{
  "type": "URL",
  "indicator": "https://this.i.id",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://this.i.id",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3157337556,
      "indicator": "https://this.i.id",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 50,
      "pulses": [
        {
          "id": "69a2127d12dce12538b57d72",
          "name": "FBI Files | Tor device connection | Unique attack against (non -criminal) monitored targets  ~ Apple Jacked Targets",
          "description": "Remote Attack - FBI Files | Tor device connection | Unique attack against (non -criminal) monitored targets.\n\nChecked search history on a targeted device and found an FBI link apparently delivered via unknown AI technology.\n|| yara detections\nzur foerderung\nA\n+ Add Tag\n\u8840\nCount: 1\nGRO Probability: 1\nText: Suricata Alerts Event\nCategory Description CID\nIND131.188.40.12g otx.alienvault.com\nlocal:49181 (TCP) Misc\nAttack ET TOR Known Tor\nRelay/Router (Not Exit)\n\"A\" | [[Next pulse will list on malware, rats , bats, Trojans used]",
          "modified": "2026-03-29T20:03:36.333000",
          "created": "2026-02-27T21:54:05.261000",
          "tags": [
            "pattern match",
            "heuristic match",
            "all url",
            "files domain",
            "pulses otx",
            "germany unknown",
            "aaaa",
            "ip address",
            "emails",
            "gmt server",
            "vary",
            "modified",
            "accept",
            "title",
            "present feb",
            "present jan",
            "united",
            "part",
            "moved",
            "passive dns",
            "cname",
            "final",
            "bill",
            "antivm",
            "xlsx",
            "xlsm",
            "urls",
            "otx logo",
            "all hostname",
            "server",
            "organization",
            "city",
            "stateprovince",
            "postal code",
            "phone",
            "registrar abuse",
            "privacy admin",
            "paris admin",
            "april",
            "direct",
            "february",
            "http",
            "dfn verein",
            "zur foerderung",
            "domain",
            "page url",
            "tags",
            "de summary",
            "erlangen",
            "germany",
            "securitytrails",
            "de seen",
            "general info",
            "geo erlangen",
            "as as680",
            "de note",
            "route",
            "data upload",
            "extraction",
            "failed",
            "extra data",
            "referen",
            "include review",
            "exclude data",
            "summary",
            "url age",
            "as680",
            "se source",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "over",
            "ascii text",
            "mitre att",
            "size",
            "null",
            "refresh",
            "span",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "node traffic",
            "tlsv1",
            "search",
            "rgba",
            "medium",
            "read c",
            "module load",
            "t1129",
            "execution",
            "next",
            "dock",
            "write",
            "persistence",
            "calls",
            "apis",
            "reads",
            "model",
            "value",
            "getprocaddress",
            "show technique",
            "ck matrix",
            "access type",
            "windir",
            "regexp",
            "open",
            "date",
            "format",
            "virtual disk drive",
            "sha256",
            "sha1",
            "body",
            "filehashsha1",
            "found",
            "unknown",
            "stop",
            "root",
            "form",
            "9999",
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "hybrid analysis",
            "api key",
            "vetting process",
            "please note",
            "please",
            "bad traffic",
            "et info",
            "tls handshake",
            "failure",
            "flag",
            "analysis tip",
            "openurl c",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "show",
            "pulse pulses",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "malicious yara",
            "detections none",
            "less ip",
            "dynamicloader",
            "get na",
            "c3bhaw",
            "high",
            "copy",
            "guard",
            "push",
            "Palantir",
            "Foundry",
            "Whitehouse",
            "X.Com",
            "Justice.gov",
            "Apple",
            "AI",
            "node traffic"
          ],
          "references": [
            "tor.sebastianhahn.net \u2022 dap.digitalgov.gov \u2022 fbi.gov \u2022  x.com \u2022 sebastianhahn.net",
            "https://tor.sebastianhahn.net \u2022 faui2k9.de\t \u2022 gitbot.faui2k9.de \u2022 tor-dirauth.sebastianhahn.net \u2022",
            "http://truefoundry.prodigaltech.com/",
            "git.spywarewatchdog.org",
            "marriott-control-prd.accenture.cn",
            "marriott-datacenter-prd.accenture.cn",
            "accenture.cn",
            "c.j.location.host \u2022 videodata.video \u2022 referrer.search",
            "target.id  \u2022 tostring.call  \u2022 title.search",
            "https://hybrid-analysis.com/sample/2f05feed2065b7385b156ebf3a7c6c19def3d412227cee0d46e8a53fb3e9ac41/697bc423b6e7a4dc46010737",
            "https://hybrid-analysis.com/sample/430c376c1754f1f160e3d68bafc970eba37811bdb08d73a86bf6f4be1e7267b3/69a1ea603a3303fa120dad19",
            "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70/69a19551cb5537805706bca9",
            "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
            "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
            "calathea-containers.palantirfedstart.com \u2018 BYE ALREADY\u2019",
            "http://truefoundry.prodigaltech.com/",
            "Attacker being used by several legal entities attacking a target\u2019s family",
            "Clyde &Co | Chris Ahmann | Brian Sabey /Hall & Evans & Hall Render",
            "Luxury Apartments and Townhome communities do use Foundry Palantir",
            "Some Colorado communities have been taken over by the State Government",
            "Quasi Government: Specifically Pinnacol and Commerce & Industry ( AIG)",
            "Denver Justice System. Palantir allegedly moved  potato Headquarters to Miami",
            "Foundry Foot Soldiers are still in Colorado targeting innocents",
            "Foundry Palantir still has a presence in Colorado",
            "I need some help.",
            "Accurately tipped about air travel safety. In past. Proven true.",
            "Tipped of new looming airline threats",
            "Tipped on hits and other savage plans  to be executed against targets. Targets can be any (1) person.",
            "Sound crazy. We know Palantir commits ALL manner of crime. They are money motivated.",
            "FBI files opened up on a targeted phone, Iunseel, only in search history.",
            "Air Safety: it\u2019s important to have  passengers or hackers unable  to communicate via airline networks /",
            "No phones or circuit board tech. Smart watches.You can\u2019t bring large bottles of hygiene products. Deal with a new reality!",
            "Hours after files were deemed malicious. We powered on targeted Smart TV",
            "You have to go through a series of steps to change themes and wallpapers , including powering off TV",
            "Significant? The screen once had a floral theme. Now a black background with a single fish as Wallpaper .",
            "A man claiming to have the name Sebastian is communicating with targets love one",
            "Uses code, no phone calls. Connected via instagram.",
            "I\u2019m not sure what brings man to from NY to Denver today. I consider him malicious",
            "By remote view of NEW targeys view, all key calls are routed through him.",
            "Targets associated warned. Not very open to advice.",
            "I would post his public information. It may be unwise.",
            "Connects to all NEW targets key contacts main targets contacts.",
            "We have foot soldiers. Be aware",
            "https://www.justice.gov/opa/pr/departmen.t",
            "https://api.manus.im/api/oauth2_callback/apple",
            "https://apple.btprmjo.cc/",
            "https://creative.miqdigital.com/.well-known/apple-app-site-association",
            "internationalfrontier.com",
            "http://www.internationalfrontier.com/i/pdf/2017-04-03-IFR-2017.pdf",
            "http://www.internationalfrontier.com",
            "http://www.internationalfrontier.com/i/pdf/Montana-Presentation-2011.pdf",
            "https://tylerjoycedenver.followupboss.com/unsubscribe/T6pEHkEaLZAN5Jxflvspix0zKbJZwfY9pjBpUTk7q06azxItZ7aiRb7brQhy1NNFqrcrUe4cKmI455MBqcwK9_it6dqx6QWdANshp0om1Bv-5ezKkyVJDphCHvPQNvMupI1owe03rtqYAyu8Cj3cWw~~",
            "Related to: https://otx.alienvault.com/pulse/69a1a73eb0578b92962dae97"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Node Traffic",
              "display_name": "Node Traffic",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1048",
              "name": "Exfiltration Over Alternative Protocol",
              "display_name": "T1048 - Exfiltration Over Alternative Protocol"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1048.003",
              "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
              "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1555",
              "name": "Credentials from Password Stores",
              "display_name": "T1555 - Credentials from Password Stores"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1055.011",
              "name": "Extra Window Memory Injection",
              "display_name": "T1055.011 - Extra Window Memory Injection"
            },
            {
              "id": "T1055.001",
              "name": "Dynamic-link Library Injection",
              "display_name": "T1055.001 - Dynamic-link Library Injection"
            },
            {
              "id": "T1055.004",
              "name": "Asynchronous Procedure Call",
              "display_name": "T1055.004 - Asynchronous Procedure Call"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1055.014",
              "name": "VDSO Hijacking",
              "display_name": "T1055.014 - VDSO Hijacking"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5643,
            "domain": 700,
            "hostname": 1918,
            "FileHash-SHA256": 1161,
            "FileHash-MD5": 235,
            "email": 4,
            "FileHash-SHA1": 200,
            "CVE": 1,
            "CIDR": 2,
            "SSLCertFingerprint": 9
          },
          "indicator_count": 9873,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "20 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69aa019f4509897e354fe029",
          "name": "credit Q Vashti Cloned Pulse ",
          "description": "",
          "modified": "2026-03-29T20:03:36.333000",
          "created": "2026-03-05T22:20:15.324000",
          "tags": [
            "pattern match",
            "heuristic match",
            "all url",
            "files domain",
            "pulses otx",
            "germany unknown",
            "aaaa",
            "ip address",
            "emails",
            "gmt server",
            "vary",
            "modified",
            "accept",
            "title",
            "present feb",
            "present jan",
            "united",
            "part",
            "moved",
            "passive dns",
            "cname",
            "final",
            "bill",
            "antivm",
            "xlsx",
            "xlsm",
            "urls",
            "otx logo",
            "all hostname",
            "server",
            "organization",
            "city",
            "stateprovince",
            "postal code",
            "phone",
            "registrar abuse",
            "privacy admin",
            "paris admin",
            "april",
            "direct",
            "february",
            "http",
            "dfn verein",
            "zur foerderung",
            "domain",
            "page url",
            "tags",
            "de summary",
            "erlangen",
            "germany",
            "securitytrails",
            "de seen",
            "general info",
            "geo erlangen",
            "as as680",
            "de note",
            "route",
            "data upload",
            "extraction",
            "failed",
            "extra data",
            "referen",
            "include review",
            "exclude data",
            "summary",
            "url age",
            "as680",
            "se source",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "over",
            "ascii text",
            "mitre att",
            "size",
            "null",
            "refresh",
            "span",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "node traffic",
            "tlsv1",
            "search",
            "rgba",
            "medium",
            "read c",
            "module load",
            "t1129",
            "execution",
            "next",
            "dock",
            "write",
            "persistence",
            "calls",
            "apis",
            "reads",
            "model",
            "value",
            "getprocaddress",
            "show technique",
            "ck matrix",
            "access type",
            "windir",
            "regexp",
            "open",
            "date",
            "format",
            "virtual disk drive",
            "sha256",
            "sha1",
            "body",
            "filehashsha1",
            "found",
            "unknown",
            "stop",
            "root",
            "form",
            "9999",
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "hybrid analysis",
            "api key",
            "vetting process",
            "please note",
            "please",
            "bad traffic",
            "et info",
            "tls handshake",
            "failure",
            "flag",
            "analysis tip",
            "openurl c",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "show",
            "pulse pulses",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "malicious yara",
            "detections none",
            "less ip",
            "dynamicloader",
            "get na",
            "c3bhaw",
            "high",
            "copy",
            "guard",
            "push",
            "Palantir",
            "Foundry",
            "Whitehouse",
            "X.Com",
            "Justice.gov",
            "Apple",
            "AI",
            "node traffic"
          ],
          "references": [
            "tor.sebastianhahn.net \u2022 dap.digitalgov.gov \u2022 fbi.gov \u2022  x.com \u2022 sebastianhahn.net",
            "https://tor.sebastianhahn.net \u2022 faui2k9.de\t \u2022 gitbot.faui2k9.de \u2022 tor-dirauth.sebastianhahn.net \u2022",
            "http://truefoundry.prodigaltech.com/",
            "git.spywarewatchdog.org",
            "marriott-control-prd.accenture.cn",
            "marriott-datacenter-prd.accenture.cn",
            "accenture.cn",
            "c.j.location.host \u2022 videodata.video \u2022 referrer.search",
            "target.id  \u2022 tostring.call  \u2022 title.search",
            "https://hybrid-analysis.com/sample/2f05feed2065b7385b156ebf3a7c6c19def3d412227cee0d46e8a53fb3e9ac41/697bc423b6e7a4dc46010737",
            "https://hybrid-analysis.com/sample/430c376c1754f1f160e3d68bafc970eba37811bdb08d73a86bf6f4be1e7267b3/69a1ea603a3303fa120dad19",
            "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70/69a19551cb5537805706bca9",
            "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
            "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
            "calathea-containers.palantirfedstart.com \u2018 BYE ALREADY\u2019",
            "http://truefoundry.prodigaltech.com/",
            "Attacker being used by several legal entities attacking a target\u2019s family",
            "Clyde &Co | Chris Ahmann | Brian Sabey /Hall & Evans & Hall Render",
            "Luxury Apartments and Townhome communities do use Foundry Palantir",
            "Some Colorado communities have been taken over by the State Government",
            "Quasi Government: Specifically Pinnacol and Commerce & Industry ( AIG)",
            "Denver Justice System. Palantir allegedly moved  potato Headquarters to Miami",
            "Foundry Foot Soldiers are still in Colorado targeting innocents",
            "Foundry Palantir still has a presence in Colorado",
            "I need some help.",
            "Accurately tipped about air travel safety. In past. Proven true.",
            "Tipped of new looming airline threats",
            "Tipped on hits and other savage plans  to be executed against targets. Targets can be any (1) person.",
            "Sound crazy. We know Palantir commits ALL manner of crime. They are money motivated.",
            "FBI files opened up on a targeted phone, Iunseel, only in search history.",
            "Air Safety: it\u2019s important to have  passengers or hackers unable  to communicate via airline networks /",
            "No phones or circuit board tech. Smart watches.You can\u2019t bring large bottles of hygiene products. Deal with a new reality!",
            "Hours after files were deemed malicious. We powered on targeted Smart TV",
            "You have to go through a series of steps to change themes and wallpapers , including powering off TV",
            "Significant? The screen once had a floral theme. Now a black background with a single fish as Wallpaper .",
            "A man claiming to have the name Sebastian is communicating with targets love one",
            "Uses code, no phone calls. Connected via instagram.",
            "I\u2019m not sure what brings man to from NY to Denver today. I consider him malicious",
            "By remote view of NEW targeys view, all key calls are routed through him.",
            "Targets associated warned. Not very open to advice.",
            "I would post his public information. It may be unwise.",
            "Connects to all NEW targets key contacts main targets contacts.",
            "We have foot soldiers. Be aware",
            "https://www.justice.gov/opa/pr/departmen.t",
            "https://api.manus.im/api/oauth2_callback/apple",
            "https://apple.btprmjo.cc/",
            "https://creative.miqdigital.com/.well-known/apple-app-site-association",
            "internationalfrontier.com",
            "http://www.internationalfrontier.com/i/pdf/2017-04-03-IFR-2017.pdf",
            "http://www.internationalfrontier.com",
            "http://www.internationalfrontier.com/i/pdf/Montana-Presentation-2011.pdf",
            "https://tylerjoycedenver.followupboss.com/unsubscribe/T6pEHkEaLZAN5Jxflvspix0zKbJZwfY9pjBpUTk7q06azxItZ7aiRb7brQhy1NNFqrcrUe4cKmI455MBqcwK9_it6dqx6QWdANshp0om1Bv-5ezKkyVJDphCHvPQNvMupI1owe03rtqYAyu8Cj3cWw~~",
            "Related to: https://otx.alienvault.com/pulse/69a1a73eb0578b92962dae97"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Node Traffic",
              "display_name": "Node Traffic",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1048",
              "name": "Exfiltration Over Alternative Protocol",
              "display_name": "T1048 - Exfiltration Over Alternative Protocol"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1048.003",
              "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
              "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1555",
              "name": "Credentials from Password Stores",
              "display_name": "T1555 - Credentials from Password Stores"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1055.011",
              "name": "Extra Window Memory Injection",
              "display_name": "T1055.011 - Extra Window Memory Injection"
            },
            {
              "id": "T1055.001",
              "name": "Dynamic-link Library Injection",
              "display_name": "T1055.001 - Dynamic-link Library Injection"
            },
            {
              "id": "T1055.004",
              "name": "Asynchronous Procedure Call",
              "display_name": "T1055.004 - Asynchronous Procedure Call"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1055.014",
              "name": "VDSO Hijacking",
              "display_name": "T1055.014 - VDSO Hijacking"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "69a2127d12dce12538b57d72",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5644,
            "domain": 701,
            "hostname": 1920,
            "FileHash-SHA256": 1161,
            "FileHash-MD5": 235,
            "email": 4,
            "FileHash-SHA1": 200,
            "CVE": 1,
            "CIDR": 2,
            "SSLCertFingerprint": 9
          },
          "indicator_count": 9877,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "20 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69c1bd40f81db45dc044697c",
          "name": "Masterkey Clone By CallmeDoris",
          "description": "",
          "modified": "2026-03-23T22:22:56.940000",
          "created": "2026-03-23T22:22:56.940000",
          "tags": [
            "dropped file",
            "chromeua",
            "runtime data",
            "drmedgeua",
            "edgeua",
            "generator",
            "win64",
            "null",
            "template",
            "unknown",
            "critical",
            "addressbar",
            "desktop",
            "dark",
            "light",
            "iframe",
            "cookie",
            "meta",
            "body",
            "legend",
            "dwis",
            "core",
            "tear",
            "malicious",
            "mozilla",
            "strings",
            "qakbot",
            "://masterkey.com.ua/download/MKClientSetup.exe"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/41859e0b198fbe88772ef12c577023c0481ec19867e410bab335e67fea87c1bb/642ca80cde2048242a0e097d"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "642db7b656049e54b2f71c20",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 949,
            "URL": 5642,
            "CVE": 2,
            "domain": 509,
            "FileHash-SHA256": 293,
            "FileHash-MD5": 550,
            "FileHash-SHA1": 60,
            "email": 5
          },
          "indicator_count": 8010,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "26 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6892e73b32af18aa302df0dc",
          "name": "Part 1.5",
          "description": "Dark web media \u2022 Political news \u2022 Malvertizing\nlocate \u2022\ntrack [stalk] \u2022 record calls \u2022 control media [youtube , etc] http://t.name?n[++i]=e:this.removeEventListener\t\t\nJeeng &\nPowebox [ accidentally left out in original post pulse]",
          "modified": "2025-09-05T04:03:06.929000",
          "created": "2025-08-06T05:25:15.369000",
          "tags": [
            "chromeua",
            "optout",
            "object",
            "path",
            "value",
            "access type",
            "setval",
            "windir",
            "localappdata",
            "null",
            "win64",
            "error",
            "generator",
            "close",
            "roboto",
            "date",
            "format",
            "light",
            "span",
            "template",
            "void",
            "android",
            "body",
            "trident",
            "mexico",
            "sonic",
            "black",
            "critical",
            "desktop",
            "dark",
            "meta",
            "this",
            "june",
            "hybrid",
            "apache",
            "write",
            "crypto",
            "autodetect",
            "face",
            "courier",
            "gigi",
            "impact",
            "shadow",
            "click",
            "strings",
            "cray",
            "smwg",
            "eret",
            "footer",
            "infinity",
            "window",
            "canvas",
            "legend",
            "nuke",
            "lion",
            "4629",
            "ahav",
            "olsa",
            "false",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "file defense",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha1",
            "sha256",
            "script",
            "mitre att",
            "pattern match",
            "show technique",
            "iframe",
            "refresh",
            "august",
            "general",
            "local",
            "tools",
            "demo",
            "look",
            "verify",
            "restart",
            "url http",
            "small",
            "pulses url",
            "tellyoun",
            "showing",
            "entries",
            "url https",
            "indicator role",
            "title added",
            "active related",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "cc08",
            "f06a6b",
            "sfurl",
            "filehashsha256",
            "types",
            "indicators show",
            "search",
            "pulses",
            "filehashsha1",
            "adversaries",
            "found",
            "webp image",
            "ascii text",
            "riff",
            "size",
            "encrypt",
            "legacy",
            "filehashmd5",
            "united",
            "flag",
            "server",
            "markmonitor",
            "name server",
            "llc name",
            "overview dns",
            "requests domain",
            "country",
            "win32",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "medium risk",
            "yara",
            "detections",
            "malware",
            "copy",
            "show",
            "icmp traffic",
            "packing t1045",
            "t1045",
            "pdb path",
            "pe resource",
            "extraction",
            "data upload",
            "enter sc",
            "type",
            "extra data",
            "please",
            "failed",
            "review",
            "exclude data",
            "included review",
            "ic data",
            "suggeste",
            "stop",
            "type onow",
            "domain",
            "passive dns",
            "urls",
            "files related",
            "pulses none",
            "related tags",
            "none google",
            "safe browsing",
            "sc data",
            "extr amanuav",
            "review included",
            "manualy",
            "sugges excluded",
            "filehash",
            "md5 add",
            "pulse pulses",
            "url add",
            "http",
            "hostname",
            "files domain",
            "pulses otx",
            "virustotal",
            "hsmi192547107",
            "pulses hostname",
            "r dec",
            "customer dec",
            "iski dec",
            "decision dec",
            "va dec",
            "bitcoin",
            "bitcoin dec",
            "petra",
            "torstatus dec",
            "paul dec",
            "sodesc",
            "planet dec",
            "emilia",
            "heroin dec",
            "difference dec",
            "palantir dec",
            "loraxlive dec",
            "chaturbate dec",
            "sandra",
            "free dec",
            "marvel dec",
            "benjis dec",
            "fresh dec",
            "sodesc dec",
            "srdirport",
            "srhostname",
            "link dec",
            "types of",
            "italy",
            "china",
            "australia",
            "france",
            "turkey",
            "discovery",
            "information",
            "ck ids",
            "t1005",
            "local system",
            "t1007",
            "system service",
            "part",
            "track",
            "locate",
            "political",
            "civil society",
            "news",
            "created",
            "hours ago",
            "report spam",
            "t1555",
            "password",
            "t1560",
            "collected data",
            "t1573",
            "channel",
            "t1574",
            "execution flow",
            "scan",
            "iocs",
            "t1497",
            "u0lhmq",
            "mtawmq",
            "t1480",
            "guardrails",
            "t1486",
            "data encrypted",
            "learn more",
            "unsubscribe aug",
            "protocol",
            "t1074",
            "staged",
            "t1083",
            "t1102",
            "web service",
            "t1105",
            "tool transfer",
            "t1140",
            "data engineer",
            "candidate",
            "tlsv1",
            "odigicert inc",
            "stcalifornia",
            "lsan jose",
            "oadobe systems",
            "incorporated",
            "cndigicert sha2",
            "push",
            "next",
            "high",
            "write c",
            "ireland as16509",
            "delete",
            "dirty",
            "tags",
            "t1012",
            "flow endpoint",
            "security scan",
            "t1106",
            "copyright",
            "levelblue"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1074",
              "name": "Data Staged",
              "display_name": "T1074 - Data Staged"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1120",
              "name": "Peripheral Device Discovery",
              "display_name": "T1120 - Peripheral Device Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1486",
              "name": "Data Encrypted for Impact",
              "display_name": "T1486 - Data Encrypted for Impact"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1555",
              "name": "Credentials from Password Stores",
              "display_name": "T1555 - Credentials from Password Stores"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 608,
            "FileHash-SHA1": 433,
            "FileHash-SHA256": 3663,
            "URL": 17104,
            "domain": 1316,
            "email": 39,
            "hostname": 4208,
            "SSLCertFingerprint": 17
          },
          "indicator_count": 27388,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "226 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6892a73593f73dfc969779b0",
          "name": "Part I | Track | Locate | Political & Civil society \u2018news\u2019 campaigns",
          "description": "Part I | Track | Locate | Political & Civil society \u2018news\u2019 campaigns\n*[ddddd.msg]\n[http://tracking.eu1.glintinc.com]\n[stormer5v52vjsw66jmds7ndeecudq444woadhzr2plxlaayexnh6eqd]\n[stackstorm.ops.dev.az.glintinc.com]\n\u2022 http://stormer5v52vjsw66jmds7ndeecudq444woadhzr2plxlaayexnh6eqd.onion/peter-thiel-running-database-to-root-out-those-disloyal-to-the-leader/\\n \u2022\n[http://pixelrz.com/lists/keywords/tsara-brashears-assaulted-at-concentra/360]\n[http://pixelrz.com/lists/keywords/tsara-brashears-dead/360]",
          "modified": "2025-09-05T00:03:23.223000",
          "created": "2025-08-06T00:52:05.051000",
          "tags": [
            "url http",
            "small",
            "indicator role",
            "title added",
            "active related",
            "pulses hostname",
            "tellyoun",
            "n aug",
            "entries",
            "data upload",
            "extraction",
            "windows error",
            "june",
            "fwd urgent",
            "justice czech",
            "copy sha256",
            "rejectedfailed",
            "timestamp input",
            "message status",
            "actions august",
            "file",
            "actions june",
            "actions may",
            "cta4 https",
            "context related",
            "associated urls",
            "campaigncodedsc",
            "language",
            "uid http",
            "community",
            "sha256",
            "size42b type",
            "submitted",
            "august",
            "april",
            "internal error",
            "previous1",
            "iframe",
            "community score",
            "scan analysis",
            "malicious",
            "intelligence",
            "learn",
            "falcon sandbox",
            "submissions",
            "status",
            "adversaries",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "defense evasion",
            "windows folder",
            "found",
            "dlls",
            "impact",
            "chromeua",
            "optout",
            "object",
            "path",
            "value",
            "access type",
            "setval",
            "windir",
            "localappdata",
            "null",
            "win64",
            "error",
            "generator",
            "close",
            "roboto",
            "date",
