about Shockwave Flash, spare a thought for the members of your own storage system:mt.co.g.o.mimeTypes.com, mime",
          "modified": "2022-06-13T00:00:32.864000",
          "created": "2022-05-14T23:21:43.936000",
          "tags": [
            "jquery",
            "date",
            "vue jquery",
            "template",
            "layer",
            "paas",
            "dist",
            "wjf3m",
            "ajax",
            "business",
            "string",
            "number",
            "regexp",
            "copyright",
            "uint8array",
            "fnumber",
            "aw1045757556",
            "closure library",
            "xdfunction",
            "code",
            "ddos",
            "image",
            "script",
            "document",
            "unescape",
            "msie",
            "canvas",
            "domain",
            "click",
            "input",
            "label",
            "jdomname",
            "strong",
            "jactive15toast",
            "jclearinput",
            "case",
            "datatarget",
            "jdomainregcount",
            "span",
            "function",
            "x786e",
            "x53d6",
            "cite",
            "x4fe1",
            "iframe",
            "null",
            "prompt",
            "x6700",
            "x591a",
            "array",
            "numarray",
            "data",
            "midsize",
            "action",
            "keyword",
            "firstfix",
            "object",
            "5n3j",
            "3f4r",
            "5p3s",
            "1f5m",
            "hhe2",
            "bbf2",
            "3y3z",
            "1223",
            "6q6m",
            "zfunction",
            "psettimeout",
            "tsettimeout",
            "hsetinterval",
            "iparseint",
            "hnull",
            "pnull",
            "tnull",
            "lv1s",
            "efunction",
            "typeof t",
            "typeof e",
            "adobeedge",
            "typeof r",
            "webkittransform",
            "moztransform",
            "body",
            "this",
            "notifier",
            "invert",
            "name",
            "param",
            "value",
            "error",
            "false",
            "trigger",
            "restart",
            "form",
            "config",
            "constants",
            "true",
            "modalhelper",
            "relative",
            "fixed",
            "account login",
            "activexobject",
            "haslocation",
            "xmlhttprequest",
            "xmlregexp",
            "temp",
            "extpart",
            "foundation",
            "mit license",
            "write",
            "rhino",
            "mark",
            "import",
            "classnamedom",
            "onbeforedestroy",
            "login",
            "auto",
            "init",
            "typeof b",
            "width",
            "pseudo",
            "child",
            "enulle",
            "class",
            "accept",
            "shockwave flash",
            "new date1e3",
            "ka6e5",
            "la10"
          ],
          "references": [
            "xfe-IP-103.24.249.209-stix2-2.1-export.json",
            "xfe-URL-West.cn-stix2-2.1-export.json",
            "https://m.west.cn/jscripts/baidutj/hm.js",
            "http://m.west.cn/jscripts/baidutj/hm.js",
            "https://www.west.cn/js2016/lib/jquery.SuperSlide/jquery.SuperSlide.2.1.1.x.js",
            "https://www.west.cn/js2016/root/jqinclude.js?t=20211126a",
            "https://www.googletagmanager.com/gtag/js?id=AW-1045757556"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 533,
            "URL": 1861,
            "hostname": 757,
            "FileHash-SHA256": 208,
            "FileHash-MD5": 1
          },
          "indicator_count": 3360,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1406 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62750795ebc8c475f4a3033a",
          "name": "aquanx.com (PegTech botnet hosting)",
          "description": "var b[f, g.g, is a new addition to the list of characters that can be added to a singleElement, as well as a set of numbers, if they are new.",
          "modified": "2022-06-05T00:03:45.266000",
          "created": "2022-05-06T11:33:41.174000",
          "tags": [
            "function",
            "eu cookie",
            "version",
            "tamas schalk",
            "element",
            "lang",
            "datadelay",
            "dataexpire",
            "dataclass",
            "name",
            "date",
            "path",
            "null",
            "cookie",
            "regexp",
            "typeof e",
            "please",
            "typeof t",
            "pseudo",
            "child",
            "array",
            "error",
            "class",
            "void",
            "this",
            "extendedvps",
            "login register",
            "product group",
            "svssdlinux",
            "svssdwindows",
            "password",
            "client area",
            "aquanx english",
            "azerbaijani",
            "catal",
            "colocation\uff0ccustomized service\uff0cone-stop service\uff0caffordable cloud ",
            "aquanx",
            "metal cloud",
            "chat",
            "ddos migration",
            "network",
            "colocation",
            "cloud",
            "colocation bare",
            "cloud hosting",
            "private cloud",
            "bare",
            "service",
            "custom build",
            "https",
            "bootstrap",
            "bootstrap hover",
            "dropdown",
            "author",
            "cameron spear",
            "mattia larentis",
            "dropdown plugin",
            "http",
            "plugin",
            "copyright",
            "twitter",
            "conflict",
            "focus",
            "object",
            "click",
            "open",
            "next",
            "target",
            "trigger",
            "checkbox",
            "delta",
            "scroll",
            "false",
            "type",
            "expando",
            "typeof selector",
            "sizzle",
            "elem",
            "match",
            "data",
            "seed",
            "vd",
            "number",
            "string",
            "ienew ca",
            "closure library",
            "quota",
            "aafunction",
            "dafunction"
          ],
          "references": [
            "https://www.googletagmanager.com/gtag/js?id=UA-59480575-2",
            "https://aquanx.com/js/jquery-1.12.4.min.js",
            "https://aquanx.com/js/bootstrap.js",
            "https://aquanx.com/js/bootstrap-hover-dropdown.min.js",
            "https://aquanx.com/js/modernizr-custom.js",
            "https://aquanx.com/js/cookie-warn.js?v=1_xSax0l",
            "https://aquanx.com/",
            "https://user.aquanx.com/clientarea.php",
            "https://user.aquanx.com/templates/aquanx20190627/js/scripts.min.js?v=8a99af",
            "https://alpha99.raksmart.com/whmcs/assets/js/cookie-warn.js",
            "xfe-URL-raksmart.com-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Vd",
              "display_name": "Vd",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 560,
            "URL": 1236,
            "domain": 184,
            "FileHash-SHA256": 79
          },
          "indicator_count": 2059,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1414 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62751d6e20ce7971fe122760",
          "name": "layerhost.com",
          "description": "function ra(a,b,c,d,e,f, a new type of node, which can only be defined by its own type, is the same as its current type.",
          "modified": "2022-06-05T00:03:45.266000",
          "created": "2022-05-06T13:06:54.626000",
          "tags": [
            "typeerror",
            "function",
            "string",
            "urlsearchparams",
            "array",
            "object",
            "typeof t",
            "incorrect",
            "boolean",
            "iterator",
            "target",
            "error",
            "typeof o",
            "date",
            "typeof symbol",
            "window",
            "promise",
            "iere",
            "typeof ne",
            "null",
            "body",
            "this",
            "regexp",
            "please",
            "blob",
            "matomo",
            "post",
            "javascript",
            "link",
            "license",
            "info",
            "campaigns",
            "storagetest",
            "typeof json",
            "sufeffxa0",
            "typeof c",
            "document",
            "invalid attempt",
            "chat",
            "search",
            "language",
            "feel",
            "file",
            "call",
            "strongstart",
            "address",
            "again",
            "attrs",
            "cparseint",
            "dparseint",
            "bparseint",
            "9999px",
            "fparseint",
            "eparseint",
            "bnull",
            "gparseint",
            "iparseint",
            "blank",
            "trident",
            "fixedpos",
            "fixedheader",
            "click",
            "rotate",
            "dataslider",
            "eventtarget",
            "basicstructure",
            "moztransition",
            "gthis",
            "preventdefault",
            "bthis",
            "regexcss",
            "xthis",
            "true",
            "filterizr api",
            "filterizr",
            "value",
            "ease",
            "steps",
            "idle",
            "classcallcheck",
            "reveal",
            "init",
            "drilldown",
            "dropdown",
            "dropdownmenu",
            "orbit",
            "slider",
            "burn",
            "sticky",
            "keyboard",
            "eventkey",
            "apple cmd",
            "mapping",
            "mouse",
            "input",
            "cache",
            "button",
            "checkbox",
            "shift",
            "typeof b",
            "pseudo",
            "child",
            "class",
            "attr",
            "void",
            "secure",
            "result"
          ],
          "references": [
            "xfe-IP-134.73.11.118-stix2-2.1-export.json",
            "xfe-URL-Powr.io-stix2-2.1-export 2.json",
            "xfe-URL-Layerhost.com-stix2-2.1-export.json",
            "xfe-URL-https___www.gandi.net-stix2-2.1-export.json",
            "https://www.powr.io/powr.js?platform=html",
            "https://www.layerhost.com/assets/js/vendor/jquery.min.js",
            "https://www.layerhost.com/assets/js/vendor/what-input.js",
            "https://www.layerhost.com/assets/js/vendor/foundation.min.js",
            "https://www.layerhost.com/assets/js/jquery.filterizr.min.js",
            "https://www.layerhost.com/assets/js/yui.js",
            "https://www.layerhost.com/assets/js/app.js",
            "https://www.layerhost.com/assets/js/slider.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/languages/en.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-2d0d2b7c.js",
            "https://tag.aticdn.net/616708/smarttag.js",
            "https://analytics.gandi.net/piwik.js",
            "https://www.gandi.net/static/js/modern.27ee934b0dc5.js",
            "https://www.gandi.net/static/js/legacy.7cc648e3ff7a.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "EventTarget",
              "display_name": "EventTarget",
              "target": null
            },
            {
              "id": "Filterizr API",
              "display_name": "Filterizr API",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 350,
            "URL": 2035,
            "hostname": 718,
            "FileHash-SHA256": 355,
            "CVE": 1,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 3461,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 70,
          "modified_text": "1414 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "628e33df0169fe33f79b766b",
          "name": "Seems to be coming from space . Space malware? \u4e91\u9002\u914d(AllMobilize Inc.)  --\u4f01\u4e1a\u6d4f\u89c8\u5668\u53ca\u79fb\u52a8\u5316\u89e3\u51b3\u65b9\u6848\u4f9b\u5e94\u5546 | \u4e91\u9002\u914d",
          "description": "AllMobilize, Amaze, and all its partners - all of them with the same name - are now available to use on Facebook, Twitter, Instagram and other social media platforms, including Facebook.",
          "modified": "2022-05-25T13:49:19.876000",
          "created": "2022-05-25T13:49:19.876000",
          "tags": [
            "ebeef5",
            "dcdfe6",
            "e64552",
            "helvetica",
            "ffffff",
            "pingfang sc",
            "helveticaneue",
            "arial",
            "microsoft yahei",
            "45deg",
            "post",
            "sqdl",
            "sqhz",
            "eptyzj",
            "zjxcys",
            "doform",
            "modernizr",
            "typeradio",
            "tagnames",
            "boolean",
            "date",
            "array",
            "error",
            "typeof t",
            "dtft",
            "amaze ui",
            "function",
            "regexp",
            "d1dd2",
            "mstransitionend",
            "team",
            "android",
            "february",
            "april",
            "june",
            "august",
            "void",
            "null",
            "type",
            "elem",
            "index",
            "handle",
            "sizzle",
            "check",
            "target",
            "hooks",
            "prop",
            "copy",
            "class",
            "mark",
            "internal",
            "stack",
            "false",
            "code",
            "accept",
            "seed",
            "first",
            "body",
            "jquery",
            "pass",
            "bind",
            "core",
            "local",
            "verify",
            "done",
            "find",
            "inject",
            "possible",
            "hold",
            "trigger",
            "camel",
            "bubble",
            "window",
            "middle",
            "capture",
            "iframe",
            "fall",
            "stop",
            "panic",
            "back",
            "speed",
            "grab",
            "install",
            "open",
            "invalid request",
            "button",
            "input",
            "cpu os",
            "span",
            "label",
            "this",
            "trident",
            "pykey",
            "eventparams",
            "object",
            "event",
            "infinity",
            "pykeye",
            "string",
            "typeof",
            "typeof e",
            "typeof r",
            "typeof s",
            "typeof console",
            "contenttype",
            "number",
            "\u4e91\u9002\u914d\uff0c\u4f01\u4e1a\u79fb\u52a8\u5316\uff0c\u4f01\u4e1a\u79fb\u52a8\u5316\u89e3\u51b3\u65b9\u6848\uff0c\u4e91\u9002\u914d\u8de8\u5c4f",
            "\u4e91\u9002\u914d\u7f51\u7ad9\u9002\u914d",
            "\u4e91\u9002\u914d\u8de8\u5c4f\u4e91",
            "\u4e91\u9002\u914d\u8de8\u5c4f\u5e94\u7528",
            "\u4f01\u4e1aoa\u79fb\u52a8\u5316\u3001\u4f01\u4e1a\u79fb\u52a8\u95e8\u6237\u3001\u79fb\u52a8\u5e94\u7528\u7ba1\u7406\u3001\u79fb\u52a8\u5e94\u7528\u5e73\u53f0",
            "xcloud",
            "amaze",
            "sdp enterplorer",
            "siebel domino",
            "siebel",
            "domino",
            "allmobilize",
            "apipc",
            "ui amaze"
          ],
          "references": [
            "https://www.yunshipei.com/",
            "https://aiff.cdn.bcebos.com/sensors%2Fonline%2Fsa-sdk-javascript-1.14.24%2Fsensorsdata.min.js",
            "https://stats.ipinyou.com/adv?a=SR..sxcg_4d0DhagaJWCLj_ZdX&u=https%3A%2F%2Fwww.yunshipei.com%2F&rd=1653485491040&v=2&e=sr%3D390x844%26sc%3D32-bit%26je%3Dfalse%26lg%3Den-us%26vb%3D1%26did%3D%26dt%3D%26ps%3D390x3885%26vp%3D390x664%26ec%3DUTF-8%26vbt%3D1822%26sp%3D0%26ur%3D%26st%3D%26ev%3Dvg",
            "https://goutong.baidu.com/site/270/98c14a71a44014f7aa9d23449a55ae8f/b.js?siteId=3064033",
            "https://stats.ipinyou.com/presadv?a=SR..sxcg_4d0DhagaJWCLj_ZdX&cb=py.cb",
            "https://fm.ipinyou.com/j/a.js",
            "https://www.yunshipei.com/assets/js/jquery.js",
            "https://www.yunshipei.com/assets/js/amazeui.min.js",
            "https://www.yunshipei.com/assets/js/app.min.js",
            "https://sgoutong.baidu.com/embed/1652930761/asset/embed/css/mobile/main.css"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1134",
              "name": "Access Token Manipulation",
              "display_name": "T1134 - Access Token Manipulation"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 652,
            "URL": 1482,
            "domain": 242,
            "FileHash-SHA256": 142,
            "FileHash-MD5": 3
          },
          "indicator_count": 2521,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1425 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "628c310ac9ae8e3e8f352e3d",
          "name": "Indusface  - in YOUR face ;)",
          "description": "function D(t,e,n), as well as window.com, has been frozen by a single function, as part of a series of \"snoopers' checks\"...",
          "modified": "2022-05-24T01:12:42.216000",
          "created": "2022-05-24T01:12:42.216000",
          "tags": [
            "fontawesome",
            "font awesome",
            "free",
            "license",
            "cc by",
            "sil ofl",
            "code",
            "mit license",
            "uf007",
            "uf017",
            "segoe ui",
            "emoji",
            "woff2",
            "roboto",
            "helvetica neue",
            "arial",
            "apple color",
            "symbol",
            "noto color",
            "type",
            "getcookie",
            "mxqueryparams",
            "samesitenone",
            "secure",
            "mxcookie",
            "date",
            "null",
            "domain",
            "orgcode",
            "message",
            "apino",
            "allow",
            "close",
            "safari",
            "large safari",
            "subscribe",
            "segment1",
            "segment2",
            "pushengage",
            "click",
            "scroll",
            "body",
            "iframe",
            "false",
            "typeof e",
            "array",
            "typeof t",
            "swiper",
            "most",
            "copyright",
            "july",
            "android",
            "win32",
            "version",
            "typeof n",
            "typeerror",
            "startr",
            "endr",
            "default",
            "typeof",
            "defaulttype",
            "function",
            "error",
            "shown",
            "flip",
            "regexp",
            "mozt",
            "mstransitionend",
            "webkitt",
            "dom element",
            "ua83948896",
            "gtmpf7h94q",
            "vendor site",
            "widget id",
            "page url",
            "write",
            "message api",
            "february",
            "april",
            "june",
            "august",
            "fbcd",
            "398410357733708",
            "prop",
            "init",
            "autoconfig",
            "protocol",
            "adnxsdomain",
            "aoldomain",
            "adrolltpc",
            "26015787",
            "reduceright",
            "tracking file",
            "number",
            "string",
            "aw827450946",
            "uint8array",
            "fnumber",
            "dustmap",
            "void",
            "class",
            "attr",
            "pseudo",
            "child",
            "typeof module",
            "trackevent",
            "trackpageview",
            "register",
            "path",
            "download",
            "verify",
            "xsnull",
            "script",
            "closure library",
            "xdfunction",
            "typeof window",
            "syntaxerror",
            "xmlhttprequest",
            "samesitelax",
            "innull",
            "ennull",
            "typeof symbol",
            "boolean",
            "circular",
            "customevent",
            "cuxref",
            "new r",
            "infinity",
            "image",
            "pnull",
            "html",
            "style",
            "ctnull",
            "post",
            "uint32array",
            "fanull",
            "ynull",
            "config",
            "meta",
            "accept"
          ],
          "references": [
            "https://k.clarity.ms/s/0.6.34/clarity.js",
            "https://www.clarity.ms/tag/uet/26015787",
            "https://dc.cux.io/analyzer.js",
            "https://sc.lfeeder.com/lftracker_v1_kn9Eq4R1l2K7RlvP.js",
            "https://www.google-analytics.com/gtm/js?id=GTM-PF7H94Q&t=gartner&cid=559436367.1653353775",
            "https://www.googletagmanager.com/gtm.js?id=GTM-PMC6JX",
            "https://www.indusface.com/js/fontawesome.js.pagespeed.jm.X4kSHwBNxI.js",
            "https://www.indusface.com/js/jquery.3.5.1.min.js.pagespeed.jm.A8biqtTJrt.js",
            "https://www.googletagmanager.com/gtag/js?id=AW-827450946",
            "https://tracking.g2crowd.com/attribution_tracking/conversions/2226.js?p=https://www.indusface.com/&e=",
            "https://bat.bing.com/p/action/26015787.js",
            "https://s.adroll.com/j/pre/Q7CW4G7ZJJGWDLUB76P5IV/WH2M5MREOVC4HNKNZPPJZR/index.js",
            "https://d.adroll.com/consent/check/Q7CW4G7ZJJGWDLUB76P5IV?adroll_fpc=7c06a492879ac231294c1fe2e6e394f3-1653353535991&arrfrr=https%3A%2F%2Fwww.indusface.com%2F&_s=1316674c131c34cc157a9ad9119512a2&_b=2",
            "https://d.adroll.com/pixel/Q7CW4G7ZJJGWDLUB76P5IV/WH2M5MREOVC4HNKNZPPJZR?adroll_fpc=7c06a492879ac231294c1fe2e6e394f3-1653353535991&arrfrr=https%3A%2F%2Fwww.indusface.com%2F&pv=54603716107.79724&cookie=BIJ6M3OZKNCW7OIMIJSZED%3A2%7CWH2M5MREOVC4HNKNZPPJZR%3A2%7CQ7CW4G7ZJJGWDLUB76P5IV%3A2&adroll_s_ref=&keyw=&adroll_external_data=",
