{
  "type": "URL",
  "indicator": "https://ls.zloirock.ru",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://ls.zloirock.ru",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 2270348555,
      "indicator": "https://ls.zloirock.ru",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 50,
      "pulses": [
        {
          "id": "698904c316bc7710b967d01d",
          "name": "Rare Tier 1 Persistence - Critical \"Patched\", Non Patched Vulnerabilities Remain bypassing Lockdown Mode",
          "description": "Researcher Note (Feb 08, 2026):\nThis artifact represents a sophisticated Cross-Protocol Mesh. Observations confirm that the Cymt/Nemucod wrapper is being utilized as a delivery vehicle for a Firmware-resident ELF binary (Mirai variant).\nThe persistence is notable for its ability to survive Full DFU Restores and Faraday-isolated states, likely due to JTAG-level interaction with the Power Management IC (Chip 4799). This is not a standard opportunistic infection; it is a targeted provisioning event leveraging IDMSA (Identity Management) bridges and Verizon/Akamai Edge infrastructure.\nThe integration with CalendarKit and Maps for geofenced execution suggests a highly coordinated surveillance objective. Forensic analysts should pay specific attention to the sizeofrawdata_antidbg anomalies, which indicate a focus on bypassing Apple Lockdown Mode and Secure Enclave. \nresearcher credit: msudoSOS",
          "modified": "2026-03-27T09:05:26.285000",
          "created": "2026-02-08T21:48:49.147000",
          "tags": [
            "#supportsitewebsiteabuse #rootcertificatefailure #cryptographicf"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 909,
            "URL": 1779,
            "CVE": 126,
            "domain": 659,
            "email": 23,
            "JA3": 1,
            "FileHash-MD5": 230,
            "FileHash-SHA1": 227,
            "FileHash-SHA256": 934,
            "CIDR": 13
          },
          "indicator_count": 4901,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 54,
          "modified_text": "24 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68c954a80675ccc89b0e9b63",
          "name": "Trump #45470 | Palantir container | virus:DOS/Hellspawn + ioS (compromised)",
          "description": "Overt. Trump support campaign text message from #45470. Malicious. Received on a victims hyper compromised iPhone. Attempts to or did take CnC of device. Stutters device, changed App Store , has delete service, device sweep,  shuts down service , halts all pages, denial of service, throttles service, steals\npasswords,  bots , I don\u2019t know if device can be refurbished or research purposes - Palantir DC DGA domains - Trump. Multiple IoC\u2019s , malware with code overlap, it appears to be from a legitimate text for updates #. Visibly affected all aspects of device and software. Commands device shut down. \n[OTX populated: Failed to retrieve suggested indicator for beta-ui, according to the latest results from the Welsh Government's Office for National Statistics (ONS) and the National Data Centre (NDS))",
          "modified": "2025-10-16T12:03:14.279000",
          "created": "2025-09-16T12:14:32.327000",
          "tags": [
            "ttl value",
            "extraction",
            "data upload",
            "failed",
            "extra data",
            "include review",
            "exclude sugges",
            "stop",
            "line",
            "path",
            "polyline",
            "getprocaddress",
            "circle",
            "span",
            "ck id",
            "mitre att",
            "ck matrix",
            "null",
            "error",
            "open",
            "spinner",
            "title",
            "code",
            "iframe",
            "window",
            "void",
            "infinity",
            "crypto",
            "footer",
            "generator",
            "general",
            "format",
            "click",
            "strings",
            "meta",
            "install",
            "encoder",
            "learn",
            "command",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "evasion att",
            "t1480 execution",
            "file defense",
            "adversaries",
            "calls",
            "reads",
            "defense evasion",
            "model",
            "server",
            "registrar abuse",
            "ascio",
            "contact phone",
            "admin city",
            "admin country",
            "admin postal",
            "dnssec",
            "http",
            "ip address",
            "passive dns",
            "related nids",
            "urls",
            "files location",
            "united",
            "flag united",
            "a domains",
            "search",
            "unknown aaaa",
            "certificate",
            "yara detections",
            "av detections",
            "ids detections",
            "alerts",
            "entries elf",
            "filehash",
            "name servers",
            "servers",
            "moved",
            "script script",
            "aaaa",
            "unknown ns",
            "domain add",
            "formbook cnc",
            "checkin",
            "lowfi",
            "mtb jun",
            "github pages",
            "twitter",
            "accept",
            "cryptobit",
            "extra",
            "referen data",
            "trojanproxy",
            "dynamicloader",
            "high",
            "write c",
            "medium",
            "intel",
            "ms windows",
            "entries",
            "pe32",
            "explorer",
            "worm",
            "write",
            "next",
            "trojan",
            "hellspawn",
            "md5 add",
            "malware",
            "data",
            "included iocs",
            "script urls",
            "script domains",
            "gmt content",
            "cash amtincart",
            "expirestue",
            "domain related",
            "sea x",
            "accept encoding",
            "request id",
            "body doctype",
            "apache",
            "encrypt",
            "skynet",
            "third eye tv",
            "calling",
            "delete app",
            "potus",
            "mtb aug",
            "backdoor",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "ipv4 add",
            "utilads",
            "trojandropper",
            "mtb sep",
            "win32upatre aug",
            "yara rule",
            "as15169",
            "guard",
            "smartassembly",
            "associated urls",
            "date checked",
            "url hostname",
            "server response",
            "domain",
            "url analysis",
            "files",
            "date",
            "delete service",
            "45470",
            "text",
            "hybrid",
            "present sep",
            "body",
            "fastly error",
            "please",
            "xor xor",
            "sha256 add",
            "analysis date",
            "file score",
            "detections alf",
            "june",
            "delphi",
            "attempts",
            "yara",
            "high security",
            "file type",
            "pe packer",
            "ransom"
          ],
          "references": [
            "skynet-dev.tcxn.net tcxn.net Registrar Ascio Technologies, Inc - connection to cloud proxy",
            "TrojanProxy:Win32/Malynfits CodeOverlap TrojanSpy:Win32/Nivdort CodeOverlap virus:Win32/Lywer CodeOverlap",
            "https://cryptobit.live/build/assets/app-CkRYqsKL.js \u2022 cryptobit.live \u2022 t.page \u2022 cdn.wallets.cryptobit.live",
            "Trump Support campaign \u2022_\u2022 lantana-mgmt.washington.palantircloud.com \u2022 containers-reishi.palantirfedstart.com",
            "Virus:DOS/Hellspawn 192.168.122.49 10/16/25\t\u2022  IPv4 142.251.9.105",
            "IDS Detections: Win32/Enosch.A gtalk connectivity check | W32/MoonLight.worm User-Agent (HellSpawn)",
            "PWS:Win32/Ymacco.AA50 Win.Trojan.Generic-9959068-0\t SLF:MSIL/PSTAnomaly.A Win.Dropper.Shakblades-7614016-0\t#LowFI:VBExpensiveLoop Win.Packed.Barys-10031677-0\tTEL:Trojan:MSIL/AgentTesla.VPA!MTB Win.Trojan. Backdoor:MSIL/Remcos!MTB",
            "hasownproperty.call \u2022 fireeye.grhd.",
            "Apple Store verified drop down breach  \u2018Apple took a screenshot of pages\u201d"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "TrojanProxy:Win32/Malynfits",
              "display_name": "TrojanProxy:Win32/Malynfits",
              "target": "/malware/TrojanProxy:Win32/Malynfits"
            },
            {
              "id": "Virus:Win32/Lywer",
              "display_name": "Virus:Win32/Lywer",
              "target": "/malware/Virus:Win32/Lywer"
            },
            {
              "id": "Worm:Win32/Lightmoon.H",
              "display_name": "Worm:Win32/Lightmoon.H",
              "target": "/malware/Worm:Win32/Lightmoon.H"
            },
            {
              "id": "Virus:DOS/Hellspawn",
              "display_name": "Virus:DOS/Hellspawn",
              "target": "/malware/Virus:DOS/Hellspawn"
            },
            {
              "id": "Win.Trojan.Dialer-266",
              "display_name": "Win.Trojan.Dialer-266",
              "target": null
            },
            {
              "id": "AgentTesla",
              "display_name": "AgentTesla",
              "target": null
            },
            {
              "id": "Backdoor:MSIL/Remcos",
              "display_name": "Backdoor:MSIL/Remcos",
              "target": "/malware/Backdoor:MSIL/Remcos"
            },
            {
              "id": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
              "display_name": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
              "target": null
            },
            {
              "id": "Trojandropper:Win32/Muldrop.V!MTB",
              "display_name": "Trojandropper:Win32/Muldrop.V!MTB",
              "target": "/malware/Trojandropper:Win32/Muldrop.V!MTB"
            },
            {
              "id": "#LowFI:VBExpensiveLoop",
              "display_name": "#LowFI:VBExpensiveLoop",
              "target": null
            },
            {
              "id": "TEL:Trojan:MSIL/AgentTesla.VPA!MTB",
              "display_name": "TEL:Trojan:MSIL/AgentTesla.VPA!MTB",
              "target": null
            },
            {
              "id": "PWS:Win32/VB.CU",
              "display_name": "PWS:Win32/VB.CU",
              "target": "/malware/PWS:Win32/VB.CU"
            },
            {
              "id": "ALF:Ransom:Win32/Babax.SG!MTB",
              "display_name": "ALF:Ransom:Win32/Babax.SG!MTB",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1489",
              "name": "Service Stop",
              "display_name": "T1489 - Service Stop"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1555",
              "name": "Credentials from Password Stores",
              "display_name": "T1555 - Credentials from Password Stores"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 690,
            "URL": 1479,
            "domain": 476,
            "FileHash-MD5": 526,
            "FileHash-SHA1": 505,
            "FileHash-SHA256": 1509,
            "email": 6
          },
          "indicator_count": 5191,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "186 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68abf75bf3b03b94a6762409",
          "name": "(Repost) How to connect listeners to e.intercom | serverhub.com eonix.net",
          "description": "",
          "modified": "2025-08-25T05:40:43.552000",
          "created": "2025-08-25T05:40:43.552000",
          "tags": [
            "context",
            "error",
            "ajaxupdate",
            "request",
            "requestdata",
            "name",
            "xoctoberassets",
            "datarequest",
            "typesubmit",
            "typetext",
            "click",
            "function",
            "typeof c",
            "bootstrap",
            "javascript",
            "azaz",
            "popover",
            "typeof f",
            "typeof g",
            "typeof h",
            "vui",
            "anda",
            "tente",
            "outubro",
            "trackingclient",
            "srpanj",
            "rabu",
            "vasaris",
            "image",
            "typeof atrkopts",
            "800px",
            "40px",
            "i18n",
            "blockedemail",
            "typeof i18n",
            "hubspot",
            "captcha",
            "date",
            "please",
            "april",
            "august",
            "close",
            "february",
            "june",
            "form",
            "klik",
            "download",
            "window",
            "this",
            "next",
            "null",
            "blank",
            "este",
            "anna",
            "rserver",
            "mais",
            "void",
            "object",
            "typeerror",
            "array",
            "symbol",
            "bound",
            "typeof window",
            "typeof t",
            "invalid path",
            "unknown method",
            "phonenumber",
            "ninja",
            "typeof e",
            "edge",
            "dataname",
            "intercom",
            "typeof symbol",
            "apple",
            "webkiti",
            "criosi",
            "trident"
          ],
          "references": [
            "xfe-URL-Eonix.net-stix2-2.1-export.json",
            "xfe-URL-Serverhub.com-stix2-2.1-export.json",
            "xfe-URL-Enom.com-stix2-2.1-export 2.json",
            "https://widget.intercom.io/widget/rbc8ok9w",
            "https://js.hscollectedforms.net/collectedforms.js",
            "https://js.hsleadflows.net/leadflows.js",
            "https://d31qbv1cthcecs.cloudfront.net/atrk.js",
            "https://serverhub.com/combine/a059fe7a562c0b582328162f0ee69fda-1426025688",
            "https://serverhub.com/modules/system/assets/js/framework.js",
            "https://js.hs-scripts.com/3844463.js",
            "xfe-URL-Cloudfront.net-stix2-2.1-export.json",
            "xfe-URL-Intercom.io-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Vui",
              "display_name": "Vui",
              "target": null
            },
            {
              "id": "Outubro",
              "display_name": "Outubro",
              "target": null
            },
            {
              "id": "Tente",
              "display_name": "Tente",
              "target": null
            },
            {
              "id": "Anda",
              "display_name": "Anda",
              "target": null
            },
            {
              "id": "Vasaris",
              "display_name": "Vasaris",
              "target": null
            },
            {
              "id": "Rabu",
              "display_name": "Rabu",
              "target": null
            },
            {
              "id": "Srpanj",
              "display_name": "Srpanj",
              "target": null
            },
            {
              "id": "TrackingClient",
              "display_name": "TrackingClient",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "62719a4dec6d0aa4631b9b2f",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5708,
            "hostname": 1541,
            "FileHash-SHA256": 876,
            "domain": 915,
            "CVE": 1,
            "FileHash-MD5": 1
          },
          "indicator_count": 9042,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "238 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "67f33233092ab19b74879403",
          "name": "MacOS M2 Chip Infiltration: Game Center & XBOX Pod Game & Chat Server",
          "description": "pulse explores a variety of files, objects, and functions that could be associated with different system components, libraries, and protocols. It highlights a wide range of potential vulnerabilities that may exist in software related to system functions, APIs, data handling, and device interactions, including issues in devices like game controllers, HID devices, and platform-specific services (such as Apple and Android). The pulse references several components across different platforms (macOS, iOS, ARM architectures, and others), with a focus on low-level code, encryption libraries, system utilities, and network protocols like TCP, IP, and Bluetooth. The identified vulnerabilities could involve buffer overflows, deprecated functions, improper memory handling, and potential exploit vectors related to system security, performance, and integrity.",
          "modified": "2025-05-07T02:03:20.735000",
          "created": "2025-04-07T02:02:27.322000",
          "tags": [
            "helper macro",
            "param",
            "param inccache",
            "kerberos",
            "ccache",
            "api function",
            "ccapi",
            "api version",
            "param ioccache",
            "ccacheserver",
            "win32",
            "null",
            "code",
            "win64",
            "error",
            "union",
            "ccapideprecated",
            "ccacheapi",
            "ccapiv2h",
            "apple",
            "export",
            "united",
            "ccache api",
            "cplusplus",
            "x8664",
            "typedef",
            "patheq",
            "none",
            "popen",
            "terminate",
            "false",
            "winenv",
            "winexe",
            "frozen",
            "winservice",
            "python",
            "posixthreads",
            "pyhavecondvar",
            "ntthreads",
            "vista",
            "pyemulatedwincv",
            "ntddivista",
            "semaphore",
            "pycondt",
            "win7",
            "pybuildcore",
            "fall",
            "copyright",
            "technology",
            "all rights",
            "reserved",
            "america",
            "government",
            "within that",
            "klprincipal",
            "klloginoptions",
            "inpassword",
            "klboolean",
            "klindex inindex",
            "login",
            "klstatus",
            "kerberos login",
            "inst",
            "regexp",
            "typeof e",
            "function",
            "typeof t",
            "typeof o",
            "width",
            "typeof",
            "pseudo",
            "body",
            "sticky",
            "date",
            "class",
            "this",
            "void",
            "accept",
            "span",
            "krb5callconv",
            "apoptsreserved",
            "tktflgreserved",
            "kdcoptreserved",
            "krb5data",
            "eblock",
            "krb5address",
            "krb5keyblock",
            "service",
            "realm",
            "format",
            "general",
            "internal",
            "entropy",
            "mask",
            "mcpeerid",
            "mcsession",
            "property",
            "protocol",
            "create",
            "nsuinteger",
            "notifies",
            "mcsession api",
            "interface",
            "bonjour",
            "ascii lowercase",
            "abc company",
            "section",
            "bonjour txt",
            "mcextern",
            "attribute",
            "mcextern extern",
            "mcexternweak",
            "nsenum",
            "nsinteger",
            "mcerrorcode",
            "mcerrorunknown",
            "mcerrortimedout",
            "bonjour apis",
            "stop",
            "peer",
            "example",
            "tags",
            "session",
            "nsprogress",
            "nserror",
            "nsstring",
            "nsurl",
            "nsarray",
            "note",
            "ui element",
            "utf8 encoding",
            "nscopying",
            "nsdictionary",
            "webpackrequire",
            "webpackexports",
            "object",
            "adobe systems",
            "adobe",
            "incorporated",
            "dissemination",
            "touchmove",
            "window",
            "launch",
            "close",
            "core",
            "webview",
            "nwebpackrequire",
            "arraybuffer",
            "name",
            "typedarray",
            "prototype",
            "string",
            "number",
            "nvar",
            "meta",
            "infinity",
            "generator",
            "zero",
            "epsilon",
            "observer",
            "android",
            "freeze",
            "trim",
            "canvas",
            "simple",
            "bind",
            "fast",
            "next",
            "patch",
            "rest",
            "middle",
            "find",
            "enumerate",
            "facebook",
            "executor",
            "apiunavailable",
            "gamecontroller",
            "gcbuttoninput",
            "gcswitchinput",
            "nsobject",
            "apiavailable",
            "hid device",
            "cfstr",
            "iohiddeviceref",
            "boolean value",
            "c iohidmanager",
            "iohidmanager",
            "c iohiddevice",
            "issequential",
            "bool sequential",
            "bool canwrap",
            "nsset",
            "nsunavailable",
            "gcswitchelement",
            "bool",
            "share button",
            "xbox controller",
            "xbox elite",
            "xbox series",
            "gcxboxgamepad",
            "gcpoint2",
            "gcpoint2make",
            "gcpoint2 p",
            "cfinline bool",
            "gcpoint2equal",
            "gcpoint2 point1",
            "gcpoint2 point2",
            "gcrelativeinput",
            "isanalog",
            "bool analog",
            "hasinclude",
            "gcaxis2dinput",
            "gcpoint2 value",
            "gcaxiselement",
            "certain",
            "gcaxisinput",
            "gcbuttonelement",
            "gccontroller",
            "nsnotification",
            "chhapticengine",
            "gcmicrogamepad",
            "input",
            "menu button",
            "gcdevicelight",
            "gccolor",
            "x axis",
            "xvalue",
            "developers",
            "functionality",
            "options button",
            "sf symbols",
            "elements",
            "gcdevice",
            "gctouchstate",
            "gctouchstateup",
            "apideprecated",
            "gckeyboard",
            "gcmouse",
            "nsswiftname",
            "gcdevicebattery",
            "battery level",
            "direction pad",
            "directionapad",
            "thumbstick",
            "gcdevicecursor",
            "a controller",
            "gccolor color",
            "gcinputbuttona",
            "gcinputbuttonb",
            "button b",
            "check",
            "a element",
            "c nil",
            "nsenumerator",
            "siri remote",
            "equivalent",
            "down",
            "left",
            "right",
            "kindof",
            "handle button",
            "c device",
            "immediate input",
            "dualsense",
            "positional",
            "sony dualsense",
            "gcmotion",
            "dualshock",
            "uievent",
            "controllers",
            "uikit user",
            "uiview",
            "method",
            "nsdata",
            "axes",
            "nsdata source",
            "return",
            "nullable",
            "nsdata object",
            "button",
            "shoulder",
            "extended",
            "gamepad profile",
            "nsdata api",
            "gcgamepad",
            "sizeof",
            "standard",
            "gckeyboardinput",
            "keyboard",
            "nsstring const",
            "controller",
            "back buttons",
            "game controller",
            "back",
            "keypad",
            "delete",
            "insert",
            "home",
            "right arrow",
            "left arrow",
            "down arrow",
            "up arrow",
            "korean",
            "backspace",
            "alongside",
            "gckeyuparrow",
            "gckeycode const",
            "lang1",
            "gclinearinput",
            "gcquaternion",
            "gcacceleration",
            "y axis",
            "z axis",
            "gcmouse mouse",
            "gcmouse class",
            "mice",
            "gcmouseinput",
            "mouse profile",
            "scroll",
            "nsdata instance",
            "a alias",
            "press",
            "micro profile",
            "siri remotes",
            "b button",
            "a gcinput",
            "button a",
            "nsoptions",
            "examining",
            "c sfsymbolsname",
            "apple tv",
            "remote",
            "control center",
            "a set",
            "game",
            "gcracingwheel",
            "gcbundlewithpid",
            "gcinputbuttonx",
            "gcinputbuttony",
            "gcinputshifter",
            "gckeya",
            "gckeyb",
            "gckeybackslash",
            "rawvalue",
            "apple swift",
            "o librarylevel",
            "swift import",
            "element",
            "indices",
            "iterator",
            "subsequence",
            "kerberoscomerr",
            "const",
            "permission",
            "mit software",
            "suitability",
            "athena",
            "openvision",
            "gssdllimp",
            "gssapigenerich",
            "this software",
            "purpose",
            "disclaims all",
            "warranties with",
            "regard to",
            "constraint",
            "kerberosprofile",
            "krb5profileh",
            "const names",
            "newvalue",
            "1429577728l",
            "gnuc",
            "mach",
            "omuint32",
            "gssapikrb5h",
            "form",
            "uid form",
            "client function",
            "asrep",
            "including",
            "preauth",
            "db entry",
            "free",
            "pointer",
            "rock",
            "neither",
            "direct",
            "damage",
            "minorstatus",
            "gssbuffert",
            "gssctxidt",
            "gssoid",
            "gssnamet",
            "gsscredidt",
            "gssoidset",
            "gssapi",
            "first",
            "alcapi",
            "alcapientry",
            "alcboolean",
            "targetosmac",
            "alcdevice",
            "alcenum param",
            "alalch",
            "alcchar",
            "alcsizei",
            "capture",
            "but not",
            "limited",
            "openal cross",
            "apple computer",
            "redistribution",
            "is provided",
            "type",
            "alvoid",
            "alint",
            "openal",
            "aluint sid",
            "alenum",
            "alint value",
            "aluint property",
            "alvoid nonnull",
            "alfloat",
            "write",
            "openalopenalh",
            "umbrella header",
            "alenum param",
            "alapi",
            "aluint bid",
            "alsizei",
            "alfloat value",
            "alapientry",
            "aluint",
            "verify",
            "play",
            "speed",
            "bits",
            "albuffer3i",
            "albufferdata",
            "albufferf",
            "albufferfv",
            "albufferi",
            "albufferiv",
            "aldistancemodel",
            "aldopplerfactor",
            "algetbooleanv",
            "algetbuffer3f",
            "iousbhostdevice",
            "iousbhostobject",
            "iousbhostpipe",
            "iousbhoststream",
            "iousbhost",
            "brief",
            "usb host",
            "bool yes",
            "bool no",
            "advance",
            "iousbhostfamily",
            "kernel",
            "ioreturn status",
            "nsnumber",
            "ioreturn error",
            "usb device",
            "select",
            "commands",
            "enqueue",
            "nsmutabledata",
            "field",
            "enum",
            "options",
            "retrieve",
            "iosource",
            "current address",
            "bos descriptor",
            "extract",
            "a descriptor",
            "license",
            "io request",
            "abort",
            "discussion",
            "stream",
            "please",
            "swift api",
            "iousbbitrange",
            "iousbbitrange64",
            "iousbbit",
            "client",
            "usb controller",
            "usb descriptor",
            "unknown",
            "critical",
            "refer",
            "link",
            "send",
            "same",
            "common ui",
            "bluetooth",
            "service browser",
            "option",
            "1001",
            "cfstringref",
            "deprecated",
            "macos",
            "returns",
            "abstract",
            "nswindow",
            "creates",
            "mac os",
            "uuids",
            "uuid",
            "sdp service",
            "nsimage",
            "nsview",
            "mpasskeystring",
            "nsmutablearray",
            "uuid array",
            "ioreturn",
            "runmodal",
            "group",
            "command",
            "byte",
            "masks",
            "pduid",
            "l2cap",
            "range",
            "opcode",
            "packet",
            "major",
            "local",
            "profiles",
            "iobluetooth",
            "framework",
            "support",
            "host controller",
            "rfcomm",
            "minor class",
            "pseudoclass",
            "specific device",
            "headset",
            "peripheral",
            "desktop",
            "glasses",
            "device reset",
            "no hci",
            "hci controller",
            "returns number",
            "variable number",
            "packdata",
            "cstring",
            "pass",
            "path",
            "deprecated in",
            "obex session",
            "obexsessionref",
            "rfcomm channel",
            "obex",
            "does not",
            "l2cap channel",
            "inrefcon",
            "device",
            "length",
            "obex spec",
            "error code",
            "make",
            "headerid",
            "april",
            "alarm",
            "avrcplog",
            "audiolog",
            "bccmd16touint16",
            "bccmd16touint8",
            "bccmd32touint32",
            "hfplog",
            "obexcreatevcard",
            "obexsessionget",
            "uint16tobccmd16",
            "intents",
            "created",
            "andrea gottardo",
            "inimage",
            "intentsui",
            "project version",
            "inshortcut",
            "ibdesignable",
            "invoiceshortcut",
            "nsbundle",
            "siri",
            "beralloct",
            "berbvarrayadd",
            "berbvarrayfree",
            "berbvdup",
            "berbvecadd",
            "berbvecfree",
            "berbvfree",
            "berdump",
            "berdup",
            "berdupbv",
            "ldap",
            "vdspinput1",
            "vectorsize",
            "iirchannel",
            "osvkerndsplib",
            "pragmaonce",
            "paul chang",
            "fri mar",
            "original code",
            "apple operating",
            "modifications",
            "apple public",
            "source license",
            "version",
            "lframesize",
            "i386",
            "picify",
            "callmcount",
            "nonlazystub",
            "align",
            "roundtostack",
            "leaf",
            "import",
            "carnegie mellon",
            "carnegie",
            "inline void",
            "software",
            "school",
            "august",
            "xnuarchi386selh",
            "next computer",
            "mike demoney",
            "bruce martin",
            "state segment",
            "nxswappedfloat",
            "osswapint32",
            "inline float",
            "inline double",
            "osswapint64",
            "armlimitsh",
            "arm64",
            "useclangtypes",
            "bsdarmtypesh",
            "int8t",
            "gnuc typedef",
            "uint8t",
            "ansi c",
            "ansi",
            "use wchart",
            "armmcontexth",
            "mcontextt",
            "armparamh",
            "round",
            "darwinsizet",
            "darwinalign",
            "uint32t",
            "darwinalign32",
            "warranties",
            "a particular",
            "university",
            "armarch6zk",
            "armarch6k",
            "armarch4t",
            "armarch4",
            "http",
            "capbitnb",
            "legacy",
            "armfeatureflag",
            "california",
            "notice",
            "berkeley",
            "limited to",
            "define",
            "useclanglimits",
            "lp64",
            "ansisource",
            "darwincsource",
            "longmin",
            "ulongmax",
            "parameter",
            "vmmemcoherent",
            "vmmemearlyack",
            "vmmeminner",
            "vmmemrt",
            "vmmemguarded",
            "armmemorytypesh",
            "armpalroutinesh",
            "read",
            "struct",
            "booleant",
            "cluster",
            "devbsize",
            "mclbytes",
            "unix system",
            "laboratories",
            "devbshift",
            "thumb",
            "armv5",
            "armv7",
            "cache",
            "neon",
            "swift",
            "bsdarmprofileh",
            "xxx todo",
            "block",
            "mcount",
            "mcountinit",
            "mcountenter",
            "splhigh",
            "armthreadh",
            "armtraph",
            "dflssiz",
            "targetososx",
            "maxssiz",
            "rliminfinity",
            "maxcsiz",
            "bsdarmvmparamh",
            "dfldsiz",
            "maxdsiz",
            "xxx stack",
            "armsignal",
            "int64t",
            "armmachtypesh",
            "int32t",
            "methods",
            "thread",
            "hasapplepac",
            "atmatmtypesh",
            "libkernlocksh",
            "fortifysource",
            "libkerncopyioh",
            "sizedby",
            "darwinosinline",
            "stdcversion",
            "osswapint16",
            "libkerncrch",
            "blockexport",
            "vaargs",
            "blockrelease",
            "blockh",
            "collection",
            "blockcopy",
            "ososbaseh",
            "base",
            "byteoffset",
            "host endianess",
            "generic host",
            "generic",
            "osmalloc",
            "osmalloctag tag",
            "osmalloctag",
            "pci device",
            "uint32",
            "uint32 mask",
            "safecastptr",
            "sint32",
            "osaddatomic64",
            "uint8",
            "libkern c",
            "internal error",
            "core osreturn",
            "libkern",
            "values",
            "pragmamark",
            "kexts",
            "kext",
            "c string",
            "grab",
            "osostypesh",
            "boolean",
            "unsignedwide",
            "uint32 hi",
            "buildtime value",
            "libkernversionh",
            "versionmajor",
            "versionminor",
            "versionvariant",
            "versionrevision",
            "ostype",
            "osrelease",
            "libkernsysctlh",
            "instructions",
            "data cache",
            "future",
            "rbleft",
            "rbright",
            "rbgetparent",
            "splayright",
            "splayleft",
            "rbsetcolor",
            "rbblack",
            "rbgetcolor",
            "comp",
            "main",
            "stdc",
            "msdos",
            "windows",
            "sys16bit",
            "zlibdll",
            "zextern",
            "zconfh",
            "model",
            "zextern int",
            "zstreamerror",
            "znull",
            "zbuferror",
            "zmemerror",
            "zstreamend",
            "zdataerror",
            "zfinish",
            "enough",
            "possible",
            "trailer",
            "compiler",
            "countedby",
            "sparta",
            "osatomic",
            "ipcipctypesh",
            "ipcobjectnull",
            "ipcobjectdead",
            "osreturn",
            "nfskrpch",
            "xdrbuf",
            "xdrbuf xbp",
            "xbptr",
            "xbleft",
            "tlen",
            "lval",
            "xbcleanup",
            "xbtype",
            "xbflags",
            "nfsargsversion",
            "file",
            "packed",
            "nfshz",
            "mount",
            "term",
            "restrict",
            "stats",
            "nfsbitmapset",
            "nfsver3",
            "nfsxunsigned",
            "attr",
            "nfsprogram",
            "nfssmallfh",
            "which",
            "from",
            "mark",
            "obsolete",
            "ip address",
            "iaddrt",
            "netinetbootph",
            "nvmaxtext",
            "magic",
            "etheraddrlen",
            "target",
            "byteorder",
            "bigendian",
            "littleendian",
            "dest",
            "igmp",
            "ushort",
            "inpcbptr",
            "inpcblistentry",
            "ipsec",
            "pcbs",
            "cookie",
            "netinetinstath",
            "minimal",
            "result",
            "arp packet",
            "icmpparamprob",
            "icmpredirect",
            "address",
            "ditto",
            "ip filter",
            "ipv4",
            "ip packet",
            "inject",
            "wifi",
            "server",
            "tcpmaxnotifyack",
            "wired",
            "ecn setup",
            "notify",
            "slow",
            "definitions",
            "tcptmax",
            "retransmit",
            "mptcp",
            "tcpsclosewait",
            "tcpsestablished",
            "tcpstimewait",
            "tcpseq",
            "timer drift",
            "sack",
            "char",
            "icmp",
            "synack",
            "tcpoptnop",
            "syndata",
            "ver",
            "internet",
            "iopcidevice",
            "constant",
            "perst",
            "localonly",
            "iooptionbits",
            "optional access",
            "ioservice",
            "open",
            "pcidriverkith",
            "osmetaclassbase",
            "iorpc rpc",
            "auditpipeiobase",
            "auditsdeviobase",
            "ioctls",
            "data",
            "the software",
            "stdargh",
            "hasincludenext",