            "format",
            "light",
            "span",
            "template",
            "void",
            "android",
            "body",
            "trident",
            "mexico",
            "sonic",
            "black",
            "critical",
            "desktop",
            "dark",
            "meta",
            "this",
            "hybrid",
            "apache",
            "write",
            "crypto",
            "autodetect",
            "face",
            "courier",
            "gigi",
            "shadow",
            "click",
            "strings",
            "cray",
            "smwg",
            "eret",
            "footer",
            "infinity",
            "window",
            "canvas",
            "legend",
            "nuke",
            "lion",
            "4629",
            "ahav",
            "olsa",
            "false"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1074",
              "name": "Data Staged",
              "display_name": "T1074 - Data Staged"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1120",
              "name": "Peripheral Device Discovery",
              "display_name": "T1120 - Peripheral Device Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1486",
              "name": "Data Encrypted for Impact",
              "display_name": "T1486 - Data Encrypted for Impact"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1555",
              "name": "Credentials from Password Stores",
              "display_name": "T1555 - Credentials from Password Stores"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 9062,
            "domain": 707,
            "hostname": 2318,
            "FileHash-MD5": 86,
            "FileHash-SHA1": 26,
            "FileHash-SHA256": 2096,
            "email": 5,
            "FilePath": 2,
            "URI": 1
          },
          "indicator_count": 14303,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "226 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68abf75bf3b03b94a6762409",
          "name": "(Repost) How to connect listeners to e.intercom | serverhub.com eonix.net",
          "description": "",
          "modified": "2025-08-25T05:40:43.552000",
          "created": "2025-08-25T05:40:43.552000",
          "tags": [
            "context",
            "error",
            "ajaxupdate",
            "request",
            "requestdata",
            "name",
            "xoctoberassets",
            "datarequest",
            "typesubmit",
            "typetext",
            "click",
            "function",
            "typeof c",
            "bootstrap",
            "javascript",
            "azaz",
            "popover",
            "typeof f",
            "typeof g",
            "typeof h",
            "vui",
            "anda",
            "tente",
            "outubro",
            "trackingclient",
            "srpanj",
            "rabu",
            "vasaris",
            "image",
            "typeof atrkopts",
            "800px",
            "40px",
            "i18n",
            "blockedemail",
            "typeof i18n",
            "hubspot",
            "captcha",
            "date",
            "please",
            "april",
            "august",
            "close",
            "february",
            "june",
            "form",
            "klik",
            "download",
            "window",
            "this",
            "next",
            "null",
            "blank",
            "este",
            "anna",
            "rserver",
            "mais",
            "void",
            "object",
            "typeerror",
            "array",
            "symbol",
            "bound",
            "typeof window",
            "typeof t",
            "invalid path",
            "unknown method",
            "phonenumber",
            "ninja",
            "typeof e",
            "edge",
            "dataname",
            "intercom",
            "typeof symbol",
            "apple",
            "webkiti",
            "criosi",
            "trident"
          ],
          "references": [
            "xfe-URL-Eonix.net-stix2-2.1-export.json",
            "xfe-URL-Serverhub.com-stix2-2.1-export.json",
            "xfe-URL-Enom.com-stix2-2.1-export 2.json",
            "https://widget.intercom.io/widget/rbc8ok9w",
            "https://js.hscollectedforms.net/collectedforms.js",
            "https://js.hsleadflows.net/leadflows.js",
            "https://d31qbv1cthcecs.cloudfront.net/atrk.js",
            "https://serverhub.com/combine/a059fe7a562c0b582328162f0ee69fda-1426025688",
            "https://serverhub.com/modules/system/assets/js/framework.js",
            "https://js.hs-scripts.com/3844463.js",
            "xfe-URL-Cloudfront.net-stix2-2.1-export.json",
            "xfe-URL-Intercom.io-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Vui",
              "display_name": "Vui",
              "target": null
            },
            {
              "id": "Outubro",
              "display_name": "Outubro",
              "target": null
            },
            {
              "id": "Tente",
              "display_name": "Tente",
              "target": null
            },
            {
              "id": "Anda",
              "display_name": "Anda",
              "target": null
            },
            {
              "id": "Vasaris",
              "display_name": "Vasaris",
              "target": null
            },
            {
              "id": "Rabu",
              "display_name": "Rabu",
              "target": null
            },
            {
              "id": "Srpanj",
              "display_name": "Srpanj",
              "target": null
            },
            {
              "id": "TrackingClient",
              "display_name": "TrackingClient",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "62719a4dec6d0aa4631b9b2f",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5708,
            "hostname": 1541,
            "FileHash-SHA256": 876,
            "domain": 915,
            "CVE": 1,
            "FileHash-MD5": 1
          },
          "indicator_count": 9042,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "237 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6844240c68255798e08beb3b",
          "name": "Bilety online: Tw\u00f3j kolejowy partner w podr\u00f3\u017cy",
          "description": "Microsoft has created a new version of its XMLHttpRequest, which allows users to access a website, via a browser or browser without the permission of a third party, using the same address.",
          "modified": "2025-07-07T00:01:51.704000",
          "created": "2025-06-07T11:35:40.942000",
          "tags": [
            "sign",
            "google sign",
            "forgot email",
            "criminalip",
            "create account",
            "bilety online",
            "sprzeday biletw",
            "polregio",
            "ssdeep",
            "license",
            "typeerror",
            "regexp",
            "promise",
            "function",
            "version",
            "typeof symbol",
            "copyright",
            "google llc",
            "apache license",
            "date",
            "without",
            "error",
            "blank",
            "trident",
            "generator",
            "class",
            "mountain view",
            "android",
            "submission",
            "california",
            "common name",
            "google inc",
            "unit android",
            "country code",
            "us state",
            "sha1",
            "sha256",
            "imphash",
            "pehash",
            "file type",
            "vhash",
            "authentihash"
          ],
          "references": [
            "http://bilety.polregio.pl",
            "https://bilety.polregio.pl",
            "http://www.salesmanago.pl/static/sm.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1295,
            "hostname": 302,
            "domain": 137,
            "FileHash-SHA256": 996,
            "FileHash-MD5": 38,
            "FileHash-SHA1": 40,
            "IPv4": 1
          },
          "indicator_count": 2809,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 122,
          "modified_text": "286 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "67f33233092ab19b74879403",
          "name": "MacOS M2 Chip Infiltration: Game Center & XBOX Pod Game & Chat Server",
          "description": "pulse explores a variety of files, objects, and functions that could be associated with different system components, libraries, and protocols. It highlights a wide range of potential vulnerabilities that may exist in software related to system functions, APIs, data handling, and device interactions, including issues in devices like game controllers, HID devices, and platform-specific services (such as Apple and Android). The pulse references several components across different platforms (macOS, iOS, ARM architectures, and others), with a focus on low-level code, encryption libraries, system utilities, and network protocols like TCP, IP, and Bluetooth. The identified vulnerabilities could involve buffer overflows, deprecated functions, improper memory handling, and potential exploit vectors related to system security, performance, and integrity.",
          "modified": "2025-05-07T02:03:20.735000",
          "created": "2025-04-07T02:02:27.322000",
          "tags": [
            "helper macro",
            "param",
            "param inccache",
            "kerberos",
            "ccache",
            "api function",
            "ccapi",
            "api version",
            "param ioccache",
            "ccacheserver",
            "win32",
            "null",
            "code",
            "win64",
            "error",
            "union",
            "ccapideprecated",
            "ccacheapi",
            "ccapiv2h",
            "apple",
            "export",
            "united",
            "ccache api",
            "cplusplus",
            "x8664",
            "typedef",
            "patheq",
            "none",
            "popen",
            "terminate",
            "false",
            "winenv",
            "winexe",
            "frozen",
            "winservice",
            "python",
            "posixthreads",
            "pyhavecondvar",
            "ntthreads",
            "vista",
            "pyemulatedwincv",
            "ntddivista",
            "semaphore",
            "pycondt",
            "win7",
            "pybuildcore",
            "fall",
            "copyright",
            "technology",
            "all rights",
            "reserved",
            "america",
            "government",
            "within that",
            "klprincipal",
            "klloginoptions",
            "inpassword",
            "klboolean",
            "klindex inindex",
            "login",
            "klstatus",
            "kerberos login",
            "inst",
            "regexp",
            "typeof e",
            "function",
            "typeof t",
            "typeof o",
            "width",
            "typeof",
            "pseudo",
            "body",
            "sticky",
            "date",
            "class",
            "this",
            "void",
            "accept",
            "span",
            "krb5callconv",
            "apoptsreserved",
            "tktflgreserved",
            "kdcoptreserved",
            "krb5data",
            "eblock",
            "krb5address",
            "krb5keyblock",
            "service",
            "realm",
            "format",
            "general",
            "internal",
            "entropy",
            "mask",
            "mcpeerid",
            "mcsession",
            "property",
            "protocol",
            "create",
            "nsuinteger",
            "notifies",
            "mcsession api",
            "interface",
            "bonjour",
            "ascii lowercase",
            "abc company",
            "section",
            "bonjour txt",
            "mcextern",
            "attribute",
            "mcextern extern",
            "mcexternweak",
            "nsenum",
            "nsinteger",
            "mcerrorcode",
            "mcerrorunknown",
            "mcerrortimedout",
            "bonjour apis",
            "stop",
            "peer",
            "example",
            "tags",
            "session",
            "nsprogress",
            "nserror",
            "nsstring",
            "nsurl",
            "nsarray",
            "note",
            "ui element",
            "utf8 encoding",
            "nscopying",
            "nsdictionary",
            "webpackrequire",
            "webpackexports",
            "object",
            "adobe systems",
            "adobe",
            "incorporated",
            "dissemination",
            "touchmove",
            "window",
            "launch",
            "close",
            "core",
            "webview",
            "nwebpackrequire",
            "arraybuffer",
            "name",
            "typedarray",
            "prototype",
            "string",
            "number",
            "nvar",
            "meta",
            "infinity",
            "generator",
            "zero",
            "epsilon",
            "observer",
            "android",
            "freeze",
            "trim",
            "canvas",
            "simple",
            "bind",
            "fast",
            "next",
            "patch",
            "rest",
            "middle",
            "find",
            "enumerate",
            "facebook",
            "executor",
            "apiunavailable",
            "gamecontroller",
            "gcbuttoninput",
            "gcswitchinput",
            "nsobject",
            "apiavailable",
            "hid device",
            "cfstr",
            "iohiddeviceref",
            "boolean value",
            "c iohidmanager",
            "iohidmanager",
            "c iohiddevice",
            "issequential",
            "bool sequential",
            "bool canwrap",
            "nsset",
            "nsunavailable",
            "gcswitchelement",
            "bool",
            "share button",
            "xbox controller",
            "xbox elite",
            "xbox series",
            "gcxboxgamepad",
            "gcpoint2",
            "gcpoint2make",
            "gcpoint2 p",
            "cfinline bool",
            "gcpoint2equal",
            "gcpoint2 point1",
            "gcpoint2 point2",
            "gcrelativeinput",
            "isanalog",
            "bool analog",
            "hasinclude",
            "gcaxis2dinput",
            "gcpoint2 value",
            "gcaxiselement",
            "certain",
            "gcaxisinput",
            "gcbuttonelement",
            "gccontroller",
            "nsnotification",
            "chhapticengine",
            "gcmicrogamepad",
            "input",
            "menu button",
            "gcdevicelight",
            "gccolor",
            "x axis",
            "xvalue",
            "developers",
            "functionality",
            "options button",
            "sf symbols",
            "elements",
            "gcdevice",
            "gctouchstate",
            "gctouchstateup",
            "apideprecated",
            "gckeyboard",
            "gcmouse",
            "nsswiftname",
            "gcdevicebattery",
            "battery level",
            "direction pad",
            "directionapad",
            "thumbstick",
            "gcdevicecursor",
            "a controller",
            "gccolor color",
            "gcinputbuttona",
            "gcinputbuttonb",
            "button b",
            "check",
            "a element",
            "c nil",
            "nsenumerator",
            "siri remote",
            "equivalent",
            "down",
            "left",
            "right",
            "kindof",
            "handle button",
            "c device",
            "immediate input",
            "dualsense",
            "positional",
            "sony dualsense",
            "gcmotion",
            "dualshock",
            "uievent",
            "controllers",
            "uikit user",
            "uiview",
            "method",
            "nsdata",
            "axes",
            "nsdata source",
            "return",
            "nullable",
            "nsdata object",
            "button",
            "shoulder",
            "extended",
            "gamepad profile",
            "nsdata api",
            "gcgamepad",
            "sizeof",
            "standard",
            "gckeyboardinput",
            "keyboard",
            "nsstring const",
            "controller",
            "back buttons",
            "game controller",
            "back",
            "keypad",
            "delete",
            "insert",
            "home",
            "right arrow",
            "left arrow",
            "down arrow",
            "up arrow",
            "korean",
            "backspace",
            "alongside",
            "gckeyuparrow",
            "gckeycode const",
            "lang1",
            "gclinearinput",
            "gcquaternion",
            "gcacceleration",
            "y axis",
            "z axis",
            "gcmouse mouse",
            "gcmouse class",
            "mice",
            "gcmouseinput",
            "mouse profile",
            "scroll",
            "nsdata instance",
            "a alias",
            "press",
            "micro profile",
            "siri remotes",
            "b button",
            "a gcinput",
            "button a",
            "nsoptions",
            "examining",
            "c sfsymbolsname",
            "apple tv",
            "remote",
            "control center",
            "a set",
            "game",
            "gcracingwheel",
            "gcbundlewithpid",
            "gcinputbuttonx",
            "gcinputbuttony",
            "gcinputshifter",
            "gckeya",
            "gckeyb",
            "gckeybackslash",
            "rawvalue",
            "apple swift",
            "o librarylevel",
            "swift import",
            "element",
            "indices",
            "iterator",
            "subsequence",
            "kerberoscomerr",
            "const",
            "permission",
            "mit software",
            "suitability",
            "athena",
            "openvision",
            "gssdllimp",
            "gssapigenerich",
            "this software",
            "purpose",
            "disclaims all",
            "warranties with",
            "regard to",
            "constraint",
            "kerberosprofile",
            "krb5profileh",
            "const names",
            "newvalue",
            "1429577728l",
            "gnuc",
            "mach",
            "omuint32",
            "gssapikrb5h",
            "form",
            "uid form",
            "client function",
            "asrep",
            "including",
            "preauth",
            "db entry",
            "free",
            "pointer",
            "rock",
            "neither",
            "direct",
            "damage",
            "minorstatus",
            "gssbuffert",
            "gssctxidt",
            "gssoid",
            "gssnamet",
            "gsscredidt",
            "gssoidset",
            "gssapi",
            "first",
            "alcapi",
            "alcapientry",
            "alcboolean",
            "targetosmac",
            "alcdevice",
            "alcenum param",
            "alalch",
            "alcchar",
            "alcsizei",
            "capture",
            "but not",
            "limited",
            "openal cross",
            "apple computer",
            "redistribution",
            "is provided",
            "type",
            "alvoid",
            "alint",
            "openal",
            "aluint sid",
            "alenum",
            "alint value",
            "aluint property",
            "alvoid nonnull",
            "alfloat",
            "write",
            "openalopenalh",
            "umbrella header",
            "alenum param",
            "alapi",
            "aluint bid",
            "alsizei",
            "alfloat value",
            "alapientry",
            "aluint",
            "verify",
            "play",
            "speed",
            "bits",
            "albuffer3i",
            "albufferdata",
            "albufferf",
            "albufferfv",
            "albufferi",
            "albufferiv",
            "aldistancemodel",
            "aldopplerfactor",
            "algetbooleanv",
            "algetbuffer3f",
            "iousbhostdevice",
            "iousbhostobject",
            "iousbhostpipe",
            "iousbhoststream",
            "iousbhost",
            "brief",
            "usb host",
            "bool yes",
            "bool no",
            "advance",
            "iousbhostfamily",
            "kernel",
            "ioreturn status",
            "nsnumber",
            "ioreturn error",
            "usb device",
            "select",
            "commands",
            "enqueue",
            "nsmutabledata",
            "field",
            "enum",
            "options",
            "retrieve",
            "iosource",
            "current address",
            "bos descriptor",
            "extract",
            "a descriptor",
            "license",
            "io request",
            "abort",
            "discussion",
            "stream",
            "please",
            "swift api",
            "iousbbitrange",
            "iousbbitrange64",
            "iousbbit",
            "client",
            "usb controller",
            "usb descriptor",
            "unknown",
            "critical",
            "refer",
            "link",
            "send",
            "same",
            "common ui",
            "bluetooth",
            "service browser",
            "option",
            "1001",
            "cfstringref",
            "deprecated",
            "macos",
            "returns",
            "abstract",
            "nswindow",
            "creates",
            "mac os",
            "uuids",
            "uuid",
            "sdp service",
            "nsimage",
            "nsview",
            "mpasskeystring",
            "nsmutablearray",
            "uuid array",
            "ioreturn",
            "runmodal",
            "group",
            "command",
            "byte",
            "masks",
            "pduid",
            "l2cap",
            "range",
            "opcode",
            "packet",
            "major",
            "local",
            "profiles",
            "iobluetooth",
            "framework",
            "support",
            "host controller",
            "rfcomm",
            "minor class",
            "pseudoclass",
            "specific device",
            "headset",
            "peripheral",
            "desktop",
            "glasses",
            "device reset",
            "no hci",
            "hci controller",
            "returns number",
            "variable number",
            "packdata",
            "cstring",
            "pass",
            "path",
            "deprecated in",
            "obex session",
            "obexsessionref",
            "rfcomm channel",
            "obex",
            "does not",
            "l2cap channel",
            "inrefcon",
            "device",
            "length",
            "obex spec",
            "error code",
            "make",
            "headerid",
            "april",
            "alarm",
            "avrcplog",
            "audiolog",
            "bccmd16touint16",
            "bccmd16touint8",
            "bccmd32touint32",
            "hfplog",
            "obexcreatevcard",
            "obexsessionget",
            "uint16tobccmd16",
            "intents",
            "created",
            "andrea gottardo",
            "inimage",
            "intentsui",
            "project version",
            "inshortcut",
            "ibdesignable",
            "invoiceshortcut",
            "nsbundle",
            "siri",
            "beralloct",
            "berbvarrayadd",
            "berbvarrayfree",
            "berbvdup",
            "berbvecadd",
            "berbvecfree",
            "berbvfree",
            "berdump",
            "berdup",
            "berdupbv",
            "ldap",
            "vdspinput1",
            "vectorsize",
            "iirchannel",
            "osvkerndsplib",
            "pragmaonce",
            "paul chang",
            "fri mar",
            "original code",
            "apple operating",
            "modifications",
            "apple public",
            "source license",
            "version",
            "lframesize",
            "i386",
            "picify",
            "callmcount",
            "nonlazystub",
            "align",
            "roundtostack",
            "leaf",
            "import",
            "carnegie mellon",
            "carnegie",
            "inline void",
            "software",
            "school",
            "august",
            "xnuarchi386selh",
            "next computer",
            "mike demoney",
            "bruce martin",
            "state segment",
            "nxswappedfloat",
            "osswapint32",
            "inline float",
            "inline double",
            "osswapint64",
            "armlimitsh",
            "arm64",
            "useclangtypes",
            "bsdarmtypesh",
            "int8t",
            "gnuc typedef",
            "uint8t",
            "ansi c",
            "ansi",
            "use wchart",
            "armmcontexth",
            "mcontextt",
            "armparamh",
            "round",
            "darwinsizet",
            "darwinalign",
            "uint32t",
            "darwinalign32",
            "warranties",
            "a particular",
            "university",
            "armarch6zk",
            "armarch6k",
            "armarch4t",
            "armarch4",
            "http",
            "capbitnb",
            "legacy",
            "armfeatureflag",
            "california",
            "notice",
            "berkeley",
            "limited to",
            "define",
            "useclanglimits",
            "lp64",
            "ansisource",
            "darwincsource",
            "longmin",
            "ulongmax",
            "parameter",
            "vmmemcoherent",
            "vmmemearlyack",
            "vmmeminner",
            "vmmemrt",
            "vmmemguarded",
            "armmemorytypesh",
            "armpalroutinesh",
            "read",
            "struct",
            "booleant",
            "cluster",
            "devbsize",
            "mclbytes",
            "unix system",
            "laboratories",
            "devbshift",
            "thumb",
            "armv5",
            "armv7",
            "cache",
            "neon",
            "swift",
            "bsdarmprofileh",
            "xxx todo",
            "block",
            "mcount",
            "mcountinit",
            "mcountenter",
            "splhigh",
            "armthreadh",
            "armtraph",
            "dflssiz",
            "targetososx",
            "maxssiz",
            "rliminfinity",
            "maxcsiz",
            "bsdarmvmparamh",
            "dfldsiz",
            "maxdsiz",
            "xxx stack",
            "armsignal",
            "int64t",
            "armmachtypesh",
            "int32t",
            "methods",
            "thread",
            "hasapplepac",
            "atmatmtypesh",
            "libkernlocksh",
            "fortifysource",
            "libkerncopyioh",
            "sizedby",
            "darwinosinline",
            "stdcversion",
            "osswapint16",
            "libkerncrch",
            "blockexport",
            "vaargs",
            "blockrelease",
            "blockh",
            "collection",
            "blockcopy",
            "ososbaseh",
            "base",
            "byteoffset",
            "host endianess",
            "generic host",
            "generic",
            "osmalloc",
            "osmalloctag tag",
            "osmalloctag",
            "pci device",
            "uint32",
            "uint32 mask",
            "safecastptr",
            "sint32",
            "osaddatomic64",
            "uint8",
            "libkern c",
            "internal error",
            "core osreturn",
            "libkern",
            "values",
            "pragmamark",
            "kexts",
            "kext",
            "c string",
            "grab",
            "osostypesh",
            "boolean",
            "unsignedwide",
            "uint32 hi",
            "buildtime value",
            "libkernversionh",
            "versionmajor",
            "versionminor",
            "versionvariant",
            "versionrevision",
            "ostype",
            "osrelease",
            "libkernsysctlh",
            "instructions",
            "data cache",
            "future",
            "rbleft",
            "rbright",
            "rbgetparent",
            "splayright",
            "splayleft",
            "rbsetcolor",
            "rbblack",
            "rbgetcolor",
            "comp",
            "main",
            "stdc",
            "msdos",
            "windows",
            "sys16bit",
            "zlibdll",
            "zextern",
            "zconfh",
            "model",
            "zextern int",
            "zstreamerror",
            "znull",
            "zbuferror",
            "zmemerror",
            "zstreamend",
            "zdataerror",
            "zfinish",
            "enough",
            "possible",
            "trailer",
            "compiler",
            "countedby",
            "sparta",
            "osatomic",
            "ipcipctypesh",
            "ipcobjectnull",
            "ipcobjectdead",
            "osreturn",
            "nfskrpch",
            "xdrbuf",
            "xdrbuf xbp",
            "xbptr",
            "xbleft",
            "tlen",
            "lval",
            "xbcleanup",
            "xbtype",
            "xbflags",
            "nfsargsversion",
            "file",
            "packed",
            "nfshz",
            "mount",
            "term",
            "restrict",
            "stats",
            "nfsbitmapset",
            "nfsver3",
            "nfsxunsigned",
            "attr",
            "nfsprogram",
            "nfssmallfh",
            "which",
            "from",
            "mark",
            "obsolete",
            "ip address",
            "iaddrt",
            "netinetbootph",
            "nvmaxtext",
            "magic",
            "etheraddrlen",
            "target",
            "byteorder",
            "bigendian",
            "littleendian",
            "dest",
            "igmp",
            "ushort",
            "inpcbptr",
            "inpcblistentry",
            "ipsec",
            "pcbs",
            "cookie",
            "netinetinstath",
            "minimal",
            "result",
            "arp packet",
            "icmpparamprob",
            "icmpredirect",
            "address",
            "ditto",
            "ip filter",
            "ipv4",
            "ip packet",
            "inject",
            "wifi",
            "server",
            "tcpmaxnotifyack",
            "wired",
            "ecn setup",
            "notify",
            "slow",
            "definitions",
            "tcptmax",
            "retransmit",
            "mptcp",
            "tcpsclosewait",
            "tcpsestablished",
            "tcpstimewait",
            "tcpseq",
            "timer drift",
            "sack",
            "char",
            "icmp",
            "synack",
            "tcpoptnop",
            "syndata",
            "ver",
            "internet",
            "iopcidevice",
            "constant",
            "perst",
            "localonly",
            "iooptionbits",
            "optional access",
            "ioservice",
            "open",
            "pcidriverkith",
            "osmetaclassbase",
            "iorpc rpc",
            "auditpipeiobase",
            "auditsdeviobase",
            "ioctls",
            "data",
            "the software",
            "stdargh",
            "hasincludenext",
            "eli friedman",
            "as is",
            "hack",
            "atomic",
            "atomicseqcst",
            "clangstdatomich",
            "stdchosted",
            "stdboolh",
            "needwintt",
            "stddefh",
            "hasbuiltin",
            "const src",
            "xnumembersize",
            "const dst",
            "wcharmax",
            "wcharmin",
            "limits",
            "kernelstdinth",
            "lp64 typedef",
            "intmaxc",
            "uintmaxc",
            "ptrauth",
            "olddata",
            "value",
            "declkey",
            "abi pointer",
            "c function",
            "float16",
            "fltevalmethod",
            "legacy bsd",
            "c standard",
            "sincospi",
            "cosp",
            "x8664monotonich",
            "staticifentry",
            "hasmte",
            "vmmemorytypesh",
            "vmwimgdefault",
            "wimg",
            "extvectortype",
            "utilfunction",
            "aligned",
            "srcptr",
            "vmpmaph",
            "vmdyldpagerh",
            "vmvmfaulth",
            "vmvmmaph",