            "https://s.adroll.com/j/sendrolling.js",
            "https://web.mxradon.com/t/WebTracker.aspx?p1=18917&p2=Web%20Application%20Security%2C%20WAF%2C%20SSL%20Certificates&p3=-1&p4=&p5=1&p6=8415a029-248f-4eeb-bc18-338560430ff7&p7=&p8=&p9=0",
            "https://trackcmp.net/visit?actid=223422163&e=&r=&u=https%3A%2F%2Fwww.indusface.com%2F",
            "https://www.gartner.com/reviews/public/Widget/js/widget.js",
            "https://www.indusface.com/js/cookieconsent.min.js.pagespeed.jm.FCA-2RWV9s.js",
            "https://www.indusface.com/js/popper.min.js+bootstrap.min.js+modernizr-custom.js+menu.js.pagespeed.jc.WlixBHq4Fv.js",
            "https://www.indusface.com/js/swiper.min.js.pagespeed.jm.47RtcloJQ-.js",
            "https://clientcdn.pushengage.com/core/80780b73b5a3f4655fee62041e51f1be.js",
            "https://web.mxradon.com/t/Tracker.js",
            "https://www.indusface.com/css/A.font-styles1.css+bootstrap.css+skin.css+responsive.css+menu.css+swiper.min.css,Mcc.nAV12exFII.css.pagespeed.cf.a_yWJedOjY.css",
            "https://kit-free.fontawesome.com/releases/latest/css/free-v4-font-face.min.css",
            "https://www.indusface.com/css/A.cookieconsent.min.css.pagespeed.cf.t1fRd9Ouvj.css"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1144,
            "hostname": 333,
            "FileHash-SHA256": 307,
            "domain": 192,
            "FileHash-MD5": 1
          },
          "indicator_count": 1977,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1426 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "628bc74f5b92614c08d99f88",
          "name": "Update Agent - Dinan.",
          "description": "",
          "modified": "2022-05-23T17:41:35.234000",
          "created": "2022-05-23T17:41:35.234000",
          "tags": [
            "dinan",
            "performance",
            "update agent",
            "help center",
            "products",
            "lubricants",
            "engine hardware",
            "exhaust",
            "dinan dealer",
            "dealer login",
            "mini",
            "contact",
            "agent",
            "download",
            "alpha",
            "verdana",
            "arial",
            "opacity35",
            "copyright",
            "foundation",
            "opacity0",
            "opacity70",
            "opacity80",
            "hubspot script",
            "loader",
            "closure library",
            "number",
            "string",
            "regexp",
            "uint8array",
            "date",
            "fnumber",
            "aw1027984682",
            "xdfunction",
            "code",
            "null",
            "error",
            "activexobject",
            "xmlhttprequest",
            "android",
            "worker",
            "installtrigger",
            "ccon",
            "false",
            "error occured",
            "body",
            "please",
            "shippingphone",
            "event",
            "item",
            "shippingaddress",
            "billingphone",
            "promise",
            "click",
            "window",
            "this",
            "close",
            "model",
            "drop",
            "main",
            "facebook",
            "form",
            "next",
            "february",
            "april",
            "june",
            "august",
            "atom",
            "cookie",
            "back",
            "bounce",
            "open",
            "express",
            "spinner",
            "copy",
            "typeof e",
            "typeof t",
            "class",
            "attr",
            "pseudo",
            "child",
            "function",
            "typeof module",
            "0x4b3a",
            "error message",
            "signifydglobal",
            "0x1c7d",
            "current order",
            "x0x4b3a",
            "gtmpkdjjpc",
            "host",
            "path",
            "adfunction"
          ],
          "references": [
            "https://www.googletagmanager.com/gtm.js?id=GTM-PKDJJPC",
            "https://cdn-scripts.signifyd.com/api/script-tag.js",
            "https://ajax.googleapis.com/ajax/libs/jquery/3.6.0/jquery.min.js",
            "https://www.dinancars.com/assets/js/combine/min/v1653077793/e88cd3e3db8ab2b910e50cf4deb60529f/default;jquery-ui.min;js.cookie;util;nav;cart;accountfunctions;jquery.activity-indicator-1.0.0.min;drawer_plugin;floating_label_gen;jquery.autoellipsis-1.0.10;fresco;fresco-custom;isotope_imagesloaded.min;promo_autoplus_helpers;slick.min;widgets;jquery.custom-carousel;waterfall_helpers/",
            "https://imgs.signifyd.com/fp/tags.js?org_id=w2txo5aa&session_id=7632E9E9-DE48-41D8-9BAC-1E27A98D17EC&pageid=2",
            "https://www.googletagmanager.com/gtag/js?id=AW-1027984682",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1027984682/?random=1653327072015&cv=9&fst=1653327072015&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=6&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2oa5b0&sendb=1&ig=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fwww.dinancars.com%2Fabout%2F&ref=https%3A%2F%2Fwww.dinancars.com%2Fupdate-agent&tiba=About%20Dinan%20-%20Dinan&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
            "https://js.hs-scripts.com/8009596.js",
            "https://www.dinancars.com/assets/css/jquery-ui-custom.css",
            "https://www.dinancars.com/update-agent"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1495",
              "name": "Firmware Corruption",
              "display_name": "T1495 - Firmware Corruption"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1806,
            "hostname": 682,
            "FileHash-SHA256": 240,
            "domain": 274
          },
          "indicator_count": 3002,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1427 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6261f2763fabd1214a79f0e5",
          "name": "Masterhost.ru - malware hosting",
          "description": "Here is the code-decode for the punycode-overflow test, which is based on the results of the following test-run by the UK's Office of National Statistics (ONS).",
          "modified": "2022-05-21T00:03:44.725000",
          "created": "2022-04-22T00:10:30.250000",
          "tags": [
            "fffe37",
            "b76810",
            "helvetica",
            "arial",
            "pf din",
            "text comp",
            "circe",
            "span",
            "button",
            "90deg",
            "object",
            "typeof t",
            "date",
            "promise",
            "function",
            "array",
            "regexp",
            "error",
            "typeof symbol",
            "typeof n",
            "null",
            "backspace",
            "void",
            "window",
            "vd",
            "gc",
            "typeof e",
            "sufeffxa0",
            "class",
            "attr",
            "pseudo",
            "child",
            "typeof module",
            "string",
            "weakmap",
            "proxy",
            "number",
            "boolean",
            "trnf",
            "keepalive",
            "transitiongroup",
            "hello",
            "comment",
            "infinity",
            "this",
            "copyright",
            "closure library",
            "xdfunction",
            "cdfunction",
            "ddfunction",
            "bded",
            "kefunction",
            "65535",
            "counter",
            "typeof c",
            "segoe ui",
            "typeerror",
            "lucida",
            "vwtabguid",
            "form",
            "impact",
            "light",
            "cureit",
            "bu durumda",
            "ip address",
            "devam",
            "yandex",
            "help section",
            "captcha code",
            "support service",
            "search",
            "edge",
            "swhealthlog",
            "logsdatabasev2",
            "trident",
            "android",
            "rangeerror",
            "webpackexports",
            "illegal input",
            "webpackrequire"
          ],
          "references": [
            "https://admin.verbox.ru/support/support.js?h=afe80d31a1cabd6ae5c00580688f27d2",
            "https://www.youtube.com/s/player/534c466c/www-widgetapi.vflset/www-widgetapi.js",
            "https://site.yandex.net/v2.0/js/all.js",
            "https://mc.yandex.ru/metrika/tag.js",
            "https://www.googletagmanager.com/gtag/js?id=UA-36935570-1",
            "https://masterhost.ru/s/masterhost_v2/build/js/app.js?v=WivgGVzt/Ynv",
            "https://masterhost.ru/s/masterhost_v2/build/js/compiled.min.js?v=Q/hhNATxy3sx",
            "https://static.me-talk.ru/cabinet/build/chat/modern.support.js",
            "https://masterhost.ru/s/masterhost_v2/build/css/global.css?v=MUmvaY06hvKf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Gc",
              "display_name": "Gc",
              "target": null
            },
            {
              "id": "Vd",
              "display_name": "Vd",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1991,
            "hostname": 678,
            "FileHash-SHA256": 247,
            "domain": 404,
            "email": 1,
            "FileHash-MD5": 51
          },
          "indicator_count": 3372,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 70,
          "modified_text": "1429 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62616627ee302d24b23523c3",
          "name": "enom.com & 4vendeta.com - ReduceRight malware hosting/creation",
          "description": "New RegExp(M) is a new type, and it will change any of the elements to the same type if you want to add them to your HTML page or add a third element.",
          "modified": "2022-05-21T00:03:44.725000",
          "created": "2022-04-21T14:11:51.629000",
          "tags": [
            "tbody",
            "span",
            "thead",
            "tfoot",
            "multiple",
            "type",
            "href",
            "input",
            "halflings",
            "gradienttype1",
            "twitter",
            "false",
            "fontface",
            "fatface",
            "woff2",
            "u0259",
            "u1e001eff",
            "u2020",
            "u20a020ab",
            "u20ad20cf",
            "u2113",
            "u2c602c7f",
            "typesubmit",
            "function",
            "typeof c",
            "formdata",
            "this",
            "typeof define",
            "null",
            "typeof f",
            "object",
            "boolean",
            "typeof module",
            "error",
            "reflect",
            "math",
            "regexp",
            "number",
            "array",
            "typeerror",
            "string",
            "symbol",
            "typeof e",
            "typeof t",
            "class",
            "attr",
            "pseudo",
            "child",
            "js foundation",
            "account",
            "open",
            "navitem",
            "text",
            "mainnav",
            "click",
            "blank",
            "copyright",
            "u0027",
            "value",
            "body",
            "firefox",
            "enum",
            "html",
            "msie",
            "applewebkit",
            "traceconsole",
            "form",
            "iframe",
            "legend",
            "nonmsdombrowser",
            "callbackindex",
            "callbackframeid",
            "eventtarget",
            "eventargument",
            "validation",
            "explorer",
            "target",
            "plugin",
            "bootstrap",
            "https",
            "conflict",
            "focus",
            "next",
            "trigger",
            "checkbox",
            "delta",
            "scroll",
            "sourceid",
            "date",
            "sessiontoken",
            "sessionexpires",
            "void",
            "rangeerror",
            "utf16",
            "illegal input",
            "global",
            "chrome",
            "opredge",
            "opera",
            "safari",
            "version",
            "sxa0",
            "browser",
            "typeof require",
            "dom node",
            "typeof d",
            "component",
            "typeof h",
            "bubble",
            "reduceright",
            "script",
            "typeof n",
            "jhnew ia",
            "gtm5sn6brv",
            "path",
            "host",
            "trackpageview",
            "gw8yd4p2eny",
            "select",
            "strong",
            "uint8array",
            "android",
            "verify",
            "stop",
            "enterprise",
            "widget",
            "window",
            "generator",
            "reload",
            "r300",
            "caca",
            "closure library",
            "xdfunction",
            "adfunction",
            "cdfunction",
            "ddfunction",
            "bded",
            "please",
            "typeemail",
            "email",
            "jarallaxinner",
            "webkit",
            "property",
            "transform",
            "trident",
            "edge",
            "ipodi",
            "ipadi",
            "androidi",
            "blackberryi",
            "windows phonei",
            "xfunction",
            "pfunction",
            "wfunction",
            "show navigation",
            "mjquery",
            "typeof",
            "defaulttype",
            "hidden",
            "show",
            "shown",
            "startr",
            "endr",
            "federico zivolo",
            "distributed",
            "mit license",
            "statict",
            "flip"
          ],
          "references": [
            "xfe-IP-78.142.35.163-stix2-2.1-export.json",
            "xfe-URL-Enom.com-stix2-2.1-export.json",
            "xfe-URL-4vendeta.com-stix2-2.1-export.json",
            "https://4vendeta.com/assets/js/jquery.min.js",
            "https://4vendeta.com/assets/js/popper.min.js",
            "https://4vendeta.com/assets/js/bootstrap.min.js",
            "https://4vendeta.com/assets/js/meanmenu.min.js",
            "https://4vendeta.com/assets/js/parallax.min.js",
            "https://4vendeta.com/assets/js/ajaxchimp.min.js",
            "https://www.googletagmanager.com/gtag/js?id=UA-92521958-1",
            "https://www.googletagmanager.com/gtag/js?id=G-W8YD4P2ENY&l=dataLayer&cx=c",
            "https://www.gstatic.com/recaptcha/releases/QENb_qRrX0-mQMyENQjD6Fuj/recaptcha__en.js",
            "https://www.googletagmanager.com/gtm.js?id=GTM-5SN6BRV",
            "https://static.zdassets.com/ekr/snippet.js?key=7342b695-e394-4f25-89a0-da9d262a48da",
            "https://cp.enom.com/js/jquery-3.5.1.min.js",
            "https://cp.enom.com/responsive/_js/knockout-3.3.0.min.js",
            "https://cp.enom.com/js/global-functions.js",
            "https://cp.enom.com/js/punycode.min.js",
            "https://cp.enom.com/js/jquery.disableonsubmit.min.js",
            "https://cp.enom.com/js/jquery.cookie.min.js",
            "https://cp.enom.com/js/cart.minicart.min.js",
            "https://cp.enom.com/js/openWin.min.js",
            "https://cp.enom.com/js/jquery.jgrowl.min.js",
            "https://cp.enom.com/scripts/Session.min.js",
            "https://cp.enom.com/responsive/_js/init.min.js",
            "https://cp.enom.com/responsive/_js/bootstrap.js",
            "https://cp.enom.com/WebResource.axd?d=6rtXrDcnyiYD-9dFDFOkxTRcPVSrAN8fR-cHKzNqPTy7bHic-2LLMHDnielTzEI-sd1KplHrRBudcZJOm0-lxubO7k41&t=637453818340000000",
            "https://cp.enom.com/ScriptResource.axd?d=fVjQa-0YyNqO6JmV36bw6eBJdTjE2YSdtcunOWcKYcBNn73MOJKQA_rxX3YMhcxLTgyDsGTKy0p9NEPvxzpqEpBKtm3GLb2GgI1LFYMC0Xr2lh71ZCttzgNGFnc5mS_Fc_DY5UH0M19Mr958h1jvmK4kzAM1&t=363be08",
            "https://cp.enom.com/ScriptResource.axd?d=lDjPFfAIWSrEAVNgTHTrISQmLEFmHAaibvNJQuGRZDbWpGFPLrFwaGVpjCUsI6HkqzbpwmaAa0cJCrq8f0eqEvIsQM8lvN_dVYVyESnohON4oTvdMZHDmwG83uJA4m2oqykP8TTTSIeV2oaNrlIXaX8cOxC5Cv6aGmjpdB2u-227wdn30&t=363be08",
            "https://cdn.optimizely.com/js/26241557.js",
            "https://cp.enom.com/verisign-seal.htm",
            "https://cp.enom.com/global/TopMenu.ascx.js",
            "http://alp-vision.com/wp-includes/js/jquery/jquery.min.js?ver=3.5.1",
            "http://alp-vision.com/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=7.4.4",
            "http://alp-vision.com/wp-content/cache/autoptimize/js/autoptimize_78b4f9b28399aa3c8a405e45931ad058.js",
            "http://alp-vision.com/wp-includes/css/dist/block-library/style.min.css?ver=5.7.6",
            "http://fonts.googleapis.com/css?family=Abril+Fatface%3Aregular&subset=latin%2Ccyrillic&ver=5.7.6",
            "http://alp-vision.com/wp-content/themes/alp-vision/css/bootstrap.css?ver=1.0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2989,
            "hostname": 1208,
            "domain": 634,
            "FileHash-SHA256": 302
          },
          "indicator_count": 5133,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1429 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62609c764fab13bbe96613f8",
          "name": "Pegasus - pegtech.com",
          "description": "New RegExp:function(a,b), a new type, has its own built-up property, as well as an ability to store information in place when it is not already available.",
          "modified": "2022-05-20T00:01:19.453000",
          "created": "2022-04-20T23:51:18.734000",
          "tags": [
            "fontface",
            "woff",
            "sans",
            "woff2",
            "u1c801c88",
            "u20b4",
            "u2de02dff",
            "ua640a69f",
            "ufe2efe2f",
            "u04b004b1",
            "u2116",
            "datasecret",
            "chrome",
            "opredge",
            "isoperaedge",
            "opera",
            "browsername",
            "gecko",
            "iphone",
            "body",
            "srchttp",
            "strhashchange",
            "software",
            "sectionindex",
            "srchttps",
            "etslidertimer",
            "copyright",
            "typeof define",
            "etslidesnumber",
            "columns",
            "date",
            "error",
            "cowboy",
            "function",
            "placeheld",
            "customevent",
            "click",
            "minimum",
            "tooshort",
            "wpcf7wfreetext",
            "alert",
            "invert",
            "null",
            "form",
            "fast",
            "false",
            "path",
            "next",
            "video lightbox",
            "plugin",
            "expand",
            "previous",
            "setposition",
            "isset",
            "srcyoutube",
            "srcvimeo",
            "image",
            "lightbox clone",
            "stephane caron",
            "typeof therel",
            "regexp",
            "play",
            "close",
            "pseudo",
            "child",
            "typeof b",
            "array",
            "sufeffxa0",
            "class",
            "attr",
            "void",
            "udc66udc67",
            "ud83d",
            "ufe0f",
            "ud83e",
            "udc68udc69",
            "udfcbudfcc",
            "u2640u2642",
            "uddb0uddb3",
            "udd74udd75"
          ],
          "references": [
            "xfe-URL-pegtech.com-stix2-2.1-export.json",
            "https://pegtech.com/wp-includes/js/wp-emoji-release.min.js?ver=4.9.20",
            "https://pegtech.com/wp-includes/js/jquery/jquery.js?ver=1.12.4",
            "https://pegtech.com/wp-content/plugins/wp-video-lightbox/js/jquery.prettyPhoto.min.js?ver=3.1.6",
            "https://pegtech.com/wp-content/plugins/wp-video-lightbox/js/video-lightbox.js?ver=3.1.6",
            "https://pegtech.com/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=5.0.2",
            "https://pegtech.com/wp-content/themes/Divi/js/custom.min.js?ver=3.0.100",
            "https://pegtech.com/wp-content/themes/Divi/core/admin/js/common.js?ver=3.0.100",
            "https://pegtech.com/wp-includes/js/wp-embed.min.js?ver=4.9.20",
            "https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800&subset=latin,latin-ext",
            "https://pegtech.com/wp-includes/css/dashicons.min.css?ver=4.9.20"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 856,
            "domain": 190,
            "hostname": 364,
            "FileHash-SHA256": 216
          },
          "indicator_count": 1626,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1430 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "625f6d2300f3002b1d0f8a68",
          "name": "CPANEL-TUCOWS \u2014malware hosting",
          "description": "FBEvents-PostalCodeType, a new type of phone number type, has been added to the list of \"signals\" that can be controlled by a specialised operator.",
          "modified": "2022-05-19T00:00:49.028000",
          "created": "2022-04-20T02:17:07.272000",
          "tags": [
            "tucows",
            "vimeo",
            "enter otp",
            "foruserlogin",
            "username",
            "email address",
            "phone number",
            "click",
            "null",
            "otpviamail",
            "otpviasms",
            "error",
            "regexp",
            "edge",
            "elem",
            "function",
            "handle",
            "return",
            "expando",
            "match",
            "selector",
            "android",
            "false",
            "date",
            "target",
            "class",
            "mark",
            "copy",
            "capture",
            "seed",
            "pass",
            "enough",
            "code",
            "never",
            "core",
            "local",
            "verify",
            "fall",
            "accept",
            "done",
            "find",
            "internal",
            "inject",
            "possible",
            "prop",
            "trigger",
            "qe",
            "number",
            "string",
            "copyright",