            "eli friedman",
            "as is",
            "hack",
            "atomic",
            "atomicseqcst",
            "clangstdatomich",
            "stdchosted",
            "stdboolh",
            "needwintt",
            "stddefh",
            "hasbuiltin",
            "const src",
            "xnumembersize",
            "const dst",
            "wcharmax",
            "wcharmin",
            "limits",
            "kernelstdinth",
            "lp64 typedef",
            "intmaxc",
            "uintmaxc",
            "ptrauth",
            "olddata",
            "value",
            "declkey",
            "abi pointer",
            "c function",
            "float16",
            "fltevalmethod",
            "legacy bsd",
            "c standard",
            "sincospi",
            "cosp",
            "x8664monotonich",
            "staticifentry",
            "hasmte",
            "vmmemorytypesh",
            "vmwimgdefault",
            "wimg",
            "extvectortype",
            "utilfunction",
            "aligned",
            "srcptr",
            "vmpmaph",
            "vmdyldpagerh",
            "vmvmfaulth",
            "vmvmmaph",
            "development",
            "debug",
            "vmvmoptionsh",
            "vmvmpageouth",
            "kasantbi",
            "machvmmemtagh",
            "given",
            "vmmemtagptrsize",
            "vmmemtagtagsize",
            "copy",
            "vmsharedregionh",
            "vfsvfssupporth",
            "veclib",
            "master",
            "world wide",
            "various",
            "veclibtypes",
            "carbonlib",
            "availability",
            "carbon",
            "noncarbon cfm",
            "vbasicops",
            "shift",
            "vforceh",
            "vdsplength n",
            "realp",
            "nonnull",
            "vector",
            "dspsplitcomplex",
            "ieee",
            "dspcomplex",
            "uuiduuidh",
            "uuiddefine",
            "public",
            "uuid library",
            "kernelserver",
            "simpleroutine",
            "undkey",
            "execution",
            "strings array",
            "user",
            "title string",
            "info",
            "1024",
            "xmldatat",
            "undreplyref",
            "kernsuccess",
            "osaction",
            "targetosiphone",
            "istargetvendor",
            "targetcpux8664",
            "targetosunix",
            "targetcpuppc",
            "targetcpuppc64",
            "targetcpux86",
            "targetrtmaccfm",
            "bridge",
            "svflags",
            "svpavreal",
            "svpavreify",
            "xpvav",
            "svany",
            "avfillp",
            "for apidoc",
            "mutableav",
            "avrealoff",
            "pltopenv",
            "stmtstart",
            "stmtend",
            "copfile",
            "plcurstackinfo",
            "copfilegv",
            "cophinthashget",
            "loop",
            "stack",
            "beware",
            "orig",
            "loops",
            "this file",
            "the build",
            "plbitcount",
            "u8 value",
            "cvflags",
            "xpvcv",
            "mutableptr",
            "perlcore",
            "cvgv",
            "cvfile",
            "cvfmethod",
            "cvflvalue",
            "cvfconst",
            "anon",
            "doinit extconst",
            "ebcdic",
            "extconst u8",
            "index",
            "ascii platform",
            "confusingly",
            "u8 pla2e",
            "pla2e",
            "u8 ple2a",
            "guard",
            "declspec",
            "extconst",
            "ext externc",
            "init",
            "larry wall",
            "gnu general",
            "readme file",
            "multiplicity",
            "plsawampersand",
            "do not",
            "perliogetc",
            "perlioputc",
            "perliostdoutf",
            "perlio",
            "perlfeatureh",
            "featuresubbit",
            "featuremyrefbit",
            "featurefcbit",
            "featureisabit",
            "featuresaybit",
            "featurestatebit",
            "featuretrybit",
            "hintfeaturemask",
            "ffspace",
            "process",
            "ffdecimal",
            "ffend",
            "gvgp",
            "gvflags",
            "gvnamehek",
            "svtype",
            "gvegv",
            "gvstash",
            "gvxpvgv",
            "svtpvgv",
            "svtpvlv",
            "super",
            "edit directly",
            "djgpp",
            "bitbucket",
            "perlsysinitbody",
            "perlioinit",
            "perlsystermbody",
            "w macros",
            "wexitstatus",
            "shpath",
            "mkdir",
            "rotl64",
            "rotl32",
            "rotate x",
            "rotr32",
            "can64bithash",
            "rotr64",
            "ivsize",
            "u8to16le",
            "rotluv",
            "rotruv",
            "sbox32maxlen",
            "plhashstate",
            "perlhash",
            "perl",
            "usehashseed",
            "perlseenhvfunch",
            "perlhashseed",
            "siphash24",
            "siphash13",
            "seed",
            "c program",
            "c type",
            "c compiler",
            "gcc attribute",
            "longsize",
            "c preprocessor",
            "install",
            "kill",
            "cont",
            "thus",
            "ext declspec",
            "dext",
            "for apidocitem",
            "utf8",
            "ascii",
            "fitsin8bits",
            "nativetolatin1",
            "strwithlen",
            "u8 end",
            "test",
            "poison",
            "february",
            "cray",
            "prior",
            "behaviour",
            "except",
            "alpha",
            "perlvar",
            "perlvari",
            "perlvara",
            "padoffset",
            "true",
            "pmop",
            "hooks",
            "hook",
            "sv invlist",
            "perlinregcompc",
            "svcur",
            "perlinopc",
            "tointernalsize",
            "svtinvlist",
            "invlistlen",
            "strlen",
            "hvaux",
            "heklen",
            "svook",
            "hekutf8",
            "hekkey",
            "hekflags",
            "mutablehv",
            "hvnameheknn",
            "gosh",
            "leave",
            "iperlsock",
            "plsock",
            "iperlstdio",
            "plstdio",
            "iperlproc",
            "plproc",
            "iperllio",
            "pllio",
            "perlimplicitsys",
            "plink",
            "keypackage",
            "keyend",
            "keysub",
            "keydump",
            "keylog",
            "keysend",
            "keystate",
            "perlioclose",
            "perlmemcollxfrm",
            "nativetoneed",
            "plclocaleobj",
            "plno",
            "plwarnall",
            "plwarnnone",
            "plyes",
            "plzero",
            "plc9utf8dfatab",
            "nomathoms",
            "perlintokec",
            "perlinutf8c",
            "perlinsvc",
            "perlinregexecc",
            "debugging",
            "perlinlocalec",
            "pfinet",
            "snoop",
            "ccprint",
            "ccgraph",
            "cccharnamecont",
            "ccascii",
            "ccwordchar",
            "ccalphanumeric",
            "ccidfirst",
            "ccquotemeta",
            "ccalpha",
            "cccased",
            "ordinal",
            "magicvtablemax",
            "extra",
            "regex match",
            "env hash",
            "isa array",
            "debugger",
            "sig hash",
            "available",
            "shadow",
            "array length",
            "magic mg",
            "sv sv",
            "mgftainteddir",
            "hefsvkey",
            "mutablesv",
            "ssizet",
            "mgvtbl entry",
            "mgfbytes",
            "perlmagicsv 0",
            "special",
            "perlmagicarylen",
            "perlmagicrhash",
            "extra data",
            "perlmagicpos",
            "perlmagicsymtab",
            "provides",
            "dtrace probes",
            "stdioh",
            "stdioincluded",
            "sfioversion",
            "rxfpmfcharset",
            "rxfpmfmultiline",
            "rxfpmffold",
            "rxfpmfextended",
            "rxfpmfnocapture",
            "rxfpmfkeepcopy",
            "flags",
            "rxfpmfstrict",
            "ocshift",
            "plop",
            "perlbitfield16",
            "baseop op",
            "useithreads",
            "pmfonce",
            "padop",
            "perlcknull",
            "perlckfun",
            "opparg1mask",
            "opparg4mask",
            "opparg2mask",
            "perlckftst",
            "perlppftrowned",
            "perlckbitop",
            "perlckcmp",
            "perlcklfun",
            "dump",
            "chroot",
            "syscall",
            "flip",
            "undef",
            "crypt",
            "push",
            "stub",
            "trans",
            "predec",
            "flop",
            "prtf",
            "shutdown",
            "perlcontext cx",
            "perlmemlog",
            "c pointer",
            "cxtype",
            "logic",
            "toavamg",
            "tohvamg",
            "opftrread",
            "oplt",
            "opincmp",
            "opbitand",
            "opsbitor",
            "opsend",
            "opgetpeername",
            "opfteexec",
            "opftbinary",
            "opclose",
            "plparser",
            "yylex",
            "lexshared",
            "position",
            "repl",
            "memsize",
            "malloct",
            "perlmallocctlh",
            "uv nfree",
            "uv ntotal",
            "iv topbucket",
            "iv totalsbrk",
            "iv minbucket",
            "level",
            "plcomppad",
            "plcurpad",
            "uvxf",
            "ptr2uv",
            "avarray",
            "padnameflags",
            "plcopseqmax",
            "padlistarray",
            "c array",
            "padnametype",
            "incpushperl5lib",
            "appllibexp",
            "privlibexp",
            "defineincmacros",
            "perlfsversion",
            "perl5lib",
            "sitearchexp",
            "perllanginfoh",
            "hasnllanginfo",
            "ilanginfo",
            "codeset",
            "codeset 1",
            "dtfmt",
            "dtfmt 2",
            "dfmt",
            "dfmt 3",
            "sipround",
            "u8to64le",
            "fallthrough",
            "uint64c",
            "perlsiphashfnc",
            "siprounds",
            "strlen inlen",
            "sipfinalrounds",
            "could",
            "configure",
            "plout",
            "mine001",
            "argv",
            "plin",
            "localpatchcount",
            "perlapih",
            "xs code",
            "portingglossary",
            "first version",
            "brand",
            "symbols",
            "haswcrtomb",
            "perlionotstdio",
            "perlcallconv",
            "perlio f",
            "perlioh",
            "usestdio",
            "case",
            "bufsiz",
            "sizet",
            "perlstability",
            "perltypedefs",
            "perldtracehin",
            "perlloadedfile",
            "perlloadingfile",
            "perlopentry",
            "perlphasechange",
            "perlsubentry",
            "perlsubreturn",
            "generated",
            "perlcallconv iv",
            "sizet count",
            "sv arg",
            "mode",
            "perliofuncs tab",
            "stdchar",
            "perliolistt",
            "sv args",
            "mutex",
            "perlinterpreter",
            "sigsize",
            "perlioisstdio",
            "perlcallconv op",
            "perldokv",
            "perlppaassign",
            "perlppabs",
            "perlppaccept",
            "perlppadd",
            "perlppaeach",
            "perlppaelem",
            "public license",
            "free software",
            "foundation",
            "yydebug",
            "bison",
            "bareword",
            "funcmeth",
            "arrow",
            "targ",
            "pushs",
            "tops",
            "does",
            "xsub",
            "pops",
            "xpushs",
            "erange",
            "perlreentrapi",
            "perlreentrapi0",
            "hostentsize",
            "getgrentrproto",
            "getpwentrproto",
            "getnetentrproto",
            "grentbuffer",
            "grentsize",
            "hostenterrno",
            "redebugflag",
            "debugvtest",
            "debugr",
            "u16 nextoff",
            "argset",
            "u8 type",
            "nextoff",
            "strings",
            "problem",
            "june",
            "invert",
            "perlfpclass",
            "longdoublekind",
            "plstatusvalue",
            "pldebug",
            "numclasses",
            "locale",
            "grok",
            "pragma",
            "dword",
            "attack",
            "little",
            "lynx",
            "done",
            "reany",
            "rxpextflags",
            "rxextflags",
            "checkpoint cp",
            "rxftaintedseen",
            "rxfcopydone",
            "plsavestackix",
            "plsavestack",
            "plsavestackmax",
            "ssmaxpush",
            "enter",
            "debugscope",
            "state",
            "u32 state",
            "debugsbox32hash",
            "sbox32warn5",
            "line",
            "mutexunlock",
            "mutexinit",
            "noop",
            "mutexlock",
            "condinit",
            "detach",
            "panic",
            "usetm64",
            "should",
            "bsd extension",
            "configuration",
            "time64debug",
            "int64t nv",
            "gnu extension",
            "perltime64h",
            "time64t",
            "int64t int64",
            "int64 time64t",
            "i32 year",
            "tm64",
            "hastmtmgmtoff",
            "decide",
            "svpvx",
            "svgmagic",
            "bonk",
            "anything",
            "turn",
            "crash",
            "fstat",
            "perlmicro",
            "hasioctl",
            "hasutime",
            "hasgroup",
            "haspasswd",
            "usemybinmode",
            "idirent",
            "likely",
            "generated code",
            "utfebcdic",
            "unicode",
            "step",
            "ufeff",
            "u00a0",
            "u00df",
            "u00b5",
            "ufffd",
            "u017f",
            "u0300",
            "unlikely",
            "nativeutf8toi8",
            "utf8skip",
            "nativetouni",
            "lazy",
            "extrasize",
            "regnodemax",
            "exact",
            "match",
            "whilem",
            "anyof",
            "curly",
            "trie",
            "curlym",
            "eval",
            "star",
            "perlutilh",
            "hsmapiverlen",
            "hsxsverlenmax",
            "hskeyp",
            "tools",
            "sv vs",
            "perlversionlt",
            "svpvxnolenconst",
            "perlckwarner",
            "u32 err",
            "scroakxsusage",
            "pluumap",
            "warnings",
            "categories",
            "plcurcop",
            "perlckwarn",
            "perlckwarnd",
            "perlwarnisset",
            "perlwarnoff",
            "perlwarnbit",
            "xsversion",
            "xsreturn",
            "perlxshandshake",
            "plstackbase",
            "hskey",
            "zaphod32mix",
            "u8to32le",
            "zaphod32warn4",
            "zaphod32warn3",
            "zaphod32warn6",
            "perlform",
            "i8tonativeutf8",
            "warnutf8",
            "myshift",
            "c extension",
            "libs",
            "cflags",
            "afkuserlog",
            "kafkeventcancel",
            "kafkeventerror",
            "adamsbagmanager",
            "adjinglerequest",
            "isinternalbuild",
            "kickmcxdforuid",
            "loadappkit",
            "ardconfig",
            "authenticator",
            "dsauthenticator",
            "dsnode",
            "dsrecord",
            "hostconfig",
            "addtofront",
            "calcslope",
            "copyarray",
            "createcachenode",
            "defaultebecurve",
            "deletecache",
            "disablehcucache",
            "dumpcache",
            "dumpoutputhcu",
            "enablet1sim",
            "ascagent",
            "ascagentproxy",
            "asdevice",
            "ddrangecompare",
            "wdosloglauncher",
            "wdoslogprotocol",
            "findchar",
            "ddasllogger",
            "ddfilelogger",
            "ddlog",
            "ddlogfileinfo",
            "ddlogmessage",
            "ddloggernode",
            "mkurlparser",
            "mkerrordomain",
            "mkintegerhash",
            "mklonghash",
            "mkmaprectinset",
            "mkmaprectnull",
            "mkmaprectoffset",
            "mkmaprectworld",
            "mkmapsizeworld",
            "kextensionnonui",
            "wkarraycreate",
            "wkbooleancreate",
            "wkcontextcreate",
            "wkdatacreate",
            "wkdatagettypeid",
            "wkdoublecreate",
            "wkframecopyurl",
            "wkgettypeid",
            "wkimagecreate",
            "wkpagecandelete",
            "webkit",
            "methodkind",
            "wkerrordomain",
            "by apple",
            "document",
            "a block",
            "wkcontentworld",
            "wkwebview",
            "javascript",
            "wkerrorcode",
            "wkerrorunknown",
            "nsswiftasync",
            "wkswiftasync",
            "wkcookiepolicy",
            "nshttpcookie",
            "whether",
            "wknavigation",
            "wkdownload",
            "decides",
            "mime type",
            "wkscriptmessage",
            "wkframeinfo",
            "information",
            "url scheme",
            "wkcontentmode",
            "wkuserscript",
            "wkextern",
            "media",
            "promise",
            "fulfill",
            "cgfloat",
            "targetoswatch",
            "sign",
            "password",
            "provider",
            "uicontrol",
            "nscontrol",
            "opaque user",
            "apple id",
            "nsstring user",
            "asuseragerange",
            "initiate",
            "asauthorization",
            "confirms",
            "apple upgrade",
            "nserrorenum",
            "operation",
            "relying party",
            "targetosvision",
            "a byte",
            "nsdata userid",
            "relying",
            "a string",
            "asapiavailable",
            "http response",
            "authorization",
            "oauth",
            "saml",
            "nsdata readdata",
            "bool didwrite",
            "a cose",
            "nsstring name",
            "bool appid",
            "targetosxr",
            "a state",
            "a json",
            "web token",
            "private seckeys",
            "nsstring appid",
            "mdm profile",
            "nsurl url",
            "returns yes",
            "lacontext",
            "asswiftsendable",
            "keychain",
            "cose algorithm",
            "ecdsa",
            "sha256",
            "cose curve",
            "p256",
            "nsinteger rank",
            "enables",
            "bool success",
            "remove",
            "call",
            "complete",
            "prepare",
            "attempt",
            "list",
            "nsextension",
            "settings",
            "initializes",
            "a key",
            "extensions",
            "hash",
            "json",
            "initialize",
            "nsstring origin",
            "settings app",
            "urls",
            "https urls",
            "safari",
            "cancel",
            "nsuuid uuid",
            "asextern extern",
            "asextern",
            "nsswiftsendable",
            "uiwindow",
            "propertykind",
            "gkplayer",
            "n tags",
            "gkerrordomain",
            "gamecenter",
            "targetosios",
            "targetostv",
            "nsavailable",
            "gkachievement",
            "local player",
            "view",
            "present",
            "optional",
            "gkbaseplayer",
            "game center",
            "uiimage",
            "app store",
            "gkchallenge",
            "gklocalplayer",
            "nsdeprecated",
            "a singleton",
            "gkcloudplayer",
            "returns nil",
            "nsdeprecatedmac",
            "internal2",
            "internal3",
            "internal4",
            "gkscore",
            "gkextern",
            "gkextern extern",
            "gkexternweak",
            "gkerrorcode",
            "gkerrorunknown",
            "gkerrorunderage",
            "friendplayer",
            "standard view",
            "nsresponder",
            "parentwindow",
            "ibaction",
            "gkgamesession",
            "apis",
            "gkplayer player",
            "nsinteger score",
            "nsdate date",
            "gkleaderboard",
            "connect",
            "nsinteger value",
            "load",
            "gktransporttype",
            "nsstring title",
            "loads array",
            "localized",
            "gkmatch",
            "gkmatchrequest",
            "gkinvite",
            "gksession",
            "gksession api",
            "gamekit",
            "asynchronously",
            "welcome",
            "nstimeinterval",
            "delegate",
            "delivery",
            "gksenddatamode",
            "gksessionmode",
            "gkphotosize",
            "callbacks",
            "gkmatchdelegate",
            "gksavedgame",
            "default value",
            "gksessionerror",
            "gkvoicechat",
            "participant",
            "voice chat",
            "clienta"
          ],
          "references": [
            "CredentialsCache.h",
            "CredentialsCache2.h",
            "config.xml",
            "popen_spawn_win32.py",
            "pycore_condvar.h",
            "Kerberos.h",
            "KerberosLogin.h",
            "plugin.js",
            "krb5.h",
            "MultipeerConnectivity.tbd",
            "MCBrowserViewController.h",
            "MCNearbyServiceAdvertiser.h",
            "MCError.h",
            "MCAdvertiserAssistant.h",
            "MCNearbyServiceBrowser.h",
            "MultipeerConnectivity.apinotes",
            "MultipeerConnectivity.h",
            "MCSession.h",
            "MCPeerID.h",
            "canvas.html",
            "capture_0.bundle.js",
            "capture_resize.js",
            "GCRacingWheelInput.h",
            "GCSyntheticDeviceKeys.h",
            "GCSwitchPositionInput.h",
            "GCSteeringWheelElement.h",
            "GCSwitchElement.h",
            "GCTouchedStateInput.h",
            "GCXboxGamepad.h",
            "GCTypes.h",
            "GCRelativeInput.h",
            "GameController.h",
            "GCAxis2DInput.h",
            "GCAxisElement.h",
            "GCAxisInput.h",
            "GCButtonElement.h",
            "GCController.h",
            "GCColor.h",
            "GCControllerAxisInput.h",
            "GCControllerDirectionPad.h",
            "GCControllerInput.h",
            "GCControllerElement.h",
            "GCControllerTouchpad.h",
            "GCDevice.h",
            "GCDeviceBattery.h",
            "GCDeviceCursor.h",
            "GCDeviceHaptics.h",
            "GCDeviceLight.h",
            "GCDevicePhysicalInputState.h",
            "GCDevicePhysicalInputStateDiff.h",
            "GCDirectionalGamepad.h",
            "GCDirectionPadElement.h",
            "GCDevicePhysicalInput.h",
            "GCDualSenseAdaptiveTrigger.h",
            "GCDualSenseGamepad.h",
            "GCDualShockGamepad.h",
            "GCEventViewController.h",
            "GCExtendedGamepadSnapshot.h",
            "GCExtern.h",
            "GCExtendedGamepad.h",
            "GCGamepadSnapshot.h",
            "GCGearShifterElement.h",
            "GCGamepad.h",
            "GCKeyboard.h",
            "GCInputNames.h",
            "GCControllerButtonInput.h",
            "GCKeyNames.h",
            "GCKeyboardInput.h",
            "GCKeyCodes.h",
            "GCLinearInput.h",
            "GCMotion.h",
            "GCMouse.h",
            "GCMouseInput.h",
            "GCMicroGamepadSnapshot.h",
            "GCPhysicalInputElement.h",
            "GCMicroGamepad.h",
            "GCPhysicalInputProfile.h",
            "GCPhysicalInputSource.h",
            "GCPressedStateInput.h",
            "GCProductCategories.h",
            "GCRacingWheel.h",
            "GameController.tbd",
            "arm64e-apple-macos.swiftinterface",
            "x86_64-apple-macos.swiftinterface",
            "module.modulemap",
            "com_err.h",
            "gssapi_generic.h",
            "locate_plugin.h",
            "profile.h",
            "gssapi_krb5.h",
            "preauth_plugin.h",
            "gssapi.h",
            "alc.h",
            "oalStaticBufferExtension.h",
            "oalMacOSX_OALExtensions.h",
            "OpenAL.h",
            "al.h",
            "OpenAL.tbd",
            "IOUSBHost.tbd",
            "IOUSBHostCIEndpointStateMachine.h",
            "IOUSBHostCIControllerStateMachine.h",
            "IOUSBHost.h",
            "IOUSBHostCIPortStateMachine.h",
            "IOUSBHostCIDeviceStateMachine.h",
            "IOUSBHostControllerInterfaceHelpers.h",
            "IOUSBHostDevice.h",
            "IOUSBHostControllerInterface.h",
            "IOUSBHostDefinitions.h",
            "IOUSBHostInterface.h",
            "IOUSBHostIOSource.h",
            "AppleUSBDescriptorParsing.h",
            "IOUSBHostStream.h",
            "IOUSBHostObject.h",
            "IOUSBHostControllerInterfaceDefinitions.h",
            "IOUSBHostPipe.h",
            "IOBluetoothUIUserLib.h",
            "IOBluetoothUI.h",
            "IOBluetoothObjectPushUIController.h",
            "IOBluetoothDeviceSelectorController.h",
            "IOBluetoothPasskeyDisplay.h",
            "IOBluetoothPairingController.h",
            "IOBluetoothServiceBrowserController.h",
            "IOBluetoothUI.tbd",
            "Bluetooth.h",
            "IOBluetooth.h",
            "BluetoothAssignedNumbers.h",
            "IOBluetoothTypes.h",
            "IOBluetoothUtilities.h",
            "OBEXBluetooth.h",
            "IOBluetoothUserLib.h",
            "OBEX.h",
            "IOBluetooth.tbd",
            "INImage+IntentsUI.h",
            "IntentsUI.h",
            "INUIAddVoiceShortcutButton.h",
            "IntentsUI.apinotes",
            "INUIEditVoiceShortcutViewController.h",
            "INUIAddVoiceShortcutViewController.h",
            "LDAP.tbd",
            "OSvKernDSPLib.h",
            "cpu.h",
            "asm_help.h",
            "desc.h",
            "pio.h",
            "io.h",
            "sel.h",
            "reg_help.h",
            "tss.h",
            "table.h",
            "byte_order.h",
            "_limits.h",
            "_types.h",
            "_mcontext.h",
            "_param.h",
            "_endian.h",
            "arch.h",
            "cpuid_internal.h",
            "cpu_capabilities_public.h",
            "arm_features.inc",
            "endian.h",
            "locks.h",
            "limits.h",
            "atomic.h",
            "machine_cpuid.h",
            "memory_types.h",
            "pal_routines.h",
            "machine_routines.h",
            "param.h",
            "cpuid.h",
            "thread.h",
            "trap.h",
            "vmparam.h",
            "signal.h",
            "types.h",
            "AFKMemoryDescriptorOptions.h",
            "machine_machdep.h",
            "atm_types.h",
            "copyio.h",
            "_OSByteOrder.h",
            "crc.h",
            "Block.h",
            "OSBase.h",
            "OSByteOrder.h",
            "OSDebug.h",
            "OSMalloc.h",
            "OSAtomic.h",
            "OSReturn.h",
            "OSKextLib.h",
            "OSTypes.h",
            "version.h",
            "sysctl.h",
            "tree.h",
            "zconf.h",
            "zlib.h",
            "libkern.h",
            "kdp_callout.h",
            "kdp_en_debugger.h",
            "ipc_types.h",
            "krpc.h",
            "rpcv2.h",
            "xdr_subs.h",
            "nfs.h",
            "nfsproto.h",
            "bootp.h",
            "if_ether.h",
            "icmp6.h",
            "icmp_var.h",
            "igmp_var.h",
            "igmp.h",
            "in_pcb.h",
            "in_stat.h",
            "in_private.h",
            "in_arp.h",
            "in_var.h",
            "in_systm.h",
            "ip_var.h",
            "ip_icmp.h",
            "kpi_ipfilter.h",
            "ip6.h",
            "tcp_private.h",
            "ip.h",
            "tcp_timer.h",
            "tcp_fsm.h",
            "udp_var.h",
            "tcp_seq.h",
            "tcpip.h",
            "udp.h",
            "tcp_var.h",
            "tcp.h",
            "IOPCIFamilyDefinitions.h",
            "IOPCIDevice.iig",
            "PCIDriverKit.h",
            "IOPCIDevice.h",
            "audit_ioctl.h",
            "stdarg.h",
            "stdatomic.h",
            "stdbool.h",
            "stddef.h",
            "string.h",
            "stdint.h",
            "ptrauth.h",
            "math.h",
            "monotonic.h",
            "static_if.h",
            "machine_kpc.h",
            "machine_remote_time.h",
            "ipc_pthread_priority_types.h",
            "lz4_assembly_select.h",
            "vm_compressor_algorithms.h",
            "lz4.h",
            "pmap.h",
            "vm_dyld_pager.h",
            "vm_far.h",
            "vm_fault.h",
            "vm_map.h",
            "lz4_constants.h",
            "vm_options.h",
            "vm_pageout.h",
            "vm_memtag.h",
            "vm_shared_region.h",
            "vm_kern.h",
            "vfs_support.h",
            "vecLib.h",
            "vecLibTypes.h",
            "vBasicOps.h",
            "vForce.h",
            "vDSP.h",
            "uuid.h",
            "UNDReply.defs",
            "UNDRequest.defs",
            "KUNCUserNotifications.h",
            "UNDTypes.defs",
            "UNDTypes.h",
            "TargetConditionals.h",
            "apfs_boot_mount.tbd",
            "av.h",
            "cop.h",
            "bitcount.h",
            "cv.h",
            "ebcdic_tables.h",
            "EXTERN.h",
            "embedvar.h",
            "fakesdio.h",
            "feature.h",
            "form.h",
            "gv.h",
            "git_version.h",
            "dosish.h",
            "hv_macro.h",
            "hv_func.h",
            "config.h",
            "INTERN.h",
            "handy.h",
            "intrpvar.h",
            "invlist_inline.h",
            "hv.h",
            "iperlsys.h",
            "keywords.h",
            "libperl.tbd",
            "embed.h",
            "l1_char_class_tab.h",
            "mg_data.h",
            "mg_raw.h",
            "mg.h",
            "mg_vtable.h",
            "mydtrace.h",
            "nostdio.h",
            "op_reg_common.h",
            "op.h",
            "opcode.h",
            "inline.h",
            "overload.h",
            "opnames.h",
            "parser.h",
            "malloc_ctl.h",
            "pad.h",
            "perl_inc_macro.h",
            "perl_langinfo.h",
            "perl_siphash.h",
            "patchlevel.h",
            "perlapi.h",
            "metaconfig.h",
            "perlio.h",
            "perldtrace.h",
            "perliol.h",
            "perlvars.h",
            "perlsdio.h",
            "pp_proto.h",
            "perly.h",
            "pp.h",
            "reentr.h",
            "regcomp.h",
            "perl.h",
            "regexp.h",
            "scope.h",
            "sbox32_hash.h",
            "time64_config.h",
            "time64.h",
            "sv.h",
            "unixish.h",
            "uconfig.h",
            "utfebcdic.h",
            "unicode_constants.h",
            "utf8.h",
            "regnodes.h",
            "util.h",
            "vutil.h",
            "uudmap.h",
            "warnings.h",
            "XSUB.h",
            "zaphod32_hash.h",
            "encode.h",
            "python-3.9.pc",
            "python-3.9-embed.pc",
            "python3-embed.pc",
            "python3.pc",
            "AFKUser.tbd",
            "AdID.tbd",
            "Admin.tbd",
            "AirPlayReceiver.tbd",
            "AppSandbox.tbd",
            "ASEProcessing.tbd",
            "AuthenticationServicesCore.tbd",
            "WebGPU.tbd",
            "WebDriver.tbd",
            "MapKit.tbd",
            "SwiftUI.swiftoverlay",
            "WebKit.tbd",
            "WebKit.apinotes",
            "WKBackForwardList.h",
            "NSAttributedString.h",
            "WebKit.h",
            "WKBackForwardListItem.h",
            "WKContentRuleList.h",
            "WKContentRuleListStore.h",
            "WKContextMenuElementInfo.h",
            "WKDataDetectorTypes.h",
            "WKContentWorld.h",
            "WKError.h",
            "WKFoundation.h",
            "WKFindResult.h",
            "WKHTTPCookieStore.h",
            "WKFrameInfo.h",
            "WKNavigation.h",
            "WKFindConfiguration.h",
            "WKNavigationDelegate.h",
            "WKNavigationResponse.h",
            "WKOpenPanelParameters.h",
            "WebKitLegacy.h",
            "WKPreviewActionItem.h",
            "WKNavigationAction.h",
            "WKPreferences.h",
            "WKPreviewActionItemIdentifiers.h",
            "WKPreviewElementInfo.h",
            "WKProcessPool.h",
            "WKDownload.h",
            "WKPDFConfiguration.h",
            "WKScriptMessage.h",
            "WKSecurityOrigin.h",
            "WKScriptMessageHandler.h",
            "WKSnapshotConfiguration.h",
            "WKUIDelegate.h",
            "WKURLSchemeTask.h",
            "WKWebpagePreferences.h",
            "WKUserContentController.h",
            "WKWebsiteDataStore.h",
            "WKWebsiteDataRecord.h",
            "WKUserScript.h",
            "WKURLSchemeHandler.h",
            "WKWebViewConfiguration.h",
            "WKWebView.h",
            "WKScriptMessageHandlerWithReply.h",
            "WKWindowFeatures.h",
            "WKDownloadDelegate.h",
            "ASAccountAuthenticationModificationController.h",
            "ASAccountAuthenticationModificationViewController.h",
            "ASAuthorization.h",
            "ASAuthorizationAppleIDButton.h",
            "ASAccountAuthenticationModificationRequest.h",
            "ASAuthorizationAppleIDProvider.h",
            "ASAuthorizationAppleIDRequest.h",
            "ASAuthorizationAppleIDCredential.h",
            "ASAuthorizationController.h",
            "ASAuthorizationCredential.h",
            "ASAccountAuthenticationModificationExtensionContext.h",
            "ASAuthorizationError.h",
            "ASAuthorizationCustomMethod.h",
            "ASAuthorizationPasswordRequest.h",
            "ASAuthorizationOpenIDRequest.h",
            "ASAuthorizationPlatformPublicKeyCredentialDescriptor.h",
            "ASAuthorizationPlatformPublicKeyCredentialProvider.h",
            "ASAccountAuthenticationModificationReplacePasswordWithSignInWithAppleRequest.h",
            "ASAccountAuthenticationModificationUpgradePasswordToStrongPasswordRequest.h",
            "ASAuthorizationPlatformPublicKeyCredentialRegistrationRequest.h",
            "ASAuthorizationPlatformPublicKeyCredentialRegistration.h",
            "ASAuthorizationProvider.h",
            "ASAuthorizationPlatformPublicKeyCredentialAssertion.h",
            "ASAuthorizationPublicKeyCredentialAssertion.h",
            "ASAuthorizationPublicKeyCredentialAssertionRequest.h",
            "ASAuthorizationPublicKeyCredentialConstants.h",
            "ASAuthorizationProviderExtensionAuthorizationResult.h",
            "ASAuthorizationPublicKeyCredentialDescriptor.h",
            "ASAuthorizationPublicKeyCredentialLargeBlobAssertionOutput.h",
            "ASAuthorizationPasswordProvider.h",
            "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationInput.h",
            "ASAuthorizationPublicKeyCredentialParameters.h",
            "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationOutput.h",
            "ASAuthorizationPublicKeyCredentialRegistration.h",
            "ASAuthorizationPublicKeyCredentialRegistrationRequest.h",
            "ASAuthorizationPublicKeyCredentialLargeBlobAssertionInput.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialAssertion.h",
            "ASAuthorizationRequest.h",
            "ASAuthorizationPlatformPublicKeyCredentialAssertionRequest.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialProvider.h",
            "ASAuthorizationSingleSignOnCredential.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialDescriptor.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialAssertionRequest.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialRegistration.h",
            "ASAuthorizationSingleSignOnProvider.h",
            "ASAuthorizationWebBrowserExternallyAuthenticatableRequest.h",
            "ASAuthorizationWebBrowserPlatformPublicKeyCredentialAssertionRequest.h",
            "ASAuthorizationWebBrowserPlatformPublicKeyCredentialRegistrationRequest.h",
            "ASAuthorizationWebBrowserPublicKeyCredentialManager.h",
            "ASAuthorizationWebBrowserPlatformPublicKeyCredential.h",
            "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialAssertionRequest.h",
            "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialRegistrationRequest.h",
            "ASCOSEConstants.h",
            "ASCredentialIdentity.h",
            "ASAuthorizationSingleSignOnRequest.h",
            "ASCredentialIdentityStore.h",
            "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialProvider.h",
            "ASCredentialProviderExtensionContext.h",
            "ASCredentialProviderViewController.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialRegistrationRequest.h",
            "ASCredentialServiceIdentifier.h",
            "ASExtensionErrors.h",
            "ASAuthorizationProviderExtensionAuthorizationRequest.h",
            "ASCredentialRequest.h",
            "ASAuthorizationWebBrowserPlatformPublicKeyCredentialProvider.h",
            "ASPasskeyAssertionCredential.h",
            "ASPasskeyCredentialRequest.h",
            "ASPasskeyCredentialRequestParameters.h",
            "ASCredentialIdentityStoreState.h",
            "ASPasskeyRegistrationCredential.h",
            "ASPasswordCredential.h",
            "ASPublicKeyCredential.h",