            "development",
            "debug",
            "vmvmoptionsh",
            "vmvmpageouth",
            "kasantbi",
            "machvmmemtagh",
            "given",
            "vmmemtagptrsize",
            "vmmemtagtagsize",
            "copy",
            "vmsharedregionh",
            "vfsvfssupporth",
            "veclib",
            "master",
            "world wide",
            "various",
            "veclibtypes",
            "carbonlib",
            "availability",
            "carbon",
            "noncarbon cfm",
            "vbasicops",
            "shift",
            "vforceh",
            "vdsplength n",
            "realp",
            "nonnull",
            "vector",
            "dspsplitcomplex",
            "ieee",
            "dspcomplex",
            "uuiduuidh",
            "uuiddefine",
            "public",
            "uuid library",
            "kernelserver",
            "simpleroutine",
            "undkey",
            "execution",
            "strings array",
            "user",
            "title string",
            "info",
            "1024",
            "xmldatat",
            "undreplyref",
            "kernsuccess",
            "osaction",
            "targetosiphone",
            "istargetvendor",
            "targetcpux8664",
            "targetosunix",
            "targetcpuppc",
            "targetcpuppc64",
            "targetcpux86",
            "targetrtmaccfm",
            "bridge",
            "svflags",
            "svpavreal",
            "svpavreify",
            "xpvav",
            "svany",
            "avfillp",
            "for apidoc",
            "mutableav",
            "avrealoff",
            "pltopenv",
            "stmtstart",
            "stmtend",
            "copfile",
            "plcurstackinfo",
            "copfilegv",
            "cophinthashget",
            "loop",
            "stack",
            "beware",
            "orig",
            "loops",
            "this file",
            "the build",
            "plbitcount",
            "u8 value",
            "cvflags",
            "xpvcv",
            "mutableptr",
            "perlcore",
            "cvgv",
            "cvfile",
            "cvfmethod",
            "cvflvalue",
            "cvfconst",
            "anon",
            "doinit extconst",
            "ebcdic",
            "extconst u8",
            "index",
            "ascii platform",
            "confusingly",
            "u8 pla2e",
            "pla2e",
            "u8 ple2a",
            "guard",
            "declspec",
            "extconst",
            "ext externc",
            "init",
            "larry wall",
            "gnu general",
            "readme file",
            "multiplicity",
            "plsawampersand",
            "do not",
            "perliogetc",
            "perlioputc",
            "perliostdoutf",
            "perlio",
            "perlfeatureh",
            "featuresubbit",
            "featuremyrefbit",
            "featurefcbit",
            "featureisabit",
            "featuresaybit",
            "featurestatebit",
            "featuretrybit",
            "hintfeaturemask",
            "ffspace",
            "process",
            "ffdecimal",
            "ffend",
            "gvgp",
            "gvflags",
            "gvnamehek",
            "svtype",
            "gvegv",
            "gvstash",
            "gvxpvgv",
            "svtpvgv",
            "svtpvlv",
            "super",
            "edit directly",
            "djgpp",
            "bitbucket",
            "perlsysinitbody",
            "perlioinit",
            "perlsystermbody",
            "w macros",
            "wexitstatus",
            "shpath",
            "mkdir",
            "rotl64",
            "rotl32",
            "rotate x",
            "rotr32",
            "can64bithash",
            "rotr64",
            "ivsize",
            "u8to16le",
            "rotluv",
            "rotruv",
            "sbox32maxlen",
            "plhashstate",
            "perlhash",
            "perl",
            "usehashseed",
            "perlseenhvfunch",
            "perlhashseed",
            "siphash24",
            "siphash13",
            "seed",
            "c program",
            "c type",
            "c compiler",
            "gcc attribute",
            "longsize",
            "c preprocessor",
            "install",
            "kill",
            "cont",
            "thus",
            "ext declspec",
            "dext",
            "for apidocitem",
            "utf8",
            "ascii",
            "fitsin8bits",
            "nativetolatin1",
            "strwithlen",
            "u8 end",
            "test",
            "poison",
            "february",
            "cray",
            "prior",
            "behaviour",
            "except",
            "alpha",
            "perlvar",
            "perlvari",
            "perlvara",
            "padoffset",
            "true",
            "pmop",
            "hooks",
            "hook",
            "sv invlist",
            "perlinregcompc",
            "svcur",
            "perlinopc",
            "tointernalsize",
            "svtinvlist",
            "invlistlen",
            "strlen",
            "hvaux",
            "heklen",
            "svook",
            "hekutf8",
            "hekkey",
            "hekflags",
            "mutablehv",
            "hvnameheknn",
            "gosh",
            "leave",
            "iperlsock",
            "plsock",
            "iperlstdio",
            "plstdio",
            "iperlproc",
            "plproc",
            "iperllio",
            "pllio",
            "perlimplicitsys",
            "plink",
            "keypackage",
            "keyend",
            "keysub",
            "keydump",
            "keylog",
            "keysend",
            "keystate",
            "perlioclose",
            "perlmemcollxfrm",
            "nativetoneed",
            "plclocaleobj",
            "plno",
            "plwarnall",
            "plwarnnone",
            "plyes",
            "plzero",
            "plc9utf8dfatab",
            "nomathoms",
            "perlintokec",
            "perlinutf8c",
            "perlinsvc",
            "perlinregexecc",
            "debugging",
            "perlinlocalec",
            "pfinet",
            "snoop",
            "ccprint",
            "ccgraph",
            "cccharnamecont",
            "ccascii",
            "ccwordchar",
            "ccalphanumeric",
            "ccidfirst",
            "ccquotemeta",
            "ccalpha",
            "cccased",
            "ordinal",
            "magicvtablemax",
            "extra",
            "regex match",
            "env hash",
            "isa array",
            "debugger",
            "sig hash",
            "available",
            "shadow",
            "array length",
            "magic mg",
            "sv sv",
            "mgftainteddir",
            "hefsvkey",
            "mutablesv",
            "ssizet",
            "mgvtbl entry",
            "mgfbytes",
            "perlmagicsv 0",
            "special",
            "perlmagicarylen",
            "perlmagicrhash",
            "extra data",
            "perlmagicpos",
            "perlmagicsymtab",
            "provides",
            "dtrace probes",
            "stdioh",
            "stdioincluded",
            "sfioversion",
            "rxfpmfcharset",
            "rxfpmfmultiline",
            "rxfpmffold",
            "rxfpmfextended",
            "rxfpmfnocapture",
            "rxfpmfkeepcopy",
            "flags",
            "rxfpmfstrict",
            "ocshift",
            "plop",
            "perlbitfield16",
            "baseop op",
            "useithreads",
            "pmfonce",
            "padop",
            "perlcknull",
            "perlckfun",
            "opparg1mask",
            "opparg4mask",
            "opparg2mask",
            "perlckftst",
            "perlppftrowned",
            "perlckbitop",
            "perlckcmp",
            "perlcklfun",
            "dump",
            "chroot",
            "syscall",
            "flip",
            "undef",
            "crypt",
            "push",
            "stub",
            "trans",
            "predec",
            "flop",
            "prtf",
            "shutdown",
            "perlcontext cx",
            "perlmemlog",
            "c pointer",
            "cxtype",
            "logic",
            "toavamg",
            "tohvamg",
            "opftrread",
            "oplt",
            "opincmp",
            "opbitand",
            "opsbitor",
            "opsend",
            "opgetpeername",
            "opfteexec",
            "opftbinary",
            "opclose",
            "plparser",
            "yylex",
            "lexshared",
            "position",
            "repl",
            "memsize",
            "malloct",
            "perlmallocctlh",
            "uv nfree",
            "uv ntotal",
            "iv topbucket",
            "iv totalsbrk",
            "iv minbucket",
            "level",
            "plcomppad",
            "plcurpad",
            "uvxf",
            "ptr2uv",
            "avarray",
            "padnameflags",
            "plcopseqmax",
            "padlistarray",
            "c array",
            "padnametype",
            "incpushperl5lib",
            "appllibexp",
            "privlibexp",
            "defineincmacros",
            "perlfsversion",
            "perl5lib",
            "sitearchexp",
            "perllanginfoh",
            "hasnllanginfo",
            "ilanginfo",
            "codeset",
            "codeset 1",
            "dtfmt",
            "dtfmt 2",
            "dfmt",
            "dfmt 3",
            "sipround",
            "u8to64le",
            "fallthrough",
            "uint64c",
            "perlsiphashfnc",
            "siprounds",
            "strlen inlen",
            "sipfinalrounds",
            "could",
            "configure",
            "plout",
            "mine001",
            "argv",
            "plin",
            "localpatchcount",
            "perlapih",
            "xs code",
            "portingglossary",
            "first version",
            "brand",
            "symbols",
            "haswcrtomb",
            "perlionotstdio",
            "perlcallconv",
            "perlio f",
            "perlioh",
            "usestdio",
            "case",
            "bufsiz",
            "sizet",
            "perlstability",
            "perltypedefs",
            "perldtracehin",
            "perlloadedfile",
            "perlloadingfile",
            "perlopentry",
            "perlphasechange",
            "perlsubentry",
            "perlsubreturn",
            "generated",
            "perlcallconv iv",
            "sizet count",
            "sv arg",
            "mode",
            "perliofuncs tab",
            "stdchar",
            "perliolistt",
            "sv args",
            "mutex",
            "perlinterpreter",
            "sigsize",
            "perlioisstdio",
            "perlcallconv op",
            "perldokv",
            "perlppaassign",
            "perlppabs",
            "perlppaccept",
            "perlppadd",
            "perlppaeach",
            "perlppaelem",
            "public license",
            "free software",
            "foundation",
            "yydebug",
            "bison",
            "bareword",
            "funcmeth",
            "arrow",
            "targ",
            "pushs",
            "tops",
            "does",
            "xsub",
            "pops",
            "xpushs",
            "erange",
            "perlreentrapi",
            "perlreentrapi0",
            "hostentsize",
            "getgrentrproto",
            "getpwentrproto",
            "getnetentrproto",
            "grentbuffer",
            "grentsize",
            "hostenterrno",
            "redebugflag",
            "debugvtest",
            "debugr",
            "u16 nextoff",
            "argset",
            "u8 type",
            "nextoff",
            "strings",
            "problem",
            "june",
            "invert",
            "perlfpclass",
            "longdoublekind",
            "plstatusvalue",
            "pldebug",
            "numclasses",
            "locale",
            "grok",
            "pragma",
            "dword",
            "attack",
            "little",
            "lynx",
            "done",
            "reany",
            "rxpextflags",
            "rxextflags",
            "checkpoint cp",
            "rxftaintedseen",
            "rxfcopydone",
            "plsavestackix",
            "plsavestack",
            "plsavestackmax",
            "ssmaxpush",
            "enter",
            "debugscope",
            "state",
            "u32 state",
            "debugsbox32hash",
            "sbox32warn5",
            "line",
            "mutexunlock",
            "mutexinit",
            "noop",
            "mutexlock",
            "condinit",
            "detach",
            "panic",
            "usetm64",
            "should",
            "bsd extension",
            "configuration",
            "time64debug",
            "int64t nv",
            "gnu extension",
            "perltime64h",
            "time64t",
            "int64t int64",
            "int64 time64t",
            "i32 year",
            "tm64",
            "hastmtmgmtoff",
            "decide",
            "svpvx",
            "svgmagic",
            "bonk",
            "anything",
            "turn",
            "crash",
            "fstat",
            "perlmicro",
            "hasioctl",
            "hasutime",
            "hasgroup",
            "haspasswd",
            "usemybinmode",
            "idirent",
            "likely",
            "generated code",
            "utfebcdic",
            "unicode",
            "step",
            "ufeff",
            "u00a0",
            "u00df",
            "u00b5",
            "ufffd",
            "u017f",
            "u0300",
            "unlikely",
            "nativeutf8toi8",
            "utf8skip",
            "nativetouni",
            "lazy",
            "extrasize",
            "regnodemax",
            "exact",
            "match",
            "whilem",
            "anyof",
            "curly",
            "trie",
            "curlym",
            "eval",
            "star",
            "perlutilh",
            "hsmapiverlen",
            "hsxsverlenmax",
            "hskeyp",
            "tools",
            "sv vs",
            "perlversionlt",
            "svpvxnolenconst",
            "perlckwarner",
            "u32 err",
            "scroakxsusage",
            "pluumap",
            "warnings",
            "categories",
            "plcurcop",
            "perlckwarn",
            "perlckwarnd",
            "perlwarnisset",
            "perlwarnoff",
            "perlwarnbit",
            "xsversion",
            "xsreturn",
            "perlxshandshake",
            "plstackbase",
            "hskey",
            "zaphod32mix",
            "u8to32le",
            "zaphod32warn4",
            "zaphod32warn3",
            "zaphod32warn6",
            "perlform",
            "i8tonativeutf8",
            "warnutf8",
            "myshift",
            "c extension",
            "libs",
            "cflags",
            "afkuserlog",
            "kafkeventcancel",
            "kafkeventerror",
            "adamsbagmanager",
            "adjinglerequest",
            "isinternalbuild",
            "kickmcxdforuid",
            "loadappkit",
            "ardconfig",
            "authenticator",
            "dsauthenticator",
            "dsnode",
            "dsrecord",
            "hostconfig",
            "addtofront",
            "calcslope",
            "copyarray",
            "createcachenode",
            "defaultebecurve",
            "deletecache",
            "disablehcucache",
            "dumpcache",
            "dumpoutputhcu",
            "enablet1sim",
            "ascagent",
            "ascagentproxy",
            "asdevice",
            "ddrangecompare",
            "wdosloglauncher",
            "wdoslogprotocol",
            "findchar",
            "ddasllogger",
            "ddfilelogger",
            "ddlog",
            "ddlogfileinfo",
            "ddlogmessage",
            "ddloggernode",
            "mkurlparser",
            "mkerrordomain",
            "mkintegerhash",
            "mklonghash",
            "mkmaprectinset",
            "mkmaprectnull",
            "mkmaprectoffset",
            "mkmaprectworld",
            "mkmapsizeworld",
            "kextensionnonui",
            "wkarraycreate",
            "wkbooleancreate",
            "wkcontextcreate",
            "wkdatacreate",
            "wkdatagettypeid",
            "wkdoublecreate",
            "wkframecopyurl",
            "wkgettypeid",
            "wkimagecreate",
            "wkpagecandelete",
            "webkit",
            "methodkind",
            "wkerrordomain",
            "by apple",
            "document",
            "a block",
            "wkcontentworld",
            "wkwebview",
            "javascript",
            "wkerrorcode",
            "wkerrorunknown",
            "nsswiftasync",
            "wkswiftasync",
            "wkcookiepolicy",
            "nshttpcookie",
            "whether",
            "wknavigation",
            "wkdownload",
            "decides",
            "mime type",
            "wkscriptmessage",
            "wkframeinfo",
            "information",
            "url scheme",
            "wkcontentmode",
            "wkuserscript",
            "wkextern",
            "media",
            "promise",
            "fulfill",
            "cgfloat",
            "targetoswatch",
            "sign",
            "password",
            "provider",
            "uicontrol",
            "nscontrol",
            "opaque user",
            "apple id",
            "nsstring user",
            "asuseragerange",
            "initiate",
            "asauthorization",
            "confirms",
            "apple upgrade",
            "nserrorenum",
            "operation",
            "relying party",
            "targetosvision",
            "a byte",
            "nsdata userid",
            "relying",
            "a string",
            "asapiavailable",
            "http response",
            "authorization",
            "oauth",
            "saml",
            "nsdata readdata",
            "bool didwrite",
            "a cose",
            "nsstring name",
            "bool appid",
            "targetosxr",
            "a state",
            "a json",
            "web token",
            "private seckeys",
            "nsstring appid",
            "mdm profile",
            "nsurl url",
            "returns yes",
            "lacontext",
            "asswiftsendable",
            "keychain",
            "cose algorithm",
            "ecdsa",
            "sha256",
            "cose curve",
            "p256",
            "nsinteger rank",
            "enables",
            "bool success",
            "remove",
            "call",
            "complete",
            "prepare",
            "attempt",
            "list",
            "nsextension",
            "settings",
            "initializes",
            "a key",
            "extensions",
            "hash",
            "json",
            "initialize",
            "nsstring origin",
            "settings app",
            "urls",
            "https urls",
            "safari",
            "cancel",
            "nsuuid uuid",
            "asextern extern",
            "asextern",
            "nsswiftsendable",
            "uiwindow",
            "propertykind",
            "gkplayer",
            "n tags",
            "gkerrordomain",
            "gamecenter",
            "targetosios",
            "targetostv",
            "nsavailable",
            "gkachievement",
            "local player",
            "view",
            "present",
            "optional",
            "gkbaseplayer",
            "game center",
            "uiimage",
            "app store",
            "gkchallenge",
            "gklocalplayer",
            "nsdeprecated",
            "a singleton",
            "gkcloudplayer",
            "returns nil",
            "nsdeprecatedmac",
            "internal2",
            "internal3",
            "internal4",
            "gkscore",
            "gkextern",
            "gkextern extern",
            "gkexternweak",
            "gkerrorcode",
            "gkerrorunknown",
            "gkerrorunderage",
            "friendplayer",
            "standard view",
            "nsresponder",
            "parentwindow",
            "ibaction",
            "gkgamesession",
            "apis",
            "gkplayer player",
            "nsinteger score",
            "nsdate date",
            "gkleaderboard",
            "connect",
            "nsinteger value",
            "load",
            "gktransporttype",
            "nsstring title",
            "loads array",
            "localized",
            "gkmatch",
            "gkmatchrequest",
            "gkinvite",
            "gksession",
            "gksession api",
            "gamekit",
            "asynchronously",
            "welcome",
            "nstimeinterval",
            "delegate",
            "delivery",
            "gksenddatamode",
            "gksessionmode",
            "gkphotosize",
            "callbacks",
            "gkmatchdelegate",
            "gksavedgame",
            "default value",
            "gksessionerror",
            "gkvoicechat",
            "participant",
            "voice chat",
            "clienta"
          ],
          "references": [
            "CredentialsCache.h",
            "CredentialsCache2.h",
            "config.xml",
            "popen_spawn_win32.py",
            "pycore_condvar.h",
            "Kerberos.h",
            "KerberosLogin.h",
            "plugin.js",
            "krb5.h",
            "MultipeerConnectivity.tbd",
            "MCBrowserViewController.h",
            "MCNearbyServiceAdvertiser.h",
            "MCError.h",
            "MCAdvertiserAssistant.h",
            "MCNearbyServiceBrowser.h",
            "MultipeerConnectivity.apinotes",
            "MultipeerConnectivity.h",
            "MCSession.h",
            "MCPeerID.h",
            "canvas.html",
            "capture_0.bundle.js",
            "capture_resize.js",
            "GCRacingWheelInput.h",
            "GCSyntheticDeviceKeys.h",
            "GCSwitchPositionInput.h",
            "GCSteeringWheelElement.h",
            "GCSwitchElement.h",
            "GCTouchedStateInput.h",
            "GCXboxGamepad.h",
            "GCTypes.h",
            "GCRelativeInput.h",
            "GameController.h",
            "GCAxis2DInput.h",
            "GCAxisElement.h",
            "GCAxisInput.h",
            "GCButtonElement.h",
            "GCController.h",
            "GCColor.h",
            "GCControllerAxisInput.h",
            "GCControllerDirectionPad.h",
            "GCControllerInput.h",
            "GCControllerElement.h",
            "GCControllerTouchpad.h",
            "GCDevice.h",
            "GCDeviceBattery.h",
            "GCDeviceCursor.h",
            "GCDeviceHaptics.h",
            "GCDeviceLight.h",
            "GCDevicePhysicalInputState.h",
            "GCDevicePhysicalInputStateDiff.h",
            "GCDirectionalGamepad.h",
            "GCDirectionPadElement.h",
            "GCDevicePhysicalInput.h",
            "GCDualSenseAdaptiveTrigger.h",
            "GCDualSenseGamepad.h",
            "GCDualShockGamepad.h",
            "GCEventViewController.h",
            "GCExtendedGamepadSnapshot.h",
            "GCExtern.h",
            "GCExtendedGamepad.h",
            "GCGamepadSnapshot.h",
            "GCGearShifterElement.h",
            "GCGamepad.h",
            "GCKeyboard.h",
            "GCInputNames.h",
            "GCControllerButtonInput.h",
            "GCKeyNames.h",
            "GCKeyboardInput.h",
            "GCKeyCodes.h",
            "GCLinearInput.h",
            "GCMotion.h",
            "GCMouse.h",
            "GCMouseInput.h",
            "GCMicroGamepadSnapshot.h",
            "GCPhysicalInputElement.h",
            "GCMicroGamepad.h",
            "GCPhysicalInputProfile.h",
            "GCPhysicalInputSource.h",
            "GCPressedStateInput.h",
            "GCProductCategories.h",
            "GCRacingWheel.h",
            "GameController.tbd",
            "arm64e-apple-macos.swiftinterface",
            "x86_64-apple-macos.swiftinterface",
            "module.modulemap",
            "com_err.h",
            "gssapi_generic.h",
            "locate_plugin.h",
            "profile.h",
            "gssapi_krb5.h",
            "preauth_plugin.h",
            "gssapi.h",
            "alc.h",
            "oalStaticBufferExtension.h",
            "oalMacOSX_OALExtensions.h",
            "OpenAL.h",
            "al.h",
            "OpenAL.tbd",
            "IOUSBHost.tbd",
            "IOUSBHostCIEndpointStateMachine.h",
            "IOUSBHostCIControllerStateMachine.h",
            "IOUSBHost.h",
            "IOUSBHostCIPortStateMachine.h",
            "IOUSBHostCIDeviceStateMachine.h",
            "IOUSBHostControllerInterfaceHelpers.h",
            "IOUSBHostDevice.h",
            "IOUSBHostControllerInterface.h",
            "IOUSBHostDefinitions.h",
            "IOUSBHostInterface.h",
            "IOUSBHostIOSource.h",
            "AppleUSBDescriptorParsing.h",
            "IOUSBHostStream.h",
            "IOUSBHostObject.h",
            "IOUSBHostControllerInterfaceDefinitions.h",
            "IOUSBHostPipe.h",
            "IOBluetoothUIUserLib.h",
            "IOBluetoothUI.h",
            "IOBluetoothObjectPushUIController.h",
            "IOBluetoothDeviceSelectorController.h",
            "IOBluetoothPasskeyDisplay.h",
            "IOBluetoothPairingController.h",
            "IOBluetoothServiceBrowserController.h",
            "IOBluetoothUI.tbd",
            "Bluetooth.h",
            "IOBluetooth.h",
            "BluetoothAssignedNumbers.h",
            "IOBluetoothTypes.h",
            "IOBluetoothUtilities.h",
            "OBEXBluetooth.h",
            "IOBluetoothUserLib.h",
            "OBEX.h",
            "IOBluetooth.tbd",
            "INImage+IntentsUI.h",
            "IntentsUI.h",
            "INUIAddVoiceShortcutButton.h",
            "IntentsUI.apinotes",
            "INUIEditVoiceShortcutViewController.h",
            "INUIAddVoiceShortcutViewController.h",
            "LDAP.tbd",
            "OSvKernDSPLib.h",
            "cpu.h",
            "asm_help.h",
            "desc.h",
            "pio.h",
            "io.h",
            "sel.h",
            "reg_help.h",
            "tss.h",
            "table.h",
            "byte_order.h",
            "_limits.h",
            "_types.h",
            "_mcontext.h",
            "_param.h",
            "_endian.h",
            "arch.h",
            "cpuid_internal.h",
            "cpu_capabilities_public.h",
            "arm_features.inc",
            "endian.h",
            "locks.h",
            "limits.h",
            "atomic.h",
            "machine_cpuid.h",
            "memory_types.h",
            "pal_routines.h",
            "machine_routines.h",
            "param.h",
            "cpuid.h",
            "thread.h",
            "trap.h",
            "vmparam.h",
            "signal.h",
            "types.h",
            "AFKMemoryDescriptorOptions.h",
            "machine_machdep.h",
            "atm_types.h",
            "copyio.h",
            "_OSByteOrder.h",
            "crc.h",
            "Block.h",
            "OSBase.h",
            "OSByteOrder.h",
            "OSDebug.h",
            "OSMalloc.h",
            "OSAtomic.h",
            "OSReturn.h",
            "OSKextLib.h",
            "OSTypes.h",
            "version.h",
            "sysctl.h",
            "tree.h",
            "zconf.h",
            "zlib.h",
            "libkern.h",
            "kdp_callout.h",
            "kdp_en_debugger.h",
            "ipc_types.h",
            "krpc.h",
            "rpcv2.h",
            "xdr_subs.h",
            "nfs.h",
            "nfsproto.h",
            "bootp.h",
            "if_ether.h",
            "icmp6.h",
            "icmp_var.h",
            "igmp_var.h",
            "igmp.h",
            "in_pcb.h",
            "in_stat.h",
            "in_private.h",
            "in_arp.h",
            "in_var.h",
            "in_systm.h",
            "ip_var.h",
            "ip_icmp.h",
            "kpi_ipfilter.h",
            "ip6.h",
            "tcp_private.h",
            "ip.h",
            "tcp_timer.h",
            "tcp_fsm.h",
            "udp_var.h",
            "tcp_seq.h",
            "tcpip.h",
            "udp.h",
            "tcp_var.h",
            "tcp.h",
            "IOPCIFamilyDefinitions.h",
            "IOPCIDevice.iig",
            "PCIDriverKit.h",
            "IOPCIDevice.h",
            "audit_ioctl.h",
            "stdarg.h",
            "stdatomic.h",
            "stdbool.h",
            "stddef.h",
            "string.h",
            "stdint.h",
            "ptrauth.h",
            "math.h",
            "monotonic.h",
            "static_if.h",
            "machine_kpc.h",
            "machine_remote_time.h",
            "ipc_pthread_priority_types.h",
            "lz4_assembly_select.h",
            "vm_compressor_algorithms.h",
            "lz4.h",
            "pmap.h",
            "vm_dyld_pager.h",
            "vm_far.h",
            "vm_fault.h",
            "vm_map.h",
            "lz4_constants.h",
            "vm_options.h",
            "vm_pageout.h",
            "vm_memtag.h",
            "vm_shared_region.h",
            "vm_kern.h",
            "vfs_support.h",
            "vecLib.h",
            "vecLibTypes.h",
            "vBasicOps.h",
            "vForce.h",
            "vDSP.h",
            "uuid.h",
            "UNDReply.defs",
            "UNDRequest.defs",
            "KUNCUserNotifications.h",
            "UNDTypes.defs",
            "UNDTypes.h",
            "TargetConditionals.h",
            "apfs_boot_mount.tbd",
            "av.h",
            "cop.h",
            "bitcount.h",
            "cv.h",
            "ebcdic_tables.h",
            "EXTERN.h",
            "embedvar.h",
            "fakesdio.h",
            "feature.h",
            "form.h",
            "gv.h",
            "git_version.h",
            "dosish.h",
            "hv_macro.h",
            "hv_func.h",
            "config.h",
            "INTERN.h",
            "handy.h",
            "intrpvar.h",
            "invlist_inline.h",
            "hv.h",
            "iperlsys.h",
            "keywords.h",
            "libperl.tbd",
            "embed.h",
            "l1_char_class_tab.h",
            "mg_data.h",
            "mg_raw.h",
            "mg.h",
            "mg_vtable.h",
            "mydtrace.h",
            "nostdio.h",
            "op_reg_common.h",
            "op.h",
            "opcode.h",
            "inline.h",
            "overload.h",
            "opnames.h",
            "parser.h",
            "malloc_ctl.h",
            "pad.h",
            "perl_inc_macro.h",
            "perl_langinfo.h",
            "perl_siphash.h",
            "patchlevel.h",
            "perlapi.h",
            "metaconfig.h",
            "perlio.h",
            "perldtrace.h",
            "perliol.h",
            "perlvars.h",
            "perlsdio.h",
            "pp_proto.h",
            "perly.h",
            "pp.h",
            "reentr.h",
            "regcomp.h",
            "perl.h",
            "regexp.h",
            "scope.h",
            "sbox32_hash.h",
            "time64_config.h",
            "time64.h",
            "sv.h",
            "unixish.h",
            "uconfig.h",
            "utfebcdic.h",
            "unicode_constants.h",
            "utf8.h",
            "regnodes.h",
            "util.h",
            "vutil.h",
            "uudmap.h",
            "warnings.h",
            "XSUB.h",
            "zaphod32_hash.h",
            "encode.h",
            "python-3.9.pc",
            "python-3.9-embed.pc",
            "python3-embed.pc",
            "python3.pc",
            "AFKUser.tbd",
            "AdID.tbd",
            "Admin.tbd",
            "AirPlayReceiver.tbd",
            "AppSandbox.tbd",
            "ASEProcessing.tbd",
            "AuthenticationServicesCore.tbd",
            "WebGPU.tbd",
            "WebDriver.tbd",
            "MapKit.tbd",
            "SwiftUI.swiftoverlay",
            "WebKit.tbd",
            "WebKit.apinotes",
            "WKBackForwardList.h",
            "NSAttributedString.h",
            "WebKit.h",
            "WKBackForwardListItem.h",
            "WKContentRuleList.h",
            "WKContentRuleListStore.h",
            "WKContextMenuElementInfo.h",
            "WKDataDetectorTypes.h",
            "WKContentWorld.h",
            "WKError.h",
            "WKFoundation.h",
            "WKFindResult.h",
            "WKHTTPCookieStore.h",
            "WKFrameInfo.h",
            "WKNavigation.h",
            "WKFindConfiguration.h",
            "WKNavigationDelegate.h",
            "WKNavigationResponse.h",
            "WKOpenPanelParameters.h",
            "WebKitLegacy.h",
            "WKPreviewActionItem.h",
            "WKNavigationAction.h",
            "WKPreferences.h",
            "WKPreviewActionItemIdentifiers.h",