            "uint8array",
            "xhfunction",
            "yhfunction",
            "gtmwrdf3cb",
            "host",
            "path",
            "gaugescookie",
            "gaugesuniqueday",
            "gaugesgauges",
            "slice",
            "image",
            "gaugestracker",
            "gaugesunique",
            "script",
            "closure library",
            "typeerror",
            "symbol",
            "array int8array",
            "caregexp",
            "legacy",
            "extra",
            "bootstrap",
            "medium",
            "large",
            "segoe ui",
            "roboto",
            "oxygensans",
            "ubuntu",
            "cantarell",
            "helvetica neue",
            "dataalignleft",
            "figcaption",
            "video",
            "ff6c2c",
            "styles",
            "badges",
            "small",
            "woff2",
            "fontface",
            "sans",
            "u1c801c88",
            "u20b4",
            "u2de02dff",
            "ua640a69f",
            "ufe2efe2f",
            "u04b004b1",
            "u2116",
            "arial",
            "helvetica",
            "montserrat",
            "productnav",
            "secondarynav",
            "typecheckbox",
            "menlo",
            "monaco",
            "consolas",
            "twitter",
            "font awesome",
            "license",
            "brands",
            "duotone",
            "msie",
            "russia",
            "paypal",
            "enduser license",
            "agreement",
            "europe",
            "typeof t",
            "typeof e",
            "typeof",
            "version",
            "attr",
            "pseudo",
            "object",
            "array",
            "invalid attempt",
            "typeof symbol",
            "survey",
            "trident",
            "form",
            "fullscreen",
            "property",
            "311218982",
            "textjavascript",
            "piscriptnum",
            "hj",
            "hotjar",
            "email",
            "telefon",
            "meta",
            "cookie",
            "keypress",
            "live",
            "generic",
            "window",
            "widget",
            "ciudad",
            "adore",
            "experiment",
            "mutation",
            "udc66udc67",
            "ud83d",
            "ufe0f",
            "ud83e",
            "udc68udc69",
            "udfcbudfcc",
            "u2640u2642",
            "source",
            "ud83dudc6cud83c",
            "cookiebot",
            "iabv2",
            "jsonversion",
            "cookie script",
            "methodstrict",
            "ticket",
            "id attribute",
            "cookiebot setup",
            "cookieconsent",
            "project",
            "reduceright",
            "trackevent",
            "pageview",
            "gtmwb4lhq4",
            "void",
            "pfunction",
            "contenttype",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction",
            "thank",
            "f39c11",
            "quick question",
            "difficult",
            "easy",
            "poll",
            "typeof window",
            "invalid uuid",
            "functional",
            "member",
            "hnew regexp",
            "qfunction",
            "adview",
            "addbillinginfo",
            "addtocart",
            "addtolist",
            "contact",
            "download",
            "install",
            "signup",
            "addtowishlist",
            "lead",
            "custom",
            "typeof require",
            "sha256",
            "viewcontent",
            "search",
            "iterator",
            "boolean",
            "service",
            "phonenumber",
            "facebook",
            "javascript",
            "1cend"
          ],
          "references": [
            "xfe-URL-Cpanel.com-stix2-2.1-export.json",
            "https://pi.pardot.com/pd.js",
            "https://connect.facebook.net/signals/config/285857426541675?v=2.9.57&r=stable",
            "https://www.redditstatic.com/ads/pixel.js",
            "https://snap.licdn.com/li.lms-analytics/insight.min.js",
            "https://static.ads-twitter.com/uwt.js",
            "https://www.googleadservices.com/pagead/conversion_async.js",
            "https://static.hotjar.com/c/hotjar-1683409.js?sv=7",
            "https://www.google-analytics.com/analytics.js",
            "https://consent.cookiebot.com/da52fc49-8e48-42b7-9ad3-c219404f6f92/cc.js?renew=false&referer=cpanel.net&dnt=false",
            "https://consentcdn.cookiebot.com/consentconfig/da52fc49-8e48-42b7-9ad3-c219404f6f92/cpanel.net/configuration.js",
            "https://www.googletagmanager.com/gtm.js?id=GTM-WB4LHQ4",
            "https://www.bugherd.com/sidebarv2.js?apikey=kmu00qbvuigehexs5chefq",
            "https://consent.cookiebot.com/uc.js",
            "https://cpanel.net/wp-includes/js/wp-emoji-release.min.js?ver=5.6",
            "https://script.hotjar.com/modules.0076bf93c385ddf0ff58.js",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/728582492/?random=1650418372747&cv=9&fst=1650418372747&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fcpanel.net%2F&tiba=Hosting%20Platform%20of%20Choice&hn=www.googleadservices.com&us_privacy=1---&async=1&rfmt=3&fmt=4",
            "https://www.googleadservices.com/pagead/conversion/854235671/?random=1650418372749&cv=9&fst=1650418372749&num=1&value=0&label=PRNxCIWemu8BEJe0qpcD&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&data=ads_data_redaction%3Dfalse&frm=0&url=https%3A%2F%2Fcpanel.net%2F&tiba=Hosting%20Platform%20of%20Choice&gcs=G111&did=dMWZhNz&edid=dMWZhNz&auid=2050955691.1650418373&capi=2&hn=www.googleadservices.com&btty",
            "https://pi.pardot.com/analytics?ver=3&visitor_id=&visitor_id_sign=&pi_opt_in=&campaign_id=33566&account_id=872471&title=Hosting%20Platform%20of%20Choice&url=https%3A%2F%2Fcpanel.net%2F&referrer=",
            "https://www.1.cpanel.net/analytics?conly=true&visitor_id=311218274&visitor_id_sign=3e1116a56bfd91923fe15cac565b502779c6ec3fe7449557f3940ba04e77079951b9efb044c2275f4211d26742585a9d14544eae&pi_opt_in=&campaign_id=33566&account_id=872471&title=Hosting%20Platform%20of%20Choice&url=https://cpanel.net/&referrer=",
            "https://script.hotjar.com/survey-v2.3716506838f2208ab9e2.js",
            "https://cpanel.net/wp-content/themes/cPbase/assets/js/dist/script.js?ver=5.6",
            "https://cpanel.net/wp-content/themes/cPbase/assets/js/dist/cpbase.js?ver=5.6",
            "https://cpanel.net/wp-includes/js/wp-embed.min.js?ver=5.6",
            "https://pro.fontawesome.com/releases/v5.13.1/css/all.css",
            "https://vars.hotjar.com/box-4924254a9ce4dc9b959b6e4a9b662d60.html",
            "https://consentcdn.cookiebot.com/sdk/bc-v4.min.html",
            "https://cpanel.net/wp-content/themes/cPbase/style.css?ver=5.6",
            "https://cpanel.net/wp-includes/css/dist/block-library/style.min.css?ver=5.6",
            "https://fonts.googleapis.com/css?family=Open+Sans:100,200,300,400,500,600,700%7CMontserrat:100,200,300,400,500,600,700",
            "https://cpanel.net/wp-content/themes/cPbase/assets/css/version96.css",
            "https://cpanel.net/wp-content/themes/cPbase/assets/css/roadmap.css",
            "xfe-URL-pi.pardot.com-stix2-2.1-export.json",
            "xfe-URL-Cpanel.net-stix2-2.1-export.json",
            "https://secure.gaug.es/track.js",
            "https://www.googletagmanager.com/gtm.js?id=GTM-WRDF3CB",
            "https://149371662.v2.pressablecdn.com/wp-includes/js/jquery/jquery.js",
            "https://149371662.v2.pressablecdn.com/wp-content/plugins/user-verification/assets/front/js/scripts-otp.js",
            "https://player.vimeo.com/video/571271613",
            "https://bid.g.doubleclick.net/xbbe/pixel?d=KAE"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Tunisia"
          ],
          "malware_families": [
            {
              "id": "Qe",
              "display_name": "Qe",
              "target": null
            },
            {
              "id": "hj",
              "display_name": "hj",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 3487,
            "URL": 10195,
            "domain": 1182,
            "FileHash-SHA256": 815,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 1
          },
          "indicator_count": 15683,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 73,
          "modified_text": "1431 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "625f492a0581b2eb202e47c9",
          "name": "Malware hosting - hostrocket.com",
          "description": "ChunkLoadError, a new type of error, failed to load a chunk of JavaScript, according to the web browser operator, E.noconflict.com, as well as the website itself.",
          "modified": "2022-05-19T00:00:49.028000",
          "created": "2022-04-19T23:43:38.539000",
          "tags": [
            "jxuiwidget",
            "null",
            "function",
            "jxuihtmldiv",
            "date",
            "jxuilabel",
            "zendesk chat",
            "regexp",
            "api update",
            "jxuihtmla",
            "window",
            "chat",
            "void",
            "error",
            "loader",
            "back",
            "click",
            "close",
            "agent",
            "hello",
            "form",
            "banned",
            "cookie",
            "small",
            "legacy",
            "direct",
            "colorbox core",
            "style",
            "user style",
            "colorbox",
            "html",
            "6deg",
            "e5e5e5",
            "dbdbdb",
            "d2d2d2",
            "eaedef",
            "michael farrell",
            "home",
            "helvetica",
            "ssd shared",
            "page",
            "formnum",
            "hidden",
            "current",
            "hostrocket",
            "dotblock",
            "fast",
            "href",
            "price slider",
            "tooltip",
            "dotblock popup",
            "callback",
            "rect",
            "cycle plugin",
            "number",
            "auto",
            "shuffle",
            "manual",
            "roll",
            "speed",
            "stop",
            "false",
            "first",
            "look",
            "copyright",
            "gpl version",
            "http",
            "document",
            "ui effects",
            "width",
            "left",
            "bottom",
            "this",
            "atom",
            "html id",
            "price",
            "timer",
            "value",
            "processor",
            "example",
            "storage",
            "string",
            "class",
            "thecookie",
            "create",
            "thevalue",
            "param",
            "type",
            "pluginscookie",
            "author",
            "jquery",
            "u00a0",
            "option",
            "body",
            "optgroup",
            "multiple",
            "selectboxhover",
            "selectbox",
            "label",
            "control",
            "slideshow",
            "jack moore",
            "mit license",
            "overlay",
            "wrapper",
            "content",
            "loadedcontent",
            "loadingoverlay",
            "next",
            "iframe",
            "array",
            "attr",
            "tools",
            "ui library",
            "no copyrights",
            "or licenses",
            "like",
            "media",
            "john resig",
            "dual",
            "gtmkw8b5l",
            "classes",
            "host",
            "path",
            "element",
            "trackpageview",
            "typeerror",
            "typeof symbol",
            "typeof e",
            "typeof t",
            "referenceerror",
            "promise",
            "script",
            "boolean",
            "typeof n"
          ],
          "references": [
            "xfe-URL-hostrocket.com-stix2-2.1-export 2.json",
            "https://www.googletagmanager.com/gtm.js?id=GTM-KW8B5L",
            "https://www.hostrocket.com/js/jquery-1.6.1.min.js",
            "https://www.hostrocket.com/js/jquery.tools.min.js",
            "https://www.hostrocket.com/js/jquery.colorbox-min.js",
            "https://www.hostrocket.com/js/jquery.selectBox.min.js",
            "https://www.hostrocket.com/js/jquery.cookie.js",
            "https://www.hostrocket.com/js/jquery.price_slider.js",
            "https://www.hostrocket.com/js/jquery-ui-1.8.13.custom.min.js",
            "https://www.hostrocket.com/js/jquery.cycle.all.js",
            "https://www.hostrocket.com/js/jquery.behavior.js",
            "https://www.hostrocket.com/contact-files/contact-form.js",
            "https://www.hostrocket.com/css/style.css",
            "https://www.hostrocket.com/css/colorbox.css",
            "https://www.hostrocket.com/css/style-nophone.css",
            "https://v2.zopim.com/bin/v/widget_v2.329.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 963,
            "email": 3,
            "domain": 412,
            "URL": 2338,
            "FileHash-SHA256": 232,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 3950,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1431 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "625f42dcc369f59f6a1e8b58",
          "name": "data102 and colohouse. Malware hosting",
          "description": "var a,b,c,d, f.substr(d),a=f, a.href, and a number of other elements:a.b.search.com.",
          "modified": "2022-05-19T00:00:49.028000",
          "created": "2022-04-19T23:16:44.418000",
          "tags": [
            "regexp",
            "rangeerror",
            "typeerror",
            "date",
            "array",
            "error",
            "this",
            "uint8array",
            "typeof b",
            "buffer",
            "class",
            "null",
            "path",
            "void",
            "marketo forms",
            "cross domain",
            "typetext",
            "typeurl",
            "typeemail",
            "typetel",
            "typenumber",
            "typedate",
            "color",
            "label",
            "input",
            "typerange",
            "typecheckbox",
            "woff2",
            "fontface",
            "u1c801c88",
            "u20b4",
            "u2de02dff",
            "ua640a69f",
            "ufe2efe2f",
            "u04b004b1",
            "u2116",
            "u1ea01ef9",
            "franklin",
            "woff",
            "u20ab",
            "u0259",
            "u1e001eff",
            "u2020",
            "u20a020ab",
            "u20ad20cf",
            "gradienttype0",
            "webkitkeyframes",
            "span",
            "button",
            "tbody",
            "textarea",
            "helvetica neue",
            "tfoot",
            "body",
            "alpha",
            "twitter",
            "roboto",
            "pitch",
            "datasecret",
            "q1kg",
            "q17g",
            "d2dg",
            "c d3r",
            "q171zg",
            "e c2ttttb",
            "c g7",
            "6n184z",
            "6f6g",
            "typeof",
            "wpcf7redirect",
            "cf7mlscurrentfs",
            "handle fire",
            "popuptemplate",
            "templatename",
            "click",
            "fieldset",
            "cf7mlsbackfs",
            "section",
            "classwidget",
            "idmenu",
            "idfooter",
            "idwidget",
            "idcomment",
            "classmenu",
            "classfooter",
            "classcomment",
            "target",
            "blank",
            "typeof e",
            "formdata",
            "typeof symbol",
            "customevent",
            "post",
            "refill",
            "wpcf7",
            "wpcf7locale",
            "wpcf7unittag",
            "typeof wpcf7",
            "boolean",
            "modernizr",
            "custom build",
            "build",
            "afunction",
            "cfunction",
            "object",
            "documenttouch",
            "websocket",
            "symbol",
            "generator",
            "function",
            "select",
            "harvest",
            "mit license",
            "optgroup",
            "nnn n",
            "n nnnn",
            "explorer",
            "options",
            "abbr",
            "element",
            "unknownerror",
            "overquerylimit",
            "requestdenied",
            "zeroresults",
            "node",
            "edge",
            "android",
            "trident",
            "unknown",
            "false",
            "iframe",
            "marker",
            "hybrid",
            "tawkspinner",
            "failed",
            "resend",
            "tawkavatar",
            "tawkvideo",
            "tawkalert",
            "tawkemoji",
            "tawkicon",
            "enter",
            "number",
            "startchatbutton",
            "u26a1",
            "typeof t",
            "invalid attempt",
            "copyright",
            "marketo",
            "remove",
            "commentform",
            "author",
            "mouseenter",
            "secure",
            "ccpa",
            "bottom",
            "fixed",
            "widget",
            "embed",
            "trigger",
            "antispam",
            "please",
            "cleantalk",
            "typeof o",
            "ajaxnonce",
            "unkown",
            "apbctajaxerror",
            "typeof define",
            "typeof module",
            "html tags",
            "ox20trnf",
            "dom element",
            "attr",
            "pseudo",
            "child",
            "udc66udc67",
            "ud83d",
            "ufe0f",
            "ud83e",
            "udc68udc69",
            "udfcbudfcc",
            "u2640u2642",
            "source",
            "image",
            "ud83dudc6cud83c",
            "qe",
            "string",
            "xhfunction",
            "yhfunction",
            "gtmptxlxz4",
            "host",
            "code",
            "script",
            "promise",
            "complete",
            "reduceright",
            "g7be8pmlskx",
            "r300",
            "typeof d",
            "caca",
            "ufunction",
            "ffunction",
            "gfunction",
            "mchtd",
            "azaz",
            "firefox",
            "opera",
            "chrome",
            "iemobile",
            "black",
            "incorrect",
            "xfunction",
            "typeof p",
            "typeof btoa",
            "vnode",
            "colohouse",
            "york",
            "learn more",
            "data center",
            "miami",
            "e cermak",
            "springs",
            "read",
            "cloud",
            "managed",
            "fast",
            "philadelphia",
            "bare",
            "metal",
            "chat",
            "accept",
            "placeheld",
            "minimum",
            "tooshort",
            "wpcf7wfreetext",
            "alert",
            "invert",
            "form",
            "animation",
            "value",
            "foundation",
            "migrate",
            "backcompat",
            "quirks mode",
            "typeof f",
            "html",
            "sufeffxa0",
            "legacy",
            "contenttype",
            "wivobjkey",
            "typehit",
            "data",
            "closure library",
            "pfunction",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction"
          ],
          "references": [
            "xfe-URL-Data102.com-stix2-2.1-export.json",
            "https://www.google-analytics.com/analytics.js",
            "https://chimpstatic.com/mcjs-connected/js/users/6c3abfa7ff8634c75cdb2b22e/ddf7a436c1746be666f330e4a.js",
            "https://app.whoisvisiting.com/who.js",
            "https://www.data102.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp",
            "https://www.data102.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1",
            "https://www.data102.com/?wordfence_lh=1&hid=2D6A812A7EB197E80D5A3978A6386BE4&r=0.5029022326538093",
            "https://www.data102.com/wp-includes/js/wp-embed.min.js?ver=00b0ffc433836dcf9f57035fded0b908",
            "https://www.data102.com/wp-content/plugins/cta/shared//shortcodes/js/spin.min.js",
            "https://www.data102.com/wp-content/plugins/contact-form-7/includes/js/scripts.js",
            "https://colohouse.com/",
            "xfe-URL-colohouse.com-stix2-2.1-export.json",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-main.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-vendor.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-vendors.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-common.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-runtime.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-app.js",
            "https://munchkin.marketo.net/161/munchkin.js",
            "https://www.googletagmanager.com/gtag/js?id=G-7BE8PMLSKX&l=dataLayer&cx=c",
            "https://embed.tawk.to/5697c34527b9b5d40b66960f/default",
            "https://www.googletagmanager.com/gtm.js?id=GTM-PTXLXZ4",
            "https://colohouse.com/wp-includes/js/wp-emoji-release.min.js?ver=5.8",
            "https://colohouse.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
            "https://colohouse.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2",
            "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/apbct-public--functions.min.js?ver=5.173",
            "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/apbct-public.min.js?ver=5.173",
            "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/cleantalk-modal.min.js?ver=5.173",
            "https://colohouse.com/wp-content/plugins/cookie-law-info/public/js/cookie-law-info-public.js?ver=2.0.4",
            "https://colohouse.com/wp-content/plugins/stop-user-enumeration/frontend/js/frontend.js?ver=1.3.31",
            "https://colohouse.com/wp-content/plugins/duracelltomi-google-tag-manager/js/gtm4wp-form-move-tracker.js?ver=1.13.1",