            "ASPasskeyCredentialIdentity.h",
            "ASPublicKeyCredentialClientData.h",
            "ASSettingsHelper.h",
            "ASWebAuthenticationSessionCallback.h",
            "ASWebAuthenticationSession.h",
            "ASWebAuthenticationSessionRequest.h",
            "ASWebAuthenticationSessionWebBrowserSessionManager.h",
            "AuthenticationServices.h",
            "ASFoundation.h",
            "AuthenticationServices.apinotes",
            "ASWebAuthenticationSessionWebBrowserSessionHandling.h",
            "ASPasswordCredentialIdentity.h",
            "ASPasswordCredentialRequest.h",
            "GameKit.apinotes",
            "GKAccessPoint.h",
            "GameKit.h",
            "GKAchievement.h",
            "GKAchievementViewController.h",
            "GKBasePlayer.h",
            "GKAchievementDescription.h",
            "GKChallengeEventHandler.h",
            "GKCloudPlayer.h",
            "GKChallengesViewController.h",
            "GKChallenge.h",
            "GKDefines.h",
            "GKError.h",
            "GKEventListener.h",
            "GKFriendRequestComposeViewController.h",
            "GKDialogController.h",
            "GKGameSessionEventListener.h",
            "GKGameSessionError.h",
            "GKGameCenterViewController.h",
            "GKGameSessionSharingViewController.h",
            "GKLeaderboardEntry.h",
            "GKLeaderboard.h",
            "GKLeaderboardScore.h",
            "GKGameSession.h",
            "GKLeaderboardSet.h",
            "GKLocalPlayer.h",
            "GKLeaderboardViewController.h",
            "GKMatch.h",
            "GKMatchmaker.h",
            "GKMatchmakerViewController.h",
            "GKPeerPickerController.h",
            "GKNotificationBanner.h",
            "GKPublicConstants.h",
            "GKPlayer.h",
            "GKPublicProtocols.h",
            "GKSavedGameListener.h",
            "GKScore.h",
            "GKSessionError.h",
            "GKVoiceChat.h",
            "GKTurnBasedMatchmakerViewController.h",
            "GKSession.h",
            "GKTurnBasedMatch.h",
            "GKSavedGame.h",
            "GKVoiceChatService.h"
          ],
          "public": 1,
          "adversary": "Turla Group, FIN7, APT34, APT28, DragonForce Malaysia Hacker Group, Indonesia Islamic Warriors Counc",
          "targeted_countries": [
            "United States of America",
            "India",
            "Australia"
          ],
          "malware_families": [
            {
              "id": "OSAtomic",
              "display_name": "OSAtomic",
              "target": null
            },
            {
              "id": "OSReturn",
              "display_name": "OSReturn",
              "target": null
            },
            {
              "id": "Ver",
              "display_name": "Ver",
              "target": null
            },
            {
              "id": "Internet",
              "display_name": "Internet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1016",
              "name": "System Network Configuration Discovery",
              "display_name": "T1016 - System Network Configuration Discovery"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1049",
              "name": "System Network Connections Discovery",
              "display_name": "T1049 - System Network Connections Discovery"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 39,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "ilyailya",
            "id": "298851",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1968,
            "domain": 526,
            "FileHash-SHA256": 207,
            "hostname": 972,
            "email": 55,
            "FileHash-SHA1": 9,
            "FileHash-MD5": 4,
            "CVE": 2,
            "CIDR": 10
          },
          "indicator_count": 3753,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 34,
          "modified_text": "348 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a54a663b348b34b12f97",
          "name": "Command and Control - 199.59.243.224",
          "description": "",
          "modified": "2023-12-06T16:46:02.873000",
          "created": "2023-12-06T16:46:02.873000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "domain": 827,
            "FileHash-SHA256": 659,
            "hostname": 1381,
            "URL": 3637,
            "email": 1,
            "FileHash-MD5": 826,
            "FileHash-SHA1": 150
          },
          "indicator_count": 7482,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a47560e3f989a5556289",
          "name": "Typosquatting - httpsFreCodeCamp.org",
          "description": "",
          "modified": "2023-12-06T16:42:29.567000",
          "created": "2023-12-06T16:42:29.567000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "domain": 827,
            "FileHash-SHA256": 659,
            "hostname": 1381,
            "URL": 3637,
            "email": 1,
            "FileHash-MD5": 826,
            "FileHash-SHA1": 150
          },
          "indicator_count": 7482,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a46fe2f276b4a4daa9f7",
          "name": "Typosquatting - httpsFreCodeCamp.org",
          "description": "",
          "modified": "2023-12-06T16:42:23.297000",
          "created": "2023-12-06T16:42:23.297000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "domain": 827,
            "FileHash-SHA256": 659,
            "hostname": 1381,
            "URL": 3637,
            "email": 1,
            "FileHash-MD5": 826,
            "FileHash-SHA1": 150
          },
          "indicator_count": 7482,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a468597b81d280b67f3b",
          "name": "199.59.243.224 Command and Control",
          "description": "",
          "modified": "2023-12-06T16:42:16.587000",
          "created": "2023-12-06T16:42:16.587000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "domain": 827,
            "FileHash-SHA256": 659,
            "hostname": 1381,
            "URL": 3637,
            "email": 1,
            "FileHash-MD5": 826,
            "FileHash-SHA1": 150
          },
          "indicator_count": 7482,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709fad03b8f1cdc6abe334",
          "name": "FreCodeCamp.org  - Typosquating and or Malicious Redirect. Social Engineering and",
          "description": "",
          "modified": "2023-12-06T16:22:04.700000",
          "created": "2023-12-06T16:22:04.700000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "domain": 827,
            "FileHash-SHA256": 659,
            "hostname": 1381,
            "URL": 3637,
            "email": 1,
            "FileHash-MD5": 826,
            "FileHash-SHA1": 150
          },
          "indicator_count": 7482,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709a271fd1e3c22cf63f86",
          "name": "iCloud - cant access due to insecure conx - yes everything here is compromised via chaining, neural ai and accessibilty kit emulated via android",
          "description": "",
          "modified": "2023-12-06T15:58:31.832000",
          "created": "2023-12-06T15:58:31.832000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 705,
            "domain": 302,
            "FileHash-SHA256": 840,
            "URL": 2603,
            "email": 2,
            "FileHash-MD5": 51,
            "FileHash-SHA1": 51
          },
          "indicator_count": 4554,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708d2dc7aa57db55aab29c",
          "name": "serverhub.com eonix.net",
          "description": "",
          "modified": "2023-12-06T15:03:09.373000",
          "created": "2023-12-06T15:03:09.373000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 876,
            "URL": 5708,
            "hostname": 1541,
            "domain": 915,
            "FileHash-MD5": 1
          },
          "indicator_count": 9042,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708d0feef4846c00f17bad",
          "name": "CONSTANT TECHNOLOGIES \u273b Software house in Israel &amp; Armenia",
          "description": "",
          "modified": "2023-12-06T15:02:39.062000",
          "created": "2023-12-06T15:02:39.062000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 243,
            "URL": 1724,
            "domain": 516,
            "hostname": 694
          },
          "indicator_count": 3177,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c8a9635f156e79238f1",
          "name": "intel gained from a spam text",
          "description": "",
          "modified": "2023-12-06T15:00:26.727000",
          "created": "2023-12-06T15:00:26.727000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 823,
            "domain": 717,
            "URL": 2245,
            "hostname": 615,
            "email": 4,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 1
          },
          "indicator_count": 4411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c45f8a517d76d776231",
          "name": "Malware - reliablesite.net",
          "description": "",
          "modified": "2023-12-06T14:59:17.346000",
          "created": "2023-12-06T14:59:17.346000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 238,
            "domain": 565,
            "hostname": 827,
            "URL": 2233
          },
          "indicator_count": 3863,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c37c54dd9e78f85c0fa",
          "name": "\u7ea2\u674f\u89c6\u9891 malware",
          "description": "",
          "modified": "2023-12-06T14:59:03.859000",
          "created": "2023-12-06T14:59:03.859000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1686,
            "hostname": 2218,
            "URL": 5740,
            "domain": 901,
            "FileHash-MD5": 3
          },
          "indicator_count": 10548,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c27074200c710e3b35c",
          "name": "Malware hosting - metronetinc.com",
          "description": "",
          "modified": "2023-12-06T14:58:47.235000",
          "created": "2023-12-06T14:58:47.235000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 447,
            "hostname": 1241,
            "domain": 536,
            "URL": 3731
          },
          "indicator_count": 5955,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c1c5e2cc4dfe8d0ed97",
          "name": "CPANEL-TUCOWS \u2014malware hosting",
          "description": "",
          "modified": "2023-12-06T14:58:36.254000",
          "created": "2023-12-06T14:58:36.254000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 815,
            "hostname": 3487,
            "domain": 1182,
            "URL": 10194,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 1
          },
          "indicator_count": 15682,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c0f5981b6d81d0fa423",
          "name": "data102 and colohouse. Malware hosting",
          "description": "",
          "modified": "2023-12-06T14:58:23.206000",
          "created": "2023-12-06T14:58:23.206000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 458,
            "domain": 557,
            "URL": 2599,
            "hostname": 952
          },
          "indicator_count": 4566,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c0791fece390b1a096e",
          "name": "Choopa.com - vultr",
          "description": "",
          "modified": "2023-12-06T14:58:15.734000",
          "created": "2023-12-06T14:58:15.734000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 453,
            "hostname": 1241,
            "domain": 430,
            "URL": 3454
          },
          "indicator_count": 5578,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c01dca4e6c505e4fca0",
          "name": "Hostgator - whitelisted",
          "description": "",
          "modified": "2023-12-06T14:58:09.135000",
          "created": "2023-12-06T14:58:09.135000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 692,
            "hostname": 1339,
            "domain": 1260,
            "URL": 4622,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 1
          },
          "indicator_count": 7917,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708beba2ba8bcfb1d10237",
          "name": "hostkey - Industroyer&ReduceRight",
          "description": "",
          "modified": "2023-12-06T14:57:47.430000",
          "created": "2023-12-06T14:57:47.430000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 304,
            "hostname": 563,
            "domain": 407,
            "URL": 1776,
            "FileHash-SHA1": 2
          },
          "indicator_count": 3052,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708bbc4c8bf557c17688e1",
          "name": "\u9ad8\u5c71tv,\u9ad8\u5c71tv,\u9ad8\u5c71tv\u5f71\u9662,\u9ad8\u5c71tv\u770b\u7247\u7f51",
          "description": "",
          "modified": "2023-12-06T14:57:00.280000",
          "created": "2023-12-06T14:57:00.280000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 233,
            "domain": 361,
            "hostname": 563,
            "URL": 1374,
            "FileHash-SHA1": 1,
            "FileHash-MD5": 1
          },
          "indicator_count": 2534,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708122b0514054bd29b713",
          "name": "a.pub.network:timcast-com:pubfig.min.js",
          "description": "",
          "modified": "2023-12-06T14:11:46.462000",
          "created": "2023-12-06T14:11:46.462000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "domain": 416,
            "URL": 2786,
            "FileHash-SHA256": 955,
            "hostname": 1095,
            "SSLCertFingerprint": 14,
            "FileHash-MD5": 66,
            "FileHash-SHA1": 24,
            "CIDR": 5,
            "email": 1
          },
          "indicator_count": 5363,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657080735501c11ddbb7a988",
          "name": "Dominionvoting.com 03.03.22",
          "description": "",
          "modified": "2023-12-06T14:08:51.329000",
          "created": "2023-12-06T14:08:51.329000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 663,
            "hostname": 588,
            "domain": 413,
            "URL": 2183,
            "FileHash-MD5": 7
          },
          "indicator_count": 3854,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707e5b7df6f60133e8fb50",
          "name": "Jeeng / Powerbox",
          "description": "",
          "modified": "2023-12-06T13:59:55.129000",
          "created": "2023-12-06T13:59:55.129000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 3,
            "FileHash-SHA256": 9072,
            "domain": 2500,
            "hostname": 3584,
            "URL": 13548,
            "FileHash-MD5": 197,
            "FileHash-SHA1": 162,
            "email": 19,
            "CIDR": 20,
            "SSLCertFingerprint": 2,
            "BitcoinAddress": 1
          },
          "indicator_count": 29108,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6507d7f6b7377c6661892549",
          "name": " Command and Control - 199.59.243.224",
          "description": "",
          "modified": "2023-09-18T04:54:14.378000",
          "created": "2023-09-18T04:54:14.378000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6500a5daf00fa294f0454541",
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7653,
            "FileHash-SHA256": 4241,
            "domain": 1485,
            "hostname": 2976,
            "FileHash-MD5": 10625,
            "FileHash-SHA1": 2805,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 29790,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "945 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6500a61e6dadf56df268be36",
          "name": "Typosquatting - httpsFreCodeCamp.org",
          "description": "",
          "modified": "2023-09-12T23:03:58.658000",
          "created": "2023-09-12T17:55:42.532000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6500a5daf00fa294f0454541",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7653,
            "FileHash-SHA256": 4241,
            "domain": 1485,
            "hostname": 2976,
            "FileHash-MD5": 10625,
            "FileHash-SHA1": 2805,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 29790,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "950 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6500a61b16728d0a29c7b6a7",
          "name": "Typosquatting - httpsFreCodeCamp.org",
          "description": "",
          "modified": "2023-09-12T23:03:58.658000",
          "created": "2023-09-12T17:55:39.783000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6500a5daf00fa294f0454541",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7653,
            "FileHash-SHA256": 4241,
            "domain": 1485,
            "hostname": 2976,
            "FileHash-MD5": 10625,
            "FileHash-SHA1": 2805,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 29790,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "950 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6500a5daf00fa294f0454541",
          "name": "199.59.243.224 Command and Control ",
          "description": "",
          "modified": "2023-09-12T23:03:58.658000",
          "created": "2023-09-12T17:54:34.352000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64d90dda3a7763b24267102d",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7653,
            "FileHash-SHA256": 4241,
            "domain": 1485,
            "hostname": 2976,
            "FileHash-MD5": 10625,
            "FileHash-SHA1": 2805,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 29790,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "950 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64d90dda3a7763b24267102d",
          "name": "FreCodeCamp.org  - Typosquating and or Malicious Redirect. Social Engineering and",
          "description": "Wannacry, Malware, Trojans, evaders, executables, Droppers,Trickbots,malware on discord Artemis, B.Scope adware Artemis, CVE, Apple phishing ,cve-2014-3931\ncve-2005-0068\ncve-2015-1701\ncve-2004-0790\ncve-2008-2938\ncve-2009-1535\ncve-2009-0233\ncve-2014-6345\ncontains-embedded-js\ncontains-elf\ncve-2008-1447\ncve-1999-0016\nnsis\nattachment\nupx\ncve-2016-2569\ncve-2017-0147\ncontains-pe\nbobsoft\nRulesets:\nTrickBot  \nAPT10_Malware_Sample_Gen  \nRuleset:\n(smtp) unknown command\nSURICATA SMTP Mime base64-decoding failed\nSURICATA SMTP Mime encoded line len exceeded\nSURICATA Applayer Detect protocol only one direction\nFile Found over SMTP and stored\nUnique rule identifier:\nPrivate collection.\nMALWARE\nRANSOM \nMALWARE RANSOM\nworm.mydoom/emailworm\ntrojan.wannacry/wannacryptor\ntrojan.heye/msil\nTrojan: LotAccessUI.EXE ( Win32 EXE \nexecutable\nwindows\nwin32\npe\npeexe\nMagic\t\nPE32 \nMITRE ATT&CK Navigator\nExecution\nTA0002\nPrivilege Escalation\nTA0004\nDefense Evasion\nTA0005\nCredential Access\nTA0006\nDiscovery\nTA0007\nCollection\nTA0009",
          "modified": "2023-09-12T23:03:58.658000",
          "created": "2023-08-13T17:07:38.032000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7653,
            "FileHash-SHA256": 4241,
            "domain": 1485,
            "hostname": 2976,
            "FileHash-MD5": 10625,
            "FileHash-SHA1": 2805,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 29790,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "950 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6457df59f333c9e3027ac390",
          "name": "iCloud - cant access due to insecure conx - yes everything here is compromised via chaining, neural ai and accessibilty kit emulated via android",
          "description": "thisi s from scan 25 april 2023 \nlets compare to 2020",
          "modified": "2023-05-07T17:36:13.269000",
          "created": "2023-05-07T17:26:49.285000",
          "tags": [
            "chromeua",
            "optout",
            "windir",
            "prefetch8 ansi",
            "fatalerror",
            "facebook",
            "meta",
            "unknown",
            "suspicious",
            "null",
            "body",
            "black",
            "iframe",
            "media",
            "qakbot",
            "icloud",
            "apple"
          ],
          "references": [
            "https://www.icloud.com",
            "https://www.hybrid-analysis.com/sample/d3ffdf44916b01e14fceca04c3a3beb5fbad5aeea482e2242c5a843793073874/6447a07b59116aba3303e517"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1555",
              "name": "Credentials from Password Stores",
              "display_name": "T1555 - Credentials from Password Stores"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2603,
            "hostname": 705,
            "domain": 302,
            "FileHash-SHA256": 840,
            "email": 2,
            "IPv4": 10,
            "FileHash-MD5": 51,
            "FileHash-SHA1": 51
          },
          "indicator_count": 4564,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 91,
          "modified_text": "1078 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6426dda295502d82e6e6ef7f",
          "name": "v4 - Hybrid scan uploaded  + all suggested ioc's - vendor.3a0e728a.js another gem in edge on twitter.com/i/flow/login source code",
          "description": "WebpackChunk_Twitter-responsive_web is built on a single web address, which will allow users to upload images, tweets and videos to be stored in the same place as the hashtag.",
          "modified": "2023-03-31T13:18:26.733000",
          "created": "2023-03-31T13:18:26.733000",
          "tags": [
            "trojan",
            "apt",
            "ansi",
            "memoryfile scan",
            "error",
            "runtime data",
            "typeof e",
            "regexp",
            "array",
            "object",
            "typeof t",
            "void",
            "null",
            "unknown",
            "path",
            "facebook",
            "4096",
            "suspicious",
            "meta",
            "lazy",
            "entity",
            "union",
            "body",
            "idkey",
            "scroll",
            "backspace",
            "insert",
            "roboto",
            "target",
            "stack",
            "hybrid",
            "model",
            "click",
            "stream",
            "strings",
            "qakbot",
            "pattern match",
            "ud801",
            "ud804",
            "ud805",
            "ud806",
            "ud81a",
            "ud835",
            "ud800",
            "ud802",
            "sha1",
            "sha256",
            "vendor.3a0e728a.js"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/9bf30967dfbf84d91ff4a1ca66dcd6c3383e679917e8b7aa4f659ff9f4e848d7/6426cf48655f94b6b303704c"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1115",
              "name": "Clipboard Data",
              "display_name": "T1115 - Clipboard Data"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1353,
            "hostname": 222,
            "domain": 221,
            "FileHash-SHA256": 85,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 1
          },
          "indicator_count": 1885,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1116 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62ef892702161397e694c949",
          "name": ";https://www.xing.com/companies/sec-researchgmbh - CVE-2021-22941 -",
          "description": "Am I just dragging this cve-2021-22941 round with me and infecting domains that I scan??",
          "modified": "2022-09-06T00:02:32.372000",
          "created": "2022-08-07T09:43:03.312000",
          "tags": [
            "apt",
            "runtime data",
            "ds5p",
            "decrypted ssl",
            "divp",
            "typeerror",
            "oziq",
            "error",
            "meta",
            "this",
            "null",
            "tetris",
            "pene",
            "click",
            "hosts",
            "august",
            "local",
            ";https://www.xing.com/companies/sec-researchgmbh"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/d486999c12741352b6458da8e0b0322e3eca96297d6e00424d505ee0590227ce/62eee9810cf3eb216a0aded2",
            "https://www.xing.com/companies/sec-researchgmbh",
            "page error"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 107,
            "URL": 215,
            "domain": 49,
            "CVE": 1,
            "FileHash-MD5": 35,
            "FileHash-SHA1": 31,
            "FileHash-SHA256": 34,
            "email": 3
          },
          "indicator_count": 475,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 391,
          "modified_text": "1322 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62e80d56fba248bac0744780",
          "name": "\ud83e\udd14\ud83d\udea8 Could this be the source of all Evil? \ud83d\udea8\ud83e\udd14 Nubotnet - Team:KU Leuven/test2 - 2021.igem.org",
          "description": "",
          "modified": "2022-08-31T00:01:05.509000",
          "created": "2022-08-01T17:28:54.991000",
          "tags": [
            "apt",
            "runtime data",
            "decrypted ssl",
            "pcap",
            "windows nt",
            "tops",
            "cookie",
            "typeof t",
            "element",
            "error",
            "matrix",
            "typeerror",
            "bmfloor",
            "frameelement",
            "null",
            "skew",
            "parade"
          ],
          "references": [
            "https://2021.igem.org/Team:KU_Leuven/test2",
            "https://hybrid-analysis.com/sample/e126ff94aac3340dc05a27f062c4267cbfeaa998248bef0e72f000bba711aa76/62e6fb475edc950b894aa7b0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1696,
            "domain": 586,
            "hostname": 613,
            "FileHash-SHA256": 533,
            "FileHash-MD5": 34,
            "FileHash-SHA1": 33,
            "email": 1
          },
          "indicator_count": 3496,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 393,
          "modified_text": "1328 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "628437db120de2ab2ecb49fe",
          "name": "The \u201cconti leak page\u201d - likely conti",
          "description": "Conti leak page https://share.vx-underground.org/Conti/ is likely conti",
          "modified": "2022-06-16T00:01:26.112000",
          "created": "2022-05-18T00:03:39.947000",
          "tags": [
            "woff2",
            "woff",
            "truetype",
            "gelionbold",
            "gelionsemibold",
            "gelionmedium",
            "gelionregular",
            "gelionlight",
            "gelionthin",
            "xe",
            "object",
            "error",
            "element",
            "typeof t",
            "browser",
            "ofunction",
            "typeof e",
            "typeof r",
            "tthis",
            "applepay",
            "date",
            "null",
            "accept",
            "license",
            "or conditions",
            "post",
            "array",
            "copyright",
            "apache license",
            "version",
            "this code",
            "is provided",
            "on an",
            "symbol",
            "typeerror",
            "iterator",
            "string",
            "facebook pixel",
            "pixel code",
            "facebook",
            "service",
            "phonenumber",
            "regexp",
            "function",
            "shadowsizzle",
            "domdata",
            "hexchars",
            "promise",
            "typeof n",
            "agent",
            "launcher",
            "this",
            "android",
            "class",
            "fail",
            "shift",
            "bind",
            "trident",
            "getclass",
            "body",
            "widget",
            "edge",
            "dataname",
            "intercom",
            "typeof symbol",
            "apple",
            "webkiti",
            "criosi",
            "javascript"
          ],
          "references": [
            "xfe-URL-share.vx-underground.org_Conti-stix2-2.1-export.json",
            "https://app.uizard.io/p/c69fa2aa",
            "https://widget.intercom.io/widget/e1nqrt2k",
            "https://cdn.eu.pendo.io/agent/static/82b060a2-2cf8-472e-55d4-bd0833416335/pendo.js",
            "https://connect.facebook.net/signals/plugins/identity.js?v=2.9.60",
            "xfe-URL-vx-underground.org_Conti_-stix2-2.1-export.json",
            "xfe-URL-uizard.io-stix2-2.1-export.json",
            "https://public.profitwell.com/js/profitwell.js?auth=80939adc88898a29e714f6dd3d25e8ba",
            "https://js.stripe.com/v3",
            "https://app.uizard.io/fonts.css?cache=2022-04-29-12-55-57",
            "xfe-URL-Js.stripe.net-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Xe",
              "display_name": "Xe",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 707,
            "URL": 3480,
            "FileHash-SHA256": 438,
            "domain": 458,
            "email": 2,
            "FileHash-MD5": 49
          },
          "indicator_count": 5134,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 70,
          "modified_text": "1404 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62298f3e6e3fb7012a880988",
          "name": "a.pub.network:timcast-com:pubfig.min.js",
          "description": "a.pub.network:timcast-com:pubfig.min.js.webloc",
          "modified": "2022-06-12T22:01:23.105000",
          "created": "2022-03-10T05:40:14.909000",
          "tags": [],
          "references": [
            "a.pub.network:timcast-com:pubfig.min.js.webloc"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scnrscnr",
            "id": "126475",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_126475/resized/80/avatar_67ca5b7bae.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2786,
            "FileHash-SHA256": 955,
            "hostname": 1095,
            "FileHash-MD5": 66,
            "FileHash-SHA1": 24,
            "domain": 416,
            "email": 1,
            "CIDR": 5,
            "SSLCertFingerprint": 14,
            "CVE": 1
          },
          "indicator_count": 5363,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 91,
          "modified_text": "1407 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "620c3b1f8af7ea0dcf2c1218",
          "name": "Jeeng / Powerbox",
          "description": "",
          "modified": "2022-06-12T22:01:23.105000",
          "created": "2022-02-15T23:45:35.234000",
          "tags": [
            "Jeeng",
            "tim pool",
            "timcast"
          ],
          "references": [
            "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scnrscnr",
            "id": "126475",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_126475/resized/80/avatar_67ca5b7bae.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 9072,
            "domain": 2500,
            "URL": 13548,
            "hostname": 3584,
            "FileHash-MD5": 197,
            "FileHash-SHA1": 162,
            "CVE": 3,
            "CIDR": 20,
            "SSLCertFingerprint": 2,
            "email": 19,
            "BitcoinAddress": 1
          },
          "indicator_count": 29108,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 97,
          "modified_text": "1407 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "627565069e58458ddbcb923d",
          "name": "Hostsailor.com - UAE",
          "description": "function(e,t) is a new type of word, and if you can get it by adding it to a single page, you will get the same result as the other, or as you want.",
          "modified": "2022-06-05T00:03:45.266000",
          "created": "2022-05-06T18:12:22.565000",
          "tags": [
            "u10ecu10d8u10dc",
            "typeof define",
            "date",
            "u00e5r siden",
            "instanceof",
            "typeof e",
            "rplginitsvg",
            "rplglang",
            "true",
            "sound icon",
            "click",
            "android",
            "span",
            "reduceright",
            "regexp",
            "typeof t",
            "class",
            "attr",
            "pseudo",
            "child",
            "function",
            "typeof module",
            "error",
            "number",
            "string",
            "copyright",
            "uint8array",
            "fnumber",
            "gtmnxs92ns",
            "host",
            "path",
            "void",
            "code",
            "image",
            "typeof atrkopts",
            "object",
            "typeerror",
            "array",
            "symbol",
            "bound",
            "typeof window",
            "invalid path",
            "unknown method",
            "null",
            "window",
            "phonenumber",
            "ninja",
            "form",
            "addcookiedomain",
            "hubspot",
            "xmlhttprequest",
            "fban",
            "twitter",
            "hstc",
            "trident",
            "helvetica neue",
            "helvetica",
            "arial",
            "n nn",
            "setapibaseurl",
            "hubspot cookie",
            "accept",
            "done"
          ],
          "references": [
            "xfe-URL-Hostsailor.com-stix2-2.1-export.json",
            "https://js.hs-banner.com/6261317.js",
            "https://js.usemessages.com/conversations-embed.js",
            "https://js.hs-analytics.net/analytics/1651860300000/6261317.js",
            "https://js.hscollectedforms.net/collectedforms.js",
            "https://certify-js.alexametrics.com/atrk.js",
            "https://www.googletagmanager.com/gtm.js?id=GTM-NXS92NS",
            "https://hostsailor.com/wp-content/cache/minify/9de48.js",
            "https://hostsailor.com/wp-content/cache/minify/cc4b1.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 625,
            "URL": 1809,
            "domain": 543,
            "FileHash-SHA256": 245
          },
          "indicator_count": 3222,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1415 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62719a4dec6d0aa4631b9b2f",
          "name": "serverhub.com eonix.net",
          "description": "If you want to know what to do with your intercoms, spare a thought for e.intercom and add a new listener to your browser.. and use it to make the call.",
          "modified": "2022-06-02T00:03:59.540000",
          "created": "2022-05-03T21:10:37.722000",
          "tags": [
            "context",
            "error",
            "ajaxupdate",
            "request",
            "requestdata",
            "name",
            "xoctoberassets",
            "datarequest",
            "typesubmit",
            "typetext",
            "click",
            "function",
            "typeof c",
            "bootstrap",
            "javascript",
            "azaz",
            "popover",
            "typeof f",
            "typeof g",
            "typeof h",
            "vui",
            "anda",
            "tente",
            "outubro",
            "trackingclient",
            "srpanj",
            "rabu",
            "vasaris",
            "image",
            "typeof atrkopts",
            "800px",
            "40px",
            "i18n",
            "blockedemail",
            "typeof i18n",
            "hubspot",
            "captcha",
            "date",
            "please",
            "april",
            "august",
            "close",
            "february",
            "june",
            "form",
            "klik",
            "download",
            "window",
            "this",
            "next",
            "null",
            "blank",
            "este",
            "anna",
            "rserver",
            "mais",
            "void",
            "object",
            "typeerror",
            "array",
            "symbol",
            "bound",
            "typeof window",
            "typeof t",
            "invalid path",
            "unknown method",
            "phonenumber",
            "ninja",
            "typeof e",
            "edge",
            "dataname",
            "intercom",
            "typeof symbol",
            "apple",
            "webkiti",
            "criosi",
            "trident"
          ],
          "references": [
            "xfe-URL-Eonix.net-stix2-2.1-export.json",
            "xfe-URL-Serverhub.com-stix2-2.1-export.json",
            "xfe-URL-Enom.com-stix2-2.1-export 2.json",
            "https://widget.intercom.io/widget/rbc8ok9w",
            "https://js.hscollectedforms.net/collectedforms.js",
            "https://js.hsleadflows.net/leadflows.js",
            "https://d31qbv1cthcecs.cloudfront.net/atrk.js",
            "https://serverhub.com/combine/a059fe7a562c0b582328162f0ee69fda-1426025688",
            "https://serverhub.com/modules/system/assets/js/framework.js",
            "https://js.hs-scripts.com/3844463.js",
            "xfe-URL-Cloudfront.net-stix2-2.1-export.json",
            "xfe-URL-Intercom.io-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Vui",
              "display_name": "Vui",
              "target": null
            },
            {
              "id": "Outubro",
              "display_name": "Outubro",
              "target": null
            },
            {
              "id": "Tente",
              "display_name": "Tente",
              "target": null
            },
            {
              "id": "Anda",
              "display_name": "Anda",
              "target": null
            },
            {
              "id": "Vasaris",
              "display_name": "Vasaris",
              "target": null
            },
            {
              "id": "Rabu",
              "display_name": "Rabu",
              "target": null
            },
            {
              "id": "Srpanj",
              "display_name": "Srpanj",
              "target": null
            },
            {
              "id": "TrackingClient",
              "display_name": "TrackingClient",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5708,
            "hostname": 1541,
            "FileHash-SHA256": 876,
            "domain": 915,
            "CVE": 1,
            "FileHash-MD5": 1
          },
          "indicator_count": 9042,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 71,
          "modified_text": "1418 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "626f007fe3e888e68d9a19e9",
          "name": "CONSTANT TECHNOLOGIES \u273b Software house in Israel &amp; Armenia",
          "description": "var Cd=function(a,b), Dd-Cd, Zd.matches, E.g.js, T.ic, e.vh, \"G1\".",
          "modified": "2022-05-31T00:03:47.846000",
          "created": "2022-05-01T21:49:51.226000",
          "tags": [
            "wall deco",
            "constant",
            "armenia",
            "price city",
            "israel",
            "technologies",
            "software",
            "portfolio team",
            "careers blog",
            "focus focus",
            "tech",
            "datasecret",
            "typeerror",
            "function",
            "string",
            "symbol",
            "array",
            "typeof t",
            "typeof window",
            "object",
            "maximum",
            "typeof symbol",
            "date",
            "post",
            "regexp",
            "typeof o",
            "name",
            "nodetwindow",
            "typeof c",
            "void",
            "iframe",
            "resizeobserver",
            "null",
            "weakmap",
            "errorevent",
            "observe",
            "unobserve",
            "ajax search",