            "WKPreviewElementInfo.h",
            "WKProcessPool.h",
            "WKDownload.h",
            "WKPDFConfiguration.h",
            "WKScriptMessage.h",
            "WKSecurityOrigin.h",
            "WKScriptMessageHandler.h",
            "WKSnapshotConfiguration.h",
            "WKUIDelegate.h",
            "WKURLSchemeTask.h",
            "WKWebpagePreferences.h",
            "WKUserContentController.h",
            "WKWebsiteDataStore.h",
            "WKWebsiteDataRecord.h",
            "WKUserScript.h",
            "WKURLSchemeHandler.h",
            "WKWebViewConfiguration.h",
            "WKWebView.h",
            "WKScriptMessageHandlerWithReply.h",
            "WKWindowFeatures.h",
            "WKDownloadDelegate.h",
            "ASAccountAuthenticationModificationController.h",
            "ASAccountAuthenticationModificationViewController.h",
            "ASAuthorization.h",
            "ASAuthorizationAppleIDButton.h",
            "ASAccountAuthenticationModificationRequest.h",
            "ASAuthorizationAppleIDProvider.h",
            "ASAuthorizationAppleIDRequest.h",
            "ASAuthorizationAppleIDCredential.h",
            "ASAuthorizationController.h",
            "ASAuthorizationCredential.h",
            "ASAccountAuthenticationModificationExtensionContext.h",
            "ASAuthorizationError.h",
            "ASAuthorizationCustomMethod.h",
            "ASAuthorizationPasswordRequest.h",
            "ASAuthorizationOpenIDRequest.h",
            "ASAuthorizationPlatformPublicKeyCredentialDescriptor.h",
            "ASAuthorizationPlatformPublicKeyCredentialProvider.h",
            "ASAccountAuthenticationModificationReplacePasswordWithSignInWithAppleRequest.h",
            "ASAccountAuthenticationModificationUpgradePasswordToStrongPasswordRequest.h",
            "ASAuthorizationPlatformPublicKeyCredentialRegistrationRequest.h",
            "ASAuthorizationPlatformPublicKeyCredentialRegistration.h",
            "ASAuthorizationProvider.h",
            "ASAuthorizationPlatformPublicKeyCredentialAssertion.h",
            "ASAuthorizationPublicKeyCredentialAssertion.h",
            "ASAuthorizationPublicKeyCredentialAssertionRequest.h",
            "ASAuthorizationPublicKeyCredentialConstants.h",
            "ASAuthorizationProviderExtensionAuthorizationResult.h",
            "ASAuthorizationPublicKeyCredentialDescriptor.h",
            "ASAuthorizationPublicKeyCredentialLargeBlobAssertionOutput.h",
            "ASAuthorizationPasswordProvider.h",
            "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationInput.h",
            "ASAuthorizationPublicKeyCredentialParameters.h",
            "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationOutput.h",
            "ASAuthorizationPublicKeyCredentialRegistration.h",
            "ASAuthorizationPublicKeyCredentialRegistrationRequest.h",
            "ASAuthorizationPublicKeyCredentialLargeBlobAssertionInput.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialAssertion.h",
            "ASAuthorizationRequest.h",
            "ASAuthorizationPlatformPublicKeyCredentialAssertionRequest.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialProvider.h",
            "ASAuthorizationSingleSignOnCredential.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialDescriptor.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialAssertionRequest.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialRegistration.h",
            "ASAuthorizationSingleSignOnProvider.h",
            "ASAuthorizationWebBrowserExternallyAuthenticatableRequest.h",
            "ASAuthorizationWebBrowserPlatformPublicKeyCredentialAssertionRequest.h",
            "ASAuthorizationWebBrowserPlatformPublicKeyCredentialRegistrationRequest.h",
            "ASAuthorizationWebBrowserPublicKeyCredentialManager.h",
            "ASAuthorizationWebBrowserPlatformPublicKeyCredential.h",
            "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialAssertionRequest.h",
            "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialRegistrationRequest.h",
            "ASCOSEConstants.h",
            "ASCredentialIdentity.h",
            "ASAuthorizationSingleSignOnRequest.h",
            "ASCredentialIdentityStore.h",
            "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialProvider.h",
            "ASCredentialProviderExtensionContext.h",
            "ASCredentialProviderViewController.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialRegistrationRequest.h",
            "ASCredentialServiceIdentifier.h",
            "ASExtensionErrors.h",
            "ASAuthorizationProviderExtensionAuthorizationRequest.h",
            "ASCredentialRequest.h",
            "ASAuthorizationWebBrowserPlatformPublicKeyCredentialProvider.h",
            "ASPasskeyAssertionCredential.h",
            "ASPasskeyCredentialRequest.h",
            "ASPasskeyCredentialRequestParameters.h",
            "ASCredentialIdentityStoreState.h",
            "ASPasskeyRegistrationCredential.h",
            "ASPasswordCredential.h",
            "ASPublicKeyCredential.h",
            "ASPasskeyCredentialIdentity.h",
            "ASPublicKeyCredentialClientData.h",
            "ASSettingsHelper.h",
            "ASWebAuthenticationSessionCallback.h",
            "ASWebAuthenticationSession.h",
            "ASWebAuthenticationSessionRequest.h",
            "ASWebAuthenticationSessionWebBrowserSessionManager.h",
            "AuthenticationServices.h",
            "ASFoundation.h",
            "AuthenticationServices.apinotes",
            "ASWebAuthenticationSessionWebBrowserSessionHandling.h",
            "ASPasswordCredentialIdentity.h",
            "ASPasswordCredentialRequest.h",
            "GameKit.apinotes",
            "GKAccessPoint.h",
            "GameKit.h",
            "GKAchievement.h",
            "GKAchievementViewController.h",
            "GKBasePlayer.h",
            "GKAchievementDescription.h",
            "GKChallengeEventHandler.h",
            "GKCloudPlayer.h",
            "GKChallengesViewController.h",
            "GKChallenge.h",
            "GKDefines.h",
            "GKError.h",
            "GKEventListener.h",
            "GKFriendRequestComposeViewController.h",
            "GKDialogController.h",
            "GKGameSessionEventListener.h",
            "GKGameSessionError.h",
            "GKGameCenterViewController.h",
            "GKGameSessionSharingViewController.h",
            "GKLeaderboardEntry.h",
            "GKLeaderboard.h",
            "GKLeaderboardScore.h",
            "GKGameSession.h",
            "GKLeaderboardSet.h",
            "GKLocalPlayer.h",
            "GKLeaderboardViewController.h",
            "GKMatch.h",
            "GKMatchmaker.h",
            "GKMatchmakerViewController.h",
            "GKPeerPickerController.h",
            "GKNotificationBanner.h",
            "GKPublicConstants.h",
            "GKPlayer.h",
            "GKPublicProtocols.h",
            "GKSavedGameListener.h",
            "GKScore.h",
            "GKSessionError.h",
            "GKVoiceChat.h",
            "GKTurnBasedMatchmakerViewController.h",
            "GKSession.h",
            "GKTurnBasedMatch.h",
            "GKSavedGame.h",
            "GKVoiceChatService.h"
          ],
          "public": 1,
          "adversary": "Turla Group, FIN7, APT34, APT28, DragonForce Malaysia Hacker Group, Indonesia Islamic Warriors Counc",
          "targeted_countries": [
            "United States of America",
            "India",
            "Australia"
          ],
          "malware_families": [
            {
              "id": "OSAtomic",
              "display_name": "OSAtomic",
              "target": null
            },
            {
              "id": "OSReturn",
              "display_name": "OSReturn",
              "target": null
            },
            {
              "id": "Ver",
              "display_name": "Ver",
              "target": null
            },
            {
              "id": "Internet",
              "display_name": "Internet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1016",
              "name": "System Network Configuration Discovery",
              "display_name": "T1016 - System Network Configuration Discovery"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1049",
              "name": "System Network Connections Discovery",
              "display_name": "T1049 - System Network Connections Discovery"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 39,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "ilyailya",
            "id": "298851",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1968,
            "domain": 526,
            "FileHash-SHA256": 207,
            "hostname": 972,
            "email": 55,
            "FileHash-SHA1": 9,
            "FileHash-MD5": 4,
            "CVE": 2,
            "CIDR": 10
          },
          "indicator_count": 3753,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 34,
          "modified_text": "347 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709929c16e0817dea8f7ff",
          "name": "https://www.microsoft.com/en-US/servicesagreement/upcoming-faq.aspx",
          "description": "",
          "modified": "2023-12-06T15:54:17.119000",
          "created": "2023-12-06T15:54:17.119000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 963,
            "domain": 255,
            "hostname": 730,
            "URL": 2400,
            "FileHash-MD5": 50,
            "FileHash-SHA1": 50,
            "email": 1
          },
          "indicator_count": 4449,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657099064c0c0aa442282397",
          "name": "http://www.xiazai99.com/down/soft9106.html",
          "description": "",
          "modified": "2023-12-06T15:53:42.077000",
          "created": "2023-12-06T15:53:42.077000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1040,
            "domain": 293,
            "FileHash-MD5": 58,
            "FileHash-SHA1": 56,
            "hostname": 809,
            "URL": 2661,
            "email": 1
          },
          "indicator_count": 4918,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657098ff4c59f8ac3f86f613",
          "name": "v2 of web.basemark.com plus all suggested ioc,s dont forget about the dropped js files from the 2nd hybrid link",
          "description": "",
          "modified": "2023-12-06T15:53:35.032000",
          "created": "2023-12-06T15:53:35.032000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1168,
            "hostname": 1366,
            "domain": 412,
            "URL": 3576,
            "email": 2,
            "FileHash-MD5": 61,
            "FileHash-SHA1": 54
          },
          "indicator_count": 6639,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709786808aed5d8ee43d19",
          "name": "auto_open_controller.js - all the things using this .js file ;-(",
          "description": "",
          "modified": "2023-12-06T15:47:18.949000",
          "created": "2023-12-06T15:47:18.949000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 380,
            "URL": 802,
            "domain": 245,
            "hostname": 231,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 1
          },
          "indicator_count": 1664,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708efbe1108a2df26f5c5f",
          "name": "Theconstantcompany.com \u2014>Elizabeth Messer &#8211; Spiritual Encouragement for your beautiful, messy life",
          "description": "",
          "modified": "2023-12-06T15:10:51.712000",
          "created": "2023-12-06T15:10:51.712000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 538,
            "hostname": 307,
            "domain": 220,
            "URL": 1053
          },
          "indicator_count": 2118,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708ef0cdb40fa0e7d239ca",
          "name": "either emotet or a part of it",
          "description": "",
          "modified": "2023-12-06T15:10:40.867000",
          "created": "2023-12-06T15:10:40.867000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 342,
            "hostname": 456,
            "domain": 349,
            "URL": 1730,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2879,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708eb824dc4c51811f6de9",
          "name": "Indusface  - in YOUR face ;)",
          "description": "",
          "modified": "2023-12-06T15:09:44.273000",
          "created": "2023-12-06T15:09:44.273000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 307,
            "hostname": 333,
            "domain": 192,
            "URL": 1143,
            "FileHash-MD5": 1
          },
          "indicator_count": 1976,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708ea5a3214f63e1d6d94f",
          "name": "lumen.me Honeybadger",
          "description": "",
          "modified": "2023-12-06T15:09:25.749000",
          "created": "2023-12-06T15:09:25.749000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 475,
            "hostname": 315,
            "domain": 233,
            "URL": 1133
          },
          "indicator_count": 2156,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708e2d7cb4228401888b63",
          "name": "possibly a central bank",
          "description": "",
          "modified": "2023-12-06T15:07:25.990000",
          "created": "2023-12-06T15:07:25.990000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 622,
            "domain": 2558,
            "URL": 4203,
            "hostname": 1221,
            "CVE": 1
          },
          "indicator_count": 8605,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708e0d95a8c74cc715f7a2",
          "name": "West.cn",
          "description": "",
          "modified": "2023-12-06T15:06:53.350000",
          "created": "2023-12-06T15:06:53.350000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 208,
            "domain": 533,
            "hostname": 757,
            "URL": 1861,
            "FileHash-MD5": 1
          },
          "indicator_count": 3360,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708dff34f37412488dda2a",
          "name": "Digital Ocean",
          "description": "",
          "modified": "2023-12-06T15:06:38.991000",
          "created": "2023-12-06T15:06:38.991000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 703,
            "domain": 734,
            "URL": 5116,
            "hostname": 1266,
            "email": 3
          },
          "indicator_count": 7823,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708d657f0895a860febf8f",
          "name": "SafeFrame Container",
          "description": "",
          "modified": "2023-12-06T15:04:05.932000",
          "created": "2023-12-06T15:04:05.932000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1416,
            "domain": 2979,
            "URL": 8250,
            "hostname": 2262
          },
          "indicator_count": 14907,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708d2dc7aa57db55aab29c",
          "name": "serverhub.com eonix.net",
          "description": "",
          "modified": "2023-12-06T15:03:09.373000",
          "created": "2023-12-06T15:03:09.373000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 876,
            "URL": 5708,
            "hostname": 1541,
            "domain": 915,
            "FileHash-MD5": 1
          },
          "indicator_count": 9042,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708cca842536f1582636be",
          "name": "apeiron.global",
          "description": "",
          "modified": "2023-12-06T15:01:30.558000",
          "created": "2023-12-06T15:01:30.558000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 498,
            "hostname": 388,
            "domain": 242,
            "CVE": 1,
            "URL": 1203,
            "FileHash-MD5": 1
          },
          "indicator_count": 2333,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c8f50527fb73205bfca",
          "name": "Dreamhost.com - Drift Widget",
          "description": "",
          "modified": "2023-12-06T15:00:31.809000",
          "created": "2023-12-06T15:00:31.809000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 174,
            "domain": 464,
            "URL": 1119,
            "hostname": 156,
            "FileHash-MD5": 2,
            "FileHash-SHA1": 1
          },
          "indicator_count": 1916,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c8a9635f156e79238f1",
          "name": "intel gained from a spam text",
          "description": "",
          "modified": "2023-12-06T15:00:26.727000",
          "created": "2023-12-06T15:00:26.727000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 823,
            "domain": 717,
            "URL": 2245,
            "hostname": 615,
            "email": 4,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 1
          },
          "indicator_count": 4411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c57c7b19b62c501601a",
          "name": "Hurricane Electric - csp.he.net :)",
          "description": "",
          "modified": "2023-12-06T14:59:35.479000",
          "created": "2023-12-06T14:59:35.479000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 186,
            "hostname": 490,
            "URL": 1339,
            "domain": 311
          },
          "indicator_count": 2326,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c27074200c710e3b35c",
          "name": "Malware hosting - metronetinc.com",
          "description": "",
          "modified": "2023-12-06T14:58:47.235000",
          "created": "2023-12-06T14:58:47.235000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 447,
            "hostname": 1241,
            "domain": 536,
            "URL": 3731
          },
          "indicator_count": 5955,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c1c5e2cc4dfe8d0ed97",
          "name": "CPANEL-TUCOWS \u2014malware hosting",
          "description": "",
          "modified": "2023-12-06T14:58:36.254000",
          "created": "2023-12-06T14:58:36.254000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 815,
            "hostname": 3487,
            "domain": 1182,
            "URL": 10194,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 1
          },
          "indicator_count": 15682,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c13ee010f81d3f9b3af",
          "name": "Malware hosting - hostrocket.com",
          "description": "",
          "modified": "2023-12-06T14:58:27.115000",
          "created": "2023-12-06T14:58:27.115000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 232,
            "hostname": 963,
            "domain": 412,
            "URL": 2337,
            "email": 3,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 3949,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c0791fece390b1a096e",
          "name": "Choopa.com - vultr",
          "description": "",
          "modified": "2023-12-06T14:58:15.734000",
          "created": "2023-12-06T14:58:15.734000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 453,
            "hostname": 1241,
            "domain": 430,
            "URL": 3454
          },
          "indicator_count": 5578,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c01dca4e6c505e4fca0",
          "name": "Hostgator - whitelisted",
          "description": "",
          "modified": "2023-12-06T14:58:09.135000",
          "created": "2023-12-06T14:58:09.135000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 692,
            "hostname": 1339,
            "domain": 1260,
            "URL": 4622,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 1
          },
          "indicator_count": 7917,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708bf87a08635a650eeb9b",
          "name": "ctgserver.net",
          "description": "",
          "modified": "2023-12-06T14:58:00.096000",
          "created": "2023-12-06T14:58:00.096000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1286,
            "domain": 560,
            "hostname": 1602,
            "URL": 7975,
            "FileHash-MD5": 85,
            "FileHash-SHA1": 1
          },
          "indicator_count": 11509,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708befc4f4c7e2be4370d9",
          "name": "ctgserver.net",
          "description": "",
          "modified": "2023-12-06T14:57:51.922000",
          "created": "2023-12-06T14:57:51.922000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1286,
            "domain": 560,
            "hostname": 1602,
            "URL": 7975,
            "FileHash-MD5": 85,
            "FileHash-SHA1": 1
          },
          "indicator_count": 11509,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708beba2ba8bcfb1d10237",
          "name": "hostkey - Industroyer&ReduceRight",
          "description": "",
          "modified": "2023-12-06T14:57:47.430000",
          "created": "2023-12-06T14:57:47.430000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 304,
            "hostname": 563,
            "domain": 407,
            "URL": 1776,
            "FileHash-SHA1": 2
          },
          "indicator_count": 3052,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708b72abe90961af1737c9",
          "name": "reCAPTCHA",
          "description": "",
          "modified": "2023-12-06T14:55:46.172000",
          "created": "2023-12-06T14:55:46.172000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 362,
            "domain": 330,
            "URL": 1790,
            "hostname": 586,
            "email": 1
          },
          "indicator_count": 3069,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708b6e599404c47f2aba15",
          "name": "Malware",
          "description": "",
          "modified": "2023-12-06T14:55:42.864000",
          "created": "2023-12-06T14:55:42.864000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 268,
            "domain": 202,
            "FileHash-SHA256": 154,
            "URL": 845,
            "FileHash-MD5": 6,
            "FileHash-SHA1": 1
          },
          "indicator_count": 1476,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708aa1dca4e6c505e4fc9e",
          "name": "Botnet c&c",
          "description": "",
          "modified": "2023-12-06T14:52:16.286000",
          "created": "2023-12-06T14:52:16.286000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 214,
            "hostname": 334,
            "URL": 1182,
            "FileHash-SHA256": 33
          },
          "indicator_count": 1763,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708a8b61abf1b451f2aebc",
          "name": "Botnet",
          "description": "",
          "modified": "2023-12-06T14:51:55.086000",
          "created": "2023-12-06T14:51:55.086000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "hostname": 619,
            "URL": 1547,
            "domain": 246,
            "FileHash-SHA256": 124
          },
          "indicator_count": 2538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708a87eeed875a212dff0a",
          "name": "Botnet",
          "description": "",
          "modified": "2023-12-06T14:51:51.546000",
          "created": "2023-12-06T14:51:51.546000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "hostname": 619,
            "URL": 1547,
            "domain": 246,
            "FileHash-SHA256": 124
          },
          "indicator_count": 2538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657080d20f7e10c1e37fcf89",
          "name": "TarrantCounty.com ~ 03.01.2022",
          "description": "",
          "modified": "2023-12-06T14:10:26.301000",
          "created": "2023-12-06T14:10:26.301000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1078,
            "domain": 838,
            "hostname": 1607,
            "URL": 4134,
            "email": 3,
            "FileHash-SHA1": 2,
            "CIDR": 4,
            "FileHash-MD5": 15
          },
          "indicator_count": 7681,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657080735501c11ddbb7a988",
          "name": "Dominionvoting.com 03.03.22",
          "description": "",
          "modified": "2023-12-06T14:08:51.329000",
          "created": "2023-12-06T14:08:51.329000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 663,
            "hostname": 588,
            "domain": 413,
            "URL": 2183,
            "FileHash-MD5": 7
          },
          "indicator_count": 3854,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707fe17dfdfe16066d16de",
          "name": "Bexar.org",
          "description": "",
          "modified": "2023-12-06T14:06:25.800000",
          "created": "2023-12-06T14:06:25.800000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1735,
            "hostname": 1833,
            "domain": 1025,
            "URL": 4668,
            "email": 4,
            "FileHash-MD5": 133,
            "FileHash-SHA1": 6,
            "CIDR": 5
          },
          "indicator_count": 9409,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "642fbeba84c7b4cbee43200a",
          "name": "https://www.microsoft.com/en-US/servicesagreement/upcoming-faq.aspx",
          "description": "",
          "modified": "2023-05-07T00:00:36.624000",
          "created": "2023-04-07T06:56:58.157000",
          "tags": [
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "chromeua",
            "ansi",
            "dropped file",
            "optout",
            "runtime data",
            "object",
            "drmedgeua",
            "optin",
            "edgeua",
            "unicode",
            "span",
            "error",
            "generator",
            "void",
            "august",
            "body",
            "path",
            "close",
            "format",
            "template",
            "suspicious",
            "unknown",
            "critical",
            "addressbar",
            "desktop",
            "dark",
            "light",
            "meta",
            "chat",
            "this",
            "small",
            "june",
            "footer",
            "window",
            "legend",
            "hybrid",
            "click",
            "null",
            "april",
            "general",
            "strings",
            "qakbot"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/9318798ecf1cf2d52d10ec99e821454ff81196ced4cb4337dcab41b79dcca0ec/642ecd01f0ad4977b40ce225"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2400,
            "hostname": 730,
            "domain": 255,
            "FileHash-SHA256": 963,
            "email": 1,
            "FileHash-MD5": 50,
            "FileHash-SHA1": 50
          },
          "indicator_count": 4449,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 91,
          "modified_text": "1078 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "642db7b656049e54b2f71c20",
          "name": "masterkey.com.ua/download/MKClientSetup.exe - hybrid 100/100",
          "description": "The entire \"Ad\" eco system is compromised via all main channels , ie google, bing, msn etc utilising many top level domains and brands, its truly the biggest suppky chain attack ever known. So enormously thats its unbelievable and I guess many peeps just cant see it because its simply to overwhelming to consider a reality p plus many perhaps cant digest the advanced use of AI and self repairing neural networks along that are designed to work on standard default configs. its not till you step out of the defaults that you start to see nefariousness",
          "modified": "2023-05-05T16:00:23.366000",
          "created": "2023-04-05T18:02:30.403000",
          "tags": [
            "dropped file",
            "chromeua",
            "runtime data",
            "drmedgeua",
            "edgeua",
            "generator",
            "win64",
            "null",
            "template",
            "unknown",
            "critical",
            "addressbar",
            "desktop",
            "dark",
            "light",
            "iframe",
            "cookie",
            "meta",
            "body",
            "legend",
            "dwis",
            "core",
            "tear",
            "malicious",
            "mozilla",
            "strings",
            "qakbot",
            "://masterkey.com.ua/download/MKClientSetup.exe"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/41859e0b198fbe88772ef12c577023c0481ec19867e410bab335e67fea87c1bb/642ca80cde2048242a0e097d"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 949,
            "URL": 5642,
            "CVE": 2,
            "domain": 509,
            "FileHash-SHA256": 293,
            "FileHash-MD5": 550,
            "FileHash-SHA1": 60,
            "email": 5
          },
          "indicator_count": 8010,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 92,
          "modified_text": "1080 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6428649b535c12c6f8d60b0b",
          "name": "http://www.xiazai99.com/down/soft9106.html",
          "description": "",
          "modified": "2023-05-01T15:05:10.466000",
          "created": "2023-04-01T17:06:35.022000",
          "tags": [
            "chromeua",
            "ansi",
            "dropped file",
            "optout",
            "runtime data",
            "object",
            "drmedgeua",
            "optin",
            "edgeua",
            "unicode",
            "span",
            "error",
            "generator",
            "void",
            "path",
            "null",
            "entropy",
            "click",
            "template",
            "date",
            "unknown",
            "critical",
            "addressbar",
            "desktop",
            "dark",
            "light",
            "quicksearch",
            "this",
            "suspicious",
            "window",
            "legend",
            "hybrid",
            "hosts",
            "next",
            "main",
            "refresh",
            "hello",
            "voice",
            "malicious",
            "strings",
            "qakbot"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/45e147babe00d1834af72b2139dbc65043ee50cb09d1d4e470f9bd48ad50c6bf/64283fca3a07828f100b2551"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2661,
            "hostname": 809,
            "domain": 293,
            "FileHash-SHA256": 1040,
            "email": 1,
            "FileHash-MD5": 58,
            "FileHash-SHA1": 56
          },
          "indicator_count": 4918,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1084 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6425a2f9c155fd53b9922bcd",
          "name": "v2 of web.basemark.com plus all suggested ioc,s dont forget about the dropped js files from the 2nd hybrid link",
          "description": "hope peeps are gona learn from 3cx that false positives are in fact often not false",
          "modified": "2023-04-29T13:05:05.409000",
          "created": "2023-03-30T14:55:53.652000",
          "tags": [
            "trojan",
            "apt",
            "ansi",
            "dropped file",
            "runtime data",
            "chromeua",
            "optout",
            "programfiles",
            "typeof e",
            "localappdata",
            "error",
            "date",
            "generator",
            "path",
            "null",
            "void",
            "win64",
            "twitter",
            "this",
            "critical",
            "desktop",
            "dark",
            "light",
            "meta",
            "roboto",
            "span",
            "class",
            "template",
            "blink",
            "suspicious",
            "facebook",
            "mexico",
            "malicious",
            "mozilla",
            "strings",
            "qakbot",
            "://web.basemark.com/result/?4A3D0fmu%1C%00%00%00B%00a%00s%00e%00"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/e7740c893812cea8e34ffb04331dcc45762dec73def71929bfbabcbfb22e93e9",
            "https://hybrid-analysis.com/sample/e7740c893812cea8e34ffb04331dcc45762dec73def71929bfbabcbfb22e93e9/641e30763dcad56bc2075661",
            "http://web.basemark.com/result/?4A3D0fmu%1C%00%00%00B%00a%00s%00e%00m%00a%00r%00k"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 412,
            "FileHash-SHA256": 1168,
            "URL": 3576,
            "hostname": 1366,
            "email": 2,
            "FileHash-MD5": 61,
            "FileHash-SHA1": 54
          },
          "indicator_count": 6639,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 92,
          "modified_text": "1086 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6426dda295502d82e6e6ef7f",
          "name": "v4 - Hybrid scan uploaded  + all suggested ioc's - vendor.3a0e728a.js another gem in edge on twitter.com/i/flow/login source code",
          "description": "WebpackChunk_Twitter-responsive_web is built on a single web address, which will allow users to upload images, tweets and videos to be stored in the same place as the hashtag.",
          "modified": "2023-03-31T13:18:26.733000",
          "created": "2023-03-31T13:18:26.733000",
          "tags": [
            "trojan",
            "apt",
            "ansi",
            "memoryfile scan",
            "error",
            "runtime data",
            "typeof e",
            "regexp",
            "array",
            "object",
            "typeof t",
            "void",
            "null",
