{
  "type": "URL",
  "indicator": "https://f.config.doc.documentelement.style",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://f.config.doc.documentelement.style",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3188102134,
      "indicator": "https://f.config.doc.documentelement.style",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 41,
      "pulses": [
        {
          "id": "69a3c685d4b7c139ffe62930",
          "name": "Clone Pulse Reference",
          "description": "",
          "modified": "2026-04-01T00:44:45.494000",
          "created": "2026-03-01T04:54:29.384000",
          "tags": [
            "ipv4",
            "active related",
            "trojandropper",
            "mtb jun",
            "lowfi",
            "trojan",
            "mtb jan",
            "fastly error",
            "please",
            "united",
            "ttl value",
            "get na",
            "total",
            "delete",
            "search",
            "yara detections",
            "sinkhole cookie",
            "value snkz",
            "write",
            "suspicious",
            "ransom",
            "malware",
            "Ransom.Win32.Birele.gsg Checkin",
            "AnubisNetworks Sinkhole Cookie Value Snkz",
            "Possible Compromised Host",
            "dynamicloader",
            "delete c",
            "default",
            "medium",
            "write c",
            "settingswpad",
            "intel",
            "ms windows",
            "users",
            "number",
            "title",
            "installer",
            "top source",
            "top destination",
            "source source",
            "port",
            "filehash",
            "av detections",
            "ids detections",
            "yara rule",
            "gravityrat",
            "detectvm",
            "x00 x00",
            "x00x00",
            "doviacmd",
            "rootjob",
            "getfiles",
            "updateserver",
            "ethernetid",
            "ids signatures",
            "exploits",
            "sid name",
            "malware cve",
            "dns query",
            "dnsbin demo",
            "data exfil",
            "exif data",
            "DNS Query for Webhook/HTTP Request Inspection Service (x .pipedr",
            "DNSBin Demo (requestbin .net) - Data Exfitration",
            "source port",
            "destination",
            "present sep",
            "script urls",
            "script script",
            "a domains",
            "script domains",
            "ip address",
            "meta",
            "present nov",
            "passive dns",
            "next associated",
            "domain add",
            "pe executable",
            "entries",
            "show",
            "msie",
            "windows nt",
            "wow64",
            "copy",
            "present jan",
            "present feb",
            "domain",
            "pulse pulses",
            "urls",
            "files",
            "tam legal",
            "christopher ahmann",
            "https://unicef.se/assets/apple",
            "treece alfrey",
            "hours ago",
            "information",
            "report spam",
            "ahmann colorado",
            "state",
            "special cousel",
            "created",
            "expiro",
            "capture"
          ],
          "references": [
            "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
            "Fastly Error and Palantir blocked several times over the last few months.",
            "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
            "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
            "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
            "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
            "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
            "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
            "https://unicef.se/assets/apple"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/Neconyd.A",
              "display_name": "Trojan:Win32/Neconyd.A",
              "target": "/malware/Trojan:Win32/Neconyd.A"
            },
            {
              "id": "PWS:Win32/QQpass.FC",
              "display_name": "PWS:Win32/QQpass.FC",
              "target": "/malware/PWS:Win32/QQpass.FC"
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "Win.Malware.Urelas-9863836-0",
              "display_name": "Win.Malware.Urelas-9863836-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "target": null
            },
            {
              "id": "Win.Trojan.Vundo-7170412-0",
              "display_name": "Win.Trojan.Vundo-7170412-0",
              "target": null
            },
            {
              "id": "#Lowfi:SuspiciousSectionName",
              "display_name": "#Lowfi:SuspiciousSectionName",
              "target": null
            },
            {
              "id": "Multiple Malware\u2019s , Trojans and Rats",
              "display_name": "Multiple Malware\u2019s , Trojans and Rats",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6906bd99cadbd4140014c6af",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 909,
            "domain": 454,
            "hostname": 1404,
            "URL": 3557,
            "CIDR": 1,
            "FileHash-MD5": 242,
            "FileHash-SHA1": 185,
            "email": 1,
            "CVE": 1
          },
          "indicator_count": 6754,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "18 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6963596c4cd594b77b4675ec",
          "name": "Project Cicada-.Christopher \u201cBuzz\u201d Ahmann - PalantirFoundry | The State of Colorado | ",
          "description": "",
          "modified": "2026-02-10T06:05:39.764000",
          "created": "2026-01-11T08:03:56.534000",
          "tags": [
            "colorado state",
            "freeman mathis",
            "history",
            "cyber risk",
            "aspen insureds",
            "gaig insureds",
            "landy insureds",
            "nip group",
            "purm insureds",
            "overview core",
            "united",
            "ip address",
            "present nov",
            "present may",
            "moved",
            "encrypt",
            "unknown",
            "backdoor",
            "passive dns",
            "ransom",
            "checkin",
            "trojandropper",
            "mtb nov",
            "twitter",
            "trojan",
            "data upload",
            "extraction",
            "failed",
            "united states",
            "server response",
            "google safe",
            "results may",
            "lowfi",
            "virtool",
            "mtb alf",
            "mh alf",
            "port",
            "windows nt",
            "destination",
            "msie",
            "khtml",
            "gecko",
            "unknown aaaa",
            "a domains",
            "meta",
            "for privacy",
            "cop supply",
            "urls",
            "as139646 hong",
            "hostname",
            "files",
            "hong kong",
            "domain add",
            "ip related",
            "hash avast",
            "avg clamav",
            "msdefender may",
            "ddos",
            "as13335",
            "ipv4",
            "certificate",
            "hostname add",
            "url analysis",
            "files ip",
            "name strings",
            "category",
            "united states",
            "pulse indicator",
            "address",
            "error",
            "null",
            "object",
            "string",
            "number",
            "google maps",
            "promise",
            "javascript api",
            "dataset",
            "bigint",
            "dark",
            "android",
            "infinity",
            "internal",
            "roboto",
            "trident",
            "void",
            "small",
            "lightrail",
            "false",
            "span",
            "close",
            "light",
            "hybrid",
            "embed",
            "iframe",
            "keygen",
            "this",
            "february",
            "bounce",
            "drop",
            "inside",
            "outside",
            "marker",
            "present dec",
            "pulses otx",
            "aaaa",
            "asnone country",
            "record value",
            "title",
            "pulse pulses",
            "pulses",
            "showing",
            "unknown cname",
            "unknown soa",
            "next associated",
            "ipv4 add",
            "cycbot",
            "extract indic",
            "sneaker bots",
            "proxies data",
            "script script",
            "adult content",
            "nextimage",
            "porn site",
            "div div",
            "platform make",
            "cloudfront x",
            "hio52 p3",
            "unknown ns",
            "pulse submit",
            "title error",
            "reverse dns",
            "status",
            "servers",
            "name servers",
            "vashti hostname",
            "scan endpoints",
            "url http",
            "http",
            "files domain",
            "files related",
            "pulses none",
            "dnssec",
            "sec ch",
            "ch ua",
            "ua full",
            "ua platform",
            "ua bitness",
            "ua arch",
            "version sec",
            "mobile sec",
            "model sec",
            "version list",
            "domain",
            "emails",
            "cookie",
            "url https",
            "show",
            "filehash",
            "urls show",
            "date checked",
            "url hostname",
            "results nov",
            "win32",
            "type",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "ssl certificate",
            "defense evasion",
            "spawns",
            "flag",
            "llc name",
            "server",
            "markmonitor",
            "name server",
            "windir",
            "openurl c",
            "prefetch2",
            "show technique",
            "mitre att",
            "ck matrix",
            "pattern match",
            "ascii text",
            "sha1",
            "href",
            "show process",
            "file",
            "general",
            "local",
            "path",
            "germany unknown",
            "date",
            "registrar",
            "ip whois",
            "dynamicloader",
            "high",
            "medium",
            "search",
            "displayname",
            "tofsee",
            "win64",
            "write",
            "stream",
            "malware",
            "push",
            "entries",
            "tls handshake",
            "failure",
            "forbidden",
            "tlsv1",
            "april",
            "next",
            "write c",
            "intel",
            "ms windows",
            "sha1 add",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "sha256 add",
            "present jun",
            "present mar",
            "medelln",
            "colombia asn",
            "dns resolutions",
            "address domain",
            "related tags",
            "none google",
            "safe browsing",
            "external",
            "present sep",
            "present aug",
            "as54113",
            "present jul",
            "as8068",
            "gmt content",
            "total",
            "read",
            "delete",
            "top source",
            "quasi",
            "murderers",
            "christopher ahmann",
            "buzz ahmann",
            "wow64",
            "slcc2",
            "media center",
            "labor",
            "employment",
            "cdle",
            "dowc",
            "colorado",
            "workers",
            "coloradoif",
            "independent",
            "state",
            "company",
            "entity type",
            "authorized line",
            "analysis",
            "tor analysis",
            "process details",
            "network traffic",
            "t1071",
            "potential ip",
            "click",
            "found",
            "t1480 execution",
            "bad traffic",
            "et info",
            "ck techniques",
            "evasion att",
            "t1057",
            "refresh",
            "body",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "cname",
            "form",
            "pulse",
            "script domains",
            "script urls",
            "administrator",
            "services llc",
            "dns admin",
            "domain admin",
            "global llc",
            "domain manager",
            "computer system",
            "ltd domain",
            "network",
            "alibaba",
            "facebook",
            "phishme",
            "sogou",
            "present jan",
            "present feb",
            "present oct"
          ],
          "references": [
            "https://www.fmglaw.com/lawyers/christopher-ahmann - found in adult content pulse.",
            "Sneaker Bots Proxies Servers Cook Groups Cop Supply",
            "archive.cop.supply \u2022 dev.cop.supply \u2022 https://cop.supply/ \u2022 https://cop.supply/bot-lists/",
            "https://cop.supply/supreme-bots/\u2022 https://cop.supply/useful-tools/",
            "https://cop.supply/proxies-lists/ \u2022 https://cop.supply/shopify-bots/",
            "dns.army \u2022 www.dcopr.dns.army  \u2022 www.glsyaiwjj.dns.army \u2022  www.wgmvk.dns.army",
            "https://maps.googleapis.com/maps/api/js?sensor=false",
            "cell-0.af-south-1.prod.telemetry.console.api.aws",
            "howtoworkacrickoutofyourneck2.pages.dev",
            "firebase-auth-eich0v.pages.dev",
            "http://ianswertomom.com/develop-wise-woman-within-yourself",
            "http://ianswertomom.com/bible-verses-struggling-contentment-mom/  I",
            "https://i-want-to-start-an-onlyfans.pages.dev/favicon.ico| I bet you do boo boo",
            "makeapornsite.com \u2022 https://pornhighschool.com/ \u2022 https://ethnicerotic.com \u2022 https://twitter.com/Make",
            "https://khmerpornvideo.signup0.y.id/",
            "https://lordseriala.life/6337-zvezdnye-vojny-opornaja-komanda.html",
            "https://clear.ml/infrastructure-control-plane",
            "dev-app.project-cicada.com \u2022 http://dev-app.project-cicada.com \u2022 https://dev-app.project-cicada.com (2014 report predates 2016 reports)",
            "https://amano.inboundtools.com/tpcontact  URL https://armg.inboundtools.com/  URL https://gaiax.inboundtools.com/internship  URL https://hmk.inboundtools.com/  URL https://hmk.inboundtools.com/form/assetview_siryo_sier",
            "https://download.clear.ml/cpython_builds/releases/ \u2022 https://download.clear.",
            "https://links.mail.samsara.com/s/c/P9R6gGlExR4nfCwqwJXUmr7NmKcMNde4ZBhCFprlVtsFNgh-4tuTWla0aXN9rIWCjrWtn0Vln7x-hexxVBlY3xxvnEevR8qJU5G5xV3__wo-X7kkpSOhJVfejac-Xk8qu6zs5Z-tILwWYRkNScZNGlAqfwQuJuRw5M-n_ZKI6tuY5XGCZAqWoQepi1NnJiW4wZJkzZlOwGtNkusbuKDcMsLVrrhji2eKh4kYgrJp_SeycJRhasLFCQ3c2bPu4sahEWpcHZrQBaxvdfQgTEno8kV-RJdTDO0zK5MyWDJLeds7mnaDrxlb0O2zmhebUdlHE0R0xHi25dympBUpMlLsQV8bx1WUTOfgK4k0ci9o_2Gbfe22-jLxsJN-msV6pxWYQMaxRNFd4iZRC9J9Z1SC5MBqbvNzqdt98kFdpibnv_QIHdhFyHOR_Ip_LX67Dncc8V8OvAi-H5phfeSyDzwdzf2FQIi82",
            "https://voidpet.io/invite/scaredscared/1rpzxWXa61 \u2022 https://sex-doggy.net/tag/censored",
            "Everyone has simply asked you alll to stop. Target never asked anyone for money.",
            "Legal court documented  agreement to allow and pay target to hire cyber investigators",
            "Attacks are being carried out by The State of Colorado"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan",
            "France",
            "Ireland",
            "Spain",
            "Italy",
            "Aruba",
            "Australia",
            "Denmark",
            "United Kingdom of Great Britain and Northern Ireland",
            "Germany",
            "T\u00fcrkiye",
            "Indonesia"
          ],
          "malware_families": [
            {
              "id": "Win.Trojan.GravityRAT-6511862-0",
              "display_name": "Win.Trojan.GravityRAT-6511862-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "target": null
            },
            {
              "id": "Unix.Trojan.Tsunami-6981155-0",
              "display_name": "Unix.Trojan.Tsunami-6981155-0",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/Systex.A",
              "display_name": "TrojanDropper:Win32/Systex.A",
              "target": "/malware/TrojanDropper:Win32/Systex.A"
            },
            {
              "id": "Win.Trojan.Tepfer-61",
              "display_name": "Win.Trojan.Tepfer-61",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/CutwailRansom:Win32/Crowti.A",
              "display_name": "TrojanDownloader:Win32/CutwailRansom:Win32/Crowti.A",
              "target": null
            },
            {
              "id": "VirTool:Win32/VBInject.gen!MH",
              "display_name": "VirTool:Win32/VBInject.gen!MH",
              "target": "/malware/VirTool:Win32/VBInject.gen!MH"
            },
            {
              "id": "ALF:NID:Susp_NSIS_Stub.A",
              "display_name": "ALF:NID:Susp_NSIS_Stub.A",
              "target": null
            },
            {
              "id": "#LOWFI:HSTR:Criakl.B1",
              "display_name": "#LOWFI:HSTR:Criakl.B1",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Arwobot.B",
              "display_name": "Backdoor:Win32/Arwobot.B",
              "target": "/malware/Backdoor:Win32/Arwobot.B"
            },
            {
              "id": "Win.Packed.Bandook-9882274-1",
              "display_name": "Win.Packed.Bandook-9882274-1",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail",
              "display_name": "TrojanDownloader:Win32/Cutwail",
              "target": "/malware/TrojanDownloader:Win32/Cutwail"
            },
            {
              "id": "Win.Downloader.Small-4507",
              "display_name": "Win.Downloader.Small-4507",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "Win.Malware.Mikey-9949492-0",
              "display_name": "Win.Malware.Mikey-9949492-0",
              "target": null
            },
            {
              "id": "Ransom:Win32/Crowti.A",
              "display_name": "Ransom:Win32/Crowti.A",
              "target": "/malware/Ransom:Win32/Crowti.A"
            },
            {
              "id": "Backdoor:Linux/DemonBot.Aa!MTB",
              "display_name": "Backdoor:Linux/DemonBot.Aa!MTB",
              "target": "/malware/Backdoor:Linux/DemonBot.Aa!MTB"
            },
            {
              "id": "Unix.Trojan.Gafgyt-6981154-0",
              "display_name": "Unix.Trojan.Gafgyt-6981154-0",
              "target": null
            },
            {
              "id": "DDOS:Linux/Gafgyt.YA!MTB",
              "display_name": "DDOS:Linux/Gafgyt.YA!MTB",
              "target": "/malware/DDOS:Linux/Gafgyt.YA!MTB"
            },
            {
              "id": "CVE-2017-11882",
              "display_name": "CVE-2017-11882",
              "target": null
            },
            {
              "id": "ALF:Exploit:O97M/CVE-2017-8977",
              "display_name": "ALF:Exploit:O97M/CVE-2017-8977",
              "target": null
            },
            {
              "id": "Cycbot",
              "display_name": "Cycbot",
              "target": null
            },
            {
              "id": "Win32:BotX-gen\\ [Trj]",
              "display_name": "Win32:BotX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "Mirai (ELF)",
              "display_name": "Mirai (ELF)",
              "target": null
            },
            {
              "id": "Worm",
              "display_name": "Worm",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1204.001",
              "name": "Malicious Link",
              "display_name": "T1204.001 - Malicious Link"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1574.008",
              "name": "Path Interception by Search Order Hijacking",
              "display_name": "T1574.008 - Path Interception by Search Order Hijacking"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1593.002",
              "name": "Search Engines",
              "display_name": "T1593.002 - Search Engines"
            }
          ],
          "industries": [
            "Insurance",
            "Construction"
          ],
          "TLP": "green",
          "cloned_from": "693cdc5b8ebc10664439c2fb",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 54118,
            "domain": 11153,
            "hostname": 18578,
            "email": 21,
            "FileHash-SHA256": 4905,
            "FileHash-MD5": 548,
            "FileHash-SHA1": 534,
            "CVE": 7,
            "SSLCertFingerprint": 20,
            "CIDR": 1
          },
          "indicator_count": 89885,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "68 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "693cdc5b8ebc10664439c2fb",
          "name": "Project Cicada-.Christopher \u201cBuzz\u201d Ahmann - Freeman Mathis & Gary for The State of Colorado",
          "description": "State of Colorado attackers use  DGA domains set up multiple Law Firms.. Christopher P.  \u2019Buzz\u2019  Ahmann  Is a legal consultant / attorney./ hacker \nWorks for the State of Colorado/ quasi. Is malicious and doesn\u2019t work alone. Continues to target \nState had relative contacted by a fake entity \u2018Goodness Health\u2019\nLeft vague VM for relative message \u201cWe work on the Medicare side of things.\u201d and? \nSocial engineering call , malicious domain. The State of Colorado has been on a relentless pursuit against target. Fully compromised targets relatives brand new phone. Hacked target since 10/2013.\nMultiple cyber and physical attacks carried out  against target and family members.. There are attacks make  to look like accidents or malfunctions. This harmful, silencing behavior is somehow illegal for anyone else.",
          "modified": "2026-02-10T06:05:39.764000",
          "created": "2025-12-13T03:24:11.414000",
          "tags": [
            "colorado state",
            "freeman mathis",
            "history",
            "cyber risk",
            "aspen insureds",
            "gaig insureds",
            "landy insureds",
            "nip group",
            "purm insureds",
            "overview core",
            "united",
            "ip address",
            "present nov",
            "present may",
            "moved",
            "encrypt",
            "unknown",
            "backdoor",
            "passive dns",
            "ransom",
            "checkin",
            "trojandropper",
            "mtb nov",
            "twitter",
            "trojan",
            "data upload",
            "extraction",
            "failed",
            "united states",
            "server response",
            "google safe",
            "results may",
            "lowfi",
            "virtool",
            "mtb alf",
            "mh alf",
            "port",
            "windows nt",
            "destination",
            "msie",
            "khtml",
            "gecko",
            "unknown aaaa",
            "a domains",
            "meta",
            "for privacy",
            "cop supply",
            "urls",
            "as139646 hong",
            "hostname",
            "files",
            "hong kong",
            "domain add",
            "ip related",
            "hash avast",
            "avg clamav",
            "msdefender may",
            "ddos",
            "as13335",
            "ipv4",
            "certificate",
            "hostname add",
            "url analysis",
            "files ip",
            "name strings",
            "category",
            "united states",
            "pulse indicator",
            "address",
            "error",
            "null",
            "object",
            "string",
            "number",
            "google maps",
            "promise",
            "javascript api",
            "dataset",
            "bigint",
            "dark",
            "android",
            "infinity",
            "internal",
            "roboto",
            "trident",
            "void",
            "small",
            "lightrail",
            "false",
            "span",
            "close",
            "light",
            "hybrid",
            "embed",
            "iframe",
            "keygen",
            "this",
            "february",
            "bounce",
            "drop",
            "inside",
            "outside",
            "marker",
            "present dec",
            "pulses otx",
            "aaaa",
            "asnone country",
            "record value",
            "title",
            "pulse pulses",
            "pulses",
            "showing",
            "unknown cname",
            "unknown soa",
            "next associated",
            "ipv4 add",
            "cycbot",
            "extract indic",
            "sneaker bots",
            "proxies data",
            "script script",
            "adult content",
            "nextimage",
            "porn site",
            "div div",
            "platform make",
            "cloudfront x",
            "hio52 p3",
            "unknown ns",
            "pulse submit",
            "title error",
            "reverse dns",
            "status",
            "servers",
            "name servers",
            "vashti hostname",
            "scan endpoints",
            "url http",
            "http",
            "files domain",
            "files related",
            "pulses none",
            "dnssec",
            "sec ch",
            "ch ua",
            "ua full",
            "ua platform",
            "ua bitness",
            "ua arch",
            "version sec",
            "mobile sec",
            "model sec",
            "version list",
            "domain",
            "emails",
            "cookie",
            "url https",
            "show",
            "filehash",
            "urls show",
            "date checked",
            "url hostname",
            "results nov",
            "win32",
            "type",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "ssl certificate",
            "defense evasion",
            "spawns",
            "flag",
            "llc name",
            "server",
            "markmonitor",
            "name server",
            "windir",
            "openurl c",
            "prefetch2",
            "show technique",
            "mitre att",
            "ck matrix",
            "pattern match",
            "ascii text",
            "sha1",
            "href",
            "show process",
            "file",
            "general",
            "local",
            "path",
            "germany unknown",
            "date",
            "registrar",
            "ip whois",
            "dynamicloader",
            "high",
            "medium",
            "search",
            "displayname",
            "tofsee",
            "win64",
            "write",
            "stream",
            "malware",
            "push",
            "entries",
            "tls handshake",
            "failure",
            "forbidden",
            "tlsv1",
            "april",
            "next",
            "write c",
            "intel",
            "ms windows",
            "sha1 add",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "sha256 add",
            "present jun",
            "present mar",
            "medelln",
            "colombia asn",
            "dns resolutions",
            "address domain",
            "related tags",
            "none google",
            "safe browsing",
            "external",
            "present sep",
            "present aug",
            "as54113",
            "present jul",
            "as8068",
            "gmt content",
            "total",
            "read",
            "delete",
            "top source",
            "quasi",
            "murderers",
            "christopher ahmann",
            "buzz ahmann",
            "wow64",
            "slcc2",
            "media center",
            "labor",
            "employment",
            "cdle",
            "dowc",
            "colorado",
            "workers",
            "coloradoif",
            "independent",
            "state",
            "company",
            "entity type",
            "authorized line",
            "analysis",
            "tor analysis",
            "process details",
            "network traffic",
            "t1071",
            "potential ip",
            "click",
            "found",
            "t1480 execution",
            "bad traffic",
            "et info",
            "ck techniques",
            "evasion att",
            "t1057",
            "refresh",
            "body",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "cname",
            "form",
            "pulse",
            "script domains",
            "script urls",
            "administrator",
            "services llc",
            "dns admin",
            "domain admin",
            "global llc",
            "domain manager",
            "computer system",
            "ltd domain",
            "network",
            "alibaba",
            "facebook",
            "phishme",
            "sogou",
            "present jan",
            "present feb",
            "present oct"
          ],
          "references": [
            "https://www.fmglaw.com/lawyers/christopher-ahmann - found in adult content pulse.",