            "ajaxsearchlite",
            "embed",
            "canvas",
            "infinity",
            "typeof n",
            "typeof s",
            "error",
            "generator",
            "typeof e",
            "emptyfield",
            "value",
            "rferror",
            "click",
            "action",
            "az09",
            "rfmail",
            "8000",
            "input",
            "textarea",
            "customevent",
            "sufeffxa0",
            "class",
            "attr",
            "pseudo",
            "child",
            "js foundation",
            "typeof module",
            "messagetext",
            "subscribe",
            "esaddsubscriber",
            "success",
            "typeof define",
            "html tags",
            "ox20trnf",
            "dom element",
            "number",
            "copyright",
            "closure library",
            "xdfunction",
            "cdfunction",
            "ddfunction",
            "kefunction",
            "lefunction"
          ],
          "references": [
            "xfe-IP-207.246.75.55-stix2-2.1-export.json",
            "https://www.googletagmanager.com/gtag/js?id=UA-127455369-2",
            "https://constant-tech.biz/wp-includes/js/jquery/jquery.min.js",
            "https://constant-tech.biz/wp-includes/js/jquery/jquery-migrate.min.js",
            "https://constant-tech.biz/wp-content/plugins/email-subscribers/lite/public/js/email-subscribers-public.js",
            "https://constant-tech.biz/wp-content/plugins/page-loader/script.js",
            "https://constant-tech.biz/wp-content/themes/Constant-theme/js/compressed.js",
            "https://constant-tech.biz/wp-content/plugins/cookie-notice/js/front.min.js",
            "https://constant-tech.biz/wp-content/themes/Constant-theme/js/ajax-filter-posts.js",
            "https://constant-tech.biz/wp-includes/js/dist/vendor/regenerator-runtime.min.js",
            "https://constant-tech.biz/wp-includes/js/dist/hooks.min.js",
            "https://constant-tech.biz/wp-content/plugins/ajax-search-lite/js/min/jquery.ajaxsearchlite.min.js",
            "https://app.convertful.com/Convertful.js?owner=7346",
            "https://constant-tech.biz/wp-content/plugins/super-socializer/js/front/social_login/general.js",
            "https://code.tidio.co/leheh8smhmcxcnxkg3hzomgjoc3xdnfw.js",
            "https://constant-tech.biz/wp-includes/js/wp-embed.min.js",
            "https://constant-tech.biz/#mobile-widget",
            "xfe-URL-tidio.co-stix2-2.1-export.json",
            "xfe-URL-convertful.com-stix2-2.1-export.json",
            "xfe-URL-Ovh.net-stix2-2.1-export 2.json",
            "xfe-URL-j.o-w-o.info-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 694,
            "domain": 516,
            "URL": 1725,
            "FileHash-SHA256": 243
          },
          "indicator_count": 3178,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 71,
          "modified_text": "1420 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6266f7e0e0264cba210a4e9e",
          "name": "intel gained from a spam text",
          "description": "var b[f]=g, if b(f) is not allowed to reach its maximum by the end of a set, then a.b(b) will be able to do so at the same time as a",
          "modified": "2022-05-25T00:04:03.622000",
          "created": "2022-04-25T19:34:56.772000",
          "tags": [
            "array",
            "typeerror",
            "symbol",
            "null",
            "string",
            "iterator",
            "object",
            "error",
            "boolean",
            "function",
            "service",
            "date",
            "phonenumber",
            "facebook",
            "meta",
            "typeof e",
            "typeof u",
            "typeof window",
            "es modules",
            "use esm",
            "webkit",
            "component",
            "typeof",
            "typeof y",
            "typeof symbol",
            "suspense",
            "context",
            "forwardref",
            "unknown",
            "4096",
            "typeof n",
            "promise",
            "weakmap",
            "dataview",
            "typeof t",
            "webpackrequire",
            "modulenotfound",
            "e1342177279",
            "array int8array",
            "loanup",
            "insurance",
            "group",
            "health",
            "solutions",
            "policy",
            "site",
            "america",
            "company",
            "life",
            "plan",
            "direct",
            "media",
            "alliance",
            "click",
            "team",
            "never",
            "advantage",
            "general",
            "light",
            "february",
            "april",
            "june",
            "august",
            "footer",
            "protect",
            "banker",
            "explorer",
            "fast",
            "martin",
            "union",
            "carrier",
            "next",
            "colony",
            "energy",
            "empire",
            "gerber",
            "philadelphia",
            "hippo",
            "king",
            "agent",
            "mercury",
            "moss",
            "premium",
            "nextgen",
            "oscar",
            "phoenix",
            "loans",
            "pure",
            "ramsey",
            "ranger",
            "solar",
            "titan",
            "tristate",
            "viking",
            "easy",
            "push",
            "code",
            "stop",
            "carriers",
            "live",
            "lucky",
            "moral",
            "story",
            "back",
            "lfunction",
            "dfunction",
            "cfunction",
            "typeof self",
            "number",
            "copyright",
            "closure library",
            "xdfunction",
            "cdfunction",
            "ddfunction",
            "bded",
            "kefunction",
            "reduceright",
            "gj9pcw0f6jv",
            "regexp",
            "r420",
            "uint8array",
            "typeof d",
            "void"
          ],
          "references": [
            "https://www.googletagmanager.com/gtag/js?id=G-J9PCW0F6JV",
            "https://www.googletagmanager.com/gtag/js?id=UA-185991747-1",
            "https://insurancerateusa.com/polyfill-036b4a134d8725752ba0.js",
            "xfe-URL-insurancerateusa.com-stix2-2.1-export.json",
            "https://insurancerateusa.com/app-74647f151b541f3098c2.js",
            "https://insurancerateusa.com/bfcc7b67-0b189ba6da3fc3ae8b88.js",
            "https://insurancerateusa.com/94297995-69529ad7536f090aa776.js",
            "https://insurancerateusa.com/3bea8d40-8926f4790c0b3689a361.js",
            "https://insurancerateusa.com/framework-19eddc0d879a49dfe606.js",
            "https://insurancerateusa.com/webpack-runtime-f014a3267add02a94afb.js",
            "https://connect.facebook.net/signals/config/3689470801106673?v=2.9.57&r=stable"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 615,
            "URL": 2246,
            "FileHash-SHA256": 823,
            "domain": 717,
            "CVE": 1,
            "email": 4,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 1
          },
          "indicator_count": 4412,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 70,
          "modified_text": "1426 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62634f4db80546374654f4c4",
          "name": "frantech.ca - malware",
          "description": "T,t.F, t.f, is written in the same place as the following:t, d. F, has been added to the end of the document, as well as its own propertyDescriptor.",
          "modified": "2022-05-22T00:01:01.264000",
          "created": "2022-04-23T00:58:53.444000",
          "tags": [
            "overview",
            "typeof symbol",
            "error",
            "typeerror",
            "object",
            "typeof t",
            "string",
            "typeof e",
            "function",
            "array",
            "promise",
            "date",
            "target",
            "class",
            "path",
            "back",
            "bounce",
            "this",
            "iframe",
            "null",
            "0x105684",
            "0xb66229",
            "0xb9b329",
            "0x3eed40",
            "0x2923e0",
            "cookie",
            "0x1d2d25",
            "0x2d6b",
            "0x538ea5",
            "0x240c1a",
            "push",
            "shift",
            "open"
          ],
          "references": [
            "xfe-URL-https___my.frantech.ca_-stix2-2.1-export.json",
            "xfe-URL-frantech.ca-stix2-2.1-export.json",
            "https://my.frantech.ca/templates/lagom/assets/js/lagom-app.min.js?v=1.4.3",
            "https://my.frantech.ca/templates/lagom/assets/js/whmcs-custom.min.js?v=1.4.3"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 757,
            "hostname": 498,
            "domain": 311,
            "FileHash-SHA256": 21
          },
          "indicator_count": 1587,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1429 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6260d13ab57ec96e24359914",
          "name": "Malware - reliablesite.net",
          "description": "VUE-DEVTOOLs_GLOBAL_Hook__, a description of what it will look like when it comes to testing software, is based on the type of Object.",
          "modified": "2022-05-20T00:01:19.453000",
          "created": "2022-04-21T03:36:26.313000",
          "tags": [
            "date",
            "swiper",
            "value",
            "trigger",
            "gbps",
            "typeof define",
            "typeof module",
            "roboto",
            "helvetica neue",
            "arial",
            "small",
            "error",
            "show",
            "typeof e",
            "version",
            "hidden",
            "bootstrap",
            "click",
            "javascript",
            "clickdataapi",
            "collapse",
            "typeerror",
            "typeof",
            "regexp",
            "tether error",
            "typeof rnullr",
            "anull",
            "typeof b",
            "pseudo",
            "child",
            "array",
            "sufeffxa0",
            "class",
            "attr",
            "null",
            "void",
            "65536",
            "typeof f",
            "vd",
            "function",
            "activexobject",
            "number",
            "utmb",
            "firefox",
            "shockwave flash",
            "utma",
            "utmz",
            "iframe",
            "online",
            "livechat",
            "refreshurl",
            "title",
            "imageurl",
            "cssclass",
            "chat",
            "object",
            "string",
            "typeof t",
            "incorrect",
            "xfunction",
            "target",
            "typeof p",
            "typeof btoa",
            "vnode",
            "boolean",
            "typeof symbol"
          ],
          "references": [
            "xfe-URL-https___www.reliablesite.net_-stix2-2.1-export.json",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-main.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-vendor.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-vendors.js",
            "https://cdn.jsdelivr.net/emojione/2.2.7/lib/js/emojione.min.js",
            "https://code.jquery.com/jquery-1.12.0.min.js",
            "https://cdnjs.cloudflare.com/ajax/libs/tether/1.4.0/js/tether.min.js",
            "https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0-alpha.6/js/bootstrap.min.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Vd",
              "display_name": "Vd",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2233,
            "hostname": 827,
            "domain": 565,
            "FileHash-SHA256": 238
          },
          "indicator_count": 3863,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1431 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "626078c9aeb1f4837a1bfc7e",
          "name": "Malware hosting - allwest.com",
          "description": "\u00c2\u00a31.5m, \u00e2\u201a\u00ac2.4m \u00c3\u20ac\u00a6, is the source of a new version of the JavaScript code, which is being developed by the Apache web browser.",
          "modified": "2022-05-20T00:01:19.453000",
          "created": "2022-04-20T21:19:05.670000",
          "tags": [
            "guji",
            "regexp",
            "cfunction",
            "event",
            "afunction",
            "efunction",
            "function",
            "xfunction",
            "jnull",
            "yefunction",
            "customevent",
            "typeof n",
            "typeof wpcf7",
            "nonce",
            "script",
            "please do",
            "not copy",
            "and paste",
            "this code",
            "cgrecaptchacfg",
            "ngrecaptcha",
            "recaptchaapi",
            "render",
            "filter",
            "typenumber",
            "totalvalue",
            "linear",
            "secs",
            "index",
            "nameregion",
            "typevalue",
            "rangeto",
            "customuserspeed",
            "code",
            "typeof define",
            "date",
            "click",
            "smoothscroll",
            "number",
            "property",
            "fancybox",
            "null",
            "false",
            "scroll",
            "stop",
            "speed",
            "body",
            "error",
            "this",
            "typeerror",
            "symbol",
            "generator",
            "typeof e",
            "copyright",
            "closure library",
            "reduceright",
            "string",
            "aw981889198",
            "uint8array",
            "quota",
            "aafunction",
            "void",
            "hj",
            "object",
            "hotjar",
            "email",
            "typeof symbol",
            "telefon",
            "array",
            "survey",
            "meta",
            "cookie",
            "keypress",
            "trident",
            "live",
            "fullscreen",
            "generic",
            "window",
            "widget",
            "ciudad",
            "adore",
            "experiment",
            "mutation",
            "qe",
            "fnumber",
            "xhfunction",
            "yhfunction",
            "awconversionid",
            "g0cbkgbkb3j",
            "xdfunction",
            "adfunction",
            "cdfunction",
            "ddfunction",
            "typeof hj",
            "surveyv2",
            "surveyisolated",
            "heatmapviewer",
            "notification",
            "sentry",
            "ua411335272",
            "gfvhxsm5zyl",
            "xmlhttprequest",
            "domparser",
            "typeof module",
            "html tags",
            "ox20trnf",
            "dom element",
            "typeof t",
            "class",
            "attr",
            "pseudo",
            "child",
            "udc66udc67",
            "ud83d",
            "ufe0f",
            "ud83e",
            "udc68udc69",
            "udfcbudfcc",
            "u2640u2642",
            "source",
            "image",
            "ud83dudc6cud83c",
            "bsnull",
            "gtmmwm9r93",
            "typeof",
            "facebook pixel",
            "pixel code",
            "iterator",
            "constantvalue",
            "globalvariable",
            "facebook",
            "service",
            "phonenumber",
            "boolean",
            "select",
            "strong",
            "input",
            "iframe",
            "android",
            "verify",
            "span",
            "enterprise",
            "form",
            "reload",
            "adwords",
            "linkedin",
            "hs pixel",
            "loader",
            "addcookiedomain",
            "hubspot",
            "vui",
            "anda",
            "tente",
            "outubro",
            "trackingclient",
            "srpanj",
            "rabu",
            "vasaris",
            "helvetica neue",
            "helvetica",
            "arial",
            "accept",
            "n nn",
            "policy",
            "done",
            "800px",
            "40px",
            "i18n",
            "blockedemail",
            "typeof i18n",
            "captcha",
            "please",
            "april",
            "august",
            "close",
            "february",
            "june",
            "klik",
            "download",
            "next",
            "blank",
            "este",
            "rserver",
            "mais",
            "r300",
            "typeof d",
            "path",
            "caca",
            "pfunction",
            "contenttype",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction",
            "array int8array",
            "caregexp",
            "legacy"
          ],
          "references": [
            "xfe-URL-allwest.com-stix2-2.1-export.json",
            "https://www.googleadservices.com/pagead/conversion_async.js",
            "https://www.google-analytics.com/analytics.js",
            "https://www.googletagmanager.com/gtag/js?id=G-FVHXSM5ZYL&l=dataLayer&cx=c",
            "https://www.googletagmanager.com/gtag/js?id=G-0CBKGBKB3J&l=dataLayer&cx=c",
            "https://js.hsleadflows.net/leadflows.js",
            "https://js.hs-banner.com/9251231.js",
            "https://js.hs-analytics.net/analytics/1650488100000/9251231.js",
            "https://js.hsadspixel.net/fb.js",
            "https://www.gstatic.com/recaptcha/releases/QENb_qRrX0-mQMyENQjD6Fuj/recaptcha__en.js",
            "https://connect.facebook.net/signals/config/661596171311072?v=2.9.57&r=stable",
            "https://connect.facebook.net/signals/plugins/identity.js?v=2.9.57",
            "https://connect.facebook.net/en_US/fbevents.js",
            "https://www.googleoptimize.com/optimize.js?id=GTM-MWM9R93",
            "https://www.allwest.com/wp-includes/js/wp-emoji-release.min.js?ver=5.9.3",
            "https://www.allwest.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
            "https://www.allwest.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2",
            "https://www.allwest.com/wp-content/plugins/svg-support/js/min/svgs-inline-min.js?ver=1.0.0",
            "https://www.googletagmanager.com/gtag/js?id=UA-41133527-3",
            "https://static.hotjar.com/c/hotjar-2836981.js?sv=5",
            "https://www.googletagmanager.com/gtag/js?id=UA-41133527-2",
            "https://www.googletagmanager.com/gtag/js?id=AW-CONVERSION_ID",
            "https://script.hotjar.com/modules.0076bf93c385ddf0ff58.js",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/981889198/?random=1650488340057&cv=9&fst=1650488340057&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2oa4i1&sendb=1&ig=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fwww.allwest.com%2F&tiba=All%20West%20Communications%20-%20telecommunication%20company&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
            "https://www.googletagmanager.com/gtag/js?id=AW-981889198",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/981889198/?random=1650488340630&cv=9&fst=1650488340630&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2oa4i1&sendb=1&ig=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fwww.allwest.com%2F&tiba=All%20West%20Communications%20-%20telecommunication%20company&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
            "https://www.allwest.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.9",
            "https://www.allwest.com/wp-content/uploads/hummingbird-assets/c4be4d65e707f6328e3a72e79cfdfcb7.js",
            "https://www.allwest.com/wp-content/themes/allwestcommunications/js/jquery.main.js?ver=5.9.3",
            "https://www.allwest.com/wp-content/themes/allwestcommunications/js/custom.js?ver=5.9.3",
            "https://www.google.com/recaptcha/api.js?render=6Ld8S6EUAAAAAExG_6DO_Jj4DLY35ybebbA8R_eA&ver=3.0",
            "https://www.allwest.com/wp-content/plugins/contact-form-7/modules/recaptcha/index.js?ver=5.5.6",
            "https://www.allwest.com/wp-content/plugins/wp-smushit/app/assets/js/smush-lazy-load.min.js?ver=3.9.5",
            "https://js.hs-scripts.com/9251231.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Tunisia"
          ],
          "malware_families": [
            {
              "id": "hj",
              "display_name": "hj",
              "target": null
            },
            {
              "id": "Qe",
              "display_name": "Qe",
              "target": null
            },
            {
              "id": "Vui",
              "display_name": "Vui",
              "target": null
            },
            {
              "id": "Outubro",
              "display_name": "Outubro",
              "target": null
            },
            {
              "id": "Tente",
              "display_name": "Tente",
              "target": null
            },
            {
              "id": "Anda",
              "display_name": "Anda",
              "target": null
            },
            {
              "id": "Vasaris",
              "display_name": "Vasaris",
              "target": null
            },
            {
              "id": "Rabu",
              "display_name": "Rabu",
              "target": null
            },
            {
              "id": "Srpanj",
              "display_name": "Srpanj",
              "target": null
            },
            {
              "id": "TrackingClient",
              "display_name": "TrackingClient",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 821,
            "URL": 1568,
            "domain": 251,
            "FileHash-SHA256": 70,
            "FileHash-MD5": 4,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2715,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1431 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62606584633e2b9a3bc935b9",
          "name": "\u7ea2\u674f\u89c6\u9891 malware",
          "description": "function s(t,e), o, is a new type of function, which throws new TypeError when it comes to trying to make a function out of its own language or its form.",
          "modified": "2022-05-20T00:01:19.453000",
          "created": "2022-04-20T19:56:52.162000",
          "tags": [
            "typeof t",
            "typeof define",
            "moztransform",
            "success",
            "error",
            "make sure",
            "stop",
            "ajax",
            "action",
            "click",
            "open",
            "active",
            "button",
            "toggle btn",
            "body",
            "scroll",
            "isotope",
            "preloader",
            "function",
            "javascript",
            "mit license",
            "typeof module",
            "gplv3",
            "license",
            "copyright",
            "metafizzy",
            "math",
            "typeof",
            "typeerror",
            "hidden",
            "show",
            "typeof n",
            "version",
            "hide",
            "focusin",
            "focusout",
            "shown",
            "startr",
            "endr",
            "federico zivolo",
            "distributed",
            "html",
            "statict",
            "flip",
            "regexp",
            "null",
            "void",
            "width",
            "object",
            "pseudo",
            "child",
            "class",
            "date",
            "accept",
            "webpackrequire",
            "name",
            "number",
            "arraybuffer",
            "iterator",
            "typedarray",
            "prototype",
            "string",
            "index",
            "meta",
            "target",
            "infinity",
            "zero",
            "epsilon",
            "observer",
            "android",
            "trim",
            "enumerate",
            "freeze",
            "internal",
            "bind",
            "window",
            "next",
            "find",
            "this",
            "rest",
            "middle",
            "canvas",
            "slidercaptcha",
            "createelement",
            "textdanger",
            "plugin",
            "rgba",
            "imagedata",
            "false",
            "touchstart",
            "trident",
            "applewebkit",
            "safari",
            "base",
            "presto",
            "gecko",
            "khtml",
            "micromessenger",
            "typeof e",
            "swiper",
            "most",
            "september",
            "customevent",
            "image",
            "typeof c",
            "twitter",
            "bootstrap",
            "rolemenu",
            "typeof f",
            "typeof g",
            "cookie plugin",
            "https",
            "klaus hartl",
            "register",
            "nodecommonjs",
            "factory",
            "jquery",
            "write",
            "typeof b",
            "array",
            "sufeffxa0",
            "attr",
            "\u706b\u7bad\u5185\u6d4b\u7b7e\u540d",
            "0x1d9131",
            "0x180bcc",
            "0x4b6177",
            "0x13f349",
            "0x3bcb54",
            "0xbbe80d",
            "0x57b7de",
            "0x2ea74e",
            "0x4fb0f2",
            "0x25f113",
            "push",
            "shift",
            "tencent",
            "barrio",
            "slice",
            "symbol",
            "typeof window",
            "maximum",
            "typeof symbol",
            "udc66udc67",
            "ud83d",
            "ufe0f",
            "ud83e",
            "udc68udc69",
            "udfcbudfcc",
            "u2640u2642",
            "ufe0fg",
            "ud83dudc6cud83c",
            "ud83dudc6dud83c",
            "welcome",
            "datav66d78640",
            "datav2f8052f5",
            "90deg",
            "datav5f1e575c",
            "datave97d7462",
            "helvetica neue",
            "helvetica",
            "10px",
            "pingfang sc",
            "arial",
            "45deg",
            "typenumber",
            "opacity0",
            "mozopacity0",
            "khtmlopacity0",
            "opacity100",
            "event",
            "boolean",
            "uint8array",
            "errordetails",
            "info",
            "checker",
            "generator",
            "blink",
            "keepalive",
            "4096",
            "unknown",
            "meteor",
            "rhino",
            "mini",
            "comment",
            "verify",
            "yeke",
            "codec",
            "media",
            "live",
            "speed",
            "headname",
            "axiostimeout",
            "apiurl",
            "bmi86hjtsk",
            "root",
            "length",
            "indexof",
            "x0ax20x20x20x20",
            "location",
            "0x10",
            "0x18",
            "history",
            "config",
            "cookie",
            "onload",
            "video",
            "afunction",
            "indexnotice",
            "sitehome",
            "x20trnf",
            "please",
            "strong"
          ],
          "references": [
            "xfe-URL-sys95.com-stix2-2.1-export.json",
            "https://2001.habyc.com/?channelNo=2001#/home",
            "https://sdk.51.la/event/js-sdk-event.min.js?u=JdoUNv3VSW0GHUpw",
            "https://2001.habyc.com/static/js/chunk-7d5d3bac.efb700c7.js",
            "https://sdk.51.la/js-sdk-pro.min.js",
            "https://2001.habyc.com/js/config.js",
            "xfe-URL-2001.habyc.com-stix2-2.1-export.json",
            "https://2001.habyc.com/static/js/chunk-vendors.9d7684f4.js",
            "xfe-URL-habyc.com-stix2-2.1-export.json",
            "https://2001.habyc.com/static/css/chunk-vendors.6a41b67e.css",
            "https://2001.habyc.com/static/css/app.88afcfd8.css",
            "https://2001.habyc.com/static/css/chunk-7d5d3bac.e1a32335.css",
            "https://2001.dwlww.com/?channelNo=2001#/home",
            "https://2001.dwlww.com/static/js/chunk-7d5d3bac.efb700c7.js",
            "https://2001.dwlww.com/js/config.js",
            "https://2001.dwlww.com/static/js/chunk-vendors.9d7684f4.js",
            "https://2001.dwlww.com/static/js/app.9d5d18d7.js",
            "https://2001.dwlww.com/static/css/chunk-vendors.6a41b67e.css",
            "https://2001.dwlww.com/static/css/app.88afcfd8.css",
            "https://2001.dwlww.com/static/css/chunk-7d5d3bac.e1a32335.css",
            "https://www.tidio.com/talk/kv6vcosd7tmhsetmarsoawzaglejnny4",
            "https://chatting.page/kv6vcosd7tmhsetmarsoawzaglejnny4",
            "https://widget-v4.tidiochat.com/code/kv6vcosd7tmhsetmarsoawzaglejnny4.js",
            "https://m4244.com:35003/",
            "https://www.8098.app:21568/?agent=7691755704",
            "https://www.8098.app:21568/js/jquery-1.11.3.min.js",
            "https://www.8098.app:21568/js/xinstall_inner_e.min.js?v=1004",
            "https://app.ynsdty.cn//package/GmCC6WISh",
            "https://app.ynsdty.cn/dist/js/jquery.min.js",
            "https://app.ynsdty.cn/dist/js/jquery.cookie.js",
            "https://app.ynsdty.cn/dist/vendors/bootstrap/js/bootstrap.min.js",
            "https://app.ynsdty.cn/dist/vendors/swiper/swiper.min.js",
            "https://app.ynsdty.cn/dist/js/app.base.js",
            "https://app.ynsdty.cn/dist/js/longbow.slidercaptcha.js",
            "https://app.ynsdty.cn/dist/vendors/core-js/core.js",
            "xfe-URL-sun.net.hk-stix2-2.1-export.json",
            "https://www.sunnetwork.com.sg/sun_21/js/vendor/jquery-3.5.0.min.js",
            "https://www.sunnetwork.com.sg/sun_21/js/popper.min.js",
            "https://www.sunnetwork.com.sg/sun_21/js/bootstrap.min.js",
            "https://www.sunnetwork.com.sg/sun_21/js/isotope.pkgd.min.js",
            "https://www.sunnetwork.com.sg/sun_21/js/imagesloaded.pkgd.min.js",
            "https://www.sunnetwork.com.sg/sun_21/js/main.js",
            "https://www.sunnetwork.com.sg/sun_21/js/ajax-form.js",
            "https://www.sunnetwork.com.sg/sun_21/js/slick.min.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 901,
            "URL": 5740,
            "hostname": 2218,
            "FileHash-SHA256": 1686,
            "FileHash-MD5": 3
          },
          "indicator_count": 10548,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1431 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "625f93fe2c0237a71e262354",
          "name": "Malware hosting - metronetinc.com",
          "description": "If(65535) by the end of the year, if (65534) a.sigBytes is a single word, then if, as expected, b.com(d)",
          "modified": "2022-05-20T00:01:19.453000",
          "created": "2022-04-20T05:02:54.354000",
          "tags": [
            "ebattid",
            "click",
            "getclicktarget",
            "date",
            "contexttrack",
            "view",
            "installtrigger",
            "processlink",
            "typeof blog",
            "msie",
            "image",
            "function",
            "asyncfunction",
            "proxy",
            "typeof t",
            "symbol",
            "typeof n",
            "typeerror",
            "typeof window",
            "array",
            "foundation",
            "mit license",
            "http",
            "typeof define",
            "ui disable",
            "selection",
            "ui focusable",
            "this",
            "typeof module",
            "handles",
            "notice block",
            "dataid",
            "block",
            "desc",
            "ofyncl",
            "sorry",
            "cloc",
            "null",
            "object",
            "makes",
            "close",
            "code",
            "find",
            "typeof e",
            "nullt",
            "bottom",
            "left",
            "html",
            "right",
            "width",
            "next",
            "february",
            "april",
            "june",
            "august",
            "back",
            "bounce",
            "atom",
            "cookie",
            "must",
            "number",
            "livevalidation",
            "copyright",
            "alec hill",
            "modified",
            "oracle",
            "format",
            "email",
            "error",
            "closure library",
            "zindex1",
            "msgesture",
            "mspointerdown",
            "fnumber",
            "woothemes",
            "tyler smith",
            "regexp",
            "class",
            "attr",
            "pseudo",
            "child",
            "udc66udc67",
            "ud83d",
            "ufe0f",
            "ud83e",
            "udc68udc69",
            "udfcbudfcc",
            "u2640u2642",
            "source",
            "ud83dudc6cud83c",
            "script",
            "boolean",
            "reduceright",
            "x3ex3cscriptx3e",
            "x3ex3ciframex3e",
            "string",
            "custom",
            "trackevent",
            "path",
            "derek",
            "void",
            "iterator",
            "facebook pixel",
            "pixel code",
            "facebook",
            "service",
            "phonenumber",
            "meta",
            "optin",
            "elqsitevisited",
            "qnew date",
            "rnew date",
            "dlkey",
            "dllookup",
            "httponly",
            "pfunction",
            "contenttype",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction",
            "g3xj902fy6q",
            "r300",
            "uint8array",
            "typeof d",
            "caca",
            "array int8array",
            "caregexp",
            "legacy",
            "customevent",
            "09af",
            "ver0",
            "tag0",
            "extdata0",
            "ua ch",
            "window",
            "math",
            "redfq",
            "base64",
            "azaz09s",
            "jeff mott",
            "https",
            "kenji urushima",
            "explorer"
          ],
          "references": [
            "xfe-URL-metronetinc.com-stix2-2.1-export.json",
            "https://a2.adform.net/Serving/TrackPoint/?pm=508052&ADFPageName=Metronet%7CHomepage&ADFdivider=%7C&ord=735079476141&Set1=en-US%7Cen-US%7C390x844%7C32&ADFtpmode=2&loc=https%3A%2F%2Fwww.metronetinc.com%2F",
            "https://a2.adform.net/serving/scripts/trackpoint/async/",
            "https://www.googleadservices.com/pagead/conversion_async.js",
            "https://www.googletagmanager.com/gtag/js?id=G-3XJ902FY6Q&l=dataLayer&cx=c",
            "https://www.google-analytics.com/analytics.js",
            "https://img03.en25.com/i/elqCfg.min.js",
            "https://connect.facebook.net/signals/config/2196524664009793?v=2.9.57&r=stable",
            "https://connect.facebook.net/signals/plugins/identity.js?v=2.9.57",
            "https://www.googletagmanager.com/gtm.js?id=GTM-W3GQ4F",
            "https://static.zdassets.com/ekr/snippet.js?key=e7dd7ff5-a219-47a1-b096-069f750c234f",
            "https://www.metronetinc.com/wp-includes/js/wp-emoji-release.min.js?ver=5.8.4",
            "https://www.metronetinc.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
            "https://www.metronetinc.com/wp-content/themes/MetroNet/js/jquery.flexslider-min.js?ver=5.8.4",
            "https://www.metronetinc.com/wp-content/themes/MetroNet/js/flexslider-init.js?ver=5.8.4",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/982771034/?random=1650430003990&cv=9&fst=1650430003990&num=1&label=Remarketing%20-%20All%20Pages&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=3&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.metronetinc.com%2F&tiba=MetroNet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%2C%20Streaming%20TV%2C",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/646812378/?random=1650430003991&cv=9&fst=1650430003991&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=3&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.metronetinc.com%2F&tiba=MetroNet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%2C%20Streaming%20TV%2C%20and%20Phone&hn=www.googleadservic",
            "https://www.googleadservices.com/pagead/conversion/646812378/?random=1650430003991&cv=9&fst=1650430003991&num=1&value=0&label=6dFBCIm13s4BENqltrQC&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=3&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.metronetinc.com%2F&tiba=MetroNet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%2C%20Streaming%20TV%2C%20and%20Phone&",
            "https://bat.bing.com/p/action/140000459.js",
            "https://img03.en25.com/i/livevalidation_standalone.compressed.js",
            "https://www.metronetinc.com/wp-content/plugins/lt-ajax-mn-channelguide/jquery-ui.min.js?ver=1.2",
            "https://www.metronetinc.com/wp-content/plugins/lt-ajax-mn-channelguide/lt-ajax-mn-channelguide.js?ver=1.1",
            "https://www.metronetinc.com/wp-content/plugins/atomic-blocks/dist/assets/js/dismiss.js?ver=1625889728",
            "https://www.metronetinc.com/wp-includes/js/hoverIntent.min.js?ver=1.10.1",
            "https://www.metronetinc.com/wp-includes/js/jquery/ui/core.min.js?ver=1.12.1",
            "https://www.metronetinc.com/wp-content/plugins/pixel-caffeine/build/frontend.js?ver=2.3.3",
            "https://stats.wp.com/e-202216.js",
            "https://bs.serving-sys.com/Serving/ActivityServer.bs?cn=as&ActivityID=1073779012&rnd=922949.8781851793",
            "https://secure-ds.serving-sys.com/SemiCachedScripts/ebAttribution.js",
            "https://11057407.fls.doubleclick.net/activityi;src=11057407;type=count0;cat=sitev0;ord=1;num=5426507653008;gtm=2wg4i1;auiddc=1460077727.1650429649;~oref=https%3A%2F%2Fwww.metronetinc.com%2F",
            "xfe-URL-bat.bing.com-stix2-2.1-export 2.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Tunisia",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 447,
            "hostname": 1241,
            "URL": 3731,
            "domain": 536
          },
          "indicator_count": 5955,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1431 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "625f42dcc369f59f6a1e8b58",
          "name": "data102 and colohouse. Malware hosting",
          "description": "var a,b,c,d, f.substr(d),a=f, a.href, and a number of other elements:a.b.search.com.",
          "modified": "2022-05-19T00:00:49.028000",
          "created": "2022-04-19T23:16:44.418000",
          "tags": [
            "regexp",
            "rangeerror",
            "typeerror",
            "date",
            "array",
            "error",
            "this",
            "uint8array",
            "typeof b",
            "buffer",
            "class",
            "null",
            "path",
            "void",
            "marketo forms",
            "cross domain",
            "typetext",
            "typeurl",
            "typeemail",
            "typetel",
            "typenumber",
            "typedate",
            "color",
            "label",
            "input",
            "typerange",
            "typecheckbox",
            "woff2",
            "fontface",
            "u1c801c88",