            "https://munchkin.marketo.net/munchkin.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-2d0d2b7c.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-32507910.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-f163fcd0.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-2d0b9454.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-4fe9d5dd.js",
            "https://app-ab02.marketo.com/js/forms2/js/forms2.min.js",
            "https://maps.googleapis.com/maps/api/js?v=3.exp&key=AIzaSyDR76rjQL_2raonHiZ6ZrPqJr-FPb7pGH0",
            "https://colohouse.com/wp-content/themes/Netrouting/assets/chosen/chosen.jquery.min.js",
            "https://colohouse.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.7",
            "https://colohouse.com/wp-content/themes/Netrouting/js/vendor/modernizr-2.8.3-respond-1.4.2.min.js",
            "https://colohouse.com/wp-content/plugins/contact-form-7/includes/js/index.js?ver=5.4.2",
            "https://colohouse.com/wp-content/plugins/link-whisper-premium/js/frontend.js?ver=1632756485",
            "https://colohouse.com/wp-content/plugins/wpcf7-redirect/build/js/wpcf7-redirect-frontend-script.js?ver=1.1",
            "https://colohouse.com/wp-content/plugins/kingcomposer/assets/frontend/js/kingcomposer.min.js?ver=2.9.6",
            "https://colohouse.com/wp-includes/js/wp-embed.min.js?ver=5.8",
            "https://colohouse.com/wp-content/plugins/wp-schema-pro/admin/assets/min-js/frontend.min.js?ver=2.7.2",
            "https://colohouse.com/wp-content/cache/autoptimize/css/autoptimize_5e11636f7dd8fb4f55e0ff84f0ed5faa.css",
            "https://fonts.googleapis.com/css?family=Libre+Franklin%3A300%2C300i%2C400%2C400i%2C600%2C600i%2C800%2C800i&subset=latin%2Clatin-ext",
            "https://fonts.googleapis.com/css?family=Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic&subset=greek%2Clatin%2Cvietnamese%2Clatin-ext%2Ccyrillic%2Ccyrillic-ext%2Cgreek-ext&ver=2.9.6",
            "https://app-ab02.marketo.com/js/forms2/css/forms2.css",
            "https://app-ab02.marketo.com/js/forms2/css/forms2-theme-simple.css",
            "https://app-ab02.marketo.com/index.php/form/XDFrame"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Qe",
              "display_name": "Qe",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1049",
              "name": "System Network Connections Discovery",
              "display_name": "T1049 - System Network Connections Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2599,
            "hostname": 952,
            "FileHash-SHA256": 458,
            "domain": 557
          },
          "indicator_count": 4566,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1431 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "625f2b6a1f2c9d5631d261d5",
          "name": "Choopa.com - vultr",
          "description": "New RegExp(M) is a new type, and it will change any of the elements to the same type if you want to add them to your HTML page or add a third element.",
          "modified": "2022-05-19T00:00:49.028000",
          "created": "2022-04-19T21:36:42.286000",
          "tags": [
            "regexp",
            "typeof e",
            "typeof t",
            "function",
            "width",
            "error",
            "object",
            "pseudo",
            "child",
            "form",
            "class",
            "null",
            "date",
            "this",
            "void",
            "accept",
            "680876936",
            "389564586",
            "17606105819",
            "1044525330",
            "176418897",
            "121200080426",
            "1473231341",
            "45705983",
            "71770035416",
            "1958414417",
            "copyright",
            "closure library",
            "trunc",
            "msie",
            "tagpath",
            "fbcd",
            "body",
            "html",
            "gettarget",
            "571256413046247",
            "prop",
            "click",
            "typeof l",
            "json",
            "array",
            "string",
            "8760",
            "image",
            "adveid",
            "typeof c",
            "typeerror",
            "typeof",
            "facebook pixel",
            "pixel code",
            "symbol",
            "iterator",
            "constantvalue",
            "globalvariable",
            "facebook",
            "boolean",
            "service",
            "phonenumber",
            "meta",
            "invalid uuid",
            "uint8array",
            "nullu",
            "1099511627776",
            "t4294967296",
            "typeof symbol",
            "customevent",
            "09af",
            "ver0",
            "tag0",
            "extdata0",
            "ua ch",
            "invalid",
            "reduceright",
            "number",
            "gk6536fhn4d",
            "r300",
            "typeof d",
            "path",
            "caca",
            "addtocart",
            "signup",
            "addtowishlist",
            "lead",
            "custom",
            "typeof require",
            "sha256",
            "viewcontent",
            "search",
            "pfunction",
            "contenttype",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction",
            "functional",
            "member",
            "hnew regexp",
            "qfunction",
            "adview",
            "addbillinginfo",
            "addtolist",
            "contact",
            "download",
            "install",
            "pnull",
            "style",
            "ctnull",
            "post",
            "uint32array",
            "fanull",
            "license",
            "ynull",
            "config",
            "iframe",
            "javascript",
            "code",
            "hoverpopup",
            "please",
            "output",
            "popupmodal",
            "country",
            "checkall",
            "invcid",
            "base64",
            "score",
            "attr",
            "js foundation",
            "typeof module",
            "ffffff",
            "acce22",
            "f0f0f0",
            "dadada",
            "typesubmit",
            "typebutton",
            "f4f4f4",
            "trebuchet ms",
            "tahoma",
            "woff",
            "footer",
            "segoe ui",
            "emoji",
            "tbody",
            "roboto",
            "helvetica neue",
            "arial",
            "apple color",
            "noto color",
            "type",
            "twitter",
            "xava",
            "gbva",
            "hbva",
            "ibva",
            "lcva",
            "cdva",
            "oeva",
            "peva",
            "onclickpopup",
            "discountmonthly",
            "grayoverlay",
            "popup into",
            "popup var",
            "center",
            "price",
            "first",
            "classname",
            "eventkey",
            "event",
            "selector",
            "name",
            "datakey",
            "version",
            "default",
            "shown",
            "target",
            "close",
            "false",
            "trigger",
            "jquery",
            "delta",
            "open",
            "arrow",
            "protected",
            "leave",
            "dataspy",
            "typeof define",
            "eventlistener"
          ],
          "references": [
            "xfe-URL-Choopa.com-stix2-2.1-export.json",
            "https://www.choopa.com/commonimages/jquery-3.5.1.min.js",
            "https://www.choopa.com/_js/dragscroll.js",
            "https://www.choopa.com/_js/bootstrap.js",
            "https://www.choopa.com/_js/global.js?v=209",
            "https://ssl.google-analytics.com/ga.js",
            "https://www.choopa.com/css/bootstrap.css",
            "https://www.choopa.com/css/global.css?v=209",
            "https://my.choopa.com/js/jquery-3.5.1.min.js",
            "https://my.choopa.com/js/desktop.js?v=41",
            "https://my.choopa.com/js/global.js?v=41",
            "xfe-URL-Vultr.com-stix2-2.1-export.json",
            "https://www.clarity.ms/eus2/s/0.6.34/clarity.js",
            "https://snap.licdn.com/li.lms-analytics/insight.min.js",
            "https://www.google-analytics.com/analytics.js",
            "https://www.redditstatic.com/ads/pixel.js",
            "https://www.googletagmanager.com/gtag/js?id=G-K6536FHN4D&l=dataLayer&cx=c",
            "https://bat.bing.com/bat.js",
            "https://static.ads-twitter.com/uwt.js",
            "https://connect.facebook.net/signals/config/571256413046247?v=2.9.57&r=stable",
            "https://connect.facebook.net/signals/config/438248060937995?v=2.9.57&r=stable",
            "https://connect.facebook.net/signals/config/828098694004178?v=2.9.57&r=stable",
            "https://connect.facebook.net/en_US/fbevents.js",
            "https://js.partnerstack.com/v1/",
            "https://bat.bing.com/p/action/17528422.js",
            "https://s.adroll.com/j/roundtrip.js",
            "https://s.adroll.com/j/exp/DUKHAKVYIJASHDUBG4V7RE/index.js",
            "https://s.adroll.com/j/sendrolling.js",
            "https://d.adroll.com/pixel/DUKHAKVYIJASHDUBG4V7RE/E23RMKDBEFAEXMXLWK3IWO?adroll_fpc=838a57acc6141112b6107bdce5e3fde6-1650403057055&arrfrr=https%3A%2F%2Fwww.vultr.com%2F&pv=70707106758.07146&cookie=&adroll_s_ref=&keyw=",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/858656304/?random=1650403054497&cv=9&fst=1650403054497&num=1&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=3&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.vultr.com%2F&tiba=SSD%20VPS%20Servers%2C%20Cloud%20Servers%20and%20Cloud%20Hosting%20by%20Vultr%20-%20Vultr.com&hn=www.googleadservices.com&rfmt=3&fmt=4"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1241,
            "URL": 3454,
            "domain": 430,
            "FileHash-SHA256": 453
          },
          "indicator_count": 5578,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1431 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "625effa1c4edcef37385c4eb",
          "name": "ctgserver.net",
          "description": "var d=b.dir,e=c&&\"parentNode\"===d,f=x, f=w, b.b, and d(b) for the first time.",
          "modified": "2022-05-19T00:00:49.028000",
          "created": "2022-04-19T18:29:53.960000",
          "tags": [
            "0x1d3c",
            "function",
            "json",
            "date",
            "0x3abb84",
            "0x400e43",
            "0x4e2be0",
            "0x27ecdf",
            "this",
            "0x217f25",
            "webview",
            "array",
            "typeof e",
            "regexp",
            "null",
            "object",
            "string",
            "post",
            "typeof r",
            "error",
            "android",
            "void",
            "math",
            "k3wc3w",
            "o4wo4w",
            "b0z1",
            "a4r1",
            "b2bbbb",
            "o5r1",
            "image",
            "typeof s",
            "typeof console",
            "contenttype",
            "number",
            "60number",
            "new date",
            "close",
            "sector",
            "typeof symbol",
            "crispclient",
            "crisp im",
            "typeof b",
            "width",
            "pseudo",
            "child",
            "sufeffxa0",
            "class",
            "accept"
          ],
          "references": [
            "http://v1-ab.cdn-static.cn/editor/js/jquery.min.js",
            "https://client.crisp.chat/l.js",
            "http://www.ctgserver.net/zhuzi-statistic.js?path=http%3a%2f%2fwww.ctgserver.net%2f&siteid=68944&referer=",
            "http://sgoutong.baidu.com/embed/1649840755/asset/embed/mobilelite/main.js",
            "https://aiff.cdn.bcebos.com/sensors%2Fonline%2Fsa-sdk-javascript-1.14.24%2Fsensorsdata.min.js",
            "https://goutong.baidu.com/site/889/a8439b4fa4b46ae6d1cb7840806b342d/b.js?siteId=12877102",
            "http://push.zhanzhang.baidu.com/push.js",
            "http://api.geetest.com/gettype.php?gt=70bfe290f45725d99fae0063c5188b8f&callback=geetest_1650391760798",
            "http://static.geetest.com/static/js/geetest.6.0.9.js",
            "http://api.geetest.com/get.php?gt=70bfe290f45725d99fae0063c5188b8f&challenge=36bbdc68ea2e3279d57269471b837a6b&product=popup&width=301px&offline=false&lang=zh-cn&protocol=http://&type=slide&path=/static/js/geetest.6.0.9.js&callback=geetest_1650391756575",
            "http://sgoutong.baidu.com/embed/1649840755/asset/embed/mobile_nb.js",
            "https://sofire.bdstatic.com/js/dfxaf.js",
            "https://p.qiao.baidu.com/cps3/site/poll?cb=jsonp_bridge_1650392095190_21922384256393768&l=1&sign=&v=165039175860477407&s=12877102&e=26958486&isAFF=1&filterAdvertisement=1&dev=1&auth=%7B%22anonym%22%3A0%2C%22key%22%3A%223bfef1eb-bde9-4fbf-ba96-abad738f1775%22%2C%22sn%22%3A%22%22%2C%22id%22%3A%22165039175860477407%22%2C%22from%22%3A4%2C%22token%22%3A%22bridge%22%7D&_time=1650392095190",
            "http://www.zhuzi.me/zhuzi-statistic.js?path=http%3a%2f%2fwww.zhuzi.me%2f&siteid=62221&referer=",
            "xfe-URL-Zhuzi.me-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7975,
            "FileHash-SHA256": 1286,
            "hostname": 1602,
            "domain": 560,
            "FileHash-MD5": 85,
            "FileHash-SHA1": 1
          },
          "indicator_count": 11509,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1431 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "625eff927c93e3e5cd50e191",
          "name": "ctgserver.net",
          "description": "var d=b.dir,e=c&&\"parentNode\"===d,f=x, f=w, b.b, and d(b) for the first time.",
          "modified": "2022-05-19T00:00:49.028000",
          "created": "2022-04-19T18:29:38.810000",
          "tags": [
            "0x1d3c",
            "function",
            "json",
            "date",
            "0x3abb84",
            "0x400e43",
            "0x4e2be0",
            "0x27ecdf",
            "this",
            "0x217f25",
            "webview",
            "array",
            "typeof e",
            "regexp",
            "null",
            "object",
            "string",
            "post",
            "typeof r",
            "error",
            "android",
            "void",
            "math",
            "k3wc3w",
            "o4wo4w",
            "b0z1",
            "a4r1",
            "b2bbbb",
            "o5r1",
            "image",
            "typeof s",
            "typeof console",
            "contenttype",
            "number",
            "60number",
            "new date",
            "close",
            "sector",
            "typeof symbol",
            "crispclient",
            "crisp im",
            "typeof b",
            "width",
            "pseudo",
            "child",
            "sufeffxa0",
            "class",
            "accept"
          ],
          "references": [
            "http://v1-ab.cdn-static.cn/editor/js/jquery.min.js",
            "https://client.crisp.chat/l.js",
            "http://www.ctgserver.net/zhuzi-statistic.js?path=http%3a%2f%2fwww.ctgserver.net%2f&siteid=68944&referer=",
            "http://sgoutong.baidu.com/embed/1649840755/asset/embed/mobilelite/main.js",
            "https://aiff.cdn.bcebos.com/sensors%2Fonline%2Fsa-sdk-javascript-1.14.24%2Fsensorsdata.min.js",
            "https://goutong.baidu.com/site/889/a8439b4fa4b46ae6d1cb7840806b342d/b.js?siteId=12877102",
            "http://push.zhanzhang.baidu.com/push.js",
            "http://api.geetest.com/gettype.php?gt=70bfe290f45725d99fae0063c5188b8f&callback=geetest_1650391760798",
            "http://static.geetest.com/static/js/geetest.6.0.9.js",
            "http://api.geetest.com/get.php?gt=70bfe290f45725d99fae0063c5188b8f&challenge=36bbdc68ea2e3279d57269471b837a6b&product=popup&width=301px&offline=false&lang=zh-cn&protocol=http://&type=slide&path=/static/js/geetest.6.0.9.js&callback=geetest_1650391756575",
            "http://sgoutong.baidu.com/embed/1649840755/asset/embed/mobile_nb.js",
            "https://sofire.bdstatic.com/js/dfxaf.js",
            "https://p.qiao.baidu.com/cps3/site/poll?cb=jsonp_bridge_1650392095190_21922384256393768&l=1&sign=&v=165039175860477407&s=12877102&e=26958486&isAFF=1&filterAdvertisement=1&dev=1&auth=%7B%22anonym%22%3A0%2C%22key%22%3A%223bfef1eb-bde9-4fbf-ba96-abad738f1775%22%2C%22sn%22%3A%22%22%2C%22id%22%3A%22165039175860477407%22%2C%22from%22%3A4%2C%22token%22%3A%22bridge%22%7D&_time=1650392095190",
            "http://www.zhuzi.me/zhuzi-statistic.js?path=http%3a%2f%2fwww.zhuzi.me%2f&siteid=62221&referer=",
            "xfe-URL-Zhuzi.me-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7975,
            "FileHash-SHA256": 1286,
            "hostname": 1602,
            "domain": 560,
            "FileHash-MD5": 85,
            "FileHash-SHA1": 1
          },
          "indicator_count": 11509,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1431 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6256f92778c2f2177bdd4de9",
          "name": "\u9ad8\u5c71tv,\u9ad8\u5c71tv,\u9ad8\u5c71tv\u5f71\u9662,\u9ad8\u5c71tv\u770b\u7247\u7f51",
          "description": "Here is a full list of highlights from the Chinese TV series, which began in 2011 and has now been broadcast on Chinese television, online and mobile devices, and is now available to watch online.",
          "modified": "2022-05-13T00:03:35.765000",
          "created": "2022-04-13T16:24:07.391000",
          "tags": [
            "date",
            "cnzzdata",
            "czuuid",
            "umdistinctid",
            "typeof symbol",
            "https",
            "zeno rocha",
            "typeof",
            "typeof define",
            "error",
            "array",
            "12863",
            "qrcode",
            "2g2g2h2h0g",
            "dhdh",
            "exptable",
            "logtable",
            "string",
            "typeof j",
            "regexp",
            "typeof e",
            "typeof t",
            "class",
            "attr",
            "pseudo",
            "child",
            "function",
            "typeof module",
            "ahgr",
            "0x40",
            "h0x1",
            "mm32",
            "indexof",
            "length",
            "h0x0",
            "0x248",
            "h0x2",
            "0x17b",
            "webpackrequire",
            "webpackexports",
            "object",
            "default",
            "hn return",
            "importsnvar",
            "truennnn",
            "iostf",
            "android",
            "nvar",
            "clickdownload",
            "this",
            "path",
            "service",
            "roboto",
            "boolean",
            "number",
            "createnamespace",
            "n default",
            "nn return",
            "null",
            "click",
            "void",
            "istanbul",
            "false",
            "close",
            "window",
            "info",
            "target",
            "find",
            "footer",
            "delta",
            "generator",
            "cascade",
            "code",
            "trigger",
            "next",
            "arrow",
            "slice",
            "checkbox",
            "body",
            "green",
            "phase",
            "copy",
            "infinity",
            "middle",
            "open",
            "calendar",
            "flex",
            "fail",
            "shift",
            "super",
            "internal",
            "form",
            "locale",
            "spinner",
            "spin",
            "multi",
            "mask",
            "write",
            "flip",
            "logic",
            "patch",
            "abcd",
            "skew",
            "main",
            "rest",
            "trim",
            "dark",
            "canvas",
            "facebook",
            "executor",
            "span",
            "tips",
            "sticky",
            "uploader",
            "bind",
            "config",
            "startpage",
            "speed",
            "toolbar",
            "refresh",
            "done",
            "format",
            "cardinal",
            "outside",
            "install",
            "public",
            "github",
            "vuejs",
            "jump",
            "browser",
            "sign",
            "view",
            "sponsor",
            "github sponsors",
            "mit license",
            "contact",
            "star",
            "stars",
            "javascript",
            "please",
            "strong",
            "\u9ad8\u5c71tv",
            "\u9ad8\u5c71tv\u5f71\u9662",
            "\u9ad8\u5c71tv\u770b\u7247\u7f51",
            "hd 20210830",
            "hd mu",
            "hd heydouga",
            "poro",
            "tv tv",
            "hd ok",
            "hd fol",
            "hd nanami2",
            "hd \uff13",
            "hd 20210927"
          ],
          "references": [
            "http://www.bbbbop13.com:1313/",
            "xfe-URL-hyqxsnjj.com-stix2-2.1-export.json",
            "https://web.op39v.xyz/?channelCode=pingguo",
            "https://github.com/vuejs/vue-devtools",
            "https://web.op39v.xyz/js/chunk-vendors.js",
            "https://web.op39v.xyz/js/chunk-common.js",
            "https://res-1257422681.file.myqcloud.com/assets/yeyue/boinstall.js",
            "https://cdn.staticfile.org/jquery/3.6.0/jquery.min.js",
            "https://cdn.staticfile.org/qrcodejs/1.0.0/qrcode.min.js",
            "https://cdn.staticfile.org/clipboard.js/2.0.8/clipboard.min.js",
            "https://s9.cnzz.com/z_stat.php?id=1280740152&web_id=1280740152",
            "https://c.cnzz.com/core.php?web_id=1280740152&t=z"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1374,
            "hostname": 563,
            "CVE": 1,
            "domain": 361,
            "FileHash-SHA256": 233,
            "FileHash-SHA1": 1,
            "FileHash-MD5": 1
          },
          "indicator_count": 2534,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1437 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "625614852d13a468fd3f7ef9",
          "name": "Malware and bots",