            "Sneaker Bots Proxies Servers Cook Groups Cop Supply",
            "archive.cop.supply \u2022 dev.cop.supply \u2022 https://cop.supply/ \u2022 https://cop.supply/bot-lists/",
            "https://cop.supply/supreme-bots/\u2022 https://cop.supply/useful-tools/",
            "https://cop.supply/proxies-lists/ \u2022 https://cop.supply/shopify-bots/",
            "dns.army \u2022 www.dcopr.dns.army  \u2022 www.glsyaiwjj.dns.army \u2022  www.wgmvk.dns.army",
            "https://maps.googleapis.com/maps/api/js?sensor=false",
            "cell-0.af-south-1.prod.telemetry.console.api.aws",
            "howtoworkacrickoutofyourneck2.pages.dev",
            "firebase-auth-eich0v.pages.dev",
            "http://ianswertomom.com/develop-wise-woman-within-yourself",
            "http://ianswertomom.com/bible-verses-struggling-contentment-mom/  I",
            "https://i-want-to-start-an-onlyfans.pages.dev/favicon.ico| I bet you do boo boo",
            "makeapornsite.com \u2022 https://pornhighschool.com/ \u2022 https://ethnicerotic.com \u2022 https://twitter.com/Make",
            "https://khmerpornvideo.signup0.y.id/",
            "https://lordseriala.life/6337-zvezdnye-vojny-opornaja-komanda.html",
            "https://clear.ml/infrastructure-control-plane",
            "dev-app.project-cicada.com \u2022 http://dev-app.project-cicada.com \u2022 https://dev-app.project-cicada.com (2014 report predates 2016 reports)",
            "https://amano.inboundtools.com/tpcontact  URL https://armg.inboundtools.com/  URL https://gaiax.inboundtools.com/internship  URL https://hmk.inboundtools.com/  URL https://hmk.inboundtools.com/form/assetview_siryo_sier",
            "https://download.clear.ml/cpython_builds/releases/ \u2022 https://download.clear.",
            "https://links.mail.samsara.com/s/c/P9R6gGlExR4nfCwqwJXUmr7NmKcMNde4ZBhCFprlVtsFNgh-4tuTWla0aXN9rIWCjrWtn0Vln7x-hexxVBlY3xxvnEevR8qJU5G5xV3__wo-X7kkpSOhJVfejac-Xk8qu6zs5Z-tILwWYRkNScZNGlAqfwQuJuRw5M-n_ZKI6tuY5XGCZAqWoQepi1NnJiW4wZJkzZlOwGtNkusbuKDcMsLVrrhji2eKh4kYgrJp_SeycJRhasLFCQ3c2bPu4sahEWpcHZrQBaxvdfQgTEno8kV-RJdTDO0zK5MyWDJLeds7mnaDrxlb0O2zmhebUdlHE0R0xHi25dympBUpMlLsQV8bx1WUTOfgK4k0ci9o_2Gbfe22-jLxsJN-msV6pxWYQMaxRNFd4iZRC9J9Z1SC5MBqbvNzqdt98kFdpibnv_QIHdhFyHOR_Ip_LX67Dncc8V8OvAi-H5phfeSyDzwdzf2FQIi82",
            "https://voidpet.io/invite/scaredscared/1rpzxWXa61 \u2022 https://sex-doggy.net/tag/censored",
            "Everyone has simply asked you alll to stop. Target never asked anyone for money.",
            "Legal court documented  agreement to allow and pay target to hire cyber investigators",
            "Attacks are being carried out by The State of Colorado"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan",
            "France",
            "Ireland",
            "Spain",
            "Italy",
            "Aruba",
            "Australia",
            "Denmark",
            "United Kingdom of Great Britain and Northern Ireland",
            "Germany",
            "T\u00fcrkiye",
            "Indonesia"
          ],
          "malware_families": [
            {
              "id": "Win.Trojan.GravityRAT-6511862-0",
              "display_name": "Win.Trojan.GravityRAT-6511862-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "target": null
            },
            {
              "id": "Unix.Trojan.Tsunami-6981155-0",
              "display_name": "Unix.Trojan.Tsunami-6981155-0",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/Systex.A",
              "display_name": "TrojanDropper:Win32/Systex.A",
              "target": "/malware/TrojanDropper:Win32/Systex.A"
            },
            {
              "id": "Win.Trojan.Tepfer-61",
              "display_name": "Win.Trojan.Tepfer-61",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/CutwailRansom:Win32/Crowti.A",
              "display_name": "TrojanDownloader:Win32/CutwailRansom:Win32/Crowti.A",
              "target": null
            },
            {
              "id": "VirTool:Win32/VBInject.gen!MH",
              "display_name": "VirTool:Win32/VBInject.gen!MH",
              "target": "/malware/VirTool:Win32/VBInject.gen!MH"
            },
            {
              "id": "ALF:NID:Susp_NSIS_Stub.A",
              "display_name": "ALF:NID:Susp_NSIS_Stub.A",
              "target": null
            },
            {
              "id": "#LOWFI:HSTR:Criakl.B1",
              "display_name": "#LOWFI:HSTR:Criakl.B1",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Arwobot.B",
              "display_name": "Backdoor:Win32/Arwobot.B",
              "target": "/malware/Backdoor:Win32/Arwobot.B"
            },
            {
              "id": "Win.Packed.Bandook-9882274-1",
              "display_name": "Win.Packed.Bandook-9882274-1",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail",
              "display_name": "TrojanDownloader:Win32/Cutwail",
              "target": "/malware/TrojanDownloader:Win32/Cutwail"
            },
            {
              "id": "Win.Downloader.Small-4507",
              "display_name": "Win.Downloader.Small-4507",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "Win.Malware.Mikey-9949492-0",
              "display_name": "Win.Malware.Mikey-9949492-0",
              "target": null
            },
            {
              "id": "Ransom:Win32/Crowti.A",
              "display_name": "Ransom:Win32/Crowti.A",
              "target": "/malware/Ransom:Win32/Crowti.A"
            },
            {
              "id": "Backdoor:Linux/DemonBot.Aa!MTB",
              "display_name": "Backdoor:Linux/DemonBot.Aa!MTB",
              "target": "/malware/Backdoor:Linux/DemonBot.Aa!MTB"
            },
            {
              "id": "Unix.Trojan.Gafgyt-6981154-0",
              "display_name": "Unix.Trojan.Gafgyt-6981154-0",
              "target": null
            },
            {
              "id": "DDOS:Linux/Gafgyt.YA!MTB",
              "display_name": "DDOS:Linux/Gafgyt.YA!MTB",
              "target": "/malware/DDOS:Linux/Gafgyt.YA!MTB"
            },
            {
              "id": "CVE-2017-11882",
              "display_name": "CVE-2017-11882",
              "target": null
            },
            {
              "id": "ALF:Exploit:O97M/CVE-2017-8977",
              "display_name": "ALF:Exploit:O97M/CVE-2017-8977",
              "target": null
            },
            {
              "id": "Cycbot",
              "display_name": "Cycbot",
              "target": null
            },
            {
              "id": "Win32:BotX-gen\\ [Trj]",
              "display_name": "Win32:BotX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "Mirai (ELF)",
              "display_name": "Mirai (ELF)",
              "target": null
            },
            {
              "id": "Worm",
              "display_name": "Worm",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1204.001",
              "name": "Malicious Link",
              "display_name": "T1204.001 - Malicious Link"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1574.008",
              "name": "Path Interception by Search Order Hijacking",
              "display_name": "T1574.008 - Path Interception by Search Order Hijacking"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1593.002",
              "name": "Search Engines",
              "display_name": "T1593.002 - Search Engines"
            }
          ],
          "industries": [
            "Insurance",
            "Construction"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 54118,
            "domain": 11153,
            "hostname": 18578,
            "email": 21,
            "FileHash-SHA256": 4905,
            "FileHash-MD5": 548,
            "FileHash-SHA1": 534,
            "CVE": 7,
            "SSLCertFingerprint": 20,
            "CIDR": 1
          },
          "indicator_count": 89885,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "68 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6906bd99cadbd4140014c6af",
          "name": "Espionage - Gravity RAT + | Legal entities are State owned.  Attacking severely injured  PT\u2019s SA victim.",
          "description": "Fastly CDN for Palantir (Verizon) unless updated.  Very malicious IoC\u2019s found evaluating IoC\u2019 from Christopher Ahmann - TAM Legal link.\n- Made contact with victim several times.\n- Illegal contact made with attorneys considering representing Tsara. \n- https://unicef.se/assets/apple - link related to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage.\n\nAhmann is named as special counsel but he , like Brian Sabey are \u2018ONLY\u2019  cyber attacking Tsara Brashears.\n\n- protecting Jeffrey Reimer DPT, multiple doctors, Concentra,  blocked and denied care , hired a hitman/men and it would have. Even cheaper to pay her for the injuries she never sought compensation for due to aggressive attacks and threats.",
          "modified": "2025-12-02T01:05:30.331000",
          "created": "2025-11-02T02:10:33.546000",
          "tags": [
            "ipv4",
            "active related",
            "trojandropper",
            "mtb jun",
            "lowfi",
            "trojan",
            "mtb jan",
            "fastly error",
            "please",
            "united",
            "ttl value",
            "get na",
            "total",
            "delete",
            "search",
            "yara detections",
            "sinkhole cookie",
            "value snkz",
            "write",
            "suspicious",
            "ransom",
            "malware",
            "Ransom.Win32.Birele.gsg Checkin",
            "AnubisNetworks Sinkhole Cookie Value Snkz",
            "Possible Compromised Host",
            "dynamicloader",
            "delete c",
            "default",
            "medium",
            "write c",
            "settingswpad",
            "intel",
            "ms windows",
            "users",
            "number",
            "title",
            "installer",
            "top source",
            "top destination",
            "source source",
            "port",
            "filehash",
            "av detections",
            "ids detections",
            "yara rule",
            "gravityrat",
            "detectvm",
            "x00 x00",
            "x00x00",
            "doviacmd",
            "rootjob",
            "getfiles",
            "updateserver",
            "ethernetid",
            "ids signatures",
            "exploits",
            "sid name",
            "malware cve",
            "dns query",
            "dnsbin demo",
            "data exfil",
            "exif data",
            "DNS Query for Webhook/HTTP Request Inspection Service (x .pipedr",
            "DNSBin Demo (requestbin .net) - Data Exfitration",
            "source port",
            "destination",
            "present sep",
            "script urls",
            "script script",
            "a domains",
            "script domains",
            "ip address",
            "meta",
            "present nov",
            "passive dns",
            "next associated",
            "domain add",
            "pe executable",
            "entries",
            "show",
            "msie",
            "windows nt",
            "wow64",
            "copy",
            "present jan",
            "present feb",
            "domain",
            "pulse pulses",
            "urls",
            "files",
            "tam legal",
            "christopher ahmann",
            "https://unicef.se/assets/apple",
            "treece alfrey",
            "hours ago",
            "information",
            "report spam",
            "ahmann colorado",
            "state",
            "special cousel",
            "created",
            "expiro",
            "capture"
          ],
          "references": [
            "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
            "Fastly Error and Palantir blocked several times over the last few months.",
            "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
            "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
            "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
            "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
            "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
            "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
            "https://unicef.se/assets/apple"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/Neconyd.A",
              "display_name": "Trojan:Win32/Neconyd.A",
              "target": "/malware/Trojan:Win32/Neconyd.A"
            },
            {
              "id": "PWS:Win32/QQpass.FC",
              "display_name": "PWS:Win32/QQpass.FC",
              "target": "/malware/PWS:Win32/QQpass.FC"
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "Win.Malware.Urelas-9863836-0",
              "display_name": "Win.Malware.Urelas-9863836-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "target": null
            },
            {
              "id": "Win.Trojan.Vundo-7170412-0",
              "display_name": "Win.Trojan.Vundo-7170412-0",
              "target": null
            },
            {
              "id": "#Lowfi:SuspiciousSectionName",
              "display_name": "#Lowfi:SuspiciousSectionName",
              "target": null
            },
            {
              "id": "Multiple Malware\u2019s , Trojans and Rats",
              "display_name": "Multiple Malware\u2019s , Trojans and Rats",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 909,
            "domain": 449,
            "hostname": 1403,
            "URL": 3552,
            "CIDR": 1,
            "FileHash-MD5": 242,
            "FileHash-SHA1": 185,
            "email": 1
          },
          "indicator_count": 6742,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "138 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "663d2869e0f3a42bbddc42ff",
          "name": "UPX executable packer.",
          "description": "A new rule has been introduced  a \"suspicious\" ELF binary that is packed with the UPX executable packer.\nSuggested ATT&CK IDs: rule SUSP_ELF_LNX_UPX_Compressed_File { meta: description = \"Detects a suspicious ELF binary with UPX compression\" author = \"Florian Roth (Nextron Systems)\" reference = \"Internal Research\" date = \"2018-12-12\" score = 40 hash1 = \"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4\" id = \"078937de-59b3-538e-a5c3-57f4e6050212\" strings: $s1 = \"PROT_EXEC|PROT_WRITE failed.\" fullword ascii $s2 = \"$Id: UPX\" fullword ascii $s3 = \"$Info: This file is packed with the UPX executable packer\" ascii $fp1 = \"check your UCL installation !\"",
          "modified": "2024-10-14T00:01:17.069000",
          "created": "2024-05-09T19:47:53.786000",
          "tags": [
            "cioch adrian",
            "centrum usug",
            "sieciowych",
            "elf binary",
            "upx compression",
            "roth",
            "nextron",
            "info",
            "javascript",
            "html",
            "office open",
            "xml document",
            "network capture",
            "win32 exe",
            "xml pakietu",
            "pdf zestawy",
            "przechwytywanie",
            "office",
            "filehashsha1",
            "url https",
            "cve cve20201070",
            "cve cve20203153",
            "cve cve20201048",
            "cve cve20211732",
            "cve20201048 apr",
            "filehashmd5",
            "cve cve20010901",
            "cve cve20021841",
            "cve20153202 apr",
            "cve cve20160728",
            "cve cve20161807",
            "cve cve20175123",
            "cve20185407 apr",
            "cve cve20054605",
            "cve cve20060745",
            "cve cve20070452",
            "cve cve20070453",
            "cve cve20070454",
            "cve cve20071355",
            "cve cve20071358",
            "cve cve20071871",
            "cve20149614 apr",
            "cve cve20151503",
            "cve cve20152080",
            "cve cve20157377",
            "cve cve20170131",
            "cve20200796 may",
            "cve cve20113403"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6861,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 5771,
            "domain": 3139,
            "URL": 14525,
            "FileHash-SHA1": 2610,
            "IPv4": 108,
            "CIDR": 40,
            "FileHash-SHA256": 10705,
            "FileHash-MD5": 3373,
            "YARA": 2,
            "CVE": 148,
            "Mutex": 7,
            "FilePath": 3,
            "SSLCertFingerprint": 3,
            "email": 23,
            "JA3": 1,
            "IPv6": 2
          },
          "indicator_count": 40460,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "552 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708efbe1108a2df26f5c5f",
          "name": "Theconstantcompany.com \u2014>Elizabeth Messer &#8211; Spiritual Encouragement for your beautiful, messy life",
          "description": "",
          "modified": "2023-12-06T15:10:51.712000",
          "created": "2023-12-06T15:10:51.712000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 538,
            "hostname": 307,
            "domain": 220,
            "URL": 1053
          },
          "indicator_count": 2118,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708ee4e69d8c30c04154d0",
          "name": "develapp.me - weglot.com",
          "description": "",
          "modified": "2023-12-06T15:10:28.836000",
          "created": "2023-12-06T15:10:28.836000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 75,
            "domain": 265,
            "hostname": 482,
            "URL": 731,
            "FileHash-MD5": 4,
            "FileHash-SHA1": 1,
            "email": 1
          },
          "indicator_count": 1559,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708e0d95a8c74cc715f7a2",
          "name": "West.cn",
          "description": "",
          "modified": "2023-12-06T15:06:53.350000",
          "created": "2023-12-06T15:06:53.350000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 208,
            "domain": 533,
            "hostname": 757,
            "URL": 1861,
            "FileHash-MD5": 1
          },
          "indicator_count": 3360,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708cc78755574d9812e4c8",
          "name": "one google maps api call and one generic key - causing a large chunk of cyber disruption and compromise",
          "description": "",
          "modified": "2023-12-06T15:01:27.166000",
          "created": "2023-12-06T15:01:27.166000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 135,
            "hostname": 149,
            "URL": 352,
            "domain": 53
          },
          "indicator_count": 689,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c0f5981b6d81d0fa423",
          "name": "data102 and colohouse. Malware hosting",
          "description": "",
          "modified": "2023-12-06T14:58:23.206000",
          "created": "2023-12-06T14:58:23.206000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 458,
            "domain": 557,
            "URL": 2599,
            "hostname": 952
          },
          "indicator_count": 4566,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708b72abe90961af1737c9",
          "name": "reCAPTCHA",
          "description": "",
          "modified": "2023-12-06T14:55:46.172000",
          "created": "2023-12-06T14:55:46.172000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 362,
            "domain": 330,
            "URL": 1790,
            "hostname": 586,
            "email": 1
          },
          "indicator_count": 3069,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708a8b61abf1b451f2aebc",
          "name": "Botnet",
          "description": "",
          "modified": "2023-12-06T14:51:55.086000",
          "created": "2023-12-06T14:51:55.086000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "hostname": 619,
            "URL": 1547,
            "domain": 246,
            "FileHash-SHA256": 124
          },
          "indicator_count": 2538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708a87eeed875a212dff0a",
          "name": "Botnet",
          "description": "",
          "modified": "2023-12-06T14:51:51.546000",
          "created": "2023-12-06T14:51:51.546000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "hostname": 619,
            "URL": 1547,
            "domain": 246,
            "FileHash-SHA256": 124
          },
          "indicator_count": 2538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657089b1d50beac095ca3859",
          "name": "forgotten45s.com",
          "description": "",
          "modified": "2023-12-06T14:48:17.639000",
          "created": "2023-12-06T14:48:17.639000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 500,
            "hostname": 362,
            "domain": 356,
            "URL": 1063,
            "email": 3,
            "CIDR": 4,
            "FileHash-MD5": 22,
            "FileHash-SHA1": 16
          },
          "indicator_count": 2327,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657080d20f7e10c1e37fcf89",
          "name": "TarrantCounty.com ~ 03.01.2022",
          "description": "",
          "modified": "2023-12-06T14:10:26.301000",
          "created": "2023-12-06T14:10:26.301000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1078,
            "domain": 838,
            "hostname": 1607,
            "URL": 4134,
            "email": 3,
            "FileHash-SHA1": 2,
            "CIDR": 4,
            "FileHash-MD5": 15
          },
          "indicator_count": 7681,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707f8475d8a8785dfc5a2f",
          "name": "Zetalytics API",
          "description": "",
          "modified": "2023-12-06T14:04:52.250000",
          "created": "2023-12-06T14:04:52.250000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 754,
            "hostname": 833,
            "domain": 441,
            "URL": 2375,
            "CIDR": 5,
            "FileHash-MD5": 2,
            "email": 1
          },
          "indicator_count": 4411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "63b580a925bb698985fa83ea",
          "name": "vendor.bundle.js",
          "description": "",
          "modified": "2023-02-03T13:00:02.804000",
          "created": "2023-01-04T13:35:37.535000",
          "tags": [
            "vxstream",
            "trojan",
            "apt",
            "memoryfile scan",
            "error",
            "progresstype",
            "graytext",
            "typeof e",
            "highlight",
            "bg96gwp",
            "typeof",
            "window",
            "null",
            "date",
            "span",
            "path",
            "meta",
            "push",
            "unknown",
            "roboto",
            "scroll",
            "suspicious",
            "close",
            "light",
            "template",
            "abcd",
            "android",
            "trident",
            "backspace",
            "insert",
            "4096",
            "void",
            "legend",
            "iframe",
            "webview",
            "infinity",
            "ransomware",
            "malicious",
            "accept toggle",
            "voice",
            "upgrade"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/f90162e65235185a24e9f20d855371b8ad7462d50d7a57851d000cfd5116f76d",
            "This website contains the details of an anti-virus scan conducted by the MetaDefender, which aims to identify and remove malware from websites, websites and social media sites, including Facebook, Twitter and YouTube.",
            "original dropped file discovery url",
            "http://lifehacker.com/assets/stylesheets/app-a873b056f0ea955e4ff0abebb210e5a6.css",
            "Making HTTPS connections using insecure TLS/SSL version details Connection was make using TLSv1.1 [tls.handshake.version: 0x00000302] source Network Traffic relevance 10/10 ATT&CK ID T1573 (Show technique in the MITRE ATT&CK\u2122 matrix)",
            "https://hybrid-analysis.com/sample/f90162e65235185a24e9f20d855371b8ad7462d50d7a57851d000cfd5116f76d/63aef1a83e3bb16765527bb8"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 205,
            "URL": 1340,
            "FileHash-SHA256": 407,
            "hostname": 491,
            "FileHash-MD5": 8,
            "email": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2453,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1170 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "63a3b9aaaca8891186e6f7a2",
          "name": "vt errors on edge 21 dec 2022",
          "description": "var n-i,n-n, r.test, is a new type of webpack, which uses a set of rules to store data in the form of a single address, or code.",
          "modified": "2023-01-21T00:01:41.590000",
          "created": "2022-12-22T01:58:02.495000",
          "tags": [
            "eaca",
            "eace",
            "iaca",
            "iace",
            "boolean",
            "object",
            "path",
            "aacf",
            "customevent",
            "string",
            "span",
            "error",
            "code",
            "virustotal",
            "date",
            "null",
            "contact",
            "blank",
            "close",
            "twitter",
            "unknown",
            "download",
            "this",
            "easy",
            "desktop",
            "body",
            "requires",
            "footer",
            "refresh",
            "patch",
            "write",
            "cobalt strike",
            "shell",
            "zero",
            "harmless",
            "main",
            "aalfe",
            "getclass",
            "copy",
            "iframe",
            "divi",
            "roboto",
            "insert",
            "template",
            "class",
            "void",
            "form",
            "back",
            "ransomware",
            "trace",
            "comment",
            "tools",
            "premium",
            "bufferwriter",
            "bufferreader",
            "array",
            "typeerror",
            "vtuibutton",
            "number",
            "typeof o",
            "urls",
            "please",
            "javascript",
            "https://www.virustotal.com/gui/vt-ui-sw-installer.e0eb1a1e08d651",
            "https://www.virustotal.com/gui/main.900e36f7a852b9863014.js"
          ],
          "references": [
            "https://www.virustotal.com/gui/vt-ui-sw-installer.e0eb1a1e08d6512ba355.js/ Depreciated",
            "https://www.virustotal.com/gui/main.900e36f7a852b9863014.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "BufferReader",
              "display_name": "BufferReader",
              "target": null
            },
            {
              "id": "BufferWriter",
              "display_name": "BufferWriter",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1051,
            "FileHash-SHA256": 204,
            "hostname": 275,
            "domain": 212,
            "CVE": 1,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 1745,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 92,
          "modified_text": "1184 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62e80d56fba248bac0744780",
          "name": "\ud83e\udd14\ud83d\udea8 Could this be the source of all Evil? \ud83d\udea8\ud83e\udd14 Nubotnet - Team:KU Leuven/test2 - 2021.igem.org",
          "description": "",
          "modified": "2022-08-31T00:01:05.509000",
          "created": "2022-08-01T17:28:54.991000",
          "tags": [
            "apt",
            "runtime data",
            "decrypted ssl",
            "pcap",
            "windows nt",
            "tops",
            "cookie",
            "typeof t",
            "element",
            "error",
            "matrix",
            "typeerror",
            "bmfloor",
            "frameelement",
            "null",
            "skew",
            "parade"
          ],
          "references": [
            "https://2021.igem.org/Team:KU_Leuven/test2",
            "https://hybrid-analysis.com/sample/e126ff94aac3340dc05a27f062c4267cbfeaa998248bef0e72f000bba711aa76/62e6fb475edc950b894aa7b0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1696,
            "domain": 586,
            "hostname": 613,
            "FileHash-SHA256": 533,
            "FileHash-MD5": 34,
            "FileHash-SHA1": 33,
            "email": 1
          },
          "indicator_count": 3496,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 393,
          "modified_text": "1327 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6280398780fbe64692dd54fd",
          "name": "West.cn",
          "description": "If you want to know more about Shockwave Flash, spare a thought for the members of your own storage system:mt.co.g.o.mimeTypes.com, mime",
          "modified": "2022-06-13T00:00:32.864000",
          "created": "2022-05-14T23:21:43.936000",
          "tags": [
            "jquery",
            "date",
            "vue jquery",
            "template",
            "layer",
            "paas",
            "dist",
            "wjf3m",
            "ajax",
            "business",
            "string",
            "number",
            "regexp",
            "copyright",
            "uint8array",
            "fnumber",
            "aw1045757556",
            "closure library",
            "xdfunction",
            "code",
            "ddos",
            "image",
            "script",
            "document",
            "unescape",
            "msie",
            "canvas",
            "domain",
            "click",
            "input",
            "label",
            "jdomname",
            "strong",
            "jactive15toast",
            "jclearinput",