            "unknown",
            "path",
            "facebook",
            "4096",
            "suspicious",
            "meta",
            "lazy",
            "entity",
            "union",
            "body",
            "idkey",
            "scroll",
            "backspace",
            "insert",
            "roboto",
            "target",
            "stack",
            "hybrid",
            "model",
            "click",
            "stream",
            "strings",
            "qakbot",
            "pattern match",
            "ud801",
            "ud804",
            "ud805",
            "ud806",
            "ud81a",
            "ud835",
            "ud800",
            "ud802",
            "sha1",
            "sha256",
            "vendor.3a0e728a.js"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/9bf30967dfbf84d91ff4a1ca66dcd6c3383e679917e8b7aa4f659ff9f4e848d7/6426cf48655f94b6b303704c"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1115",
              "name": "Clipboard Data",
              "display_name": "T1115 - Clipboard Data"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1353,
            "hostname": 222,
            "domain": 221,
            "FileHash-SHA256": 85,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 1
          },
          "indicator_count": 1885,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1115 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "63ed86228ecb2b03d35b046f",
          "name": "just a load of errors on edge watching twitch",
          "description": "load of unknown user pics, but that could just be a twitch thing",
          "modified": "2023-03-18T00:05:45.328000",
          "created": "2023-02-16T01:25:54.305000",
          "tags": [
            "object",
            "typeerror",
            "typeof symbol",
            "error",
            "typeof t",
            "array",
            "string",
            "typeof e",
            "typeof n",
            "referenceerror",
            "date",
            "body",
            "null",
            "local",
            "generator",
            "class",
            "typeof tcfapi",
            "tcfapi",
            "daten",
            "image",
            "typeof comscore",
            "true",
            "regexp",
            "config",
            "nolbundle",
            "novmsjs",
            "nlssdk",
            "retry request",
            "nolsdkbundle",
            "typeof o",
            "bsdk check",
            "optout",
            "basever",
            "lsid",
            "qqfunction",
            "nielsen log",
            "info",
            "stop",
            "logger",
            "android",
            "donate",
            "ukraine relief",
            "requestbuilder",
            "slotbuilder",
            "uint8array",
            "nthis",
            "promise",
            "symbol",
            "fullscreen",
            "adload",
            "false",
            "facebook",
            "unknown",
            "meta",
            "direct",
            "this",
            "close",
            "locale",
            "model",
            "survey",
            "companion",
            "scroll",
            "backspace",
            "insert",
            "infinity",
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "runtime data",
            "ansi",
            "path",
            "hybrid analysis",
            "api call",
            "registry access",
            "function",
            "calls",
            "window",
            "hybrid",
            "general",
            "click",
            "ransomware",
            "february",
            "strings",
            "suspicious",
            "irequestslot",
            "islotbuilder",
            "amazonerrorcode",
            "errortype",
            "adunit",
            "conflict",
            "please"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/5da0de230eb98e5598b152944d0e7e6b355485484052df6c7f1c747e2c5564c0/63ed708125f47738b45a6520",
            "webpack   buildin global.js",
            "SlotBuilder.ts",
            "P34D56F9D-5684-4C83-8EE1-5EA7DE9CF45D.js",
            "apstag.js",
            "nlsSDK600.bundle.min.js",
            "v6s.js",
            "https://sb.scorecardresearch.com/p?c1=2&c2=6745306&ns_type=hidden&ns_st_sv=5.1.3.160420&ns_st_smv=5.1&ns_st_it=r&ns_st_id=1676508021004&ns_st_ec=3&ns_st_sp=1&ns_st_sc=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=hb&ns_st_po=1560430&ns_st_cl=0&ns_st_hc=31&ns_st_mp=js_api&ns_st_mv=5.1.3.160420&ns_st_pn=1&ns_st_tp=0&ns_st_ci=47976339133&ns_st_pt=1560430&ns_st_dpt=360423&ns_st_ipt=60010&ns_st_et=1560430&ns_st_det=360423&ns_st_upc=1560430&ns_st_dupc=360423&ns_st_iupc=60010&ns_st_upa=15604",
            "https://sb.scorecardresearch.com/p?ax_uuid=d247c6142f285bb0488533aa7f2d53c5&c1=9&c2=31864766&ns__t=1676508027511&ns_c=UTF-8&cv=3.1&c8=SecurityWeekly%20-%20Twitch&c7=https%3A%2F%2Fwww.twitch.tv%2Fsecurityweekly&c9=",
            "https://hybrid-analysis.com/sample/b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b/",
            "beacon.js",
            "https://static-cdn.jtvnw.net/jtv_user_pictures/6f4129f6-3750-4c02-b7c8-c88a05064129-profile_image-70x70.png"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "SlotBuilder",
              "display_name": "SlotBuilder",
              "target": null
            },
            {
              "id": "RequestBuilder",
              "display_name": "RequestBuilder",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1353,
            "hostname": 363,
            "domain": 201,
            "FileHash-SHA256": 203,
            "FileHash-MD5": 9,
            "FileHash-SHA1": 3
          },
          "indicator_count": 2132,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1128 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "63ed8628367c1a4f3f8e773a",
          "name": "just a load of errors on edge watching twitch",
          "description": "load of unknown user pics, but that could just be a twitch thing",
          "modified": "2023-03-18T00:05:45.328000",
          "created": "2023-02-16T01:26:00.959000",
          "tags": [
            "object",
            "typeerror",
            "typeof symbol",
            "error",
            "typeof t",
            "array",
            "string",
            "typeof e",
            "typeof n",
            "referenceerror",
            "date",
            "body",
            "null",
            "local",
            "generator",
            "class",
            "typeof tcfapi",
            "tcfapi",
            "daten",
            "image",
            "typeof comscore",
            "true",
            "regexp",
            "config",
            "nolbundle",
            "novmsjs",
            "nlssdk",
            "retry request",
            "nolsdkbundle",
            "typeof o",
            "bsdk check",
            "optout",
            "basever",
            "lsid",
            "qqfunction",
            "nielsen log",
            "info",
            "stop",
            "logger",
            "android",
            "donate",
            "ukraine relief",
            "requestbuilder",
            "slotbuilder",
            "uint8array",
            "nthis",
            "promise",
            "symbol",
            "fullscreen",
            "adload",
            "false",
            "facebook",
            "unknown",
            "meta",
            "direct",
            "this",
            "close",
            "locale",
            "model",
            "survey",
            "companion",
            "scroll",
            "backspace",
            "insert",
            "infinity",
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "runtime data",
            "ansi",
            "path",
            "hybrid analysis",
            "api call",
            "registry access",
            "function",
            "calls",
            "window",
            "hybrid",
            "general",
            "click",
            "ransomware",
            "february",
            "strings",
            "suspicious",
            "irequestslot",
            "islotbuilder",
            "amazonerrorcode",
            "errortype",
            "adunit",
            "conflict",
            "please"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/5da0de230eb98e5598b152944d0e7e6b355485484052df6c7f1c747e2c5564c0/63ed708125f47738b45a6520",
            "webpack   buildin global.js",
            "SlotBuilder.ts",
            "P34D56F9D-5684-4C83-8EE1-5EA7DE9CF45D.js",
            "apstag.js",
            "nlsSDK600.bundle.min.js",
            "v6s.js",
            "https://sb.scorecardresearch.com/p?c1=2&c2=6745306&ns_type=hidden&ns_st_sv=5.1.3.160420&ns_st_smv=5.1&ns_st_it=r&ns_st_id=1676508021004&ns_st_ec=3&ns_st_sp=1&ns_st_sc=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=hb&ns_st_po=1560430&ns_st_cl=0&ns_st_hc=31&ns_st_mp=js_api&ns_st_mv=5.1.3.160420&ns_st_pn=1&ns_st_tp=0&ns_st_ci=47976339133&ns_st_pt=1560430&ns_st_dpt=360423&ns_st_ipt=60010&ns_st_et=1560430&ns_st_det=360423&ns_st_upc=1560430&ns_st_dupc=360423&ns_st_iupc=60010&ns_st_upa=15604",
            "https://sb.scorecardresearch.com/p?ax_uuid=d247c6142f285bb0488533aa7f2d53c5&c1=9&c2=31864766&ns__t=1676508027511&ns_c=UTF-8&cv=3.1&c8=SecurityWeekly%20-%20Twitch&c7=https%3A%2F%2Fwww.twitch.tv%2Fsecurityweekly&c9=",
            "https://hybrid-analysis.com/sample/b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b/",
            "beacon.js",
            "https://static-cdn.jtvnw.net/jtv_user_pictures/6f4129f6-3750-4c02-b7c8-c88a05064129-profile_image-70x70.png"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "SlotBuilder",
              "display_name": "SlotBuilder",
              "target": null
            },
            {
              "id": "RequestBuilder",
              "display_name": "RequestBuilder",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1353,
            "hostname": 363,
            "domain": 201,
            "FileHash-SHA256": 203,
            "FileHash-MD5": 9,
            "FileHash-SHA1": 3
          },
          "indicator_count": 2132,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1128 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "63eab19e9340670c6d58f714",
          "name": "malware",
          "description": "[object Objecthttps://attack.mitre.org",
          "modified": "2023-03-16T00:12:03.978000",
          "created": "2023-02-13T21:54:38.088000",
          "tags": [
            "certificate",
            "owfa hotspot",
            "cnhotspot",
            "trust root",
            "number",
            "issuer",
            "validity",
            "gmt subject",
            "public key",
            "info",
            "mtpdrive",
            "usbdrive",
            "grep vn",
            "gvfsmtpm",
            "defaultcdrom",
            "ef grep",
            "media driver",
            "driver",
            "ztecdrom",
            "grep"
          ],
          "references": [
            "ea93cb5b.0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Lillylillith39",
            "id": "221303",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "SSLCertFingerprint": 2,
            "URL": 79,
            "domain": 28,
            "hostname": 36,
            "FileHash-SHA256": 12,
            "YARA": 1
          },
          "indicator_count": 158,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 32,
          "modified_text": "1130 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "63f619404ba8714b7e063140",
          "name": "auto_open_controller.js - all the things using this .js file ;-(",
          "description": "12a26eb45e5e3bd90c4578f8f07944baf981e6c083145990015ebc7474dee609",
          "modified": "2023-02-22T13:31:44.806000",
          "created": "2023-02-22T13:31:44.806000",
          "tags": [
            "memoryfile scan",
            "null",
            "runtime data",
            "void",
            "unknown",
            "android",
            "magento",
            "desktop",
            "dark",
            "scroll",
            "addressbar",
            "trigger",
            "template",
            "fast",
            "burn",
            "homepage",
            "class",
            "critical",
            "iframe",
            "lick",
            "open",
            "trace",
            "sapphire",
            "screen",
            "small",
            "close",
            "click",
            "ransomware",
            "strings",
            "malicious",
            "contains",
            "xnnew weakmap",
            "fnnew weakmap",
            "auto_open_controller.js",
            "12a26eb45e5e3bd90c4578f8f07944baf981e6c083145990015ebc7474dee609"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/12a26eb45e5e3bd90c4578f8f07944baf981e6c083145990015ebc7474dee609/63f3dde5af1db0386635b153",
            "12a26eb45e5e3bd90c4578f8f07944baf981e6c083145990015ebc7474dee609"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 380,
            "URL": 802,
            "hostname": 231,
            "domain": 245,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 1
          },
          "indicator_count": 1664,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1152 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "GCPressedStateInput.h",
        "XSUB.h",
        "AFKUser.tbd",
        "time64.h",
        "intrpvar.h",
        "IOBluetoothUIUserLib.h",
        "gssapi.h",
        "IOUSBHost.h",
        "https://hybrid-analysis.com/sample/5da0de230eb98e5598b152944d0e7e6b355485484052df6c7f1c747e2c5564c0/63ed708125f47738b45a6520",
        "lz4_assembly_select.h",
        "ASFoundation.h",
        "math.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialRegistrationRequest.h",
        "alc.h",
        "WKHTTPCookieStore.h",
        "sysctl.h",
        "You have to go through a series of steps to change themes and wallpapers , including powering off TV",
        "IOUSBHostDevice.h",
        "MCNearbyServiceBrowser.h",
        "nlsSDK600.bundle.min.js",
        "OSKextLib.h",
        "GCDeviceHaptics.h",
        "ASAuthorizationAppleIDRequest.h",
        "No phones or circuit board tech. Smart watches.You can\u2019t bring large bottles of hygiene products. Deal with a new reality!",
        "mg.h",
        "ASWebAuthenticationSession.h",
        "OSTypes.h",
        "GCAxisInput.h",
        "MapKit.tbd",
        "WKFrameInfo.h",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70/69a19551cb5537805706bca9",
        "IOUSBHostObject.h",
        "ASPasswordCredential.h",
        "overload.h",
        "ASAuthorizationAppleIDProvider.h",
        "MultipeerConnectivity.tbd",
        "OSBase.h",
        "ASAuthorizationError.h",
        "GKSavedGame.h",
        "dosish.h",
        "ASWebAuthenticationSessionRequest.h",
        "parser.h",
        "https://js.hsleadflows.net/leadflows.js",
        "ASAuthorizationController.h",
        "AFKMemoryDescriptorOptions.h",
        "ipc_types.h",
        "vecLib.h",
        "pycore_condvar.h",
        "hv_macro.h",
        "GameController.tbd",
        "GCDevicePhysicalInputState.h",
        "if_ether.h",
        "WKProcessPool.h",
        "ASAuthorizationPublicKeyCredentialDescriptor.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredentialAssertionRequest.h",
        "Clyde &Co | Chris Ahmann | Brian Sabey /Hall & Evans & Hall Render",
        "http://truefoundry.prodigaltech.com/",
        "hv_func.h",
        "oalMacOSX_OALExtensions.h",
        "Related to: https://otx.alienvault.com/pulse/69a1a73eb0578b92962dae97",
        "target.id  \u2022 tostring.call  \u2022 title.search",
        "stdatomic.h",
        "stddef.h",
        "WKDataDetectorTypes.h",
        "ASPasswordCredentialRequest.h",
        "util.h",
        "IOBluetooth.h",
        "GCDualSenseAdaptiveTrigger.h",
        "uconfig.h",
        "ASCredentialServiceIdentifier.h",
        "sel.h",
        "AuthenticationServices.apinotes",
        "WKPreviewActionItemIdentifiers.h",
        "GCXboxGamepad.h",
        "perly.h",
        "perl_inc_macro.h",
        "pio.h",
        "GKAchievementViewController.h",
        "UNDTypes.h",
        "gssapi_generic.h",
        "vm_far.h",
        "GCKeyNames.h",
        "IOUSBHost.tbd",
        "GKLeaderboardEntry.h",
        "AuthenticationServicesCore.tbd",
        "ASCredentialIdentityStore.h",
        "OSAtomic.h",
        "GKChallengeEventHandler.h",
        "GKGameSession.h",
        "GKMatch.h",
        "marriott-control-prd.accenture.cn",
        "preauth_plugin.h",
        "WKNavigation.h",
        "Targets associated warned. Not very open to advice.",
        "mg_raw.h",
        "vm_map.h",
        "xfe-URL-Enom.com-stix2-2.1-export 2.json",
        "al.h",
        "ip.h",
        "hv.h",
        "ASAuthorizationPasswordRequest.h",
        "perliol.h",
        "GCControllerInput.h",
        "module.modulemap",
        "endian.h",
        "accenture.cn",
        "reentr.h",
        "kdp_callout.h",
        "malloc_ctl.h",
        "Foundry Palantir still has a presence in Colorado",
        "IOUSBHostCIPortStateMachine.h",
        "IOBluetoothUserLib.h",
        "GCDevicePhysicalInputStateDiff.h",
        "IOUSBHostControllerInterfaceDefinitions.h",
        "tor.sebastianhahn.net \u2022 dap.digitalgov.gov \u2022 fbi.gov \u2022  x.com \u2022 sebastianhahn.net",
        "ASAuthorizationSingleSignOnProvider.h",
        "v6s.js",
        "machine_cpuid.h",
        "udp.h",
        "WKBackForwardList.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialRegistration.h",
        "GKPublicProtocols.h",
        "A man claiming to have the name Sebastian is communicating with targets love one",
        "GKChallenge.h",
        "GCSteeringWheelElement.h",
        "GCMotion.h",
        "GCMicroGamepadSnapshot.h",
        "WKFindConfiguration.h",
        "gssapi_krb5.h",
        "INUIAddVoiceShortcutButton.h",
        "memory_types.h",
        "in_private.h",
        "Tipped of new looming airline threats",
        "kdp_en_debugger.h",
        "tcp_var.h",
        "rpcv2.h",
        "OSMalloc.h",
        "xfe-URL-Serverhub.com-stix2-2.1-export.json",
        "icmp6.h",
        "ASAuthorizationPlatformPublicKeyCredentialRegistrationRequest.h",
        "plugin.js",
        "WKDownload.h",
        "12a26eb45e5e3bd90c4578f8f07944baf981e6c083145990015ebc7474dee609",
        "ASPasskeyAssertionCredential.h",
        "https://js.hscollectedforms.net/collectedforms.js",
        "GCMouseInput.h",
        "ASAuthorizationSingleSignOnCredential.h",
        "copyio.h",
        "table.h",
        "io.h",
        "vmparam.h",
        "form.h",
        "GKVoiceChatService.h",
        "GKMatchmaker.h",
        "GKPublicConstants.h",
        "OBEX.h",
        "WKContentWorld.h",
        "MCAdvertiserAssistant.h",
        "lz4_constants.h",
        "ASPasswordCredentialIdentity.h",
        "OSByteOrder.h",
        "WKPDFConfiguration.h",
        "WKUserScript.h",
        "Air Safety: it\u2019s important to have  passengers or hackers unable  to communicate via airline networks /",
        "MultipeerConnectivity.apinotes",
        "IOBluetoothUtilities.h",
        "signal.h",
        "AppSandbox.tbd",
        "_param.h",
        "WebDriver.tbd",
        "ASPublicKeyCredentialClientData.h",
        "https://hybrid-analysis.com/sample/9318798ecf1cf2d52d10ec99e821454ff81196ced4cb4337dcab41b79dcca0ec/642ecd01f0ad4977b40ce225",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
        "GKFriendRequestComposeViewController.h",
        "https://hybrid-analysis.com/sample/2f05feed2065b7385b156ebf3a7c6c19def3d412227cee0d46e8a53fb3e9ac41/697bc423b6e7a4dc46010737",
        "LDAP.tbd",
        "WKWebpagePreferences.h",
        "https://hybrid-analysis.com/sample/b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b/",
        "GCDualShockGamepad.h",
        "GCController.h",
        "ipc_pthread_priority_types.h",
        "regexp.h",
        "perl.h",
        "https://sb.scorecardresearch.com/p?ax_uuid=d247c6142f285bb0488533aa7f2d53c5&c1=9&c2=31864766&ns__t=1676508027511&ns_c=UTF-8&cv=3.1&c8=SecurityWeekly%20-%20Twitch&c7=https%3A%2F%2Fwww.twitch.tv%2Fsecurityweekly&c9=",
        "WKDownloadDelegate.h",
        "GCExtern.h",
        "perl_langinfo.h",
        "GCRacingWheelInput.h",
        "ASAuthorization.h",
        "locate_plugin.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationOutput.h",
        "igmp.h",
        "https://api.manus.im/api/oauth2_callback/apple",
        "WKURLSchemeHandler.h",
        "xfe-URL-Intercom.io-stix2-2.1-export.json",
        "perlio.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredential.h",
        "ASExtensionErrors.h",
        "ASCOSEConstants.h",
        "IOBluetoothServiceBrowserController.h",
        "GCDevice.h",
        "GKCloudPlayer.h",
        "ASAuthorizationWebBrowserExternallyAuthenticatableRequest.h",
        "GCSyntheticDeviceKeys.h",
        "OpenAL.tbd",
        "python-3.9.pc",
        "vm_fault.h",
        "TargetConditionals.h",
        "_limits.h",
        "arm_features.inc",
        "utf8.h",
        "GCTouchedStateInput.h",
        "IOBluetoothTypes.h",
        "tcp_seq.h",
        "IOUSBHostStream.h",
        "ASAccountAuthenticationModificationRequest.h",
        "Kerberos.h",
        "GCControllerDirectionPad.h",
        "https://widget.intercom.io/widget/rbc8ok9w",
        "https://hybrid-analysis.com/sample/e7740c893812cea8e34ffb04331dcc45762dec73def71929bfbabcbfb22e93e9/641e30763dcad56bc2075661",
        "ptrauth.h",
        "https://creative.miqdigital.com/.well-known/apple-app-site-association",
        "patchlevel.h",
        "ASWebAuthenticationSessionWebBrowserSessionHandling.h",
        "PCIDriverKit.h",
        "op.h",
        "feature.h",
        "IOUSBHostInterface.h",
        "vfs_support.h",
        "ip6.h",
        "unixish.h",
        "GCRacingWheel.h",
        "https://hybrid-analysis.com/sample/e7740c893812cea8e34ffb04331dcc45762dec73def71929bfbabcbfb22e93e9",
        "vm_pageout.h",
        "stdarg.h",
        "By remote view of NEW targeys view, all key calls are routed through him.",
        "tss.h",
        "GCControllerTouchpad.h",
        "ASAuthorizationAppleIDButton.h",
        "ASWebAuthenticationSessionCallback.h",
        "Tipped on hits and other savage plans  to be executed against targets. Targets can be any (1) person.",
        "IOBluetoothObjectPushUIController.h",
        "pp.h",
        "GKPlayer.h",
        "GKGameSessionError.h",
        "OSvKernDSPLib.h",
        "CredentialsCache2.h",
        "WKUserContentController.h",
        "tcp_timer.h",
        "GCPhysicalInputSource.h",
        "GKSavedGameListener.h",
        "calathea-containers.palantirfedstart.com \u2018 BYE ALREADY\u2019",
        "GCControllerButtonInput.h",
        "krb5.h",
        "ASAuthorizationProviderExtensionAuthorizationRequest.h",
        "asm_help.h",
        "Connects to all NEW targets key contacts main targets contacts.",
        "WebKitLegacy.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobAssertionOutput.h",
        "https://hybrid-analysis.com/sample/12a26eb45e5e3bd90c4578f8f07944baf981e6c083145990015ebc7474dee609/63f3dde5af1db0386635b153",
        "nfsproto.h",
        "mg_data.h",
        "tcpip.h",
        "embed.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialDescriptor.h",
        "beacon.js",
        "thread.h",
        "GCKeyboard.h",
        "in_systm.h",
        "WKContentRuleListStore.h",
        "IOUSBHostCIEndpointStateMachine.h",
        "in_var.h",
        "ASAuthorizationPublicKeyCredentialAssertion.h",
        "IOUSBHostIOSource.h",
        "nostdio.h",
        "popen_spawn_win32.py",
        "IOUSBHostDefinitions.h",
        "uuid.h",
        "CredentialsCache.h",
        "FBI files opened up on a targeted phone, Iunseel, only in search history.",
        "IntentsUI.apinotes",
        "vecLibTypes.h",
        "IOUSBHostControllerInterfaceHelpers.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobAssertionInput.h",
        "http://www.internationalfrontier.com/i/pdf/Montana-Presentation-2011.pdf",
        "invlist_inline.h",
        "libkern.h",
        "https://serverhub.com/combine/a059fe7a562c0b582328162f0ee69fda-1426025688",
        "GCLinearInput.h",
        "x86_64-apple-macos.swiftinterface",
        "WebKit.h",
        "BluetoothAssignedNumbers.h",
        "ASEProcessing.tbd",
        "https://js.hs-scripts.com/3844463.js",
        "https://hybrid-analysis.com/sample/41859e0b198fbe88772ef12c577023c0481ec19867e410bab335e67fea87c1bb/642ca80cde2048242a0e097d",
        "static_if.h",
        "Admin.tbd",
        "Some Colorado communities have been taken over by the State Government",
        "GKDefines.h",
        "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialProvider.h",
        "ASAuthorizationCredential.h",
        "internationalfrontier.com",
        "machine_machdep.h",
        "ASAuthorizationPlatformPublicKeyCredentialDescriptor.h",
        "monotonic.h",
        "EXTERN.h",
        "https://d31qbv1cthcecs.cloudfront.net/atrk.js",
        "git_version.h",
        "https://hybrid-analysis.com/sample/430c376c1754f1f160e3d68bafc970eba37811bdb08d73a86bf6f4be1e7267b3/69a1ea603a3303fa120dad19",
        "pmap.h",
        "ASAuthorizationPlatformPublicKeyCredentialAssertionRequest.h",
        "ASAuthorizationSingleSignOnRequest.h",
        "vm_memtag.h",
        "capture_0.bundle.js",
        "MCNearbyServiceAdvertiser.h",
        "_mcontext.h",
        "https://tylerjoycedenver.followupboss.com/unsubscribe/T6pEHkEaLZAN5Jxflvspix0zKbJZwfY9pjBpUTk7q06azxItZ7aiRb7brQhy1NNFqrcrUe4cKmI455MBqcwK9_it6dqx6QWdANshp0om1Bv-5ezKkyVJDphCHvPQNvMupI1owe03rtqYAyu8Cj3cWw~~",
        "GKNotificationBanner.h",
        "GameKit.h",
        "mg_vtable.h",
        "ASWebAuthenticationSessionWebBrowserSessionManager.h",
        "Foundry Foot Soldiers are still in Colorado targeting innocents",
        "GKTurnBasedMatch.h",
        "Sound crazy. We know Palantir commits ALL manner of crime. They are money motivated.",
        "OSDebug.h",
        "perldtrace.h",
        "audit_ioctl.h",
        "opcode.h",
        "INUIAddVoiceShortcutViewController.h",
        "AirPlayReceiver.tbd",
        "GCControllerAxisInput.h",
        "GKLocalPlayer.h",
        "config.xml",
        "cop.h",
        "ASAccountAuthenticationModificationController.h",
        "apstag.js",
        "bitcount.h",
        "Luxury Apartments and Townhome communities do use Foundry Palantir",
        "Attacker being used by several legal entities attacking a target\u2019s family",
        "WKScriptMessage.h",
        "GKGameCenterViewController.h",
        "GCTypes.h",
        "GCSwitchPositionInput.h",
        "GKGameSessionSharingViewController.h",
        "IOPCIFamilyDefinitions.h",
        "ASAccountAuthenticationModificationViewController.h",
        "ASAccountAuthenticationModificationReplacePasswordWithSignInWithAppleRequest.h",
        "I would post his public information. It may be unwise.",
        "oalStaticBufferExtension.h",
        "perlvars.h",
        "OSReturn.h",
        "GCGamepadSnapshot.h",
        "GCDeviceBattery.h",
        "ASAuthorizationCustomMethod.h",
        "git.spywarewatchdog.org",
        "GCAxisElement.h",
        "zconf.h",
        "IOBluetoothDeviceSelectorController.h",
        "gv.h",
        "machine_kpc.h",
        "WKWebsiteDataStore.h",
        "libperl.tbd",
        "op_reg_common.h",
        "IntentsUI.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialAssertion.h",
        "I\u2019m not sure what brings man to from NY to Denver today. I consider him malicious",
        "WKSecurityOrigin.h",
        "GKPeerPickerController.h",
        "ASAuthorizationPasswordProvider.h",
        "INUIEditVoiceShortcutViewController.h",
        "iperlsys.h",
        "ASAuthorizationWebBrowserPublicKeyCredentialManager.h",
        "OBEXBluetooth.h",
        "http://web.basemark.com/result/?4A3D0fmu%1C%00%00%00B%00a%00s%00e%00m%00a%00r%00k",
        "INTERN.h",
        "WebGPU.tbd",
        "GKTurnBasedMatchmakerViewController.h",
        "capture_resize.js",
        "vm_options.h",
        "GCMouse.h",
        "_OSByteOrder.h",
        "GameKit.apinotes",
        "ASAuthorizationProviderExtensionAuthorizationResult.h",
        "https://static-cdn.jtvnw.net/jtv_user_pictures/6f4129f6-3750-4c02-b7c8-c88a05064129-profile_image-70x70.png",
        "bootp.h",
        "UNDReply.defs",
        "Uses code, no phone calls. Connected via instagram.",
        "GCGearShifterElement.h",
        "WKPreviewActionItem.h",
        "vDSP.h",
        "WKScriptMessageHandlerWithReply.h",
        "crc.h",
        "AppleUSBDescriptorParsing.h",
        "cpu_capabilities_public.h",
        "https://hybrid-analysis.com/sample/45e147babe00d1834af72b2139dbc65043ee50cb09d1d4e470f9bd48ad50c6bf/64283fca3a07828f100b2551",
        "cpu.h",
        "xfe-URL-Cloudfront.net-stix2-2.1-export.json",
        "ASAuthorizationPublicKeyCredentialRegistration.h",
        "KerberosLogin.h",
        "GCExtendedGamepad.h",
        "IOBluetoothUI.tbd",
        "ASPublicKeyCredential.h",
        "GKAccessPoint.h",
        "lz4.h",
        "IOPCIDevice.h",
        "uudmap.h",
        "opnames.h",
        "https://apple.btprmjo.cc/",
        "nfs.h",
        "l1_char_class_tab.h",
        "WKURLSchemeTask.h",
        "GKMatchmakerViewController.h",
        "GCPhysicalInputProfile.h",
        "ip_var.h",
        "version.h",
        "webpack   buildin global.js",
        "http://www.salesmanago.pl/static/sm.js",
        "vm_shared_region.h",
        "ASAuthorizationPublicKeyCredentialConstants.h",
        "ASAccountAuthenticationModificationExtensionContext.h",
        "GKEventListener.h",
        "fakesdio.h",
        "WKSnapshotConfiguration.h",
        "WKUIDelegate.h",
        "GCColor.h",
        "WKContextMenuElementInfo.h",
        "mydtrace.h",
        "ASAuthorizationAppleIDCredential.h",
        "vm_compressor_algorithms.h",
        "MultipeerConnectivity.h",
        "igmp_var.h",
        "WKError.h",
        "http://www.internationalfrontier.com",
        "python3.pc",
        "ASCredentialProviderViewController.h",
        "keywords.h",
        "zlib.h",
        "ASAuthorizationPublicKeyCredentialParameters.h",
        "MCError.h",
        "types.h",
        "ASCredentialIdentity.h",
        "in_arp.h",
        "config.h",
        "https://www.justice.gov/opa/pr/departmen.t",
        "atm_types.h",
        "time64_config.h",
        "OpenAL.h",
        "sv.h",
        "python-3.9-embed.pc",
        "GCGamepad.h",
        "locks.h",
        "ebcdic_tables.h",
        "GKBasePlayer.h",
        "string.h",
        "https://hybrid-analysis.com/sample/9bf30967dfbf84d91ff4a1ca66dcd6c3383e679917e8b7aa4f659ff9f4e848d7/6426cf48655f94b6b303704c",
        "AuthenticationServices.h",
        "_endian.h",
        "pal_routines.h",
        "perlsdio.h",
        "IOUSBHostCIDeviceStateMachine.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialAssertionRequest.h",
        "https://tor.sebastianhahn.net \u2022 faui2k9.de\t \u2022 gitbot.faui2k9.de \u2022 tor-dirauth.sebastianhahn.net \u2022",
        "perl_siphash.h",
        "kpi_ipfilter.h",
        "GKSession.h",
        "cpuid.h",
        "GKLeaderboardSet.h",
        "Hours after files were deemed malicious. We powered on targeted Smart TV",
        "MCSession.h",
        "in_pcb.h",
        "pad.h",
        "xfe-URL-Eonix.net-stix2-2.1-export.json",
        "ASAuthorizationPlatformPublicKeyCredentialProvider.h",
        "com_err.h",
        "GKLeaderboardScore.h",
        "WKWebsiteDataRecord.h",
        "NSAttributedString.h",
        "ASPasskeyCredentialRequestParameters.h",
        "GKChallengesViewController.h",
        "WebKit.apinotes",
        "WKWebView.h",
        "param.h",
        "canvas.html",
        "WKWebViewConfiguration.h",
        "ASAuthorizationPlatformPublicKeyCredentialAssertion.h",
        "ASAuthorizationPlatformPublicKeyCredentialRegistration.h",
        "GCAxis2DInput.h",
        "tcp_fsm.h",
        "https://serverhub.com/modules/system/assets/js/framework.js",
        "http://www.internationalfrontier.com/i/pdf/2017-04-03-IFR-2017.pdf",
        "machine_remote_time.h",
        "perlapi.h",
        "c.j.location.host \u2022 videodata.video \u2022 referrer.search",
        "WKNavigationAction.h",
        "INImage+IntentsUI.h",
        "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialAssertionRequest.h",
        "WKPreferences.h",
        "udp_var.h",
        "machine_routines.h",
        "WKOpenPanelParameters.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationInput.h",
        "GCDevicePhysicalInput.h",
        "stdbool.h",
        "arch.h",
        "KUNCUserNotifications.h",
        "atomic.h",
        "tcp.h",
        "We have foot soldiers. Be aware",
        "xdr_subs.h",
        "GCInputNames.h",
        "cv.h",
        "tree.h",
        "stdint.h",
        "SlotBuilder.ts",
        "P34D56F9D-5684-4C83-8EE1-5EA7DE9CF45D.js",
        "GKLeaderboardViewController.h",
        "embedvar.h",
        "ASAccountAuthenticationModificationUpgradePasswordToStrongPasswordRequest.h",
        "IOUSBHostPipe.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredentialProvider.h",
        "ASPasskeyCredentialIdentity.h",
        "WKNavigationResponse.h",
        "scope.h",
        "regcomp.h",
        "ASCredentialIdentityStoreState.h",
        "UNDRequest.defs",
        "IOBluetoothPairingController.h",