          "description": "function se(t,e,n, r, n; if you want to know what type of document you are, you can use the new RegExp(M) to set it.",
          "modified": "2022-05-12T00:04:24.089000",
          "created": "2022-04-13T00:08:37.870000",
          "tags": [
            "bygmo",
            "gmohd",
            "dx gmo",
            "nftadam",
            "iosandroid gmo",
            "csr sdgs",
            "english",
            "4444 gmo2020417",
            "developers gmo",
            "devsecopsthon",
            "tech",
            "font awesome",
            "free",
            "license",
            "cc by",
            "sil ofl",
            "code",
            "mit license",
            "brands",
            "fliph",
            "google",
            "import",
            "acbac1",
            "typeemail",
            "2deg",
            "1deg",
            "4deg",
            "css3",
            "animation cheat",
            "sheet",
            "justin aguilar",
            "questions",
            "slideexpandup",
            "expandup",
            "gradienttype0",
            "false",
            "copyright",
            "twitter",
            "f56505",
            "font",
            "font path",
            "woff",
            "truetype",
            "fontawesome",
            "unicode private",
            "tbody",
            "tfoot",
            "thead",
            "span",
            "multiple",
            "type",
            "href",
            "input",
            "halflings",
            "gradienttype1",
            "please",
            "function",
            "param",
            "method",
            "value",
            "target",
            "null",
            "array",
            "validator",
            "select",
            "checkbox",
            "date",
            "body",
            "error",
            "form",
            "meta",
            "class",
            "regexp",
            "typeof b",
            "width",
            "pseudo",
            "child",
            "sufeffxa0",
            "accept",
            "20px",
            "24px",
            "45deg",
            "typesubmit",
            "typenumber",
            "helvetica",
            "timelimit",
            "dialog",
            "content",
            "callback",
            "bodynoscroll",
            "click",
            "html",
            "confirm",
            "notice",
            "typeof e",
            "typeof t",
            "attr",
            "js foundation",
            "typeof module"
          ],
          "references": [
            "https://c81e728d9d4c2f636f067f89cc14862c.com/static_new/js/jquery.min.js",
            "https://c81e728d9d4c2f636f067f89cc14862c.com/static_new/js/dialog.min.js",
            "https://c81e728d9d4c2f636f067f89cc14862c.com/static_new/js/common.js",
            "https://c81e728d9d4c2f636f067f89cc14862c.com/static_new/css/public.css",
            "xfe-URL-c81e728d9d4c2f636f067f89cc14862c.com-stix2-2.1-export.json",
            "https://ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js",
            "http://downloads.mailchimp.com/js/jquery.form-n-validate.js",
            "http://imhrzluowdso.gq/i/css/bootstrap.css",
            "http://imhrzluowdso.gq/i/css/font-awesome.css",
            "http://imhrzluowdso.gq/i/css/bootstrap-theme.css",
            "http://imhrzluowdso.gq/i/css/animations.css",
            "http://imhrzluowdso.gq/i/css/style.css",
            "xfe-URL-imhrzluowdso.gq-stix2-2.1-export.json",
            "https://use.fontawesome.com/releases/v5.0.6/css/all.css"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1188,
            "domain": 214,
            "hostname": 427,
            "FileHash-SHA256": 168,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1,
            "email": 1
          },
          "indicator_count": 2000,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1438 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6253871aa38954c4426d475e",
          "name": "http://prima-abnehmen-shop.com/uk/order-now.html?affiliate=24&source=418&subid2=ddukc&subid3=35908921",
          "description": "In e, a new RegExp, has been added to the list of properties that can be used to store information in a single place, as well as a \"sizzle\" on the side of the page.",
          "modified": "2022-05-10T00:02:48.350000",
          "created": "2022-04-11T01:40:42.011000",
          "tags": [
            "strong",
            "imprint",
            "price",
            "address",
            "prima abnehmen",
            "usage return",
            "contact",
            "packs",
            "card",
            "digit code",
            "date",
            "back",
            "later",
            "function",
            "regexp",
            "edge",
            "elem",
            "webpackrequire",
            "return",
            "null",
            "handle",
            "expando",
            "match",
            "android",
            "target",
            "error",
            "false",
            "class",
            "mark",
            "harmony",
            "copy",
            "capture",
            "seed",
            "pass",
            "enough",
            "code",
            "never",
            "core",
            "local",
            "verify",
            "fall",
            "accept",
            "done",
            "find",
            "internal",
            "inject",
            "possible",
            "prop",
            "trigger",
            "typeof t",
            "typeof symbol",
            "typeerror",
            "object",
            "typeof e",
            "pseudo",
            "child",
            "this",
            "void",
            "array",
            "typeof n",
            "boolean",
            "messagechannel",
            "string",
            "symbol",
            "seventracker",
            "post",
            "nonce",
            "script",
            "please do",
            "not copy",
            "and paste",
            "this code",
            "cgrecaptchacfg",
            "ngrecaptcha",
            "recaptchaapi",
            "render",
            "typedarraytag",
            "blink",
            "gecko",
            "webkit",
            "trident",
            "the author",
            "this software",
            "copyright",
            "software is",
            "provided",
            "as is",
            "disclaims all",
            "warranties with",
            "regard to",
            "including all",
            "direct",
            "generator",
            "backspace",
            "select",
            "uint8array",
            "math",
            "number",
            "iframe",
            "span",
            "form",
            "click",
            "enterprise",
            "infinity",
            "template",
            "next",
            "body",
            "typeof r",
            "64e3",
            "urlsearchparams",
            "ofunction",
            "pfunction",
            "bfunction",
            "ffunction",
            "ifunction",
            "load",
            "sans",
            "woff2",
            "semibold",
            "bold",
            "italic",
            "semibold italic",
            "bold italic",
            "u20b4",
            "u2de02dff",
            "ua640a69f",
            "sufeffxa0",
            "attr"
          ],
          "references": [
            "xfe-URL-dk9ctyhidjrvgn.xyz-stix2-2.1-export.json",
            "http://dk9ctyhidjrvgn.xyz/index_files/jquery.js",
            "http://dk9ctyhidjrvgn.xyz/index_files/sss.css",
            "https://tracking.premiumhealtheurope.com/code.js",
            "https://static.cloudflareinsights.com/beacon.min.js",
            "https://www.gstatic.com/recaptcha/releases/Y-cOIEkAqcfDdup_qnnmkxIC/recaptcha__en.js",
            "https://cdn.getaddress.io/scripts/getaddress-autocomplete-1.1.2.min.js",
            "https://js.mollie.com/v1/mollie.js",
            "https://www.google.com/recaptcha/api.js?render=6LerjKkcAAAAAHIvlsndboXTiYDGt_xACa77alyA",
            "https://tracking.premiumhealth.eu/code.js",
            "https://eu-library.klarnaservices.com/lib.js",
            "https://prima-abnehmen-shop.com/_Resources/Static/Packages/Seven.Prima/Scripts/Main.js?bust=2a0b1c62",
            "https://prima-abnehmen-shop.com/_Resources/Static/Packages/Seven.Offerpage.Checkout/Scripts/main.min.js?bust=ef22ff16",
            "https://prima-abnehmen-shop.com/uk/order-now.html?affiliate=24&source=418&subid2=ddukc&subid3=35908921"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 640,
            "URL": 1862,
            "FileHash-SHA256": 149,
            "domain": 341
          },
          "indicator_count": 2992,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1440 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "625045b8e764847c54ed286e",
          "name": "ewqopweowia543.ga",
          "description": "If you want to know what type of Touches you will get when you get stuck in the middle of a page, then ask for a random number of letters or numbers, or, if you can't find one.",
          "modified": "2022-05-08T00:03:14.586000",
          "created": "2022-04-08T14:24:56.301000",
          "tags": [
            "90deg",
            "250px",
            "helvetica neue",
            "helvetica",
            "roboto",
            "georgia",
            "typesearch",
            "typecheckbox",
            "label",
            "liberation mono",
            "function",
            "constructor",
            "param",
            "object",
            "class",
            "event",
            "abide",
            "number",
            "initializes",
            "drilldown",
            "window",
            "sticky",
            "false",
            "null",
            "body",
            "this",
            "date",
            "path",
            "anchor",
            "open",
            "trigger",
            "small",
            "close",
            "void",
            "form",
            "fast",
            "prop",
            "error",
            "shift",
            "test",
            "burn",
            "android",
            "back",
            "killswitch",
            "find",
            "desktop",
            "fall",
            "linear",
            "value",
            "webpackrequire",
            "return",
            "mouse",
            "factory",
            "moduleid",
            "apple cmd",
            "regexp",
            "elem",
            "handle",
            "expando",
            "match",
            "selector",
            "type",
            "sizzle",
            "target",
            "mark",
            "copy",
            "capture",
            "seed",
            "pass",
            "code",
            "bind",
            "core",
            "local",
            "verify",
            "accept",
            "done",
            "internal",
            "inject",
            "possible",
            "hold",
            "camel",
            "first",
            "middle",
            "gc",
            "eq",
            "post",
            "xava",
            "gbva",
            "hbva",
            "ibva",
            "lcva",
            "cdva",
            "oeva",
            "peva",
            "65535",
            "boolean",
            "counter",
            "segoe ui",
            "typeerror",
            "lucida",
            "ecommerce",
            "ext link",
            "comic",
            "impact",
            "light"
          ],
          "references": [
            "xfe-URL-ewqopweowia543.ga-stix2-2.0-export.json",
            "https://mc.yandex.ru/metrika/watch.js",
            "https://ssl.google-analytics.com/ga.js",
            "https://vestacp.com/bower_components/jquery/dist/jquery.js",
            "https://vestacp.com/bower_components/what-input/dist/what-input.js",
            "https://vestacp.com/bower_components/foundation-sites/dist/js/foundation.js",
            "https://vestacp.com/js/app.js",
            "https://vestacp.com/css/app.css"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Eq",
              "display_name": "Eq",
              "target": null
            },
            {
              "id": "Gc",
              "display_name": "Gc",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 706,
            "URL": 1386,
            "CVE": 1,
            "FileHash-SHA256": 238,
            "domain": 234
          },
          "indicator_count": 2565,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1442 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "624de06b6d7b6fb1caada56a",
          "name": "\u542b\u7f9e\u8349\u7814\u7a76\u6240|Fi11.com",
          "description": "var a,b,c,d, f.substr(d),a=f, a.href, and a number of other elements:a.b.search.com.",
          "modified": "2022-05-06T18:05:54.002000",
          "created": "2022-04-06T18:48:11.932000",
          "tags": [
            "date",
            "cnzzdata",
            "czuuid",
            "umdistinctid",
            "toast",
            "android",
            "androidig",
            "linuxig",
            "iphoneipodiosig",
            "ipadig",
            "windows",
            "alert",
            "image",
            "object",
            "boolean",
            "error",
            "typeof t",
            "number",
            "67108863",
            "string",
            "typeerror",
            "array",
            "promise",
            "null",
            "this",
            "unknown",
            "write",
            "iframe",
            "window",
            "backspace",
            "body",
            "verify",
            "fullscreen",
            "copyright",
            "closure library",
            "pfunction",
            "contenttype",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction"
          ],
          "references": [
            "xfe-IP-137.220.241.241-stix2-2.0-export.json",
            "https://h5.hxcpp100.com/?id=22929",
            "https://www.google-analytics.com/analytics.js",
            "https://h5.hxcpp100.com/js/linkChange.js",
            "https://imgs.qgddmy.com/static_h5/js/manifest.2ae2e69a05c33dfc65f8.js",
            "https://imgs.qgddmy.com/static_h5/js/vendor.4071e145e4ea91fa5ab1.js",
            "http://push.zhanzhang.baidu.com/push.js",
            "https://js.users.51.la/21185805.js",
            "https://www.hxcpp100.com/js/linkChange.js",
            "https://c.cnzz.com/core.php?web_id=1280798474&t=z",
            "https://s9.cnzz.com/z_stat.php?id=1280743953&web_id=1280743953"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 981,
            "hostname": 279,
            "domain": 202,
            "FileHash-SHA256": 73,
            "CVE": 1
          },
          "indicator_count": 1536,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1444 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "624de0699b9516c5c53a4c60",
          "name": "\u542b\u7f9e\u8349\u7814\u7a76\u6240|Fi11.com",
          "description": "var a,b,c,d, f.substr(d),a=f, a.href, and a number of other elements:a.b.search.com.",
          "modified": "2022-05-06T18:05:54.002000",
          "created": "2022-04-06T18:48:09.891000",
          "tags": [
            "date",
            "cnzzdata",
            "czuuid",
            "umdistinctid",
            "toast",
            "android",
            "androidig",
            "linuxig",
            "iphoneipodiosig",
            "ipadig",
            "windows",
            "alert",
            "image",
            "object",
            "boolean",
            "error",
            "typeof t",
            "number",
            "67108863",
            "string",
            "typeerror",
            "array",
            "promise",
            "null",
            "this",
            "unknown",
            "write",
            "iframe",
            "window",
            "backspace",
            "body",
            "verify",
            "fullscreen",
            "copyright",
            "closure library",
            "pfunction",
            "contenttype",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction"
          ],
          "references": [
            "xfe-IP-137.220.241.241-stix2-2.0-export.json",
            "https://h5.hxcpp100.com/?id=22929",
            "https://www.google-analytics.com/analytics.js",
            "https://h5.hxcpp100.com/js/linkChange.js",
            "https://imgs.qgddmy.com/static_h5/js/manifest.2ae2e69a05c33dfc65f8.js",
            "https://imgs.qgddmy.com/static_h5/js/vendor.4071e145e4ea91fa5ab1.js",
            "http://push.zhanzhang.baidu.com/push.js",
            "https://js.users.51.la/21185805.js",
            "https://www.hxcpp100.com/js/linkChange.js",
            "https://c.cnzz.com/core.php?web_id=1280798474&t=z",
            "https://s9.cnzz.com/z_stat.php?id=1280743953&web_id=1280743953"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 981,
            "hostname": 279,
            "domain": 202,
            "FileHash-SHA256": 73,
            "CVE": 1
          },
          "indicator_count": 1536,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1444 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://ajax.googleapis.com/ajax/libs/jquery/3.6.0/jquery.min.js",
        "https://snap.licdn.com/li.lms-analytics/insight.min.js",
        "https://p.qiao.baidu.com/cps3/site/poll?cb=jsonp_bridge_1650392095190_21922384256393768&l=1&sign=&v=165039175860477407&s=12877102&e=26958486&isAFF=1&filterAdvertisement=1&dev=1&auth=%7B%22anonym%22%3A0%2C%22key%22%3A%223bfef1eb-bde9-4fbf-ba96-abad738f1775%22%2C%22sn%22%3A%22%22%2C%22id%22%3A%22165039175860477407%22%2C%22from%22%3A4%2C%22token%22%3A%22bridge%22%7D&_time=1650392095190",
        "[object Object] is a string representation of an object instance. Take this example: When the alert runs, it returns [object Object] in the alert modal. It tries to return a string representation of what was passed into alert, but because the engine sees this as an object, and not a string, it tells us that its an instance of an Object instead.",
        "https://cdn.staticfile.org/clipboard.js/2.0.8/clipboard.min.js",
        "https://mc.yandex.ru/metrika/tag.js",
        "https://www.virustotal.com/graph/embed/g9453a2f58a3340f18120987c2b4d710dbb44ded88c434abf8894458a98c7bd4b?theme=dark",
        "https://pi.pardot.com/analytics?ver=3&visitor_id=&visitor_id_sign=&pi_opt_in=&campaign_id=33566&account_id=872471&title=Hosting%20Platform%20of%20Choice&url=https%3A%2F%2Fcpanel.net%2F&referrer=",
        "https://www.hostrocket.com/js/jquery.tools.min.js",
        "https://colohouse.com/wp-content/cache/autoptimize/css/autoptimize_5e11636f7dd8fb4f55e0ff84f0ed5faa.css",
        "https://ajax.googleapis.com/ajax/libs/jquery/1.7.1/jquery.min.js",
        "Thor Scan: S-I9VvMTB6cZU",
        "xfe-URL-Vultr.com-stix2-2.1-export.json",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/728582492/?random=1650418372747&cv=9&fst=1650418372747&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fcpanel.net%2F&tiba=Hosting%20Platform%20of%20Choice&hn=www.googleadservices.com&us_privacy=1---&async=1&rfmt=3&fmt=4",
        "https://static.me-talk.ru/cabinet/build/chat/modern.support.js",
        "http://downloads.mailchimp.com/js/jquery.form-n-validate.js",
        "https://masterhost.ru/s/masterhost_v2/build/js/compiled.min.js?v=Q/hhNATxy3sx",
        "https://h5.hxcpp100.com/js/linkChange.js",
        "https://user.aquanx.com/templates/aquanx20190627/js/scripts.min.js?v=8a99af",
        "https://kit-free.fontawesome.com/releases/latest/css/free-v4-font-face.min.css",
        "https://static.cloudflareinsights.com/beacon.min.js",
        "https://www.googletagmanager.com/gtm.js?id=GTM-WB4LHQ4",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-2d0d2b7c.js",
        "https://www.googletagmanager.com/gtag/js?id=G-7BE8PMLSKX&l=dataLayer&cx=c",
        "https://cpanel.net/wp-includes/js/wp-emoji-release.min.js?ver=5.6",
        "https://use.fontawesome.com/releases/v5.0.6/css/all.css",
        "https://tria.ge/240517-vqxezaaa33/behavioral1",
        "https://my.choopa.com/js/jquery-3.5.1.min.js",
        "http://alp-vision.com/wp-includes/css/dist/block-library/style.min.css?ver=5.7.6",
        "xfe-URL-dk9ctyhidjrvgn.xyz-stix2-2.1-export.json",
        "https://m.bds247.vn/lib/pikachoose/lib/jquery.jcarousel.min.js 443 Script",
        "https://www.layerhost.com/assets/js/yui.js",
        "https://cpanel.net/wp-includes/css/dist/block-library/style.min.css?ver=5.6",
        "https://pi.pardot.com/pd.js",
        "http://sgoutong.baidu.com/embed/1649840755/asset/embed/mobilelite/main.js",
        "https://js.mollie.com/v1/mollie.js",
        "https://aquanx.com/js/modernizr-custom.js",
        "https://fonts.googleapis.com/css?family=Open+Sans:100,200,300,400,500,600,700%7CMontserrat:100,200,300,400,500,600,700",
        "https://www.choopa.com/_js/dragscroll.js",
        "https://www.jelenia-gora.so.gov.pl/",
        "https://www.googletagmanager.com/gtm.js?id=GTM-PMC6JX",
        "https://site.yandex.net/v2.0/js/all.js",
        "https://4vendeta.com/assets/js/parallax.min.js",
        "https://www.hostrocket.com/js/jquery.cookie.js",
        "https://www.googletagmanager.com/gtag/js?id=AW-1045757556",
        "https://viz.greynoise.io/query/AS15169%20classification:%22malicious%22",
        "https://www.virustotal.com/graph/embed/g9219350397134ff3a645319a88b67833077c9cf0f50d4979aa0239a3d0b6ecea?theme=dark",
        "https://consent.cookiebot.com/uc.js",
        "https://4vendeta.com/assets/js/popper.min.js",
        "https://www.virustotal.com/gui/collection/50919d9e9d6d71522b641a3907ed32093293c400a2ae4faaab142f175c48de4b",
        "https://www.choopa.com/css/bootstrap.css",
        "https://www.virustotal.com/gui/collection/a1866f4c7dbc79920d0c7e914a3bace0d3dc424a2aac06bf30bf724c6c8b0375/iocs",
        "II Wydzia? Karny - S?d Rejonowy w Jeleniej G\u00f3rze 1.htm",
        "http://imhrzluowdso.gq/i/css/style.css",
        "https://www.choopa.com/css/global.css?v=209",
        "https://k.clarity.ms/s/0.6.34/clarity.js",
        "https://web.op39v.xyz/js/chunk-vendors.js",
        "https://m.west.cn/jscripts/baidutj/hm.js",
        "https://149371662.v2.pressablecdn.com/wp-content/plugins/user-verification/assets/front/js/scripts-otp.js",
        "https://www.filescan.io/uploads/664bb683bc04dffa92241015/reports/92b70fd6-97d7-4386-8465-f3fd79043843/overview",