            "case",
            "datatarget",
            "jdomainregcount",
            "span",
            "function",
            "x786e",
            "x53d6",
            "cite",
            "x4fe1",
            "iframe",
            "null",
            "prompt",
            "x6700",
            "x591a",
            "array",
            "numarray",
            "data",
            "midsize",
            "action",
            "keyword",
            "firstfix",
            "object",
            "5n3j",
            "3f4r",
            "5p3s",
            "1f5m",
            "hhe2",
            "bbf2",
            "3y3z",
            "1223",
            "6q6m",
            "zfunction",
            "psettimeout",
            "tsettimeout",
            "hsetinterval",
            "iparseint",
            "hnull",
            "pnull",
            "tnull",
            "lv1s",
            "efunction",
            "typeof t",
            "typeof e",
            "adobeedge",
            "typeof r",
            "webkittransform",
            "moztransform",
            "body",
            "this",
            "notifier",
            "invert",
            "name",
            "param",
            "value",
            "error",
            "false",
            "trigger",
            "restart",
            "form",
            "config",
            "constants",
            "true",
            "modalhelper",
            "relative",
            "fixed",
            "account login",
            "activexobject",
            "haslocation",
            "xmlhttprequest",
            "xmlregexp",
            "temp",
            "extpart",
            "foundation",
            "mit license",
            "write",
            "rhino",
            "mark",
            "import",
            "classnamedom",
            "onbeforedestroy",
            "login",
            "auto",
            "init",
            "typeof b",
            "width",
            "pseudo",
            "child",
            "enulle",
            "class",
            "accept",
            "shockwave flash",
            "new date1e3",
            "ka6e5",
            "la10"
          ],
          "references": [
            "xfe-IP-103.24.249.209-stix2-2.1-export.json",
            "xfe-URL-West.cn-stix2-2.1-export.json",
            "https://m.west.cn/jscripts/baidutj/hm.js",
            "http://m.west.cn/jscripts/baidutj/hm.js",
            "https://www.west.cn/js2016/lib/jquery.SuperSlide/jquery.SuperSlide.2.1.1.x.js",
            "https://www.west.cn/js2016/root/jqinclude.js?t=20211126a",
            "https://www.googletagmanager.com/gtag/js?id=AW-1045757556"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 533,
            "URL": 1861,
            "hostname": 757,
            "FileHash-SHA256": 208,
            "FileHash-MD5": 1
          },
          "indicator_count": 3360,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1406 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "626a8a564da0d5b27dc02619",
          "name": "App By Web",
          "description": "Israeli malware hosting",
          "modified": "2022-05-28T00:03:46.141000",
          "created": "2022-04-28T12:36:38.103000",
          "tags": [
            "hebrew",
            "truetype",
            "woff2",
            "woff",
            "body",
            "fh5cooffcanvas",
            "function",
            "click",
            "main menu",
            "superfish var",
            "parallax",
            "offcanvas",
            "mobile menu",
            "animations var",
            "mstouchaction",
            "superfish menu",
            "plugin",
            "copyright",
            "joel birch",
            "dual",
            "fill",
            "touchaction",
            "y position",
            "hoverintent",
            "brian cherne",
            "param",
            "threshold",
            "mit license",
            "or selector",
            "author",
            "1parseint",
            "mark dalgleish",
            "http",
            "webkitopacity",
            "webkit",
            "khtmlopacity",
            "khtml",
            "typeof d",
            "error",
            "this",
            "caleb troughton",
            "typeof f",
            "adapter",
            "bootstrap",
            "javascript",
            "typeof c",
            "twitter",
            "focus",
            "azaz",
            "including",
            "this software",
            "but not",
            "limited to",
            "terms of",
            "open",
            "bsd license",
            "redistribution",
            "redistributions",
            "neither",
            "direct",
            "gc",
            "regexp",
            "typeof b",
            "pseudo",
            "child",
            "array",
            "width",
            "sufeffxa0",
            "class",
            "null",
            "date",
            "accept",
            "boolean",
            "modernizr",
            "custom build",
            "build",
            "afunction",
            "cfunction",
            "typeerror",
            "object",
            "documenttouch",
            "websocket",
            "string",
            "silk",
            "script",
            "arial",
            "edge",
            "iframe",
            "promise",
            "void",
            "android",
            "trident",
            "embed",
            "meta",
            "roboto",
            "term",
            "\u05d4\u05d6\u05de\u05e0\u05ea \u05de\u05d5\u05e0\u05d9\u05ea",
            "wtaxi",
            "wapp",
            "app by web ltd",
            "03-5115656",
            "03-5109109",
            "+97235115656",
            "\u05de\u05e2\u05e8\u05db\u05d5\u05ea \u05d4\u05e1\u05e2\u05d9\u05dd",
            "\u05db\u05e8\u05d8\u05d9\u05e1 \u05d0\u05e9\u05e8\u05d0\u05d9 \u05d1\u05de\u05d5\u05e0\u05d9\u05ea",
            "web ltd",
            "reserved"
          ],
          "references": [
            "xfe-URL-appbyweb.net-stix2-2.1-export.json",
            "http://appbyweb.net/AppByWeb",
            "https://partner.googleadservices.com/gampad/cookie.js?domain=appbyweb.net&callback=_gfp_s_&client=ca-pub-2581829468247892",
            "https://pagead2.googlesyndication.com/pagead/managed/js/adsense/m202204200101/show_ads_impl_fy2019.js",
            "http://appbyweb.net/AppByWeb/js/modernizr-2.6.2.min.js",
            "http://appbyweb.net/AppByWeb/js/jquery.min.js",
            "http://appbyweb.net/AppByWeb/js/jquery.easing.1.3.js",
            "http://appbyweb.net/AppByWeb/js/bootstrap.min.js",
            "http://appbyweb.net/AppByWeb/js/jquery.waypoints.min.js",
            "http://appbyweb.net/AppByWeb/js/jquery.stellar.min.js",
            "http://appbyweb.net/AppByWeb/js/hoverIntent.js",
            "http://appbyweb.net/AppByWeb/js/superfish.js",
            "http://appbyweb.net/AppByWeb/js/main.js",
            "https://files.appbyweb.net/Fonts/OpenSansHebrew/font.css",
            "https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2581829468247892&output=html&adk=1812271804&adf=3025194257&lmt=1651149220&plat=16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C32%3A32&format=0x0&url=http%3A%2F%2Fappbyweb.net%2FAppByWeb%2F&ea=0&pra=5&wgl=1&dt=1651149220376&bpp=1&bdt=121&idt=18&shv=r20220425&mjsv=m202204200101&ptt=9&saldr=aa&abxe=1&cookie=ID%3De83d6067a4dac5b6-229192c549d200d1%3AT%3D1651148802%3ART%3D1651148802%3AS%3DALNI_MZSt9utXhYBHAIH9xwQp72WuxQxTw&nras=1&correlator=1655793633284&"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Gc",
              "display_name": "Gc",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1554,
            "hostname": 533,
            "domain": 211,
            "FileHash-SHA256": 199
          },
          "indicator_count": 2497,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1422 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "628eefdf98ddb360733b23c2",
          "name": "Theconstantcompany.com \u2014>Elizabeth Messer &#8211; Spiritual Encouragement for your beautiful, messy life",
          "description": "This is blasphemy",
          "modified": "2022-05-26T03:20:44.885000",
          "created": "2022-05-26T03:11:27.710000",
          "tags": [
            "5deg",
            "3deg",
            "10deg",
            "30px",
            "15px",
            "4px0",
            "20deg",
            "sans",
            "styles",
            "type",
            "form",
            "widget",
            "helvetica neue",
            "typeemail",
            "typetext",
            "classshare",
            "typetel",
            "typeurl",
            "typecheckbox",
            "canvas",
            "typeradio",
            "segoe ui",
            "roboto",
            "span",
            "open",
            "click",
            "getclicktarget",
            "date",
            "contexttrack",
            "view",
            "installtrigger",
            "processlink",
            "typeof blog",
            "msie",
            "image",
            "paul irish",
            "typeof b",
            "kfunction",
            "true",
            "body",
            "optinid",
            "pageid",
            "listid",
            "cookieduration",
            "scrollpos",
            "etbloompopup",
            "etbloomformleft",
            "service",
            "typebutton",
            "choose file",
            "reset",
            "submit",
            "screenw",
            "containerh",
            "function",
            "ratio1",
            "ratio2",
            "containerw",
            "index",
            "nectar",
            "null",
            "youtubeid",
            "jquery",
            "nnull",
            "annull",
            "touch swipe",
            "touchswipe",
            "method",
            "phasemove",
            "phaseend",
            "phasecancel",
            "left",
            "right",
            "typeof define",
            "typeof module",
            "typeof t",
            "mspointerdown",
            "input",
            "touch",
            "gplv3",
            "license",
            "copyright",
            "metafizzy",
            "typeof require",
            "new dateu",
            "flash player",
            "arrow",
            "chinese",
            "typeof symbol",
            "wrapper",
            "javascript",
            "flash",
            "error",
            "fullscreen",
            "czech",
            "icelandic",
            "korean",
            "slovak",
            "infinite scroll",
            "easeoutcubic",
            "bind",
            "destroy",
            "html",
            "resume",
            "luke shumard",
            "mit license",
            "next",
            "unknown",
            "false",
            "done",
            "minimal",
            "transparent",
            "megamenu",
            "edge",
            "superfish menu",
            "plugin",
            "joel birch",
            "dual",
            "ttttttt ttttttt",
            "gravatar",
            "ttttttttname",
            "tttttt tttttt",
            "tttttt ttttt",
            "symbol",
            "array",
            "typeof window",
            "typeof self",
            "string",
            "object",
            "ieproto",
            "activexobject",
            "typeerror",
            "asynciterator",
            "generator",
            "number",
            "closure library",
            "xdfunction",
            "adfunction",
            "bdfunction",
            "lefunction",
            "qefunction",
            "boolean",
            "moz o",
            "custom build",
            "https",
            "android",
            "mobile safari",
            "chrome",
            "phone",
            "worker",
            "typeof n",
            "typeof e",
            "uint8array",
            "vcgitemlink",
            "addingtocart",
            "addedtocart",
            "button",
            "version",
            "requires",
            "thanks",
            "window",
            "please wait",
            "typeof f",
            "html tags",
            "ox20trnf",
            "dom element",
            "regexp",
            "class",
            "attr",
            "pseudo",
            "child",
            "bible studies",
            "bible study",
            "leed",
            "ebay",
            "microsoft",
            "jesus",
            "john",
            "saint ignatius",
            "loyola"
          ],
          "references": [
            "http://www.elizabethmesser.com/",
            "http://theconstantcompany.com",
            "http://www.elizabethmesser.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
            "http://www.elizabethmesser.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2",
            "http://www.elizabethmesser.com/wp-content/plugins/woocommerce/assets/js/jquery-blockui/jquery.blockUI.min.js?ver=2.7.0-wc.6.5.1",
            "http://www.elizabethmesser.com/wp-content/plugins/woocommerce/assets/js/frontend/add-to-cart.min.js?ver=6.5.1",
            "http://www.elizabethmesser.com/wp-content/plugins/js_composer_salient/assets/js/vendors/woocommerce-add-to-cart.js?ver=5.0.1",
            "https://stats.wp.com/s-202221.js",
            "http://www.elizabethmesser.com/wp-content/themes/salient/js/modernizr.js?ver=2.6.2",
            "https://www.googletagmanager.com/gtag/js?id=UA-115476727-1",
            "http://www.elizabethmesser.com/wp-content/plugins/jetpack/_inc/build/photon/photon.min.js?ver=20191001",
            "http://www.elizabethmesser.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.9",
            "http://www.elizabethmesser.com/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=3.15.0",
            "http://www.elizabethmesser.com/wp-content/plugins/woocommerce/assets/js/frontend/woocommerce.min.js?ver=6.5.1",
            "https://secure.gravatar.com/js/gprofiles.js?ver=202221",
            "http://www.elizabethmesser.com/wp-content/themes/salient/js/superfish.js?ver=1.4.8",
            "http://www.elizabethmesser.com/wp-content/themes/salient/js/infinitescroll.js?ver=1.1",
            "http://www.elizabethmesser.com/wp-includes/js/mediaelement/mediaelement-and-player.min.js?ver=4.2.16",
            "http://www.elizabethmesser.com/wp-content/themes/salient/js/flickity.min.js?ver=1.1.1",
            "http://www.elizabethmesser.com/wp-content/themes/salient/js/touchswipe.min.js?ver=1.0",
            "http://www.elizabethmesser.com/wp-content/plugins/js_composer_salient/assets/js/dist/js_composer_front.min.js?ver=5.0.1",
            "http://www.elizabethmesser.com/wp-content/plugins/bloom/js/jquery.uniform.min.js?ver=1.1.8",
            "http://www.elizabethmesser.com/wp-content/plugins/bloom/js/custom.js?ver=1.1.8",
            "http://www.elizabethmesser.com/wp-content/plugins/bloom/js/idle-timer.min.js?ver=1.1.8",
            "https://stats.wp.com/e-202221.js",
            "http://www.elizabethmesser.com/wp-content/plugins/jetpack/css/jetpack.css?ver=10.9.1",
            "http://www.elizabethmesser.com/wp-content/plugins/bloom/css/style.css?ver=1.1.8"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Bible Study",
              "display_name": "Bible Study",
              "target": null
            },
            {
              "id": "Bible Studies",
              "display_name": "Bible Studies",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 220,
            "hostname": 307,
            "URL": 1054,
            "FileHash-SHA256": 538
          },
          "indicator_count": 2119,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 70,
          "modified_text": "1424 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "628d7dd1aeef31a652eadab3",
          "name": "develapp.me - weglot.com",
          "description": "function R(a,b,c,d,e,f) is a new type of JavaScript, which allows the browser to control its browser without a set of buttons or controls..",
          "modified": "2022-05-25T00:52:33.987000",
          "created": "2022-05-25T00:52:33.987000",
          "tags": [
            "configrender",
            "commandremove",
            "targetdom",
            "webpackrequire",
            "mixitup",
            "webpackexports",
            "typeerror",
            "nn function",
            "false",
            "error",
            "typeof o",
            "function",
            "click",
            "span",
            "prop",
            "sticky",
            "body",
            "enterprise",
            "null",
            "jquery",
            "next",
            "scroll",
            "win32",
            "win64",
            "example",
            "startr",
            "endr",
            "copyright",
            "federico zivolo",
            "distributed",
            "mit license",
            "html",
            "statict",
            "flip",
            "bootstrap",
            "typeof",
            "javascript",
            "hidden",
            "show",
            "focusin",
            "focusout",
            "mouseleave",
            "font awesome",
            "free",
            "license",
            "cc by",
            "sil ofl",
            "code",
            "typeof window",
            "typeof document",
            "msie",
            "trident",
            "date",
            "color",
            "swiper",
            "waypoint",
            "chart",
            "typeof pdata",
            "pdatawrapper",
            "close",
            "cnew date",
            "regexp",
            "pseudo",
            "child",
            "sufeffxa0",
            "class",
            "attr",
            "js foundation",
            "typeof module",
            "object",
            "hj",
            "typeof require",
            "modulenotfound",
            "typeof symbol",
            "hotjar",
            "typeof e",
            "data",
            "array",
            "surveys",
            "meta",
            "survey",
            "keypress",
            "widget",
            "window",
            "footer",
            "fullscreen",
            "generic",
            "experiment",
            "live",
            "mutation",
            "number",
            "string",
            "xsnull",
            "g6q8lh84qh0",
            "script",
            "fragment",
            "replace",
            "nonce",
            "please do",
            "not copy",
            "and paste",
            "this code",
            "cgrecaptchacfg",
            "ngrecaptcha",
            "recaptchaapi",
            "render",
            "vrai",
            "revenir",
            "rgpd",
            "axeptio",
            "gdpr",
            "black",
            "green",
            "canvas",
            "super",
            "spacer",
            "target",
            "reduceright",
            "xu",
            "pageview",
            "trackevent",
            "uetpush",
            "pageload",
            "viewcontent",
            "path",
            "derek",
            "void",
            "offer",
            "instanceof",
            "xmlhttprequest",
            "cookie",
            "generator",
            "accept",
            "select",
            "strong",
            "uint8array",
            "math",
            "svoid",
            "this",
            "iframe",
            "verify",
            "android",
            "stop",
            "form",
            "f420",
            "deviceandgeo",
            "googlesignals",
            "json",
            "typeof hj",
            "https",
            "learn",
            "surveyv2",
            "surveyisolated",
            "heatmapviewer",
            "beacon",
            "publicurl",
            "beaconenv",
            "beaconid",
            "beaconversion",
            "isdocker",
            "isscout",
            "deployurl",
            "scattr",
            "help scout",
            "promise",
            "typeof n",
            "request",
            "kontakt",
            "landstrae",
            "d85521",
            "mehr",
            "jahre erfahrung",
            "gratis beratung",
            "kontaktiere",
            "mit mehr",
            "kunden die",
            "ergebnisse",
            "typesubmit",
            "button",
            "woff2",
            "fontface",
            "display",
            "u0259",
            "u1e001eff",
            "u2020",
            "u20a020ab",
            "u20ad20cf",
            "u2113",
            "u2c602c7f",
            "montserrat",
            "typesearch",
            "a4ssliche",
            "90deg",
            "lato",
            "typecheckbox",
            "typeradio",
            "typenumber",
            "truetype",
            "weglot",
            "self",
            "typeof t",
            "franais",
            "acronym",
            "small",
            "unknown",
            "webflow",
            "typeof self",
            "chrome",
            "small batch",
            "apache license",
            "version",
            "unless",
            "as is",
            "basis",
            "without",
            "warranties or",
            "apache"
          ],
          "references": [
            "https://d3e54v103j8qbb.cloudfront.net/js/jquery-3.5.1.min.dc5e7f18c8.js?site=5f087b2cc04e635c7a4b7e35",
            "https://assets.website-files.com/5f087b2cc04e635c7a4b7e35/js/develapp.b94842ca8.js",
            "https://cdn.weglot.com/weglot.min.js",
            "https://assets.website-files.com/5f087b2cc04e635c7a4b7e35/css/develapp.36c3d32f6.min.css",
            "https://fonts.googleapis.com/css?family=Montserrat:100,100italic,200,200italic,300,300italic,400,400italic,500,500italic,600,600italic,700,700italic,800,800italic,900,900italic%7CLato:100,100italic,300,300italic,400,400italic,700,700italic,900,900italic%7CKarla:regular,italic,700,700italic%7CPlayfair+Display:regular,500,600,700,800,900,italic,500italic,600italic,700italic,800italic,900italic",
            "https://cdn.weglot.com/weglot.min.css?v=4",
            "https://www.develapp.me/kontakt#formular",
            "https://beacon-v2.helpscout.net/static/js/vendor.90fe6783.js",
            "https://beacon-v2.helpscout.net/static/js/main.4a4d1187.js",
            "https://beacon-v2.helpscout.net/",
            "https://static.hotjar.com/c/hotjar-2950866.js?sv=7",
            "https://www.googletagmanager.com/gtag/js?id=G-6Q8LH84QH0&l=dataLayer&cx=c",
            "https://www.gstatic.com/recaptcha/releases/1_E1Jb45wiBZrQd45oGZ-2cU/recaptcha__en.js",
            "https://loader.wisepops.com/get-loader.js?v=1&site=ybdeB8PyA7",
            "https://cdn.firstpromoter.com/fprom.js",
            "https://www.googletagmanager.com/gtm.js?id=GTM-NTC6C23",
            "https://static.axept.io/sdk.js",
            "https://www.google.com/recaptcha/api.js?render=6LdxYT4dAAAAAFyqSRoLKTBh7Q9kh0D0StIaGfzK",
            "https://www.googleoptimize.com/optimize.js?id=OPT-PJMGV95",
            "https://script.hotjar.com/modules.7a321ecb93fde9f07226.js",
            "https://widget.trustpilot.com/bootstrap/v5/tp.widget.bootstrap.min.js",
            "https://ajax.googleapis.com/ajax/libs/jquery/3.2.1/jquery.min.js",
            "https://weglot.com/wp-content/plugins/addon-elements-for-elementor-page-builder/assets/js/eae.min.js",
            "https://weglot.com/wp-content/plugins/elementor/assets/lib/font-awesome/js/v4-shims.min.js",
            "https://weglot.com/wp-content/plugins/addon-elements-for-elementor-page-builder/assets/js/animated-main.min.js",
            "https://stackpath.bootstrapcdn.com/bootstrap/4.1.1/js/bootstrap.min.js",
            "https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Tunisia"
          ],
          "malware_families": [
            {
              "id": "ConfigRender",
              "display_name": "ConfigRender",
              "target": null
            },
            {
              "id": "TargetDom",
              "display_name": "TargetDom",
              "target": null
            },
            {
              "id": "CommandRemove",
              "display_name": "CommandRemove",
              "target": null
            },
            {
              "id": "hj",
              "display_name": "hj",
              "target": null
            },
            {
              "id": "xU",
              "display_name": "xU",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 482,
            "URL": 731,
            "FileHash-SHA256": 75,
            "domain": 265,
            "FileHash-MD5": 4,
            "FileHash-SHA1": 1,
            "email": 1
          },
          "indicator_count": 1559,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1425 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62634f4db80546374654f4c4",
          "name": "frantech.ca - malware",
          "description": "T,t.F, t.f, is written in the same place as the following:t, d. F, has been added to the end of the document, as well as its own propertyDescriptor.",
          "modified": "2022-05-22T00:01:01.264000",
          "created": "2022-04-23T00:58:53.444000",
          "tags": [
            "overview",
            "typeof symbol",
            "error",
            "typeerror",
            "object",
            "typeof t",
            "string",
            "typeof e",
            "function",
            "array",
            "promise",
            "date",
            "target",
            "class",
            "path",
            "back",
            "bounce",
            "this",
            "iframe",
            "null",
            "0x105684",
            "0xb66229",
            "0xb9b329",
            "0x3eed40",
            "0x2923e0",
            "cookie",
            "0x1d2d25",
            "0x2d6b",
            "0x538ea5",
            "0x240c1a",
            "push",
            "shift",
            "open"
          ],
          "references": [
            "xfe-URL-https___my.frantech.ca_-stix2-2.1-export.json",
            "xfe-URL-frantech.ca-stix2-2.1-export.json",
            "https://my.frantech.ca/templates/lagom/assets/js/lagom-app.min.js?v=1.4.3",
            "https://my.frantech.ca/templates/lagom/assets/js/whmcs-custom.min.js?v=1.4.3"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 757,
            "hostname": 498,
            "domain": 311,
            "FileHash-SHA256": 21
          },
          "indicator_count": 1587,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1428 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "626078c9aeb1f4837a1bfc7e",
          "name": "Malware hosting - allwest.com",
          "description": "\u00c2\u00a31.5m, \u00e2\u201a\u00ac2.4m \u00c3\u20ac\u00a6, is the source of a new version of the JavaScript code, which is being developed by the Apache web browser.",
          "modified": "2022-05-20T00:01:19.453000",
          "created": "2022-04-20T21:19:05.670000",
          "tags": [
            "guji",
            "regexp",
            "cfunction",
            "event",
            "afunction",
            "efunction",
            "function",
            "xfunction",
            "jnull",
            "yefunction",
            "customevent",
            "typeof n",
            "typeof wpcf7",
            "nonce",
            "script",
            "please do",
            "not copy",
            "and paste",
            "this code",
            "cgrecaptchacfg",
            "ngrecaptcha",
            "recaptchaapi",
            "render",
            "filter",
            "typenumber",
            "totalvalue",
            "linear",
            "secs",
            "index",
            "nameregion",
            "typevalue",
            "rangeto",
            "customuserspeed",
            "code",
            "typeof define",
            "date",
            "click",
            "smoothscroll",
            "number",
            "property",
            "fancybox",
            "null",
            "false",
            "scroll",
            "stop",
            "speed",
            "body",
            "error",
            "this",
            "typeerror",
            "symbol",
            "generator",
            "typeof e",
            "copyright",
            "closure library",
            "reduceright",
            "string",
            "aw981889198",
            "uint8array",
            "quota",
            "aafunction",
            "void",
            "hj",
            "object",
            "hotjar",
            "email",
            "typeof symbol",
            "telefon",
            "array",
            "survey",
            "meta",
            "cookie",
            "keypress",
            "trident",
            "live",
            "fullscreen",
            "generic",
            "window",
            "widget",
            "ciudad",
            "adore",
            "experiment",
            "mutation",
            "qe",
            "fnumber",
            "xhfunction",
            "yhfunction",
            "awconversionid",
            "g0cbkgbkb3j",
            "xdfunction",
            "adfunction",
            "cdfunction",
            "ddfunction",
            "typeof hj",
            "surveyv2",
            "surveyisolated",
            "heatmapviewer",
            "notification",
            "sentry",
            "ua411335272",
            "gfvhxsm5zyl",
            "xmlhttprequest",
            "domparser",
            "typeof module",
            "html tags",
            "ox20trnf",
            "dom element",
            "typeof t",
            "class",
            "attr",
            "pseudo",
            "child",
            "udc66udc67",
            "ud83d",
            "ufe0f",
            "ud83e",
            "udc68udc69",
            "udfcbudfcc",
            "u2640u2642",
            "source",
            "image",