        "GCDeviceLight.h",
        "GKAchievementDescription.h",
        "ea93cb5b.0",
        "IOPCIDevice.iig",
        "GKScore.h",
        "krpc.h",
        "GKDialogController.h",
        "GCDirectionPadElement.h",
        "WKBackForwardListItem.h",
        "WKScriptMessageHandler.h",
        "ASAuthorizationRequest.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialProvider.h",
        "GKSessionError.h",
        "metaconfig.h",
        "IOUSBHostControllerInterface.h",
        "av.h",
        "apfs_boot_mount.tbd",
        "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialRegistrationRequest.h",
        "GCExtendedGamepadSnapshot.h",
        "unicode_constants.h",
        "limits.h",
        "GCEventViewController.h",
        "MCPeerID.h",
        "IOBluetoothUI.h",
        "GCRelativeInput.h",
        "pp_proto.h",
        "GKLeaderboard.h",
        "https://sb.scorecardresearch.com/p?c1=2&c2=6745306&ns_type=hidden&ns_st_sv=5.1.3.160420&ns_st_smv=5.1&ns_st_it=r&ns_st_id=1676508021004&ns_st_ec=3&ns_st_sp=1&ns_st_sc=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=hb&ns_st_po=1560430&ns_st_cl=0&ns_st_hc=31&ns_st_mp=js_api&ns_st_mv=5.1.3.160420&ns_st_pn=1&ns_st_tp=0&ns_st_ci=47976339133&ns_st_pt=1560430&ns_st_dpt=360423&ns_st_ipt=60010&ns_st_et=1560430&ns_st_det=360423&ns_st_upc=1560430&ns_st_dupc=360423&ns_st_iupc=60010&ns_st_upa=15604",
        "IOBluetoothPasskeyDisplay.h",
        "GCDirectionalGamepad.h",
        "cpuid_internal.h",
        "profile.h",
        "Denver Justice System. Palantir allegedly moved  potato Headquarters to Miami",
        "GCPhysicalInputElement.h",
        "vBasicOps.h",
        "GCControllerElement.h",
        "vForce.h",
        "GCKeyCodes.h",
        "reg_help.h",
        "icmp_var.h",
        "handy.h",
        "vm_dyld_pager.h",
        "WKWindowFeatures.h",
        "GCProductCategories.h",
        "WKNavigationDelegate.h",
        "GKError.h",
        "I need some help.",
        "IOUSBHostCIControllerStateMachine.h",
        "GCDualSenseGamepad.h",
        "ASCredentialProviderExtensionContext.h",
        "AdID.tbd",
        "IOBluetooth.tbd",
        "_types.h",
        "GCSwitchElement.h",
        "zaphod32_hash.h",
        "WKPreviewElementInfo.h",
        "trap.h",
        "marriott-datacenter-prd.accenture.cn",
        "GCMicroGamepad.h",
        "ASPasskeyRegistrationCredential.h",
        "inline.h",
        "Bluetooth.h",
        "ASPasskeyCredentialRequest.h",
        "utfebcdic.h",
        "in_stat.h",
        "https://bilety.polregio.pl",
        "ASAuthorizationPublicKeyCredentialAssertionRequest.h",
        "SwiftUI.swiftoverlay",
        "ip_icmp.h",
        "WebKit.tbd",
        "WKFoundation.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredentialRegistrationRequest.h",
        "desc.h",
        "WKFindResult.h",
        "ASAuthorizationPublicKeyCredentialRegistrationRequest.h",
        "encode.h",
        "Accurately tipped about air travel safety. In past. Proven true.",
        "GameController.h",
        "MCBrowserViewController.h",
        "regnodes.h",
        "WKContentRuleList.h",
        "vm_kern.h",
        "GKVoiceChat.h",
        "tcp_private.h",
        "GCDeviceCursor.h",
        "ASAuthorizationOpenIDRequest.h",
        "GKAchievement.h",
        "http://bilety.polregio.pl",
        "vutil.h",
        "warnings.h",
        "UNDTypes.defs",
        "ASAuthorizationProvider.h",
        "GCKeyboardInput.h",
        "ASCredentialRequest.h",
        "ASSettingsHelper.h",
        "GCButtonElement.h",
        "GKGameSessionEventListener.h",
        "Significant? The screen once had a floral theme. Now a black background with a single fish as Wallpaper .",
        "Block.h",
        "sbox32_hash.h",
        "arm64e-apple-macos.swiftinterface",
        "python3-embed.pc",
        "byte_order.h",
        "Quasi Government: Specifically Pinnacol and Commerce & Industry ( AIG)"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "Turla Group, FIN7, APT34, APT28, DragonForce Malaysia Hacker Group, Indonesia Islamic Warriors Counc"
          ],
          "malware_families": [
            "Vui",
            "Internet",
            "Outubro",
            "Vasaris",
            "Rabu",
            "Requestbuilder",
            "Srpanj",
            "Anda",
            "Tente",
            "Trackingclient",
            "Slotbuilder",
            "Node traffic",
            "Osatomic",
            "Osreturn",
            "Ver"
          ],
          "industries": [],
          "unique_indicators": 150258
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/i.id",
    "whois": "http://whois.domaintools.com/i.id",
    "domain": "i.id",
    "hostname": "this.i.id"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 50,
  "pulses": [
    {
      "id": "69a2127d12dce12538b57d72",
      "name": "FBI Files | Tor device connection | Unique attack against (non -criminal) monitored targets  ~ Apple Jacked Targets",
      "description": "Remote Attack - FBI Files | Tor device connection | Unique attack against (non -criminal) monitored targets.\n\nChecked search history on a targeted device and found an FBI link apparently delivered via unknown AI technology.\n|| yara detections\nzur foerderung\nA\n+ Add Tag\n\u8840\nCount: 1\nGRO Probability: 1\nText: Suricata Alerts Event\nCategory Description CID\nIND131.188.40.12g otx.alienvault.com\nlocal:49181 (TCP) Misc\nAttack ET TOR Known Tor\nRelay/Router (Not Exit)\n\"A\" | [[Next pulse will list on malware, rats , bats, Trojans used]",
      "modified": "2026-03-29T20:03:36.333000",
      "created": "2026-02-27T21:54:05.261000",
      "tags": [
        "pattern match",
        "heuristic match",
        "all url",
        "files domain",
        "pulses otx",
        "germany unknown",
        "aaaa",
        "ip address",
        "emails",
        "gmt server",
        "vary",
        "modified",
        "accept",
        "title",
        "present feb",
        "present jan",
        "united",
        "part",
        "moved",
        "passive dns",
        "cname",
        "final",
        "bill",
        "antivm",
        "xlsx",
        "xlsm",
        "urls",
        "otx logo",
        "all hostname",
        "server",
        "organization",
        "city",
        "stateprovince",
        "postal code",
        "phone",
        "registrar abuse",
        "privacy admin",
        "paris admin",
        "april",
        "direct",
        "february",
        "http",
        "dfn verein",
        "zur foerderung",
        "domain",
        "page url",
        "tags",
        "de summary",
        "erlangen",
        "germany",
        "securitytrails",
        "de seen",
        "general info",
        "geo erlangen",
        "as as680",
        "de note",
        "route",
        "data upload",
        "extraction",
        "failed",
        "extra data",
        "referen",
        "include review",
        "exclude data",
        "summary",
        "url age",
        "as680",
        "se source",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "over",
        "ascii text",
        "mitre att",
        "size",
        "null",
        "refresh",
        "span",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "node traffic",
        "tlsv1",
        "search",
        "rgba",
        "medium",
        "read c",
        "module load",
        "t1129",
        "execution",
        "next",
        "dock",
        "write",
        "persistence",
        "calls",
        "apis",
        "reads",
        "model",
        "value",
        "getprocaddress",
        "show technique",
        "ck matrix",
        "access type",
        "windir",
        "regexp",
        "open",
        "date",
        "format",
        "virtual disk drive",
        "sha256",
        "sha1",
        "body",
        "filehashsha1",
        "found",
        "unknown",
        "stop",
        "root",
        "form",
        "9999",
        "sandbox",
        "malware",
        "analysis",
        "online",
        "submit",
        "vxstream",
        "sample",
        "download",
        "trojan",
        "apt",
        "hybrid analysis",
        "api key",
        "vetting process",
        "please note",
        "please",
        "bad traffic",
        "et info",
        "tls handshake",
        "failure",
        "flag",
        "analysis tip",
        "openurl c",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "show",
        "pulse pulses",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "malicious yara",
        "detections none",
        "less ip",
        "dynamicloader",
        "get na",
        "c3bhaw",
        "high",
        "copy",
        "guard",
        "push",
        "Palantir",
        "Foundry",
        "Whitehouse",
        "X.Com",
        "Justice.gov",
        "Apple",
        "AI",
        "node traffic"
      ],
      "references": [
        "tor.sebastianhahn.net \u2022 dap.digitalgov.gov \u2022 fbi.gov \u2022  x.com \u2022 sebastianhahn.net",
        "https://tor.sebastianhahn.net \u2022 faui2k9.de\t \u2022 gitbot.faui2k9.de \u2022 tor-dirauth.sebastianhahn.net \u2022",
        "http://truefoundry.prodigaltech.com/",
        "git.spywarewatchdog.org",
        "marriott-control-prd.accenture.cn",
        "marriott-datacenter-prd.accenture.cn",
        "accenture.cn",
        "c.j.location.host \u2022 videodata.video \u2022 referrer.search",
        "target.id  \u2022 tostring.call  \u2022 title.search",
        "https://hybrid-analysis.com/sample/2f05feed2065b7385b156ebf3a7c6c19def3d412227cee0d46e8a53fb3e9ac41/697bc423b6e7a4dc46010737",
        "https://hybrid-analysis.com/sample/430c376c1754f1f160e3d68bafc970eba37811bdb08d73a86bf6f4be1e7267b3/69a1ea603a3303fa120dad19",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70/69a19551cb5537805706bca9",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
        "calathea-containers.palantirfedstart.com \u2018 BYE ALREADY\u2019",
        "http://truefoundry.prodigaltech.com/",
        "Attacker being used by several legal entities attacking a target\u2019s family",
        "Clyde &Co | Chris Ahmann | Brian Sabey /Hall & Evans & Hall Render",
        "Luxury Apartments and Townhome communities do use Foundry Palantir",
        "Some Colorado communities have been taken over by the State Government",
        "Quasi Government: Specifically Pinnacol and Commerce & Industry ( AIG)",
        "Denver Justice System. Palantir allegedly moved  potato Headquarters to Miami",
        "Foundry Foot Soldiers are still in Colorado targeting innocents",
        "Foundry Palantir still has a presence in Colorado",
        "I need some help.",
        "Accurately tipped about air travel safety. In past. Proven true.",
        "Tipped of new looming airline threats",
        "Tipped on hits and other savage plans  to be executed against targets. Targets can be any (1) person.",
        "Sound crazy. We know Palantir commits ALL manner of crime. They are money motivated.",
        "FBI files opened up on a targeted phone, Iunseel, only in search history.",
        "Air Safety: it\u2019s important to have  passengers or hackers unable  to communicate via airline networks /",
        "No phones or circuit board tech. Smart watches.You can\u2019t bring large bottles of hygiene products. Deal with a new reality!",
        "Hours after files were deemed malicious. We powered on targeted Smart TV",
        "You have to go through a series of steps to change themes and wallpapers , including powering off TV",
        "Significant? The screen once had a floral theme. Now a black background with a single fish as Wallpaper .",
        "A man claiming to have the name Sebastian is communicating with targets love one",
        "Uses code, no phone calls. Connected via instagram.",
        "I\u2019m not sure what brings man to from NY to Denver today. I consider him malicious",
        "By remote view of NEW targeys view, all key calls are routed through him.",
        "Targets associated warned. Not very open to advice.",
        "I would post his public information. It may be unwise.",
        "Connects to all NEW targets key contacts main targets contacts.",
        "We have foot soldiers. Be aware",
        "https://www.justice.gov/opa/pr/departmen.t",
        "https://api.manus.im/api/oauth2_callback/apple",
        "https://apple.btprmjo.cc/",
        "https://creative.miqdigital.com/.well-known/apple-app-site-association",
        "internationalfrontier.com",
        "http://www.internationalfrontier.com/i/pdf/2017-04-03-IFR-2017.pdf",
        "http://www.internationalfrontier.com",
        "http://www.internationalfrontier.com/i/pdf/Montana-Presentation-2011.pdf",
        "https://tylerjoycedenver.followupboss.com/unsubscribe/T6pEHkEaLZAN5Jxflvspix0zKbJZwfY9pjBpUTk7q06azxItZ7aiRb7brQhy1NNFqrcrUe4cKmI455MBqcwK9_it6dqx6QWdANshp0om1Bv-5ezKkyVJDphCHvPQNvMupI1owe03rtqYAyu8Cj3cWw~~",
        "Related to: https://otx.alienvault.com/pulse/69a1a73eb0578b92962dae97"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Node Traffic",
          "display_name": "Node Traffic",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1048",
          "name": "Exfiltration Over Alternative Protocol",
          "display_name": "T1048 - Exfiltration Over Alternative Protocol"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1048.003",
          "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
          "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
        },
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1007",
          "name": "System Service Discovery",
          "display_name": "T1007 - System Service Discovery"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1555",
          "name": "Credentials from Password Stores",
          "display_name": "T1555 - Credentials from Password Stores"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1614",
          "name": "System Location Discovery",
          "display_name": "T1614 - System Location Discovery"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1055.011",
          "name": "Extra Window Memory Injection",
          "display_name": "T1055.011 - Extra Window Memory Injection"
        },
        {
          "id": "T1055.001",
          "name": "Dynamic-link Library Injection",
          "display_name": "T1055.001 - Dynamic-link Library Injection"
        },
        {
          "id": "T1055.004",
          "name": "Asynchronous Procedure Call",
          "display_name": "T1055.004 - Asynchronous Procedure Call"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1055.014",
          "name": "VDSO Hijacking",
          "display_name": "T1055.014 - VDSO Hijacking"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5643,
        "domain": 700,
        "hostname": 1918,
        "FileHash-SHA256": 1161,
        "FileHash-MD5": 235,
        "email": 4,
        "FileHash-SHA1": 200,
        "CVE": 1,
        "CIDR": 2,
        "SSLCertFingerprint": 9
      },
      "indicator_count": 9873,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "20 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69aa019f4509897e354fe029",
      "name": "credit Q Vashti Cloned Pulse ",
      "description": "",
      "modified": "2026-03-29T20:03:36.333000",
      "created": "2026-03-05T22:20:15.324000",
      "tags": [
        "pattern match",
        "heuristic match",
        "all url",
        "files domain",
        "pulses otx",
        "germany unknown",
        "aaaa",
        "ip address",
        "emails",
        "gmt server",
        "vary",
        "modified",
        "accept",
        "title",
        "present feb",
        "present jan",
        "united",
        "part",
        "moved",
        "passive dns",
        "cname",
        "final",
        "bill",
        "antivm",
        "xlsx",
        "xlsm",
        "urls",
        "otx logo",
        "all hostname",
        "server",
        "organization",
        "city",
        "stateprovince",
        "postal code",
        "phone",
        "registrar abuse",
        "privacy admin",
        "paris admin",
        "april",
        "direct",
        "february",
        "http",
        "dfn verein",
        "zur foerderung",
        "domain",
        "page url",
        "tags",
        "de summary",
        "erlangen",
        "germany",
        "securitytrails",
        "de seen",
        "general info",
        "geo erlangen",
        "as as680",
        "de note",
        "route",
        "data upload",
        "extraction",
        "failed",
        "extra data",
        "referen",
        "include review",
        "exclude data",
        "summary",
        "url age",
        "as680",
        "se source",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "over",
        "ascii text",
        "mitre att",
        "size",
        "null",
        "refresh",
        "span",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "node traffic",
        "tlsv1",
        "search",
        "rgba",
        "medium",
        "read c",
        "module load",
        "t1129",
        "execution",
        "next",
        "dock",
        "write",
        "persistence",
        "calls",
        "apis",
        "reads",
        "model",
        "value",
        "getprocaddress",
        "show technique",
        "ck matrix",
        "access type",
        "windir",
        "regexp",
        "open",
        "date",
        "format",
        "virtual disk drive",
        "sha256",
        "sha1",
        "body",
        "filehashsha1",
        "found",
        "unknown",
        "stop",
        "root",
        "form",
        "9999",
        "sandbox",
        "malware",
        "analysis",
        "online",
        "submit",
        "vxstream",
        "sample",
        "download",
        "trojan",
        "apt",
        "hybrid analysis",
        "api key",
        "vetting process",
        "please note",
        "please",
        "bad traffic",
        "et info",
        "tls handshake",
        "failure",
        "flag",
        "analysis tip",
        "openurl c",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "show",
        "pulse pulses",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "malicious yara",
        "detections none",
        "less ip",
        "dynamicloader",
        "get na",
        "c3bhaw",
        "high",
        "copy",
        "guard",
        "push",
        "Palantir",
        "Foundry",
        "Whitehouse",
        "X.Com",
        "Justice.gov",
        "Apple",
        "AI",
        "node traffic"
      ],
      "references": [
        "tor.sebastianhahn.net \u2022 dap.digitalgov.gov \u2022 fbi.gov \u2022  x.com \u2022 sebastianhahn.net",
        "https://tor.sebastianhahn.net \u2022 faui2k9.de\t \u2022 gitbot.faui2k9.de \u2022 tor-dirauth.sebastianhahn.net \u2022",
        "http://truefoundry.prodigaltech.com/",
        "git.spywarewatchdog.org",
        "marriott-control-prd.accenture.cn",
        "marriott-datacenter-prd.accenture.cn",
        "accenture.cn",
        "c.j.location.host \u2022 videodata.video \u2022 referrer.search",
        "target.id  \u2022 tostring.call  \u2022 title.search",
        "https://hybrid-analysis.com/sample/2f05feed2065b7385b156ebf3a7c6c19def3d412227cee0d46e8a53fb3e9ac41/697bc423b6e7a4dc46010737",
        "https://hybrid-analysis.com/sample/430c376c1754f1f160e3d68bafc970eba37811bdb08d73a86bf6f4be1e7267b3/69a1ea603a3303fa120dad19",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70/69a19551cb5537805706bca9",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
        "calathea-containers.palantirfedstart.com \u2018 BYE ALREADY\u2019",
        "http://truefoundry.prodigaltech.com/",
        "Attacker being used by several legal entities attacking a target\u2019s family",
        "Clyde &Co | Chris Ahmann | Brian Sabey /Hall & Evans & Hall Render",
        "Luxury Apartments and Townhome communities do use Foundry Palantir",
        "Some Colorado communities have been taken over by the State Government",
        "Quasi Government: Specifically Pinnacol and Commerce & Industry ( AIG)",
        "Denver Justice System. Palantir allegedly moved  potato Headquarters to Miami",
        "Foundry Foot Soldiers are still in Colorado targeting innocents",
        "Foundry Palantir still has a presence in Colorado",
        "I need some help.",
        "Accurately tipped about air travel safety. In past. Proven true.",
        "Tipped of new looming airline threats",
        "Tipped on hits and other savage plans  to be executed against targets. Targets can be any (1) person.",
        "Sound crazy. We know Palantir commits ALL manner of crime. They are money motivated.",
        "FBI files opened up on a targeted phone, Iunseel, only in search history.",
        "Air Safety: it\u2019s important to have  passengers or hackers unable  to communicate via airline networks /",
        "No phones or circuit board tech. Smart watches.You can\u2019t bring large bottles of hygiene products. Deal with a new reality!",
        "Hours after files were deemed malicious. We powered on targeted Smart TV",
        "You have to go through a series of steps to change themes and wallpapers , including powering off TV",
        "Significant? The screen once had a floral theme. Now a black background with a single fish as Wallpaper .",
        "A man claiming to have the name Sebastian is communicating with targets love one",
        "Uses code, no phone calls. Connected via instagram.",
        "I\u2019m not sure what brings man to from NY to Denver today. I consider him malicious",
        "By remote view of NEW targeys view, all key calls are routed through him.",
        "Targets associated warned. Not very open to advice.",
        "I would post his public information. It may be unwise.",
        "Connects to all NEW targets key contacts main targets contacts.",
        "We have foot soldiers. Be aware",
        "https://www.justice.gov/opa/pr/departmen.t",
        "https://api.manus.im/api/oauth2_callback/apple",
        "https://apple.btprmjo.cc/",
        "https://creative.miqdigital.com/.well-known/apple-app-site-association",
        "internationalfrontier.com",
        "http://www.internationalfrontier.com/i/pdf/2017-04-03-IFR-2017.pdf",
        "http://www.internationalfrontier.com",
        "http://www.internationalfrontier.com/i/pdf/Montana-Presentation-2011.pdf",
        "https://tylerjoycedenver.followupboss.com/unsubscribe/T6pEHkEaLZAN5Jxflvspix0zKbJZwfY9pjBpUTk7q06azxItZ7aiRb7brQhy1NNFqrcrUe4cKmI455MBqcwK9_it6dqx6QWdANshp0om1Bv-5ezKkyVJDphCHvPQNvMupI1owe03rtqYAyu8Cj3cWw~~",
        "Related to: https://otx.alienvault.com/pulse/69a1a73eb0578b92962dae97"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Node Traffic",
          "display_name": "Node Traffic",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1048",
          "name": "Exfiltration Over Alternative Protocol",
          "display_name": "T1048 - Exfiltration Over Alternative Protocol"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1048.003",
          "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
          "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
        },
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1007",
          "name": "System Service Discovery",
          "display_name": "T1007 - System Service Discovery"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1555",
          "name": "Credentials from Password Stores",
          "display_name": "T1555 - Credentials from Password Stores"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1614",
          "name": "System Location Discovery",
          "display_name": "T1614 - System Location Discovery"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1055.011",
          "name": "Extra Window Memory Injection",
          "display_name": "T1055.011 - Extra Window Memory Injection"
        },
        {
          "id": "T1055.001",
          "name": "Dynamic-link Library Injection",
          "display_name": "T1055.001 - Dynamic-link Library Injection"
        },
        {
          "id": "T1055.004",
          "name": "Asynchronous Procedure Call",
          "display_name": "T1055.004 - Asynchronous Procedure Call"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1055.014",
          "name": "VDSO Hijacking",
          "display_name": "T1055.014 - VDSO Hijacking"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "69a2127d12dce12538b57d72",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5644,
        "domain": 701,
        "hostname": 1920,
        "FileHash-SHA256": 1161,
        "FileHash-MD5": 235,
        "email": 4,
        "FileHash-SHA1": 200,
        "CVE": 1,
        "CIDR": 2,
        "SSLCertFingerprint": 9
      },
      "indicator_count": 9877,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "20 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69c1bd40f81db45dc044697c",
      "name": "Masterkey Clone By CallmeDoris",
      "description": "",
      "modified": "2026-03-23T22:22:56.940000",
      "created": "2026-03-23T22:22:56.940000",
      "tags": [
        "dropped file",
        "chromeua",
        "runtime data",
        "drmedgeua",
        "edgeua",
        "generator",
        "win64",
        "null",
        "template",
        "unknown",
        "critical",
        "addressbar",
        "desktop",
        "dark",
        "light",
        "iframe",
        "cookie",
        "meta",
        "body",
        "legend",
        "dwis",
        "core",
        "tear",
        "malicious",
        "mozilla",
        "strings",
        "qakbot",
        "://masterkey.com.ua/download/MKClientSetup.exe"
      ],
      "references": [
        "https://hybrid-analysis.com/sample/41859e0b198fbe88772ef12c577023c0481ec19867e410bab335e67fea87c1bb/642ca80cde2048242a0e097d"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "642db7b656049e54b2f71c20",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 949,
        "URL": 5642,
        "CVE": 2,
        "domain": 509,
        "FileHash-SHA256": 293,
        "FileHash-MD5": 550,
        "FileHash-SHA1": 60,
        "email": 5
      },
      "indicator_count": 8010,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 47,
      "modified_text": "26 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6892e73b32af18aa302df0dc",
      "name": "Part 1.5",
      "description": "Dark web media \u2022 Political news \u2022 Malvertizing\nlocate \u2022\ntrack [stalk] \u2022 record calls \u2022 control media [youtube , etc] http://t.name?n[++i]=e:this.removeEventListener\t\t\nJeeng &\nPowebox [ accidentally left out in original post pulse]",
      "modified": "2025-09-05T04:03:06.929000",
      "created": "2025-08-06T05:25:15.369000",
      "tags": [
        "chromeua",
        "optout",
        "object",
        "path",
        "value",
        "access type",
        "setval",
        "windir",
        "localappdata",
        "null",
        "win64",
        "error",
        "generator",
        "close",
        "roboto",
        "date",
        "format",
        "light",
        "span",
        "template",
        "void",
        "android",
        "body",
        "trident",
        "mexico",
        "sonic",
        "black",
        "critical",
        "desktop",
        "dark",
        "meta",
        "this",
        "june",
        "hybrid",
        "apache",
        "write",
        "crypto",
        "autodetect",
        "face",
        "courier",
        "gigi",
        "impact",
        "shadow",
        "click",
        "strings",
        "cray",
        "smwg",
        "eret",
        "footer",
        "infinity",
        "window",
        "canvas",
        "legend",
        "nuke",
        "lion",
        "4629",
        "ahav",
        "olsa",
        "false",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "file defense",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha1",
        "sha256",
        "script",
        "mitre att",
        "pattern match",
        "show technique",
        "iframe",
        "refresh",
        "august",
        "general",
        "local",
        "tools",
        "demo",
        "look",
        "verify",
        "restart",
        "url http",
        "small",
        "pulses url",
        "tellyoun",
        "showing",
        "entries",
        "url https",
        "indicator role",
        "title added",
        "active related",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "cc08",
        "f06a6b",
        "sfurl",
        "filehashsha256",
        "types",
        "indicators show",
        "search",
        "pulses",
        "filehashsha1",
        "adversaries",
        "found",
        "webp image",
        "ascii text",
        "riff",
        "size",
        "encrypt",
        "legacy",
        "filehashmd5",
        "united",
        "flag",
        "server",
        "markmonitor",
        "name server",
        "llc name",
        "overview dns",
        "requests domain",
        "country",
        "win32",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "medium risk",
        "yara",
        "detections",
        "malware",
        "copy",
        "show",
        "icmp traffic",
        "packing t1045",
        "t1045",
        "pdb path",
        "pe resource",
        "extraction",
        "data upload",
        "enter sc",
        "type",
        "extra data",
        "please",
        "failed",
        "review",
        "exclude data",
        "included review",
        "ic data",
        "suggeste",
        "stop",
        "type onow",
        "domain",
        "passive dns",
        "urls",
        "files related",
        "pulses none",
        "related tags",
        "none google",
        "safe browsing",
        "sc data",
        "extr amanuav",
        "review included",
        "manualy",
        "sugges excluded",
        "filehash",
        "md5 add",
        "pulse pulses",
        "url add",
        "http",
        "hostname",
        "files domain",
        "pulses otx",
        "virustotal",
        "hsmi192547107",
        "pulses hostname",
        "r dec",
        "customer dec",
        "iski dec",
        "decision dec",
        "va dec",
        "bitcoin",
        "bitcoin dec",
        "petra",
        "torstatus dec",
        "paul dec",
        "sodesc",
        "planet dec",
        "emilia",
        "heroin dec",
        "difference dec",
        "palantir dec",
        "loraxlive dec",
        "chaturbate dec",
        "sandra",
        "free dec",
        "marvel dec",
        "benjis dec",
        "fresh dec",
        "sodesc dec",
        "srdirport",
        "srhostname",
        "link dec",
        "types of",
        "italy",
        "china",
        "australia",
        "france",
        "turkey",
        "discovery",
        "information",
        "ck ids",
        "t1005",
        "local system",
        "t1007",
        "system service",
        "part",
        "track",
        "locate",
        "political",
        "civil society",
        "news",
        "created",
        "hours ago",
        "report spam",
        "t1555",
        "password",
        "t1560",
        "collected data",
        "t1573",
        "channel",
        "t1574",
        "execution flow",
        "scan",
        "iocs",
        "t1497",
        "u0lhmq",
        "mtawmq",
        "t1480",
        "guardrails",
        "t1486",
        "data encrypted",
        "learn more",
        "unsubscribe aug",
        "protocol",
        "t1074",
        "staged",
        "t1083",
        "t1102",
        "web service",
        "t1105",
        "tool transfer",
        "t1140",
        "data engineer",
        "candidate",
        "tlsv1",
        "odigicert inc",
        "stcalifornia",
        "lsan jose",
        "oadobe systems",
        "incorporated",
        "cndigicert sha2",
        "push",
        "next",
        "high",
        "write c",
        "ireland as16509",
        "delete",
        "dirty",
        "tags",
        "t1012",
        "flow endpoint",
        "security scan",
        "t1106",
        "copyright",
        "levelblue"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1007",
          "name": "System Service Discovery",
          "display_name": "T1007 - System Service Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1074",
          "name": "Data Staged",
          "display_name": "T1074 - Data Staged"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1102",
          "name": "Web Service",
          "display_name": "T1102 - Web Service"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1120",
          "name": "Peripheral Device Discovery",
          "display_name": "T1120 - Peripheral Device Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1486",
          "name": "Data Encrypted for Impact",
          "display_name": "T1486 - Data Encrypted for Impact"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1555",
          "name": "Credentials from Password Stores",
          "display_name": "T1555 - Credentials from Password Stores"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 608,
        "FileHash-SHA1": 433,
        "FileHash-SHA256": 3663,
        "URL": 17104,
        "domain": 1316,
        "email": 39,
        "hostname": 4208,
        "SSLCertFingerprint": 17
      },
      "indicator_count": 27388,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "226 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6892a73593f73dfc969779b0",