        "https://www.virustotal.com/graph/embed/g798b5e01446c4711ba22802009d71f5ba78553df16794088a907ae7456e2a017?theme=dark",
        "https://www.west.cn/js2016/lib/jquery.SuperSlide/jquery.SuperSlide.2.1.1.x.js",
        "https://consentcdn.cookiebot.com/consentconfig/da52fc49-8e48-42b7-9ad3-c219404f6f92/cpanel.net/configuration.js",
        "https://stats.ipinyou.com/adv?a=SR..sxcg_4d0DhagaJWCLj_ZdX&u=https%3A%2F%2Fwww.yunshipei.com%2F&rd=1653485491040&v=2&e=sr%3D390x844%26sc%3D32-bit%26je%3Dfalse%26lg%3Den-us%26vb%3D1%26did%3D%26dt%3D%26ps%3D390x3885%26vp%3D390x664%26ec%3DUTF-8%26vbt%3D1822%26sp%3D0%26ur%3D%26st%3D%26ev%3Dvg",
        "Above Malcore Strings: All - EnterpriseAppsList, AppRegistration, EnterpriseAppslist, exportGroup, exportUsers, HiddenApps - EnterpriseAppsList****",
        "https://www.layerhost.com/assets/js/vendor/jquery.min.js",
        "https://www.layerhost.com/assets/js/slider.js",
        "https://www.cloudron.io/3rdparty/jquery-1.11.0.js",
        "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/apbct-public.min.js?ver=5.173",
        "xfe-URL-https___www.gandi.net-stix2-2.1-export.json",
        "xfe-URL-Data102.com-stix2-2.1-export.json",
        "https://www.virustotal.com/gui/collection/385f419c1c3733dd9dd151d4403bdb38cb24d12c21f18ce8f4f41d818d7a12a5/summary",
        "http://imhrzluowdso.gq/i/css/bootstrap-theme.css",
        "https://colohouse.com/wp-content/plugins/wpcf7-redirect/build/js/wpcf7-redirect-frontend-script.js?ver=1.1",
        "https://www.layerhost.com/assets/js/jquery.filterizr.min.js",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00975ea31558d54fceea",
        "https://www.west.cn/js2016/root/jqinclude.js?t=20211126a",
        "https://www.googletagmanager.com/gtag/js?id=UA-36935570-1",
        "https://user.aquanx.com/clientarea.php",
        "https://goutong.baidu.com/site/889/a8439b4fa4b46ae6d1cb7840806b342d/b.js?siteId=12877102",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-runtime.js",
        "https://colohouse.com/wp-content/themes/Netrouting/js/vendor/modernizr-2.8.3-respond-1.4.2.min.js",
        "https://www.cloudron.io/3rdparty/angular-base64.min.js",
        "https://4vendeta.com/assets/js/bootstrap.min.js",
        "https://www.virustotal.com/gui/collection/f60b8061133367a1047262a1e90d54cd72de4d59885c267906c6eeb557a35500",
        "http://www.jelenia-gora.so.gov.pl/",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-32507910.js",
        "https://viz.greynoise.io/query/AS8075%20classification:%22malicious%22",
        "https://www.data102.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp",
        "https://www.dinancars.com/assets/js/combine/min/v1653077793/e88cd3e3db8ab2b910e50cf4deb60529f/default;jquery-ui.min;js.cookie;util;nav;cart;accountfunctions;jquery.activity-indicator-1.0.0.min;drawer_plugin;floating_label_gen;jquery.autoellipsis-1.0.10;fresco;fresco-custom;isotope_imagesloaded.min;promo_autoplus_helpers;slick.min;widgets;jquery.custom-carousel;waterfall_helpers/",
        "https://www.filescan.io/uploads/664ba368d5c40bffee63b1ee/reports/31817751-6b5d-45df-8813-472aa6c756a3/overview",
        "https://c.cnzz.com/core.php?web_id=1280798474&t=z",
        "https://consentcdn.cookiebot.com/sdk/bc-v4.min.html",
        "https://js.hs-scripts.com/8009596.js",
        "https://colohouse.com/wp-content/plugins/link-whisper-premium/js/frontend.js?ver=1632756485",
        "https://www.data102.com/wp-content/plugins/contact-form-7/includes/js/scripts.js",
        "https://www.indusface.com/css/A.font-styles1.css+bootstrap.css+skin.css+responsive.css+menu.css+swiper.min.css,Mcc.nAV12exFII.css.pagespeed.cf.a_yWJedOjY.css",
        "This is the full text of the XHTML mobile10.dtd.xml, which is based on the code created by the developers of Google's search engine, iPlayer and other sites.",
        "https://munchkin.marketo.net/munchkin.js",
        "https://www.virustotal.com/graph/embed/gc0d82762363b4aa88991027c391afdbfe9585395bd8d4273bbe09907fbfaf532?theme=light",
        "xfe-URL-imhrzluowdso.gq-stix2-2.1-export.json",
        "https://vestacp.com/css/app.css",
        "https://imp0rtp3.wordpress.com/2021/08/12/tetris/",
        "https://www.virustotal.com/graph/embed/g3b316b58b8c54064b322b2e186d62950d7632add2f3f408f8d8a1706563fd3c0?theme=dark",
        "https://www.virustotal.com/graph/embed/g6a67af8ffa22446da35d6989d7d0bc47efcd295eb893471e9b4912080c1dddef?theme=dark",
        "https://www.cloudron.io/3rdparty/angular-loader.min.js",
        "https://www.virustotal.com/gui/collection/6434f0cf09638991baf3be289834696b46e11c4c6cbe1e7b9548f9ac27372b53",
        "https://colohouse.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2",
        "http://www.zhuzi.me/zhuzi-statistic.js?path=http%3a%2f%2fwww.zhuzi.me%2f&siteid=62221&referer=",
        "https://m.bds247.vn/lib/nivo-slider/slider.js 443 Script",
        "https://sofire.bdstatic.com/js/dfxaf.js",
        "http://fonts.googleapis.com/css?family=Abril+Fatface%3Aregular&subset=latin%2Ccyrillic&ver=5.7.6",
        "xfe-URL-West.cn-stix2-2.1-export.json",
        "https://www.googletagmanager.com/gtm.js?id=GTM-PKDJJPC",
        "https://www.data102.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1",
        "https://cp.enom.com/js/openWin.min.js",
        "https://connect.facebook.net/signals/config/438248060937995?v=2.9.57&r=stable",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-vendors.js",
        "https://pegtech.com/wp-content/plugins/wp-video-lightbox/js/jquery.prettyPhoto.min.js?ver=3.1.6",
        "https://cp.enom.com/js/punycode.min.js",
        "xfe-URL-Zhuzi.me-stix2-2.1-export.json",
        "https://bat.bing.com/bat.js",
        "http://alp-vision.com/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=7.4.4",
        "https://www.gandi.net/static/js/modern.27ee934b0dc5.js",
        "https://cp.enom.com/scripts/Session.min.js",
        "https://www.virustotal.com/gui/collection/0c9360cb9f8601bd6cdf912eb414d67902487f0c4eec96e952377e300ff4e983/iocs",
        "xml version= 1.0 encoding= utf 8 DOCTYPE html PUBLIC //WAPFORUM//DTD XHTML Mobile 1.0//EN http://www.wapforum.org/DTD/xhtml mobile10.dtd html xmlns= http://www.w3.org/1999/xhtml head meta http equiv= Content Type content= text/html charset=utf 8 / title mua bn nh t cho thu nh t sang nhng sang nhng ca hng /title meta name= copyright content= 2010 2020 bds247.vn / meta name= google site verification content= suyiBYZARDnZ4zGeoAiF VajqMQ0pgLGnEm69aZ aIY / meta name= robots content= index follow / meta name= key",
        "https://www.virustotal.com/gui/collection/343b947063e58a53ca281f5ad54a72a7fa1b9b6e4c1ca84de6202b99e3126327/summary",
        "https://4vendeta.com/assets/js/ajaxchimp.min.js",
        "https://cp.enom.com/js/jquery.disableonsubmit.min.js",
        "https://s.adroll.com/j/sendrolling.js",
        "https://www.virustotal.com/gui/collection/2c8e8189f77f80c97f4192dff56750f9603651db2cc6cca045f53e274f4b090e",
        "https://www.criminalip.io/domain/report?scan_id=13798622",
        "http://static.geetest.com/static/js/geetest.6.0.9.js",
        "https://tracking.premiumhealtheurope.com/code.js",
        "https://aquanx.com/js/jquery-1.12.4.min.js",
        "https://www.powr.io/powr.js?platform=html",
        "xfe-URL-Cpanel.com-stix2-2.1-export.json",
        "https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800&subset=latin,latin-ext",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/summary",
        "https://www.data102.com/wp-content/plugins/cta/shared//shortcodes/js/spin.min.js",
        "https://www.virustotal.com/gui/collection/dbf356b0a281fa94308e2e24738d839491491bfb2defa4e6c42662646e52c8f8",
        "xfe-URL-Powr.io-stix2-2.1-export 2.json",
        "https://www.virustotal.com/gui/collection/be10f2ed2776b9b4028ac868814ab14bdd576ca5e5bce877ac2954389ba9d328",
        "https://d.adroll.com/consent/check/Q7CW4G7ZJJGWDLUB76P5IV?adroll_fpc=7c06a492879ac231294c1fe2e6e394f3-1653353535991&arrfrr=https%3A%2F%2Fwww.indusface.com%2F&_s=1316674c131c34cc157a9ad9119512a2&_b=2",
        "https://cp.enom.com/ScriptResource.axd?d=fVjQa-0YyNqO6JmV36bw6eBJdTjE2YSdtcunOWcKYcBNn73MOJKQA_rxX3YMhcxLTgyDsGTKy0p9NEPvxzpqEpBKtm3GLb2GgI1LFYMC0Xr2lh71ZCttzgNGFnc5mS_Fc_DY5UH0M19Mr958h1jvmK4kzAM1&t=363be08",
        "https://www.1.cpanel.net/analytics?conly=true&visitor_id=311218274&visitor_id_sign=3e1116a56bfd91923fe15cac565b502779c6ec3fe7449557f3940ba04e77079951b9efb044c2275f4211d26742585a9d14544eae&pi_opt_in=&campaign_id=33566&account_id=872471&title=Hosting%20Platform%20of%20Choice&url=https://cpanel.net/&referrer=",
        "https://web.mxradon.com/t/Tracker.js",
        "https://www.clarity.ms/tag/uet/26015787",
        "https://cdn.optimizely.com/js/26241557.js",
        "https://dc.cux.io/analyzer.js",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-common.js",
        "https://fonts.googleapis.com/css?family=Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic&subset=greek%2Clatin%2Cvietnamese%2Clatin-ext%2Ccyrillic%2Ccyrillic-ext%2Cgreek-ext&ver=2.9.6",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d0107b44401771de9ebf2",
        "http://alp-vision.com/wp-content/themes/alp-vision/css/bootstrap.css?ver=1.0",
        "https://d.adroll.com/pixel/Q7CW4G7ZJJGWDLUB76P5IV/WH2M5MREOVC4HNKNZPPJZR?adroll_fpc=7c06a492879ac231294c1fe2e6e394f3-1653353535991&arrfrr=https%3A%2F%2Fwww.indusface.com%2F&pv=54603716107.79724&cookie=BIJ6M3OZKNCW7OIMIJSZED%3A2%7CWH2M5MREOVC4HNKNZPPJZR%3A2%7CQ7CW4G7ZJJGWDLUB76P5IV%3A2&adroll_s_ref=&keyw=&adroll_external_data=",
        "https://www.virustotal.com/graph/embed/g3dae42eb79cc447182e3a3dd746e462f0903d71c784d4f5cacf970954deea221?theme=dark",
        "xfe-URL-Enom.com-stix2-2.1-export.json",
        "https://c81e728d9d4c2f636f067f89cc14862c.com/static_new/css/public.css",
        "https://urlscan.io/search/#ualberta.ca",
        "https://www.virustotal.com/gui/collection/6a4e699473879d39e15ed7cd130f2ee9543f842b92c9ad8b78e310968f4b086f",
        "https://bid.g.doubleclick.net/xbbe/pixel?d=KAE",
        "https://www.virustotal.com/graph/g994d0094226240eba65c081dfbc3e4936aa010abf4db48049e3a964e7c5ad076",
        "https://www.choopa.com/_js/global.js?v=209",
        "https://tria.ge/240517-vdwb5shc71/behavioral1",
        "https://maps.googleapis.com/maps/api/js?v=3.exp&key=AIzaSyDR76rjQL_2raonHiZ6ZrPqJr-FPb7pGH0",
        "https://www.google.com/recaptcha/api.js?render=6LerjKkcAAAAAHIvlsndboXTiYDGt_xACa77alyA",
        "https://www.googletagmanager.com/gtag/js?id=AW-827450946",
        "https://www.gandi.net/static/js/legacy.7cc648e3ff7a.js",
        "https://web.mxradon.com/t/WebTracker.aspx?p1=18917&p2=Web%20Application%20Security%2C%20WAF%2C%20SSL%20Certificates&p3=-1&p4=&p5=1&p6=8415a029-248f-4eeb-bc18-338560430ff7&p7=&p8=&p9=0",
        "https://cpanel.net/wp-content/themes/cPbase/assets/css/roadmap.css",
        "https://pegtech.com/wp-includes/js/jquery/jquery.js?ver=1.12.4",
        "https://www.googletagmanager.com/gtag/js?id=G-W8YD4P2ENY&l=dataLayer&cx=c",
        "http://v1-ab.cdn-static.cn/editor/js/jquery.min.js",
        "https://www.virustotal.com/graph/embed/gf1d5aa209c7f4fd086e4cb17dcd0af52421ea4bae87d49fe9b4076b382612f0e?theme=dark",
        "http://www.bbbbop13.com:1313/",
        "https://c81e728d9d4c2f636f067f89cc14862c.com/static_new/js/common.js",
        "https://s.adroll.com/j/roundtrip.js",
        "https://bat.bing.com/p/action/17528422.js",
        "https://www.virustotal.com/gui/collection/82dc29932b9184d02b037289fd4605c158e96a57f376b08a8b2b94e43d0ae18b/iocs",
        "https://www.virustotal.com/gui/collection/da35693aa528a682ca91aee332c8155d99ac8e4a13077cc73b2a8921c8fea36b",
        "https://m.bds247.vn//view/js/jquery6_1.js 443",
        "https://goutong.baidu.com/site/270/98c14a71a44014f7aa9d23449a55ae8f/b.js?siteId=3064033",
        "http://imhrzluowdso.gq/i/css/bootstrap.css",
        "https://waf.intelix.pl/957476/Chat/Script/Compatibility",
        "https://app-ab02.marketo.com/js/forms2/css/forms2.css",
        "https://viz.greynoise.io/query/AS36351%20classification:%22malicious%22",
        "https://bat.bing.com/p/action/26015787.js",
        "https://clientcdn.pushengage.com/core/80780b73b5a3f4655fee62041e51f1be.js",
        "https://www.virustotal.com/graph/embed/g23481631a7c745c6ba19f72ce9f853643d17706c08ab44eb8851eb5c56c0f073?theme=dark",
        "xfe-IP-137.220.241.241-stix2-2.0-export.json",
        "https://www.googletagmanager.com/gtag/js?id=AW-1027984682",
        "https://aquanx.com/js/bootstrap-hover-dropdown.min.js",
        "https://fm.ipinyou.com/j/a.js",
        "https://www.virustotal.com/gui/collection/a6a81c8412b19ac6357a7c6e978c31a38d52a75fbb3b2e44f0f1a2bf0deb8a58/iocs",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b",
        "https://www.gartner.com/reviews/public/Widget/js/widget.js",
        "https://www.layerhost.com/assets/js/vendor/what-input.js",
        "https://www.dinancars.com/update-agent",
        "https://aquanx.com/",
        "https://connect.facebook.net/en_US/fbevents.js",
        "https://www.virustotal.com/graph/embed/g699a7b9bfb324855859555181d01666c372310cf233441e08a095459b3394dea?theme=dark",
        "https://pegtech.com/wp-includes/js/wp-emoji-release.min.js?ver=4.9.20",
        "https://static.ads-twitter.com/uwt.js",
        "https://www.hostrocket.com/js/jquery.selectBox.min.js",
        "https://tria.ge/240517-vc7c1shc62/behavioral1",
        "http://www.weide.net/js/jquery.validate.js",
        "https://app-ab02.marketo.com/js/forms2/css/forms2-theme-simple.css",
        "https://aquanx.com/js/bootstrap.js",
        "http://api.geetest.com/get.php?gt=70bfe290f45725d99fae0063c5188b8f&challenge=36bbdc68ea2e3279d57269471b837a6b&product=popup&width=301px&offline=false&lang=zh-cn&protocol=http://&type=slide&path=/static/js/geetest.6.0.9.js&callback=geetest_1650391756575",
        "https://www.virustotal.com/gui/collection/0ca12fcdd125ec5a5055180ee828b98d47b8b2e920660be559c2b602266b6b1d/iocs",
        "https://www.google-analytics.com/gtm/js?id=GTM-PF7H94Q&t=gartner&cid=559436367.1653353775",
        "https://vestacp.com/bower_components/foundation-sites/dist/js/foundation.js",
        "https://www.filescan.io/uploads/664799c9d5c40bffee6106d7",
        "https://www.virustotal.com/graph/g40f442f2b5d64cba818cac88855ba4ce274d109ce4ef4fb496f1af4efb993886",
        "https://m.bds247.vn/view/js/page.js 443 Script",
        "http://api.geetest.com/gettype.php?gt=70bfe290f45725d99fae0063c5188b8f&callback=geetest_1650391760798",
        "https://www.googletagmanager.com/gtag/js?id=UA-59480575-2",
        "https://www.virustotal.com/gui/collection/da124f42943c08f1cafdc1c42635457b0c69ccce41b4031263af3235717996a2/summary",
        "https://c.cnzz.com/core.php?web_id=1280740152&t=z",
        "https://www.choopa.com/commonimages/jquery-3.5.1.min.js",
        "https://loldrivers.io/",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-4fe9d5dd.js",
        "xfe-URL-pegtech.com-stix2-2.1-export.json",
        "https://ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js",
        "https://vestacp.com/bower_components/jquery/dist/jquery.js",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/iocs",
        "https://www.hostrocket.com/js/jquery-ui-1.8.13.custom.min.js",
        "https://colohouse.com/wp-content/plugins/stop-user-enumeration/frontend/js/frontend.js?ver=1.3.31",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cff1a5ea31558d54fcbf6",
        "https://script.hotjar.com/survey-v2.3716506838f2208ab9e2.js",
        "https://www.bugherd.com/sidebarv2.js?apikey=kmu00qbvuigehexs5chefq",
        "https://js.partnerstack.com/v1/",
        "https://d.adroll.com/pixel/DUKHAKVYIJASHDUBG4V7RE/E23RMKDBEFAEXMXLWK3IWO?adroll_fpc=838a57acc6141112b6107bdce5e3fde6-1650403057055&arrfrr=https%3A%2F%2Fwww.vultr.com%2F&pv=70707106758.07146&cookie=&adroll_s_ref=&keyw=",
        "https://www.youtube.com/s/player/534c466c/www-widgetapi.vflset/www-widgetapi.js",
        "https://www.filescan.io/uploads/66479b483313f70f0afe3dbb",
        "https://www.virustotal.com/gui/collection/2cdadbf6aa2ec4f9815c038b0e9375b1475ac7e049fd123861d6e925e7802c6a",
        "https://s.adroll.com/j/pre/Q7CW4G7ZJJGWDLUB76P5IV/WH2M5MREOVC4HNKNZPPJZR/index.js",
        "https://trackcmp.net/visit?actid=223422163&e=&r=&u=https%3A%2F%2Fwww.indusface.com%2F",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906222f5af13cdfb5093",
        "https://github.com/vuejs/vue-devtools",
        "https://www.yunshipei.com/assets/js/jquery.js",
        "https://www.hostrocket.com/js/jquery-1.6.1.min.js",
        "https://www.virustotal.com/gui/collection/8f89eb9579ca53d15294ec27a4c1e763998ce57d3644ea746621d9fe0cb57e55/iocs",
        "https://www.google-analytics.com/analytics.js",
        "https://www.googletagmanager.com/gtag/js?id=G-K6536FHN4D&l=dataLayer&cx=c",
        "https://www.virustotal.com/gui/collection/8d65d93130b4775903adbffbb53820d40bb9425dcf1848b806ffee65ee883984",
        "https://www.yunshipei.com/",
        "xfe-URL-ewqopweowia543.ga-stix2-2.0-export.json",
        "https://www.data102.com/wp-includes/js/wp-embed.min.js?ver=00b0ffc433836dcf9f57035fded0b908",
        "https://pro.fontawesome.com/releases/v5.13.1/css/all.css",
        "https://www.virustotal.com/gui/collection/343b947063e58a53ca281f5ad54a72a7fa1b9b6e4c1ca84de6202b99e3126327",
        "https://my.choopa.com/js/global.js?v=41",
        "https://analytics.cloudron.io/piwik.js",
        "https://www.virustotal.com/gui/collection/1497c56a475d73236c67292964eabd7f8961f88c57fa5a2e3f30720dc29a51e7",
        "https://js.users.51.la/21185805.js",
        "https://script.hotjar.com/modules.0076bf93c385ddf0ff58.js",
        "https://www.googletagmanager.com/gtm.js?id=GTM-PTXLXZ4",
        "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/apbct-public--functions.min.js?ver=5.173",
        "https://www.hxcpp100.com/js/linkChange.js",
        "https://static.zdassets.com/ekr/snippet.js?key=7342b695-e394-4f25-89a0-da9d262a48da",
        "https://eu-library.klarnaservices.com/lib.js",
        "https://colohouse.com/wp-content/plugins/duracelltomi-google-tag-manager/js/gtm4wp-form-move-tracker.js?ver=1.13.1",
        "https://aiff.cdn.bcebos.com/sensors%2Fonline%2Fsa-sdk-javascript-1.14.24%2Fsensorsdata.min.js",
        "https://www.hostrocket.com/css/colorbox.css",
        "https://www.virustotal.com/gui/collection/d142f78015e1c929cedae31dba7e5b735b6dedfc31e4759d8ec5f02c16328b98",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/graph",
        "https://www.virustotal.com/gui/collection/daab0521ae533cbdfeec047e51a9499aedfd27c8cc05c644950126c1947131f9",
        "https://cpanel.net/wp-content/themes/cPbase/assets/js/dist/cpbase.js?ver=5.6",
        "https://www.virustotal.com/gui/collection/fd8ebe64d72b2ad9e90773791522c3ec5863868dc3b9c58a929c6b4e01bb3042",
        "https://www.indusface.com/css/A.cookieconsent.min.css.pagespeed.cf.t1fRd9Ouvj.css",
        "https://www.virustotal.com/graph/g38632f8b939b443ab3b69f6a3171d02ffd2696a0f3714325a84b9a5f227a7d1c",
        "https://www.dinancars.com/assets/css/jquery-ui-custom.css",
        "https://cp.enom.com/js/cart.minicart.min.js",
        "xfe-URL-colohouse.com-stix2-2.1-export.json",
        "https://consent.cookiebot.com/da52fc49-8e48-42b7-9ad3-c219404f6f92/cc.js?renew=false&referer=cpanel.net&dnt=false",
        "https://tag.aticdn.net/616708/smarttag.js",
        "https://cp.enom.com/WebResource.axd?d=6rtXrDcnyiYD-9dFDFOkxTRcPVSrAN8fR-cHKzNqPTy7bHic-2LLMHDnielTzEI-sd1KplHrRBudcZJOm0-lxubO7k41&t=637453818340000000",
        "https://my.choopa.com/js/desktop.js?v=41",
        "https://masterhost.ru/s/masterhost_v2/build/css/global.css?v=MUmvaY06hvKf",
        "https://www.filescan.io/uploads/664bb0cd7c9fb1468fc610c5/reports/00c78e4d-2156-4906-a106-ebf7e2723251/overview",
        "https://prima-abnehmen-shop.com/_Resources/Static/Packages/Seven.Offerpage.Checkout/Scripts/main.min.js?bust=ef22ff16",
        "http://alp-vision.com/wp-content/cache/autoptimize/js/autoptimize_78b4f9b28399aa3c8a405e45931ad058.js",
        "https://www.virustotal.com/gui/collection/86f3d77a28744357c14d92dba7ac6302d57700308c64b641513119d8fcad411f",
        "https://m.bds247.vn/lib/pikachoose/lib/jquery.jcarousel.min.js",
        "https://analytics.gandi.net/piwik.js",
        "https://www.virustotal.com/gui/collection/3bf1c0922ee6f4d041effbf9f72a21a1e9f4b38d0593cfbeaca24851cf712eac",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-app.js",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-2d0b9454.js",
        "https://s.adroll.com/j/exp/DUKHAKVYIJASHDUBG4V7RE/index.js",
        "https://pegtech.com/wp-includes/css/dashicons.min.css?ver=4.9.20",
        "https://colohouse.com/wp-includes/js/wp-emoji-release.min.js?ver=5.8",
        "https://s9.cnzz.com/z_stat.php?id=1280740152&web_id=1280740152",
        "https://www.virustotal.com/graph/embed/g994d0094226240eba65c081dfbc3e4936aa010abf4db48049e3a964e7c5ad076?theme=dark",
        "https://www.loldrivers.io/js/chart.min.js",
        "https://tlumacz.migam.org/sad_rejonowy_jelenia_gora",
        "https://colohouse.com/",
        "https://www.wordfence.com/blog/2022/10/threat-advisory-monitoring-cve-2022-42889-text4shell-exploit-attempts/",
        "https://h5.hxcpp100.com/?id=22929",
        "https://www.virustotal.com/gui/collection/86f3d77a28744357c14d92dba7ac6302d57700308c64b641513119d8fcad411f/iocs",
        "https://s9.cnzz.com/z_stat.php?id=1280743953&web_id=1280743953",
        "https://www.yunshipei.com/assets/js/amazeui.min.js",
        "http://alp-vision.com/wp-includes/js/jquery/jquery.min.js?ver=3.5.1",
        "https://www.googleadservices.com/pagead/conversion/854235671/?random=1650418372749&cv=9&fst=1650418372749&num=1&value=0&label=PRNxCIWemu8BEJe0qpcD&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&data=ads_data_redaction%3Dfalse&frm=0&url=https%3A%2F%2Fcpanel.net%2F&tiba=Hosting%20Platform%20of%20Choice&gcs=G111&did=dMWZhNz&edid=dMWZhNz&auid=2050955691.1650418373&capi=2&hn=www.googleadservices.com&btty",
        "https://www.hostrocket.com/js/jquery.behavior.js",
        "https://colohouse.com/wp-content/themes/Netrouting/assets/chosen/chosen.jquery.min.js",
        "443 Header\tHTTP/2 200 x powered by: PHP/7.4.29 set cookie: PHPSESSID=9158e16820bdbb5be0d1faa520b7dc19 path=/ expires: Thu 19 Nov 1981 08:52:00 GMT cache control: no store no cache must revalidate pragma: no cache content type: text/html charset=UTF 8 date: Thu 02 Feb 2023 13:37:37 GMT server: LiteSpeed alt svc: quic= :443 ma=2592000 v= 35 39 43 44",