            "u20b4",
            "u2de02dff",
            "ua640a69f",
            "ufe2efe2f",
            "u04b004b1",
            "u2116",
            "u1ea01ef9",
            "franklin",
            "woff",
            "u20ab",
            "u0259",
            "u1e001eff",
            "u2020",
            "u20a020ab",
            "u20ad20cf",
            "gradienttype0",
            "webkitkeyframes",
            "span",
            "button",
            "tbody",
            "textarea",
            "helvetica neue",
            "tfoot",
            "body",
            "alpha",
            "twitter",
            "roboto",
            "pitch",
            "datasecret",
            "q1kg",
            "q17g",
            "d2dg",
            "c d3r",
            "q171zg",
            "e c2ttttb",
            "c g7",
            "6n184z",
            "6f6g",
            "typeof",
            "wpcf7redirect",
            "cf7mlscurrentfs",
            "handle fire",
            "popuptemplate",
            "templatename",
            "click",
            "fieldset",
            "cf7mlsbackfs",
            "section",
            "classwidget",
            "idmenu",
            "idfooter",
            "idwidget",
            "idcomment",
            "classmenu",
            "classfooter",
            "classcomment",
            "target",
            "blank",
            "typeof e",
            "formdata",
            "typeof symbol",
            "customevent",
            "post",
            "refill",
            "wpcf7",
            "wpcf7locale",
            "wpcf7unittag",
            "typeof wpcf7",
            "boolean",
            "modernizr",
            "custom build",
            "build",
            "afunction",
            "cfunction",
            "object",
            "documenttouch",
            "websocket",
            "symbol",
            "generator",
            "function",
            "select",
            "harvest",
            "mit license",
            "optgroup",
            "nnn n",
            "n nnnn",
            "explorer",
            "options",
            "abbr",
            "element",
            "unknownerror",
            "overquerylimit",
            "requestdenied",
            "zeroresults",
            "node",
            "edge",
            "android",
            "trident",
            "unknown",
            "false",
            "iframe",
            "marker",
            "hybrid",
            "tawkspinner",
            "failed",
            "resend",
            "tawkavatar",
            "tawkvideo",
            "tawkalert",
            "tawkemoji",
            "tawkicon",
            "enter",
            "number",
            "startchatbutton",
            "u26a1",
            "typeof t",
            "invalid attempt",
            "copyright",
            "marketo",
            "remove",
            "commentform",
            "author",
            "mouseenter",
            "secure",
            "ccpa",
            "bottom",
            "fixed",
            "widget",
            "embed",
            "trigger",
            "antispam",
            "please",
            "cleantalk",
            "typeof o",
            "ajaxnonce",
            "unkown",
            "apbctajaxerror",
            "typeof define",
            "typeof module",
            "html tags",
            "ox20trnf",
            "dom element",
            "attr",
            "pseudo",
            "child",
            "udc66udc67",
            "ud83d",
            "ufe0f",
            "ud83e",
            "udc68udc69",
            "udfcbudfcc",
            "u2640u2642",
            "source",
            "image",
            "ud83dudc6cud83c",
            "qe",
            "string",
            "xhfunction",
            "yhfunction",
            "gtmptxlxz4",
            "host",
            "code",
            "script",
            "promise",
            "complete",
            "reduceright",
            "g7be8pmlskx",
            "r300",
            "typeof d",
            "caca",
            "ufunction",
            "ffunction",
            "gfunction",
            "mchtd",
            "azaz",
            "firefox",
            "opera",
            "chrome",
            "iemobile",
            "black",
            "incorrect",
            "xfunction",
            "typeof p",
            "typeof btoa",
            "vnode",
            "colohouse",
            "york",
            "learn more",
            "data center",
            "miami",
            "e cermak",
            "springs",
            "read",
            "cloud",
            "managed",
            "fast",
            "philadelphia",
            "bare",
            "metal",
            "chat",
            "accept",
            "placeheld",
            "minimum",
            "tooshort",
            "wpcf7wfreetext",
            "alert",
            "invert",
            "form",
            "animation",
            "value",
            "foundation",
            "migrate",
            "backcompat",
            "quirks mode",
            "typeof f",
            "html",
            "sufeffxa0",
            "legacy",
            "contenttype",
            "wivobjkey",
            "typehit",
            "data",
            "closure library",
            "pfunction",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction"
          ],
          "references": [
            "xfe-URL-Data102.com-stix2-2.1-export.json",
            "https://www.google-analytics.com/analytics.js",
            "https://chimpstatic.com/mcjs-connected/js/users/6c3abfa7ff8634c75cdb2b22e/ddf7a436c1746be666f330e4a.js",
            "https://app.whoisvisiting.com/who.js",
            "https://www.data102.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp",
            "https://www.data102.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1",
            "https://www.data102.com/?wordfence_lh=1&hid=2D6A812A7EB197E80D5A3978A6386BE4&r=0.5029022326538093",
            "https://www.data102.com/wp-includes/js/wp-embed.min.js?ver=00b0ffc433836dcf9f57035fded0b908",
            "https://www.data102.com/wp-content/plugins/cta/shared//shortcodes/js/spin.min.js",
            "https://www.data102.com/wp-content/plugins/contact-form-7/includes/js/scripts.js",
            "https://colohouse.com/",
            "xfe-URL-colohouse.com-stix2-2.1-export.json",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-main.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-vendor.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-vendors.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-common.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-runtime.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-app.js",
            "https://munchkin.marketo.net/161/munchkin.js",
            "https://www.googletagmanager.com/gtag/js?id=G-7BE8PMLSKX&l=dataLayer&cx=c",
            "https://embed.tawk.to/5697c34527b9b5d40b66960f/default",
            "https://www.googletagmanager.com/gtm.js?id=GTM-PTXLXZ4",
            "https://colohouse.com/wp-includes/js/wp-emoji-release.min.js?ver=5.8",
            "https://colohouse.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
            "https://colohouse.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2",
            "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/apbct-public--functions.min.js?ver=5.173",
            "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/apbct-public.min.js?ver=5.173",
            "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/cleantalk-modal.min.js?ver=5.173",
            "https://colohouse.com/wp-content/plugins/cookie-law-info/public/js/cookie-law-info-public.js?ver=2.0.4",
            "https://colohouse.com/wp-content/plugins/stop-user-enumeration/frontend/js/frontend.js?ver=1.3.31",
            "https://colohouse.com/wp-content/plugins/duracelltomi-google-tag-manager/js/gtm4wp-form-move-tracker.js?ver=1.13.1",
            "https://munchkin.marketo.net/munchkin.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-2d0d2b7c.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-32507910.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-f163fcd0.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-2d0b9454.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-4fe9d5dd.js",
            "https://app-ab02.marketo.com/js/forms2/js/forms2.min.js",
            "https://maps.googleapis.com/maps/api/js?v=3.exp&key=AIzaSyDR76rjQL_2raonHiZ6ZrPqJr-FPb7pGH0",
            "https://colohouse.com/wp-content/themes/Netrouting/assets/chosen/chosen.jquery.min.js",
            "https://colohouse.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.7",
            "https://colohouse.com/wp-content/themes/Netrouting/js/vendor/modernizr-2.8.3-respond-1.4.2.min.js",
            "https://colohouse.com/wp-content/plugins/contact-form-7/includes/js/index.js?ver=5.4.2",
            "https://colohouse.com/wp-content/plugins/link-whisper-premium/js/frontend.js?ver=1632756485",
            "https://colohouse.com/wp-content/plugins/wpcf7-redirect/build/js/wpcf7-redirect-frontend-script.js?ver=1.1",
            "https://colohouse.com/wp-content/plugins/kingcomposer/assets/frontend/js/kingcomposer.min.js?ver=2.9.6",
            "https://colohouse.com/wp-includes/js/wp-embed.min.js?ver=5.8",
            "https://colohouse.com/wp-content/plugins/wp-schema-pro/admin/assets/min-js/frontend.min.js?ver=2.7.2",
            "https://colohouse.com/wp-content/cache/autoptimize/css/autoptimize_5e11636f7dd8fb4f55e0ff84f0ed5faa.css",
            "https://fonts.googleapis.com/css?family=Libre+Franklin%3A300%2C300i%2C400%2C400i%2C600%2C600i%2C800%2C800i&subset=latin%2Clatin-ext",
            "https://fonts.googleapis.com/css?family=Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic&subset=greek%2Clatin%2Cvietnamese%2Clatin-ext%2Ccyrillic%2Ccyrillic-ext%2Cgreek-ext&ver=2.9.6",
            "https://app-ab02.marketo.com/js/forms2/css/forms2.css",
            "https://app-ab02.marketo.com/js/forms2/css/forms2-theme-simple.css",
            "https://app-ab02.marketo.com/index.php/form/XDFrame"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Qe",
              "display_name": "Qe",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1049",
              "name": "System Network Connections Discovery",
              "display_name": "T1049 - System Network Connections Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2599,
            "hostname": 952,
            "FileHash-SHA256": 458,
            "domain": 557
          },
          "indicator_count": 4566,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1432 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "625f112112bb456382bee7c9",
          "name": "Hostgator - whitelisted",
          "description": "Firing Rule, IRF.util.com, is set to go live on the internet after it was triggered by a new rule, but if it is not already in place, it will not load.",
          "modified": "2022-05-19T00:00:49.028000",
          "created": "2022-04-19T19:44:33.964000",
          "tags": [
            "webkitkeyframes",
            "helvetica neue",
            "helvetica",
            "arial",
            "45deg",
            "100vw",
            "typetext",
            "copyright",
            "closure library",
            "affiliatepage",
            "tospage",
            "banner",
            "iab2",
            "acceptall",
            "rejectall",
            "genven",
            "expecting iab",
            "iab tcf",
            "oldcctid",
            "newdomainid",
            "unknown",
            "checkbox",
            "date",
            "component",
            "apptree",
            "hnull",
            "fcee",
            "typeof t",
            "typeerror",
            "qss7",
            "error",
            "promise",
            "hfunction",
            "typeof e",
            "rfc3986",
            "string",
            "array",
            "rfc1738",
            "object",
            "sr1t",
            "typeof symbol",
            "animation",
            "null",
            "rnull",
            "forwardref",
            "typeof n",
            "nullt",
            "cxlc",
            "dptw",
            "dtha",
            "gdzw",
            "gurp",
            "w0b4",
            "kjy9",
            "uigm",
            "ve6h",
            "event",
            "currency",
            "currencysymbol",
            "ucvw",
            "ofunction",
            "ocsf",
            "xfunction",
            "urlsearchparams",
            "open",
            "symbol",
            "nfunction",
            "lfunction",
            "ufunction",
            "typeof window",
            "typeof self",
            "hj",
            "09af",
            "regexp",
            "irmstevent",
            "bad expr",
            "hotjar",
            "email",
            "telefon",
            "survey",
            "meta",
            "cookie",
            "keypress",
            "trident",
            "live",
            "fullscreen",
            "generic",
            "window",
            "widget",
            "ciudad",
            "adore",
            "experiment",
            "mutation",
            "n color",
            "number",
            "customevent",
            "n strictly",
            "hostn host",
            "button",
            "cookie tracking",
            "close",
            "campaign",
            "decision",
            "action",
            "page",
            "controller",
            "must",
            "visitor",
            "groupstart",
            "info",
            "obsolete",
            "false",
            "reduceright",
            "portland",
            "trackevent",
            "query",
            "u003cu003e",
            "trackpageview",
            "code",
            "path",
            "click",
            "derek",
            "void",
            "gsxr89skrrs",
            "r300",
            "uint8array",
            "typeof d",
            "caca",
            "typeof",
            "facebook pixel",
            "pixel code",
            "iterator",
            "constantvalue",
            "globalvariable",
            "facebook",
            "boolean",
            "function",
            "service",
            "phonenumber",
            "ver0",
            "tag0",
            "extdata0",
            "ua ch",
            "invalid",
            "which",
            "thank",
            "hostgator",
            "poll",
            "primary intent",
            "iwe didn",
            "f39c11",
            "team",
            "script",
            "array int8array",
            "caregexp",
            "legacy",
            "irfcd",
            "error setting",
            "irgbd",
            "outer",
            "dynamic tag",
            "variable",
            "rule",
            "expr",
            "inline script"
          ],
          "references": [
            "xfe-URL-hostgator.com-stix2-2.1-export.json",
            "https://a.impactradius-tag.com/foundation-tags-SD382-d393-452e-9c15-ac1e4a6fc6fb1.js",
            "https://d3cxv97fi8q177.cloudfront.net/foundation-A122588-852f-4501-9972-9515a4f53da31.js",
            "https://www.googleadservices.com/pagead/conversion_async.js",
            "https://static.hotjar.com/c/hotjar-23213.js?sv=7",
            "https://bat.bing.com/bat.js",
            "https://connect.facebook.net/signals/config/393095817498804?v=2.9.57&r=stable",
            "https://connect.facebook.net/en_US/fbevents.js",
            "https://www.googletagmanager.com/gtag/js?id=G-SXR89SKRRS&l=dataLayer&cx=c",
            "https://www.googletagmanager.com/gtm.js?id=GTM-PPNLL2",
            "https://cdn3.optimizely.com/js/geo4.js",
            "https://cdn.optimizely.com/js/13477600374.js",
            "https://bat.bing.com/p/action/5797759.js",
            "https://cdn.cookielaw.org/scripttemplates/6.32.0/otBannerSdk.js",
            "https://script.hotjar.com/modules.0076bf93c385ddf0ff58.js",
            "https://a.impactradius-tag.com/mediasource-A122588-852f-4501-9972-9515a4f53da31.js",
            "https://www.hostgator.com/_next/static/runtime/polyfills-31f3ad766330c3157d95.js",
            "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/pages/_app.js",
            "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/pages/index.js",
            "https://www.hostgator.com/_next/static/runtime/webpack-83bd83ab777f80a6c75c.js",
            "https://www.hostgator.com/_next/static/chunks/framework.4fc08a4a599cac03ddf5.js",
            "https://www.hostgator.com/_next/static/chunks/60aafdb66a57b57b76936ce193fee053374e679c.cdd375bd63e4f4a5a41b.js",
            "https://www.hostgator.com/_next/static/runtime/main-a00d7acfcccd82e343f6.js",
            "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/_ssgManifest.js",
            "https://cdn.cookielaw.org/scripttemplates/otSDKStub.js",
            "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/_buildManifest.js",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1071979603/?random=1650396033510&cv=9&fst=1650396033510&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.hostgator.com%2F&tiba=Web%20Hosting%20-%202022%27s%20Best%20Website%20Hosting%20%7C%20HostGator&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
            "https://www.hostgator.com/_next/static/css/1746e01e071caaad90f08af905f64c7649b9fd98_CSS.27b3968e.chunk.css",
            "https://6241250.fls.doubleclick.net/activityi;src=6241250;type=remar0;cat=hg-al0;ord=1;num=152669004837;gtm=2wg4i1;auiddc=30830049.1650396032;u1=prospect;u2=%2F;u5=noConsent-none;~oref=https%3A%2F%2Fwww.hostgator.com%2F",
            "https://vars.hotjar.com/box-4924254a9ce4dc9b959b6e4a9b662d60.html"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Tunisia"
          ],
          "malware_families": [
            {
              "id": "hj",
              "display_name": "hj",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1339,
            "URL": 4622,
            "domain": 1260,
            "FileHash-SHA256": 692,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 1
          },
          "indicator_count": 7917,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 71,
          "modified_text": "1432 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "625f2b6a1f2c9d5631d261d5",
          "name": "Choopa.com - vultr",
          "description": "New RegExp(M) is a new type, and it will change any of the elements to the same type if you want to add them to your HTML page or add a third element.",
          "modified": "2022-05-19T00:00:49.028000",
          "created": "2022-04-19T21:36:42.286000",
          "tags": [
            "regexp",
            "typeof e",
            "typeof t",
            "function",
            "width",
            "error",
            "object",
            "pseudo",
            "child",
            "form",
            "class",
            "null",
            "date",
            "this",
            "void",
            "accept",
            "680876936",
            "389564586",
            "17606105819",
            "1044525330",
            "176418897",
            "121200080426",
            "1473231341",
            "45705983",
            "71770035416",
            "1958414417",
            "copyright",
            "closure library",
            "trunc",
            "msie",
            "tagpath",
            "fbcd",
            "body",
            "html",
            "gettarget",
            "571256413046247",
            "prop",
            "click",
            "typeof l",
            "json",
            "array",
            "string",
            "8760",
            "image",
            "adveid",
            "typeof c",
            "typeerror",
            "typeof",
            "facebook pixel",
            "pixel code",
            "symbol",
            "iterator",
            "constantvalue",
            "globalvariable",
            "facebook",
            "boolean",
            "service",
            "phonenumber",
            "meta",
            "invalid uuid",
            "uint8array",
            "nullu",
            "1099511627776",
            "t4294967296",
            "typeof symbol",
            "customevent",
            "09af",
            "ver0",
            "tag0",
            "extdata0",
            "ua ch",
            "invalid",
            "reduceright",
            "number",
            "gk6536fhn4d",
            "r300",
            "typeof d",
            "path",
            "caca",
            "addtocart",
            "signup",
            "addtowishlist",
            "lead",
            "custom",
            "typeof require",
            "sha256",
            "viewcontent",
            "search",
            "pfunction",
            "contenttype",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction",
            "functional",
            "member",
            "hnew regexp",
            "qfunction",
            "adview",
            "addbillinginfo",
            "addtolist",
            "contact",
            "download",
            "install",
            "pnull",
            "style",
            "ctnull",
            "post",
            "uint32array",
            "fanull",
            "license",
            "ynull",
            "config",
            "iframe",
            "javascript",
            "code",
            "hoverpopup",
            "please",
            "output",
            "popupmodal",
            "country",
            "checkall",
            "invcid",
            "base64",
            "score",
            "attr",
            "js foundation",
            "typeof module",
            "ffffff",
            "acce22",
            "f0f0f0",
            "dadada",
            "typesubmit",
            "typebutton",
            "f4f4f4",
            "trebuchet ms",
            "tahoma",
            "woff",
            "footer",
            "segoe ui",
            "emoji",
            "tbody",
            "roboto",
            "helvetica neue",
            "arial",
            "apple color",
            "noto color",
            "type",
            "twitter",
            "xava",
            "gbva",
            "hbva",
            "ibva",
            "lcva",
            "cdva",
            "oeva",
            "peva",
            "onclickpopup",
            "discountmonthly",
            "grayoverlay",
            "popup into",
            "popup var",
            "center",
            "price",
            "first",
            "classname",
            "eventkey",
            "event",
            "selector",
            "name",
            "datakey",
            "version",
            "default",
            "shown",
            "target",
            "close",
            "false",
            "trigger",
            "jquery",
            "delta",
            "open",
            "arrow",
            "protected",
            "leave",
            "dataspy",
            "typeof define",
            "eventlistener"
          ],
          "references": [
            "xfe-URL-Choopa.com-stix2-2.1-export.json",
            "https://www.choopa.com/commonimages/jquery-3.5.1.min.js",
            "https://www.choopa.com/_js/dragscroll.js",
            "https://www.choopa.com/_js/bootstrap.js",
            "https://www.choopa.com/_js/global.js?v=209",
            "https://ssl.google-analytics.com/ga.js",
            "https://www.choopa.com/css/bootstrap.css",
            "https://www.choopa.com/css/global.css?v=209",
            "https://my.choopa.com/js/jquery-3.5.1.min.js",
            "https://my.choopa.com/js/desktop.js?v=41",
            "https://my.choopa.com/js/global.js?v=41",
            "xfe-URL-Vultr.com-stix2-2.1-export.json",
            "https://www.clarity.ms/eus2/s/0.6.34/clarity.js",
            "https://snap.licdn.com/li.lms-analytics/insight.min.js",
            "https://www.google-analytics.com/analytics.js",
            "https://www.redditstatic.com/ads/pixel.js",
            "https://www.googletagmanager.com/gtag/js?id=G-K6536FHN4D&l=dataLayer&cx=c",
            "https://bat.bing.com/bat.js",
            "https://static.ads-twitter.com/uwt.js",
            "https://connect.facebook.net/signals/config/571256413046247?v=2.9.57&r=stable",
            "https://connect.facebook.net/signals/config/438248060937995?v=2.9.57&r=stable",
            "https://connect.facebook.net/signals/config/828098694004178?v=2.9.57&r=stable",
            "https://connect.facebook.net/en_US/fbevents.js",
            "https://js.partnerstack.com/v1/",
            "https://bat.bing.com/p/action/17528422.js",
            "https://s.adroll.com/j/roundtrip.js",
            "https://s.adroll.com/j/exp/DUKHAKVYIJASHDUBG4V7RE/index.js",
            "https://s.adroll.com/j/sendrolling.js",
            "https://d.adroll.com/pixel/DUKHAKVYIJASHDUBG4V7RE/E23RMKDBEFAEXMXLWK3IWO?adroll_fpc=838a57acc6141112b6107bdce5e3fde6-1650403057055&arrfrr=https%3A%2F%2Fwww.vultr.com%2F&pv=70707106758.07146&cookie=&adroll_s_ref=&keyw=",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/858656304/?random=1650403054497&cv=9&fst=1650403054497&num=1&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=3&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.vultr.com%2F&tiba=SSD%20VPS%20Servers%2C%20Cloud%20Servers%20and%20Cloud%20Hosting%20by%20Vultr%20-%20Vultr.com&hn=www.googleadservices.com&rfmt=3&fmt=4"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1241,
            "URL": 3454,
            "domain": 430,
            "FileHash-SHA256": 453
          },
          "indicator_count": 5578,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1432 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "625f3287d722d8d85700b75d",
          "name": "Leaseweb.com - malware hosting",
          "description": "function D(t,e,n), as well as window.com, has been frozen by a single function, as part of a series of \"snoopers' checks\"...",
          "modified": "2022-05-19T00:00:49.028000",
          "created": "2022-04-19T22:07:03.024000",
          "tags": [
            "11px center",
            "html",
            "typetext",
            "typeurl",
            "typeemail",
            "typetel",
            "typenumber",
            "typedate",
            "color",
            "marketo forms",
            "cross domain",
            "null",
            "click",
            "forceclose",
            "lightbox",
            "slideshow",
            "controls",
            "hide",
            "safari",
            "image",
            "mozilla",
            "explorer",
            "entity",
            "linear",
            "date",
            "jquery",
            "iframe",
            "close",
            "loops",
            "class",
            "stretch",
            "false",
            "function",
            "abbb",
            "typeerror",
            "boolean",
            "body",
            "object",
            "array",
            "regexp",
            "bind",
            "error",
            "void",
            "hammer",
            "form",
            "this",
            "views slideshow",
            "zindex1",
            "ajax",
            "href",
            "default",
            "thumb",
            "msgesture",
            "mspointerdown",
            "next",
            "stop",
            "type",
            "index",
            "event",
            "snapabugcbmbtn",
            "chat",
            "hidden",
            "leaf",
            "open",
            "dump",
            "window",
            "win32",
            "footer",
            "front",
            "drupal",
            "command",
            "implement",
            "copyright",
            "route",
            "foundation",
            "thecookie",
            "remove",
            "example",
            "backport",
            "grab",
            "span",
            "import",
            "attr",
            "string",
            "invalid json",
            "domparser",
            "number",
            "script",
            "closure library",
            "symbol",
            "array int8array",
            "caregexp",
            "legacy",
            "boardman",
            "fontface",
            "typeof d",
            "promise",
            "parseint",
            "marketo",
            "rangeerror",
            "uint8array",
            "typeof b",
            "buffer",
            "path",
            "takk",
            "kiitos",
            "buttons};kb(convertedmessage);break;case\"/sys\":var",
            "acum",
            "ufunction",
            "ffunction",
            "gfunction",
            "mchtd",
            "cancel",
            "thank",
            "enter",
            "please",
            "cobrowsing",
            "accept",
            "decline",
            "back",
            "comment",
            "grazie",
            "klik",
            "super",
            "dados",
            "hello",
            "vd",
            "reduceright",
            "trackevent",
            "lead",
            "query",
            "videos",
            "leaseweb",
            "trackpageview",
            "contact",
            "download",
            "metal",
            "code",
            "functional",
            "member",
            "hnew regexp",
            "qfunction",
            "adview",
            "addbillinginfo",
            "addtocart",
            "addtolist",
            "install",
            "cookiebot",
            "iabv2",
            "jsonversion",
            "cookie script",
            "methodstrict",
            "ticket",
            "id attribute",
            "cookiebot setup",
            "cookieconsent",
            "customevent",
            "09af",
            "ver0",
            "tag0",
            "extdata0",
            "ua ch",
            "invalid",
            "iterator",
            "service",
            "phonenumber",
            "facebook",
            "meta",
            "ytconfig",
            "edge",
            "swhealthlog",
            "logsdatabasev2",
            "trident",
            "android",
            "infinity",
            "pnull",
            "style",
            "ctnull",
            "post",
            "uint32array",
            "fanull",
            "license",
            "ynull",
            "config"
          ],
          "references": [
            "https://consent.cookiebot.com/1e27dadb-e278-4c02-aa4f-43f9222c4fbb/cc.js?renew=false&referer=www.leaseweb.com&culture=en&dnt=false",
            "https://j.clarity.ms/s/0.6.34/clarity.js",
            "https://www.google-analytics.com/plugins/ua/linkid.js",
            "https://www.youtube.com/s/player/19eb72e4/www-widgetapi.vflset/www-widgetapi.js",
            "https://www.youtube.com/iframe_api",
            "https://connect.facebook.net/signals/config/399164440484826?v=2.9.57&r=stable",
            "https://bat.bing.com/bat.js",
            "https://consent.cookiebot.com/uc.js?cbid=1e27dadb-e278-4c02-aa4f-43f9222c4fbb&culture=en",
            "https://snap.licdn.com/li.lms-analytics/insight.min.js",
            "https://www.googletagmanager.com/gtm.js?id=GTM-NWPHSS",
            "https://storage.googleapis.com/snapengage-eu/js/e9219576-8f74-40b5-8b6f-bbad33f6ca57.js",
            "https://munchkin.marketo.net/161/munchkin.js",
            "https://app-lon04.marketo.com/js/forms2/js/forms2.min.js",
            "https://munchkin.marketo.net/munchkin.js",
            "https://www.leaseweb.com/sites/all/modules/custom/lsw_marketo/js/lsw_marketo_forms.js",
            "https://use.fortawesome.com/03018d9d.js",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1001847692/?random=1650405011980&cv=9&fst=1650405011980&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.leaseweb.com%2F&tiba=Leaseweb%20%7C%20Global%20Hosted%20Infrastructure%20(IaaS)%20and%20Cloud%20Solutions&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/952389962/?random=1650405011982&cv=9&fst=1650405011982&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.leaseweb.com%2F&tiba=Leaseweb%20%7C%20Global%20Hosted%20Infrastructure%20(IaaS)%20and%20Cloud%20Solutions&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
            "https://eu.snapengage.com/chatjs/ServiceGetConfig?w=e9219576-8f74-40b5-8b6f-bbad33f6ca57",
            "https://eu.snapengage.com/chatjs/servicegetproactivegeodata?w=e9219576-8f74-40b5-8b6f-bbad33f6ca57",
            "https://bat.bing.com/p/action/5602105.js",
            "https://eu.snapengage.com/chatjs/servicegetallavailableagents?w=e9219576-8f74-40b5-8b6f-bbad33f6ca57&t=1",
            "https://www.googleadservices.com/pagead/conversion_async.js",
            "https://www.leaseweb.com/sites/default/files/js/js_kwxcSFD2Y0_BPtdJClYUy5H8THI_5EycUmIgIGWaGYs.js",
            "https://www.leaseweb.com/sites/default/files/js/js_wcSNEXVJ4Xjhkf8qhMguEPZJTDTMNmPaJM-YWdAOhQE.js",
            "https://www.leaseweb.com/sites/default/files/js/js_kI_QwKJlaBz9CzQdENdUBFiEl4aehfjf4_-9taiwcCE.js",
            "https://www.leaseweb.com/sites/default/files/js/js_zoLA7TweXam0kYiqJrXepqBWmyDoP1sLSlHoZcveFnY.js",
            "https://www.leaseweb.com/sites/default/files/js/js_6FowaFXT9bT78hf9earPdGcdTmvsFiaBzKgFl9P4fSo.js",
            "https://www.leaseweb.com/sites/default/files/js/js_6lTJ_m6ahwXas7Efbw8ZYEMSaecrGw8ilNALfvIPNUw.js",
            "https://analytics.twitter.com/i/adsct?type=javascript&version=2.0.4&p_id=Twitter&p_user_id=0&txn_id=nxsfu&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0&event_id=511b6f48-2639-478c-a251-b09fcbae76e7&tw_document_href=https%3A%2F%2Fwww.leaseweb.com%2F&tpx_cb=twttr.conversion.loadPixels",
            "https://bid.g.doubleclick.net/xbbe/pixel?d=KAE",
            "https://consentcdn.cookiebot.com/sdk/bc-v4.min.html",
            "https://app-lon04.marketo.com/index.php/form/XDFrame",
            "https://app-lon04.marketo.com/js/forms2/css/forms2-theme-plain.css",
            "https://www.leaseweb.com/sites/default/files/css/css_47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU.css",
            "https://www.leaseweb.com/sites/default/files/css/css_7CYF9En6DNp6AojfSKnT8USKR3GvzPwznmTqLTKT9VM.css"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Tunisia"
          ],
          "malware_families": [
            {
              "id": "Ajax",
              "display_name": "Ajax",
              "target": null
            },
            {
              "id": "Kiitos",
              "display_name": "Kiitos",
              "target": null
            },
            {
              "id": "Takk",
              "display_name": "Takk",
              "target": null
            },
            {
              "id": "Acum",
              "display_name": "Acum",
              "target": null
            },
            {
              "id": "buttons};kb(convertedMessage);break;case\"/SYS\":var",
              "display_name": "buttons};kb(convertedMessage);break;case\"/SYS\":var",
              "target": null
            },
            {
              "id": "Vd",
              "display_name": "Vd",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1490",
              "name": "Inhibit System Recovery",
              "display_name": "T1490 - Inhibit System Recovery"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 648,
            "domain": 469,
            "URL": 2037,
            "FileHash-SHA256": 705,
            "email": 7
          },
          "indicator_count": 3866,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1432 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "GCMouse.h",
        "string.h",
        "https://www.google.com/recaptcha/api.js?render=6Ld8S6EUAAAAAExG_6DO_Jj4DLY35ybebbA8R_eA&ver=3.0",
        "vm_shared_region.h",
        "https://connect.facebook.net/signals/plugins/identity.js?v=2.9.60",
        "ASAccountAuthenticationModificationController.h",
        "https://www.google-analytics.com/plugins/ua/linkid.js",
        "hasownproperty.call \u2022 fireeye.grhd.",
        "https://serverhub.com/combine/a059fe7a562c0b582328162f0ee69fda-1426025688",
        "https://www.metronetinc.com/wp-includes/js/hoverIntent.min.js?ver=1.10.1",
        "vm_options.h",
        "overload.h",
        "https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0-alpha.6/js/bootstrap.min.js",
        "https://app-lon04.marketo.com/index.php/form/XDFrame",
        "https://connect.facebook.net/en_US/fbevents.js",
        "https://www.googletagmanager.com/gtag/js?id=G-0CBKGBKB3J&l=dataLayer&cx=c",
        "ASAuthorizationWebBrowserPublicKeyCredentialManager.h",
        "https://consent.cookiebot.com/uc.js?cbid=1e27dadb-e278-4c02-aa4f-43f9222c4fbb&culture=en",
        "ASPublicKeyCredentialClientData.h",
        "https://js.hscollectedforms.net/collectedforms.js",
        "cop.h",
        "https://www.metronetinc.com/wp-content/themes/MetroNet/js/jquery.flexslider-min.js?ver=5.8.4",
        "https://constant-tech.biz/wp-includes/js/wp-embed.min.js",
        "https://2001.dwlww.com/static/js/chunk-7d5d3bac.efb700c7.js",
        "https://munchkin.marketo.net/munchkin.js",
        "GCAxis2DInput.h",
        "WKContentRuleListStore.h",
        "https://www.tidio.com/talk/kv6vcosd7tmhsetmarsoawzaglejnny4",
        "IOUSBHost.h",
        "https://www.8098.app:21568/js/jquery-1.11.3.min.js",
        "GCDeviceLight.h",
        "https://m4244.com:35003/",
        "https://img03.en25.com/i/elqCfg.min.js",
        "https://my.frantech.ca/templates/lagom/assets/js/lagom-app.min.js?v=1.4.3",
        "https://app-ab02.marketo.com/js/forms2/css/forms2.css",
        "form.h",
        "https://www.choopa.com/_js/global.js?v=209",
        "https://analytics.twitter.com/i/adsct?type=javascript&version=2.0.4&p_id=Twitter&p_user_id=0&txn_id=nxsfu&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0&event_id=511b6f48-2639-478c-a251-b09fcbae76e7&tw_document_href=https%3A%2F%2Fwww.leaseweb.com%2F&tpx_cb=twttr.conversion.loadPixels",
        "https://js.hsadspixel.net/fb.js",
        "OBEX.h",
        "https://js.partnerstack.com/v1/",
        "https://app.ynsdty.cn//package/GmCC6WISh",
        "gssapi.h",
        "scope.h",
        "MultipeerConnectivity.tbd",
        "GKSessionError.h",
        "ASWebAuthenticationSessionWebBrowserSessionHandling.h",
        "PCIDriverKit.h",
        "preauth_plugin.h",
        "GCRelativeInput.h",
        "GKPublicConstants.h",
        "https://constant-tech.biz/wp-content/plugins/ajax-search-lite/js/min/jquery.ajaxsearchlite.min.js",
        "WKUIDelegate.h",
        "https://app-ab02.marketo.com/index.php/form/XDFrame",
        "WKDownload.h",
        "pmap.h",
        "time64_config.h",
        "GCSteeringWheelElement.h",
        "https://www.hostgator.com/_next/static/css/1746e01e071caaad90f08af905f64c7649b9fd98_CSS.27b3968e.chunk.css",
        "GKError.h",
        "https://www.data102.com/wp-includes/js/wp-embed.min.js?ver=00b0ffc433836dcf9f57035fded0b908",
        "MCError.h",
        "op.h",
        "https://bat.bing.com/p/action/5602105.js",
        "libperl.tbd",
        "xfe-URL-Enom.com-stix2-2.1-export 2.json",
        "WKSnapshotConfiguration.h",
        "op_reg_common.h",
        "ASPasskeyRegistrationCredential.h",
        "https://js.hs-scripts.com/9251231.js",
        "https://www.hostgator.com/_next/static/chunks/60aafdb66a57b57b76936ce193fee053374e679c.cdd375bd63e4f4a5a41b.js",
        "WKOpenPanelParameters.h",
        "WebKitLegacy.h",
        "GCPhysicalInputSource.h",
        "https://www.googletagmanager.com/gtag/js?id=AW-981889198",
        "Block.h",
        "static_if.h",
        "GCControllerInput.h",
        "GKChallengeEventHandler.h",
        "vm_memtag.h",