      "name": "Part I | Track | Locate | Political & Civil society \u2018news\u2019 campaigns",
      "description": "Part I | Track | Locate | Political & Civil society \u2018news\u2019 campaigns\n*[ddddd.msg]\n[http://tracking.eu1.glintinc.com]\n[stormer5v52vjsw66jmds7ndeecudq444woadhzr2plxlaayexnh6eqd]\n[stackstorm.ops.dev.az.glintinc.com]\n\u2022 http://stormer5v52vjsw66jmds7ndeecudq444woadhzr2plxlaayexnh6eqd.onion/peter-thiel-running-database-to-root-out-those-disloyal-to-the-leader/\\n \u2022\n[http://pixelrz.com/lists/keywords/tsara-brashears-assaulted-at-concentra/360]\n[http://pixelrz.com/lists/keywords/tsara-brashears-dead/360]",
      "modified": "2025-09-05T00:03:23.223000",
      "created": "2025-08-06T00:52:05.051000",
      "tags": [
        "url http",
        "small",
        "indicator role",
        "title added",
        "active related",
        "pulses hostname",
        "tellyoun",
        "n aug",
        "entries",
        "data upload",
        "extraction",
        "windows error",
        "june",
        "fwd urgent",
        "justice czech",
        "copy sha256",
        "rejectedfailed",
        "timestamp input",
        "message status",
        "actions august",
        "file",
        "actions june",
        "actions may",
        "cta4 https",
        "context related",
        "associated urls",
        "campaigncodedsc",
        "language",
        "uid http",
        "community",
        "sha256",
        "size42b type",
        "submitted",
        "august",
        "april",
        "internal error",
        "previous1",
        "iframe",
        "community score",
        "scan analysis",
        "malicious",
        "intelligence",
        "learn",
        "falcon sandbox",
        "submissions",
        "status",
        "adversaries",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "defense evasion",
        "windows folder",
        "found",
        "dlls",
        "impact",
        "chromeua",
        "optout",
        "object",
        "path",
        "value",
        "access type",
        "setval",
        "windir",
        "localappdata",
        "null",
        "win64",
        "error",
        "generator",
        "close",
        "roboto",
        "date",
        "format",
        "light",
        "span",
        "template",
        "void",
        "android",
        "body",
        "trident",
        "mexico",
        "sonic",
        "black",
        "critical",
        "desktop",
        "dark",
        "meta",
        "this",
        "hybrid",
        "apache",
        "write",
        "crypto",
        "autodetect",
        "face",
        "courier",
        "gigi",
        "shadow",
        "click",
        "strings",
        "cray",
        "smwg",
        "eret",
        "footer",
        "infinity",
        "window",
        "canvas",
        "legend",
        "nuke",
        "lion",
        "4629",
        "ahav",
        "olsa",
        "false"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1007",
          "name": "System Service Discovery",
          "display_name": "T1007 - System Service Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1074",
          "name": "Data Staged",
          "display_name": "T1074 - Data Staged"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1102",
          "name": "Web Service",
          "display_name": "T1102 - Web Service"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1120",
          "name": "Peripheral Device Discovery",
          "display_name": "T1120 - Peripheral Device Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1486",
          "name": "Data Encrypted for Impact",
          "display_name": "T1486 - Data Encrypted for Impact"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1555",
          "name": "Credentials from Password Stores",
          "display_name": "T1555 - Credentials from Password Stores"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 9062,
        "domain": 707,
        "hostname": 2318,
        "FileHash-MD5": 86,
        "FileHash-SHA1": 26,
        "FileHash-SHA256": 2096,
        "email": 5,
        "FilePath": 2,
        "URI": 1
      },
      "indicator_count": 14303,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "226 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68abf75bf3b03b94a6762409",
      "name": "(Repost) How to connect listeners to e.intercom | serverhub.com eonix.net",
      "description": "",
      "modified": "2025-08-25T05:40:43.552000",
      "created": "2025-08-25T05:40:43.552000",
      "tags": [
        "context",
        "error",
        "ajaxupdate",
        "request",
        "requestdata",
        "name",
        "xoctoberassets",
        "datarequest",
        "typesubmit",
        "typetext",
        "click",
        "function",
        "typeof c",
        "bootstrap",
        "javascript",
        "azaz",
        "popover",
        "typeof f",
        "typeof g",
        "typeof h",
        "vui",
        "anda",
        "tente",
        "outubro",
        "trackingclient",
        "srpanj",
        "rabu",
        "vasaris",
        "image",
        "typeof atrkopts",
        "800px",
        "40px",
        "i18n",
        "blockedemail",
        "typeof i18n",
        "hubspot",
        "captcha",
        "date",
        "please",
        "april",
        "august",
        "close",
        "february",
        "june",
        "form",
        "klik",
        "download",
        "window",
        "this",
        "next",
        "null",
        "blank",
        "este",
        "anna",
        "rserver",
        "mais",
        "void",
        "object",
        "typeerror",
        "array",
        "symbol",
        "bound",
        "typeof window",
        "typeof t",
        "invalid path",
        "unknown method",
        "phonenumber",
        "ninja",
        "typeof e",
        "edge",
        "dataname",
        "intercom",
        "typeof symbol",
        "apple",
        "webkiti",
        "criosi",
        "trident"
      ],
      "references": [
        "xfe-URL-Eonix.net-stix2-2.1-export.json",
        "xfe-URL-Serverhub.com-stix2-2.1-export.json",
        "xfe-URL-Enom.com-stix2-2.1-export 2.json",
        "https://widget.intercom.io/widget/rbc8ok9w",
        "https://js.hscollectedforms.net/collectedforms.js",
        "https://js.hsleadflows.net/leadflows.js",
        "https://d31qbv1cthcecs.cloudfront.net/atrk.js",
        "https://serverhub.com/combine/a059fe7a562c0b582328162f0ee69fda-1426025688",
        "https://serverhub.com/modules/system/assets/js/framework.js",
        "https://js.hs-scripts.com/3844463.js",
        "xfe-URL-Cloudfront.net-stix2-2.1-export.json",
        "xfe-URL-Intercom.io-stix2-2.1-export.json"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Vui",
          "display_name": "Vui",
          "target": null
        },
        {
          "id": "Outubro",
          "display_name": "Outubro",
          "target": null
        },
        {
          "id": "Tente",
          "display_name": "Tente",
          "target": null
        },
        {
          "id": "Anda",
          "display_name": "Anda",
          "target": null
        },
        {
          "id": "Vasaris",
          "display_name": "Vasaris",
          "target": null
        },
        {
          "id": "Rabu",
          "display_name": "Rabu",
          "target": null
        },
        {
          "id": "Srpanj",
          "display_name": "Srpanj",
          "target": null
        },
        {
          "id": "TrackingClient",
          "display_name": "TrackingClient",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "62719a4dec6d0aa4631b9b2f",
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5708,
        "hostname": 1541,
        "FileHash-SHA256": 876,
        "domain": 915,
        "CVE": 1,
        "FileHash-MD5": 1
      },
      "indicator_count": 9042,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "237 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6844240c68255798e08beb3b",
      "name": "Bilety online: Tw\u00f3j kolejowy partner w podr\u00f3\u017cy",
      "description": "Microsoft has created a new version of its XMLHttpRequest, which allows users to access a website, via a browser or browser without the permission of a third party, using the same address.",
      "modified": "2025-07-07T00:01:51.704000",
      "created": "2025-06-07T11:35:40.942000",
      "tags": [
        "sign",
        "google sign",
        "forgot email",
        "criminalip",
        "create account",
        "bilety online",
        "sprzeday biletw",
        "polregio",
        "ssdeep",
        "license",
        "typeerror",
        "regexp",
        "promise",
        "function",
        "version",
        "typeof symbol",
        "copyright",
        "google llc",
        "apache license",
        "date",
        "without",
        "error",
        "blank",
        "trident",
        "generator",
        "class",
        "mountain view",
        "android",
        "submission",
        "california",
        "common name",
        "google inc",
        "unit android",
        "country code",
        "us state",
        "sha1",
        "sha256",
        "imphash",
        "pehash",
        "file type",
        "vhash",
        "authentihash"
      ],
      "references": [
        "http://bilety.polregio.pl",
        "https://bilety.polregio.pl",
        "http://www.salesmanago.pl/static/sm.js"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 16,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1295,
        "hostname": 302,
        "domain": 137,
        "FileHash-SHA256": 996,
        "FileHash-MD5": 38,
        "FileHash-SHA1": 40,
        "IPv4": 1
      },
      "indicator_count": 2809,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 122,
      "modified_text": "286 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "67f33233092ab19b74879403",
      "name": "MacOS M2 Chip Infiltration: Game Center & XBOX Pod Game & Chat Server",
      "description": "pulse explores a variety of files, objects, and functions that could be associated with different system components, libraries, and protocols. It highlights a wide range of potential vulnerabilities that may exist in software related to system functions, APIs, data handling, and device interactions, including issues in devices like game controllers, HID devices, and platform-specific services (such as Apple and Android). The pulse references several components across different platforms (macOS, iOS, ARM architectures, and others), with a focus on low-level code, encryption libraries, system utilities, and network protocols like TCP, IP, and Bluetooth. The identified vulnerabilities could involve buffer overflows, deprecated functions, improper memory handling, and potential exploit vectors related to system security, performance, and integrity.",
      "modified": "2025-05-07T02:03:20.735000",
      "created": "2025-04-07T02:02:27.322000",
      "tags": [
        "helper macro",
        "param",
        "param inccache",
        "kerberos",
        "ccache",
        "api function",
        "ccapi",
        "api version",
        "param ioccache",
        "ccacheserver",
        "win32",
        "null",
        "code",
        "win64",
        "error",
        "union",
        "ccapideprecated",
        "ccacheapi",
        "ccapiv2h",
        "apple",
        "export",
        "united",
        "ccache api",
        "cplusplus",
        "x8664",
        "typedef",
        "patheq",
        "none",
        "popen",
        "terminate",
        "false",
        "winenv",
        "winexe",
        "frozen",
        "winservice",
        "python",
        "posixthreads",
        "pyhavecondvar",
        "ntthreads",
        "vista",
        "pyemulatedwincv",
        "ntddivista",
        "semaphore",
        "pycondt",
        "win7",
        "pybuildcore",
        "fall",
        "copyright",
        "technology",
        "all rights",
        "reserved",
        "america",
        "government",
        "within that",
        "klprincipal",
        "klloginoptions",
        "inpassword",
        "klboolean",
        "klindex inindex",
        "login",
        "klstatus",
        "kerberos login",
        "inst",
        "regexp",
        "typeof e",
        "function",
        "typeof t",
        "typeof o",
        "width",
        "typeof",
        "pseudo",
        "body",
        "sticky",
        "date",
        "class",
        "this",
        "void",
        "accept",
        "span",
        "krb5callconv",
        "apoptsreserved",
        "tktflgreserved",
        "kdcoptreserved",
        "krb5data",
        "eblock",
        "krb5address",
        "krb5keyblock",
        "service",
        "realm",
        "format",
        "general",
        "internal",
        "entropy",
        "mask",
        "mcpeerid",
        "mcsession",
        "property",
        "protocol",
        "create",
        "nsuinteger",
        "notifies",
        "mcsession api",
        "interface",
        "bonjour",
        "ascii lowercase",
        "abc company",
        "section",
        "bonjour txt",
        "mcextern",
        "attribute",
        "mcextern extern",
        "mcexternweak",
        "nsenum",
        "nsinteger",
        "mcerrorcode",
        "mcerrorunknown",
        "mcerrortimedout",
        "bonjour apis",
        "stop",
        "peer",
        "example",
        "tags",
        "session",
        "nsprogress",
        "nserror",
        "nsstring",
        "nsurl",
        "nsarray",
        "note",
        "ui element",
        "utf8 encoding",
        "nscopying",
        "nsdictionary",
        "webpackrequire",
        "webpackexports",
        "object",
        "adobe systems",
        "adobe",
        "incorporated",
        "dissemination",
        "touchmove",
        "window",
        "launch",
        "close",
        "core",
        "webview",
        "nwebpackrequire",
        "arraybuffer",
        "name",
        "typedarray",
        "prototype",
        "string",
        "number",
        "nvar",
        "meta",
        "infinity",
        "generator",
        "zero",
        "epsilon",
        "observer",
        "android",
        "freeze",
        "trim",
        "canvas",
        "simple",
        "bind",
        "fast",
        "next",
        "patch",
        "rest",
        "middle",
        "find",
        "enumerate",
        "facebook",
        "executor",
        "apiunavailable",
        "gamecontroller",
        "gcbuttoninput",
        "gcswitchinput",
        "nsobject",
        "apiavailable",
        "hid device",
        "cfstr",
        "iohiddeviceref",
        "boolean value",
        "c iohidmanager",
        "iohidmanager",
        "c iohiddevice",
        "issequential",
        "bool sequential",
        "bool canwrap",
        "nsset",
        "nsunavailable",
        "gcswitchelement",
        "bool",
        "share button",
        "xbox controller",
        "xbox elite",
        "xbox series",
        "gcxboxgamepad",
        "gcpoint2",
        "gcpoint2make",
        "gcpoint2 p",
        "cfinline bool",
        "gcpoint2equal",
        "gcpoint2 point1",
        "gcpoint2 point2",
        "gcrelativeinput",
        "isanalog",
        "bool analog",
        "hasinclude",
        "gcaxis2dinput",
        "gcpoint2 value",
        "gcaxiselement",
        "certain",
        "gcaxisinput",
        "gcbuttonelement",
        "gccontroller",
        "nsnotification",
        "chhapticengine",
        "gcmicrogamepad",
        "input",
        "menu button",
        "gcdevicelight",
        "gccolor",
        "x axis",
        "xvalue",
        "developers",
        "functionality",
        "options button",
        "sf symbols",
        "elements",
        "gcdevice",
        "gctouchstate",
        "gctouchstateup",
        "apideprecated",
        "gckeyboard",
        "gcmouse",
        "nsswiftname",
        "gcdevicebattery",
        "battery level",
        "direction pad",
        "directionapad",
        "thumbstick",
        "gcdevicecursor",
        "a controller",
        "gccolor color",
        "gcinputbuttona",
        "gcinputbuttonb",
        "button b",
        "check",
        "a element",
        "c nil",
        "nsenumerator",
        "siri remote",
        "equivalent",
        "down",
        "left",
        "right",
        "kindof",
        "handle button",
        "c device",
        "immediate input",
        "dualsense",
        "positional",
        "sony dualsense",
        "gcmotion",
        "dualshock",
        "uievent",
        "controllers",
        "uikit user",
        "uiview",
        "method",
        "nsdata",
        "axes",
        "nsdata source",
        "return",
        "nullable",
        "nsdata object",
        "button",
        "shoulder",
        "extended",
        "gamepad profile",
        "nsdata api",
        "gcgamepad",
        "sizeof",
        "standard",
        "gckeyboardinput",
        "keyboard",
        "nsstring const",
        "controller",
        "back buttons",
        "game controller",
        "back",
        "keypad",
        "delete",
        "insert",
        "home",
        "right arrow",
        "left arrow",
        "down arrow",
        "up arrow",
        "korean",
        "backspace",
        "alongside",
        "gckeyuparrow",
        "gckeycode const",
        "lang1",
        "gclinearinput",
        "gcquaternion",
        "gcacceleration",
        "y axis",
        "z axis",
        "gcmouse mouse",
        "gcmouse class",
        "mice",
        "gcmouseinput",
        "mouse profile",
        "scroll",
        "nsdata instance",
        "a alias",
        "press",
        "micro profile",
        "siri remotes",
        "b button",
        "a gcinput",
        "button a",
        "nsoptions",
        "examining",
        "c sfsymbolsname",
        "apple tv",
        "remote",
        "control center",
        "a set",
        "game",
        "gcracingwheel",
        "gcbundlewithpid",
        "gcinputbuttonx",
        "gcinputbuttony",
        "gcinputshifter",
        "gckeya",
        "gckeyb",
        "gckeybackslash",
        "rawvalue",
        "apple swift",
        "o librarylevel",
        "swift import",
        "element",
        "indices",
        "iterator",
        "subsequence",
        "kerberoscomerr",
        "const",
        "permission",
        "mit software",
        "suitability",
        "athena",
        "openvision",
        "gssdllimp",
        "gssapigenerich",
        "this software",
        "purpose",
        "disclaims all",
        "warranties with",
        "regard to",
        "constraint",
        "kerberosprofile",
        "krb5profileh",
        "const names",
        "newvalue",
        "1429577728l",
        "gnuc",
        "mach",
        "omuint32",
        "gssapikrb5h",
        "form",
        "uid form",
        "client function",
        "asrep",
        "including",
        "preauth",
        "db entry",
        "free",
        "pointer",
        "rock",
        "neither",
        "direct",
        "damage",
        "minorstatus",
        "gssbuffert",
        "gssctxidt",
        "gssoid",
        "gssnamet",
        "gsscredidt",
        "gssoidset",
        "gssapi",
        "first",
        "alcapi",
        "alcapientry",
        "alcboolean",
        "targetosmac",
        "alcdevice",
        "alcenum param",
        "alalch",
        "alcchar",
        "alcsizei",
        "capture",
        "but not",
        "limited",
        "openal cross",
        "apple computer",
        "redistribution",
        "is provided",
        "type",
        "alvoid",
        "alint",
        "openal",
        "aluint sid",
        "alenum",
        "alint value",
        "aluint property",
        "alvoid nonnull",
        "alfloat",
        "write",
        "openalopenalh",
        "umbrella header",
        "alenum param",
        "alapi",
        "aluint bid",
        "alsizei",
        "alfloat value",
        "alapientry",
        "aluint",
        "verify",
        "play",
        "speed",
        "bits",
        "albuffer3i",
        "albufferdata",
        "albufferf",
        "albufferfv",
        "albufferi",
        "albufferiv",
        "aldistancemodel",
        "aldopplerfactor",
        "algetbooleanv",
        "algetbuffer3f",
        "iousbhostdevice",
        "iousbhostobject",
        "iousbhostpipe",
        "iousbhoststream",
        "iousbhost",
        "brief",
        "usb host",
        "bool yes",
        "bool no",
        "advance",
        "iousbhostfamily",
        "kernel",
        "ioreturn status",
        "nsnumber",
        "ioreturn error",
        "usb device",
        "select",
        "commands",
        "enqueue",
        "nsmutabledata",
        "field",
        "enum",
        "options",
        "retrieve",
        "iosource",
        "current address",
        "bos descriptor",
        "extract",
        "a descriptor",
        "license",
        "io request",
        "abort",
        "discussion",
        "stream",
        "please",
        "swift api",
        "iousbbitrange",
        "iousbbitrange64",
        "iousbbit",
        "client",
        "usb controller",
        "usb descriptor",
        "unknown",
        "critical",
        "refer",
        "link",
        "send",
        "same",
        "common ui",
        "bluetooth",
        "service browser",
        "option",
        "1001",
        "cfstringref",
        "deprecated",
        "macos",
        "returns",
        "abstract",
        "nswindow",
        "creates",
        "mac os",
        "uuids",
        "uuid",
        "sdp service",
        "nsimage",
        "nsview",
        "mpasskeystring",
        "nsmutablearray",
        "uuid array",
        "ioreturn",
        "runmodal",
        "group",
        "command",
        "byte",
        "masks",
        "pduid",
        "l2cap",
        "range",
        "opcode",
        "packet",
        "major",
        "local",
        "profiles",
        "iobluetooth",
        "framework",
        "support",
        "host controller",
        "rfcomm",
        "minor class",
        "pseudoclass",
        "specific device",
        "headset",
        "peripheral",
        "desktop",
        "glasses",
        "device reset",
        "no hci",
        "hci controller",
        "returns number",
        "variable number",
        "packdata",
        "cstring",
        "pass",
        "path",
        "deprecated in",
        "obex session",
        "obexsessionref",
        "rfcomm channel",
        "obex",
        "does not",
        "l2cap channel",
        "inrefcon",
        "device",
        "length",
        "obex spec",
        "error code",
        "make",
        "headerid",
        "april",
        "alarm",
        "avrcplog",
        "audiolog",
        "bccmd16touint16",
        "bccmd16touint8",
        "bccmd32touint32",
        "hfplog",
        "obexcreatevcard",
        "obexsessionget",
        "uint16tobccmd16",
        "intents",
        "created",
        "andrea gottardo",
        "inimage",
        "intentsui",
        "project version",
        "inshortcut",
        "ibdesignable",
        "invoiceshortcut",
        "nsbundle",
        "siri",
        "beralloct",
        "berbvarrayadd",
        "berbvarrayfree",
        "berbvdup",
        "berbvecadd",
        "berbvecfree",
        "berbvfree",
        "berdump",
        "berdup",
        "berdupbv",
        "ldap",
        "vdspinput1",
        "vectorsize",
        "iirchannel",
        "osvkerndsplib",
        "pragmaonce",
        "paul chang",
        "fri mar",
        "original code",
        "apple operating",
        "modifications",
        "apple public",
        "source license",
        "version",
        "lframesize",
        "i386",
        "picify",
        "callmcount",
        "nonlazystub",
        "align",
        "roundtostack",
        "leaf",
        "import",
        "carnegie mellon",
        "carnegie",
        "inline void",
        "software",
        "school",
        "august",
        "xnuarchi386selh",
        "next computer",
        "mike demoney",
        "bruce martin",
        "state segment",
        "nxswappedfloat",
        "osswapint32",
        "inline float",
        "inline double",
        "osswapint64",
        "armlimitsh",
        "arm64",
        "useclangtypes",
        "bsdarmtypesh",
        "int8t",
        "gnuc typedef",
        "uint8t",
        "ansi c",
        "ansi",
        "use wchart",
        "armmcontexth",
        "mcontextt",
        "armparamh",
        "round",
        "darwinsizet",
        "darwinalign",
        "uint32t",
        "darwinalign32",
        "warranties",
        "a particular",
        "university",
        "armarch6zk",
        "armarch6k",
        "armarch4t",
        "armarch4",
        "http",
        "capbitnb",
        "legacy",
        "armfeatureflag",
        "california",
        "notice",
        "berkeley",
        "limited to",
        "define",
        "useclanglimits",
        "lp64",
        "ansisource",
        "darwincsource",
        "longmin",
        "ulongmax",
        "parameter",
        "vmmemcoherent",
        "vmmemearlyack",
        "vmmeminner",
        "vmmemrt",
        "vmmemguarded",
        "armmemorytypesh",
        "armpalroutinesh",
        "read",
        "struct",
        "booleant",
        "cluster",
        "devbsize",
        "mclbytes",
        "unix system",
        "laboratories",
        "devbshift",
        "thumb",
        "armv5",
        "armv7",
        "cache",
        "neon",
        "swift",
        "bsdarmprofileh",
        "xxx todo",
        "block",
        "mcount",
        "mcountinit",
        "mcountenter",
        "splhigh",
        "armthreadh",
        "armtraph",
        "dflssiz",
        "targetososx",
        "maxssiz",
        "rliminfinity",
        "maxcsiz",
        "bsdarmvmparamh",
        "dfldsiz",
        "maxdsiz",
        "xxx stack",
        "armsignal",
        "int64t",
        "armmachtypesh",
        "int32t",
        "methods",
        "thread",
        "hasapplepac",
        "atmatmtypesh",
        "libkernlocksh",
        "fortifysource",
        "libkerncopyioh",
        "sizedby",
        "darwinosinline",
        "stdcversion",
        "osswapint16",
        "libkerncrch",
        "blockexport",
        "vaargs",
        "blockrelease",
        "blockh",
        "collection",
        "blockcopy",
        "ososbaseh",
        "base",
        "byteoffset",
        "host endianess",
        "generic host",
        "generic",
        "osmalloc",
        "osmalloctag tag",
        "osmalloctag",
        "pci device",
        "uint32",
        "uint32 mask",
        "safecastptr",
        "sint32",
        "osaddatomic64",
        "uint8",
        "libkern c",
        "internal error",
        "core osreturn",
        "libkern",
        "values",
        "pragmamark",
        "kexts",
        "kext",
        "c string",
        "grab",
        "osostypesh",
        "boolean",
        "unsignedwide",
        "uint32 hi",
        "buildtime value",
        "libkernversionh",
        "versionmajor",
        "versionminor",
        "versionvariant",
        "versionrevision",
        "ostype",
        "osrelease",
        "libkernsysctlh",
        "instructions",
        "data cache",
        "future",
        "rbleft",
        "rbright",
        "rbgetparent",
        "splayright",
        "splayleft",
        "rbsetcolor",
        "rbblack",
        "rbgetcolor",
        "comp",
        "main",
        "stdc",
        "msdos",
        "windows",
        "sys16bit",
        "zlibdll",
        "zextern",
        "zconfh",
        "model",
        "zextern int",
        "zstreamerror",
        "znull",
        "zbuferror",
        "zmemerror",
        "zstreamend",
        "zdataerror",
        "zfinish",
        "enough",
        "possible",
        "trailer",
        "compiler",
        "countedby",
        "sparta",
        "osatomic",
        "ipcipctypesh",
        "ipcobjectnull",
        "ipcobjectdead",
        "osreturn",
        "nfskrpch",
        "xdrbuf",
        "xdrbuf xbp",
        "xbptr",
        "xbleft",
        "tlen",
        "lval",
        "xbcleanup",
        "xbtype",
        "xbflags",
        "nfsargsversion",
        "file",
        "packed",
        "nfshz",
        "mount",
        "term",
        "restrict",
        "stats",
        "nfsbitmapset",
        "nfsver3",
        "nfsxunsigned",
        "attr",
        "nfsprogram",
        "nfssmallfh",
        "which",
        "from",
        "mark",
        "obsolete",
        "ip address",
        "iaddrt",
        "netinetbootph",
        "nvmaxtext",
        "magic",
        "etheraddrlen",
        "target",
        "byteorder",
        "bigendian",
        "littleendian",
        "dest",
        "igmp",
        "ushort",
        "inpcbptr",
        "inpcblistentry",
        "ipsec",
        "pcbs",
        "cookie",
        "netinetinstath",
        "minimal",
        "result",
        "arp packet",
        "icmpparamprob",
        "icmpredirect",
        "address",
        "ditto",
        "ip filter",
        "ipv4",
        "ip packet",
        "inject",
        "wifi",
        "server",
        "tcpmaxnotifyack",
        "wired",
        "ecn setup",
        "notify",
        "slow",
        "definitions",
        "tcptmax",
        "retransmit",
        "mptcp",
        "tcpsclosewait",
        "tcpsestablished",
        "tcpstimewait",
        "tcpseq",
        "timer drift",
        "sack",
        "char",
        "icmp",
        "synack",
        "tcpoptnop",
        "syndata",
        "ver",
        "internet",
        "iopcidevice",
        "constant",
        "perst",
        "localonly",
        "iooptionbits",
        "optional access",
        "ioservice",
        "open",
        "pcidriverkith",
        "osmetaclassbase",
        "iorpc rpc",
        "auditpipeiobase",
        "auditsdeviobase",
        "ioctls",
        "data",
        "the software",
        "stdargh",
        "hasincludenext",
        "eli friedman",
        "as is",
        "hack",
        "atomic",
        "atomicseqcst",
        "clangstdatomich",
        "stdchosted",
        "stdboolh",
        "needwintt",
        "stddefh",
        "hasbuiltin",
        "const src",
        "xnumembersize",
        "const dst",
        "wcharmax",
        "wcharmin",
        "limits",
        "kernelstdinth",
        "lp64 typedef",
        "intmaxc",
        "uintmaxc",
        "ptrauth",
        "olddata",
        "value",
        "declkey",
        "abi pointer",
        "c function",
        "float16",
        "fltevalmethod",
        "legacy bsd",
        "c standard",
        "sincospi",
        "cosp",
        "x8664monotonich",
        "staticifentry",
        "hasmte",
        "vmmemorytypesh",
        "vmwimgdefault",
        "wimg",
        "extvectortype",
        "utilfunction",
        "aligned",
        "srcptr",
        "vmpmaph",
        "vmdyldpagerh",
        "vmvmfaulth",
        "vmvmmaph",
        "development",
        "debug",
        "vmvmoptionsh",
        "vmvmpageouth",
        "kasantbi",
        "machvmmemtagh",
        "given",
        "vmmemtagptrsize",
        "vmmemtagtagsize",
        "copy",
        "vmsharedregionh",
        "vfsvfssupporth",
        "veclib",
        "master",
        "world wide",
        "various",
        "veclibtypes",
        "carbonlib",
        "availability",
        "carbon",
        "noncarbon cfm",
        "vbasicops",
        "shift",
        "vforceh",
        "vdsplength n",
        "realp",
        "nonnull",
        "vector",
        "dspsplitcomplex",
        "ieee",
        "dspcomplex",
        "uuiduuidh",
        "uuiddefine",
        "public",
        "uuid library",
        "kernelserver",
        "simpleroutine",
        "undkey",
        "execution",
        "strings array",
        "user",
        "title string",
        "info",
        "1024",
        "xmldatat",
        "undreplyref",
        "kernsuccess",
        "osaction",
        "targetosiphone",
        "istargetvendor",
        "targetcpux8664",
        "targetosunix",
        "targetcpuppc",
        "targetcpuppc64",
        "targetcpux86",
        "targetrtmaccfm",
        "bridge",
        "svflags",
        "svpavreal",
        "svpavreify",
        "xpvav",
        "svany",
        "avfillp",
        "for apidoc",
        "mutableav",
        "avrealoff",
        "pltopenv",
        "stmtstart",
        "stmtend",
        "copfile",
        "plcurstackinfo",
        "copfilegv",
        "cophinthashget",
        "loop",
        "stack",
        "beware",
        "orig",
        "loops",
        "this file",
        "the build",
        "plbitcount",
        "u8 value",
        "cvflags",
        "xpvcv",
        "mutableptr",
        "perlcore",
        "cvgv",
        "cvfile",
        "cvfmethod",
        "cvflvalue",
        "cvfconst",
        "anon",
        "doinit extconst",
        "ebcdic",
        "extconst u8",
        "index",
        "ascii platform",
        "confusingly",
        "u8 pla2e",
        "pla2e",
        "u8 ple2a",
        "guard",
        "declspec",
        "extconst",
        "ext externc",