            "ud83dudc6cud83c",
            "bsnull",
            "gtmmwm9r93",
            "typeof",
            "facebook pixel",
            "pixel code",
            "iterator",
            "constantvalue",
            "globalvariable",
            "facebook",
            "service",
            "phonenumber",
            "boolean",
            "select",
            "strong",
            "input",
            "iframe",
            "android",
            "verify",
            "span",
            "enterprise",
            "form",
            "reload",
            "adwords",
            "linkedin",
            "hs pixel",
            "loader",
            "addcookiedomain",
            "hubspot",
            "vui",
            "anda",
            "tente",
            "outubro",
            "trackingclient",
            "srpanj",
            "rabu",
            "vasaris",
            "helvetica neue",
            "helvetica",
            "arial",
            "accept",
            "n nn",
            "policy",
            "done",
            "800px",
            "40px",
            "i18n",
            "blockedemail",
            "typeof i18n",
            "captcha",
            "please",
            "april",
            "august",
            "close",
            "february",
            "june",
            "klik",
            "download",
            "next",
            "blank",
            "este",
            "rserver",
            "mais",
            "r300",
            "typeof d",
            "path",
            "caca",
            "pfunction",
            "contenttype",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction",
            "array int8array",
            "caregexp",
            "legacy"
          ],
          "references": [
            "xfe-URL-allwest.com-stix2-2.1-export.json",
            "https://www.googleadservices.com/pagead/conversion_async.js",
            "https://www.google-analytics.com/analytics.js",
            "https://www.googletagmanager.com/gtag/js?id=G-FVHXSM5ZYL&l=dataLayer&cx=c",
            "https://www.googletagmanager.com/gtag/js?id=G-0CBKGBKB3J&l=dataLayer&cx=c",
            "https://js.hsleadflows.net/leadflows.js",
            "https://js.hs-banner.com/9251231.js",
            "https://js.hs-analytics.net/analytics/1650488100000/9251231.js",
            "https://js.hsadspixel.net/fb.js",
            "https://www.gstatic.com/recaptcha/releases/QENb_qRrX0-mQMyENQjD6Fuj/recaptcha__en.js",
            "https://connect.facebook.net/signals/config/661596171311072?v=2.9.57&r=stable",
            "https://connect.facebook.net/signals/plugins/identity.js?v=2.9.57",
            "https://connect.facebook.net/en_US/fbevents.js",
            "https://www.googleoptimize.com/optimize.js?id=GTM-MWM9R93",
            "https://www.allwest.com/wp-includes/js/wp-emoji-release.min.js?ver=5.9.3",
            "https://www.allwest.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
            "https://www.allwest.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2",
            "https://www.allwest.com/wp-content/plugins/svg-support/js/min/svgs-inline-min.js?ver=1.0.0",
            "https://www.googletagmanager.com/gtag/js?id=UA-41133527-3",
            "https://static.hotjar.com/c/hotjar-2836981.js?sv=5",
            "https://www.googletagmanager.com/gtag/js?id=UA-41133527-2",
            "https://www.googletagmanager.com/gtag/js?id=AW-CONVERSION_ID",
            "https://script.hotjar.com/modules.0076bf93c385ddf0ff58.js",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/981889198/?random=1650488340057&cv=9&fst=1650488340057&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2oa4i1&sendb=1&ig=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fwww.allwest.com%2F&tiba=All%20West%20Communications%20-%20telecommunication%20company&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
            "https://www.googletagmanager.com/gtag/js?id=AW-981889198",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/981889198/?random=1650488340630&cv=9&fst=1650488340630&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2oa4i1&sendb=1&ig=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fwww.allwest.com%2F&tiba=All%20West%20Communications%20-%20telecommunication%20company&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
            "https://www.allwest.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.9",
            "https://www.allwest.com/wp-content/uploads/hummingbird-assets/c4be4d65e707f6328e3a72e79cfdfcb7.js",
            "https://www.allwest.com/wp-content/themes/allwestcommunications/js/jquery.main.js?ver=5.9.3",
            "https://www.allwest.com/wp-content/themes/allwestcommunications/js/custom.js?ver=5.9.3",
            "https://www.google.com/recaptcha/api.js?render=6Ld8S6EUAAAAAExG_6DO_Jj4DLY35ybebbA8R_eA&ver=3.0",
            "https://www.allwest.com/wp-content/plugins/contact-form-7/modules/recaptcha/index.js?ver=5.5.6",
            "https://www.allwest.com/wp-content/plugins/wp-smushit/app/assets/js/smush-lazy-load.min.js?ver=3.9.5",
            "https://js.hs-scripts.com/9251231.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Tunisia"
          ],
          "malware_families": [
            {
              "id": "hj",
              "display_name": "hj",
              "target": null
            },
            {
              "id": "Qe",
              "display_name": "Qe",
              "target": null
            },
            {
              "id": "Vui",
              "display_name": "Vui",
              "target": null
            },
            {
              "id": "Outubro",
              "display_name": "Outubro",
              "target": null
            },
            {
              "id": "Tente",
              "display_name": "Tente",
              "target": null
            },
            {
              "id": "Anda",
              "display_name": "Anda",
              "target": null
            },
            {
              "id": "Vasaris",
              "display_name": "Vasaris",
              "target": null
            },
            {
              "id": "Rabu",
              "display_name": "Rabu",
              "target": null
            },
            {
              "id": "Srpanj",
              "display_name": "Srpanj",
              "target": null
            },
            {
              "id": "TrackingClient",
              "display_name": "TrackingClient",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 821,
            "URL": 1568,
            "domain": 251,
            "FileHash-SHA256": 70,
            "FileHash-MD5": 4,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2715,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1430 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62601d5f1c8672141d3c2afb",
          "name": "Malware hosting - rackip.com = astutemedia.asia",
          "description": "New RegExp:function(a,b), a new type, has its own built-up property, as well as an ability to store information in place when it is not already available.",
          "modified": "2022-05-20T00:01:19.453000",
          "created": "2022-04-20T14:49:03.781000",
          "tags": [
            "datasecret",
            "easeoutcubic",
            "jquery",
            "select",
            "span",
            "class js",
            "html",
            "topsearch",
            "menu",
            "mobile",
            "menu dropdown",
            "class",
            "retinaimagepath",
            "copyright",
            "imulus",
            "mit license",
            "retina",
            "function",
            "xmlhttprequest",
            "head",
            "contenttype",
            "imagei",
            "viljamis",
            "navigation",
            "date",
            "typeof h",
            "woothemes",
            "tyler smith",
            "documenttouch",
            "number",
            "knumber",
            "previous",
            "next",
            "supersubs",
            "joel birch",
            "dual",
            "google group",
            "fontsize",
            "whitespace",
            "nowrap",
            "float",
            "superfish",
            "changelog",
            "visibility",
            "hidden",
            "setposition",
            "isset",
            "srcyoutube",
            "srcvimeo",
            "image",
            "lightbox clone",
            "stephane caron",
            "typeof therel",
            "regexp",
            "play",
            "close",
            "isotope",
            "commercial use",
            "http",
            "david desandro",
            "metafizzy",
            "moz webkit",
            "o ms",
            "reset",
            "null",
            "value",
            "clamp",
            "nullrgba",
            "nullhsla",
            "execresult",
            "cache",
            "local",
            "right",
            "including",
            "this software",
            "but not",
            "limited to",
            "terms of",
            "open",
            "bsd license",
            "redistribution",
            "redistributions",
            "neither",
            "direct",
            "placeheld",
            "form",
            "wpcf7",
            "alert",
            "minimum",
            "tooshort",
            "unittag",
            "false",
            "fast",
            "typesubmit",
            "form plugin",
            "version",
            "requires jquery",
            "examples",
            "typeof define",
            "typeimage",
            "formdata",
            "stop",
            "modernizr",
            "custom build",
            "build",
            "afunction",
            "cfunction",
            "typeerror",
            "object",
            "kfunction",
            "pseudo",
            "child",
            "typeof b",
            "array",
            "error",
            "sufeffxa0",
            "attr",
            "void",
            "udc66udc67",
            "ud83d",
            "ufe0f",
            "ud83e",
            "udc68udc69",
            "udfcbudfcc",
            "u2640u2642",
            "source",
            "ud83dudc6cud83c",
            "secure",
            "result"
          ],
          "references": [
            "http://www.powr.io/powr.js",
            "http://astutemedia.asia/rackip/wp-includes/js/wp-emoji-release.min.js?ver=5.5.9",
            "xfe-URL-astutemedia.asia-stix2-2.1-export.json",
            "http://astutemedia.asia/rackip/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/modernizr.js?ver=2.5.3",
            "http://astutemedia.asia/rackip/wp-includes/js/comment-reply.min.js?ver=5.5.9",
            "http://astutemedia.asia/rackip/wp-content/plugins/contact-form-7/includes/js/jquery.form.min.js?ver=3.51.0-2014.06.20",
            "http://astutemedia.asia/rackip/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=4.5.1",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/jquery.easing.js?ver=1.2",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/jquery.color.js?ver=2.0",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/jquery.isotope.min.js?ver=1.0",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/jquery.prettyPhoto.js?ver=3.0",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/superfish.js?ver=1.4.8",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/supersubs.js?ver=0.2",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/jquery.flexslider-min.js?ver=1.8",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/tinynav.min.js?ver=1.03",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/retina.min.js?ver=1.1.0",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/custom.js?ver=1.0",
            "http://astutemedia.asia/rackip/wp-includes/js/wp-embed.min.js?ver=5.5.9",
            "xfe-URL-Powr.io-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 515,
            "URL": 1487,
            "domain": 242,
            "FileHash-SHA256": 351,
            "CVE": 1
          },
          "indicator_count": 2596,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1430 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "625f42dcc369f59f6a1e8b58",
          "name": "data102 and colohouse. Malware hosting",
          "description": "var a,b,c,d, f.substr(d),a=f, a.href, and a number of other elements:a.b.search.com.",
          "modified": "2022-05-19T00:00:49.028000",
          "created": "2022-04-19T23:16:44.418000",
          "tags": [
            "regexp",
            "rangeerror",
            "typeerror",
            "date",
            "array",
            "error",
            "this",
            "uint8array",
            "typeof b",
            "buffer",
            "class",
            "null",
            "path",
            "void",
            "marketo forms",
            "cross domain",
            "typetext",
            "typeurl",
            "typeemail",
            "typetel",
            "typenumber",
            "typedate",
            "color",
            "label",
            "input",
            "typerange",
            "typecheckbox",
            "woff2",
            "fontface",
            "u1c801c88",
            "u20b4",
            "u2de02dff",
            "ua640a69f",
            "ufe2efe2f",
            "u04b004b1",
            "u2116",
            "u1ea01ef9",
            "franklin",
            "woff",
            "u20ab",
            "u0259",
            "u1e001eff",
            "u2020",
            "u20a020ab",
            "u20ad20cf",
            "gradienttype0",
            "webkitkeyframes",
            "span",
            "button",
            "tbody",
            "textarea",
            "helvetica neue",
            "tfoot",
            "body",
            "alpha",
            "twitter",
            "roboto",
            "pitch",
            "datasecret",
            "q1kg",
            "q17g",
            "d2dg",
            "c d3r",
            "q171zg",
            "e c2ttttb",
            "c g7",
            "6n184z",
            "6f6g",
            "typeof",
            "wpcf7redirect",
            "cf7mlscurrentfs",
            "handle fire",
            "popuptemplate",
            "templatename",
            "click",
            "fieldset",
            "cf7mlsbackfs",
            "section",
            "classwidget",
            "idmenu",
            "idfooter",
            "idwidget",
            "idcomment",
            "classmenu",
            "classfooter",
            "classcomment",
            "target",
            "blank",
            "typeof e",
            "formdata",
            "typeof symbol",
            "customevent",
            "post",
            "refill",
            "wpcf7",
            "wpcf7locale",
            "wpcf7unittag",
            "typeof wpcf7",
            "boolean",
            "modernizr",
            "custom build",
            "build",
            "afunction",
            "cfunction",
            "object",
            "documenttouch",
            "websocket",
            "symbol",
            "generator",
            "function",
            "select",
            "harvest",
            "mit license",
            "optgroup",
            "nnn n",
            "n nnnn",
            "explorer",
            "options",
            "abbr",
            "element",
            "unknownerror",
            "overquerylimit",
            "requestdenied",
            "zeroresults",
            "node",
            "edge",
            "android",
            "trident",
            "unknown",
            "false",
            "iframe",
            "marker",
            "hybrid",
            "tawkspinner",
            "failed",
            "resend",
            "tawkavatar",
            "tawkvideo",
            "tawkalert",
            "tawkemoji",
            "tawkicon",
            "enter",
            "number",
            "startchatbutton",
            "u26a1",
            "typeof t",
            "invalid attempt",
            "copyright",
            "marketo",
            "remove",
            "commentform",
            "author",
            "mouseenter",
            "secure",
            "ccpa",
            "bottom",
            "fixed",
            "widget",
            "embed",
            "trigger",
            "antispam",
            "please",
            "cleantalk",
            "typeof o",
            "ajaxnonce",
            "unkown",
            "apbctajaxerror",
            "typeof define",
            "typeof module",
            "html tags",
            "ox20trnf",
            "dom element",
            "attr",
            "pseudo",
            "child",
            "udc66udc67",
            "ud83d",
            "ufe0f",
            "ud83e",
            "udc68udc69",
            "udfcbudfcc",
            "u2640u2642",
            "source",
            "image",
            "ud83dudc6cud83c",
            "qe",
            "string",
            "xhfunction",
            "yhfunction",
            "gtmptxlxz4",
            "host",
            "code",
            "script",
            "promise",
            "complete",
            "reduceright",
            "g7be8pmlskx",
            "r300",
            "typeof d",
            "caca",
            "ufunction",
            "ffunction",
            "gfunction",
            "mchtd",
            "azaz",
            "firefox",
            "opera",
            "chrome",
            "iemobile",
            "black",
            "incorrect",
            "xfunction",
            "typeof p",
            "typeof btoa",
            "vnode",
            "colohouse",
            "york",
            "learn more",
            "data center",
            "miami",
            "e cermak",
            "springs",
            "read",
            "cloud",
            "managed",
            "fast",
            "philadelphia",
            "bare",
            "metal",
            "chat",
            "accept",
            "placeheld",
            "minimum",
            "tooshort",
            "wpcf7wfreetext",
            "alert",
            "invert",
            "form",
            "animation",
            "value",
            "foundation",
            "migrate",
            "backcompat",
            "quirks mode",
            "typeof f",
            "html",
            "sufeffxa0",
            "legacy",
            "contenttype",
            "wivobjkey",
            "typehit",
            "data",
            "closure library",
            "pfunction",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction"
          ],
          "references": [
            "xfe-URL-Data102.com-stix2-2.1-export.json",
            "https://www.google-analytics.com/analytics.js",
            "https://chimpstatic.com/mcjs-connected/js/users/6c3abfa7ff8634c75cdb2b22e/ddf7a436c1746be666f330e4a.js",
            "https://app.whoisvisiting.com/who.js",
            "https://www.data102.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp",
            "https://www.data102.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1",
            "https://www.data102.com/?wordfence_lh=1&hid=2D6A812A7EB197E80D5A3978A6386BE4&r=0.5029022326538093",
            "https://www.data102.com/wp-includes/js/wp-embed.min.js?ver=00b0ffc433836dcf9f57035fded0b908",
            "https://www.data102.com/wp-content/plugins/cta/shared//shortcodes/js/spin.min.js",
            "https://www.data102.com/wp-content/plugins/contact-form-7/includes/js/scripts.js",
            "https://colohouse.com/",
            "xfe-URL-colohouse.com-stix2-2.1-export.json",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-main.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-vendor.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-vendors.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-common.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-runtime.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-app.js",
            "https://munchkin.marketo.net/161/munchkin.js",
            "https://www.googletagmanager.com/gtag/js?id=G-7BE8PMLSKX&l=dataLayer&cx=c",
            "https://embed.tawk.to/5697c34527b9b5d40b66960f/default",
            "https://www.googletagmanager.com/gtm.js?id=GTM-PTXLXZ4",
            "https://colohouse.com/wp-includes/js/wp-emoji-release.min.js?ver=5.8",
            "https://colohouse.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
            "https://colohouse.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2",
            "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/apbct-public--functions.min.js?ver=5.173",
            "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/apbct-public.min.js?ver=5.173",
            "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/cleantalk-modal.min.js?ver=5.173",
            "https://colohouse.com/wp-content/plugins/cookie-law-info/public/js/cookie-law-info-public.js?ver=2.0.4",
            "https://colohouse.com/wp-content/plugins/stop-user-enumeration/frontend/js/frontend.js?ver=1.3.31",
            "https://colohouse.com/wp-content/plugins/duracelltomi-google-tag-manager/js/gtm4wp-form-move-tracker.js?ver=1.13.1",
            "https://munchkin.marketo.net/munchkin.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-2d0d2b7c.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-32507910.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-f163fcd0.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-2d0b9454.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-4fe9d5dd.js",
            "https://app-ab02.marketo.com/js/forms2/js/forms2.min.js",
            "https://maps.googleapis.com/maps/api/js?v=3.exp&key=AIzaSyDR76rjQL_2raonHiZ6ZrPqJr-FPb7pGH0",
            "https://colohouse.com/wp-content/themes/Netrouting/assets/chosen/chosen.jquery.min.js",
            "https://colohouse.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.7",
            "https://colohouse.com/wp-content/themes/Netrouting/js/vendor/modernizr-2.8.3-respond-1.4.2.min.js",
            "https://colohouse.com/wp-content/plugins/contact-form-7/includes/js/index.js?ver=5.4.2",
            "https://colohouse.com/wp-content/plugins/link-whisper-premium/js/frontend.js?ver=1632756485",
            "https://colohouse.com/wp-content/plugins/wpcf7-redirect/build/js/wpcf7-redirect-frontend-script.js?ver=1.1",
            "https://colohouse.com/wp-content/plugins/kingcomposer/assets/frontend/js/kingcomposer.min.js?ver=2.9.6",
            "https://colohouse.com/wp-includes/js/wp-embed.min.js?ver=5.8",
            "https://colohouse.com/wp-content/plugins/wp-schema-pro/admin/assets/min-js/frontend.min.js?ver=2.7.2",
            "https://colohouse.com/wp-content/cache/autoptimize/css/autoptimize_5e11636f7dd8fb4f55e0ff84f0ed5faa.css",
            "https://fonts.googleapis.com/css?family=Libre+Franklin%3A300%2C300i%2C400%2C400i%2C600%2C600i%2C800%2C800i&subset=latin%2Clatin-ext",
            "https://fonts.googleapis.com/css?family=Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic&subset=greek%2Clatin%2Cvietnamese%2Clatin-ext%2Ccyrillic%2Ccyrillic-ext%2Cgreek-ext&ver=2.9.6",
            "https://app-ab02.marketo.com/js/forms2/css/forms2.css",
            "https://app-ab02.marketo.com/js/forms2/css/forms2-theme-simple.css",
            "https://app-ab02.marketo.com/index.php/form/XDFrame"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Qe",
              "display_name": "Qe",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1049",
              "name": "System Network Connections Discovery",
              "display_name": "T1049 - System Network Connections Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2599,
            "hostname": 952,
            "FileHash-SHA256": 458,
            "domain": 557
          },
          "indicator_count": 4566,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1431 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6252df03791ceb2df29742fe",
          "name": "reCAPTCHA",
          "description": "var a,r, i,o, r, c+(((s>>>16)*c&65535)<<16, as well as the Object, to be used as a decoder.",
          "modified": "2022-05-10T00:02:48.350000",
          "created": "2022-04-10T13:43:30.961000",
          "tags": [
            "arial",
            "roboto",
            "helvetica neue",
            "typesubmit",
            "webkitkeyframes",
            "typeerror",
            "typeof t",
            "string",
            "object",
            "typeof e",
            "symbol",
            "typeof symbol",
            "typeof window",
            "typeof self",
            "typeof r",
            "date",
            "body",
            "html",
            "typeof n",
            "error",
            "version",
            "shown",
            "click",
            "dataspy",
            "trident",
            "window",
            "lpmlightbox",
            "messaging1",
            "chat0",
            "href",
            "tabindex",
            "copyright",
            "closure library",
            "info",
            "smsclientapi",
            "null",
            "typeof",
            "regexp",
            "debug",
            "chat",
            "scraper",
            "cookie",
            "stop",
            "iframe",
            "explorer",
            "small",
            "seppuku",
            "jsloader",
            "token",
            "viewed",
            "kbcontentclick",
            "blank",
            "post",
            "document",
            "typeof storage",
            "unknownerror",
            "element",
            "overquerylimit",
            "requestdenied",
            "zeroresults",
            "notfound",
            "node",
            "edge",
            "android",
            "unknown",
            "false",
            "june",
            "generator",
            "marker",
            "hybrid",
            "month",
            "azaz09",
            "hours",
            "function",
            "number",
            "fullyear",
            "controller",
            "christ",
            "sufeffxa0",
            "class",
            "attr",
            "pseudo",
            "child",
            "js foundation",
            "typeof module",
            "directclick",
            "x22loansx22",
            "x221x22",
            "9o7nxzt",
            "x22applyx22",
            "x3dw",
            "x3dnew",
            "x22pageloadx22",
            "x22scriptx22",
            "x22uetqx22",
            "viewcontent",
            "addtocart",
            "purchase",
            "array",
            "customevent",
            "09af",
            "ver0",
            "tag0",
            "extdata0",
            "ua ch",
            "invalid",
            "license",
            "calltrkswap",
            "typeof s",
            "xmlhttprequest",
            "65535",
            "awindow",
            "cwm fjordbank",
            "activexobject",
            "tfunction",
            "sfunction",
            "yfunction",
            "googlendt"
          ],
          "references": [
            "xfe-URL-ihagoogle.com-stix2-2.1-export.json",
            "http://pagead2.googlesyndication.com/apps/domainpark/show_afd_ads.js",
            "http://sedoparking.com/frmpark/ihagoogle.com/sedopark/park.js",
            "http://instantfwding.com/px.js?ch=1",
            "http://pxlgnpgecom-a.akamaihd.net/javascripts/browserfp.min.js?templateId=11&customerId=7CUHNT0E1",
            "https://pxlgnpgecom-a.akamaihd.net/javascripts/bfp_ssn.js?templateId=11",
            "https://s.thebrighttag.com/tag?site=9O7NXzt&H=-5nu6gjg&referrer=https%3A%2F%2Fwww.zealcu.org%2Fhome-loans%2F%3Fmsclkid%3D3ef1349815a11e52b0b256cacc0bc952%26utm_source%3Dbing%26utm_medium%3Dcpc%26utm_campaign%3DSearch%253A%2520Zeal%2520Credit%2520Union%2520-%2520Mortgages%26utm_term%3Dhouse%2520mortgage%26utm_content%3DMortgage%2520General&docReferrer=http%3A%2F%2Finstantfwding.com%2F&mode=v2&cf=7500150%2C7500152&btpdb.9O7NXzt.dGZjLjc1MDAxNTE=UkVRVUVTVFMuMA&btpdb.9O7NXzt.dGZjLjc1MTUyNDU=U0VTU0lPTg&btpdb.9O7N",
            "https://cdn.callrail.com/companies/448598242/66d5efd6cbf06378ea1f/12/swap.js",
            "https://bat.bing.com/bat.js",
            "https://tag.perfectaudience.com/serve/5f59021d1911b61034000d8d.js",
            "https://s.thebrighttag.com/tag?site=9O7NXzt&referrer=https%3A%2F%2Fwww.zealcu.org%2Fhome-loans%2F%3Fmsclkid%3D3ef1349815a11e52b0b256cacc0bc952%26utm_source%3Dbing%26utm_medium%3Dcpc%26utm_campaign%3DSearch%253A%2520Zeal%2520Credit%2520Union%2520-%2520Mortgages%26utm_term%3Dhouse%2520mortgage%26utm_content%3DMortgage%2520General&docReferrer=http%3A%2F%2Finstantfwding.com%2F&H=-5nu6gjg",
            "https://code.jquery.com/jquery-3.4.1.min.js?ver=3.4.1",
            "https://integration.silvercloudinc.com/js/bundle/vendor.js",
            "https://maps.googleapis.com/maps/api/js?key=AIzaSyAMbtdeFB5s623T4LwRldWj_Vdy2t4wLkw&libraries=places",
            "https://lptag.liveperson.net/tag/tag.js?site=22027291",
            "https://integration.silvercloudinc.com/js/bundle/8.engageware-bundle.js",
            "https://lptag.liveperson.net/lptag/api/account/22027291/configuration/applications/taglets/.jsonp?v=2.0&df=2&b=2",
            "https://pixel-geo.prfct.co/tagjs?a_id=131352&source=js_tag",
            "https://bat.bing.com/p/action/56358236.js",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/388043112/?random=1649597062436&cv=9&fst=1649597062436&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=2&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2oa3u0&sendb=1&ig=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fwww.zealcu.org%2Fhome-loans%2F%3Fmsclkid%3D3ef1349815a11e52b0b256cacc0bc952%26utm_source%3Dbing%26utm_medium%3Dcpc%26utm_campaign%3DSearch%3A%2520Zeal%2520Credit%2520",
            "https://lpcdn.lpsnmedia.net/le_re/3.50.0.1-release_5103/jsv2/overlay.js?_v=3.50.0.1-release_5103",