        "https://prima-abnehmen-shop.com/_Resources/Static/Packages/Seven.Prima/Scripts/Main.js?bust=2a0b1c62",
        "xfe-URL-Cpanel.net-stix2-2.1-export.json",
        "https://www.indusface.com/js/popper.min.js+bootstrap.min.js+modernizr-custom.js+menu.js.pagespeed.jc.WlixBHq4Fv.js",
        "https://www.hostrocket.com/js/jquery.cycle.all.js",
        "http://www.weide.net/js/formfieldformatting.js",
        "https://cp.enom.com/js/jquery.cookie.min.js",
        "https://client.crisp.chat/l.js",
        "https://www.virustotal.com/gui/collection/9220d9375ebb4289fdbc4a7aac232b75a5c1b01e5e27edd965982bc6fe28f0e2",
        "https://imgs.qgddmy.com/static_h5/js/manifest.2ae2e69a05c33dfc65f8.js",
        "https://www.hostrocket.com/js/jquery.colorbox-min.js",
        "xfe-URL-raksmart.com-stix2-2.1-export.json",
        "S?d Rejonowy w Jeleniej G\u00f3rze.htm",
        "https://www.googletagmanager.com/gtag/js?id=UA-92521958-1",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b - https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b = Hidden Apps - Enterprise Apps List",
        "https://www.virustotal.com/gui/collection/b8a6d1fcd73207ba46eae6806b946c4b539f301e718f3fba21fa4e797d4b5783",
        "https://cp.enom.com/verisign-seal.htm",
        "https://cpanel.net/wp-content/themes/cPbase/style.css?ver=5.6",
        "https://www.virustotal.com/gui/collection/4b166c2c1752d85215da951b15a065688bfe24ea92c65228a45ded6f2d94685b/iocs",
        "https://cpanel.net/wp-includes/js/wp-embed.min.js?ver=5.6",
        "https://www.loldrivers.io/favicons/browserconfig.xml",
        "xfe-IP-185.165.31.131-stix2-2.1-export.json",
        "https://4vendeta.com/assets/js/meanmenu.min.js",
        "https://stats.ipinyou.com/presadv?a=SR..sxcg_4d0DhagaJWCLj_ZdX&cb=py.cb",
        "https://www.gstatic.com/recaptcha/releases/QENb_qRrX0-mQMyENQjD6Fuj/recaptcha__en.js",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1027984682/?random=1653327072015&cv=9&fst=1653327072015&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=6&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2oa5b0&sendb=1&ig=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fwww.dinancars.com%2Fabout%2F&ref=https%3A%2F%2Fwww.dinancars.com%2Fupdate-agent&tiba=About%20Dinan%20-%20Dinan&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-vendor.js",
        "https://cdn-scripts.signifyd.com/api/script-tag.js",
        "https://m.bds247.vn/lib/pikachoose/lib/jquery.pikachoose.js",
        "https://embed.tawk.to/5697c34527b9b5d40b66960f/default",
        "https://cpanel.net/wp-content/themes/cPbase/assets/css/version96.css",
        "https://www.layerhost.com/assets/js/vendor/foundation.min.js",
        "https://cdn.staticfile.org/qrcodejs/1.0.0/qrcode.min.js",
        "https://www.virustotal.com/gui/collection/bd65940df2423788fcc8623495dfdafdfd4236d93533db0256db5ff4347b65f9",
        "https://colohouse.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.7",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-f163fcd0.js",
        "https://www.virustotal.com/gui/collection/c1ea74232c607b23ded09484664f00ae58f911ccb82433d042056cbb84c9d602/iocs",
        "https://chimpstatic.com/mcjs-connected/js/users/6c3abfa7ff8634c75cdb2b22e/ddf7a436c1746be666f330e4a.js",
        "https://www.gstatic.com/recaptcha/releases/Y-cOIEkAqcfDdup_qnnmkxIC/recaptcha__en.js",
        "https://cp.enom.com/js/global-functions.js",
        "https://app-ab02.marketo.com/js/forms2/js/forms2.min.js",
        "https://www.yunshipei.com/assets/js/app.min.js",
        "xfe-IP-134.73.11.118-stix2-2.1-export.json",
        "https://www.indusface.com/js/cookieconsent.min.js.pagespeed.jm.FCA-2RWV9s.js",
        "https://vars.hotjar.com/box-4924254a9ce4dc9b959b6e4a9b662d60.html",
        "xfe-URL-Layerhost.com-stix2-2.1-export.json",
        "https://pegtech.com/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=5.0.2",
        "http://dk9ctyhidjrvgn.xyz/index_files/sss.css",
        "https://www.virustotal.com/gui/collection/12100cb4982365cfe5122fcedda2c084d60cebe09314846cae980c36fc90fc8c/iocs",
        "https://cp.enom.com/ScriptResource.axd?d=lDjPFfAIWSrEAVNgTHTrISQmLEFmHAaibvNJQuGRZDbWpGFPLrFwaGVpjCUsI6HkqzbpwmaAa0cJCrq8f0eqEvIsQM8lvN_dVYVyESnohON4oTvdMZHDmwG83uJA4m2oqykP8TTTSIeV2oaNrlIXaX8cOxC5Cv6aGmjpdB2u-227wdn30&t=363be08",
        "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/cleantalk-modal.min.js?ver=5.173",
        "https://munchkin.marketo.net/161/munchkin.js",
        "https://www.indusface.com/js/jquery.3.5.1.min.js.pagespeed.jm.A8biqtTJrt.js",
        "xfe-URL-Choopa.com-stix2-2.1-export.json",
        "https://colohouse.com/wp-content/plugins/contact-form-7/includes/js/index.js?ver=5.4.2",
        "https://imgs.qgddmy.com/static_h5/js/vendor.4071e145e4ea91fa5ab1.js",
        "https://www.cloudron.io/3rdparty/angular-route.min.js",
        "https://www.virustotal.com/graph/embed/g78ea5ea9b68b4a4bbcd2bc078e23b321985e72d90da146c19d8d80ede366c1fa?theme=dark",
        "https://colohouse.com/wp-content/plugins/wp-schema-pro/admin/assets/min-js/frontend.min.js?ver=2.7.2",
        "https://cdn.staticfile.org/jquery/3.6.0/jquery.min.js",
        "https://www.cloudron.io/3rdparty/angular.min.js",
        "https://sc.lfeeder.com/lftracker_v1_kn9Eq4R1l2K7RlvP.js",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00356dd8f43b723a915a",
        "https://viz.greynoise.io/ip/analysis/ae06b3b5-c746-4b44-b2ac-19bb3aea14a1 [11.23.25 - 1000ipv4]",
        "https://alpha99.raksmart.com/whmcs/assets/js/cookie-warn.js",
        "https://www.indusface.com/js/fontawesome.js.pagespeed.jm.X4kSHwBNxI.js",
        "https://www.virustotal.com/gui/collection/33a61b144ffdece76551464e76866ab59346f0fa3f1f97380b401c1ac3f0d305",
        "https://www.virustotal.com/gui/collection/02bef6a3cf1a035ad5bfb238cac2e913f4ed9425847d7cec5e7dc4097aa3c352",
        "https://c81e728d9d4c2f636f067f89cc14862c.com/static_new/js/dialog.min.js",
        "https://www.virustotal.com/gui/collection/385f419c1c3733dd9dd151d4403bdb38cb24d12c21f18ce8f4f41d818d7a12a5",
        "https://web.op39v.xyz/?channelCode=pingguo",
        "https://www.filescan.io/uploads/664ba8a20663ff3c2ec6428a/reports/09d3d82a-7ec1-4804-93e5-5ae691fbb7f2/overview",
        "https://4vendeta.com/assets/js/jquery.min.js",
        "https://vestacp.com/js/app.js",
        "https://www.hostrocket.com/js/jquery.price_slider.js",
        "xfe-URL-c81e728d9d4c2f636f067f89cc14862c.com-stix2-2.1-export.json",
        "https://www.googleadservices.com/pagead/conversion_async.js",
        "http://www.jelenia-gora.sr.gov.pl/ogloszenia-komornicze",
        "https://cp.enom.com/responsive/_js/bootstrap.js",
        "https://fonts.googleapis.com/css?family=Libre+Franklin%3A300%2C300i%2C400%2C400i%2C600%2C600i%2C800%2C800i&subset=latin%2Clatin-ext",
        "https://tria.ge/240521-q4s79agb25/static1",
        "https://c81e728d9d4c2f636f067f89cc14862c.com/static_new/js/jquery.min.js",
        "https://www.indusface.com/js/swiper.min.js.pagespeed.jm.47RtcloJQ-.js",
        "https://cp.enom.com/global/TopMenu.ascx.js",
        "https://pegtech.com/wp-content/themes/Divi/js/custom.min.js?ver=3.0.100",
        "https://colohouse.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
        "https://www.hudsonrock.com/search?domain=ualberta.ca",
        "https://www.virustotal.com/gui/collection/c1ea74232c607b23ded09484664f00ae58f911ccb82433d042056cbb84c9d602",
        "https://www.hostrocket.com/css/style.css",
        "https://m.bds247.vn/lib/nivo-slider/slider.js",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906322f5af13cdfb50be",
        "xfe-IP-103.24.249.209-stix2-2.1-export.json",
        "https://www.virustotal.com/gui/collection/c1ea74232c607b23ded09484664f00ae58f911ccb82433d042056cbb84c9d602/graph",
        "https://sitereport.netcraft.com/?url=http://ualberta.ca",
        "https://connect.facebook.net/signals/config/571256413046247?v=2.9.57&r=stable",
        "xfe-URL-hyqxsnjj.com-stix2-2.1-export.json",
        "https://www.loldrivers.io/js/bundle.7cd1a644ff4540d19bfa43f193df74afce746a0213920f45d73bf720542f682d81b6ad0320242744d332512cfb63eac5790fab1a240d6e6c8cb89f25fcacfbd7.js",
        "https://vestacp.com/bower_components/what-input/dist/what-input.js",
        "https://m.bds247.vn//view/js/jquery6_1.js",
        "https://www.googletagmanager.com/gtag/js?id=G-56M7ZWVN9L",
        "https://www.filescan.io/uploads/664bb40fbc04dffa92240ca2/reports/398074f2-c7b6-40e9-9b5c-4225cc990473/overview",
        "https://viz.greynoise.io/query/AS60068%20classification:%22malicious%22",
        "http://push.zhanzhang.baidu.com/push.js",
        "https://colohouse.com/wp-content/plugins/kingcomposer/assets/frontend/js/kingcomposer.min.js?ver=2.9.6",
        "https://cp.enom.com/js/jquery.jgrowl.min.js",
        "https://tenantresolution.pingcastle.com/Search - Tenant still active (07.19.24) - Good jobs ya'll",
        "https://www.virustotal.com/gui/collection/aabd4abecf7099202ccbfbc1cec130ea266329ade38b040169399c6abf97a188",
        "https://connect.facebook.net/signals/config/285857426541675?v=2.9.57&r=stable",
        "xfe-URL-hostrocket.com-stix2-2.1-export 2.json",
        "http://imhrzluowdso.gq/i/css/font-awesome.css",
        "http://www.ctgserver.net/zhuzi-statistic.js?path=http%3a%2f%2fwww.ctgserver.net%2f&siteid=68944&referer=",
        "https://www.googletagmanager.com/gtm.js?id=GTM-5SN6BRV",
        "xfe-URL-4vendeta.com-stix2-2.1-export.json",
        "https://www.hostrocket.com/contact-files/contact-form.js",
        "https://www.virustotal.com/gui/collection/27233a89c864ba0e77e672a8909fd63b4a8b6d457c9e4ff219f2a3e47db13376",
        "https://www.virustotal.com/gui/collection/bc7e252dcc07855314e153efe890d70e7a7e9b8a743e171eac31e5951260c1b7",
        "http://ajax.googleapis.com/ajax/libs/jquery/1.7.1/jquery.min.js",
        "https://www.googletagmanager.com/gtm.js?id=GTM-KW8B5L",
        "https://www.layerhost.com/assets/js/app.js",
        "https://www.cloudron.io/3rdparty/slick.js",
        "https://imgs.signifyd.com/fp/tags.js?org_id=w2txo5aa&session_id=7632E9E9-DE48-41D8-9BAC-1E27A98D17EC&pageid=2",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/858656304/?random=1650403054497&cv=9&fst=1650403054497&num=1&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=3&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.vultr.com%2F&tiba=SSD%20VPS%20Servers%2C%20Cloud%20Servers%20and%20Cloud%20Hosting%20by%20Vultr%20-%20Vultr.com&hn=www.googleadservices.com&rfmt=3&fmt=4",
        "https://www.virustotal.com/gui/collection/ba238f4d585b87abb85c126f927090cb866facfa9e4e2e0db8e307aff553397d",
        "https://viz.greynoise.io/analysis/e51d9a15-d802-4d51-9a70-17803dc2693a",
        "https://cpanel.net/wp-content/themes/cPbase/assets/js/dist/script.js?ver=5.6",
        "https://res-1257422681.file.myqcloud.com/assets/yeyue/boinstall.js",
        "https://tria.ge/240517-t9pc2ahb2t",
        "http://imhrzluowdso.gq/i/css/animations.css",
        "https://www.googletagmanager.com/gtm.js?id=GTM-WRDF3CB",
        "http://www.weide.net",
        "https://149371662.v2.pressablecdn.com/wp-includes/js/jquery/jquery.js",
        "https://mc.yandex.ru/metrika/watch.js",
        "https://static.hotjar.com/c/hotjar-1683409.js?sv=7",
        "https://sgoutong.baidu.com/embed/1652930761/asset/embed/css/mobile/main.css",
        "https://viz.greynoise.io/analysis/33e9b33b-b932-4c43-9be1-3e2d6f9cb4b3",
        "https://www.virustotal.com/gui/collection/bb0c0633dbe98b659fb06e07acd6e1f51ca43d3a1b4be09b4e9bfe8b3fde0cdb",
        "https://tracking.g2crowd.com/attribution_tracking/conversions/2226.js?p=https://www.indusface.com/&e=",
        "xfe-URL-pi.pardot.com-stix2-2.1-export.json",
        "https://pegtech.com/wp-content/themes/Divi/core/admin/js/common.js?ver=3.0.100",
        "https://connect.facebook.net/signals/config/828098694004178?v=2.9.57&r=stable",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/languages/en.js",
        "https://colohouse.com/wp-content/plugins/cookie-law-info/public/js/cookie-law-info-public.js?ver=2.0.4",
        "https://www.redditstatic.com/ads/pixel.js",
        "https://www.hostrocket.com/css/style-nophone.css",
        "xfe-IP-78.142.35.163-stix2-2.1-export.json",
        "https://www.cloudron.io/3rdparty/bootstrap.min.js",
        "https://player.vimeo.com/video/571271613",
        "https://www.filescan.io/uploads/666d69ff6b8dba248b414767",
        "https://www.cloudron.io/index.js",
        "https://www.jelenia-gora.sr.gov.pl/spacer",
        "https://www.cloudron.io/3rdparty/bootstrap.min.css",
        "https://web.op39v.xyz/js/chunk-common.js",
        "https://secure.gaug.es/track.js",
        "https://cp.enom.com/responsive/_js/knockout-3.3.0.min.js",
        "whitelists are really not the way forward unless you validate the integrity often Speedtest are also being screwed with ie allowing your neural controlled network out on a temp basis to prevent you from ousting the APT controlling your home broadband / wifi network",
        "https://www.filescan.io/uploads/666d69ff6b8dba248b414767/reports/dda2c8a1-96fd-4c00-9cbc-c64c4685a804/overview",
        "http://sgoutong.baidu.com/embed/1649840755/asset/embed/mobile_nb.js",
        "https://pegtech.com/wp-content/plugins/wp-video-lightbox/js/video-lightbox.js?ver=3.1.6",
        "https://cp.enom.com/js/jquery-3.5.1.min.js",
        "https://viz.greynoise.io/analysis/9635144c-db8f-47ab-a83a-5785602244cf - 07.03.24",
        "https://aquanx.com/js/cookie-warn.js?v=1_xSax0l",
        "https://ssl.google-analytics.com/ga.js",
        "https://cp.enom.com/responsive/_js/init.min.js",
        "https://app-ab02.marketo.com/index.php/form/XDFrame",
        "https://admin.verbox.ru/support/support.js?h=afe80d31a1cabd6ae5c00580688f27d2",
        "https://pegtech.com/wp-includes/js/wp-embed.min.js?ver=4.9.20",
        "https://www.clarity.ms/eus2/s/0.6.34/clarity.js",
        "https://www.choopa.com/_js/bootstrap.js",
        "https://cdn.getaddress.io/scripts/getaddress-autocomplete-1.1.2.min.js",
        "https://app.whoisvisiting.com/who.js",
        "All - EnterpriseAppsList.csv",
        "https://prima-abnehmen-shop.com/uk/order-now.html?affiliate=24&source=418&subid2=ddukc&subid3=35908921",
        "http://dk9ctyhidjrvgn.xyz/index_files/jquery.js",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-main.js",
        "https://www.virustotal.com/gui/collection/8228434e85241bd42ae063de8cf2ee2afb86f0848675ed11e3f33b967e8c3c7c",
        "https://www.data102.com/?wordfence_lh=1&hid=2D6A812A7EB197E80D5A3978A6386BE4&r=0.5029022326538093",
        "https://tracking.premiumhealth.eu/code.js",
        "http://m.west.cn/jscripts/baidutj/hm.js",
        "AppRegistrationList.csv",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cffec5ea31558d54fcda2",
        "https://colohouse.com/wp-includes/js/wp-embed.min.js?ver=5.8",
        "https://v2.zopim.com/bin/v/widget_v2.329.js",
        "https://masterhost.ru/s/masterhost_v2/build/js/app.js?v=WivgGVzt/Ynv"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "Unknown APT Group(s) / Threat Actor (s)"
          ],
          "malware_families": [
            "",
            "Vult",
            "Reduceright",
            "Gc",
            "Filterizr api",
            "Vd",
            "Hj",
            "Eq",
            "Qe",
            "Serwer",
            "Eventtarget"
          ],
          "industries": [
            "Government",
            "Healthcare",
            "Telecommunications",
            "Education",
            "Technology"
          ],
          "unique_indicators": 201352
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/event.target",
    "whois": "http://whois.domaintools.com/event.target",
    "domain": "event.target",
    "hostname": "e.event.target"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 50,
  "pulses": [
    {
      "id": "69cc876e1a85eb578af3460c",
      "name": "Gatsby.",
      "description": "The results of an analysis of data gathered from a single web address are published on the website of the University of California, San Francisco, as part of its 2016/17 Research into Open Access.<pretext.fb43553d906781edd1ae894cf50d7735a1207fcad1123eb837d55eb4d448fed4",
      "modified": "2026-04-13T23:15:43.048000",
      "created": "2026-04-01T02:48:14.165000",
      "tags": [
        "a nxdomain",
        "unknown",
        "ip address",
        "domain",
        "present jun",
        "files",
        "ip related",
        "pulses otx",
        "pulses",
        "tags",
        "number",
        "ja3s",
        "get http",
        "ja3 client",
        "ja3 server",
        "ssdeep",
        "file type",
        "magic ascii",
        "crlf line",
        "trid digital",
        "unix",
        "cache entry",
        "zstandard",
        "dictionary id",
        "extra info",
        "process",
        "performs dns",
        "urls",
        "domain ip",
        "tls version",
        "https"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 272,
        "domain": 168,
        "hostname": 281,
        "FileHash-MD5": 170,
        "FileHash-SHA1": 51,
        "FileHash-SHA256": 113,
        "IPv4": 14,
        "email": 6
      },
      "indicator_count": 1075,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "5 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "64ed117e2308a042e50e1e9e",
      "name": "Investigation of Distribution Vectors and Threat Network Infrastructure",
      "description": "Targets: Individual(s), University of Alberta Infrastructure, Covenant Health (Alberta Health Services), TELUS Communications (Network & Mobile infrastructure), Government of Alberta, Government of Canada. International entities spanning primarily government, healthcare, and educational institutions.",
      "modified": "2025-11-23T23:20:07.571000",
      "created": "2023-08-28T21:28:30.294000",
      "tags": [
        "Domains",
        "ip addresses",
        "URLs",
        "Files",
        "Alberta Health Services",
        "BEC",
        "Education",
        "University of Alberta",
        "Government of Alberta",
        "Covenant Health Alberta",
        "Telus Communications",
        "Canadian Universities",
        "Malicious Certificates",
        "Digital Identity Theft / Credential Theft"
      ],
      "references": [
        "https://www.virustotal.com/gui/collection/27233a89c864ba0e77e672a8909fd63b4a8b6d457c9e4ff219f2a3e47db13376",
        "https://www.virustotal.com/gui/collection/50919d9e9d6d71522b641a3907ed32093293c400a2ae4faaab142f175c48de4b",
        "https://www.virustotal.com/gui/collection/bb0c0633dbe98b659fb06e07acd6e1f51ca43d3a1b4be09b4e9bfe8b3fde0cdb",
        "https://www.virustotal.com/gui/collection/b8a6d1fcd73207ba46eae6806b946c4b539f301e718f3fba21fa4e797d4b5783",
        "https://www.virustotal.com/gui/collection/bd65940df2423788fcc8623495dfdafdfd4236d93533db0256db5ff4347b65f9",
        "https://www.virustotal.com/gui/collection/2c8e8189f77f80c97f4192dff56750f9603651db2cc6cca045f53e274f4b090e",
        "https://www.virustotal.com/gui/collection/be10f2ed2776b9b4028ac868814ab14bdd576ca5e5bce877ac2954389ba9d328",
        "https://www.virustotal.com/gui/collection/33a61b144ffdece76551464e76866ab59346f0fa3f1f97380b401c1ac3f0d305",
        "https://www.virustotal.com/gui/collection/d142f78015e1c929cedae31dba7e5b735b6dedfc31e4759d8ec5f02c16328b98",
        "https://www.virustotal.com/gui/collection/02bef6a3cf1a035ad5bfb238cac2e913f4ed9425847d7cec5e7dc4097aa3c352",
        "https://www.virustotal.com/gui/collection/343b947063e58a53ca281f5ad54a72a7fa1b9b6e4c1ca84de6202b99e3126327/summary",
        "https://www.virustotal.com/gui/collection/3bf1c0922ee6f4d041effbf9f72a21a1e9f4b38d0593cfbeaca24851cf712eac",
        "https://www.virustotal.com/gui/collection/2cdadbf6aa2ec4f9815c038b0e9375b1475ac7e049fd123861d6e925e7802c6a",
        "https://www.virustotal.com/gui/collection/ba238f4d585b87abb85c126f927090cb866facfa9e4e2e0db8e307aff553397d",
        "https://www.virustotal.com/gui/collection/385f419c1c3733dd9dd151d4403bdb38cb24d12c21f18ce8f4f41d818d7a12a5/summary",
        "https://www.virustotal.com/gui/collection/9220d9375ebb4289fdbc4a7aac232b75a5c1b01e5e27edd965982bc6fe28f0e2",
        "https://www.virustotal.com/gui/collection/343b947063e58a53ca281f5ad54a72a7fa1b9b6e4c1ca84de6202b99e3126327",
        "https://www.virustotal.com/gui/collection/fd8ebe64d72b2ad9e90773791522c3ec5863868dc3b9c58a929c6b4e01bb3042",
        "https://www.virustotal.com/gui/collection/8d65d93130b4775903adbffbb53820d40bb9425dcf1848b806ffee65ee883984",
        "https://www.virustotal.com/gui/collection/385f419c1c3733dd9dd151d4403bdb38cb24d12c21f18ce8f4f41d818d7a12a5",
        "https://www.virustotal.com/gui/collection/6434f0cf09638991baf3be289834696b46e11c4c6cbe1e7b9548f9ac27372b53",
        "https://www.virustotal.com/gui/collection/bc7e252dcc07855314e153efe890d70e7a7e9b8a743e171eac31e5951260c1b7",
        "https://www.virustotal.com/gui/collection/dbf356b0a281fa94308e2e24738d839491491bfb2defa4e6c42662646e52c8f8",
        "https://www.virustotal.com/gui/collection/f60b8061133367a1047262a1e90d54cd72de4d59885c267906c6eeb557a35500",
        "https://www.virustotal.com/gui/collection/da124f42943c08f1cafdc1c42635457b0c69ccce41b4031263af3235717996a2/summary",
        "https://www.virustotal.com/gui/collection/daab0521ae533cbdfeec047e51a9499aedfd27c8cc05c644950126c1947131f9",
        "https://www.virustotal.com/gui/collection/12100cb4982365cfe5122fcedda2c084d60cebe09314846cae980c36fc90fc8c/iocs",
        "https://www.virustotal.com/graph/embed/g9219350397134ff3a645319a88b67833077c9cf0f50d4979aa0239a3d0b6ecea?theme=dark",
        "https://www.virustotal.com/gui/collection/c1ea74232c607b23ded09484664f00ae58f911ccb82433d042056cbb84c9d602",
        "https://www.virustotal.com/gui/collection/c1ea74232c607b23ded09484664f00ae58f911ccb82433d042056cbb84c9d602/graph",
        "https://www.virustotal.com/gui/collection/c1ea74232c607b23ded09484664f00ae58f911ccb82433d042056cbb84c9d602/iocs",
        "https://www.virustotal.com/gui/collection/da35693aa528a682ca91aee332c8155d99ac8e4a13077cc73b2a8921c8fea36b",
        "https://www.virustotal.com/gui/collection/1497c56a475d73236c67292964eabd7f8961f88c57fa5a2e3f30720dc29a51e7",
        "https://www.virustotal.com/gui/collection/8228434e85241bd42ae063de8cf2ee2afb86f0848675ed11e3f33b967e8c3c7c",