        "https://colohouse.com/wp-content/plugins/link-whisper-premium/js/frontend.js?ver=1632756485",
        "https://consent.cookiebot.com/1e27dadb-e278-4c02-aa4f-43f9222c4fbb/cc.js?renew=false&referer=www.leaseweb.com&culture=en&dnt=false",
        "utfebcdic.h",
        "AppSandbox.tbd",
        "GKGameSessionSharingViewController.h",
        "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialRegistrationRequest.h",
        "https://www.metronetinc.com/wp-content/themes/MetroNet/js/flexslider-init.js?ver=5.8.4",
        "IOPCIDevice.h",
        "IOBluetooth.tbd",
        "IntentsUI.apinotes",
        "tss.h",
        "GCButtonElement.h",
        "https://www.googletagmanager.com/gtag/js?id=UA-41133527-3",
        "GCDualSenseGamepad.h",
        "https://bs.serving-sys.com/Serving/ActivityServer.bs?cn=as&ActivityID=1073779012&rnd=922949.8781851793",
        "perlvars.h",
        "nfsproto.h",
        "alc.h",
        "byte_order.h",
        "iperlsys.h",
        "https://insurancerateusa.com/3bea8d40-8926f4790c0b3689a361.js",
        "GKAchievementDescription.h",
        "https://www.googletagmanager.com/gtm.js?id=GTM-PPNLL2",
        "param.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialAssertion.h",
        "memory_types.h",
        "vm_fault.h",
        "https://constant-tech.biz/wp-content/themes/Constant-theme/js/compressed.js",
        "GCControllerElement.h",
        "ASAuthorizationController.h",
        "https://2001.habyc.com/static/js/chunk-vendors.9d7684f4.js",
        "https://bat.bing.com/p/action/17528422.js",
        "https://constant-tech.biz/wp-includes/js/dist/vendor/regenerator-runtime.min.js",
        "stdatomic.h",
        "https://www.sunnetwork.com.sg/sun_21/js/isotope.pkgd.min.js",
        "GameKit.h",
        "WKContentWorld.h",
        "IOUSBHostStream.h",
        "OBEXBluetooth.h",
        "https://www.googleadservices.com/pagead/conversion_async.js",
        "perlapi.h",
        "WKContextMenuElementInfo.h",
        "WKBackForwardListItem.h",
        "Admin.tbd",
        "xfe-URL-Eonix.net-stix2-2.1-export.json",
        "vecLib.h",
        "GKMatchmakerViewController.h",
        "skynet-dev.tcxn.net tcxn.net Registrar Ascio Technologies, Inc - connection to cloud proxy",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/981889198/?random=1650488340630&cv=9&fst=1650488340630&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2oa4i1&sendb=1&ig=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fwww.allwest.com%2F&tiba=All%20West%20Communications%20-%20telecommunication%20company&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
        "xfe-URL-Js.stripe.net-stix2-2.1-export.json",
        "INImage+IntentsUI.h",
        "ASAccountAuthenticationModificationViewController.h",
        "GKAccessPoint.h",
        "vm_compressor_algorithms.h",
        "https://www.8098.app:21568/js/xinstall_inner_e.min.js?v=1004",
        "ASAuthorizationPublicKeyCredentialLargeBlobAssertionOutput.h",
        "zconf.h",
        "GKGameSessionEventListener.h",
        "https://www.data102.com/wp-content/plugins/contact-form-7/includes/js/scripts.js",
        "https://www.youtube.com/s/player/19eb72e4/www-widgetapi.vflset/www-widgetapi.js",
        "https://static.ads-twitter.com/uwt.js",
        "version.h",
        "https://connect.facebook.net/signals/config/2196524664009793?v=2.9.57&r=stable",
        "xfe-URL-bat.bing.com-stix2-2.1-export 2.json",
        "GCDeviceBattery.h",
        "xfe-URL-allwest.com-stix2-2.1-export.json",
        "ip_var.h",
        "stdbool.h",
        "WKPDFConfiguration.h",
        "https://bat.bing.com/p/action/140000459.js",
        "ASAuthorizationWebBrowserExternallyAuthenticatableRequest.h",
        "locks.h",
        "GCControllerButtonInput.h",
        "tcp_var.h",
        "OSAtomic.h",
        "vm_dyld_pager.h",
        "parser.h",
        "ASAuthorizationAppleIDButton.h",
        "https://d31qbv1cthcecs.cloudfront.net/atrk.js",
        "GCSwitchElement.h",
        "Kerberos.h",
        "av.h",
        "https://www.sunnetwork.com.sg/sun_21/js/slick.min.js",
        "ASAuthorizationPasswordProvider.h",
        "python-3.9.pc",
        "GKFriendRequestComposeViewController.h",
        "IOBluetoothUserLib.h",
        "mg.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredential.h",
        "ASAuthorizationSingleSignOnProvider.h",
        "INUIEditVoiceShortcutViewController.h",
        "https://2001.dwlww.com/static/js/app.9d5d18d7.js",
        "vm_kern.h",
        "GKGameSessionError.h",
        "WKWebView.h",
        "ASAuthorizationPublicKeyCredentialConstants.h",
        "xfe-URL-sun.net.hk-stix2-2.1-export.json",
        "https://www.leaseweb.com/sites/default/files/js/js_6FowaFXT9bT78hf9earPdGcdTmvsFiaBzKgFl9P4fSo.js",
        "perliol.h",
        "https://www.googletagmanager.com/gtag/js?id=G-FVHXSM5ZYL&l=dataLayer&cx=c",
        "ASAuthorizationSingleSignOnRequest.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredentialProvider.h",
        "invlist_inline.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationOutput.h",
        "GCExtendedGamepadSnapshot.h",
        "xfe-URL-colohouse.com-stix2-2.1-export.json",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/858656304/?random=1650403054497&cv=9&fst=1650403054497&num=1&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=3&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.vultr.com%2F&tiba=SSD%20VPS%20Servers%2C%20Cloud%20Servers%20and%20Cloud%20Hosting%20by%20Vultr%20-%20Vultr.com&hn=www.googleadservices.com&rfmt=3&fmt=4",
        "GKTurnBasedMatch.h",
        "GCColor.h",
        "https://www.choopa.com/_js/bootstrap.js",
        "xfe-URL-tidio.co-stix2-2.1-export.json",
        "xfe-URL-uizard.io-stix2-2.1-export.json",
        "tcp_timer.h",
        "GKTurnBasedMatchmakerViewController.h",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-runtime.js",
        "xfe-URL-Vultr.com-stix2-2.1-export.json",
        "pad.h",
        "WKWebsiteDataStore.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredentialAssertionRequest.h",
        "xfe-URL-Intercom.io-stix2-2.1-export.json",
        "xfe-URL-Data102.com-stix2-2.1-export.json",
        "ASAuthorizationSecurityKeyPublicKeyCredentialRegistrationRequest.h",
        "GKLeaderboardViewController.h",
        "oalMacOSX_OALExtensions.h",
        "ASAuthorizationPasswordRequest.h",
        "SwiftUI.swiftoverlay",
        "handy.h",
        "https://eu.snapengage.com/chatjs/servicegetproactivegeodata?w=e9219576-8f74-40b5-8b6f-bbad33f6ca57",
        "IOBluetoothUI.tbd",
        "embed.h",
        "https://js.usemessages.com/conversations-embed.js",
        "https://colohouse.com/wp-content/plugins/wpcf7-redirect/build/js/wpcf7-redirect-frontend-script.js?ver=1.1",
        "utf8.h",
        "WKProcessPool.h",
        "https://s.adroll.com/j/roundtrip.js",
        "https://www.choopa.com/_js/dragscroll.js",
        "https://insurancerateusa.com/bfcc7b67-0b189ba6da3fc3ae8b88.js",
        "GCMouseInput.h",
        "cpuid.h",
        "https://www.leaseweb.com/sites/all/modules/custom/lsw_marketo/js/lsw_marketo_forms.js",
        "config.xml",
        "https://my.frantech.ca/templates/lagom/assets/js/whmcs-custom.min.js?v=1.4.3",
        "https://a2.adform.net/serving/scripts/trackpoint/async/",
        "stddef.h",
        "lz4_constants.h",
        "xfe-IP-207.246.75.55-stix2-2.1-export.json",
        "machine_routines.h",
        "WKPreviewActionItem.h",
        "ptrauth.h",
        "perl_langinfo.h",
        "WKHTTPCookieStore.h",
        "WKWebViewConfiguration.h",
        "https://app-lon04.marketo.com/js/forms2/css/forms2-theme-plain.css",
        "xfe-URL-Ovh.net-stix2-2.1-export 2.json",
        "stdarg.h",
        "ASPasswordCredentialRequest.h",
        "IOBluetoothUtilities.h",
        "https://www.googletagmanager.com/gtag/js?id=G-3XJ902FY6Q&l=dataLayer&cx=c",
        "https://chimpstatic.com/mcjs-connected/js/users/6c3abfa7ff8634c75cdb2b22e/ddf7a436c1746be666f330e4a.js",
        "https://connect.facebook.net/signals/config/828098694004178?v=2.9.57&r=stable",
        "GCDualSenseAdaptiveTrigger.h",
        "perldtrace.h",
        "GCMotion.h",
        "INTERN.h",
        "ASPasswordCredentialIdentity.h",
        "https://www.googleoptimize.com/optimize.js?id=GTM-MWM9R93",
        "https://code.jquery.com/jquery-1.12.0.min.js",
        "ASAuthorizationAppleIDProvider.h",
        "WKNavigationResponse.h",
        "time64.h",
        "ASAuthorizationPublicKeyCredentialAssertionRequest.h",
        "xfe-URL-share.vx-underground.org_Conti-stix2-2.1-export.json",
        "endian.h",
        "ASCredentialServiceIdentifier.h",
        "signal.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobAssertionInput.h",
        "https://www.googletagmanager.com/gtag/js?id=UA-41133527-2",
        "xfe-URL-Choopa.com-stix2-2.1-export.json",
        "https://2001.dwlww.com/static/js/chunk-vendors.9d7684f4.js",
        "IOUSBHostDefinitions.h",
        "https://colohouse.com/wp-includes/js/wp-emoji-release.min.js?ver=5.8",
        "https://insurancerateusa.com/polyfill-036b4a134d8725752ba0.js",
        "https://a2.adform.net/Serving/TrackPoint/?pm=508052&ADFPageName=Metronet%7CHomepage&ADFdivider=%7C&ord=735079476141&Set1=en-US%7Cen-US%7C390x844%7C32&ADFtpmode=2&loc=https%3A%2F%2Fwww.metronetinc.com%2F",
        "AuthenticationServices.h",
        "a.pub.network:timcast-com:pubfig.min.js.webloc",
        "https://app.whoisvisiting.com/who.js",
        "https://app-ab02.marketo.com/js/forms2/js/forms2.min.js",
        "https://www.hostgator.com/_next/static/runtime/webpack-83bd83ab777f80a6c75c.js",
        "GCDualShockGamepad.h",
        "https://2001.dwlww.com/js/config.js",
        "vBasicOps.h",
        "krb5.h",
        "mg_data.h",
        "IOBluetoothUIUserLib.h",
        "WKWebsiteDataRecord.h",
        "ASPasskeyCredentialIdentity.h",
        "https://www.allwest.com/wp-content/plugins/svg-support/js/min/svgs-inline-min.js?ver=1.0.0",
        "MCSession.h",
        "IOBluetoothObjectPushUIController.h",
        "OSDebug.h",
        "ASWebAuthenticationSession.h",
        "vm_pageout.h",
        "vfs_support.h",
        "arch.h",
        "https://cdn.cookielaw.org/scripttemplates/otSDKStub.js",
        "https://6241250.fls.doubleclick.net/activityi;src=6241250;type=remar0;cat=hg-al0;ord=1;num=152669004837;gtm=2wg4i1;auiddc=30830049.1650396032;u1=prospect;u2=%2F;u5=noConsent-none;~oref=https%3A%2F%2Fwww.hostgator.com%2F",
        "https://js.hsleadflows.net/leadflows.js",
        "GCPhysicalInputProfile.h",
        "OSKextLib.h",
        "https://www.googletagmanager.com/gtag/js?id=UA-185991747-1",
        "apfs_boot_mount.tbd",
        "WKDownloadDelegate.h",
        "pal_routines.h",
        "https://colohouse.com/wp-includes/js/wp-embed.min.js?ver=5.8",
        "https://colohouse.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
        "https://colohouse.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.7",
        "https://www.metronetinc.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
        "AFKMemoryDescriptorOptions.h",
        "audit_ioctl.h",
        "python-3.9-embed.pc",
        "https://hybrid-analysis.com/sample/d486999c12741352b6458da8e0b0322e3eca96297d6e00424d505ee0590227ce/62eee9810cf3eb216a0aded2",
        "perl_siphash.h",
        "https://insurancerateusa.com/94297995-69529ad7536f090aa776.js",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredentialRegistrationRequest.h",
        "ASAuthorizationError.h",
        "ASCredentialIdentity.h",
        "sv.h",
        "GCDeviceCursor.h",
        "GKGameCenterViewController.h",
        "https://insurancerateusa.com/app-74647f151b541f3098c2.js",
        "OSBase.h",
        "ASAuthorizationAppleIDCredential.h",
        "nostdio.h",
        "git_version.h",
        "xfe-URL-habyc.com-stix2-2.1-export.json",
        "OpenAL.h",
        "xfe-URL-https___www.reliablesite.net_-stix2-2.1-export.json",
        "https://www.google-analytics.com/analytics.js",
        "_param.h",
        "https://my.choopa.com/js/global.js?v=41",
        "https://fonts.googleapis.com/css?family=Libre+Franklin%3A300%2C300i%2C400%2C400i%2C600%2C600i%2C800%2C800i&subset=latin%2Clatin-ext",
        "TrojanProxy:Win32/Malynfits CodeOverlap TrojanSpy:Win32/Nivdort CodeOverlap virus:Win32/Lywer CodeOverlap",
        "https://js.hs-scripts.com/3844463.js",
        "krpc.h",
        "if_ether.h",
        "ASEProcessing.tbd",
        "GKSession.h",
        "https://img03.en25.com/i/livevalidation_standalone.compressed.js",
        "desc.h",
        "embedvar.h",
        "perlsdio.h",
        "https://snap.licdn.com/li.lms-analytics/insight.min.js",
        "IOUSBHostCIControllerStateMachine.h",
        "fakesdio.h",
        "ASAuthorizationProviderExtensionAuthorizationRequest.h",
        "ASAuthorizationCustomMethod.h",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-2d0d2b7c.js",
        "xfe-URL-frantech.ca-stix2-2.1-export.json",
        "ASAuthorizationSecurityKeyPublicKeyCredentialProvider.h",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1071979603/?random=1650396033510&cv=9&fst=1650396033510&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.hostgator.com%2F&tiba=Web%20Hosting%20-%202022%27s%20Best%20Website%20Hosting%20%7C%20HostGator&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
        "https://my.choopa.com/js/jquery-3.5.1.min.js",
        "IOBluetoothTypes.h",
        "https://constant-tech.biz/wp-includes/js/dist/hooks.min.js",
        "IOPCIDevice.iig",
        "Virus:DOS/Hellspawn 192.168.122.49 10/16/25\t\u2022  IPv4 142.251.9.105",
        "GKLocalPlayer.h",
        "https://constant-tech.biz/wp-content/plugins/page-loader/script.js",
        "xfe-URL-hostgator.com-stix2-2.1-export.json",
        "https://eu.snapengage.com/chatjs/ServiceGetConfig?w=e9219576-8f74-40b5-8b6f-bbad33f6ca57",
        "python3.pc",
        "https://www.metronetinc.com/wp-includes/js/jquery/ui/core.min.js?ver=1.12.1",
        "GKLeaderboardScore.h",
        "machine_cpuid.h",
        "pio.h",
        "ASCOSEConstants.h",
        "_limits.h",
        "https://widget.intercom.io/widget/rbc8ok9w",
        "perly.h",
        "unixish.h",
        "WKFoundation.h",
        "https://www.redditstatic.com/ads/pixel.js",
        "tcp.h",
        "https://app.ynsdty.cn/dist/js/jquery.cookie.js",
        "in_arp.h",
        "xfe-URL-https___my.frantech.ca_-stix2-2.1-export.json",
        "https://constant-tech.biz/wp-content/plugins/cookie-notice/js/front.min.js",
        "OSvKernDSPLib.h",
        "https://widget-v4.tidiochat.com/code/kv6vcosd7tmhsetmarsoawzaglejnny4.js",
        "UNDRequest.defs",
        "https://www.sunnetwork.com.sg/sun_21/js/main.js",
        "GCTouchedStateInput.h",
        "https://www.googletagmanager.com/gtm.js?id=GTM-PTXLXZ4",
        "https://static.hotjar.com/c/hotjar-23213.js?sv=7",
        "GKMatch.h",
        "monotonic.h",
        "ASPasskeyAssertionCredential.h",
        "https://www.data102.com/wp-content/plugins/cta/shared//shortcodes/js/spin.min.js",
        "IOPCIFamilyDefinitions.h",
        "ASAuthorizationProviderExtensionAuthorizationResult.h",
        "sysctl.h",
        "popen_spawn_win32.py",
        "https://my.choopa.com/js/desktop.js?v=41",
        "ip6.h",
        "mydtrace.h",
        "rpcv2.h",
        "gssapi_krb5.h",
        "https://d.adroll.com/pixel/DUKHAKVYIJASHDUBG4V7RE/E23RMKDBEFAEXMXLWK3IWO?adroll_fpc=838a57acc6141112b6107bdce5e3fde6-1650403057055&arrfrr=https%3A%2F%2Fwww.vultr.com%2F&pv=70707106758.07146&cookie=&adroll_s_ref=&keyw=",
        "xfe-URL-Serverhub.com-stix2-2.1-export.json",
        "https://munchkin.marketo.net/161/munchkin.js",
        "sbox32_hash.h",
        "GCKeyboard.h",
        "in_stat.h",
        "https://www.sunnetwork.com.sg/sun_21/js/vendor/jquery-3.5.0.min.js",
        "https://www.sunnetwork.com.sg/sun_21/js/ajax-form.js",
        "IOUSBHostCIEndpointStateMachine.h",
        "https://www.allwest.com/wp-content/plugins/contact-form-7/modules/recaptcha/index.js?ver=5.5.6",
        "warnings.h",
        "https://colohouse.com/",
        "https://www.googleadservices.com/pagead/conversion/646812378/?random=1650430003991&cv=9&fst=1650430003991&num=1&value=0&label=6dFBCIm13s4BENqltrQC&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=3&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.metronetinc.com%2F&tiba=MetroNet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%2C%20Streaming%20TV%2C%20and%20Phone&",
        "https://consentcdn.cookiebot.com/sdk/bc-v4.min.html",
        "encode.h",
        "AFKUser.tbd",
        "OSMalloc.h",
        "tcpip.h",
        "crc.h",
        "https://constant-tech.biz/#mobile-widget",
        "https://www.allwest.com/wp-content/plugins/wp-smushit/app/assets/js/smush-lazy-load.min.js?ver=3.9.5",
        "https://www.leaseweb.com/sites/default/files/css/css_7CYF9En6DNp6AojfSKnT8USKR3GvzPwznmTqLTKT9VM.css",
        "perlio.h",
        "https://www.hybrid-analysis.com/sample/d3ffdf44916b01e14fceca04c3a3beb5fbad5aeea482e2242c5a843793073874/6447a07b59116aba3303e517",
        "atm_types.h",
        "cpuid_internal.h",
        "https://static.zdassets.com/ekr/snippet.js?key=e7dd7ff5-a219-47a1-b096-069f750c234f",
        "IOUSBHostControllerInterfaceDefinitions.h",
        "unicode_constants.h",
        "canvas.html",
        "plugin.js",
        "x86_64-apple-macos.swiftinterface",
        "https://constant-tech.biz/wp-includes/js/jquery/jquery-migrate.min.js",
        "https://www.clarity.ms/eus2/s/0.6.34/clarity.js",
        "https://colohouse.com/wp-content/cache/autoptimize/css/autoptimize_5e11636f7dd8fb4f55e0ff84f0ed5faa.css",
        "https://2001.habyc.com/static/css/chunk-vendors.6a41b67e.css",
        "uuid.h",
        "opcode.h",
        "https://app.uizard.io/p/c69fa2aa",
        "hv.h",
        "https://connect.facebook.net/signals/config/661596171311072?v=2.9.57&r=stable",
        "thread.h",
        "https://www.allwest.com/wp-content/uploads/hummingbird-assets/c4be4d65e707f6328e3a72e79cfdfcb7.js",
        "GCPhysicalInputElement.h",
        "MCAdvertiserAssistant.h",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-2d0b9454.js",
        "GKChallengesViewController.h",
        "https://www.data102.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1",
        "https://www.choopa.com/css/bootstrap.css",
        "ASAuthorizationAppleIDRequest.h",
        "https://www.metronetinc.com/wp-content/plugins/lt-ajax-mn-channelguide/jquery-ui.min.js?ver=1.2",
        "https://secure-ds.serving-sys.com/SemiCachedScripts/ebAttribution.js",
        "capture_0.bundle.js",
        "GCTypes.h",
        "xfe-URL-convertful.com-stix2-2.1-export.json",
        "IOUSBHostInterface.h",
        "https://www.sunnetwork.com.sg/sun_21/js/popper.min.js",
        "https://www.googletagmanager.com/gtag/js?id=G-7BE8PMLSKX&l=dataLayer&cx=c",
        "nfs.h",
        "ASWebAuthenticationSessionCallback.h",
        "https://widget.intercom.io/widget/e1nqrt2k",
        "https://cdn3.optimizely.com/js/geo4.js",
        "BluetoothAssignedNumbers.h",
        "OSReturn.h",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-f163fcd0.js",
        "python3-embed.pc",
        "bitcount.h",
        "https://2001.dwlww.com/static/css/chunk-7d5d3bac.e1a32335.css",
        "GCMicroGamepad.h",
        "IOUSBHostDevice.h",
        "https://js.hs-analytics.net/analytics/1650488100000/9251231.js",
        "https://2001.habyc.com/static/css/chunk-7d5d3bac.e1a32335.css",
        "https://hostsailor.com/wp-content/cache/minify/9de48.js",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1001847692/?random=1650405011980&cv=9&fst=1650405011980&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.leaseweb.com%2F&tiba=Leaseweb%20%7C%20Global%20Hosted%20Infrastructure%20(IaaS)%20and%20Cloud%20Solutions&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
        "MCNearbyServiceAdvertiser.h",
        "kdp_en_debugger.h",
        "udp.h",
        "XSUB.h",
        "GKGameSession.h",
        "uconfig.h",
        "IOUSBHost.tbd",
        "GCSwitchPositionInput.h",
        "in_var.h",
        "_OSByteOrder.h",
        "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialAssertionRequest.h",
        "GKAchievement.h",
        "vm_map.h",
        "https://2001.dwlww.com/?channelNo=2001#/home",
        "IntentsUI.h",
        "regnodes.h",
        "GCEventViewController.h",
        "gssapi_generic.h",
        "WebGPU.tbd",
        "WKURLSchemeTask.h",
        "profile.h",
        "https://js.hs-banner.com/9251231.js",
        "https://www.hostgator.com/_next/static/runtime/main-a00d7acfcccd82e343f6.js",
        "WKError.h",
        "ASAccountAuthenticationModificationUpgradePasswordToStrongPasswordRequest.h",
        "ASAuthorizationCredential.h",
        "ASCredentialProviderExtensionContext.h",
        "GKChallenge.h",
        "GKPeerPickerController.h",
        "GKPlayer.h",
        "https://colohouse.com/wp-content/themes/Netrouting/assets/chosen/chosen.jquery.min.js",
        "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/pages/index.js",
        "IOBluetoothUI.h",
        "GCPressedStateInput.h",
        "ASAccountAuthenticationModificationRequest.h",
        "https://colohouse.com/wp-content/plugins/duracelltomi-google-tag-manager/js/gtm4wp-form-move-tracker.js?ver=1.13.1",
        "https://www.googletagmanager.com/gtag/js?id=G-K6536FHN4D&l=dataLayer&cx=c",
        "ASAuthorizationRequest.h",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/952389962/?random=1650405011982&cv=9&fst=1650405011982&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.leaseweb.com%2F&tiba=Leaseweb%20%7C%20Global%20Hosted%20Infrastructure%20(IaaS)%20and%20Cloud%20Solutions&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
        "uudmap.h",
        "machine_remote_time.h",
        "https://2001.habyc.com/static/css/app.88afcfd8.css",
        "ASAuthorization.h",
        "ASCredentialProviderViewController.h",
        "ASPasskeyCredentialRequestParameters.h",
        "ip_icmp.h",
        "ip.h",
        "tcp_fsm.h",
        "https://www.googletagmanager.com/gtag/js?id=UA-127455369-2",
        "https://www.allwest.com/wp-includes/js/wp-emoji-release.min.js?ver=5.9.3",
        "MCPeerID.h",
        "https://colohouse.com/wp-content/plugins/kingcomposer/assets/frontend/js/kingcomposer.min.js?ver=2.9.6",
        "GCControllerDirectionPad.h",
        "https://www.8098.app:21568/?agent=7691755704",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-common.js",
        "https://www.allwest.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.9",
        "module.modulemap",
        "GKMatchmaker.h",
        "atomic.h",
        "IOUSBHostIOSource.h",
        "https://app.ynsdty.cn/dist/js/app.base.js",
        "https://d3cxv97fi8q177.cloudfront.net/foundation-A122588-852f-4501-9972-9515a4f53da31.js",
        "https://cdn.optimizely.com/js/13477600374.js",
        "lz4_assembly_select.h",
        "https://bat.bing.com/bat.js",
        "stdint.h",
        "https://insurancerateusa.com/webpack-runtime-f014a3267add02a94afb.js",
        "https://code.tidio.co/leheh8smhmcxcnxkg3hzomgjoc3xdnfw.js",
        "udp_var.h",
        "NSAttributedString.h",
        "ASPublicKeyCredential.h",
        "https://sdk.51.la/event/js-sdk-event.min.js?u=JdoUNv3VSW0GHUpw",
        "https://constant-tech.biz/wp-content/plugins/super-socializer/js/front/social_login/general.js",
        "WKPreviewElementInfo.h",
        "GKScore.h",
        "GCControllerAxisInput.h",
        "capture_resize.js",
        "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationInput.h",
        "https://cdnjs.cloudflare.com/ajax/libs/tether/1.4.0/js/tether.min.js",
        "WKContentRuleList.h",
        "IOBluetoothPasskeyDisplay.h",
        "https://colohouse.com/wp-content/themes/Netrouting/js/vendor/modernizr-2.8.3-respond-1.4.2.min.js",
        "https://a.impactradius-tag.com/foundation-tags-SD382-d393-452e-9c15-ac1e4a6fc6fb1.js",
        "https://www.googletagmanager.com/gtag/js?id=G-SXR89SKRRS&l=dataLayer&cx=c",
        "https://eu.snapengage.com/chatjs/servicegetallavailableagents?w=e9219576-8f74-40b5-8b6f-bbad33f6ca57&t=1",
        "https://js.hs-analytics.net/analytics/1651860300000/6261317.js",
        "zlib.h",
        "ASAuthorizationProvider.h",
        "https://www.leaseweb.com/sites/default/files/css/css_47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU.css",
        "Trump Support campaign \u2022_\u2022 lantana-mgmt.washington.palantircloud.com \u2022 containers-reishi.palantirfedstart.com",
        "IOBluetoothServiceBrowserController.h",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-app.js",
        "https://www.choopa.com/commonimages/jquery-3.5.1.min.js",
        "WebKit.h",
        "WKNavigationAction.h",
        "GCExtendedGamepad.h",
        "OSByteOrder.h",
        "IOBluetooth.h",
        "WKUserScript.h",
        "https://connect.facebook.net/signals/config/399164440484826?v=2.9.57&r=stable",
        "https://www.googletagmanager.com/gtag/js?id=G-J9PCW0F6JV",
        "https://www.hostgator.com/_next/static/chunks/framework.4fc08a4a599cac03ddf5.js",
        "ASAuthorizationPlatformPublicKeyCredentialRegistration.h",
        "xfe-URL-insurancerateusa.com-stix2-2.1-export.json",
        "https://connect.facebook.net/signals/config/571256413046247?v=2.9.57&r=stable",
        "GameController.h",
        "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/pages/_app.js",
        "locate_plugin.h",
        "GCDevicePhysicalInput.h",
        "https://www.metronetinc.com/wp-includes/js/wp-emoji-release.min.js?ver=5.8.4",
        "https://app.convertful.com/Convertful.js?owner=7346",
        "https://connect.facebook.net/signals/config/3689470801106673?v=2.9.57&r=stable",
        "ASAuthorizationPlatformPublicKeyCredentialRegistrationRequest.h",
        "https://cdn.jsdelivr.net/emojione/2.2.7/lib/js/emojione.min.js",
        "GKLeaderboardSet.h",
        "ASSettingsHelper.h",
        "https://www.leaseweb.com/sites/default/files/js/js_kI_QwKJlaBz9CzQdENdUBFiEl4aehfjf4_-9taiwcCE.js",
        "https://www.metronetinc.com/wp-content/plugins/atomic-blocks/dist/assets/js/dismiss.js?ver=1625889728",
        "GCKeyboardInput.h",
        "machine_kpc.h",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-4fe9d5dd.js",
        "GCDirectionPadElement.h",
        "mg_raw.h",
        "pp_proto.h",
        "GCDevice.h",
        "igmp_var.h",
        "GKDialogController.h",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/646812378/?random=1650430003991&cv=9&fst=1650430003991&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=3&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.metronetinc.com%2F&tiba=MetroNet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%2C%20Streaming%20TV%2C%20and%20Phone&hn=www.googleadservic",
        "https://app.ynsdty.cn/dist/js/jquery.min.js",
        "AdID.tbd",
        "xfe-URL-vx-underground.org_Conti_-stix2-2.1-export.json",
        "vForce.h",
        "GCProductCategories.h",
        "OSTypes.h",
        "GCRacingWheel.h",
        "perl_inc_macro.h",
        "WKWebpagePreferences.h",
        "in_pcb.h",
        "UNDTypes.defs",
        "config.h",
        "ASCredentialIdentityStoreState.h",
        "https://connect.facebook.net/signals/plugins/identity.js?v=2.9.57",
        "https://serverhub.com/modules/system/assets/js/framework.js",
        "https://www.sunnetwork.com.sg/sun_21/js/bootstrap.min.js",
        "icmp6.h",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/982771034/?random=1650430003990&cv=9&fst=1650430003990&num=1&label=Remarketing%20-%20All%20Pages&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=3&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.metronetinc.com%2F&tiba=MetroNet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%2C%20Streaming%20TV%2C",
        "regcomp.h",
        "MapKit.tbd",
        "cpu.h",
        "https://script.hotjar.com/modules.0076bf93c385ddf0ff58.js",
        "WKBackForwardList.h",
        "https://hybrid-analysis.com/sample/9bf30967dfbf84d91ff4a1ca66dcd6c3383e679917e8b7aa4f659ff9f4e848d7/6426cf48655f94b6b303704c",
        "https://cryptobit.live/build/assets/app-CkRYqsKL.js \u2022 cryptobit.live \u2022 t.page \u2022 cdn.wallets.cryptobit.live",
        "GCDevicePhysicalInputStateDiff.h",
        "GCLinearInput.h",
        "GKLeaderboardEntry.h",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-vendor.js",
        "libkern.h",
        "AirPlayReceiver.tbd",
        "PWS:Win32/Ymacco.AA50 Win.Trojan.Generic-9959068-0\t SLF:MSIL/PSTAnomaly.A Win.Dropper.Shakblades-7614016-0\t#LowFI:VBExpensiveLoop Win.Packed.Barys-10031677-0\tTEL:Trojan:MSIL/AgentTesla.VPA!MTB Win.Trojan. Backdoor:MSIL/Remcos!MTB",
        "machine_machdep.h",
        "dosish.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialAssertionRequest.h",
        "IDS Detections: Win32/Enosch.A gtalk connectivity check | W32/MoonLight.worm User-Agent (HellSpawn)",
        "AppleUSBDescriptorParsing.h",
        "zaphod32_hash.h",
        "https://js.hs-banner.com/6261317.js",
        "xdr_subs.h",
        "WKDataDetectorTypes.h",
        "https://www.leaseweb.com/sites/default/files/js/js_6lTJ_m6ahwXas7Efbw8ZYEMSaecrGw8ilNALfvIPNUw.js",
        "mg_vtable.h",
        "GCDeviceHaptics.h",
        "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialProvider.h",
        "ASAuthorizationSingleSignOnCredential.h",
        "lz4.h",
        "util.h",
        "https://2001.dwlww.com/static/css/app.88afcfd8.css",
        "https://embed.tawk.to/5697c34527b9b5d40b66960f/default",
        "_endian.h",
        "GKVoiceChat.h",
        "IOBluetoothDeviceSelectorController.h",
        "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/_ssgManifest.js",
        "CredentialsCache2.h",
        "AuthenticationServicesCore.tbd",
        "GCKeyCodes.h",
        "GCController.h",
        "https://app.ynsdty.cn/dist/vendors/swiper/swiper.min.js",
        "kpi_ipfilter.h",
        "https://colohouse.com/wp-content/plugins/stop-user-enumeration/frontend/js/frontend.js?ver=1.3.31",
        "patchlevel.h",
        "GKEventListener.h",
        "https://www.icloud.com",
        "oalStaticBufferExtension.h",
        "GameKit.apinotes",
        "GKNotificationBanner.h",
        "metaconfig.h",
        "https://www.youtube.com/iframe_api",
        "AuthenticationServices.apinotes",
        "https://static.hotjar.com/c/hotjar-2836981.js?sv=5",
        "GCXboxGamepad.h",
        "ASAuthorizationPlatformPublicKeyCredentialAssertion.h",
        "types.h",
        "table.h",
        "arm64e-apple-macos.swiftinterface",
        "IOUSBHostPipe.h",
        "IOBluetoothPairingController.h",
        "ebcdic_tables.h",
        "ASAuthorizationPublicKeyCredentialDescriptor.h",
        "ipc_pthread_priority_types.h",
        "ASAuthorizationPlatformPublicKeyCredentialProvider.h",
        "in_systm.h",
        "https://js.stripe.com/v3",
        "reentr.h",
        "vecLibTypes.h",
        "UNDReply.defs",
        "hv_macro.h",
        "intrpvar.h",
        "https://www.googletagmanager.com/gtm.js?id=GTM-W3GQ4F",
        "ASAuthorizationSecurityKeyPublicKeyCredentialDescriptor.h",
        "reg_help.h",
        "WebKit.tbd",
        "https://fonts.googleapis.com/css?family=Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic&subset=greek%2Clatin%2Cvietnamese%2Clatin-ext%2Ccyrillic%2Ccyrillic-ext%2Cgreek-ext&ver=2.9.6",
        "_types.h",
        "https://2021.igem.org/Team:KU_Leuven/test2",
        "WKPreviewActionItemIdentifiers.h",
        "KerberosLogin.h",
        "https://app-lon04.marketo.com/js/forms2/js/forms2.min.js",
        "tcp_seq.h",
        "https://cdn.cookielaw.org/scripttemplates/6.32.0/otBannerSdk.js",
        "WKFindConfiguration.h",
        "GCDevicePhysicalInputState.h",
        "https://cdn.eu.pendo.io/agent/static/82b060a2-2cf8-472e-55d4-bd0833416335/pendo.js",
        "regexp.h",
        "WKWindowFeatures.h",
        "https://www.choopa.com/css/global.css?v=209",
        "GCRacingWheelInput.h",
        "OpenAL.tbd",
        "igmp.h",
        "ASWebAuthenticationSessionRequest.h",
        "GCGamepad.h",
        "feature.h",
        "WKPreferences.h",
        "MCNearbyServiceBrowser.h",
        "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap",
        "https://sdk.51.la/js-sdk-pro.min.js",
        "https://colohouse.com/wp-content/plugins/cookie-law-info/public/js/cookie-law-info-public.js?ver=2.0.4",
        "https://www.hostgator.com/_next/static/runtime/polyfills-31f3ad766330c3157d95.js",
        "kdp_callout.h",
        "https://hybrid-analysis.com/sample/e126ff94aac3340dc05a27f062c4267cbfeaa998248bef0e72f000bba711aa76/62e6fb475edc950b894aa7b0",
        "MCBrowserViewController.h",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-vendors.js",
        "inline.h",
        "GCControllerTouchpad.h",
        "https://2001.habyc.com/static/js/chunk-7d5d3bac.efb700c7.js",
        "ASAuthorizationPublicKeyCredentialParameters.h",
        "TargetConditionals.h",
        "arm_features.inc",
        "https://www.leaseweb.com/sites/default/files/js/js_kwxcSFD2Y0_BPtdJClYUy5H8THI_5EycUmIgIGWaGYs.js",
        "https://s.adroll.com/j/sendrolling.js",
        "INUIAddVoiceShortcutButton.h",
        "bootp.h",
        "https://www.sunnetwork.com.sg/sun_21/js/imagesloaded.pkgd.min.js",
        "xfe-URL-Hostsailor.com-stix2-2.1-export.json",
        "https://bid.g.doubleclick.net/xbbe/pixel?d=KAE",
        "https://www.metronetinc.com/wp-content/plugins/pixel-caffeine/build/frontend.js?ver=2.3.3",
        "ASPasskeyCredentialRequest.h",
        "https://www.googletagmanager.com/gtm.js?id=GTM-NXS92NS",
        "https://www.allwest.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2",
        "https://app.ynsdty.cn/dist/vendors/core-js/core.js",
        "https://11057407.fls.doubleclick.net/activityi;src=11057407;type=count0;cat=sitev0;ord=1;num=5426507653008;gtm=2wg4i1;auiddc=1460077727.1650429649;~oref=https%3A%2F%2Fwww.metronetinc.com%2F",
        "IOUSBHostControllerInterfaceHelpers.h",
        "copyio.h",
        "GCAxisInput.h",
        "malloc_ctl.h",
        "opnames.h",
        "GKSavedGameListener.h",
        "IOUSBHostCIPortStateMachine.h",
        "ASAuthorizationPublicKeyCredentialRegistration.h",
        "sel.h",
        "https://2001.dwlww.com/static/css/chunk-vendors.6a41b67e.css",
        "https://ssl.google-analytics.com/ga.js",
        "GKLeaderboard.h",
        "https://a.impactradius-tag.com/mediasource-A122588-852f-4501-9972-9515a4f53da31.js",
        "https://insurancerateusa.com/framework-19eddc0d879a49dfe606.js",
        "hv_func.h",
        "IOUSBHostObject.h",
        "https://connect.facebook.net/signals/config/393095817498804?v=2.9.57&r=stable",
        "https://colohouse.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/981889198/?random=1650488340057&cv=9&fst=1650488340057&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2oa4i1&sendb=1&ig=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fwww.allwest.com%2F&tiba=All%20West%20Communications%20-%20telecommunication%20company&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
        "tree.h",
        "GKCloudPlayer.h",
        "GKPublicProtocols.h",
        "ASExtensionErrors.h",
        "KUNCUserNotifications.h",
        "asm_help.h",
        "keywords.h",
        "WKScriptMessageHandlerWithReply.h",
        "vm_far.h",
        "vDSP.h",
        "https://hostsailor.com/wp-content/cache/minify/cc4b1.js",
        "GCSyntheticDeviceKeys.h",
        "GKVoiceChatService.h",
        "https://2001.habyc.com/js/config.js",
        "io.h",
        "WKNavigationDelegate.h",
        "https://certify-js.alexametrics.com/atrk.js",
        "https://connect.facebook.net/signals/config/438248060937995?v=2.9.57&r=stable",
        "CredentialsCache.h",
        "https://stats.wp.com/e-202216.js",
        "MultipeerConnectivity.apinotes",
        "ASPasswordCredential.h",
        "GCGearShifterElement.h",
        "https://www.data102.com/?wordfence_lh=1&hid=2D6A812A7EB197E80D5A3978A6386BE4&r=0.5029022326538093",
        "https://storage.googleapis.com/snapengage-eu/js/e9219576-8f74-40b5-8b6f-bbad33f6ca57.js",
        "https://www.xing.com/companies/sec-researchgmbh",
        "https://www.allwest.com/wp-content/themes/allwestcommunications/js/custom.js?ver=5.9.3",
        "WKSecurityOrigin.h",
        "vmparam.h",
        "GCDirectionalGamepad.h",
        "ASAccountAuthenticationModificationExtensionContext.h",
        "https://vars.hotjar.com/box-4924254a9ce4dc9b959b6e4a9b662d60.html",
        "UNDTypes.h",
        "ASCredentialIdentityStore.h",
        "MultipeerConnectivity.h",
        "https://constant-tech.biz/wp-includes/js/jquery/jquery.min.js",
        "l1_char_class_tab.h",
        "WKScriptMessageHandler.h",
        "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/apbct-public--functions.min.js?ver=5.173",
        "_mcontext.h",
        "GKSavedGame.h",
        "page error",
        "WKFrameInfo.h",
        "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/apbct-public.min.js?ver=5.173",
        "LDAP.tbd",
        "ASAuthorizationPublicKeyCredentialAssertion.h",
        "ASCredentialRequest.h",
        "INUIAddVoiceShortcutViewController.h",
        "WebKit.apinotes",
        "GKBasePlayer.h",
        "Bluetooth.h",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-32507910.js",
        "in_private.h",
        "math.h",
        "al.h",
        "pp.h",
        "WKScriptMessage.h",
        "https://www.leaseweb.com/sites/default/files/js/js_wcSNEXVJ4Xjhkf8qhMguEPZJTDTMNmPaJM-YWdAOhQE.js",
        "https://app-ab02.marketo.com/js/forms2/css/forms2-theme-simple.css",
        "cpu_capabilities_public.h",
        "WKURLSchemeHandler.h",
        "WKFindResult.h",
        "EXTERN.h",
        "https://2001.habyc.com/?channelNo=2001#/home",
        "https://colohouse.com/wp-content/plugins/contact-form-7/includes/js/index.js?ver=5.4.2",
        "https://www.data102.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp",
        "GCExtern.h",
        "trap.h",
        "https://chatting.page/kv6vcosd7tmhsetmarsoawzaglejnny4",
        "https://app.ynsdty.cn/dist/vendors/bootstrap/js/bootstrap.min.js",
        "ASAuthorizationPublicKeyCredentialRegistrationRequest.h",
        "GCKeyNames.h",
        "vutil.h",
        "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/_buildManifest.js",
        "ipc_types.h",
        "https://constant-tech.biz/wp-content/themes/Constant-theme/js/ajax-filter-posts.js",
        "https://www.leaseweb.com/sites/default/files/js/js_zoLA7TweXam0kYiqJrXepqBWmyDoP1sLSlHoZcveFnY.js",
        "https://www.gstatic.com/recaptcha/releases/QENb_qRrX0-mQMyENQjD6Fuj/recaptcha__en.js",
        "https://www.googletagmanager.com/gtag/js?id=AW-CONVERSION_ID",
        "https://www.metronetinc.com/wp-content/plugins/lt-ajax-mn-channelguide/lt-ajax-mn-channelguide.js?ver=1.1",
        "tcp_private.h",
        "com_err.h",
        "IOUSBHostCIDeviceStateMachine.h",
        "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/cleantalk-modal.min.js?ver=5.173",
        "https://www.googletagmanager.com/gtm.js?id=GTM-NWPHSS",
        "https://use.fortawesome.com/03018d9d.js",
        "https://j.clarity.ms/s/0.6.34/clarity.js",
        "ASAuthorizationPlatformPublicKeyCredentialDescriptor.h",
        "xfe-URL-sys95.com-stix2-2.1-export.json",
        "xfe-URL-j.o-w-o.info-stix2-2.1-export.json",
        "https://colohouse.com/wp-content/plugins/wp-schema-pro/admin/assets/min-js/frontend.min.js?ver=2.7.2",
        "WKUserContentController.h",
        "GCMicroGamepadSnapshot.h",
        "GKDefines.h",
        "xfe-URL-metronetinc.com-stix2-2.1-export.json",
        "icmp_var.h",
        "perl.h",