            "https://www.zealcu.org/app/uploads/cache/js/aggregated_single_eb9d05879e4cb943b965deb3cccf05ee.js",
            "https://integration.silvercloudinc.com/js/silvercloudjs/silvercloud.js",
            "https://js.callrail.com/group/0/66d5efd6cbf06378ea1f/02836fdf-c99c-4a90-b31b-373093db654e/poll.js?t=1649597153888&ids%5B%5D=448598242",
            "https://js.callrail.com/group/0/66d5efd6cbf06378ea1f/02836fdf-c99c-4a90-b31b-373093db654e/poll.js?t=1649598014683&ids%5B%5D=448598242",
            "https://www.zealcu.org/app/uploads/cache/css/aggregated_cd3154a65f0e94fa98c08398cba54caa.css",
            "https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfjFjMaAAAAACpmnf2RfTg2U2m4Cdnku25XccJW&co=aHR0cHM6Ly93d3cuemVhbGN1Lm9yZzo0NDM.&hl=en&v=Y-cOIEkAqcfDdup_qnnmkxIC&theme=light&size=normal&cb=j4msjl4zxy97",
            "https://va.idp.liveperson.net/postmessage/postmessage.min.html?bust=1649597064004&loc=https%3A%2F%2Fwww.zealcu.org",
            "https://bid.g.doubleclick.net/xbbe/pixel?d=KAE"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1790,
            "hostname": 586,
            "FileHash-SHA256": 362,
            "domain": 330,
            "email": 1
          },
          "indicator_count": 3069,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 70,
          "modified_text": "1440 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "624de06b6d7b6fb1caada56a",
          "name": "\u542b\u7f9e\u8349\u7814\u7a76\u6240|Fi11.com",
          "description": "var a,b,c,d, f.substr(d),a=f, a.href, and a number of other elements:a.b.search.com.",
          "modified": "2022-05-06T18:05:54.002000",
          "created": "2022-04-06T18:48:11.932000",
          "tags": [
            "date",
            "cnzzdata",
            "czuuid",
            "umdistinctid",
            "toast",
            "android",
            "androidig",
            "linuxig",
            "iphoneipodiosig",
            "ipadig",
            "windows",
            "alert",
            "image",
            "object",
            "boolean",
            "error",
            "typeof t",
            "number",
            "67108863",
            "string",
            "typeerror",
            "array",
            "promise",
            "null",
            "this",
            "unknown",
            "write",
            "iframe",
            "window",
            "backspace",
            "body",
            "verify",
            "fullscreen",
            "copyright",
            "closure library",
            "pfunction",
            "contenttype",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction"
          ],
          "references": [
            "xfe-IP-137.220.241.241-stix2-2.0-export.json",
            "https://h5.hxcpp100.com/?id=22929",
            "https://www.google-analytics.com/analytics.js",
            "https://h5.hxcpp100.com/js/linkChange.js",
            "https://imgs.qgddmy.com/static_h5/js/manifest.2ae2e69a05c33dfc65f8.js",
            "https://imgs.qgddmy.com/static_h5/js/vendor.4071e145e4ea91fa5ab1.js",
            "http://push.zhanzhang.baidu.com/push.js",
            "https://js.users.51.la/21185805.js",
            "https://www.hxcpp100.com/js/linkChange.js",
            "https://c.cnzz.com/core.php?web_id=1280798474&t=z",
            "https://s9.cnzz.com/z_stat.php?id=1280743953&web_id=1280743953"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 981,
            "hostname": 279,
            "domain": 202,
            "FileHash-SHA256": 73,
            "CVE": 1
          },
          "indicator_count": 1536,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1443 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "624de0699b9516c5c53a4c60",
          "name": "\u542b\u7f9e\u8349\u7814\u7a76\u6240|Fi11.com",
          "description": "var a,b,c,d, f.substr(d),a=f, a.href, and a number of other elements:a.b.search.com.",
          "modified": "2022-05-06T18:05:54.002000",
          "created": "2022-04-06T18:48:09.891000",
          "tags": [
            "date",
            "cnzzdata",
            "czuuid",
            "umdistinctid",
            "toast",
            "android",
            "androidig",
            "linuxig",
            "iphoneipodiosig",
            "ipadig",
            "windows",
            "alert",
            "image",
            "object",
            "boolean",
            "error",
            "typeof t",
            "number",
            "67108863",
            "string",
            "typeerror",
            "array",
            "promise",
            "null",
            "this",
            "unknown",
            "write",
            "iframe",
            "window",
            "backspace",
            "body",
            "verify",
            "fullscreen",
            "copyright",
            "closure library",
            "pfunction",
            "contenttype",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction"
          ],
          "references": [
            "xfe-IP-137.220.241.241-stix2-2.0-export.json",
            "https://h5.hxcpp100.com/?id=22929",
            "https://www.google-analytics.com/analytics.js",
            "https://h5.hxcpp100.com/js/linkChange.js",
            "https://imgs.qgddmy.com/static_h5/js/manifest.2ae2e69a05c33dfc65f8.js",
            "https://imgs.qgddmy.com/static_h5/js/vendor.4071e145e4ea91fa5ab1.js",
            "http://push.zhanzhang.baidu.com/push.js",
            "https://js.users.51.la/21185805.js",
            "https://www.hxcpp100.com/js/linkChange.js",
            "https://c.cnzz.com/core.php?web_id=1280798474&t=z",
            "https://s9.cnzz.com/z_stat.php?id=1280743953&web_id=1280743953"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 981,
            "hostname": 279,
            "domain": 202,
            "FileHash-SHA256": 73,
            "CVE": 1
          },
          "indicator_count": 1536,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1443 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "624de05d2c58343224615255",
          "name": "\u542b\u7f9e\u8349\u7814\u7a76\u6240|Fi11.com",
          "description": "var a,b,c,d, f.substr(d),a=f, a.href, and a number of other elements:a.b.search.com.",
          "modified": "2022-05-06T18:05:54.002000",
          "created": "2022-04-06T18:47:57.704000",
          "tags": [
            "date",
            "cnzzdata",
            "czuuid",
            "umdistinctid",
            "toast",
            "android",
            "androidig",
            "linuxig",
            "iphoneipodiosig",
            "ipadig",
            "windows",
            "alert",
            "image",
            "object",
            "boolean",
            "error",
            "typeof t",
            "number",
            "67108863",
            "string",
            "typeerror",
            "array",
            "promise",
            "null",
            "this",
            "unknown",
            "write",
            "iframe",
            "window",
            "backspace",
            "body",
            "verify",
            "fullscreen",
            "copyright",
            "closure library",
            "pfunction",
            "contenttype",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction"
          ],
          "references": [
            "xfe-IP-137.220.241.241-stix2-2.0-export.json",
            "https://h5.hxcpp100.com/?id=22929",
            "https://www.google-analytics.com/analytics.js",
            "https://h5.hxcpp100.com/js/linkChange.js",
            "https://imgs.qgddmy.com/static_h5/js/manifest.2ae2e69a05c33dfc65f8.js",
            "https://imgs.qgddmy.com/static_h5/js/vendor.4071e145e4ea91fa5ab1.js",
            "http://push.zhanzhang.baidu.com/push.js",
            "https://js.users.51.la/21185805.js",
            "https://www.hxcpp100.com/js/linkChange.js",
            "https://c.cnzz.com/core.php?web_id=1280798474&t=z",
            "https://s9.cnzz.com/z_stat.php?id=1280743953&web_id=1280743953"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 981,
            "hostname": 279,
            "domain": 202,
            "FileHash-SHA256": 73,
            "CVE": 1
          },
          "indicator_count": 1536,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1443 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "624dbf64e7682b3bf049129c",
          "name": "Malware-USA",
          "description": "Shopseg Sistemas, a company specialising in software and equipamentos for supermercados, wedi dweud eu s\u00f4n i'n \u00f4l.",
          "modified": "2022-05-06T16:01:29.122000",
          "created": "2022-04-06T16:27:16.842000",
          "tags": [
            "dataaos",
            "100px00",
            "dataaosfade",
            "100px0",
            "dataaoszoom",
            "dataaosflip",
            "woff2",
            "fontface",
            "sans",
            "u0259",
            "u1e001eff",
            "u2020",
            "u20a020ab",
            "u20ad20cf",
            "u2113",
            "u2c602c7f",
            "reduceright",
            "number",
            "string",
            "gtl5jtn10ss",
            "regexp",
            "error",
            "r300",
            "copyright",
            "dafunction",
            "gafunction",
            "uint8array",
            "date",
            "path",
            "void",
            "const",
            "click",
            "select",
            "scroll",
            "mobile",
            "template",
            "template url",
            "license",
            "easy selector",
            "easy event",
            "easy",
            "back",
            "typeof e",
            "typeof t",
            "this",
            "main",
            "swiper",
            "button",
            "most",
            "mit license",
            "android",
            "win32",
            "null",
            "dblock",
            "email form",
            "validation",
            "action",
            "formdata",
            "api url",
            "typeof define",
            "typeof module",
            "gplv3",
            "metafizzy",
            "math",
            "plyr",
            "typeof symbol",
            "typeerror",
            "tnull",
            "cnull",
            "typeof",
            "inject",
            "playbook",
            "name",
            "getconfig",
            "default",
            "area",
            "event",
            "shadowroot",
            "boolean",
            "window",
            "trident",
            "body",
            "ofunction",
            "symbol",
            "mfunction",
            "sfunction",
            "quando",
            "quem",
            "fundada em",
            "informtica",
            "sistemas",
            "segurana",
            "softwares",
            "supermercados",
            "lojas",
            "restaurantes",
            "padarias"
          ],
          "references": [
            "http://www.shopsegsistemas.com.br/",
            "http://www.shopsegsistemas.com.br/assets/vendor/aos/aos.js",
            "http://www.shopsegsistemas.com.br/assets/vendor/bootstrap/js/bootstrap.bundle.min.js",
            "http://www.shopsegsistemas.com.br/assets/vendor/glightbox/js/glightbox.min.js",
            "http://www.shopsegsistemas.com.br/assets/vendor/isotope-layout/isotope.pkgd.min.js",
            "http://www.shopsegsistemas.com.br/assets/vendor/php-email-form/validate.js",
            "http://www.shopsegsistemas.com.br/assets/vendor/swiper/swiper-bundle.min.js",
            "http://www.shopsegsistemas.com.br/assets/js/main.js",
            "https://www.googletagmanager.com/gtag/js?id=G-TL5JTN10SS",
            "https://fonts.googleapis.com/css?family=Open+Sans:300,300i,400,400i,600,600i,700,700i%7CRaleway:300,300i,400,400i,500,500i,600,600i,700,700i%7CPoppins:300,300i,400,400i,500,500i,600,600i,700,700i",
            "http://www.shopsegsistemas.com.br/assets/vendor/aos/aos.css",
            "https://www.google.com/maps/embed?pb=!1m18!1m12!1m3!1d3730.503584706544!2d-41.67284568552043!3d-20.770905270369408!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0xbb93dcc0beb01f%3A0x97397d38847b3692!2sShopSeg%20Sistemas!5e0!3m2!1spt-BR!2sbr!4v1636561779046!5m2!1spt-BR!2sbr",
            "xfe-IP-50.116.87.164-stix2-2.0-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            },
            {
              "id": "Quando",
              "display_name": "Quando",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 254,
            "URL": 815,
            "FileHash-SHA256": 168,
            "domain": 174
          },
          "indicator_count": 1411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1443 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "624dbf641e6a04169629e662",
          "name": "Malware-USA",
          "description": "Shopseg Sistemas, a company specialising in software and equipamentos for supermercados, wedi dweud eu s\u00f4n i'n \u00f4l.",
          "modified": "2022-05-06T16:01:29.122000",
          "created": "2022-04-06T16:27:16.093000",
          "tags": [
            "dataaos",
            "100px00",
            "dataaosfade",
            "100px0",
            "dataaoszoom",
            "dataaosflip",
            "woff2",
            "fontface",
            "sans",
            "u0259",
            "u1e001eff",
            "u2020",
            "u20a020ab",
            "u20ad20cf",
            "u2113",
            "u2c602c7f",
            "reduceright",
            "number",
            "string",
            "gtl5jtn10ss",
            "regexp",
            "error",
            "r300",
            "copyright",
            "dafunction",
            "gafunction",
            "uint8array",
            "date",
            "path",
            "void",
            "const",
            "click",
            "select",
            "scroll",
            "mobile",
            "template",
            "template url",
            "license",
            "easy selector",
            "easy event",
            "easy",
            "back",
            "typeof e",
            "typeof t",
            "this",
            "main",
            "swiper",
            "button",
            "most",
            "mit license",
            "android",
            "win32",
            "null",
            "dblock",
            "email form",
            "validation",
            "action",
            "formdata",
            "api url",
            "typeof define",
            "typeof module",
            "gplv3",
            "metafizzy",
            "math",
            "plyr",
            "typeof symbol",
            "typeerror",
            "tnull",
            "cnull",
            "typeof",
            "inject",
            "playbook",
            "name",
            "getconfig",
            "default",
            "area",
            "event",
            "shadowroot",
            "boolean",
            "window",
            "trident",
            "body",
            "ofunction",
            "symbol",
            "mfunction",
            "sfunction",
            "quando",
            "quem",
            "fundada em",
            "informtica",
            "sistemas",
            "segurana",
            "softwares",
            "supermercados",
            "lojas",
            "restaurantes",
            "padarias"
          ],
          "references": [
            "http://www.shopsegsistemas.com.br/",
            "http://www.shopsegsistemas.com.br/assets/vendor/aos/aos.js",
            "http://www.shopsegsistemas.com.br/assets/vendor/bootstrap/js/bootstrap.bundle.min.js",
            "http://www.shopsegsistemas.com.br/assets/vendor/glightbox/js/glightbox.min.js",
            "http://www.shopsegsistemas.com.br/assets/vendor/isotope-layout/isotope.pkgd.min.js",
            "http://www.shopsegsistemas.com.br/assets/vendor/php-email-form/validate.js",
            "http://www.shopsegsistemas.com.br/assets/vendor/swiper/swiper-bundle.min.js",
            "http://www.shopsegsistemas.com.br/assets/js/main.js",
            "https://www.googletagmanager.com/gtag/js?id=G-TL5JTN10SS",
            "https://fonts.googleapis.com/css?family=Open+Sans:300,300i,400,400i,600,600i,700,700i%7CRaleway:300,300i,400,400i,500,500i,600,600i,700,700i%7CPoppins:300,300i,400,400i,500,500i,600,600i,700,700i",
            "http://www.shopsegsistemas.com.br/assets/vendor/aos/aos.css",
            "https://www.google.com/maps/embed?pb=!1m18!1m12!1m3!1d3730.503584706544!2d-41.67284568552043!3d-20.770905270369408!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0xbb93dcc0beb01f%3A0x97397d38847b3692!2sShopSeg%20Sistemas!5e0!3m2!1spt-BR!2sbr!4v1636561779046!5m2!1spt-BR!2sbr",
            "xfe-IP-50.116.87.164-stix2-2.0-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            },
            {
              "id": "Quando",
              "display_name": "Quando",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 254,
            "URL": 815,
            "FileHash-SHA256": 168,
            "domain": 174
          },
          "indicator_count": 1411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1443 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6249814433d08ebcfc2b6e2a",
          "name": "Botnet",
          "description": "function ra(a,b,c,d,e,f, a new type of node, which can only be defined by its own type, is the same as its current type.",
          "modified": "2022-05-03T00:01:26.398000",
          "created": "2022-04-03T11:13:08.540000",
          "tags": [
            "hide",
            "regexp",
            "enter",
            "date",
            "arrowup",
            "down",
            "arrowdown",
            "left",
            "arrowleft",
            "right",
            "blank",
            "typeof e",
            "function",
            "arraybuffer",
            "promise",
            "matt zabriskie",
            "typeof",
            "typeof define",
            "array",
            "typeof formdata",
            "error",
            "null",
            "typeof console",
            "mit license",
            "object",
            "tfunction",
            "knew t",
            "qfunction",
            "typeof window",
            "typeof r",
            "string",
            "azaz",
            "button",
            "vnode",
            "number",
            "backspace",
            "uint8array",
            "typeof t",
            "typeof location",
            "blob",
            "typeof symbol",
            "typeof n",
            "javascript",
            "please",
            "strong",
            "tbody",
            "span",
            "thead",
            "tfoot",
            "typecheckbox",
            "typeradio",
            "href",
            "typesearch",
            "typedate",
            "typetime",
            "twitter",
            "applewebkit",
            "gecko",
            "khtml",
            "safari",
            "mac os",
            "alert",
            "base",
            "trident",
            "presto",
            "android",
            "webpackrequire",
            "name",
            "iterator",
            "typedarray",
            "prototype",
            "index",
            "meta",
            "target",
            "infinity",
            "zero",
            "epsilon",
            "observer",
            "trim",
            "enumerate",
            "freeze",
            "internal",
            "bind",
            "window",
            "next",
            "find",
            "this",
            "rest",
            "middle",
            "sweetalert2",
            "yfunction",
            "boolean",
            "cancel",
            "typeof document",
            "n okn",
            "canceln n",
            "cfunction",
            "typeof c",
            "copyright",
            "bootstrap",
            "rolemenu",
            "typeof f",
            "typeof g",
            "cookie plugin",
            "https",
            "klaus hartl",
            "register",
            "nodecommonjs",
            "factory",
            "jquery",
            "write",
            "typeof b",
            "pseudo",
            "child",
            "sufeffxa0",
            "class",
            "attr"
          ],
          "references": [
            "https://app.fanzhi.xyz/dist/js/jquery.min.js",
            "https://app.fanzhi.xyz/dist/js/jquery.cookie.js",
            "https://app.fanzhi.xyz/dist/vendors/bootstrap/js/bootstrap.min.js",
            "https://pv.sohu.com/cityjson?ie=utf-8",
            "https://app.fanzhi.xyz/dist/vendors/sweetalert2/sweetalert2.min.js",
            "https://app.fanzhi.xyz/dist/vendors/core-js/core.js",
            "https://app.fanzhi.xyz/dist/js/app.base.js",
            "https://app.fanzhi.xyz/dist/vendors/bootstrap/css/bootstrap.min.css",
            "https://app.fanzhi.xyz/dist/css/vip.css",
            "https://fengweics.com/",
            "https://kf.cdsanheli.com/online.html?cid=e3e6922f27c54ad485cf59aee1204615",
            "https://kf.cdsanheli.com/js/socket.io.min.js",
            "https://kf.cdsanheli.com/js/vue.min.js",
            "https://kf.cdsanheli.com/js/vue-i18n.min.js",
            "https://kf.cdsanheli.com/js/axios.min.js",
            "https://kf.cdsanheli.com/js/online.3de8ba00.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1547,
            "domain": 246,
            "hostname": 619,
            "FileHash-SHA256": 124,
            "CVE": 2
          },
          "indicator_count": 2538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1447 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6249814713d29e4f994fc037",
          "name": "Botnet",
          "description": "function ra(a,b,c,d,e,f, a new type of node, which can only be defined by its own type, is the same as its current type.",
          "modified": "2022-05-03T00:01:26.398000",
          "created": "2022-04-03T11:13:11.584000",
          "tags": [
            "hide",
            "regexp",
            "enter",
            "date",
            "arrowup",
            "down",
            "arrowdown",
            "left",
            "arrowleft",
            "right",
            "blank",
            "typeof e",
            "function",
            "arraybuffer",
            "promise",
            "matt zabriskie",
            "typeof",
            "typeof define",
            "array",
            "typeof formdata",
            "error",
            "null",
            "typeof console",
            "mit license",
            "object",
            "tfunction",
            "knew t",
            "qfunction",
            "typeof window",
            "typeof r",
            "string",
            "azaz",
            "button",
            "vnode",
            "number",
            "backspace",
            "uint8array",
            "typeof t",
            "typeof location",
            "blob",
            "typeof symbol",
            "typeof n",
            "javascript",
            "please",
            "strong",
            "tbody",
            "span",
            "thead",
            "tfoot",
            "typecheckbox",
            "typeradio",
            "href",
            "typesearch",
            "typedate",
            "typetime",
            "twitter",
            "applewebkit",
            "gecko",
            "khtml",
            "safari",
            "mac os",
            "alert",
            "base",
            "trident",
            "presto",
            "android",
            "webpackrequire",
            "name",
            "iterator",
            "typedarray",
            "prototype",
            "index",
            "meta",
            "target",
            "infinity",
            "zero",
            "epsilon",
            "observer",
            "trim",
            "enumerate",
            "freeze",
            "internal",
            "bind",
            "window",
            "next",
            "find",
            "this",
            "rest",
            "middle",
            "sweetalert2",
            "yfunction",
            "boolean",
            "cancel",
            "typeof document",
            "n okn",
            "canceln n",
            "cfunction",
            "typeof c",
            "copyright",
            "bootstrap",
            "rolemenu",
            "typeof f",
            "typeof g",
            "cookie plugin",
            "https",
            "klaus hartl",
            "register",
            "nodecommonjs",
            "factory",
            "jquery",
            "write",
            "typeof b",
            "pseudo",
            "child",
            "sufeffxa0",
            "class",
            "attr"
          ],
          "references": [
            "https://app.fanzhi.xyz/dist/js/jquery.min.js",
            "https://app.fanzhi.xyz/dist/js/jquery.cookie.js",
            "https://app.fanzhi.xyz/dist/vendors/bootstrap/js/bootstrap.min.js",
            "https://pv.sohu.com/cityjson?ie=utf-8",
            "https://app.fanzhi.xyz/dist/vendors/sweetalert2/sweetalert2.min.js",
            "https://app.fanzhi.xyz/dist/vendors/core-js/core.js",
            "https://app.fanzhi.xyz/dist/js/app.base.js",
            "https://app.fanzhi.xyz/dist/vendors/bootstrap/css/bootstrap.min.css",
            "https://app.fanzhi.xyz/dist/css/vip.css",
            "https://fengweics.com/",
            "https://kf.cdsanheli.com/online.html?cid=e3e6922f27c54ad485cf59aee1204615",
            "https://kf.cdsanheli.com/js/socket.io.min.js",
            "https://kf.cdsanheli.com/js/vue.min.js",
            "https://kf.cdsanheli.com/js/vue-i18n.min.js",
            "https://kf.cdsanheli.com/js/axios.min.js",
            "https://kf.cdsanheli.com/js/online.3de8ba00.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1547,
            "domain": 246,
            "hostname": 619,
            "FileHash-SHA256": 124,
            "CVE": 2
          },
          "indicator_count": 2538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1447 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "626957a1170a7e91146c5dea",
          "name": "one google maps api call and one generic key - causing a large chunk of cyber disruption and compromise",
          "description": "",
          "modified": "2022-04-27T14:48:01.672000",
          "created": "2022-04-27T14:48:01.672000",
          "tags": [
            "error",
            "element",
            "unknownerror",
            "overquerylimit",
            "requestdenied",
            "zeroresults",
            "object",
            "edge",
            "node",
            "android",
            "null",
            "trident",
            "unknown",
            "false",
            "date",
            "generator",
            "iframe",
            "marker",
            "hybrid"
          ],
          "references": [
            "https://maps.googleapis.com/maps/api/js?key=AIzaSyBaRgbnzMy4cEMm5e2h7pyryfYav7ComTo"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 352,
            "FileHash-SHA256": 135,
            "hostname": 149,
            "domain": 53
          },
          "indicator_count": 689,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 392,
          "modified_text": "1452 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6236040817a626a23c3218e2",
          "name": "forgotten45s.com",
          "description": "",
          "modified": "2022-04-18T00:07:16.048000",
          "created": "2022-03-19T16:25:44.243000",
          "tags": [
            "server",
            "date",
            "iana id",
            "registrar abuse",
            "contact phone",
            "domain status",
            "registrar url",
            "registrar whois",
            "llc domain",
            "abuse contact",
            "algorithm",
            "key identifier",
            "llc creation",
            "rank value",
            "ingestion time",
            "statvoo",
            "dns records"
          ],
          "references": [
            "forgotten45s.com1.pdf",
            "forgotten45s.com.pdf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 362,
            "URL": 1063,
            "CVE": 1,
            "domain": 356,
            "FileHash-SHA256": 500,
            "email": 3,
            "FileHash-MD5": 22,
            "FileHash-SHA1": 16,
            "CIDR": 4
          },
          "indicator_count": 2327,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 406,
          "modified_text": "1462 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62276abfaa65cd33f64331f8",
          "name": "TarrantCounty.com ~ 03.01.2022",
          "description": "",
          "modified": "2022-04-07T00:04:02.553000",
          "created": "2022-03-08T14:39:59.235000",
          "tags": [
            "march",
            "lookup go",
            "rescan add",
            "verdict report",
            "de summary",
            "http",
            "redirects links",
            "behaviour",
            "similar dom",
            "content api",
            "value",
            "search url",
            "search domain",
            "scan url",
            "url search",
            "domain scan",
            "url url",
            "motor vehicle",
            "aqb1",
            "eventsevent10",
            "meta",
            "show",
            "download go",
            "full url",
            "reverse dns",
            "resource",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "response",
            "main",
            "milan",
            "apache",
            "paris",
            "accept"
          ],
          "references": [
            "TarrantCounty3df.pdf",
            "TarantCounty2df.pdf",
            "TarrantCounty4df.pdf",
            "TarrantCounty5df.pdf",
            "tarrant23df.pdf",
            "TarrantCounty1df.pdf",
            "tarrantcounty.com:en:elections:Voter-Information:Voter- Registration.html%22,.pdf",
            "TarrantCounty6df.pdf",