        "https://www.virustotal.com/gui/collection/aabd4abecf7099202ccbfbc1cec130ea266329ade38b040169399c6abf97a188",
        "https://www.virustotal.com/gui/collection/6a4e699473879d39e15ed7cd130f2ee9543f842b92c9ad8b78e310968f4b086f",
        "https://www.virustotal.com/graph/embed/g3dae42eb79cc447182e3a3dd746e462f0903d71c784d4f5cacf970954deea221?theme=dark",
        "https://www.virustotal.com/graph/embed/gc0d82762363b4aa88991027c391afdbfe9585395bd8d4273bbe09907fbfaf532?theme=light",
        "https://www.virustotal.com/graph/embed/g78ea5ea9b68b4a4bbcd2bc078e23b321985e72d90da146c19d8d80ede366c1fa?theme=dark",
        "https://www.virustotal.com/gui/collection/8f89eb9579ca53d15294ec27a4c1e763998ce57d3644ea746621d9fe0cb57e55/iocs",
        "https://www.virustotal.com/graph/g994d0094226240eba65c081dfbc3e4936aa010abf4db48049e3a964e7c5ad076",
        "https://www.virustotal.com/gui/collection/86f3d77a28744357c14d92dba7ac6302d57700308c64b641513119d8fcad411f/iocs",
        "https://www.virustotal.com/graph/g38632f8b939b443ab3b69f6a3171d02ffd2696a0f3714325a84b9a5f227a7d1c",
        "https://www.virustotal.com/gui/collection/4b166c2c1752d85215da951b15a065688bfe24ea92c65228a45ded6f2d94685b/iocs",
        "https://www.virustotal.com/graph/embed/g798b5e01446c4711ba22802009d71f5ba78553df16794088a907ae7456e2a017?theme=dark",
        "https://www.virustotal.com/gui/collection/86f3d77a28744357c14d92dba7ac6302d57700308c64b641513119d8fcad411f",
        "https://www.virustotal.com/gui/collection/a6a81c8412b19ac6357a7c6e978c31a38d52a75fbb3b2e44f0f1a2bf0deb8a58/iocs",
        "https://www.virustotal.com/graph/embed/g699a7b9bfb324855859555181d01666c372310cf233441e08a095459b3394dea?theme=dark",
        "https://www.virustotal.com/graph/embed/g6a67af8ffa22446da35d6989d7d0bc47efcd295eb893471e9b4912080c1dddef?theme=dark",
        "https://www.virustotal.com/graph/embed/g23481631a7c745c6ba19f72ce9f853643d17706c08ab44eb8851eb5c56c0f073?theme=dark",
        "https://www.virustotal.com/graph/embed/g3b316b58b8c54064b322b2e186d62950d7632add2f3f408f8d8a1706563fd3c0?theme=dark",
        "https://www.virustotal.com/graph/embed/g994d0094226240eba65c081dfbc3e4936aa010abf4db48049e3a964e7c5ad076?theme=dark",
        "https://www.virustotal.com/graph/g40f442f2b5d64cba818cac88855ba4ce274d109ce4ef4fb496f1af4efb993886",
        "https://www.virustotal.com/gui/collection/0c9360cb9f8601bd6cdf912eb414d67902487f0c4eec96e952377e300ff4e983/iocs",
        "https://www.virustotal.com/gui/collection/a1866f4c7dbc79920d0c7e914a3bace0d3dc424a2aac06bf30bf724c6c8b0375/iocs",
        "https://www.virustotal.com/gui/collection/82dc29932b9184d02b037289fd4605c158e96a57f376b08a8b2b94e43d0ae18b/iocs",
        "https://viz.greynoise.io/ip/analysis/ae06b3b5-c746-4b44-b2ac-19bb3aea14a1 [11.23.25 - 1000ipv4]"
      ],
      "public": 1,
      "adversary": "Unknown APT Group(s) / Threat Actor (s)",
      "targeted_countries": [
        "Canada",
        "United States of America",
        "Philippines",
        "Panama",
        "Netherlands",
        "Anguilla",
        "Saint Vincent and the Grenadines",
        "Aruba",
        "Mexico",
        "Guatemala",
        "Costa Rica",
        "Tanzania, United Republic of"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Education",
        "Healthcare",
        "Government"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 111,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 236,
        "FileHash-SHA1": 139,
        "FileHash-SHA256": 1421,
        "URL": 9580,
        "CIDR": 30,
        "domain": 10205,
        "email": 12,
        "hostname": 517612,
        "IPv4": 11,
        "CVE": 62
      },
      "indicator_count": 539308,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 145,
      "modified_text": "146 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6842489989d6db4d41fd8322",
      "name": "Vulnerable Driver Load",
      "description": "Here is the full list of malicious Windows drivers, which can be blocked with the help of a special tool, or a built-in system, if you want to know what to do with it.",
      "modified": "2025-07-06T01:00:17.231000",
      "created": "2025-06-06T01:47:05.317000",
      "tags": [
        "malicious",
        "vulnerable",
        "living",
        "land drivers",
        "premium",
        "windows",
        "feel",
        "strong",
        "json",
        "sysmon",
        "subdomains",
        "whasz",
        "html internet",
        "magia dokument",
        "html",
        "ascii",
        "z bardzo",
        "triid plik",
        "magika html",
        "rozmiar",
        "zgoszenie",
        "error",
        "100255",
        "255100",
        "number",
        "e100",
        "100i100n",
        "65535255",
        "25565535",
        "mmm d",
        "typeof window",
        "null",
        "bubble",
        "radar",
        "false",
        "click",
        "isitem",
        "dark",
        "copy",
        "shell",
        "panelbox",
        "document",
        "code",
        "body",
        "light",
        "mark",
        "date",
        "scroll",
        "target",
        "blank",
        "back",
        "main",
        "lowfi"
      ],
      "references": [
        "https://loldrivers.io/",
        "https://www.loldrivers.io/js/chart.min.js",
        "https://www.loldrivers.io/js/bundle.7cd1a644ff4540d19bfa43f193df74afce746a0213920f45d73bf720542f682d81b6ad0320242744d332512cfb63eac5790fab1a240d6e6c8cb89f25fcacfbd7.js",
        "https://www.loldrivers.io/favicons/browserconfig.xml"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1885,
        "FileHash-SHA1": 1367,
        "FileHash-SHA256": 1615,
        "hostname": 214,
        "domain": 52,
        "URL": 468,
        "CVE": 2
      },
      "indicator_count": 5603,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 123,
      "modified_text": "287 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "67a7f06a5d0f22ad92684646",
      "name": "WebForm.com.gov.pl/CEIDG/ScriptResource.axd",
      "description": "The following is the full text of the WebForm.com.gov.pl/CEIDG/ScriptResource.axd, following the following:.au, for the first time.",
      "modified": "2025-05-14T21:27:17.040000",
      "created": "2025-02-09T00:01:46.054000",
      "tags": [
        "null",
        "nie mona",
        "array",
        "input",
        "nonmsdombrowser",
        "object",
        "html",
        "component",
        "body",
        "horizontal",
        "date",
        "calendar",
        "february",
        "april",
        "june",
        "august",
        "iframe",
        "form",
        "friday",
        "explorer",
        "target",
        "error",
        "legend",
        "this",
        "type",
        "regexp",
        "elem",
        "index",
        "function",
        "handle",
        "check",
        "safari",
        "expando",
        "android",
        "false",
        "hooks",
        "copy",
        "prop",
        "class",
        "mark",
        "window",
        "code",
        "capture",
        "accept",
        "seed",
        "override",
        "hook",
        "look",
        "loop",
        "install",
        "pass",
        "enough",
        "bind",
        "core",
        "local",
        "verify",
        "done",
        "find",
        "internal",
        "inject",
        "possible",
        "hold",
        "middle",
        "guard",
        "fall",
        "stop",
        "panic",
        "back",
        "restrict",
        "speed",
        "turn",
        "grab",
        "getclass",
        "jquery",
        "bubble",
        "anchor",
        "shift"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1134",
          "name": "Access Token Manipulation",
          "display_name": "T1134 - Access Token Manipulation"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 13,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1143,
        "domain": 155,
        "hostname": 523,
        "FileHash-SHA256": 151
      },
      "indicator_count": 1972,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 122,
      "modified_text": "340 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66246ff49ed29ea9bb2bf122",
      "name": "S\u0105d Rejonowy w Jeleniej Gorze  POLAND",
      "description": "Przechowywania lub dost\u0119pu do plik\u00f3w cookies w Twojej przegl\u0105darce\nhttps://www.virustotal.com/gui/domain/jelenia-gora.sr.gov.pl/relations",
      "modified": "2025-05-14T21:18:36.989000",
      "created": "2024-04-21T01:46:28.554000",
      "tags": [
        "jeleniej grze",
        "aktualnoci",
        "informacje",
        "jednostka",
        "rejonowy",
        "konkurs",
        "najczciej",
        "sd rejonowy",
        "przejd",
        "czytaj",
        "click",
        "sdzia jarosaw",
        "wydziau",
        "sdzia grzegorz",
        "katarzyna",
        "rudnicka dane",
        "kontaktowe sd",
        "jelenia gra",
        "mickiewicza",
        "zawarto",
        "html",
        "nazwa meta",
        "robotw",
        "telefon",
        "brak",
        "skala",
        "ua zgodna",
        "head body",
        "zasb",
        "cname",
        "kod odpowiedzi",
        "kodowanie treci",
        "wygasa",
        "gmt serwer",
        "pragma",
        "kontrola pamici",
        "podrcznej",
        "data",
        "gmt kontrola",
        "dostpuzezwl na",
        "czytaj wicej",
        "sd okrgowy",
        "jednostki",
        "okrgowy",
        "ogoszenia",
        "sha256",
        "vhash",
        "ssdeep",
        "https odcisk",
        "palca jarma",
        "https dane",
        "v3 numer",
        "odcisk palca",
        "tworzy katalog",
        "tworzy pliki",
        "typ pliku",
        "json",
        "ascii",
        "windows",
        "sqlite",
        "foxpro fpt",
        "links typ",
        "mapa",
        "152 x",
        "sqlite w",
        "sha1",
        "sha512",
        "file size",
        "b file",
        "testing",
        "komornik sdowy",
        "sdzie rejonowym",
        "tomasz rodacki",
        "obwieszczenie",
        "komornicze",
        "tumacza migam",
        "tumacz czynny",
        "zamknite",
        "wiadczenia",
        "schedule",
        "error",
        "javascript",
        "bakers hall",
        "ixaction",
        "script",
        "ixchatlauncher",
        "compatibility",
        "com dla",
        "t1055 pewno",
        "unikanie obrony",
        "t1036 maskarada",
        "t1082 pewno",
        "informacje o",
        "nazwa pliku",
        "dokument pdf",
        "rozmiar pliku",
        "zapowied",
        "type",
        "iii dbt",
        "utf8",
        "dziennik"
      ],
      "references": [
        "S?d Rejonowy w Jeleniej G\u00f3rze.htm",
        "II Wydzia? Karny - S?d Rejonowy w Jeleniej G\u00f3rze 1.htm",
        "http://www.jelenia-gora.so.gov.pl/",
        "https://www.jelenia-gora.so.gov.pl/",
        "http://www.jelenia-gora.sr.gov.pl/ogloszenia-komornicze",
        "https://tlumacz.migam.org/sad_rejonowy_jelenia_gora",
        "https://www.jelenia-gora.sr.gov.pl/spacer",
        "https://waf.intelix.pl/957476/Chat/Script/Compatibility"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "",
          "display_name": "",
          "target": null
        },
        {
          "id": "serwer",
          "display_name": "serwer",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 24,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "email": 71,
        "domain": 7651,
        "hostname": 7680,
        "IPv4": 331,
        "FileHash-SHA256": 16168,
        "URL": 10399,
        "FileHash-MD5": 3639,
        "FileHash-SHA1": 3468,
        "CIDR": 4,
        "CVE": 89,
        "YARA": 521,
        "SSLCertFingerprint": 25,
        "JA3": 1,
        "IPv6": 5813
      },
      "indicator_count": 55860,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "340 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6647908c09468f42bc1249f1",
      "name": "University of Alberta Azure/Entra Compromised Tenant Compromized Institution",
      "description": "Update: Academic/Non-Academic Staff Unions, 3rd party org, & some profs/students/alumni tried raising concerns to Admins/President/IST & CISO => Maintaining position they will not be looking into reported problems re: Cybersecurity under any circumstances = more time more problems? Attempts to advocate -> Harrass./Discrim./De-humanizing responses from admins (representing all folks - recorded). \nTenant ID: 718b8a9b-44d8-441a-a344-4294ea842172 = This pulse is 1 example (small) of problems.\n\nPrimary domain\nualbertaca.onmicrosoft.com\nCustom Domain Names\nualberta.ca\nVerified\nualbertaca.onmicrosoft.com",
      "modified": "2025-03-01T04:59:57.222000",
      "created": "2024-05-17T17:14:52.317000",
      "tags": [
        "false",
        "true",
        "visible",
        "application",
        "microsoft teams",
        "microsoft azure",
        "office",
        "service",
        "dynamics",
        "hidden",
        "android",
        "explorer",
        "write",
        "connector",
        "test",
        "sharepoint",
        "live",
        "meister",
        "tools",
        "desktop",
        "spark",
        "front",
        "enterprise",
        "designer",
        "atlas",
        "premium",
        "assistant",
        "allow",
        "azureadmyorg",
        "game",
        "verify",
        "microsoft power",
        "channelsurfcli",
        "mtd1",
        "file transfer",
        "magnus",
        "microsoft crm",
        "youth"
      ],
      "references": [
        "All - EnterpriseAppsList.csv",
        "AppRegistrationList.csv",
        "https://tria.ge/240517-vc7c1shc62/behavioral1",
        "https://tria.ge/240517-vdwb5shc71/behavioral1",
        "https://tria.ge/240517-vqxezaaa33/behavioral1",
        "https://tria.ge/240517-t9pc2ahb2t",
        "https://www.virustotal.com/graph/embed/g9453a2f58a3340f18120987c2b4d710dbb44ded88c434abf8894458a98c7bd4b?theme=dark",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/iocs",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/graph",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/summary",
        "https://www.filescan.io/uploads/66479b483313f70f0afe3dbb",
        "https://www.filescan.io/uploads/664799c9d5c40bffee6106d7",
        "Thor Scan: S-I9VvMTB6cZU",
        "https://www.filescan.io/uploads/664ba368d5c40bffee63b1ee/reports/31817751-6b5d-45df-8813-472aa6c756a3/overview",
        "https://www.filescan.io/uploads/664ba8a20663ff3c2ec6428a/reports/09d3d82a-7ec1-4804-93e5-5ae691fbb7f2/overview",
        "https://imp0rtp3.wordpress.com/2021/08/12/tetris/",
        "https://www.filescan.io/uploads/664bb0cd7c9fb1468fc610c5/reports/00c78e4d-2156-4906-a106-ebf7e2723251/overview",
        "https://www.filescan.io/uploads/664bb40fbc04dffa92240ca2/reports/398074f2-c7b6-40e9-9b5c-4225cc990473/overview",
        "https://www.filescan.io/uploads/664bb683bc04dffa92241015/reports/92b70fd6-97d7-4386-8465-f3fd79043843/overview",
        "https://tria.ge/240521-q4s79agb25/static1",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906322f5af13cdfb50be",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906222f5af13cdfb5093",
        "https://www.filescan.io/uploads/666d69ff6b8dba248b414767/reports/dda2c8a1-96fd-4c00-9cbc-c64c4685a804/overview",
        "https://www.filescan.io/uploads/666d69ff6b8dba248b414767",
        "https://viz.greynoise.io/analysis/33e9b33b-b932-4c43-9be1-3e2d6f9cb4b3",
        "https://viz.greynoise.io/analysis/e51d9a15-d802-4d51-9a70-17803dc2693a",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b",
        "Above Malcore Strings: All - EnterpriseAppsList, AppRegistration, EnterpriseAppslist, exportGroup, exportUsers, HiddenApps - EnterpriseAppsList****",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00975ea31558d54fceea",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cff1a5ea31558d54fcbf6",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d0107b44401771de9ebf2",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00356dd8f43b723a915a",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cffec5ea31558d54fcda2",
        "https://www.hudsonrock.com/search?domain=ualberta.ca",
        "https://www.criminalip.io/domain/report?scan_id=13798622",
        "https://viz.greynoise.io/analysis/9635144c-db8f-47ab-a83a-5785602244cf - 07.03.24",
        "https://urlscan.io/search/#ualberta.ca",
        "https://www.virustotal.com/gui/collection/0ca12fcdd125ec5a5055180ee828b98d47b8b2e920660be559c2b602266b6b1d/iocs",
        "https://sitereport.netcraft.com/?url=http://ualberta.ca",
        "https://www.wordfence.com/blog/2022/10/threat-advisory-monitoring-cve-2022-42889-text4shell-exploit-attempts/",
        "https://tenantresolution.pingcastle.com/Search - Tenant still active (07.19.24) - Good jobs ya'll",
        "https://www.virustotal.com/graph/embed/gf1d5aa209c7f4fd086e4cb17dcd0af52421ea4bae87d49fe9b4076b382612f0e?theme=dark",
        "https://viz.greynoise.io/query/AS36351%20classification:%22malicious%22",
        "https://viz.greynoise.io/query/AS60068%20classification:%22malicious%22",
        "https://viz.greynoise.io/query/AS8075%20classification:%22malicious%22",
        "https://viz.greynoise.io/query/AS15169%20classification:%22malicious%22",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b - https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b = Hidden Apps - Enterprise Apps List"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Canada"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Education",
        "Technology",
        "Healthcare",
        "Telecommunications",
        "Government"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 25,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 7,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1703,
        "FileHash-SHA256": 90472,
        "URL": 99185,
        "domain": 82954,
        "hostname": 39041,
        "FileHash-SHA1": 1624,
        "email": 4658,
        "CVE": 12
      },
      "indicator_count": 319649,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "414 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "663d2869e0f3a42bbddc42ff",
      "name": "UPX executable packer.",
      "description": "A new rule has been introduced  a \"suspicious\" ELF binary that is packed with the UPX executable packer.\nSuggested ATT&CK IDs: rule SUSP_ELF_LNX_UPX_Compressed_File { meta: description = \"Detects a suspicious ELF binary with UPX compression\" author = \"Florian Roth (Nextron Systems)\" reference = \"Internal Research\" date = \"2018-12-12\" score = 40 hash1 = \"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4\" id = \"078937de-59b3-538e-a5c3-57f4e6050212\" strings: $s1 = \"PROT_EXEC|PROT_WRITE failed.\" fullword ascii $s2 = \"$Id: UPX\" fullword ascii $s3 = \"$Info: This file is packed with the UPX executable packer\" ascii $fp1 = \"check your UCL installation !\"",
      "modified": "2024-10-14T00:01:17.069000",
      "created": "2024-05-09T19:47:53.786000",
      "tags": [
        "cioch adrian",
        "centrum usug",
        "sieciowych",
        "elf binary",
        "upx compression",
        "roth",
        "nextron",
        "info",
        "javascript",
        "html",
        "office open",
        "xml document",
        "network capture",
        "win32 exe",
        "xml pakietu",
        "pdf zestawy",
        "przechwytywanie",
        "office",
        "filehashsha1",
        "url https",
        "cve cve20201070",
        "cve cve20203153",
        "cve cve20201048",
        "cve cve20211732",
        "cve20201048 apr",
        "filehashmd5",
        "cve cve20010901",
        "cve cve20021841",
        "cve20153202 apr",
        "cve cve20160728",
        "cve cve20161807",
        "cve cve20175123",
        "cve20185407 apr",
        "cve cve20054605",
        "cve cve20060745",
        "cve cve20070452",
        "cve cve20070453",
        "cve cve20070454",
        "cve cve20071355",
        "cve cve20071358",
        "cve cve20071871",
        "cve20149614 apr",
        "cve cve20151503",
        "cve cve20152080",
        "cve cve20157377",
        "cve cve20170131",
        "cve20200796 may",
        "cve cve20113403"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 6861,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 5771,
        "domain": 3139,
        "URL": 14525,
        "FileHash-SHA1": 2610,
        "IPv4": 108,
        "CIDR": 40,
        "FileHash-SHA256": 10705,
        "FileHash-MD5": 3373,
        "YARA": 2,
        "CVE": 148,
        "Mutex": 7,
        "FilePath": 3,
        "SSLCertFingerprint": 3,
        "email": 23,
        "JA3": 1,
        "IPv6": 2
      },
      "indicator_count": 40460,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "552 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "657096b22a51f1cc56dcfb53",
      "name": "172.217.16.232 BT home router network attack 10th May 2022 - those HTTP headers and JS scripts are taking over the world",
      "description": "",
      "modified": "2023-12-06T15:43:46.083000",
      "created": "2023-12-06T15:43:46.083000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 802,
        "hostname": 392,
        "domain": 134,
        "FileHash-SHA256": 82,
        "FileHash-MD5": 1
      },
      "indicator_count": 1411,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708eb824dc4c51811f6de9",
      "name": "Indusface  - in YOUR face ;)",
      "description": "",
      "modified": "2023-12-06T15:09:44.273000",
      "created": "2023-12-06T15:09:44.273000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 307,
        "hostname": 333,
        "domain": 192,
        "URL": 1143,
        "FileHash-MD5": 1
      },
      "indicator_count": 1976,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708e0d95a8c74cc715f7a2",
      "name": "West.cn",
      "description": "",
      "modified": "2023-12-06T15:06:53.350000",
      "created": "2023-12-06T15:06:53.350000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 208,
        "domain": 533,
        "hostname": 757,
        "URL": 1861,
        "FileHash-MD5": 1
      },
      "indicator_count": 3360,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://e.event.target",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://e.event.target",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776638966.1142414
}