        "ASWebAuthenticationSessionWebBrowserSessionManager.h",
        "pycore_condvar.h",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-main.js",
        "https://s.adroll.com/j/exp/DUKHAKVYIJASHDUBG4V7RE/index.js",
        "GCGamepadSnapshot.h",
        "GCInputNames.h",
        "ASAuthorizationOpenIDRequest.h",
        "https://maps.googleapis.com/maps/api/js?v=3.exp&key=AIzaSyDR76rjQL_2raonHiZ6ZrPqJr-FPb7pGH0",
        "GKAchievementViewController.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialRegistration.h",
        "WKNavigation.h",
        "limits.h",
        "xfe-URL-Cloudfront.net-stix2-2.1-export.json",
        "ASFoundation.h",
        "ASAuthorizationPlatformPublicKeyCredentialAssertionRequest.h",
        "https://app.uizard.io/fonts.css?cache=2022-04-29-12-55-57",
        "GameController.tbd",
        "https://constant-tech.biz/wp-content/plugins/email-subscribers/lite/public/js/email-subscribers-public.js",
        "https://bat.bing.com/p/action/5797759.js",
        "Apple Store verified drop down breach  \u2018Apple took a screenshot of pages\u201d",
        "cv.h",
        "IOUSBHostControllerInterface.h",
        "https://www.allwest.com/wp-content/themes/allwestcommunications/js/jquery.main.js?ver=5.9.3",
        "WebDriver.tbd",
        "ASAccountAuthenticationModificationReplacePasswordWithSignInWithAppleRequest.h",
        "https://app.ynsdty.cn/dist/js/longbow.slidercaptcha.js",
        "xfe-URL-2001.habyc.com-stix2-2.1-export.json",
        "https://public.profitwell.com/js/profitwell.js?auth=80939adc88898a29e714f6dd3d25e8ba",
        "GCAxisElement.h",
        "https://www.allwest.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
        "gv.h"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "Turla Group, FIN7, APT34, APT28, DragonForce Malaysia Hacker Group, Indonesia Islamic Warriors Counc"
          ],
          "malware_families": [
            "Xe",
            "Virus:win32/lywer",
            "Reduceright",
            "Agenttesla",
            "Buttons};kb(convertedmessage);break;case\"/sys\":var",
            "Outubro",
            "Qe",
            "Worm:win32/lightmoon.h",
            "Trackingclient",
            "Alf:ransom:win32/babax.sg!mtb",
            "Tente",
            "Ajax",
            "Win.trojan.dialer-266",
            "Kiitos",
            "Internet",
            "Srpanj",
            "Trojandropper:win32/muldrop.v!mtb",
            "Hj",
            "Anda",
            "Vd",
            "Virus:dos/hellspawn",
            "Trojanspy:win32/nivdort",
            "Rabu",
            "Alf:jasyp:trojan:win32/ircbot!atmn",
            "Osreturn",
            "Pws:win32/vb.cu",
            "Ver",
            "Acum",
            "Vasaris",
            "Trojanproxy:win32/malynfits",
            "Osatomic",
            "Backdoor:msil/remcos",
            "#lowfi:vbexpensiveloop",
            "Vui",
            "Tel:trojan:msil/agenttesla.vpa!mtb",
            "Takk"
          ],
          "industries": [],
          "unique_indicators": 125384
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/zloirock.ru",
    "whois": "http://whois.domaintools.com/zloirock.ru",
    "domain": "zloirock.ru",
    "hostname": "ls.zloirock.ru"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 50,
  "pulses": [
    {
      "id": "698904c316bc7710b967d01d",
      "name": "Rare Tier 1 Persistence - Critical \"Patched\", Non Patched Vulnerabilities Remain bypassing Lockdown Mode",
      "description": "Researcher Note (Feb 08, 2026):\nThis artifact represents a sophisticated Cross-Protocol Mesh. Observations confirm that the Cymt/Nemucod wrapper is being utilized as a delivery vehicle for a Firmware-resident ELF binary (Mirai variant).\nThe persistence is notable for its ability to survive Full DFU Restores and Faraday-isolated states, likely due to JTAG-level interaction with the Power Management IC (Chip 4799). This is not a standard opportunistic infection; it is a targeted provisioning event leveraging IDMSA (Identity Management) bridges and Verizon/Akamai Edge infrastructure.\nThe integration with CalendarKit and Maps for geofenced execution suggests a highly coordinated surveillance objective. Forensic analysts should pay specific attention to the sizeofrawdata_antidbg anomalies, which indicate a focus on bypassing Apple Lockdown Mode and Secure Enclave. \nresearcher credit: msudoSOS",
      "modified": "2026-03-27T09:05:26.285000",
      "created": "2026-02-08T21:48:49.147000",
      "tags": [
        "#supportsitewebsiteabuse #rootcertificatefailure #cryptographicf"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 909,
        "URL": 1779,
        "CVE": 126,
        "domain": 659,
        "email": 23,
        "JA3": 1,
        "FileHash-MD5": 230,
        "FileHash-SHA1": 227,
        "FileHash-SHA256": 934,
        "CIDR": 13
      },
      "indicator_count": 4901,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 54,
      "modified_text": "24 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68c954a80675ccc89b0e9b63",
      "name": "Trump #45470 | Palantir container | virus:DOS/Hellspawn + ioS (compromised)",
      "description": "Overt. Trump support campaign text message from #45470. Malicious. Received on a victims hyper compromised iPhone. Attempts to or did take CnC of device. Stutters device, changed App Store , has delete service, device sweep,  shuts down service , halts all pages, denial of service, throttles service, steals\npasswords,  bots , I don\u2019t know if device can be refurbished or research purposes - Palantir DC DGA domains - Trump. Multiple IoC\u2019s , malware with code overlap, it appears to be from a legitimate text for updates #. Visibly affected all aspects of device and software. Commands device shut down. \n[OTX populated: Failed to retrieve suggested indicator for beta-ui, according to the latest results from the Welsh Government's Office for National Statistics (ONS) and the National Data Centre (NDS))",
      "modified": "2025-10-16T12:03:14.279000",
      "created": "2025-09-16T12:14:32.327000",
      "tags": [
        "ttl value",
        "extraction",
        "data upload",
        "failed",
        "extra data",
        "include review",
        "exclude sugges",
        "stop",
        "line",
        "path",
        "polyline",
        "getprocaddress",
        "circle",
        "span",
        "ck id",
        "mitre att",
        "ck matrix",
        "null",
        "error",
        "open",
        "spinner",
        "title",
        "code",
        "iframe",
        "window",
        "void",
        "infinity",
        "crypto",
        "footer",
        "generator",
        "general",
        "format",
        "click",
        "strings",
        "meta",
        "install",
        "encoder",
        "learn",
        "command",
        "name tactics",
        "suspicious",
        "informative",
        "spawns",
        "evasion att",
        "t1480 execution",
        "file defense",
        "adversaries",
        "calls",
        "reads",
        "defense evasion",
        "model",
        "server",
        "registrar abuse",
        "ascio",
        "contact phone",
        "admin city",
        "admin country",
        "admin postal",
        "dnssec",
        "http",
        "ip address",
        "passive dns",
        "related nids",
        "urls",
        "files location",
        "united",
        "flag united",
        "a domains",
        "search",
        "unknown aaaa",
        "certificate",
        "yara detections",
        "av detections",
        "ids detections",
        "alerts",
        "entries elf",
        "filehash",
        "name servers",
        "servers",
        "moved",
        "script script",
        "aaaa",
        "unknown ns",
        "domain add",
        "formbook cnc",
        "checkin",
        "lowfi",
        "mtb jun",
        "github pages",
        "twitter",
        "accept",
        "cryptobit",
        "extra",
        "referen data",
        "trojanproxy",
        "dynamicloader",
        "high",
        "write c",
        "medium",
        "intel",
        "ms windows",
        "entries",
        "pe32",
        "explorer",
        "worm",
        "write",
        "next",
        "trojan",
        "hellspawn",
        "md5 add",
        "malware",
        "data",
        "included iocs",
        "script urls",
        "script domains",
        "gmt content",
        "cash amtincart",
        "expirestue",
        "domain related",
        "sea x",
        "accept encoding",
        "request id",
        "body doctype",
        "apache",
        "encrypt",
        "skynet",
        "third eye tv",
        "calling",
        "delete app",
        "potus",
        "mtb aug",
        "backdoor",
        "gmt cache",
        "sameorigin",
        "443 ma2592000",
        "ipv4 add",
        "utilads",
        "trojandropper",
        "mtb sep",
        "win32upatre aug",
        "yara rule",
        "as15169",
        "guard",
        "smartassembly",
        "associated urls",
        "date checked",
        "url hostname",
        "server response",
        "domain",
        "url analysis",
        "files",
        "date",
        "delete service",
        "45470",
        "text",
        "hybrid",
        "present sep",
        "body",
        "fastly error",
        "please",
        "xor xor",
        "sha256 add",
        "analysis date",
        "file score",
        "detections alf",
        "june",
        "delphi",
        "attempts",
        "yara",
        "high security",
        "file type",
        "pe packer",
        "ransom"
      ],
      "references": [
        "skynet-dev.tcxn.net tcxn.net Registrar Ascio Technologies, Inc - connection to cloud proxy",
        "TrojanProxy:Win32/Malynfits CodeOverlap TrojanSpy:Win32/Nivdort CodeOverlap virus:Win32/Lywer CodeOverlap",
        "https://cryptobit.live/build/assets/app-CkRYqsKL.js \u2022 cryptobit.live \u2022 t.page \u2022 cdn.wallets.cryptobit.live",
        "Trump Support campaign \u2022_\u2022 lantana-mgmt.washington.palantircloud.com \u2022 containers-reishi.palantirfedstart.com",
        "Virus:DOS/Hellspawn 192.168.122.49 10/16/25\t\u2022  IPv4 142.251.9.105",
        "IDS Detections: Win32/Enosch.A gtalk connectivity check | W32/MoonLight.worm User-Agent (HellSpawn)",
        "PWS:Win32/Ymacco.AA50 Win.Trojan.Generic-9959068-0\t SLF:MSIL/PSTAnomaly.A Win.Dropper.Shakblades-7614016-0\t#LowFI:VBExpensiveLoop Win.Packed.Barys-10031677-0\tTEL:Trojan:MSIL/AgentTesla.VPA!MTB Win.Trojan. Backdoor:MSIL/Remcos!MTB",
        "hasownproperty.call \u2022 fireeye.grhd.",
        "Apple Store verified drop down breach  \u2018Apple took a screenshot of pages\u201d"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy:Win32/Nivdort",
          "display_name": "TrojanSpy:Win32/Nivdort",
          "target": "/malware/TrojanSpy:Win32/Nivdort"
        },
        {
          "id": "TrojanProxy:Win32/Malynfits",
          "display_name": "TrojanProxy:Win32/Malynfits",
          "target": "/malware/TrojanProxy:Win32/Malynfits"
        },
        {
          "id": "Virus:Win32/Lywer",
          "display_name": "Virus:Win32/Lywer",
          "target": "/malware/Virus:Win32/Lywer"
        },
        {
          "id": "Worm:Win32/Lightmoon.H",
          "display_name": "Worm:Win32/Lightmoon.H",
          "target": "/malware/Worm:Win32/Lightmoon.H"
        },
        {
          "id": "Virus:DOS/Hellspawn",
          "display_name": "Virus:DOS/Hellspawn",
          "target": "/malware/Virus:DOS/Hellspawn"
        },
        {
          "id": "Win.Trojan.Dialer-266",
          "display_name": "Win.Trojan.Dialer-266",
          "target": null
        },
        {
          "id": "AgentTesla",
          "display_name": "AgentTesla",
          "target": null
        },
        {
          "id": "Backdoor:MSIL/Remcos",
          "display_name": "Backdoor:MSIL/Remcos",
          "target": "/malware/Backdoor:MSIL/Remcos"
        },
        {
          "id": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
          "display_name": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
          "target": null
        },
        {
          "id": "Trojandropper:Win32/Muldrop.V!MTB",
          "display_name": "Trojandropper:Win32/Muldrop.V!MTB",
          "target": "/malware/Trojandropper:Win32/Muldrop.V!MTB"
        },
        {
          "id": "#LowFI:VBExpensiveLoop",
          "display_name": "#LowFI:VBExpensiveLoop",
          "target": null
        },
        {
          "id": "TEL:Trojan:MSIL/AgentTesla.VPA!MTB",
          "display_name": "TEL:Trojan:MSIL/AgentTesla.VPA!MTB",
          "target": null
        },
        {
          "id": "PWS:Win32/VB.CU",
          "display_name": "PWS:Win32/VB.CU",
          "target": "/malware/PWS:Win32/VB.CU"
        },
        {
          "id": "ALF:Ransom:Win32/Babax.SG!MTB",
          "display_name": "ALF:Ransom:Win32/Babax.SG!MTB",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1007",
          "name": "System Service Discovery",
          "display_name": "T1007 - System Service Discovery"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1102",
          "name": "Web Service",
          "display_name": "T1102 - Web Service"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1489",
          "name": "Service Stop",
          "display_name": "T1489 - Service Stop"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1555",
          "name": "Credentials from Password Stores",
          "display_name": "T1555 - Credentials from Password Stores"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1614",
          "name": "System Location Discovery",
          "display_name": "T1614 - System Location Discovery"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 690,
        "URL": 1479,
        "domain": 476,
        "FileHash-MD5": 526,
        "FileHash-SHA1": 505,
        "FileHash-SHA256": 1509,
        "email": 6
      },
      "indicator_count": 5191,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "186 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68abf75bf3b03b94a6762409",
      "name": "(Repost) How to connect listeners to e.intercom | serverhub.com eonix.net",
      "description": "",
      "modified": "2025-08-25T05:40:43.552000",
      "created": "2025-08-25T05:40:43.552000",
      "tags": [
        "context",
        "error",
        "ajaxupdate",
        "request",
        "requestdata",
        "name",
        "xoctoberassets",
        "datarequest",
        "typesubmit",
        "typetext",
        "click",
        "function",
        "typeof c",
        "bootstrap",
        "javascript",
        "azaz",
        "popover",
        "typeof f",
        "typeof g",
        "typeof h",
        "vui",
        "anda",
        "tente",
        "outubro",
        "trackingclient",
        "srpanj",
        "rabu",
        "vasaris",
        "image",
        "typeof atrkopts",
        "800px",
        "40px",
        "i18n",
        "blockedemail",
        "typeof i18n",
        "hubspot",
        "captcha",
        "date",
        "please",
        "april",
        "august",
        "close",
        "february",
        "june",
        "form",
        "klik",
        "download",
        "window",
        "this",
        "next",
        "null",
        "blank",
        "este",
        "anna",
        "rserver",
        "mais",
        "void",
        "object",
        "typeerror",
        "array",
        "symbol",
        "bound",
        "typeof window",
        "typeof t",
        "invalid path",
        "unknown method",
        "phonenumber",
        "ninja",
        "typeof e",
        "edge",
        "dataname",
        "intercom",
        "typeof symbol",
        "apple",
        "webkiti",
        "criosi",
        "trident"
      ],
      "references": [
        "xfe-URL-Eonix.net-stix2-2.1-export.json",
        "xfe-URL-Serverhub.com-stix2-2.1-export.json",
        "xfe-URL-Enom.com-stix2-2.1-export 2.json",
        "https://widget.intercom.io/widget/rbc8ok9w",
        "https://js.hscollectedforms.net/collectedforms.js",
        "https://js.hsleadflows.net/leadflows.js",
        "https://d31qbv1cthcecs.cloudfront.net/atrk.js",
        "https://serverhub.com/combine/a059fe7a562c0b582328162f0ee69fda-1426025688",
        "https://serverhub.com/modules/system/assets/js/framework.js",
        "https://js.hs-scripts.com/3844463.js",
        "xfe-URL-Cloudfront.net-stix2-2.1-export.json",
        "xfe-URL-Intercom.io-stix2-2.1-export.json"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Vui",
          "display_name": "Vui",
          "target": null
        },
        {
          "id": "Outubro",
          "display_name": "Outubro",
          "target": null
        },
        {
          "id": "Tente",
          "display_name": "Tente",
          "target": null
        },
        {
          "id": "Anda",
          "display_name": "Anda",
          "target": null
        },
        {
          "id": "Vasaris",
          "display_name": "Vasaris",
          "target": null
        },
        {
          "id": "Rabu",
          "display_name": "Rabu",
          "target": null
        },
        {
          "id": "Srpanj",
          "display_name": "Srpanj",
          "target": null
        },
        {
          "id": "TrackingClient",
          "display_name": "TrackingClient",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "62719a4dec6d0aa4631b9b2f",
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5708,
        "hostname": 1541,
        "FileHash-SHA256": 876,
        "domain": 915,
        "CVE": 1,
        "FileHash-MD5": 1
      },
      "indicator_count": 9042,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "238 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "67f33233092ab19b74879403",
      "name": "MacOS M2 Chip Infiltration: Game Center & XBOX Pod Game & Chat Server",
      "description": "pulse explores a variety of files, objects, and functions that could be associated with different system components, libraries, and protocols. It highlights a wide range of potential vulnerabilities that may exist in software related to system functions, APIs, data handling, and device interactions, including issues in devices like game controllers, HID devices, and platform-specific services (such as Apple and Android). The pulse references several components across different platforms (macOS, iOS, ARM architectures, and others), with a focus on low-level code, encryption libraries, system utilities, and network protocols like TCP, IP, and Bluetooth. The identified vulnerabilities could involve buffer overflows, deprecated functions, improper memory handling, and potential exploit vectors related to system security, performance, and integrity.",
      "modified": "2025-05-07T02:03:20.735000",
      "created": "2025-04-07T02:02:27.322000",
      "tags": [
        "helper macro",
        "param",
        "param inccache",
        "kerberos",
        "ccache",
        "api function",
        "ccapi",
        "api version",
        "param ioccache",
        "ccacheserver",
        "win32",
        "null",
        "code",
        "win64",
        "error",
        "union",
        "ccapideprecated",
        "ccacheapi",
        "ccapiv2h",
        "apple",
        "export",
        "united",
        "ccache api",
        "cplusplus",
        "x8664",
        "typedef",
        "patheq",
        "none",
        "popen",
        "terminate",
        "false",
        "winenv",
        "winexe",
        "frozen",
        "winservice",
        "python",
        "posixthreads",
        "pyhavecondvar",
        "ntthreads",
        "vista",
        "pyemulatedwincv",
        "ntddivista",
        "semaphore",
        "pycondt",
        "win7",
        "pybuildcore",
        "fall",
        "copyright",
        "technology",
        "all rights",
        "reserved",
        "america",
        "government",
        "within that",
        "klprincipal",
        "klloginoptions",
        "inpassword",
        "klboolean",
        "klindex inindex",
        "login",
        "klstatus",
        "kerberos login",
        "inst",
        "regexp",
        "typeof e",
        "function",
        "typeof t",
        "typeof o",
        "width",
        "typeof",
        "pseudo",
        "body",
        "sticky",
        "date",
        "class",
        "this",
        "void",
        "accept",
        "span",
        "krb5callconv",
        "apoptsreserved",
        "tktflgreserved",
        "kdcoptreserved",
        "krb5data",
        "eblock",
        "krb5address",
        "krb5keyblock",
        "service",
        "realm",
        "format",
        "general",
        "internal",
        "entropy",
        "mask",
        "mcpeerid",
        "mcsession",
        "property",
        "protocol",
        "create",
        "nsuinteger",
        "notifies",
        "mcsession api",
        "interface",
        "bonjour",
        "ascii lowercase",
        "abc company",
        "section",
        "bonjour txt",
        "mcextern",
        "attribute",
        "mcextern extern",
        "mcexternweak",
        "nsenum",
        "nsinteger",
        "mcerrorcode",
        "mcerrorunknown",
        "mcerrortimedout",
        "bonjour apis",
        "stop",
        "peer",
        "example",
        "tags",
        "session",
        "nsprogress",
        "nserror",
        "nsstring",
        "nsurl",
        "nsarray",
        "note",
        "ui element",
        "utf8 encoding",
        "nscopying",
        "nsdictionary",
        "webpackrequire",
        "webpackexports",
        "object",
        "adobe systems",
        "adobe",
        "incorporated",
        "dissemination",
        "touchmove",
        "window",
        "launch",
        "close",
        "core",
        "webview",
        "nwebpackrequire",
        "arraybuffer",
        "name",
        "typedarray",
        "prototype",
        "string",
        "number",
        "nvar",
        "meta",
        "infinity",
        "generator",
        "zero",
        "epsilon",
        "observer",
        "android",
        "freeze",
        "trim",
        "canvas",
        "simple",
        "bind",
        "fast",
        "next",
        "patch",
        "rest",
        "middle",
        "find",
        "enumerate",
        "facebook",
        "executor",
        "apiunavailable",
        "gamecontroller",
        "gcbuttoninput",
        "gcswitchinput",
        "nsobject",
        "apiavailable",
        "hid device",
        "cfstr",
        "iohiddeviceref",
        "boolean value",
        "c iohidmanager",
        "iohidmanager",
        "c iohiddevice",
        "issequential",
        "bool sequential",
        "bool canwrap",
        "nsset",
        "nsunavailable",
        "gcswitchelement",
        "bool",
        "share button",
        "xbox controller",
        "xbox elite",
        "xbox series",
        "gcxboxgamepad",
        "gcpoint2",
        "gcpoint2make",
        "gcpoint2 p",
        "cfinline bool",
        "gcpoint2equal",
        "gcpoint2 point1",
        "gcpoint2 point2",
        "gcrelativeinput",
        "isanalog",
        "bool analog",
        "hasinclude",
        "gcaxis2dinput",
        "gcpoint2 value",
        "gcaxiselement",
        "certain",
        "gcaxisinput",
        "gcbuttonelement",
        "gccontroller",
        "nsnotification",
        "chhapticengine",
        "gcmicrogamepad",
        "input",
        "menu button",
        "gcdevicelight",
        "gccolor",
        "x axis",
        "xvalue",
        "developers",
        "functionality",
        "options button",
        "sf symbols",
        "elements",
        "gcdevice",
        "gctouchstate",
        "gctouchstateup",
        "apideprecated",
        "gckeyboard",
        "gcmouse",
        "nsswiftname",
        "gcdevicebattery",
        "battery level",
        "direction pad",
        "directionapad",
        "thumbstick",
        "gcdevicecursor",
        "a controller",
        "gccolor color",
        "gcinputbuttona",
        "gcinputbuttonb",
        "button b",
        "check",
        "a element",
        "c nil",
        "nsenumerator",
        "siri remote",
        "equivalent",
        "down",
        "left",
        "right",
        "kindof",
        "handle button",
        "c device",
        "immediate input",
        "dualsense",
        "positional",
        "sony dualsense",
        "gcmotion",
        "dualshock",
        "uievent",
        "controllers",
        "uikit user",
        "uiview",
        "method",
        "nsdata",
        "axes",
        "nsdata source",
        "return",
        "nullable",
        "nsdata object",
        "button",
        "shoulder",
        "extended",
        "gamepad profile",
        "nsdata api",
        "gcgamepad",
        "sizeof",
        "standard",
        "gckeyboardinput",
        "keyboard",
        "nsstring const",
        "controller",
        "back buttons",
        "game controller",
        "back",
        "keypad",
        "delete",
        "insert",
        "home",
        "right arrow",
        "left arrow",
        "down arrow",
        "up arrow",
        "korean",
        "backspace",
        "alongside",
        "gckeyuparrow",
        "gckeycode const",
        "lang1",
        "gclinearinput",
        "gcquaternion",
        "gcacceleration",
        "y axis",
        "z axis",
        "gcmouse mouse",
        "gcmouse class",
        "mice",
        "gcmouseinput",
        "mouse profile",
        "scroll",
        "nsdata instance",
        "a alias",
        "press",
        "micro profile",
        "siri remotes",
        "b button",
        "a gcinput",
        "button a",
        "nsoptions",
        "examining",
        "c sfsymbolsname",
        "apple tv",
        "remote",
        "control center",
        "a set",
        "game",
        "gcracingwheel",
        "gcbundlewithpid",
        "gcinputbuttonx",
        "gcinputbuttony",
        "gcinputshifter",
        "gckeya",
        "gckeyb",
        "gckeybackslash",
        "rawvalue",
        "apple swift",
        "o librarylevel",
        "swift import",
        "element",
        "indices",
        "iterator",
        "subsequence",
        "kerberoscomerr",
        "const",
        "permission",
        "mit software",
        "suitability",
        "athena",
        "openvision",
        "gssdllimp",
        "gssapigenerich",
        "this software",
        "purpose",
        "disclaims all",
        "warranties with",
        "regard to",
        "constraint",
        "kerberosprofile",
        "krb5profileh",
        "const names",
        "newvalue",
        "1429577728l",
        "gnuc",
        "mach",
        "omuint32",
        "gssapikrb5h",
        "form",
        "uid form",
        "client function",
        "asrep",
        "including",
        "preauth",
        "db entry",
        "free",
        "pointer",
        "rock",
        "neither",
        "direct",
        "damage",
        "minorstatus",
        "gssbuffert",
        "gssctxidt",
        "gssoid",
        "gssnamet",
        "gsscredidt",
        "gssoidset",
        "gssapi",
        "first",
        "alcapi",
        "alcapientry",
        "alcboolean",
        "targetosmac",
        "alcdevice",
        "alcenum param",
        "alalch",
        "alcchar",
        "alcsizei",
        "capture",
        "but not",
        "limited",
        "openal cross",
        "apple computer",
        "redistribution",
        "is provided",
        "type",
        "alvoid",
        "alint",
        "openal",
        "aluint sid",
        "alenum",
        "alint value",
        "aluint property",
        "alvoid nonnull",
        "alfloat",
        "write",
        "openalopenalh",
        "umbrella header",
        "alenum param",
        "alapi",
        "aluint bid",
        "alsizei",
        "alfloat value",
        "alapientry",
        "aluint",
        "verify",
        "play",
        "speed",
        "bits",
        "albuffer3i",
        "albufferdata",
        "albufferf",
        "albufferfv",
        "albufferi",
        "albufferiv",
        "aldistancemodel",
        "aldopplerfactor",
        "algetbooleanv",
        "algetbuffer3f",
        "iousbhostdevice",
        "iousbhostobject",
        "iousbhostpipe",
        "iousbhoststream",
        "iousbhost",
        "brief",
        "usb host",
        "bool yes",
        "bool no",
        "advance",
        "iousbhostfamily",
        "kernel",
        "ioreturn status",
        "nsnumber",
        "ioreturn error",
        "usb device",
        "select",
        "commands",
        "enqueue",
        "nsmutabledata",
        "field",
        "enum",
        "options",
        "retrieve",
        "iosource",
        "current address",
        "bos descriptor",
        "extract",
        "a descriptor",
        "license",
        "io request",
        "abort",
        "discussion",
        "stream",
        "please",
        "swift api",
        "iousbbitrange",
        "iousbbitrange64",
        "iousbbit",
        "client",
        "usb controller",
        "usb descriptor",
        "unknown",
        "critical",
        "refer",
        "link",
        "send",
        "same",
        "common ui",
        "bluetooth",
        "service browser",
        "option",
        "1001",
        "cfstringref",
        "deprecated",
        "macos",
        "returns",
        "abstract",
        "nswindow",
        "creates",
        "mac os",
        "uuids",
        "uuid",
        "sdp service",
        "nsimage",
        "nsview",
        "mpasskeystring",
        "nsmutablearray",
        "uuid array",
        "ioreturn",
        "runmodal",
        "group",
        "command",
        "byte",
        "masks",
        "pduid",
        "l2cap",
        "range",
        "opcode",
        "packet",
        "major",
        "local",
        "profiles",
        "iobluetooth",
        "framework",
        "support",
        "host controller",
        "rfcomm",
        "minor class",
        "pseudoclass",
        "specific device",
        "headset",
        "peripheral",
        "desktop",
        "glasses",
        "device reset",
        "no hci",
        "hci controller",
        "returns number",
        "variable number",
        "packdata",
        "cstring",
        "pass",
        "path",
        "deprecated in",
        "obex session",
        "obexsessionref",
        "rfcomm channel",
        "obex",
        "does not",
        "l2cap channel",
        "inrefcon",
        "device",
        "length",
        "obex spec",
        "error code",
        "make",
        "headerid",
        "april",
        "alarm",
        "avrcplog",
        "audiolog",
        "bccmd16touint16",
        "bccmd16touint8",
        "bccmd32touint32",
        "hfplog",
        "obexcreatevcard",
        "obexsessionget",
        "uint16tobccmd16",
        "intents",
        "created",
        "andrea gottardo",
        "inimage",
        "intentsui",
        "project version",
        "inshortcut",
        "ibdesignable",
        "invoiceshortcut",
        "nsbundle",
        "siri",
        "beralloct",
        "berbvarrayadd",
        "berbvarrayfree",
        "berbvdup",
        "berbvecadd",
        "berbvecfree",
        "berbvfree",
        "berdump",
        "berdup",
        "berdupbv",
        "ldap",
        "vdspinput1",
        "vectorsize",
        "iirchannel",
        "osvkerndsplib",
        "pragmaonce",
        "paul chang",
        "fri mar",
        "original code",
        "apple operating",
        "modifications",
        "apple public",
        "source license",
        "version",
        "lframesize",
        "i386",
        "picify",
        "callmcount",
        "nonlazystub",
        "align",
        "roundtostack",
        "leaf",
        "import",
        "carnegie mellon",
        "carnegie",
        "inline void",
        "software",
        "school",
        "august",
        "xnuarchi386selh",
        "next computer",
        "mike demoney",
        "bruce martin",
        "state segment",
        "nxswappedfloat",
        "osswapint32",
        "inline float",
        "inline double",
        "osswapint64",
        "armlimitsh",
        "arm64",
        "useclangtypes",
        "bsdarmtypesh",
        "int8t",
        "gnuc typedef",
        "uint8t",
        "ansi c",
        "ansi",
        "use wchart",
        "armmcontexth",
        "mcontextt",
        "armparamh",
        "round",
        "darwinsizet",
        "darwinalign",
        "uint32t",
        "darwinalign32",
        "warranties",
        "a particular",
        "university",
        "armarch6zk",
        "armarch6k",
        "armarch4t",
        "armarch4",
        "http",
        "capbitnb",
        "legacy",
        "armfeatureflag",
        "california",
        "notice",
        "berkeley",
        "limited to",
        "define",
        "useclanglimits",
        "lp64",
        "ansisource",
        "darwincsource",
        "longmin",
        "ulongmax",
        "parameter",
        "vmmemcoherent",
        "vmmemearlyack",
        "vmmeminner",
        "vmmemrt",
        "vmmemguarded",
        "armmemorytypesh",
        "armpalroutinesh",
        "read",
        "struct",
        "booleant",
        "cluster",
        "devbsize",
        "mclbytes",
        "unix system",
        "laboratories",
        "devbshift",
        "thumb",
        "armv5",
        "armv7",
        "cache",
        "neon",
        "swift",
        "bsdarmprofileh",
        "xxx todo",
        "block",
        "mcount",
        "mcountinit",
        "mcountenter",
        "splhigh",
        "armthreadh",
        "armtraph",
        "dflssiz",
        "targetososx",
        "maxssiz",
        "rliminfinity",
        "maxcsiz",
        "bsdarmvmparamh",
        "dfldsiz",
        "maxdsiz",
        "xxx stack",
        "armsignal",
        "int64t",
        "armmachtypesh",
        "int32t",
        "methods",
        "thread",
        "hasapplepac",
        "atmatmtypesh",
        "libkernlocksh",
        "fortifysource",
        "libkerncopyioh",
        "sizedby",
        "darwinosinline",
        "stdcversion",
        "osswapint16",
        "libkerncrch",
        "blockexport",
        "vaargs",
        "blockrelease",
        "blockh",
        "collection",
        "blockcopy",
        "ososbaseh",
        "base",
        "byteoffset",
        "host endianess",
        "generic host",
        "generic",
        "osmalloc",
        "osmalloctag tag",
        "osmalloctag",
        "pci device",
        "uint32",
        "uint32 mask",
        "safecastptr",
        "sint32",
        "osaddatomic64",
        "uint8",
        "libkern c",
        "internal error",
        "core osreturn",
        "libkern",
        "values",
        "pragmamark",
        "kexts",
        "kext",
        "c string",
        "grab",
        "osostypesh",
        "boolean",
        "unsignedwide",
        "uint32 hi",
        "buildtime value",
        "libkernversionh",
        "versionmajor",
        "versionminor",
        "versionvariant",
        "versionrevision",
        "ostype",
        "osrelease",
        "libkernsysctlh",
        "instructions",
        "data cache",
        "future",
        "rbleft",
        "rbright",
        "rbgetparent",
        "splayright",
        "splayleft",
        "rbsetcolor",
        "rbblack",
        "rbgetcolor",
        "comp",
        "main",
        "stdc",
        "msdos",
        "windows",
        "sys16bit",
        "zlibdll",
        "zextern",
        "zconfh",
        "model",
        "zextern int",
        "zstreamerror",
        "znull",
        "zbuferror",
        "zmemerror",
        "zstreamend",
        "zdataerror",
        "zfinish",
        "enough",
        "possible",
        "trailer",
        "compiler",
        "countedby",
        "sparta",
        "osatomic",
        "ipcipctypesh",
        "ipcobjectnull",
        "ipcobjectdead",
        "osreturn",
        "nfskrpch",
        "xdrbuf",
        "xdrbuf xbp",
        "xbptr",
        "xbleft",
        "tlen",
        "lval",
        "xbcleanup",
        "xbtype",
        "xbflags",
        "nfsargsversion",
        "file",
        "packed",
        "nfshz",
        "mount",
        "term",
        "restrict",
        "stats",
        "nfsbitmapset",
        "nfsver3",
        "nfsxunsigned",
        "attr",
        "nfsprogram",
        "nfssmallfh",
        "which",
        "from",
        "mark",
        "obsolete",
        "ip address",
        "iaddrt",
        "netinetbootph",
        "nvmaxtext",
        "magic",
        "etheraddrlen",
        "target",
        "byteorder",
        "bigendian",
        "littleendian",
        "dest",
        "igmp",
        "ushort",
        "inpcbptr",
        "inpcblistentry",
        "ipsec",
        "pcbs",
        "cookie",
        "netinetinstath",
        "minimal",
        "result",
        "arp packet",
        "icmpparamprob",
        "icmpredirect",
        "address",
        "ditto",
        "ip filter",
        "ipv4",
        "ip packet",
        "inject",
        "wifi",
        "server",
        "tcpmaxnotifyack",
        "wired",
        "ecn setup",
        "notify",
        "slow",
        "definitions",
        "tcptmax",
        "retransmit",
        "mptcp",
        "tcpsclosewait",
        "tcpsestablished",
        "tcpstimewait",
        "tcpseq",
        "timer drift",
        "sack",
        "char",
        "icmp",
        "synack",
        "tcpoptnop",
        "syndata",
        "ver",
        "internet",
        "iopcidevice",
        "constant",
        "perst",
        "localonly",
        "iooptionbits",
        "optional access",
        "ioservice",
        "open",
        "pcidriverkith",
        "osmetaclassbase",
        "iorpc rpc",
        "auditpipeiobase",
        "auditsdeviobase",
        "ioctls",
        "data",
        "the software",
        "stdargh",
        "hasincludenext",
        "eli friedman",
        "as is",
        "hack",
        "atomic",
        "atomicseqcst",
        "clangstdatomich",
        "stdchosted",
        "stdboolh",
        "needwintt",
        "stddefh",
        "hasbuiltin",
        "const src",
        "xnumembersize",
        "const dst",
        "wcharmax",
        "wcharmin",
        "limits",
        "kernelstdinth",
        "lp64 typedef",
        "intmaxc",
        "uintmaxc",
        "ptrauth",
        "olddata",
        "value",
        "declkey",
        "abi pointer",
        "c function",
        "float16",
        "fltevalmethod",
        "legacy bsd",
        "c standard",
        "sincospi",
        "cosp",
        "x8664monotonich",
        "staticifentry",
        "hasmte",
        "vmmemorytypesh",
        "vmwimgdefault",
        "wimg",
        "extvectortype",
        "utilfunction",
        "aligned",
        "srcptr",
        "vmpmaph",
        "vmdyldpagerh",
        "vmvmfaulth",
        "vmvmmaph",
        "development",
        "debug",
        "vmvmoptionsh",
        "vmvmpageouth",
        "kasantbi",
        "machvmmemtagh",
        "given",
        "vmmemtagptrsize",
        "vmmemtagtagsize",
        "copy",
        "vmsharedregionh",
        "vfsvfssupporth",
        "veclib",
        "master",
        "world wide",
        "various",
        "veclibtypes",
        "carbonlib",
        "availability",
        "carbon",
        "noncarbon cfm",
        "vbasicops",
        "shift",
        "vforceh",
        "vdsplength n",
        "realp",
        "nonnull",
        "vector",
        "dspsplitcomplex",
        "ieee",