            "TarrantCounty7df.pdf",
            "TarrantCounty10df.pdf",
            "TarrantCounty9df.pdf",
            "TarrantCounty17df.pdf",
            "TarrantCounty15df.pdf",
            "TarrantCounty12df.pdf",
            "TarrantCounty14df.pdf",
            "tarrantcounty8df.pdf",
            "TarrantCounty18df.pdf",
            "TarrantCounty19df.pdf",
            "TarrantCounty21df.pdf",
            "tarrantcounty22df.pdf",
            "TarrantCounty20df.pdf",
            "tarrantcountydf.pdf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4134,
            "hostname": 1607,
            "domain": 838,
            "FileHash-SHA256": 1078,
            "FileHash-SHA1": 2,
            "email": 3,
            "CIDR": 4,
            "FileHash-MD5": 15
          },
          "indicator_count": 7681,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 406,
          "modified_text": "1473 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6249afa504d9fb8ce09eb0df",
          "name": "\u5fc5\u535a\u4f53\u80b2-botnet",
          "description": "A-word-split-by-words, a-single-sigBytes, is an extension of the word-stringing system used by the BBC to create the words in the English language.",
          "modified": "2022-04-03T14:31:01.201000",
          "created": "2022-04-03T14:31:01.201000",
          "tags": [
            "object",
            "function",
            "kefuheader",
            "kefufooter",
            "scoremodal",
            "error404",
            "date",
            "mmdd hh",
            "chat",
            "aobject",
            "javascript",
            "please",
            "strong",
            "datav1e1730b8",
            "emoji",
            "helvetica",
            "arial",
            "datavce814536",
            "noto color",
            "apple color",
            "segoe ui",
            "datav5edb4000",
            "datav6d25583c",
            "promise",
            "error",
            "array",
            "name",
            "regexp",
            "uint8array",
            "string",
            "typeerror",
            "null",
            "this",
            "void",
            "internal",
            "patch",
            "target",
            "4096",
            "6144",
            "4112",
            "light",
            "dark",
            "generator",
            "infinity",
            "shutdown",
            "direct"
          ],
          "references": [
            "https://ejp3z5.com/h5/js/chunk-vendors.0903293f.js",
            "https://ejp3z5.com/h5/js/app.71cd3a66.js",
            "https://ejp3z5.com/h5/css/app.61c96454.css",
            "http://bibo113.com/",
            "https://ejp3z5.com/#/?business_id=66&access_key=3532E209E7051ED50C08BF7D92C3FC44"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 113,
            "URL": 665,
            "hostname": 145,
            "FileHash-SHA256": 40,
            "email": 1
          },
          "indicator_count": 964,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1476 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62497a9c72edc277fb20e52f",
          "name": "'+titlestr+'",
          "description": "If you want to see what is going on at this time of year, spare a thought for T.t.m.T.g.ts.com; T-t=t,",
          "modified": "2022-04-03T10:44:44.074000",
          "created": "2022-04-03T10:44:44.074000",
          "tags": [
            "typeof t",
            "typeof symbol",
            "nthis",
            "msger",
            "typeof e",
            "image",
            "error",
            "typeerror",
            "new date",
            "codeverify",
            "0xa60881",
            "0x1e0610",
            "0x489cca",
            "0x4d5bd1",
            "0x1a7a9a",
            "0x3145fc",
            "0x2d9acb",
            "0xbf1b3e",
            "0x47699d",
            "push",
            "shift",
            "date",
            "cookie",
            "slice",
            "open",
            "code",
            "path",
            "info",
            "null",
            "this",
            "webpackrequire",
            "othis",
            "object",
            "array",
            "executor",
            "canvas",
            "function",
            "slidercaptcha",
            "createelement",
            "textdanger",
            "plugin",
            "rgba",
            "imagedata",
            "false",
            "touchstart",
            "trident",
            "click",
            "typeof",
            "typeof define",
            "typeof c",
            "copyright",
            "twitter",
            "bootstrap",
            "rolemenu",
            "typeof f",
            "typeof g",
            "james levine",
            "udid",
            "x61x70x70x6cx79",
            "azaz",
            "0x5372",
            "0x19",
            "0x3de55b",
            "0x24a5d4",
            "0x5c",
            "0x19c89f",
            "0x2f1b4a",
            "0x4d1e1f",
            "0x1a",
            "0x29",
            "window",
            "honor",
            "root",
            "length",
            "indexof",
            "x0ax20x20x20x20",
            "location",
            "math",
            "0x10",
            "0x18",
            "history",
            "config",
            "onload",
            "android",
            "regexp",
            "x20trnf",
            "class",
            "attr",
            "pseudo",
            "child",
            "swiper",
            "most",
            "mit license",
            "january",
            "typeof b",
            "sufeffxa0",
            "void",
            "typeof n",
            "appappapp",
            "next",
            "toh5",
            "channelcode",
            "androidos",
            "linux",
            "ipad",
            "macintosh",
            "promise",
            "xmlhttprequest",
            "0x1d9131",
            "0x180bcc",
            "0x4b6177",
            "0x13f349",
            "0x3bcb54",
            "0xbbe80d",
            "0x57b7de",
            "0x2ea74e",
            "0x4fb0f2",
            "0x25f113",
            "tencent",
            "barrio",
            "width",
            "accept",
            "cnzzdata",
            "czuuid",
            "umdistinctid",
            "version",
            "october",
            "win32",
            "name",
            "html",
            "meta",
            "viewport"
          ],
          "references": [
            "http://www.laijcm.com/common.js",
            "http://www.laijcm.com/tj.js",
            "http://kk164.xyz/",
            "https://x4707.com:5443/?register=1",
            "https://6112.hnsstjc.com/a002/xpjtz.php",
            "https://6112.hnsstjc.com/a002/js/fontSize.js",
            "https://6112.hnsstjc.com/a002/js/jquery-1.8.3.min.js",
            "https://6112.hnsstjc.com/a002/js/swiper.min.js",
            "https://6112.hnsstjc.com/a002/xpj.php",
            "https://www.xvsgwa.com/qz1IJUpc.html",
            "https://c.cnzz.com/core.php?web_id=1280875449&t=z",
            "https://s9.cnzz.com/z_stat.php?id=1280875449&web_id=1280875449",
            "https://www.bibo14.app:2611/js/jquery-1.11.3.min.js",
            "https://www.bibo14.app:2611/js/cncc.js",
            "https://www.bibo14.app:2611/js/xinstall_inner_e.min.js?v=1004",
            "https://www.bibo14.app:2611/js/down.js?v=1022",
            "https://www.bibo14.app:2611/css/h5/reset.css",
            "https://www.dongtiankuangye.com/a002/config.js",
            "https://www.dongtiankuangye.com/a002/js/plugins/swiper/swiper.min.js",
            "https://www.dongtiankuangye.com/a002/js/libs/jquery-1.12.4/jquery-1.12.4.min.js",
            "https://www.dongtiankuangye.com/a002/js/plugins/swiper/swiper.min.css",
            "https://pojd783.cc:8443/index.html?shareName=pojd783.cc",
            "https://sdk.51.la/event/js-sdk-event.min.js?u=Je0ztO5GuwfJ6eip",
            "https://sdk.51.la/js-sdk-pro.min.js",
            "https://pojd783.cc:8443/js/sharetrace.min.js",
            "https://js112.oss-accelerate.aliyuncs.com/os.js",
            "https://ty66as.jxdysw.cn/1whpv",
            "https://ty66as.jxdysw.cn/dist/vendors/bootstrap/js/bootstrap.min.js",
            "https://ty66as.jxdysw.cn/dist/vendors/clipboard/clipboard.min.js",
            "https://ty66as.jxdysw.cn/dist/captcha/disk/slidercaptcha.js",
            "https://ssl.captcha.qq.com/TCaptcha.js",
            "https://cstaticdun.126.net/load.min.js?t=202007291602",
            "https://t.captcha.qq.com/template/drag_ele.html?t=1648982190651",
            "https://captcha.gtimg.com/1/tcaptcha-frame.db8b9289.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1528,
            "hostname": 543,
            "domain": 209,
            "FileHash-SHA256": 127,
            "email": 1,
            "FileHash-MD5": 4
          },
          "indicator_count": 2412,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1476 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "621bc3aa050a6c5693595f25",
          "name": "Zetalytics API",
          "description": "",
          "modified": "2022-03-29T00:03:34.773000",
          "created": "2022-02-27T18:32:10.542000",
          "tags": [
            "google",
            "google llc",
            "detected",
            "expand overall",
            "http",
            "amazonaes",
            "openssl",
            "lookup go",
            "rescan add",
            "verdict report",
            "behaviour",
            "june",
            "apache",
            "search url",
            "search domain",
            "scan url",
            "url search",
            "domain scan",
            "url url",
            "us summary",
            "line",
            "google maps",
            "api warning",
            "redirects links",
            "similar dom",
            "content api",
            "domains",
            "Ransomware"
          ],
          "references": [
            "zetalytics .pdf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win.Virus.PolyRansom-5704625-0",
              "display_name": "Win.Virus.PolyRansom-5704625-0",
              "target": null
            },
            {
              "id": "Win32:Cryptor",
              "display_name": "Win32:Cryptor",
              "target": null
            },
            {
              "id": "TELPER:CERT:SoftwareBundler:Win32/Bunpredelt",
              "display_name": "TELPER:CERT:SoftwareBundler:Win32/Bunpredelt",
              "target": null
            },
            {
              "id": "Trojan:Win32/Danabot.G",
              "display_name": "Trojan:Win32/Danabot.G",
              "target": "/malware/Trojan:Win32/Danabot.G"
            },
            {
              "id": "Backdoor:Win32/Poison.E",
              "display_name": "Backdoor:Win32/Poison.E",
              "target": "/malware/Backdoor:Win32/Poison.E"
            },
            {
              "id": "ALF:PUA:Block:IObit.R!MTB",
              "display_name": "ALF:PUA:Block:IObit.R!MTB",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 754,
            "URL": 2375,
            "domain": 441,
            "hostname": 833,
            "CIDR": 5,
            "FileHash-MD5": 2,
            "email": 1
          },
          "indicator_count": 4411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 406,
          "modified_text": "1482 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "http://appbyweb.net/AppByWeb",
        "https://www.allwest.com/wp-content/plugins/svg-support/js/min/svgs-inline-min.js?ver=1.0.0",
        "http://www.elizabethmesser.com/wp-includes/js/mediaelement/mediaelement-and-player.min.js?ver=4.2.16",
        "https://www.googletagmanager.com/gtag/js?id=AW-CONVERSION_ID",
        "http://appbyweb.net/AppByWeb/js/jquery.stellar.min.js",
        "https://colohouse.com/wp-content/plugins/wpcf7-redirect/build/js/wpcf7-redirect-frontend-script.js?ver=1.1",
        "https://pojd783.cc:8443/index.html?shareName=pojd783.cc",
        "xfe-URL-astutemedia.asia-stix2-2.1-export.json",
        "https://ejp3z5.com/h5/js/app.71cd3a66.js",
        "xfe-URL-colohouse.com-stix2-2.1-export.json",
        "dns.army \u2022 www.dcopr.dns.army  \u2022 www.glsyaiwjj.dns.army \u2022  www.wgmvk.dns.army",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/981889198/?random=1650488340630&cv=9&fst=1650488340630&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2oa4i1&sendb=1&ig=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fwww.allwest.com%2F&tiba=All%20West%20Communications%20-%20telecommunication%20company&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
        "https://www.data102.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1",
        "xfe-IP-103.24.249.209-stix2-2.1-export.json",
        "https://widget.trustpilot.com/bootstrap/v5/tp.widget.bootstrap.min.js",
        "http://lifehacker.com/assets/stylesheets/app-a873b056f0ea955e4ff0abebb210e5a6.css",
        "http://www.elizabethmesser.com/wp-content/plugins/jetpack/css/jetpack.css?ver=10.9.1",
        "https://www.googletagmanager.com/gtm.js?id=GTM-PTXLXZ4",
        "https://maps.googleapis.com/maps/api/js?v=3.exp&key=AIzaSyDR76rjQL_2raonHiZ6ZrPqJr-FPb7pGH0",
        "https://fengweics.com/",
        "https://va.idp.liveperson.net/postmessage/postmessage.min.html?bust=1649597064004&loc=https%3A%2F%2Fwww.zealcu.org",
        "TarrantCounty7df.pdf",
        "http://appbyweb.net/AppByWeb/js/jquery.easing.1.3.js",
        "http://www.elizabethmesser.com/wp-content/themes/salient/js/infinitescroll.js?ver=1.1",
        "https://m.west.cn/jscripts/baidutj/hm.js",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/modernizr.js?ver=2.5.3",
        "https://lptag.liveperson.net/tag/tag.js?site=22027291",
        "http://www.elizabethmesser.com/wp-content/themes/salient/js/modernizr.js?ver=2.6.2",
        "Legal court documented  agreement to allow and pay target to hire cyber investigators",
        "https://colohouse.com/wp-content/plugins/kingcomposer/assets/frontend/js/kingcomposer.min.js?ver=2.9.6",
        "https://my.frantech.ca/templates/lagom/assets/js/whmcs-custom.min.js?v=1.4.3",
        "xfe-URL-appbyweb.net-stix2-2.1-export.json",
        "https://hybrid-analysis.com/sample/f90162e65235185a24e9f20d855371b8ad7462d50d7a57851d000cfd5116f76d/63aef1a83e3bb16765527bb8",
        "https://colohouse.com/wp-content/plugins/link-whisper-premium/js/frontend.js?ver=1632756485",
        "https://fonts.googleapis.com/css?family=Open+Sans:300,300i,400,400i,600,600i,700,700i%7CRaleway:300,300i,400,400i,500,500i,600,600i,700,700i%7CPoppins:300,300i,400,400i,500,500i,600,600i,700,700i",
        "https://www.allwest.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.9",
        "https://cop.supply/proxies-lists/ \u2022 https://cop.supply/shopify-bots/",
        "https://integration.silvercloudinc.com/js/bundle/8.engageware-bundle.js",
        "http://www.elizabethmesser.com/wp-content/plugins/woocommerce/assets/js/frontend/add-to-cart.min.js?ver=6.5.1",
        "xfe-URL-West.cn-stix2-2.1-export.json",
        "https://imgs.qgddmy.com/static_h5/js/vendor.4071e145e4ea91fa5ab1.js",
        "https://bat.bing.com/p/action/56358236.js",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-app.js",
        "https://app.fanzhi.xyz/dist/vendors/bootstrap/js/bootstrap.min.js",
        "https://kf.cdsanheli.com/js/vue-i18n.min.js",
        "http://ianswertomom.com/bible-verses-struggling-contentment-mom/  I",
        "https://www.virustotal.com/gui/main.900e36f7a852b9863014.js",
        "https://beacon-v2.helpscout.net/",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-common.js",
        "http://theconstantcompany.com",
        "https://www.googletagmanager.com/gtag/js?id=UA-41133527-2",
        "https://www.bibo14.app:2611/js/cncc.js",
        "https://kf.cdsanheli.com/online.html?cid=e3e6922f27c54ad485cf59aee1204615",
        "http://sedoparking.com/frmpark/ihagoogle.com/sedopark/park.js",
        "tarrantcounty22df.pdf",
        "https://app.fanzhi.xyz/dist/vendors/core-js/core.js",
        "https://www.googletagmanager.com/gtag/js?id=UA-115476727-1",
        "https://kf.cdsanheli.com/js/online.3de8ba00.js",
        "https://munchkin.marketo.net/munchkin.js",
        "http://pagead2.googlesyndication.com/apps/domainpark/show_afd_ads.js",
        "https://s.thebrighttag.com/tag?site=9O7NXzt&referrer=https%3A%2F%2Fwww.zealcu.org%2Fhome-loans%2F%3Fmsclkid%3D3ef1349815a11e52b0b256cacc0bc952%26utm_source%3Dbing%26utm_medium%3Dcpc%26utm_campaign%3DSearch%253A%2520Zeal%2520Credit%2520Union%2520-%2520Mortgages%26utm_term%3Dhouse%2520mortgage%26utm_content%3DMortgage%2520General&docReferrer=http%3A%2F%2Finstantfwding.com%2F&H=-5nu6gjg",
        "http://www.elizabethmesser.com/wp-content/plugins/js_composer_salient/assets/js/dist/js_composer_front.min.js?ver=5.0.1",
        "https://colohouse.com/wp-content/plugins/contact-form-7/includes/js/index.js?ver=5.4.2",
        "https://www.zealcu.org/app/uploads/cache/css/aggregated_cd3154a65f0e94fa98c08398cba54caa.css",
        "https://www.googletagmanager.com/gtag/js?id=AW-981889198",
        "http://www.shopsegsistemas.com.br/assets/vendor/isotope-layout/isotope.pkgd.min.js",
        "https://integration.silvercloudinc.com/js/silvercloudjs/silvercloud.js",
        "TarrantCounty20df.pdf",
        "https://links.mail.samsara.com/s/c/P9R6gGlExR4nfCwqwJXUmr7NmKcMNde4ZBhCFprlVtsFNgh-4tuTWla0aXN9rIWCjrWtn0Vln7x-hexxVBlY3xxvnEevR8qJU5G5xV3__wo-X7kkpSOhJVfejac-Xk8qu6zs5Z-tILwWYRkNScZNGlAqfwQuJuRw5M-n_ZKI6tuY5XGCZAqWoQepi1NnJiW4wZJkzZlOwGtNkusbuKDcMsLVrrhji2eKh4kYgrJp_SeycJRhasLFCQ3c2bPu4sahEWpcHZrQBaxvdfQgTEno8kV-RJdTDO0zK5MyWDJLeds7mnaDrxlb0O2zmhebUdlHE0R0xHi25dympBUpMlLsQV8bx1WUTOfgK4k0ci9o_2Gbfe22-jLxsJN-msV6pxWYQMaxRNFd4iZRC9J9Z1SC5MBqbvNzqdt98kFdpibnv_QIHdhFyHOR_Ip_LX67Dncc8V8OvAi-H5phfeSyDzwdzf2FQIi82",
        "http://www.shopsegsistemas.com.br/assets/vendor/aos/aos.css",
        "zetalytics .pdf",
        "https://hybrid-analysis.com/sample/e126ff94aac3340dc05a27f062c4267cbfeaa998248bef0e72f000bba711aa76/62e6fb475edc950b894aa7b0",
        "http://instantfwding.com/px.js?ch=1",
        "https://d3e54v103j8qbb.cloudfront.net/js/jquery-3.5.1.min.dc5e7f18c8.js?site=5f087b2cc04e635c7a4b7e35",
        "https://weglot.com/wp-content/plugins/elementor/assets/lib/font-awesome/js/v4-shims.min.js",
        "https://ty66as.jxdysw.cn/1whpv",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-2d0b9454.js",
        "http://www.elizabethmesser.com/",
        "https://amano.inboundtools.com/tpcontact  URL https://armg.inboundtools.com/  URL https://gaiax.inboundtools.com/internship  URL https://hmk.inboundtools.com/  URL https://hmk.inboundtools.com/form/assetview_siryo_sier",
        "https://js.hsleadflows.net/leadflows.js",
        "http://www.shopsegsistemas.com.br/assets/vendor/glightbox/js/glightbox.min.js",
        "http://www.shopsegsistemas.com.br/assets/vendor/swiper/swiper-bundle.min.js",
        "http://www.powr.io/powr.js",
        "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
        "https://www.google.com/recaptcha/api.js?render=6Ld8S6EUAAAAAExG_6DO_Jj4DLY35ybebbA8R_eA&ver=3.0",
        "https://js.hsadspixel.net/fb.js",
        "https://chimpstatic.com/mcjs-connected/js/users/6c3abfa7ff8634c75cdb2b22e/ddf7a436c1746be666f330e4a.js",
        "https://beacon-v2.helpscout.net/static/js/main.4a4d1187.js",
        "https://www.allwest.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
        "https://colohouse.com/wp-includes/js/wp-embed.min.js?ver=5.8",
        "http://appbyweb.net/AppByWeb/js/modernizr-2.6.2.min.js",
        "https://6112.hnsstjc.com/a002/xpjtz.php",
        "https://secure.gravatar.com/js/gprofiles.js?ver=202221",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-32507910.js",
        "https://www.gstatic.com/recaptcha/releases/QENb_qRrX0-mQMyENQjD6Fuj/recaptcha__en.js",
        "https://www.allwest.com/wp-content/plugins/wp-smushit/app/assets/js/smush-lazy-load.min.js?ver=3.9.5",
        "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/cleantalk-modal.min.js?ver=5.173",
        "https://js112.oss-accelerate.aliyuncs.com/os.js",
        "https://static.hotjar.com/c/hotjar-2950866.js?sv=7",
        "https://integration.silvercloudinc.com/js/bundle/vendor.js",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-4fe9d5dd.js",
        "https://embed.tawk.to/5697c34527b9b5d40b66960f/default",
        "http://www.elizabethmesser.com/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=3.15.0",
        "https://sdk.51.la/event/js-sdk-event.min.js?u=Je0ztO5GuwfJ6eip",
        "https://ejp3z5.com/#/?business_id=66&access_key=3532E209E7051ED50C08BF7D92C3FC44",
        "forgotten45s.com1.pdf",
        "https://ejp3z5.com/h5/js/chunk-vendors.0903293f.js",
        "https://assets.website-files.com/5f087b2cc04e635c7a4b7e35/js/develapp.b94842ca8.js",
        "https://www.googletagmanager.com/gtag/js?id=G-6Q8LH84QH0&l=dataLayer&cx=c",
        "https://www.dongtiankuangye.com/a002/js/plugins/swiper/swiper.min.css",
        "https://www.xvsgwa.com/qz1IJUpc.html",
        "http://ianswertomom.com/develop-wise-woman-within-yourself",
        "http://www.elizabethmesser.com/wp-content/plugins/bloom/js/jquery.uniform.min.js?ver=1.1.8",
        "http://www.elizabethmesser.com/wp-content/plugins/js_composer_salient/assets/js/vendors/woocommerce-add-to-cart.js?ver=5.0.1",
        "tarrant23df.pdf",
        "firebase-auth-eich0v.pages.dev",
        "https://script.hotjar.com/modules.7a321ecb93fde9f07226.js",
        "original dropped file discovery url",
        "http://astutemedia.asia/rackip/wp-includes/js/wp-emoji-release.min.js?ver=5.5.9",
        "https://h5.hxcpp100.com/?id=22929",
        "http://www.elizabethmesser.com/wp-content/plugins/woocommerce/assets/js/jquery-blockui/jquery.blockUI.min.js?ver=2.7.0-wc.6.5.1",
        "http://kk164.xyz/",
        "https://js.callrail.com/group/0/66d5efd6cbf06378ea1f/02836fdf-c99c-4a90-b31b-373093db654e/poll.js?t=1649597153888&ids%5B%5D=448598242",
        "https://www.allwest.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2",
        "https://bat.bing.com/bat.js",
        "https://colohouse.com/wp-content/themes/Netrouting/assets/chosen/chosen.jquery.min.js",
        "https://lordseriala.life/6337-zvezdnye-vojny-opornaja-komanda.html",
        "https://www.zealcu.org/app/uploads/cache/js/aggregated_single_eb9d05879e4cb943b965deb3cccf05ee.js",
        "https://pixel-geo.prfct.co/tagjs?a_id=131352&source=js_tag",
        "https://colohouse.com/wp-content/cache/autoptimize/css/autoptimize_5e11636f7dd8fb4f55e0ff84f0ed5faa.css",
        "https://colohouse.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2",
        "https://weglot.com/wp-content/plugins/addon-elements-for-elementor-page-builder/assets/js/animated-main.min.js",
        "https://kf.cdsanheli.com/js/socket.io.min.js",
        "This website contains the details of an anti-virus scan conducted by the MetaDefender, which aims to identify and remove malware from websites, websites and social media sites, including Facebook, Twitter and YouTube.",
        "https://www.data102.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp",
        "TarrantCounty18df.pdf",
        "https://app.whoisvisiting.com/who.js",
        "https://assets.website-files.com/5f087b2cc04e635c7a4b7e35/css/develapp.36c3d32f6.min.css",
        "tarrantcounty.com:en:elections:Voter-Information:Voter- Registration.html%22,.pdf",
        "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
        "https://www.googletagmanager.com/gtag/js?id=G-TL5JTN10SS",
        "http://appbyweb.net/AppByWeb/js/bootstrap.min.js",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/388043112/?random=1649597062436&cv=9&fst=1649597062436&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=2&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2oa3u0&sendb=1&ig=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fwww.zealcu.org%2Fhome-loans%2F%3Fmsclkid%3D3ef1349815a11e52b0b256cacc0bc952%26utm_source%3Dbing%26utm_medium%3Dcpc%26utm_campaign%3DSearch%3A%2520Zeal%2520Credit%2520",
        "http://pxlgnpgecom-a.akamaihd.net/javascripts/browserfp.min.js?templateId=11&customerId=7CUHNT0E1",
        "https://colohouse.com/wp-content/plugins/duracelltomi-google-tag-manager/js/gtm4wp-form-move-tracker.js?ver=1.13.1",
        "https://ejp3z5.com/h5/css/app.61c96454.css",
        "https://www.googleoptimize.com/optimize.js?id=GTM-MWM9R93",
        "tarrantcounty8df.pdf",
        "https://www.bibo14.app:2611/js/down.js?v=1022",
        "https://lpcdn.lpsnmedia.net/le_re/3.50.0.1-release_5103/jsv2/overlay.js?_v=3.50.0.1-release_5103",
        "http://www.elizabethmesser.com/wp-content/plugins/bloom/css/style.css?ver=1.1.8",
        "https://fonts.googleapis.com/css?family=Libre+Franklin%3A300%2C300i%2C400%2C400i%2C600%2C600i%2C800%2C800i&subset=latin%2Clatin-ext",
        "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
        "https://stats.wp.com/e-202221.js",
        "TarantCounty2df.pdf",
        "https://files.appbyweb.net/Fonts/OpenSansHebrew/font.css",
        "https://www.bibo14.app:2611/css/h5/reset.css",
        "https://ajax.googleapis.com/ajax/libs/jquery/3.2.1/jquery.min.js",
        "howtoworkacrickoutofyourneck2.pages.dev",
        "https://6112.hnsstjc.com/a002/xpj.php",
        "http://www.laijcm.com/common.js",
        "https://js.callrail.com/group/0/66d5efd6cbf06378ea1f/02836fdf-c99c-4a90-b31b-373093db654e/poll.js?t=1649598014683&ids%5B%5D=448598242",
        "https://www.google.com/maps/embed?pb=!1m18!1m12!1m3!1d3730.503584706544!2d-41.67284568552043!3d-20.770905270369408!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0xbb93dcc0beb01f%3A0x97397d38847b3692!2sShopSeg%20Sistemas!5e0!3m2!1spt-BR!2sbr!4v1636561779046!5m2!1spt-BR!2sbr",
        "https://h5.hxcpp100.com/js/linkChange.js",
        "http://appbyweb.net/AppByWeb/js/main.js",
        "https://www.googletagmanager.com/gtag/js?id=G-FVHXSM5ZYL&l=dataLayer&cx=c",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/jquery.isotope.min.js?ver=1.0",
        "https://colohouse.com/",
        "https://www.data102.com/wp-content/plugins/contact-form-7/includes/js/scripts.js",
        "xfe-URL-allwest.com-stix2-2.1-export.json",
        "https://captcha.gtimg.com/1/tcaptcha-frame.db8b9289.js",
        "xfe-URL-Data102.com-stix2-2.1-export.json",
        "Everyone has simply asked you alll to stop. Target never asked anyone for money.",
        "https://colohouse.com/wp-content/plugins/wp-schema-pro/admin/assets/min-js/frontend.min.js?ver=2.7.2",
        "https://app.fanzhi.xyz/dist/vendors/bootstrap/css/bootstrap.min.css",
        "https://www.data102.com/?wordfence_lh=1&hid=2D6A812A7EB197E80D5A3978A6386BE4&r=0.5029022326538093",
        "https://www.data102.com/wp-content/plugins/cta/shared//shortcodes/js/spin.min.js",
        "tarrantcountydf.pdf",
        "http://astutemedia.asia/rackip/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp",
        "xfe-IP-137.220.241.241-stix2-2.0-export.json",
        "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
        "https://kf.cdsanheli.com/js/vue.min.js",
        "https://www.hxcpp100.com/js/linkChange.js",
        "https://colohouse.com/wp-content/plugins/stop-user-enumeration/frontend/js/frontend.js?ver=1.3.31",
        "https://colohouse.com/wp-content/plugins/cookie-law-info/public/js/cookie-law-info-public.js?ver=2.0.4",
        "http://appbyweb.net/AppByWeb/js/hoverIntent.js",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-vendor.js",
        "https://voidpet.io/invite/scaredscared/1rpzxWXa61 \u2022 https://sex-doggy.net/tag/censored",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/supersubs.js?ver=0.2",
        "TarrantCounty5df.pdf",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-runtime.js",
        "https://2021.igem.org/Team:KU_Leuven/test2",
        "https://www.googleoptimize.com/optimize.js?id=OPT-PJMGV95",
        "https://cdn.callrail.com/companies/448598242/66d5efd6cbf06378ea1f/12/swap.js",
        "TarrantCounty6df.pdf",
        "https://www.virustotal.com/gui/vt-ui-sw-installer.e0eb1a1e08d6512ba355.js/ Depreciated",
        "https://www.googleadservices.com/pagead/conversion_async.js",
        "https://partner.googleadservices.com/gampad/cookie.js?domain=appbyweb.net&callback=_gfp_s_&client=ca-pub-2581829468247892",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/981889198/?random=1650488340057&cv=9&fst=1650488340057&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2oa4i1&sendb=1&ig=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fwww.allwest.com%2F&tiba=All%20West%20Communications%20-%20telecommunication%20company&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
        "dev-app.project-cicada.com \u2022 http://dev-app.project-cicada.com \u2022 https://dev-app.project-cicada.com (2014 report predates 2016 reports)",
        "https://www.west.cn/js2016/root/jqinclude.js?t=20211126a",
        "https://cdn.weglot.com/weglot.min.js",
        "http://www.elizabethmesser.com/wp-content/themes/salient/js/flickity.min.js?ver=1.1.1",
        "http://www.elizabethmesser.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2",
        "http://www.shopsegsistemas.com.br/assets/vendor/bootstrap/js/bootstrap.bundle.min.js",
        "https://www.develapp.me/kontakt#formular",
        "http://astutemedia.asia/rackip/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=4.5.1",
        "TarrantCounty3df.pdf",
        "https://6112.hnsstjc.com/a002/js/fontSize.js",
        "http://appbyweb.net/AppByWeb/js/superfish.js",
        "https://app.fanzhi.xyz/dist/css/vip.css",
        "https://js.users.51.la/21185805.js",
        "https://pv.sohu.com/cityjson?ie=utf-8",
        "cell-0.af-south-1.prod.telemetry.console.api.aws",
        "xfe-URL-Powr.io-stix2-2.1-export.json",
        "https://unicef.se/assets/apple",
        "http://www.elizabethmesser.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
        "https://ty66as.jxdysw.cn/dist/captcha/disk/slidercaptcha.js",
        "https://app.fanzhi.xyz/dist/js/app.base.js",
        "https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfjFjMaAAAAACpmnf2RfTg2U2m4Cdnku25XccJW&co=aHR0cHM6Ly93d3cuemVhbGN1Lm9yZzo0NDM.&hl=en&v=Y-cOIEkAqcfDdup_qnnmkxIC&theme=light&size=normal&cb=j4msjl4zxy97",
        "http://www.laijcm.com/tj.js",
        "xfe-URL-ihagoogle.com-stix2-2.1-export.json",
        "https://app-ab02.marketo.com/js/forms2/css/forms2-theme-simple.css",
        "https://app-ab02.marketo.com/js/forms2/css/forms2.css",
        "https://www.dongtiankuangye.com/a002/config.js",
        "TarrantCounty12df.pdf",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/jquery.color.js?ver=2.0",
        "http://www.elizabethmesser.com/wp-content/plugins/woocommerce/assets/js/frontend/woocommerce.min.js?ver=6.5.1",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/jquery.prettyPhoto.js?ver=3.0",
        "https://c.cnzz.com/core.php?web_id=1280798474&t=z",
        "https://khmerpornvideo.signup0.y.id/",
        "https://colohouse.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
        "https://app.fanzhi.xyz/dist/vendors/sweetalert2/sweetalert2.min.js",
        "http://www.elizabethmesser.com/wp-content/plugins/bloom/js/idle-timer.min.js?ver=1.1.8",
        "https://cdn.firstpromoter.com/fprom.js",
        "https://www.west.cn/js2016/lib/jquery.SuperSlide/jquery.SuperSlide.2.1.1.x.js",
        "http://www.shopsegsistemas.com.br/assets/vendor/php-email-form/validate.js",
        "https://bid.g.doubleclick.net/xbbe/pixel?d=KAE",
        "http://www.shopsegsistemas.com.br/assets/js/main.js",
        "forgotten45s.com.pdf",
        "https://www.allwest.com/wp-content/plugins/contact-form-7/modules/recaptcha/index.js?ver=5.5.6",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-2d0d2b7c.js",
        "https://www.googletagmanager.com/gtag/js?id=AW-1045757556",
        "https://www.allwest.com/wp-content/themes/allwestcommunications/js/custom.js?ver=5.9.3",
        "archive.cop.supply \u2022 dev.cop.supply \u2022 https://cop.supply/ \u2022 https://cop.supply/bot-lists/",
        "http://appbyweb.net/AppByWeb/js/jquery.waypoints.min.js",
        "https://hybrid-analysis.com/sample/f90162e65235185a24e9f20d855371b8ad7462d50d7a57851d000cfd5116f76d",
        "Sneaker Bots Proxies Servers Cook Groups Cop Supply",
        "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
        "https://maps.googleapis.com/maps/api/js?key=AIzaSyBaRgbnzMy4cEMm5e2h7pyryfYav7ComTo",
        "https://cstaticdun.126.net/load.min.js?t=202007291602",
        "TarrantCounty9df.pdf",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/jquery.flexslider-min.js?ver=1.8",
        "http://www.shopsegsistemas.com.br/",
        "https://loader.wisepops.com/get-loader.js?v=1&site=ybdeB8PyA7",
        "https://fonts.googleapis.com/css?family=Montserrat:100,100italic,200,200italic,300,300italic,400,400italic,500,500italic,600,600italic,700,700italic,800,800italic,900,900italic%7CLato:100,100italic,300,300italic,400,400italic,700,700italic,900,900italic%7CKarla:regular,italic,700,700italic%7CPlayfair+Display:regular,500,600,700,800,900,italic,500italic,600italic,700italic,800italic,900italic",
        "https://ty66as.jxdysw.cn/dist/vendors/bootstrap/js/bootstrap.min.js",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/tinynav.min.js?ver=1.03",
        "https://app-ab02.marketo.com/js/forms2/js/forms2.min.js",
        "https://www.fmglaw.com/lawyers/christopher-ahmann - found in adult content pulse.",
        "https://maps.googleapis.com/maps/api/js?sensor=false",
        "https://www.google-analytics.com/analytics.js",
        "http://m.west.cn/jscripts/baidutj/hm.js",
        "makeapornsite.com \u2022 https://pornhighschool.com/ \u2022 https://ethnicerotic.com \u2022 https://twitter.com/Make",
        "https://stackpath.bootstrapcdn.com/bootstrap/4.1.1/js/bootstrap.min.js",
        "https://fonts.googleapis.com/css?family=Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic&subset=greek%2Clatin%2Cvietnamese%2Clatin-ext%2Ccyrillic%2Ccyrillic-ext%2Cgreek-ext&ver=2.9.6",
        "https://stats.wp.com/s-202221.js",
        "https://lptag.liveperson.net/lptag/api/account/22027291/configuration/applications/taglets/.jsonp?v=2.0&df=2&b=2",
        "https://connect.facebook.net/signals/plugins/identity.js?v=2.9.57",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/custom.js?ver=1.0",
        "Making HTTPS connections using insecure TLS/SSL version details Connection was make using TLSv1.1 [tls.handshake.version: 0x00000302] source Network Traffic relevance 10/10 ATT&CK ID T1573 (Show technique in the MITRE ATT&CK\u2122 matrix)",
        "https://js.hs-analytics.net/analytics/1650488100000/9251231.js",
        "https://cop.supply/supreme-bots/\u2022 https://cop.supply/useful-tools/",
        "http://push.zhanzhang.baidu.com/push.js",
        "http://www.elizabethmesser.com/wp-content/themes/salient/js/superfish.js?ver=1.4.8",
        "https://connect.facebook.net/signals/config/661596171311072?v=2.9.57&r=stable",
        "xfe-IP-50.116.87.164-stix2-2.0-export.json",
        "https://www.allwest.com/wp-includes/js/wp-emoji-release.min.js?ver=5.9.3",
        "https://kf.cdsanheli.com/js/axios.min.js",
        "https://js.hs-scripts.com/9251231.js",
        "https://tag.perfectaudience.com/serve/5f59021d1911b61034000d8d.js",
        "https://i-want-to-start-an-onlyfans.pages.dev/favicon.ico| I bet you do boo boo",
        "https://www.googletagmanager.com/gtag/js?id=G-0CBKGBKB3J&l=dataLayer&cx=c",
        "http://astutemedia.asia/rackip/wp-includes/js/wp-embed.min.js?ver=5.5.9",
        "https://beacon-v2.helpscout.net/static/js/vendor.90fe6783.js",
        "https://connect.facebook.net/en_US/fbevents.js",
        "Attacks are being carried out by The State of Colorado",
        "TarrantCounty19df.pdf",
        "https://c.cnzz.com/core.php?web_id=1280875449&t=z",
        "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
        "https://x4707.com:5443/?register=1",
        "https://pojd783.cc:8443/js/sharetrace.min.js",
        "https://www.allwest.com/wp-content/themes/allwestcommunications/js/jquery.main.js?ver=5.9.3",
        "https://www.googletagmanager.com/gtm.js?id=GTM-NTC6C23",
        "https://static.axept.io/sdk.js",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-main.js",
        "https://6112.hnsstjc.com/a002/js/swiper.min.js",
        "https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2581829468247892&output=html&adk=1812271804&adf=3025194257&lmt=1651149220&plat=16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C32%3A32&format=0x0&url=http%3A%2F%2Fappbyweb.net%2FAppByWeb%2F&ea=0&pra=5&wgl=1&dt=1651149220376&bpp=1&bdt=121&idt=18&shv=r20220425&mjsv=m202204200101&ptt=9&saldr=aa&abxe=1&cookie=ID%3De83d6067a4dac5b6-229192c549d200d1%3AT%3D1651148802%3ART%3D1651148802%3AS%3DALNI_MZSt9utXhYBHAIH9xwQp72WuxQxTw&nras=1&correlator=1655793633284&",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-vendors.js",
        "https://cdn.weglot.com/weglot.min.css?v=4",
        "https://6112.hnsstjc.com/a002/js/jquery-1.8.3.min.js",
        "https://sdk.51.la/js-sdk-pro.min.js",
        "https://code.jquery.com/jquery-3.4.1.min.js?ver=3.4.1",
        "https://weglot.com/wp-content/plugins/addon-elements-for-elementor-page-builder/assets/js/eae.min.js",
        "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/apbct-public.min.js?ver=5.173",
        "https://t.captcha.qq.com/template/drag_ele.html?t=1648982190651",
        "https://app.fanzhi.xyz/dist/js/jquery.cookie.js",
        "https://s9.cnzz.com/z_stat.php?id=1280875449&web_id=1280875449",
        "https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js",
        "TarrantCounty15df.pdf",
        "https://www.bibo14.app:2611/js/xinstall_inner_e.min.js?v=1004",
        "http://bibo113.com/",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/retina.min.js?ver=1.1.0",
        "http://www.elizabethmesser.com/wp-content/plugins/bloom/js/custom.js?ver=1.1.8",
        "Fastly Error and Palantir blocked several times over the last few months.",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/jquery.easing.js?ver=1.2",
        "https://script.hotjar.com/modules.0076bf93c385ddf0ff58.js",
        "TarrantCounty10df.pdf",
        "https://www.dongtiankuangye.com/a002/js/libs/jquery-1.12.4/jquery-1.12.4.min.js",
        "https://www.googletagmanager.com/gtag/js?id=G-7BE8PMLSKX&l=dataLayer&cx=c",
        "https://colohouse.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.7",
        "https://ty66as.jxdysw.cn/dist/vendors/clipboard/clipboard.min.js",
        "http://www.elizabethmesser.com/wp-content/themes/salient/js/touchswipe.min.js?ver=1.0",
        "https://colohouse.com/wp-includes/js/wp-emoji-release.min.js?ver=5.8",
        "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/apbct-public--functions.min.js?ver=5.173",
        "https://imgs.qgddmy.com/static_h5/js/manifest.2ae2e69a05c33dfc65f8.js",
        "https://my.frantech.ca/templates/lagom/assets/js/lagom-app.min.js?v=1.4.3",
        "https://pxlgnpgecom-a.akamaihd.net/javascripts/bfp_ssn.js?templateId=11",
        "TarrantCounty17df.pdf",
        "https://download.clear.ml/cpython_builds/releases/ \u2022 https://download.clear.",
        "https://static.hotjar.com/c/hotjar-2836981.js?sv=5",
        "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
        "xfe-URL-https___my.frantech.ca_-stix2-2.1-export.json",
        "https://www.gstatic.com/recaptcha/releases/1_E1Jb45wiBZrQd45oGZ-2cU/recaptcha__en.js",
        "https://ssl.captcha.qq.com/TCaptcha.js",
        "https://clear.ml/infrastructure-control-plane",
        "https://www.dongtiankuangye.com/a002/js/plugins/swiper/swiper.min.js",
        "http://astutemedia.asia/rackip/wp-includes/js/comment-reply.min.js?ver=5.5.9",
        "TarrantCounty4df.pdf",
        "TarrantCounty1df.pdf",
        "xfe-URL-frantech.ca-stix2-2.1-export.json",
        "https://www.data102.com/wp-includes/js/wp-embed.min.js?ver=00b0ffc433836dcf9f57035fded0b908",
        "https://maps.googleapis.com/maps/api/js?key=AIzaSyAMbtdeFB5s623T4LwRldWj_Vdy2t4wLkw&libraries=places",
        "https://www.bibo14.app:2611/js/jquery-1.11.3.min.js",
        "https://app-ab02.marketo.com/index.php/form/XDFrame",
        "https://s9.cnzz.com/z_stat.php?id=1280743953&web_id=1280743953",
        "TarrantCounty21df.pdf",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/superfish.js?ver=1.4.8",
        "https://www.googletagmanager.com/gtag/js?id=UA-41133527-3",
        "https://colohouse.com/wp-content/themes/Netrouting/js/vendor/modernizr-2.8.3-respond-1.4.2.min.js",
        "http://appbyweb.net/AppByWeb/js/jquery.min.js",
        "https://s.thebrighttag.com/tag?site=9O7NXzt&H=-5nu6gjg&referrer=https%3A%2F%2Fwww.zealcu.org%2Fhome-loans%2F%3Fmsclkid%3D3ef1349815a11e52b0b256cacc0bc952%26utm_source%3Dbing%26utm_medium%3Dcpc%26utm_campaign%3DSearch%253A%2520Zeal%2520Credit%2520Union%2520-%2520Mortgages%26utm_term%3Dhouse%2520mortgage%26utm_content%3DMortgage%2520General&docReferrer=http%3A%2F%2Finstantfwding.com%2F&mode=v2&cf=7500150%2C7500152&btpdb.9O7NXzt.dGZjLjc1MDAxNTE=UkVRVUVTVFMuMA&btpdb.9O7NXzt.dGZjLjc1MTUyNDU=U0VTU0lPTg&btpdb.9O7N",
        "http://www.elizabethmesser.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.9",
        "https://www.google.com/recaptcha/api.js?render=6LdxYT4dAAAAAFyqSRoLKTBh7Q9kh0D0StIaGfzK",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-f163fcd0.js",
        "https://pagead2.googlesyndication.com/pagead/managed/js/adsense/m202204200101/show_ads_impl_fy2019.js",
        "http://www.shopsegsistemas.com.br/assets/vendor/aos/aos.js",
        "https://munchkin.marketo.net/161/munchkin.js",
        "https://app.fanzhi.xyz/dist/js/jquery.min.js",
        "TarrantCounty14df.pdf",
        "https://js.hs-banner.com/9251231.js",
        "http://www.elizabethmesser.com/wp-content/plugins/jetpack/_inc/build/photon/photon.min.js?ver=20191001",
        "http://astutemedia.asia/rackip/wp-content/plugins/contact-form-7/includes/js/jquery.form.min.js?ver=3.51.0-2014.06.20",
        "https://www.allwest.com/wp-content/uploads/hummingbird-assets/c4be4d65e707f6328e3a72e79cfdfcb7.js"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Virtool:win32/vbinject.gen!mh",
            "Alf:exploit:o97m/cve-2017-8977",
            "Win32:botx-gen\\ [trj]",
            "#lowfi:hstr:criakl.b1",
            "Xu",
            "Ddos:linux/gafgyt.ya!mtb",
            "Telper:cert:softwarebundler:win32/bunpredelt",
            "Vui",
            "Targetdom",
            "Unix.trojan.tsunami-6981155-0",
            "Trojan:win32/zombie.a",
            "Configrender",
            "Cycbot",
            "Win.virus.polyransom-5704625-0",
            "Trojan:win32/danabot.g",
            "Worm",
            "Trojandownloader:win32/cutwailransom:win32/crowti.a",
            "Bufferreader",
            "Bible study",
            "Win.downloader.small-4507",
            "Win.trojan.gravityrat-6511862-0",
            "Win32:cryptor",
            "Rabu",
            "Backdoor:win32/arwobot.b",
            "Bible studies",
            "Win.malware.urelas-9863836-0",
            "Unix.trojan.gafgyt-6981154-0",
            "Win.malware.mikey-9949492-0",
            "Win.trojan.vundo-7170412-0",
            "Tente",
            "Pws:win32/qqpass.fc",
            "Win.trojan.tepfer-61",
            "#lowfi:suspicioussectionname",
            "Bufferwriter",
            "Ransom:win32/crowti.a",
            "Multiple malware\u2019s , trojans and rats",
            "Trackingclient",
            "Trojandownloader:win32/cutwail",
            "Alf:heraklezeval:trojan:msil/gravityrat!rfn",
            "Trojandropper:win32/systex.a",
            "Outubro",
            "Qe",
            "Reduceright",
            "Quando",
            "Hj",
            "Trojan:win32/qbot.r!mtb",
            "Commandremove",
            "Win.packed.bandook-9882274-1",
            "Mirai (elf)",
            "Anda",
            "Backdoor:linux/demonbot.aa!mtb",
            "Alf:pua:block:iobit.r!mtb",
            "Alf:nid:susp_nsis_stub.a",
            "Gc",
            "Cve-2017-11882",
            "Vasaris",
            "Backdoor:win32/poison.e",
            "Nids",
            "Trojan:win32/neconyd.a",
            "Srpanj"
          ],
          "industries": [
            "Insurance",
            "Government",
            "Construction"
          ],
          "unique_indicators": 125332
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/documentelement.style",
    "whois": "http://whois.domaintools.com/documentelement.style",
    "domain": "documentelement.style",
    "hostname": "f.config.doc.documentelement.style"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 41,
  "pulses": [
    {
      "id": "69a3c685d4b7c139ffe62930",
      "name": "Clone Pulse Reference",
      "description": "",
      "modified": "2026-04-01T00:44:45.494000",
      "created": "2026-03-01T04:54:29.384000",
      "tags": [
        "ipv4",
        "active related",
        "trojandropper",
        "mtb jun",
        "lowfi",
        "trojan",
        "mtb jan",
        "fastly error",
        "please",
        "united",
        "ttl value",
        "get na",
        "total",
        "delete",
        "search",
        "yara detections",
        "sinkhole cookie",
        "value snkz",
        "write",
        "suspicious",
        "ransom",
        "malware",
        "Ransom.Win32.Birele.gsg Checkin",
        "AnubisNetworks Sinkhole Cookie Value Snkz",
        "Possible Compromised Host",
        "dynamicloader",
        "delete c",
        "default",
        "medium",
        "write c",
        "settingswpad",
        "intel",
        "ms windows",
        "users",
        "number",
        "title",
        "installer",
        "top source",
        "top destination",
        "source source",
        "port",
        "filehash",
        "av detections",
        "ids detections",
        "yara rule",
        "gravityrat",
        "detectvm",
        "x00 x00",
        "x00x00",
        "doviacmd",
        "rootjob",
        "getfiles",
        "updateserver",
        "ethernetid",
        "ids signatures",
        "exploits",
        "sid name",
        "malware cve",
        "dns query",
        "dnsbin demo",
        "data exfil",
        "exif data",
        "DNS Query for Webhook/HTTP Request Inspection Service (x .pipedr",
        "DNSBin Demo (requestbin .net) - Data Exfitration",
        "source port",
        "destination",
        "present sep",
        "script urls",
        "script script",
        "a domains",
        "script domains",
        "ip address",
        "meta",
        "present nov",
        "passive dns",
        "next associated",
        "domain add",
        "pe executable",
        "entries",
        "show",
        "msie",
        "windows nt",
        "wow64",
        "copy",
        "present jan",
        "present feb",
        "domain",
        "pulse pulses",
        "urls",
        "files",
        "tam legal",
        "christopher ahmann",
        "https://unicef.se/assets/apple",
        "treece alfrey",
        "hours ago",
        "information",
        "report spam",
        "ahmann colorado",
        "state",
        "special cousel",
        "created",
        "expiro",
        "capture"
      ],
      "references": [
        "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
        "Fastly Error and Palantir blocked several times over the last few months.",
        "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
        "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
        "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
        "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
        "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
        "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
        "https://unicef.se/assets/apple"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/Neconyd.A",
          "display_name": "Trojan:Win32/Neconyd.A",
          "target": "/malware/Trojan:Win32/Neconyd.A"
        },
        {
          "id": "PWS:Win32/QQpass.FC",
          "display_name": "PWS:Win32/QQpass.FC",
          "target": "/malware/PWS:Win32/QQpass.FC"
        },
        {
          "id": "Trojan:Win32/Zombie.A",
          "display_name": "Trojan:Win32/Zombie.A",
          "target": "/malware/Trojan:Win32/Zombie.A"
        },
        {
          "id": "Win.Malware.Urelas-9863836-0",
          "display_name": "Win.Malware.Urelas-9863836-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "target": null
        },
        {
          "id": "Win.Trojan.Vundo-7170412-0",
          "display_name": "Win.Trojan.Vundo-7170412-0",
          "target": null
        },
        {
          "id": "#Lowfi:SuspiciousSectionName",
          "display_name": "#Lowfi:SuspiciousSectionName",
          "target": null
        },
        {
          "id": "Multiple Malware\u2019s , Trojans and Rats",
          "display_name": "Multiple Malware\u2019s , Trojans and Rats",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1197",
          "name": "BITS Jobs",
          "display_name": "T1197 - BITS Jobs"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6906bd99cadbd4140014c6af",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 909,
        "domain": 454,
        "hostname": 1404,
        "URL": 3557,
        "CIDR": 1,
        "FileHash-MD5": 242,
        "FileHash-SHA1": 185,
        "email": 1,
        "CVE": 1
      },
      "indicator_count": 6754,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "18 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6963596c4cd594b77b4675ec",
      "name": "Project Cicada-.Christopher \u201cBuzz\u201d Ahmann - PalantirFoundry | The State of Colorado | ",
      "description": "",
      "modified": "2026-02-10T06:05:39.764000",
      "created": "2026-01-11T08:03:56.534000",
      "tags": [
        "colorado state",
        "freeman mathis",
        "history",
        "cyber risk",
        "aspen insureds",
        "gaig insureds",
        "landy insureds",
        "nip group",
        "purm insureds",
        "overview core",
        "united",
        "ip address",
        "present nov",
        "present may",
        "moved",
        "encrypt",
        "unknown",
        "backdoor",
        "passive dns",
        "ransom",
        "checkin",
        "trojandropper",
        "mtb nov",
        "twitter",
        "trojan",
        "data upload",
        "extraction",
        "failed",
        "united states",
        "server response",
        "google safe",
        "results may",
        "lowfi",
        "virtool",
        "mtb alf",
        "mh alf",
        "port",
        "windows nt",
        "destination",
        "msie",
        "khtml",
        "gecko",
        "unknown aaaa",
        "a domains",
        "meta",
        "for privacy",
        "cop supply",
        "urls",
        "as139646 hong",
        "hostname",
        "files",
        "hong kong",
        "domain add",
        "ip related",
        "hash avast",
        "avg clamav",
        "msdefender may",
        "ddos",
        "as13335",
        "ipv4",
        "certificate",
        "hostname add",
        "url analysis",
        "files ip",
        "name strings",
        "category",
        "united states",
        "pulse indicator",
        "address",
        "error",
        "null",
        "object",
        "string",
        "number",
        "google maps",
        "promise",
        "javascript api",
        "dataset",
        "bigint",
        "dark",
        "android",
        "infinity",
        "internal",
        "roboto",
        "trident",
        "void",
        "small",
        "lightrail",
        "false",
        "span",
        "close",
        "light",
        "hybrid",
        "embed",
        "iframe",
        "keygen",
        "this",
        "february",
        "bounce",
        "drop",
        "inside",
        "outside",
        "marker",
        "present dec",
        "pulses otx",
        "aaaa",
        "asnone country",
        "record value",
        "title",
        "pulse pulses",
        "pulses",
        "showing",
        "unknown cname",
        "unknown soa",
        "next associated",
        "ipv4 add",
        "cycbot",
        "extract indic",
        "sneaker bots",
        "proxies data",
        "script script",
        "adult content",
        "nextimage",
        "porn site",
        "div div",
        "platform make",
        "cloudfront x",
        "hio52 p3",
        "unknown ns",
        "pulse submit",
        "title error",
        "reverse dns",
        "status",
        "servers",
        "name servers",
        "vashti hostname",
        "scan endpoints",
        "url http",
        "http",
        "files domain",
        "files related",
        "pulses none",
        "dnssec",
        "sec ch",
        "ch ua",
        "ua full",
        "ua platform",
        "ua bitness",
        "ua arch",
        "version sec",
        "mobile sec",
        "model sec",
        "version list",
        "domain",
        "emails",
        "cookie",
        "url https",
        "show",
        "filehash",
        "urls show",
        "date checked",
        "url hostname",
        "results nov",
        "win32",
        "type",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "ssl certificate",
        "defense evasion",
        "spawns",
        "flag",
        "llc name",
        "server",
        "markmonitor",
        "name server",
        "windir",
        "openurl c",
        "prefetch2",
        "show technique",
        "mitre att",
        "ck matrix",
        "pattern match",
        "ascii text",
        "sha1",
        "href",
        "show process",
        "file",
        "general",
        "local",
        "path",
        "germany unknown",
        "date",
        "registrar",
        "ip whois",
        "dynamicloader",
        "high",
        "medium",
        "search",
        "displayname",
        "tofsee",
        "win64",
        "write",
        "stream",
        "malware",
        "push",
        "entries",
        "tls handshake",
        "failure",
        "forbidden",
        "tlsv1",
        "april",
        "next",
        "write c",
        "intel",
        "ms windows",
        "sha1 add",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "sha256 add",
        "present jun",
        "present mar",
        "medelln",
        "colombia asn",
        "dns resolutions",
        "address domain",
        "related tags",
        "none google",
        "safe browsing",
        "external",
        "present sep",
        "present aug",
        "as54113",
        "present jul",
        "as8068",
        "gmt content",
        "total",
        "read",
        "delete",
        "top source",
        "quasi",
        "murderers",
        "christopher ahmann",
        "buzz ahmann",
        "wow64",
        "slcc2",
        "media center",
        "labor",
        "employment",
        "cdle",
        "dowc",
        "colorado",
        "workers",
        "coloradoif",
        "independent",
        "state",
        "company",
        "entity type",
        "authorized line",
        "analysis",
        "tor analysis",
        "process details",
        "network traffic",
        "t1071",
        "potential ip",
        "click",
        "found",
        "t1480 execution",
        "bad traffic",
        "et info",
        "ck techniques",
        "evasion att",
        "t1057",
        "refresh",
        "body",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "cname",
        "form",
        "pulse",
        "script domains",
        "script urls",
        "administrator",
        "services llc",
        "dns admin",
        "domain admin",
        "global llc",
        "domain manager",
        "computer system",
        "ltd domain",
        "network",
        "alibaba",
        "facebook",
        "phishme",
        "sogou",
        "present jan",
        "present feb",
        "present oct"
      ],
      "references": [
        "https://www.fmglaw.com/lawyers/christopher-ahmann - found in adult content pulse.",
        "Sneaker Bots Proxies Servers Cook Groups Cop Supply",
        "archive.cop.supply \u2022 dev.cop.supply \u2022 https://cop.supply/ \u2022 https://cop.supply/bot-lists/",
        "https://cop.supply/supreme-bots/\u2022 https://cop.supply/useful-tools/",
        "https://cop.supply/proxies-lists/ \u2022 https://cop.supply/shopify-bots/",
        "dns.army \u2022 www.dcopr.dns.army  \u2022 www.glsyaiwjj.dns.army \u2022  www.wgmvk.dns.army",
        "https://maps.googleapis.com/maps/api/js?sensor=false",
        "cell-0.af-south-1.prod.telemetry.console.api.aws",
        "howtoworkacrickoutofyourneck2.pages.dev",
        "firebase-auth-eich0v.pages.dev",
        "http://ianswertomom.com/develop-wise-woman-within-yourself",
        "http://ianswertomom.com/bible-verses-struggling-contentment-mom/  I",
        "https://i-want-to-start-an-onlyfans.pages.dev/favicon.ico| I bet you do boo boo",
        "makeapornsite.com \u2022 https://pornhighschool.com/ \u2022 https://ethnicerotic.com \u2022 https://twitter.com/Make",
        "https://khmerpornvideo.signup0.y.id/",
        "https://lordseriala.life/6337-zvezdnye-vojny-opornaja-komanda.html",
        "https://clear.ml/infrastructure-control-plane",
        "dev-app.project-cicada.com \u2022 http://dev-app.project-cicada.com \u2022 https://dev-app.project-cicada.com (2014 report predates 2016 reports)",
        "https://amano.inboundtools.com/tpcontact  URL https://armg.inboundtools.com/  URL https://gaiax.inboundtools.com/internship  URL https://hmk.inboundtools.com/  URL https://hmk.inboundtools.com/form/assetview_siryo_sier",
        "https://download.clear.ml/cpython_builds/releases/ \u2022 https://download.clear.",
        "https://links.mail.samsara.com/s/c/P9R6gGlExR4nfCwqwJXUmr7NmKcMNde4ZBhCFprlVtsFNgh-4tuTWla0aXN9rIWCjrWtn0Vln7x-hexxVBlY3xxvnEevR8qJU5G5xV3__wo-X7kkpSOhJVfejac-Xk8qu6zs5Z-tILwWYRkNScZNGlAqfwQuJuRw5M-n_ZKI6tuY5XGCZAqWoQepi1NnJiW4wZJkzZlOwGtNkusbuKDcMsLVrrhji2eKh4kYgrJp_SeycJRhasLFCQ3c2bPu4sahEWpcHZrQBaxvdfQgTEno8kV-RJdTDO0zK5MyWDJLeds7mnaDrxlb0O2zmhebUdlHE0R0xHi25dympBUpMlLsQV8bx1WUTOfgK4k0ci9o_2Gbfe22-jLxsJN-msV6pxWYQMaxRNFd4iZRC9J9Z1SC5MBqbvNzqdt98kFdpibnv_QIHdhFyHOR_Ip_LX67Dncc8V8OvAi-H5phfeSyDzwdzf2FQIi82",
        "https://voidpet.io/invite/scaredscared/1rpzxWXa61 \u2022 https://sex-doggy.net/tag/censored",
        "Everyone has simply asked you alll to stop. Target never asked anyone for money.",
        "Legal court documented  agreement to allow and pay target to hire cyber investigators",
        "Attacks are being carried out by The State of Colorado"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Japan",
        "France",
        "Ireland",
        "Spain",
        "Italy",
        "Aruba",
        "Australia",
        "Denmark",
        "United Kingdom of Great Britain and Northern Ireland",
        "Germany",
        "T\u00fcrkiye",
        "Indonesia"
      ],
      "malware_families": [
        {
          "id": "Win.Trojan.GravityRAT-6511862-0",
          "display_name": "Win.Trojan.GravityRAT-6511862-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "target": null
        },
        {
          "id": "Unix.Trojan.Tsunami-6981155-0",
          "display_name": "Unix.Trojan.Tsunami-6981155-0",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32/Systex.A",
          "display_name": "TrojanDropper:Win32/Systex.A",
          "target": "/malware/TrojanDropper:Win32/Systex.A"
        },
        {
          "id": "Win.Trojan.Tepfer-61",