        "dspcomplex",
        "uuiduuidh",
        "uuiddefine",
        "public",
        "uuid library",
        "kernelserver",
        "simpleroutine",
        "undkey",
        "execution",
        "strings array",
        "user",
        "title string",
        "info",
        "1024",
        "xmldatat",
        "undreplyref",
        "kernsuccess",
        "osaction",
        "targetosiphone",
        "istargetvendor",
        "targetcpux8664",
        "targetosunix",
        "targetcpuppc",
        "targetcpuppc64",
        "targetcpux86",
        "targetrtmaccfm",
        "bridge",
        "svflags",
        "svpavreal",
        "svpavreify",
        "xpvav",
        "svany",
        "avfillp",
        "for apidoc",
        "mutableav",
        "avrealoff",
        "pltopenv",
        "stmtstart",
        "stmtend",
        "copfile",
        "plcurstackinfo",
        "copfilegv",
        "cophinthashget",
        "loop",
        "stack",
        "beware",
        "orig",
        "loops",
        "this file",
        "the build",
        "plbitcount",
        "u8 value",
        "cvflags",
        "xpvcv",
        "mutableptr",
        "perlcore",
        "cvgv",
        "cvfile",
        "cvfmethod",
        "cvflvalue",
        "cvfconst",
        "anon",
        "doinit extconst",
        "ebcdic",
        "extconst u8",
        "index",
        "ascii platform",
        "confusingly",
        "u8 pla2e",
        "pla2e",
        "u8 ple2a",
        "guard",
        "declspec",
        "extconst",
        "ext externc",
        "init",
        "larry wall",
        "gnu general",
        "readme file",
        "multiplicity",
        "plsawampersand",
        "do not",
        "perliogetc",
        "perlioputc",
        "perliostdoutf",
        "perlio",
        "perlfeatureh",
        "featuresubbit",
        "featuremyrefbit",
        "featurefcbit",
        "featureisabit",
        "featuresaybit",
        "featurestatebit",
        "featuretrybit",
        "hintfeaturemask",
        "ffspace",
        "process",
        "ffdecimal",
        "ffend",
        "gvgp",
        "gvflags",
        "gvnamehek",
        "svtype",
        "gvegv",
        "gvstash",
        "gvxpvgv",
        "svtpvgv",
        "svtpvlv",
        "super",
        "edit directly",
        "djgpp",
        "bitbucket",
        "perlsysinitbody",
        "perlioinit",
        "perlsystermbody",
        "w macros",
        "wexitstatus",
        "shpath",
        "mkdir",
        "rotl64",
        "rotl32",
        "rotate x",
        "rotr32",
        "can64bithash",
        "rotr64",
        "ivsize",
        "u8to16le",
        "rotluv",
        "rotruv",
        "sbox32maxlen",
        "plhashstate",
        "perlhash",
        "perl",
        "usehashseed",
        "perlseenhvfunch",
        "perlhashseed",
        "siphash24",
        "siphash13",
        "seed",
        "c program",
        "c type",
        "c compiler",
        "gcc attribute",
        "longsize",
        "c preprocessor",
        "install",
        "kill",
        "cont",
        "thus",
        "ext declspec",
        "dext",
        "for apidocitem",
        "utf8",
        "ascii",
        "fitsin8bits",
        "nativetolatin1",
        "strwithlen",
        "u8 end",
        "test",
        "poison",
        "february",
        "cray",
        "prior",
        "behaviour",
        "except",
        "alpha",
        "perlvar",
        "perlvari",
        "perlvara",
        "padoffset",
        "true",
        "pmop",
        "hooks",
        "hook",
        "sv invlist",
        "perlinregcompc",
        "svcur",
        "perlinopc",
        "tointernalsize",
        "svtinvlist",
        "invlistlen",
        "strlen",
        "hvaux",
        "heklen",
        "svook",
        "hekutf8",
        "hekkey",
        "hekflags",
        "mutablehv",
        "hvnameheknn",
        "gosh",
        "leave",
        "iperlsock",
        "plsock",
        "iperlstdio",
        "plstdio",
        "iperlproc",
        "plproc",
        "iperllio",
        "pllio",
        "perlimplicitsys",
        "plink",
        "keypackage",
        "keyend",
        "keysub",
        "keydump",
        "keylog",
        "keysend",
        "keystate",
        "perlioclose",
        "perlmemcollxfrm",
        "nativetoneed",
        "plclocaleobj",
        "plno",
        "plwarnall",
        "plwarnnone",
        "plyes",
        "plzero",
        "plc9utf8dfatab",
        "nomathoms",
        "perlintokec",
        "perlinutf8c",
        "perlinsvc",
        "perlinregexecc",
        "debugging",
        "perlinlocalec",
        "pfinet",
        "snoop",
        "ccprint",
        "ccgraph",
        "cccharnamecont",
        "ccascii",
        "ccwordchar",
        "ccalphanumeric",
        "ccidfirst",
        "ccquotemeta",
        "ccalpha",
        "cccased",
        "ordinal",
        "magicvtablemax",
        "extra",
        "regex match",
        "env hash",
        "isa array",
        "debugger",
        "sig hash",
        "available",
        "shadow",
        "array length",
        "magic mg",
        "sv sv",
        "mgftainteddir",
        "hefsvkey",
        "mutablesv",
        "ssizet",
        "mgvtbl entry",
        "mgfbytes",
        "perlmagicsv 0",
        "special",
        "perlmagicarylen",
        "perlmagicrhash",
        "extra data",
        "perlmagicpos",
        "perlmagicsymtab",
        "provides",
        "dtrace probes",
        "stdioh",
        "stdioincluded",
        "sfioversion",
        "rxfpmfcharset",
        "rxfpmfmultiline",
        "rxfpmffold",
        "rxfpmfextended",
        "rxfpmfnocapture",
        "rxfpmfkeepcopy",
        "flags",
        "rxfpmfstrict",
        "ocshift",
        "plop",
        "perlbitfield16",
        "baseop op",
        "useithreads",
        "pmfonce",
        "padop",
        "perlcknull",
        "perlckfun",
        "opparg1mask",
        "opparg4mask",
        "opparg2mask",
        "perlckftst",
        "perlppftrowned",
        "perlckbitop",
        "perlckcmp",
        "perlcklfun",
        "dump",
        "chroot",
        "syscall",
        "flip",
        "undef",
        "crypt",
        "push",
        "stub",
        "trans",
        "predec",
        "flop",
        "prtf",
        "shutdown",
        "perlcontext cx",
        "perlmemlog",
        "c pointer",
        "cxtype",
        "logic",
        "toavamg",
        "tohvamg",
        "opftrread",
        "oplt",
        "opincmp",
        "opbitand",
        "opsbitor",
        "opsend",
        "opgetpeername",
        "opfteexec",
        "opftbinary",
        "opclose",
        "plparser",
        "yylex",
        "lexshared",
        "position",
        "repl",
        "memsize",
        "malloct",
        "perlmallocctlh",
        "uv nfree",
        "uv ntotal",
        "iv topbucket",
        "iv totalsbrk",
        "iv minbucket",
        "level",
        "plcomppad",
        "plcurpad",
        "uvxf",
        "ptr2uv",
        "avarray",
        "padnameflags",
        "plcopseqmax",
        "padlistarray",
        "c array",
        "padnametype",
        "incpushperl5lib",
        "appllibexp",
        "privlibexp",
        "defineincmacros",
        "perlfsversion",
        "perl5lib",
        "sitearchexp",
        "perllanginfoh",
        "hasnllanginfo",
        "ilanginfo",
        "codeset",
        "codeset 1",
        "dtfmt",
        "dtfmt 2",
        "dfmt",
        "dfmt 3",
        "sipround",
        "u8to64le",
        "fallthrough",
        "uint64c",
        "perlsiphashfnc",
        "siprounds",
        "strlen inlen",
        "sipfinalrounds",
        "could",
        "configure",
        "plout",
        "mine001",
        "argv",
        "plin",
        "localpatchcount",
        "perlapih",
        "xs code",
        "portingglossary",
        "first version",
        "brand",
        "symbols",
        "haswcrtomb",
        "perlionotstdio",
        "perlcallconv",
        "perlio f",
        "perlioh",
        "usestdio",
        "case",
        "bufsiz",
        "sizet",
        "perlstability",
        "perltypedefs",
        "perldtracehin",
        "perlloadedfile",
        "perlloadingfile",
        "perlopentry",
        "perlphasechange",
        "perlsubentry",
        "perlsubreturn",
        "generated",
        "perlcallconv iv",
        "sizet count",
        "sv arg",
        "mode",
        "perliofuncs tab",
        "stdchar",
        "perliolistt",
        "sv args",
        "mutex",
        "perlinterpreter",
        "sigsize",
        "perlioisstdio",
        "perlcallconv op",
        "perldokv",
        "perlppaassign",
        "perlppabs",
        "perlppaccept",
        "perlppadd",
        "perlppaeach",
        "perlppaelem",
        "public license",
        "free software",
        "foundation",
        "yydebug",
        "bison",
        "bareword",
        "funcmeth",
        "arrow",
        "targ",
        "pushs",
        "tops",
        "does",
        "xsub",
        "pops",
        "xpushs",
        "erange",
        "perlreentrapi",
        "perlreentrapi0",
        "hostentsize",
        "getgrentrproto",
        "getpwentrproto",
        "getnetentrproto",
        "grentbuffer",
        "grentsize",
        "hostenterrno",
        "redebugflag",
        "debugvtest",
        "debugr",
        "u16 nextoff",
        "argset",
        "u8 type",
        "nextoff",
        "strings",
        "problem",
        "june",
        "invert",
        "perlfpclass",
        "longdoublekind",
        "plstatusvalue",
        "pldebug",
        "numclasses",
        "locale",
        "grok",
        "pragma",
        "dword",
        "attack",
        "little",
        "lynx",
        "done",
        "reany",
        "rxpextflags",
        "rxextflags",
        "checkpoint cp",
        "rxftaintedseen",
        "rxfcopydone",
        "plsavestackix",
        "plsavestack",
        "plsavestackmax",
        "ssmaxpush",
        "enter",
        "debugscope",
        "state",
        "u32 state",
        "debugsbox32hash",
        "sbox32warn5",
        "line",
        "mutexunlock",
        "mutexinit",
        "noop",
        "mutexlock",
        "condinit",
        "detach",
        "panic",
        "usetm64",
        "should",
        "bsd extension",
        "configuration",
        "time64debug",
        "int64t nv",
        "gnu extension",
        "perltime64h",
        "time64t",
        "int64t int64",
        "int64 time64t",
        "i32 year",
        "tm64",
        "hastmtmgmtoff",
        "decide",
        "svpvx",
        "svgmagic",
        "bonk",
        "anything",
        "turn",
        "crash",
        "fstat",
        "perlmicro",
        "hasioctl",
        "hasutime",
        "hasgroup",
        "haspasswd",
        "usemybinmode",
        "idirent",
        "likely",
        "generated code",
        "utfebcdic",
        "unicode",
        "step",
        "ufeff",
        "u00a0",
        "u00df",
        "u00b5",
        "ufffd",
        "u017f",
        "u0300",
        "unlikely",
        "nativeutf8toi8",
        "utf8skip",
        "nativetouni",
        "lazy",
        "extrasize",
        "regnodemax",
        "exact",
        "match",
        "whilem",
        "anyof",
        "curly",
        "trie",
        "curlym",
        "eval",
        "star",
        "perlutilh",
        "hsmapiverlen",
        "hsxsverlenmax",
        "hskeyp",
        "tools",
        "sv vs",
        "perlversionlt",
        "svpvxnolenconst",
        "perlckwarner",
        "u32 err",
        "scroakxsusage",
        "pluumap",
        "warnings",
        "categories",
        "plcurcop",
        "perlckwarn",
        "perlckwarnd",
        "perlwarnisset",
        "perlwarnoff",
        "perlwarnbit",
        "xsversion",
        "xsreturn",
        "perlxshandshake",
        "plstackbase",
        "hskey",
        "zaphod32mix",
        "u8to32le",
        "zaphod32warn4",
        "zaphod32warn3",
        "zaphod32warn6",
        "perlform",
        "i8tonativeutf8",
        "warnutf8",
        "myshift",
        "c extension",
        "libs",
        "cflags",
        "afkuserlog",
        "kafkeventcancel",
        "kafkeventerror",
        "adamsbagmanager",
        "adjinglerequest",
        "isinternalbuild",
        "kickmcxdforuid",
        "loadappkit",
        "ardconfig",
        "authenticator",
        "dsauthenticator",
        "dsnode",
        "dsrecord",
        "hostconfig",
        "addtofront",
        "calcslope",
        "copyarray",
        "createcachenode",
        "defaultebecurve",
        "deletecache",
        "disablehcucache",
        "dumpcache",
        "dumpoutputhcu",
        "enablet1sim",
        "ascagent",
        "ascagentproxy",
        "asdevice",
        "ddrangecompare",
        "wdosloglauncher",
        "wdoslogprotocol",
        "findchar",
        "ddasllogger",
        "ddfilelogger",
        "ddlog",
        "ddlogfileinfo",
        "ddlogmessage",
        "ddloggernode",
        "mkurlparser",
        "mkerrordomain",
        "mkintegerhash",
        "mklonghash",
        "mkmaprectinset",
        "mkmaprectnull",
        "mkmaprectoffset",
        "mkmaprectworld",
        "mkmapsizeworld",
        "kextensionnonui",
        "wkarraycreate",
        "wkbooleancreate",
        "wkcontextcreate",
        "wkdatacreate",
        "wkdatagettypeid",
        "wkdoublecreate",
        "wkframecopyurl",
        "wkgettypeid",
        "wkimagecreate",
        "wkpagecandelete",
        "webkit",
        "methodkind",
        "wkerrordomain",
        "by apple",
        "document",
        "a block",
        "wkcontentworld",
        "wkwebview",
        "javascript",
        "wkerrorcode",
        "wkerrorunknown",
        "nsswiftasync",
        "wkswiftasync",
        "wkcookiepolicy",
        "nshttpcookie",
        "whether",
        "wknavigation",
        "wkdownload",
        "decides",
        "mime type",
        "wkscriptmessage",
        "wkframeinfo",
        "information",
        "url scheme",
        "wkcontentmode",
        "wkuserscript",
        "wkextern",
        "media",
        "promise",
        "fulfill",
        "cgfloat",
        "targetoswatch",
        "sign",
        "password",
        "provider",
        "uicontrol",
        "nscontrol",
        "opaque user",
        "apple id",
        "nsstring user",
        "asuseragerange",
        "initiate",
        "asauthorization",
        "confirms",
        "apple upgrade",
        "nserrorenum",
        "operation",
        "relying party",
        "targetosvision",
        "a byte",
        "nsdata userid",
        "relying",
        "a string",
        "asapiavailable",
        "http response",
        "authorization",
        "oauth",
        "saml",
        "nsdata readdata",
        "bool didwrite",
        "a cose",
        "nsstring name",
        "bool appid",
        "targetosxr",
        "a state",
        "a json",
        "web token",
        "private seckeys",
        "nsstring appid",
        "mdm profile",
        "nsurl url",
        "returns yes",
        "lacontext",
        "asswiftsendable",
        "keychain",
        "cose algorithm",
        "ecdsa",
        "sha256",
        "cose curve",
        "p256",
        "nsinteger rank",
        "enables",
        "bool success",
        "remove",
        "call",
        "complete",
        "prepare",
        "attempt",
        "list",
        "nsextension",
        "settings",
        "initializes",
        "a key",
        "extensions",
        "hash",
        "json",
        "initialize",
        "nsstring origin",
        "settings app",
        "urls",
        "https urls",
        "safari",
        "cancel",
        "nsuuid uuid",
        "asextern extern",
        "asextern",
        "nsswiftsendable",
        "uiwindow",
        "propertykind",
        "gkplayer",
        "n tags",
        "gkerrordomain",
        "gamecenter",
        "targetosios",
        "targetostv",
        "nsavailable",
        "gkachievement",
        "local player",
        "view",
        "present",
        "optional",
        "gkbaseplayer",
        "game center",
        "uiimage",
        "app store",
        "gkchallenge",
        "gklocalplayer",
        "nsdeprecated",
        "a singleton",
        "gkcloudplayer",
        "returns nil",
        "nsdeprecatedmac",
        "internal2",
        "internal3",
        "internal4",
        "gkscore",
        "gkextern",
        "gkextern extern",
        "gkexternweak",
        "gkerrorcode",
        "gkerrorunknown",
        "gkerrorunderage",
        "friendplayer",
        "standard view",
        "nsresponder",
        "parentwindow",
        "ibaction",
        "gkgamesession",
        "apis",
        "gkplayer player",
        "nsinteger score",
        "nsdate date",
        "gkleaderboard",
        "connect",
        "nsinteger value",
        "load",
        "gktransporttype",
        "nsstring title",
        "loads array",
        "localized",
        "gkmatch",
        "gkmatchrequest",
        "gkinvite",
        "gksession",
        "gksession api",
        "gamekit",
        "asynchronously",
        "welcome",
        "nstimeinterval",
        "delegate",
        "delivery",
        "gksenddatamode",
        "gksessionmode",
        "gkphotosize",
        "callbacks",
        "gkmatchdelegate",
        "gksavedgame",
        "default value",
        "gksessionerror",
        "gkvoicechat",
        "participant",
        "voice chat",
        "clienta"
      ],
      "references": [
        "CredentialsCache.h",
        "CredentialsCache2.h",
        "config.xml",
        "popen_spawn_win32.py",
        "pycore_condvar.h",
        "Kerberos.h",
        "KerberosLogin.h",
        "plugin.js",
        "krb5.h",
        "MultipeerConnectivity.tbd",
        "MCBrowserViewController.h",
        "MCNearbyServiceAdvertiser.h",
        "MCError.h",
        "MCAdvertiserAssistant.h",
        "MCNearbyServiceBrowser.h",
        "MultipeerConnectivity.apinotes",
        "MultipeerConnectivity.h",
        "MCSession.h",
        "MCPeerID.h",
        "canvas.html",
        "capture_0.bundle.js",
        "capture_resize.js",
        "GCRacingWheelInput.h",
        "GCSyntheticDeviceKeys.h",
        "GCSwitchPositionInput.h",
        "GCSteeringWheelElement.h",
        "GCSwitchElement.h",
        "GCTouchedStateInput.h",
        "GCXboxGamepad.h",
        "GCTypes.h",
        "GCRelativeInput.h",
        "GameController.h",
        "GCAxis2DInput.h",
        "GCAxisElement.h",
        "GCAxisInput.h",
        "GCButtonElement.h",
        "GCController.h",
        "GCColor.h",
        "GCControllerAxisInput.h",
        "GCControllerDirectionPad.h",
        "GCControllerInput.h",
        "GCControllerElement.h",
        "GCControllerTouchpad.h",
        "GCDevice.h",
        "GCDeviceBattery.h",
        "GCDeviceCursor.h",
        "GCDeviceHaptics.h",
        "GCDeviceLight.h",
        "GCDevicePhysicalInputState.h",
        "GCDevicePhysicalInputStateDiff.h",
        "GCDirectionalGamepad.h",
        "GCDirectionPadElement.h",
        "GCDevicePhysicalInput.h",
        "GCDualSenseAdaptiveTrigger.h",
        "GCDualSenseGamepad.h",
        "GCDualShockGamepad.h",
        "GCEventViewController.h",
        "GCExtendedGamepadSnapshot.h",
        "GCExtern.h",
        "GCExtendedGamepad.h",
        "GCGamepadSnapshot.h",
        "GCGearShifterElement.h",
        "GCGamepad.h",
        "GCKeyboard.h",
        "GCInputNames.h",
        "GCControllerButtonInput.h",
        "GCKeyNames.h",
        "GCKeyboardInput.h",
        "GCKeyCodes.h",
        "GCLinearInput.h",
        "GCMotion.h",
        "GCMouse.h",
        "GCMouseInput.h",
        "GCMicroGamepadSnapshot.h",
        "GCPhysicalInputElement.h",
        "GCMicroGamepad.h",
        "GCPhysicalInputProfile.h",
        "GCPhysicalInputSource.h",
        "GCPressedStateInput.h",
        "GCProductCategories.h",
        "GCRacingWheel.h",
        "GameController.tbd",
        "arm64e-apple-macos.swiftinterface",
        "x86_64-apple-macos.swiftinterface",
        "module.modulemap",
        "com_err.h",
        "gssapi_generic.h",
        "locate_plugin.h",
        "profile.h",
        "gssapi_krb5.h",
        "preauth_plugin.h",
        "gssapi.h",
        "alc.h",
        "oalStaticBufferExtension.h",
        "oalMacOSX_OALExtensions.h",
        "OpenAL.h",
        "al.h",
        "OpenAL.tbd",
        "IOUSBHost.tbd",
        "IOUSBHostCIEndpointStateMachine.h",
        "IOUSBHostCIControllerStateMachine.h",
        "IOUSBHost.h",
        "IOUSBHostCIPortStateMachine.h",
        "IOUSBHostCIDeviceStateMachine.h",
        "IOUSBHostControllerInterfaceHelpers.h",
        "IOUSBHostDevice.h",
        "IOUSBHostControllerInterface.h",
        "IOUSBHostDefinitions.h",
        "IOUSBHostInterface.h",
        "IOUSBHostIOSource.h",
        "AppleUSBDescriptorParsing.h",
        "IOUSBHostStream.h",
        "IOUSBHostObject.h",
        "IOUSBHostControllerInterfaceDefinitions.h",
        "IOUSBHostPipe.h",
        "IOBluetoothUIUserLib.h",
        "IOBluetoothUI.h",
        "IOBluetoothObjectPushUIController.h",
        "IOBluetoothDeviceSelectorController.h",
        "IOBluetoothPasskeyDisplay.h",
        "IOBluetoothPairingController.h",
        "IOBluetoothServiceBrowserController.h",
        "IOBluetoothUI.tbd",
        "Bluetooth.h",
        "IOBluetooth.h",
        "BluetoothAssignedNumbers.h",
        "IOBluetoothTypes.h",
        "IOBluetoothUtilities.h",
        "OBEXBluetooth.h",
        "IOBluetoothUserLib.h",
        "OBEX.h",
        "IOBluetooth.tbd",
        "INImage+IntentsUI.h",
        "IntentsUI.h",
        "INUIAddVoiceShortcutButton.h",
        "IntentsUI.apinotes",
        "INUIEditVoiceShortcutViewController.h",
        "INUIAddVoiceShortcutViewController.h",
        "LDAP.tbd",
        "OSvKernDSPLib.h",
        "cpu.h",
        "asm_help.h",
        "desc.h",
        "pio.h",
        "io.h",
        "sel.h",
        "reg_help.h",
        "tss.h",
        "table.h",
        "byte_order.h",
        "_limits.h",
        "_types.h",
        "_mcontext.h",
        "_param.h",
        "_endian.h",
        "arch.h",
        "cpuid_internal.h",
        "cpu_capabilities_public.h",
        "arm_features.inc",
        "endian.h",
        "locks.h",
        "limits.h",
        "atomic.h",
        "machine_cpuid.h",
        "memory_types.h",
        "pal_routines.h",
        "machine_routines.h",
        "param.h",
        "cpuid.h",
        "thread.h",
        "trap.h",
        "vmparam.h",
        "signal.h",
        "types.h",
        "AFKMemoryDescriptorOptions.h",
        "machine_machdep.h",
        "atm_types.h",
        "copyio.h",
        "_OSByteOrder.h",
        "crc.h",
        "Block.h",
        "OSBase.h",
        "OSByteOrder.h",
        "OSDebug.h",
        "OSMalloc.h",
        "OSAtomic.h",
        "OSReturn.h",
        "OSKextLib.h",
        "OSTypes.h",
        "version.h",
        "sysctl.h",
        "tree.h",
        "zconf.h",
        "zlib.h",
        "libkern.h",
        "kdp_callout.h",
        "kdp_en_debugger.h",
        "ipc_types.h",
        "krpc.h",
        "rpcv2.h",
        "xdr_subs.h",
        "nfs.h",
        "nfsproto.h",
        "bootp.h",
        "if_ether.h",
        "icmp6.h",
        "icmp_var.h",
        "igmp_var.h",
        "igmp.h",
        "in_pcb.h",
        "in_stat.h",
        "in_private.h",
        "in_arp.h",
        "in_var.h",
        "in_systm.h",
        "ip_var.h",
        "ip_icmp.h",
        "kpi_ipfilter.h",
        "ip6.h",
        "tcp_private.h",
        "ip.h",
        "tcp_timer.h",
        "tcp_fsm.h",
        "udp_var.h",
        "tcp_seq.h",
        "tcpip.h",
        "udp.h",
        "tcp_var.h",
        "tcp.h",
        "IOPCIFamilyDefinitions.h",
        "IOPCIDevice.iig",
        "PCIDriverKit.h",
        "IOPCIDevice.h",
        "audit_ioctl.h",
        "stdarg.h",
        "stdatomic.h",
        "stdbool.h",
        "stddef.h",
        "string.h",
        "stdint.h",
        "ptrauth.h",
        "math.h",
        "monotonic.h",
        "static_if.h",
        "machine_kpc.h",
        "machine_remote_time.h",
        "ipc_pthread_priority_types.h",
        "lz4_assembly_select.h",
        "vm_compressor_algorithms.h",
        "lz4.h",
        "pmap.h",
        "vm_dyld_pager.h",
        "vm_far.h",
        "vm_fault.h",
        "vm_map.h",
        "lz4_constants.h",
        "vm_options.h",
        "vm_pageout.h",
        "vm_memtag.h",
        "vm_shared_region.h",
        "vm_kern.h",
        "vfs_support.h",
        "vecLib.h",
        "vecLibTypes.h",
        "vBasicOps.h",
        "vForce.h",
        "vDSP.h",
        "uuid.h",
        "UNDReply.defs",
        "UNDRequest.defs",
        "KUNCUserNotifications.h",
        "UNDTypes.defs",
        "UNDTypes.h",
        "TargetConditionals.h",
        "apfs_boot_mount.tbd",
        "av.h",
        "cop.h",
        "bitcount.h",
        "cv.h",
        "ebcdic_tables.h",
        "EXTERN.h",
        "embedvar.h",
        "fakesdio.h",
        "feature.h",
        "form.h",
        "gv.h",
        "git_version.h",
        "dosish.h",
        "hv_macro.h",
        "hv_func.h",
        "config.h",
        "INTERN.h",
        "handy.h",
        "intrpvar.h",
        "invlist_inline.h",
        "hv.h",
        "iperlsys.h",
        "keywords.h",
        "libperl.tbd",
        "embed.h",
        "l1_char_class_tab.h",
        "mg_data.h",
        "mg_raw.h",
        "mg.h",
        "mg_vtable.h",
        "mydtrace.h",
        "nostdio.h",
        "op_reg_common.h",
        "op.h",
        "opcode.h",
        "inline.h",
        "overload.h",
        "opnames.h",
        "parser.h",
        "malloc_ctl.h",
        "pad.h",
        "perl_inc_macro.h",
        "perl_langinfo.h",
        "perl_siphash.h",
        "patchlevel.h",
        "perlapi.h",
        "metaconfig.h",
        "perlio.h",
        "perldtrace.h",
        "perliol.h",
        "perlvars.h",
        "perlsdio.h",
        "pp_proto.h",
        "perly.h",
        "pp.h",
        "reentr.h",
        "regcomp.h",
        "perl.h",
        "regexp.h",
        "scope.h",
        "sbox32_hash.h",
        "time64_config.h",
        "time64.h",
        "sv.h",
        "unixish.h",
        "uconfig.h",
        "utfebcdic.h",
        "unicode_constants.h",
        "utf8.h",
        "regnodes.h",
        "util.h",
        "vutil.h",
        "uudmap.h",
        "warnings.h",
        "XSUB.h",
        "zaphod32_hash.h",
        "encode.h",
        "python-3.9.pc",
        "python-3.9-embed.pc",
        "python3-embed.pc",
        "python3.pc",
        "AFKUser.tbd",
        "AdID.tbd",
        "Admin.tbd",
        "AirPlayReceiver.tbd",
        "AppSandbox.tbd",
        "ASEProcessing.tbd",
        "AuthenticationServicesCore.tbd",
        "WebGPU.tbd",
        "WebDriver.tbd",
        "MapKit.tbd",
        "SwiftUI.swiftoverlay",
        "WebKit.tbd",
        "WebKit.apinotes",
        "WKBackForwardList.h",
        "NSAttributedString.h",
        "WebKit.h",
        "WKBackForwardListItem.h",
        "WKContentRuleList.h",
        "WKContentRuleListStore.h",
        "WKContextMenuElementInfo.h",
        "WKDataDetectorTypes.h",
        "WKContentWorld.h",
        "WKError.h",
        "WKFoundation.h",
        "WKFindResult.h",
        "WKHTTPCookieStore.h",
        "WKFrameInfo.h",
        "WKNavigation.h",
        "WKFindConfiguration.h",
        "WKNavigationDelegate.h",
        "WKNavigationResponse.h",
        "WKOpenPanelParameters.h",
        "WebKitLegacy.h",
        "WKPreviewActionItem.h",
        "WKNavigationAction.h",
        "WKPreferences.h",
        "WKPreviewActionItemIdentifiers.h",
        "WKPreviewElementInfo.h",
        "WKProcessPool.h",
        "WKDownload.h",
        "WKPDFConfiguration.h",
        "WKScriptMessage.h",
        "WKSecurityOrigin.h",
        "WKScriptMessageHandler.h",
        "WKSnapshotConfiguration.h",
        "WKUIDelegate.h",
        "WKURLSchemeTask.h",
        "WKWebpagePreferences.h",
        "WKUserContentController.h",
        "WKWebsiteDataStore.h",
        "WKWebsiteDataRecord.h",
        "WKUserScript.h",
        "WKURLSchemeHandler.h",
        "WKWebViewConfiguration.h",
        "WKWebView.h",
        "WKScriptMessageHandlerWithReply.h",
        "WKWindowFeatures.h",
        "WKDownloadDelegate.h",
        "ASAccountAuthenticationModificationController.h",
        "ASAccountAuthenticationModificationViewController.h",
        "ASAuthorization.h",
        "ASAuthorizationAppleIDButton.h",
        "ASAccountAuthenticationModificationRequest.h",
        "ASAuthorizationAppleIDProvider.h",
        "ASAuthorizationAppleIDRequest.h",
        "ASAuthorizationAppleIDCredential.h",
        "ASAuthorizationController.h",
        "ASAuthorizationCredential.h",
        "ASAccountAuthenticationModificationExtensionContext.h",
        "ASAuthorizationError.h",
        "ASAuthorizationCustomMethod.h",
        "ASAuthorizationPasswordRequest.h",
        "ASAuthorizationOpenIDRequest.h",
        "ASAuthorizationPlatformPublicKeyCredentialDescriptor.h",
        "ASAuthorizationPlatformPublicKeyCredentialProvider.h",
        "ASAccountAuthenticationModificationReplacePasswordWithSignInWithAppleRequest.h",
        "ASAccountAuthenticationModificationUpgradePasswordToStrongPasswordRequest.h",
        "ASAuthorizationPlatformPublicKeyCredentialRegistrationRequest.h",
        "ASAuthorizationPlatformPublicKeyCredentialRegistration.h",
        "ASAuthorizationProvider.h",
        "ASAuthorizationPlatformPublicKeyCredentialAssertion.h",
        "ASAuthorizationPublicKeyCredentialAssertion.h",
        "ASAuthorizationPublicKeyCredentialAssertionRequest.h",
        "ASAuthorizationPublicKeyCredentialConstants.h",
        "ASAuthorizationProviderExtensionAuthorizationResult.h",
        "ASAuthorizationPublicKeyCredentialDescriptor.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobAssertionOutput.h",
        "ASAuthorizationPasswordProvider.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationInput.h",
        "ASAuthorizationPublicKeyCredentialParameters.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationOutput.h",
        "ASAuthorizationPublicKeyCredentialRegistration.h",
        "ASAuthorizationPublicKeyCredentialRegistrationRequest.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobAssertionInput.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialAssertion.h",
        "ASAuthorizationRequest.h",
        "ASAuthorizationPlatformPublicKeyCredentialAssertionRequest.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialProvider.h",
        "ASAuthorizationSingleSignOnCredential.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialDescriptor.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialAssertionRequest.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialRegistration.h",
        "ASAuthorizationSingleSignOnProvider.h",
        "ASAuthorizationWebBrowserExternallyAuthenticatableRequest.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredentialAssertionRequest.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredentialRegistrationRequest.h",
        "ASAuthorizationWebBrowserPublicKeyCredentialManager.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredential.h",
        "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialAssertionRequest.h",
        "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialRegistrationRequest.h",
        "ASCOSEConstants.h",
        "ASCredentialIdentity.h",
        "ASAuthorizationSingleSignOnRequest.h",
        "ASCredentialIdentityStore.h",
        "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialProvider.h",
        "ASCredentialProviderExtensionContext.h",
        "ASCredentialProviderViewController.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialRegistrationRequest.h",
        "ASCredentialServiceIdentifier.h",
        "ASExtensionErrors.h",
        "ASAuthorizationProviderExtensionAuthorizationRequest.h",
        "ASCredentialRequest.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredentialProvider.h",
        "ASPasskeyAssertionCredential.h",
        "ASPasskeyCredentialRequest.h",
        "ASPasskeyCredentialRequestParameters.h",
        "ASCredentialIdentityStoreState.h",
        "ASPasskeyRegistrationCredential.h",
        "ASPasswordCredential.h",
        "ASPublicKeyCredential.h",
        "ASPasskeyCredentialIdentity.h",
        "ASPublicKeyCredentialClientData.h",
        "ASSettingsHelper.h",
        "ASWebAuthenticationSessionCallback.h",
        "ASWebAuthenticationSession.h",
        "ASWebAuthenticationSessionRequest.h",
        "ASWebAuthenticationSessionWebBrowserSessionManager.h",
        "AuthenticationServices.h",
        "ASFoundation.h",
        "AuthenticationServices.apinotes",
        "ASWebAuthenticationSessionWebBrowserSessionHandling.h",
        "ASPasswordCredentialIdentity.h",
        "ASPasswordCredentialRequest.h",
        "GameKit.apinotes",
        "GKAccessPoint.h",
        "GameKit.h",
        "GKAchievement.h",
        "GKAchievementViewController.h",
        "GKBasePlayer.h",
        "GKAchievementDescription.h",
        "GKChallengeEventHandler.h",
        "GKCloudPlayer.h",
        "GKChallengesViewController.h",
        "GKChallenge.h",
        "GKDefines.h",
        "GKError.h",
        "GKEventListener.h",
        "GKFriendRequestComposeViewController.h",
        "GKDialogController.h",
        "GKGameSessionEventListener.h",
        "GKGameSessionError.h",
        "GKGameCenterViewController.h",
        "GKGameSessionSharingViewController.h",
        "GKLeaderboardEntry.h",
        "GKLeaderboard.h",
        "GKLeaderboardScore.h",
        "GKGameSession.h",
        "GKLeaderboardSet.h",
        "GKLocalPlayer.h",
        "GKLeaderboardViewController.h",
        "GKMatch.h",
        "GKMatchmaker.h",
        "GKMatchmakerViewController.h",
        "GKPeerPickerController.h",
        "GKNotificationBanner.h",
        "GKPublicConstants.h",
        "GKPlayer.h",
        "GKPublicProtocols.h",
        "GKSavedGameListener.h",
        "GKScore.h",
        "GKSessionError.h",
        "GKVoiceChat.h",
        "GKTurnBasedMatchmakerViewController.h",
        "GKSession.h",
        "GKTurnBasedMatch.h",
        "GKSavedGame.h",
        "GKVoiceChatService.h"
      ],
      "public": 1,
      "adversary": "Turla Group, FIN7, APT34, APT28, DragonForce Malaysia Hacker Group, Indonesia Islamic Warriors Counc",
      "targeted_countries": [
        "United States of America",
        "India",
        "Australia"
      ],
      "malware_families": [
        {
          "id": "OSAtomic",
          "display_name": "OSAtomic",
          "target": null
        },
        {
          "id": "OSReturn",
          "display_name": "OSReturn",
          "target": null
        },
        {
          "id": "Ver",
          "display_name": "Ver",
          "target": null
        },
        {
          "id": "Internet",
          "display_name": "Internet",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1123",
          "name": "Audio Capture",
          "display_name": "T1123 - Audio Capture"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1016",
          "name": "System Network Configuration Discovery",
          "display_name": "T1016 - System Network Configuration Discovery"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1049",
          "name": "System Network Connections Discovery",
          "display_name": "T1049 - System Network Connections Discovery"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 39,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "ilyailya",
        "id": "298851",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1968,
        "domain": 526,
        "FileHash-SHA256": 207,
        "hostname": 972,
        "email": 55,
        "FileHash-SHA1": 9,
        "FileHash-MD5": 4,
        "CVE": 2,
        "CIDR": 10
      },
      "indicator_count": 3753,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 34,
      "modified_text": "348 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a54a663b348b34b12f97",
      "name": "Command and Control - 199.59.243.224",
      "description": "",
      "modified": "2023-12-06T16:46:02.873000",
      "created": "2023-12-06T16:46:02.873000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "domain": 827,
        "FileHash-SHA256": 659,
        "hostname": 1381,
        "URL": 3637,
        "email": 1,
        "FileHash-MD5": 826,
        "FileHash-SHA1": 150
      },
      "indicator_count": 7482,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a47560e3f989a5556289",
      "name": "Typosquatting - httpsFreCodeCamp.org",
      "description": "",
      "modified": "2023-12-06T16:42:29.567000",
      "created": "2023-12-06T16:42:29.567000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "domain": 827,
        "FileHash-SHA256": 659,
        "hostname": 1381,
        "URL": 3637,
        "email": 1,
        "FileHash-MD5": 826,
        "FileHash-SHA1": 150
      },
      "indicator_count": 7482,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a46fe2f276b4a4daa9f7",
      "name": "Typosquatting - httpsFreCodeCamp.org",
      "description": "",
      "modified": "2023-12-06T16:42:23.297000",
      "created": "2023-12-06T16:42:23.297000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "domain": 827,
        "FileHash-SHA256": 659,
        "hostname": 1381,
        "URL": 3637,
        "email": 1,
        "FileHash-MD5": 826,
        "FileHash-SHA1": 150
      },
      "indicator_count": 7482,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a468597b81d280b67f3b",
      "name": "199.59.243.224 Command and Control",
      "description": "",
      "modified": "2023-12-06T16:42:16.587000",
      "created": "2023-12-06T16:42:16.587000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "domain": 827,
        "FileHash-SHA256": 659,
        "hostname": 1381,
        "URL": 3637,
        "email": 1,
        "FileHash-MD5": 826,
        "FileHash-SHA1": 150
      },
      "indicator_count": 7482,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65709fad03b8f1cdc6abe334",
      "name": "FreCodeCamp.org  - Typosquating and or Malicious Redirect. Social Engineering and",
      "description": "",
      "modified": "2023-12-06T16:22:04.700000",
      "created": "2023-12-06T16:22:04.700000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "domain": 827,
        "FileHash-SHA256": 659,
        "hostname": 1381,
        "URL": 3637,
        "email": 1,
        "FileHash-MD5": 826,
        "FileHash-SHA1": 150
      },
      "indicator_count": 7482,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "866 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65709a271fd1e3c22cf63f86",
      "name": "iCloud - cant access due to insecure conx - yes everything here is compromised via chaining, neural ai and accessibilty kit emulated via android",
      "description": "",
      "modified": "2023-12-06T15:58:31.832000",
      "created": "2023-12-06T15:58:31.832000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 705,
        "domain": 302,
        "FileHash-SHA256": 840,
        "URL": 2603,
        "email": 2,
        "FileHash-MD5": 51,
        "FileHash-SHA1": 51
      },
      "indicator_count": 4554,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "866 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://ls.zloirock.ru",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://ls.zloirock.ru",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776703069.596248
}