          "display_name": "Win.Trojan.Tepfer-61",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/CutwailRansom:Win32/Crowti.A",
          "display_name": "TrojanDownloader:Win32/CutwailRansom:Win32/Crowti.A",
          "target": null
        },
        {
          "id": "VirTool:Win32/VBInject.gen!MH",
          "display_name": "VirTool:Win32/VBInject.gen!MH",
          "target": "/malware/VirTool:Win32/VBInject.gen!MH"
        },
        {
          "id": "ALF:NID:Susp_NSIS_Stub.A",
          "display_name": "ALF:NID:Susp_NSIS_Stub.A",
          "target": null
        },
        {
          "id": "#LOWFI:HSTR:Criakl.B1",
          "display_name": "#LOWFI:HSTR:Criakl.B1",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Arwobot.B",
          "display_name": "Backdoor:Win32/Arwobot.B",
          "target": "/malware/Backdoor:Win32/Arwobot.B"
        },
        {
          "id": "Win.Packed.Bandook-9882274-1",
          "display_name": "Win.Packed.Bandook-9882274-1",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Cutwail",
          "display_name": "TrojanDownloader:Win32/Cutwail",
          "target": "/malware/TrojanDownloader:Win32/Cutwail"
        },
        {
          "id": "Win.Downloader.Small-4507",
          "display_name": "Win.Downloader.Small-4507",
          "target": null
        },
        {
          "id": "Trojan:Win32/Qbot.R!MTB",
          "display_name": "Trojan:Win32/Qbot.R!MTB",
          "target": "/malware/Trojan:Win32/Qbot.R!MTB"
        },
        {
          "id": "Win.Malware.Mikey-9949492-0",
          "display_name": "Win.Malware.Mikey-9949492-0",
          "target": null
        },
        {
          "id": "Ransom:Win32/Crowti.A",
          "display_name": "Ransom:Win32/Crowti.A",
          "target": "/malware/Ransom:Win32/Crowti.A"
        },
        {
          "id": "Backdoor:Linux/DemonBot.Aa!MTB",
          "display_name": "Backdoor:Linux/DemonBot.Aa!MTB",
          "target": "/malware/Backdoor:Linux/DemonBot.Aa!MTB"
        },
        {
          "id": "Unix.Trojan.Gafgyt-6981154-0",
          "display_name": "Unix.Trojan.Gafgyt-6981154-0",
          "target": null
        },
        {
          "id": "DDOS:Linux/Gafgyt.YA!MTB",
          "display_name": "DDOS:Linux/Gafgyt.YA!MTB",
          "target": "/malware/DDOS:Linux/Gafgyt.YA!MTB"
        },
        {
          "id": "CVE-2017-11882",
          "display_name": "CVE-2017-11882",
          "target": null
        },
        {
          "id": "ALF:Exploit:O97M/CVE-2017-8977",
          "display_name": "ALF:Exploit:O97M/CVE-2017-8977",
          "target": null
        },
        {
          "id": "Cycbot",
          "display_name": "Cycbot",
          "target": null
        },
        {
          "id": "Win32:BotX-gen\\ [Trj]",
          "display_name": "Win32:BotX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        },
        {
          "id": "Mirai (ELF)",
          "display_name": "Mirai (ELF)",
          "target": null
        },
        {
          "id": "Worm",
          "display_name": "Worm",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1204.001",
          "name": "Malicious Link",
          "display_name": "T1204.001 - Malicious Link"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1574.008",
          "name": "Path Interception by Search Order Hijacking",
          "display_name": "T1574.008 - Path Interception by Search Order Hijacking"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1593.002",
          "name": "Search Engines",
          "display_name": "T1593.002 - Search Engines"
        }
      ],
      "industries": [
        "Insurance",
        "Construction"
      ],
      "TLP": "green",
      "cloned_from": "693cdc5b8ebc10664439c2fb",
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 54118,
        "domain": 11153,
        "hostname": 18578,
        "email": 21,
        "FileHash-SHA256": 4905,
        "FileHash-MD5": 548,
        "FileHash-SHA1": 534,
        "CVE": 7,
        "SSLCertFingerprint": 20,
        "CIDR": 1
      },
      "indicator_count": 89885,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "68 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "693cdc5b8ebc10664439c2fb",
      "name": "Project Cicada-.Christopher \u201cBuzz\u201d Ahmann - Freeman Mathis & Gary for The State of Colorado",
      "description": "State of Colorado attackers use  DGA domains set up multiple Law Firms.. Christopher P.  \u2019Buzz\u2019  Ahmann  Is a legal consultant / attorney./ hacker \nWorks for the State of Colorado/ quasi. Is malicious and doesn\u2019t work alone. Continues to target \nState had relative contacted by a fake entity \u2018Goodness Health\u2019\nLeft vague VM for relative message \u201cWe work on the Medicare side of things.\u201d and? \nSocial engineering call , malicious domain. The State of Colorado has been on a relentless pursuit against target. Fully compromised targets relatives brand new phone. Hacked target since 10/2013.\nMultiple cyber and physical attacks carried out  against target and family members.. There are attacks make  to look like accidents or malfunctions. This harmful, silencing behavior is somehow illegal for anyone else.",
      "modified": "2026-02-10T06:05:39.764000",
      "created": "2025-12-13T03:24:11.414000",
      "tags": [
        "colorado state",
        "freeman mathis",
        "history",
        "cyber risk",
        "aspen insureds",
        "gaig insureds",
        "landy insureds",
        "nip group",
        "purm insureds",
        "overview core",
        "united",
        "ip address",
        "present nov",
        "present may",
        "moved",
        "encrypt",
        "unknown",
        "backdoor",
        "passive dns",
        "ransom",
        "checkin",
        "trojandropper",
        "mtb nov",
        "twitter",
        "trojan",
        "data upload",
        "extraction",
        "failed",
        "united states",
        "server response",
        "google safe",
        "results may",
        "lowfi",
        "virtool",
        "mtb alf",
        "mh alf",
        "port",
        "windows nt",
        "destination",
        "msie",
        "khtml",
        "gecko",
        "unknown aaaa",
        "a domains",
        "meta",
        "for privacy",
        "cop supply",
        "urls",
        "as139646 hong",
        "hostname",
        "files",
        "hong kong",
        "domain add",
        "ip related",
        "hash avast",
        "avg clamav",
        "msdefender may",
        "ddos",
        "as13335",
        "ipv4",
        "certificate",
        "hostname add",
        "url analysis",
        "files ip",
        "name strings",
        "category",
        "united states",
        "pulse indicator",
        "address",
        "error",
        "null",
        "object",
        "string",
        "number",
        "google maps",
        "promise",
        "javascript api",
        "dataset",
        "bigint",
        "dark",
        "android",
        "infinity",
        "internal",
        "roboto",
        "trident",
        "void",
        "small",
        "lightrail",
        "false",
        "span",
        "close",
        "light",
        "hybrid",
        "embed",
        "iframe",
        "keygen",
        "this",
        "february",
        "bounce",
        "drop",
        "inside",
        "outside",
        "marker",
        "present dec",
        "pulses otx",
        "aaaa",
        "asnone country",
        "record value",
        "title",
        "pulse pulses",
        "pulses",
        "showing",
        "unknown cname",
        "unknown soa",
        "next associated",
        "ipv4 add",
        "cycbot",
        "extract indic",
        "sneaker bots",
        "proxies data",
        "script script",
        "adult content",
        "nextimage",
        "porn site",
        "div div",
        "platform make",
        "cloudfront x",
        "hio52 p3",
        "unknown ns",
        "pulse submit",
        "title error",
        "reverse dns",
        "status",
        "servers",
        "name servers",
        "vashti hostname",
        "scan endpoints",
        "url http",
        "http",
        "files domain",
        "files related",
        "pulses none",
        "dnssec",
        "sec ch",
        "ch ua",
        "ua full",
        "ua platform",
        "ua bitness",
        "ua arch",
        "version sec",
        "mobile sec",
        "model sec",
        "version list",
        "domain",
        "emails",
        "cookie",
        "url https",
        "show",
        "filehash",
        "urls show",
        "date checked",
        "url hostname",
        "results nov",
        "win32",
        "type",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "ssl certificate",
        "defense evasion",
        "spawns",
        "flag",
        "llc name",
        "server",
        "markmonitor",
        "name server",
        "windir",
        "openurl c",
        "prefetch2",
        "show technique",
        "mitre att",
        "ck matrix",
        "pattern match",
        "ascii text",
        "sha1",
        "href",
        "show process",
        "file",
        "general",
        "local",
        "path",
        "germany unknown",
        "date",
        "registrar",
        "ip whois",
        "dynamicloader",
        "high",
        "medium",
        "search",
        "displayname",
        "tofsee",
        "win64",
        "write",
        "stream",
        "malware",
        "push",
        "entries",
        "tls handshake",
        "failure",
        "forbidden",
        "tlsv1",
        "april",
        "next",
        "write c",
        "intel",
        "ms windows",
        "sha1 add",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "sha256 add",
        "present jun",
        "present mar",
        "medelln",
        "colombia asn",
        "dns resolutions",
        "address domain",
        "related tags",
        "none google",
        "safe browsing",
        "external",
        "present sep",
        "present aug",
        "as54113",
        "present jul",
        "as8068",
        "gmt content",
        "total",
        "read",
        "delete",
        "top source",
        "quasi",
        "murderers",
        "christopher ahmann",
        "buzz ahmann",
        "wow64",
        "slcc2",
        "media center",
        "labor",
        "employment",
        "cdle",
        "dowc",
        "colorado",
        "workers",
        "coloradoif",
        "independent",
        "state",
        "company",
        "entity type",
        "authorized line",
        "analysis",
        "tor analysis",
        "process details",
        "network traffic",
        "t1071",
        "potential ip",
        "click",
        "found",
        "t1480 execution",
        "bad traffic",
        "et info",
        "ck techniques",
        "evasion att",
        "t1057",
        "refresh",
        "body",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "cname",
        "form",
        "pulse",
        "script domains",
        "script urls",
        "administrator",
        "services llc",
        "dns admin",
        "domain admin",
        "global llc",
        "domain manager",
        "computer system",
        "ltd domain",
        "network",
        "alibaba",
        "facebook",
        "phishme",
        "sogou",
        "present jan",
        "present feb",
        "present oct"
      ],
      "references": [
        "https://www.fmglaw.com/lawyers/christopher-ahmann - found in adult content pulse.",
        "Sneaker Bots Proxies Servers Cook Groups Cop Supply",
        "archive.cop.supply \u2022 dev.cop.supply \u2022 https://cop.supply/ \u2022 https://cop.supply/bot-lists/",
        "https://cop.supply/supreme-bots/\u2022 https://cop.supply/useful-tools/",
        "https://cop.supply/proxies-lists/ \u2022 https://cop.supply/shopify-bots/",
        "dns.army \u2022 www.dcopr.dns.army  \u2022 www.glsyaiwjj.dns.army \u2022  www.wgmvk.dns.army",
        "https://maps.googleapis.com/maps/api/js?sensor=false",
        "cell-0.af-south-1.prod.telemetry.console.api.aws",
        "howtoworkacrickoutofyourneck2.pages.dev",
        "firebase-auth-eich0v.pages.dev",
        "http://ianswertomom.com/develop-wise-woman-within-yourself",
        "http://ianswertomom.com/bible-verses-struggling-contentment-mom/  I",
        "https://i-want-to-start-an-onlyfans.pages.dev/favicon.ico| I bet you do boo boo",
        "makeapornsite.com \u2022 https://pornhighschool.com/ \u2022 https://ethnicerotic.com \u2022 https://twitter.com/Make",
        "https://khmerpornvideo.signup0.y.id/",
        "https://lordseriala.life/6337-zvezdnye-vojny-opornaja-komanda.html",
        "https://clear.ml/infrastructure-control-plane",
        "dev-app.project-cicada.com \u2022 http://dev-app.project-cicada.com \u2022 https://dev-app.project-cicada.com (2014 report predates 2016 reports)",
        "https://amano.inboundtools.com/tpcontact  URL https://armg.inboundtools.com/  URL https://gaiax.inboundtools.com/internship  URL https://hmk.inboundtools.com/  URL https://hmk.inboundtools.com/form/assetview_siryo_sier",
        "https://download.clear.ml/cpython_builds/releases/ \u2022 https://download.clear.",
        "https://links.mail.samsara.com/s/c/P9R6gGlExR4nfCwqwJXUmr7NmKcMNde4ZBhCFprlVtsFNgh-4tuTWla0aXN9rIWCjrWtn0Vln7x-hexxVBlY3xxvnEevR8qJU5G5xV3__wo-X7kkpSOhJVfejac-Xk8qu6zs5Z-tILwWYRkNScZNGlAqfwQuJuRw5M-n_ZKI6tuY5XGCZAqWoQepi1NnJiW4wZJkzZlOwGtNkusbuKDcMsLVrrhji2eKh4kYgrJp_SeycJRhasLFCQ3c2bPu4sahEWpcHZrQBaxvdfQgTEno8kV-RJdTDO0zK5MyWDJLeds7mnaDrxlb0O2zmhebUdlHE0R0xHi25dympBUpMlLsQV8bx1WUTOfgK4k0ci9o_2Gbfe22-jLxsJN-msV6pxWYQMaxRNFd4iZRC9J9Z1SC5MBqbvNzqdt98kFdpibnv_QIHdhFyHOR_Ip_LX67Dncc8V8OvAi-H5phfeSyDzwdzf2FQIi82",
        "https://voidpet.io/invite/scaredscared/1rpzxWXa61 \u2022 https://sex-doggy.net/tag/censored",
        "Everyone has simply asked you alll to stop. Target never asked anyone for money.",
        "Legal court documented  agreement to allow and pay target to hire cyber investigators",
        "Attacks are being carried out by The State of Colorado"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Japan",
        "France",
        "Ireland",
        "Spain",
        "Italy",
        "Aruba",
        "Australia",
        "Denmark",
        "United Kingdom of Great Britain and Northern Ireland",
        "Germany",
        "T\u00fcrkiye",
        "Indonesia"
      ],
      "malware_families": [
        {
          "id": "Win.Trojan.GravityRAT-6511862-0",
          "display_name": "Win.Trojan.GravityRAT-6511862-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "target": null
        },
        {
          "id": "Unix.Trojan.Tsunami-6981155-0",
          "display_name": "Unix.Trojan.Tsunami-6981155-0",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32/Systex.A",
          "display_name": "TrojanDropper:Win32/Systex.A",
          "target": "/malware/TrojanDropper:Win32/Systex.A"
        },
        {
          "id": "Win.Trojan.Tepfer-61",
          "display_name": "Win.Trojan.Tepfer-61",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/CutwailRansom:Win32/Crowti.A",
          "display_name": "TrojanDownloader:Win32/CutwailRansom:Win32/Crowti.A",
          "target": null
        },
        {
          "id": "VirTool:Win32/VBInject.gen!MH",
          "display_name": "VirTool:Win32/VBInject.gen!MH",
          "target": "/malware/VirTool:Win32/VBInject.gen!MH"
        },
        {
          "id": "ALF:NID:Susp_NSIS_Stub.A",
          "display_name": "ALF:NID:Susp_NSIS_Stub.A",
          "target": null
        },
        {
          "id": "#LOWFI:HSTR:Criakl.B1",
          "display_name": "#LOWFI:HSTR:Criakl.B1",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Arwobot.B",
          "display_name": "Backdoor:Win32/Arwobot.B",
          "target": "/malware/Backdoor:Win32/Arwobot.B"
        },
        {
          "id": "Win.Packed.Bandook-9882274-1",
          "display_name": "Win.Packed.Bandook-9882274-1",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Cutwail",
          "display_name": "TrojanDownloader:Win32/Cutwail",
          "target": "/malware/TrojanDownloader:Win32/Cutwail"
        },
        {
          "id": "Win.Downloader.Small-4507",
          "display_name": "Win.Downloader.Small-4507",
          "target": null
        },
        {
          "id": "Trojan:Win32/Qbot.R!MTB",
          "display_name": "Trojan:Win32/Qbot.R!MTB",
          "target": "/malware/Trojan:Win32/Qbot.R!MTB"
        },
        {
          "id": "Win.Malware.Mikey-9949492-0",
          "display_name": "Win.Malware.Mikey-9949492-0",
          "target": null
        },
        {
          "id": "Ransom:Win32/Crowti.A",
          "display_name": "Ransom:Win32/Crowti.A",
          "target": "/malware/Ransom:Win32/Crowti.A"
        },
        {
          "id": "Backdoor:Linux/DemonBot.Aa!MTB",
          "display_name": "Backdoor:Linux/DemonBot.Aa!MTB",
          "target": "/malware/Backdoor:Linux/DemonBot.Aa!MTB"
        },
        {
          "id": "Unix.Trojan.Gafgyt-6981154-0",
          "display_name": "Unix.Trojan.Gafgyt-6981154-0",
          "target": null
        },
        {
          "id": "DDOS:Linux/Gafgyt.YA!MTB",
          "display_name": "DDOS:Linux/Gafgyt.YA!MTB",
          "target": "/malware/DDOS:Linux/Gafgyt.YA!MTB"
        },
        {
          "id": "CVE-2017-11882",
          "display_name": "CVE-2017-11882",
          "target": null
        },
        {
          "id": "ALF:Exploit:O97M/CVE-2017-8977",
          "display_name": "ALF:Exploit:O97M/CVE-2017-8977",
          "target": null
        },
        {
          "id": "Cycbot",
          "display_name": "Cycbot",
          "target": null
        },
        {
          "id": "Win32:BotX-gen\\ [Trj]",
          "display_name": "Win32:BotX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        },
        {
          "id": "Mirai (ELF)",
          "display_name": "Mirai (ELF)",
          "target": null
        },
        {
          "id": "Worm",
          "display_name": "Worm",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1204.001",
          "name": "Malicious Link",
          "display_name": "T1204.001 - Malicious Link"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1574.008",
          "name": "Path Interception by Search Order Hijacking",
          "display_name": "T1574.008 - Path Interception by Search Order Hijacking"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1593.002",
          "name": "Search Engines",
          "display_name": "T1593.002 - Search Engines"
        }
      ],
      "industries": [
        "Insurance",
        "Construction"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 54118,
        "domain": 11153,
        "hostname": 18578,
        "email": 21,
        "FileHash-SHA256": 4905,
        "FileHash-MD5": 548,
        "FileHash-SHA1": 534,
        "CVE": 7,
        "SSLCertFingerprint": 20,
        "CIDR": 1
      },
      "indicator_count": 89885,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "68 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6906bd99cadbd4140014c6af",
      "name": "Espionage - Gravity RAT + | Legal entities are State owned.  Attacking severely injured  PT\u2019s SA victim.",
      "description": "Fastly CDN for Palantir (Verizon) unless updated.  Very malicious IoC\u2019s found evaluating IoC\u2019 from Christopher Ahmann - TAM Legal link.\n- Made contact with victim several times.\n- Illegal contact made with attorneys considering representing Tsara. \n- https://unicef.se/assets/apple - link related to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage.\n\nAhmann is named as special counsel but he , like Brian Sabey are \u2018ONLY\u2019  cyber attacking Tsara Brashears.\n\n- protecting Jeffrey Reimer DPT, multiple doctors, Concentra,  blocked and denied care , hired a hitman/men and it would have. Even cheaper to pay her for the injuries she never sought compensation for due to aggressive attacks and threats.",
      "modified": "2025-12-02T01:05:30.331000",
      "created": "2025-11-02T02:10:33.546000",
      "tags": [
        "ipv4",
        "active related",
        "trojandropper",
        "mtb jun",
        "lowfi",
        "trojan",
        "mtb jan",
        "fastly error",
        "please",
        "united",
        "ttl value",
        "get na",
        "total",
        "delete",
        "search",
        "yara detections",
        "sinkhole cookie",
        "value snkz",
        "write",
        "suspicious",
        "ransom",
        "malware",
        "Ransom.Win32.Birele.gsg Checkin",
        "AnubisNetworks Sinkhole Cookie Value Snkz",
        "Possible Compromised Host",
        "dynamicloader",
        "delete c",
        "default",
        "medium",
        "write c",
        "settingswpad",
        "intel",
        "ms windows",
        "users",
        "number",
        "title",
        "installer",
        "top source",
        "top destination",
        "source source",
        "port",
        "filehash",
        "av detections",
        "ids detections",
        "yara rule",
        "gravityrat",
        "detectvm",
        "x00 x00",
        "x00x00",
        "doviacmd",
        "rootjob",
        "getfiles",
        "updateserver",
        "ethernetid",
        "ids signatures",
        "exploits",
        "sid name",
        "malware cve",
        "dns query",
        "dnsbin demo",
        "data exfil",
        "exif data",
        "DNS Query for Webhook/HTTP Request Inspection Service (x .pipedr",
        "DNSBin Demo (requestbin .net) - Data Exfitration",
        "source port",
        "destination",
        "present sep",
        "script urls",
        "script script",
        "a domains",
        "script domains",
        "ip address",
        "meta",
        "present nov",
        "passive dns",
        "next associated",
        "domain add",
        "pe executable",
        "entries",
        "show",
        "msie",
        "windows nt",
        "wow64",
        "copy",
        "present jan",
        "present feb",
        "domain",
        "pulse pulses",
        "urls",
        "files",
        "tam legal",
        "christopher ahmann",
        "https://unicef.se/assets/apple",
        "treece alfrey",
        "hours ago",
        "information",
        "report spam",
        "ahmann colorado",
        "state",
        "special cousel",
        "created",
        "expiro",
        "capture"
      ],
      "references": [
        "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
        "Fastly Error and Palantir blocked several times over the last few months.",
        "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
        "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
        "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
        "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
        "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
        "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
        "https://unicef.se/assets/apple"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/Neconyd.A",
          "display_name": "Trojan:Win32/Neconyd.A",
          "target": "/malware/Trojan:Win32/Neconyd.A"
        },
        {
          "id": "PWS:Win32/QQpass.FC",
          "display_name": "PWS:Win32/QQpass.FC",
          "target": "/malware/PWS:Win32/QQpass.FC"
        },
        {
          "id": "Trojan:Win32/Zombie.A",
          "display_name": "Trojan:Win32/Zombie.A",
          "target": "/malware/Trojan:Win32/Zombie.A"
        },
        {
          "id": "Win.Malware.Urelas-9863836-0",
          "display_name": "Win.Malware.Urelas-9863836-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "target": null
        },
        {
          "id": "Win.Trojan.Vundo-7170412-0",
          "display_name": "Win.Trojan.Vundo-7170412-0",
          "target": null
        },
        {
          "id": "#Lowfi:SuspiciousSectionName",
          "display_name": "#Lowfi:SuspiciousSectionName",
          "target": null
        },
        {
          "id": "Multiple Malware\u2019s , Trojans and Rats",
          "display_name": "Multiple Malware\u2019s , Trojans and Rats",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1197",
          "name": "BITS Jobs",
          "display_name": "T1197 - BITS Jobs"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 909,
        "domain": 449,
        "hostname": 1403,
        "URL": 3552,
        "CIDR": 1,
        "FileHash-MD5": 242,
        "FileHash-SHA1": 185,
        "email": 1
      },
      "indicator_count": 6742,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "138 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "663d2869e0f3a42bbddc42ff",
      "name": "UPX executable packer.",
      "description": "A new rule has been introduced  a \"suspicious\" ELF binary that is packed with the UPX executable packer.\nSuggested ATT&CK IDs: rule SUSP_ELF_LNX_UPX_Compressed_File { meta: description = \"Detects a suspicious ELF binary with UPX compression\" author = \"Florian Roth (Nextron Systems)\" reference = \"Internal Research\" date = \"2018-12-12\" score = 40 hash1 = \"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4\" id = \"078937de-59b3-538e-a5c3-57f4e6050212\" strings: $s1 = \"PROT_EXEC|PROT_WRITE failed.\" fullword ascii $s2 = \"$Id: UPX\" fullword ascii $s3 = \"$Info: This file is packed with the UPX executable packer\" ascii $fp1 = \"check your UCL installation !\"",
      "modified": "2024-10-14T00:01:17.069000",
      "created": "2024-05-09T19:47:53.786000",
      "tags": [
        "cioch adrian",
        "centrum usug",
        "sieciowych",
        "elf binary",
        "upx compression",
        "roth",
        "nextron",
        "info",
        "javascript",
        "html",
        "office open",
        "xml document",
        "network capture",
        "win32 exe",
        "xml pakietu",
        "pdf zestawy",
        "przechwytywanie",
        "office",
        "filehashsha1",
        "url https",
        "cve cve20201070",
        "cve cve20203153",
        "cve cve20201048",
        "cve cve20211732",
        "cve20201048 apr",
        "filehashmd5",
        "cve cve20010901",
        "cve cve20021841",
        "cve20153202 apr",
        "cve cve20160728",
        "cve cve20161807",
        "cve cve20175123",
        "cve20185407 apr",
        "cve cve20054605",
        "cve cve20060745",
        "cve cve20070452",
        "cve cve20070453",
        "cve cve20070454",
        "cve cve20071355",
        "cve cve20071358",
        "cve cve20071871",
        "cve20149614 apr",
        "cve cve20151503",
        "cve cve20152080",
        "cve cve20157377",
        "cve cve20170131",
        "cve20200796 may",
        "cve cve20113403"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 6861,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 5771,
        "domain": 3139,
        "URL": 14525,
        "FileHash-SHA1": 2610,
        "IPv4": 108,
        "CIDR": 40,
        "FileHash-SHA256": 10705,
        "FileHash-MD5": 3373,
        "YARA": 2,
        "CVE": 148,
        "Mutex": 7,
        "FilePath": 3,
        "SSLCertFingerprint": 3,
        "email": 23,
        "JA3": 1,
        "IPv6": 2
      },
      "indicator_count": 40460,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "552 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708efbe1108a2df26f5c5f",
      "name": "Theconstantcompany.com \u2014>Elizabeth Messer &#8211; Spiritual Encouragement for your beautiful, messy life",
      "description": "",
      "modified": "2023-12-06T15:10:51.712000",
      "created": "2023-12-06T15:10:51.712000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 538,
        "hostname": 307,
        "domain": 220,
        "URL": 1053
      },
      "indicator_count": 2118,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708ee4e69d8c30c04154d0",
      "name": "develapp.me - weglot.com",
      "description": "",
      "modified": "2023-12-06T15:10:28.836000",
      "created": "2023-12-06T15:10:28.836000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 75,
        "domain": 265,
        "hostname": 482,
        "URL": 731,
        "FileHash-MD5": 4,
        "FileHash-SHA1": 1,
        "email": 1
      },
      "indicator_count": 1559,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708e0d95a8c74cc715f7a2",
      "name": "West.cn",
      "description": "",
      "modified": "2023-12-06T15:06:53.350000",
      "created": "2023-12-06T15:06:53.350000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 208,
        "domain": 533,
        "hostname": 757,
        "URL": 1861,
        "FileHash-MD5": 1
      },
      "indicator_count": 3360,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708cc78755574d9812e4c8",
      "name": "one google maps api call and one generic key - causing a large chunk of cyber disruption and compromise",
      "description": "",
      "modified": "2023-12-06T15:01:27.166000",
      "created": "2023-12-06T15:01:27.166000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 135,
        "hostname": 149,
        "URL": 352,
        "domain": 53
      },
      "indicator_count": 689,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708c0f5981b6d81d0fa423",
      "name": "data102 and colohouse. Malware hosting",
      "description": "",
      "modified": "2023-12-06T14:58:23.206000",
      "created": "2023-12-06T14:58:23.206000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 458,
        "domain": 557,
        "URL": 2599,
        "hostname": 952
      },
      "indicator_count": 4566,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://f.config.doc.documentelement.style",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://f.config.doc.documentelement.style",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776591723.7711082
}