        "init",
        "larry wall",
        "gnu general",
        "readme file",
        "multiplicity",
        "plsawampersand",
        "do not",
        "perliogetc",
        "perlioputc",
        "perliostdoutf",
        "perlio",
        "perlfeatureh",
        "featuresubbit",
        "featuremyrefbit",
        "featurefcbit",
        "featureisabit",
        "featuresaybit",
        "featurestatebit",
        "featuretrybit",
        "hintfeaturemask",
        "ffspace",
        "process",
        "ffdecimal",
        "ffend",
        "gvgp",
        "gvflags",
        "gvnamehek",
        "svtype",
        "gvegv",
        "gvstash",
        "gvxpvgv",
        "svtpvgv",
        "svtpvlv",
        "super",
        "edit directly",
        "djgpp",
        "bitbucket",
        "perlsysinitbody",
        "perlioinit",
        "perlsystermbody",
        "w macros",
        "wexitstatus",
        "shpath",
        "mkdir",
        "rotl64",
        "rotl32",
        "rotate x",
        "rotr32",
        "can64bithash",
        "rotr64",
        "ivsize",
        "u8to16le",
        "rotluv",
        "rotruv",
        "sbox32maxlen",
        "plhashstate",
        "perlhash",
        "perl",
        "usehashseed",
        "perlseenhvfunch",
        "perlhashseed",
        "siphash24",
        "siphash13",
        "seed",
        "c program",
        "c type",
        "c compiler",
        "gcc attribute",
        "longsize",
        "c preprocessor",
        "install",
        "kill",
        "cont",
        "thus",
        "ext declspec",
        "dext",
        "for apidocitem",
        "utf8",
        "ascii",
        "fitsin8bits",
        "nativetolatin1",
        "strwithlen",
        "u8 end",
        "test",
        "poison",
        "february",
        "cray",
        "prior",
        "behaviour",
        "except",
        "alpha",
        "perlvar",
        "perlvari",
        "perlvara",
        "padoffset",
        "true",
        "pmop",
        "hooks",
        "hook",
        "sv invlist",
        "perlinregcompc",
        "svcur",
        "perlinopc",
        "tointernalsize",
        "svtinvlist",
        "invlistlen",
        "strlen",
        "hvaux",
        "heklen",
        "svook",
        "hekutf8",
        "hekkey",
        "hekflags",
        "mutablehv",
        "hvnameheknn",
        "gosh",
        "leave",
        "iperlsock",
        "plsock",
        "iperlstdio",
        "plstdio",
        "iperlproc",
        "plproc",
        "iperllio",
        "pllio",
        "perlimplicitsys",
        "plink",
        "keypackage",
        "keyend",
        "keysub",
        "keydump",
        "keylog",
        "keysend",
        "keystate",
        "perlioclose",
        "perlmemcollxfrm",
        "nativetoneed",
        "plclocaleobj",
        "plno",
        "plwarnall",
        "plwarnnone",
        "plyes",
        "plzero",
        "plc9utf8dfatab",
        "nomathoms",
        "perlintokec",
        "perlinutf8c",
        "perlinsvc",
        "perlinregexecc",
        "debugging",
        "perlinlocalec",
        "pfinet",
        "snoop",
        "ccprint",
        "ccgraph",
        "cccharnamecont",
        "ccascii",
        "ccwordchar",
        "ccalphanumeric",
        "ccidfirst",
        "ccquotemeta",
        "ccalpha",
        "cccased",
        "ordinal",
        "magicvtablemax",
        "extra",
        "regex match",
        "env hash",
        "isa array",
        "debugger",
        "sig hash",
        "available",
        "shadow",
        "array length",
        "magic mg",
        "sv sv",
        "mgftainteddir",
        "hefsvkey",
        "mutablesv",
        "ssizet",
        "mgvtbl entry",
        "mgfbytes",
        "perlmagicsv 0",
        "special",
        "perlmagicarylen",
        "perlmagicrhash",
        "extra data",
        "perlmagicpos",
        "perlmagicsymtab",
        "provides",
        "dtrace probes",
        "stdioh",
        "stdioincluded",
        "sfioversion",
        "rxfpmfcharset",
        "rxfpmfmultiline",
        "rxfpmffold",
        "rxfpmfextended",
        "rxfpmfnocapture",
        "rxfpmfkeepcopy",
        "flags",
        "rxfpmfstrict",
        "ocshift",
        "plop",
        "perlbitfield16",
        "baseop op",
        "useithreads",
        "pmfonce",
        "padop",
        "perlcknull",
        "perlckfun",
        "opparg1mask",
        "opparg4mask",
        "opparg2mask",
        "perlckftst",
        "perlppftrowned",
        "perlckbitop",
        "perlckcmp",
        "perlcklfun",
        "dump",
        "chroot",
        "syscall",
        "flip",
        "undef",
        "crypt",
        "push",
        "stub",
        "trans",
        "predec",
        "flop",
        "prtf",
        "shutdown",
        "perlcontext cx",
        "perlmemlog",
        "c pointer",
        "cxtype",
        "logic",
        "toavamg",
        "tohvamg",
        "opftrread",
        "oplt",
        "opincmp",
        "opbitand",
        "opsbitor",
        "opsend",
        "opgetpeername",
        "opfteexec",
        "opftbinary",
        "opclose",
        "plparser",
        "yylex",
        "lexshared",
        "position",
        "repl",
        "memsize",
        "malloct",
        "perlmallocctlh",
        "uv nfree",
        "uv ntotal",
        "iv topbucket",
        "iv totalsbrk",
        "iv minbucket",
        "level",
        "plcomppad",
        "plcurpad",
        "uvxf",
        "ptr2uv",
        "avarray",
        "padnameflags",
        "plcopseqmax",
        "padlistarray",
        "c array",
        "padnametype",
        "incpushperl5lib",
        "appllibexp",
        "privlibexp",
        "defineincmacros",
        "perlfsversion",
        "perl5lib",
        "sitearchexp",
        "perllanginfoh",
        "hasnllanginfo",
        "ilanginfo",
        "codeset",
        "codeset 1",
        "dtfmt",
        "dtfmt 2",
        "dfmt",
        "dfmt 3",
        "sipround",
        "u8to64le",
        "fallthrough",
        "uint64c",
        "perlsiphashfnc",
        "siprounds",
        "strlen inlen",
        "sipfinalrounds",
        "could",
        "configure",
        "plout",
        "mine001",
        "argv",
        "plin",
        "localpatchcount",
        "perlapih",
        "xs code",
        "portingglossary",
        "first version",
        "brand",
        "symbols",
        "haswcrtomb",
        "perlionotstdio",
        "perlcallconv",
        "perlio f",
        "perlioh",
        "usestdio",
        "case",
        "bufsiz",
        "sizet",
        "perlstability",
        "perltypedefs",
        "perldtracehin",
        "perlloadedfile",
        "perlloadingfile",
        "perlopentry",
        "perlphasechange",
        "perlsubentry",
        "perlsubreturn",
        "generated",
        "perlcallconv iv",
        "sizet count",
        "sv arg",
        "mode",
        "perliofuncs tab",
        "stdchar",
        "perliolistt",
        "sv args",
        "mutex",
        "perlinterpreter",
        "sigsize",
        "perlioisstdio",
        "perlcallconv op",
        "perldokv",
        "perlppaassign",
        "perlppabs",
        "perlppaccept",
        "perlppadd",
        "perlppaeach",
        "perlppaelem",
        "public license",
        "free software",
        "foundation",
        "yydebug",
        "bison",
        "bareword",
        "funcmeth",
        "arrow",
        "targ",
        "pushs",
        "tops",
        "does",
        "xsub",
        "pops",
        "xpushs",
        "erange",
        "perlreentrapi",
        "perlreentrapi0",
        "hostentsize",
        "getgrentrproto",
        "getpwentrproto",
        "getnetentrproto",
        "grentbuffer",
        "grentsize",
        "hostenterrno",
        "redebugflag",
        "debugvtest",
        "debugr",
        "u16 nextoff",
        "argset",
        "u8 type",
        "nextoff",
        "strings",
        "problem",
        "june",
        "invert",
        "perlfpclass",
        "longdoublekind",
        "plstatusvalue",
        "pldebug",
        "numclasses",
        "locale",
        "grok",
        "pragma",
        "dword",
        "attack",
        "little",
        "lynx",
        "done",
        "reany",
        "rxpextflags",
        "rxextflags",
        "checkpoint cp",
        "rxftaintedseen",
        "rxfcopydone",
        "plsavestackix",
        "plsavestack",
        "plsavestackmax",
        "ssmaxpush",
        "enter",
        "debugscope",
        "state",
        "u32 state",
        "debugsbox32hash",
        "sbox32warn5",
        "line",
        "mutexunlock",
        "mutexinit",
        "noop",
        "mutexlock",
        "condinit",
        "detach",
        "panic",
        "usetm64",
        "should",
        "bsd extension",
        "configuration",
        "time64debug",
        "int64t nv",
        "gnu extension",
        "perltime64h",
        "time64t",
        "int64t int64",
        "int64 time64t",
        "i32 year",
        "tm64",
        "hastmtmgmtoff",
        "decide",
        "svpvx",
        "svgmagic",
        "bonk",
        "anything",
        "turn",
        "crash",
        "fstat",
        "perlmicro",
        "hasioctl",
        "hasutime",
        "hasgroup",
        "haspasswd",
        "usemybinmode",
        "idirent",
        "likely",
        "generated code",
        "utfebcdic",
        "unicode",
        "step",
        "ufeff",
        "u00a0",
        "u00df",
        "u00b5",
        "ufffd",
        "u017f",
        "u0300",
        "unlikely",
        "nativeutf8toi8",
        "utf8skip",
        "nativetouni",
        "lazy",
        "extrasize",
        "regnodemax",
        "exact",
        "match",
        "whilem",
        "anyof",
        "curly",
        "trie",
        "curlym",
        "eval",
        "star",
        "perlutilh",
        "hsmapiverlen",
        "hsxsverlenmax",
        "hskeyp",
        "tools",
        "sv vs",
        "perlversionlt",
        "svpvxnolenconst",
        "perlckwarner",
        "u32 err",
        "scroakxsusage",
        "pluumap",
        "warnings",
        "categories",
        "plcurcop",
        "perlckwarn",
        "perlckwarnd",
        "perlwarnisset",
        "perlwarnoff",
        "perlwarnbit",
        "xsversion",
        "xsreturn",
        "perlxshandshake",
        "plstackbase",
        "hskey",
        "zaphod32mix",
        "u8to32le",
        "zaphod32warn4",
        "zaphod32warn3",
        "zaphod32warn6",
        "perlform",
        "i8tonativeutf8",
        "warnutf8",
        "myshift",
        "c extension",
        "libs",
        "cflags",
        "afkuserlog",
        "kafkeventcancel",
        "kafkeventerror",
        "adamsbagmanager",
        "adjinglerequest",
        "isinternalbuild",
        "kickmcxdforuid",
        "loadappkit",
        "ardconfig",
        "authenticator",
        "dsauthenticator",
        "dsnode",
        "dsrecord",
        "hostconfig",
        "addtofront",
        "calcslope",
        "copyarray",
        "createcachenode",
        "defaultebecurve",
        "deletecache",
        "disablehcucache",
        "dumpcache",
        "dumpoutputhcu",
        "enablet1sim",
        "ascagent",
        "ascagentproxy",
        "asdevice",
        "ddrangecompare",
        "wdosloglauncher",
        "wdoslogprotocol",
        "findchar",
        "ddasllogger",
        "ddfilelogger",
        "ddlog",
        "ddlogfileinfo",
        "ddlogmessage",
        "ddloggernode",
        "mkurlparser",
        "mkerrordomain",
        "mkintegerhash",
        "mklonghash",
        "mkmaprectinset",
        "mkmaprectnull",
        "mkmaprectoffset",
        "mkmaprectworld",
        "mkmapsizeworld",
        "kextensionnonui",
        "wkarraycreate",
        "wkbooleancreate",
        "wkcontextcreate",
        "wkdatacreate",
        "wkdatagettypeid",
        "wkdoublecreate",
        "wkframecopyurl",
        "wkgettypeid",
        "wkimagecreate",
        "wkpagecandelete",
        "webkit",
        "methodkind",
        "wkerrordomain",
        "by apple",
        "document",
        "a block",
        "wkcontentworld",
        "wkwebview",
        "javascript",
        "wkerrorcode",
        "wkerrorunknown",
        "nsswiftasync",
        "wkswiftasync",
        "wkcookiepolicy",
        "nshttpcookie",
        "whether",
        "wknavigation",
        "wkdownload",
        "decides",
        "mime type",
        "wkscriptmessage",
        "wkframeinfo",
        "information",
        "url scheme",
        "wkcontentmode",
        "wkuserscript",
        "wkextern",
        "media",
        "promise",
        "fulfill",
        "cgfloat",
        "targetoswatch",
        "sign",
        "password",
        "provider",
        "uicontrol",
        "nscontrol",
        "opaque user",
        "apple id",
        "nsstring user",
        "asuseragerange",
        "initiate",
        "asauthorization",
        "confirms",
        "apple upgrade",
        "nserrorenum",
        "operation",
        "relying party",
        "targetosvision",
        "a byte",
        "nsdata userid",
        "relying",
        "a string",
        "asapiavailable",
        "http response",
        "authorization",
        "oauth",
        "saml",
        "nsdata readdata",
        "bool didwrite",
        "a cose",
        "nsstring name",
        "bool appid",
        "targetosxr",
        "a state",
        "a json",
        "web token",
        "private seckeys",
        "nsstring appid",
        "mdm profile",
        "nsurl url",
        "returns yes",
        "lacontext",
        "asswiftsendable",
        "keychain",
        "cose algorithm",
        "ecdsa",
        "sha256",
        "cose curve",
        "p256",
        "nsinteger rank",
        "enables",
        "bool success",
        "remove",
        "call",
        "complete",
        "prepare",
        "attempt",
        "list",
        "nsextension",
        "settings",
        "initializes",
        "a key",
        "extensions",
        "hash",
        "json",
        "initialize",
        "nsstring origin",
        "settings app",
        "urls",
        "https urls",
        "safari",
        "cancel",
        "nsuuid uuid",
        "asextern extern",
        "asextern",
        "nsswiftsendable",
        "uiwindow",
        "propertykind",
        "gkplayer",
        "n tags",
        "gkerrordomain",
        "gamecenter",
        "targetosios",
        "targetostv",
        "nsavailable",
        "gkachievement",
        "local player",
        "view",
        "present",
        "optional",
        "gkbaseplayer",
        "game center",
        "uiimage",
        "app store",
        "gkchallenge",
        "gklocalplayer",
        "nsdeprecated",
        "a singleton",
        "gkcloudplayer",
        "returns nil",
        "nsdeprecatedmac",
        "internal2",
        "internal3",
        "internal4",
        "gkscore",
        "gkextern",
        "gkextern extern",
        "gkexternweak",
        "gkerrorcode",
        "gkerrorunknown",
        "gkerrorunderage",
        "friendplayer",
        "standard view",
        "nsresponder",
        "parentwindow",
        "ibaction",
        "gkgamesession",
        "apis",
        "gkplayer player",
        "nsinteger score",
        "nsdate date",
        "gkleaderboard",
        "connect",
        "nsinteger value",
        "load",
        "gktransporttype",
        "nsstring title",
        "loads array",
        "localized",
        "gkmatch",
        "gkmatchrequest",
        "gkinvite",
        "gksession",
        "gksession api",
        "gamekit",
        "asynchronously",
        "welcome",
        "nstimeinterval",
        "delegate",
        "delivery",
        "gksenddatamode",
        "gksessionmode",
        "gkphotosize",
        "callbacks",
        "gkmatchdelegate",
        "gksavedgame",
        "default value",
        "gksessionerror",
        "gkvoicechat",
        "participant",
        "voice chat",
        "clienta"
      ],
      "references": [
        "CredentialsCache.h",
        "CredentialsCache2.h",
        "config.xml",
        "popen_spawn_win32.py",
        "pycore_condvar.h",
        "Kerberos.h",
        "KerberosLogin.h",
        "plugin.js",
        "krb5.h",
        "MultipeerConnectivity.tbd",
        "MCBrowserViewController.h",
        "MCNearbyServiceAdvertiser.h",
        "MCError.h",
        "MCAdvertiserAssistant.h",
        "MCNearbyServiceBrowser.h",
        "MultipeerConnectivity.apinotes",
        "MultipeerConnectivity.h",
        "MCSession.h",
        "MCPeerID.h",
        "canvas.html",
        "capture_0.bundle.js",
        "capture_resize.js",
        "GCRacingWheelInput.h",
        "GCSyntheticDeviceKeys.h",
        "GCSwitchPositionInput.h",
        "GCSteeringWheelElement.h",
        "GCSwitchElement.h",
        "GCTouchedStateInput.h",
        "GCXboxGamepad.h",
        "GCTypes.h",
        "GCRelativeInput.h",
        "GameController.h",
        "GCAxis2DInput.h",
        "GCAxisElement.h",
        "GCAxisInput.h",
        "GCButtonElement.h",
        "GCController.h",
        "GCColor.h",
        "GCControllerAxisInput.h",
        "GCControllerDirectionPad.h",
        "GCControllerInput.h",
        "GCControllerElement.h",
        "GCControllerTouchpad.h",
        "GCDevice.h",
        "GCDeviceBattery.h",
        "GCDeviceCursor.h",
        "GCDeviceHaptics.h",
        "GCDeviceLight.h",
        "GCDevicePhysicalInputState.h",
        "GCDevicePhysicalInputStateDiff.h",
        "GCDirectionalGamepad.h",
        "GCDirectionPadElement.h",
        "GCDevicePhysicalInput.h",
        "GCDualSenseAdaptiveTrigger.h",
        "GCDualSenseGamepad.h",
        "GCDualShockGamepad.h",
        "GCEventViewController.h",
        "GCExtendedGamepadSnapshot.h",
        "GCExtern.h",
        "GCExtendedGamepad.h",
        "GCGamepadSnapshot.h",
        "GCGearShifterElement.h",
        "GCGamepad.h",
        "GCKeyboard.h",
        "GCInputNames.h",
        "GCControllerButtonInput.h",
        "GCKeyNames.h",
        "GCKeyboardInput.h",
        "GCKeyCodes.h",
        "GCLinearInput.h",
        "GCMotion.h",
        "GCMouse.h",
        "GCMouseInput.h",
        "GCMicroGamepadSnapshot.h",
        "GCPhysicalInputElement.h",
        "GCMicroGamepad.h",
        "GCPhysicalInputProfile.h",
        "GCPhysicalInputSource.h",
        "GCPressedStateInput.h",
        "GCProductCategories.h",
        "GCRacingWheel.h",
        "GameController.tbd",
        "arm64e-apple-macos.swiftinterface",
        "x86_64-apple-macos.swiftinterface",
        "module.modulemap",
        "com_err.h",
        "gssapi_generic.h",
        "locate_plugin.h",
        "profile.h",
        "gssapi_krb5.h",
        "preauth_plugin.h",
        "gssapi.h",
        "alc.h",
        "oalStaticBufferExtension.h",
        "oalMacOSX_OALExtensions.h",
        "OpenAL.h",
        "al.h",
        "OpenAL.tbd",
        "IOUSBHost.tbd",
        "IOUSBHostCIEndpointStateMachine.h",
        "IOUSBHostCIControllerStateMachine.h",
        "IOUSBHost.h",
        "IOUSBHostCIPortStateMachine.h",
        "IOUSBHostCIDeviceStateMachine.h",
        "IOUSBHostControllerInterfaceHelpers.h",
        "IOUSBHostDevice.h",
        "IOUSBHostControllerInterface.h",
        "IOUSBHostDefinitions.h",
        "IOUSBHostInterface.h",
        "IOUSBHostIOSource.h",
        "AppleUSBDescriptorParsing.h",
        "IOUSBHostStream.h",
        "IOUSBHostObject.h",
        "IOUSBHostControllerInterfaceDefinitions.h",
        "IOUSBHostPipe.h",
        "IOBluetoothUIUserLib.h",
        "IOBluetoothUI.h",
        "IOBluetoothObjectPushUIController.h",
        "IOBluetoothDeviceSelectorController.h",
        "IOBluetoothPasskeyDisplay.h",
        "IOBluetoothPairingController.h",
        "IOBluetoothServiceBrowserController.h",
        "IOBluetoothUI.tbd",
        "Bluetooth.h",
        "IOBluetooth.h",
        "BluetoothAssignedNumbers.h",
        "IOBluetoothTypes.h",
        "IOBluetoothUtilities.h",
        "OBEXBluetooth.h",
        "IOBluetoothUserLib.h",
        "OBEX.h",
        "IOBluetooth.tbd",
        "INImage+IntentsUI.h",
        "IntentsUI.h",
        "INUIAddVoiceShortcutButton.h",
        "IntentsUI.apinotes",
        "INUIEditVoiceShortcutViewController.h",
        "INUIAddVoiceShortcutViewController.h",
        "LDAP.tbd",
        "OSvKernDSPLib.h",
        "cpu.h",
        "asm_help.h",
        "desc.h",
        "pio.h",
        "io.h",
        "sel.h",
        "reg_help.h",
        "tss.h",
        "table.h",
        "byte_order.h",
        "_limits.h",
        "_types.h",
        "_mcontext.h",
        "_param.h",
        "_endian.h",
        "arch.h",
        "cpuid_internal.h",
        "cpu_capabilities_public.h",
        "arm_features.inc",
        "endian.h",
        "locks.h",
        "limits.h",
        "atomic.h",
        "machine_cpuid.h",
        "memory_types.h",
        "pal_routines.h",
        "machine_routines.h",
        "param.h",
        "cpuid.h",
        "thread.h",
        "trap.h",
        "vmparam.h",
        "signal.h",
        "types.h",
        "AFKMemoryDescriptorOptions.h",
        "machine_machdep.h",
        "atm_types.h",
        "copyio.h",
        "_OSByteOrder.h",
        "crc.h",
        "Block.h",
        "OSBase.h",
        "OSByteOrder.h",
        "OSDebug.h",
        "OSMalloc.h",
        "OSAtomic.h",
        "OSReturn.h",
        "OSKextLib.h",
        "OSTypes.h",
        "version.h",
        "sysctl.h",
        "tree.h",
        "zconf.h",
        "zlib.h",
        "libkern.h",
        "kdp_callout.h",
        "kdp_en_debugger.h",
        "ipc_types.h",
        "krpc.h",
        "rpcv2.h",
        "xdr_subs.h",
        "nfs.h",
        "nfsproto.h",
        "bootp.h",
        "if_ether.h",
        "icmp6.h",
        "icmp_var.h",
        "igmp_var.h",
        "igmp.h",
        "in_pcb.h",
        "in_stat.h",
        "in_private.h",
        "in_arp.h",
        "in_var.h",
        "in_systm.h",
        "ip_var.h",
        "ip_icmp.h",
        "kpi_ipfilter.h",
        "ip6.h",
        "tcp_private.h",
        "ip.h",
        "tcp_timer.h",
        "tcp_fsm.h",
        "udp_var.h",
        "tcp_seq.h",
        "tcpip.h",
        "udp.h",
        "tcp_var.h",
        "tcp.h",
        "IOPCIFamilyDefinitions.h",
        "IOPCIDevice.iig",
        "PCIDriverKit.h",
        "IOPCIDevice.h",
        "audit_ioctl.h",
        "stdarg.h",
        "stdatomic.h",
        "stdbool.h",
        "stddef.h",
        "string.h",
        "stdint.h",
        "ptrauth.h",
        "math.h",
        "monotonic.h",
        "static_if.h",
        "machine_kpc.h",
        "machine_remote_time.h",
        "ipc_pthread_priority_types.h",
        "lz4_assembly_select.h",
        "vm_compressor_algorithms.h",
        "lz4.h",
        "pmap.h",
        "vm_dyld_pager.h",
        "vm_far.h",
        "vm_fault.h",
        "vm_map.h",
        "lz4_constants.h",
        "vm_options.h",
        "vm_pageout.h",
        "vm_memtag.h",
        "vm_shared_region.h",
        "vm_kern.h",
        "vfs_support.h",
        "vecLib.h",
        "vecLibTypes.h",
        "vBasicOps.h",
        "vForce.h",
        "vDSP.h",
        "uuid.h",
        "UNDReply.defs",
        "UNDRequest.defs",
        "KUNCUserNotifications.h",
        "UNDTypes.defs",
        "UNDTypes.h",
        "TargetConditionals.h",
        "apfs_boot_mount.tbd",
        "av.h",
        "cop.h",
        "bitcount.h",
        "cv.h",
        "ebcdic_tables.h",
        "EXTERN.h",
        "embedvar.h",
        "fakesdio.h",
        "feature.h",
        "form.h",
        "gv.h",
        "git_version.h",
        "dosish.h",
        "hv_macro.h",
        "hv_func.h",
        "config.h",
        "INTERN.h",
        "handy.h",
        "intrpvar.h",
        "invlist_inline.h",
        "hv.h",
        "iperlsys.h",
        "keywords.h",
        "libperl.tbd",
        "embed.h",
        "l1_char_class_tab.h",
        "mg_data.h",
        "mg_raw.h",
        "mg.h",
        "mg_vtable.h",
        "mydtrace.h",
        "nostdio.h",
        "op_reg_common.h",
        "op.h",
        "opcode.h",
        "inline.h",
        "overload.h",
        "opnames.h",
        "parser.h",
        "malloc_ctl.h",
        "pad.h",
        "perl_inc_macro.h",
        "perl_langinfo.h",
        "perl_siphash.h",
        "patchlevel.h",
        "perlapi.h",
        "metaconfig.h",
        "perlio.h",
        "perldtrace.h",
        "perliol.h",
        "perlvars.h",
        "perlsdio.h",
        "pp_proto.h",
        "perly.h",
        "pp.h",
        "reentr.h",
        "regcomp.h",
        "perl.h",
        "regexp.h",
        "scope.h",
        "sbox32_hash.h",
        "time64_config.h",
        "time64.h",
        "sv.h",
        "unixish.h",
        "uconfig.h",
        "utfebcdic.h",
        "unicode_constants.h",
        "utf8.h",
        "regnodes.h",
        "util.h",
        "vutil.h",
        "uudmap.h",
        "warnings.h",
        "XSUB.h",
        "zaphod32_hash.h",
        "encode.h",
        "python-3.9.pc",
        "python-3.9-embed.pc",
        "python3-embed.pc",
        "python3.pc",
        "AFKUser.tbd",
        "AdID.tbd",
        "Admin.tbd",
        "AirPlayReceiver.tbd",
        "AppSandbox.tbd",
        "ASEProcessing.tbd",
        "AuthenticationServicesCore.tbd",
        "WebGPU.tbd",
        "WebDriver.tbd",
        "MapKit.tbd",
        "SwiftUI.swiftoverlay",
        "WebKit.tbd",
        "WebKit.apinotes",
        "WKBackForwardList.h",
        "NSAttributedString.h",
        "WebKit.h",
        "WKBackForwardListItem.h",
        "WKContentRuleList.h",
        "WKContentRuleListStore.h",
        "WKContextMenuElementInfo.h",
        "WKDataDetectorTypes.h",
        "WKContentWorld.h",
        "WKError.h",
        "WKFoundation.h",
        "WKFindResult.h",
        "WKHTTPCookieStore.h",
        "WKFrameInfo.h",
        "WKNavigation.h",
        "WKFindConfiguration.h",
        "WKNavigationDelegate.h",
        "WKNavigationResponse.h",
        "WKOpenPanelParameters.h",
        "WebKitLegacy.h",
        "WKPreviewActionItem.h",
        "WKNavigationAction.h",
        "WKPreferences.h",
        "WKPreviewActionItemIdentifiers.h",
        "WKPreviewElementInfo.h",
        "WKProcessPool.h",
        "WKDownload.h",
        "WKPDFConfiguration.h",
        "WKScriptMessage.h",
        "WKSecurityOrigin.h",
        "WKScriptMessageHandler.h",
        "WKSnapshotConfiguration.h",
        "WKUIDelegate.h",
        "WKURLSchemeTask.h",
        "WKWebpagePreferences.h",
        "WKUserContentController.h",
        "WKWebsiteDataStore.h",
        "WKWebsiteDataRecord.h",
        "WKUserScript.h",
        "WKURLSchemeHandler.h",
        "WKWebViewConfiguration.h",
        "WKWebView.h",
        "WKScriptMessageHandlerWithReply.h",
        "WKWindowFeatures.h",
        "WKDownloadDelegate.h",
        "ASAccountAuthenticationModificationController.h",
        "ASAccountAuthenticationModificationViewController.h",
        "ASAuthorization.h",
        "ASAuthorizationAppleIDButton.h",
        "ASAccountAuthenticationModificationRequest.h",
        "ASAuthorizationAppleIDProvider.h",
        "ASAuthorizationAppleIDRequest.h",
        "ASAuthorizationAppleIDCredential.h",
        "ASAuthorizationController.h",
        "ASAuthorizationCredential.h",
        "ASAccountAuthenticationModificationExtensionContext.h",
        "ASAuthorizationError.h",
        "ASAuthorizationCustomMethod.h",
        "ASAuthorizationPasswordRequest.h",
        "ASAuthorizationOpenIDRequest.h",
        "ASAuthorizationPlatformPublicKeyCredentialDescriptor.h",
        "ASAuthorizationPlatformPublicKeyCredentialProvider.h",
        "ASAccountAuthenticationModificationReplacePasswordWithSignInWithAppleRequest.h",
        "ASAccountAuthenticationModificationUpgradePasswordToStrongPasswordRequest.h",
        "ASAuthorizationPlatformPublicKeyCredentialRegistrationRequest.h",
        "ASAuthorizationPlatformPublicKeyCredentialRegistration.h",
        "ASAuthorizationProvider.h",
        "ASAuthorizationPlatformPublicKeyCredentialAssertion.h",
        "ASAuthorizationPublicKeyCredentialAssertion.h",
        "ASAuthorizationPublicKeyCredentialAssertionRequest.h",
        "ASAuthorizationPublicKeyCredentialConstants.h",
        "ASAuthorizationProviderExtensionAuthorizationResult.h",
        "ASAuthorizationPublicKeyCredentialDescriptor.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobAssertionOutput.h",
        "ASAuthorizationPasswordProvider.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationInput.h",
        "ASAuthorizationPublicKeyCredentialParameters.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationOutput.h",
        "ASAuthorizationPublicKeyCredentialRegistration.h",
        "ASAuthorizationPublicKeyCredentialRegistrationRequest.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobAssertionInput.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialAssertion.h",
        "ASAuthorizationRequest.h",
        "ASAuthorizationPlatformPublicKeyCredentialAssertionRequest.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialProvider.h",
        "ASAuthorizationSingleSignOnCredential.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialDescriptor.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialAssertionRequest.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialRegistration.h",
        "ASAuthorizationSingleSignOnProvider.h",
        "ASAuthorizationWebBrowserExternallyAuthenticatableRequest.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredentialAssertionRequest.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredentialRegistrationRequest.h",
        "ASAuthorizationWebBrowserPublicKeyCredentialManager.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredential.h",
        "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialAssertionRequest.h",
        "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialRegistrationRequest.h",
        "ASCOSEConstants.h",
        "ASCredentialIdentity.h",
        "ASAuthorizationSingleSignOnRequest.h",
        "ASCredentialIdentityStore.h",
        "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialProvider.h",
        "ASCredentialProviderExtensionContext.h",
        "ASCredentialProviderViewController.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialRegistrationRequest.h",
        "ASCredentialServiceIdentifier.h",
        "ASExtensionErrors.h",
        "ASAuthorizationProviderExtensionAuthorizationRequest.h",
        "ASCredentialRequest.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredentialProvider.h",
        "ASPasskeyAssertionCredential.h",
        "ASPasskeyCredentialRequest.h",
        "ASPasskeyCredentialRequestParameters.h",
        "ASCredentialIdentityStoreState.h",
        "ASPasskeyRegistrationCredential.h",
        "ASPasswordCredential.h",
        "ASPublicKeyCredential.h",
        "ASPasskeyCredentialIdentity.h",
        "ASPublicKeyCredentialClientData.h",
        "ASSettingsHelper.h",
        "ASWebAuthenticationSessionCallback.h",
        "ASWebAuthenticationSession.h",
        "ASWebAuthenticationSessionRequest.h",
        "ASWebAuthenticationSessionWebBrowserSessionManager.h",
        "AuthenticationServices.h",
        "ASFoundation.h",
        "AuthenticationServices.apinotes",
        "ASWebAuthenticationSessionWebBrowserSessionHandling.h",
        "ASPasswordCredentialIdentity.h",
        "ASPasswordCredentialRequest.h",
        "GameKit.apinotes",
        "GKAccessPoint.h",
        "GameKit.h",
        "GKAchievement.h",
        "GKAchievementViewController.h",
        "GKBasePlayer.h",
        "GKAchievementDescription.h",
        "GKChallengeEventHandler.h",
        "GKCloudPlayer.h",
        "GKChallengesViewController.h",
        "GKChallenge.h",
        "GKDefines.h",
        "GKError.h",
        "GKEventListener.h",
        "GKFriendRequestComposeViewController.h",
        "GKDialogController.h",
        "GKGameSessionEventListener.h",
        "GKGameSessionError.h",
        "GKGameCenterViewController.h",
        "GKGameSessionSharingViewController.h",
        "GKLeaderboardEntry.h",
        "GKLeaderboard.h",
        "GKLeaderboardScore.h",
        "GKGameSession.h",
        "GKLeaderboardSet.h",
        "GKLocalPlayer.h",
        "GKLeaderboardViewController.h",
        "GKMatch.h",
        "GKMatchmaker.h",
        "GKMatchmakerViewController.h",
        "GKPeerPickerController.h",
        "GKNotificationBanner.h",
        "GKPublicConstants.h",
        "GKPlayer.h",
        "GKPublicProtocols.h",
        "GKSavedGameListener.h",
        "GKScore.h",
        "GKSessionError.h",
        "GKVoiceChat.h",
        "GKTurnBasedMatchmakerViewController.h",
        "GKSession.h",
        "GKTurnBasedMatch.h",
        "GKSavedGame.h",
        "GKVoiceChatService.h"
      ],
      "public": 1,
      "adversary": "Turla Group, FIN7, APT34, APT28, DragonForce Malaysia Hacker Group, Indonesia Islamic Warriors Counc",
      "targeted_countries": [
        "United States of America",
        "India",
        "Australia"
      ],
      "malware_families": [
        {
          "id": "OSAtomic",
          "display_name": "OSAtomic",
          "target": null
        },
        {
          "id": "OSReturn",
          "display_name": "OSReturn",
          "target": null
        },
        {
          "id": "Ver",
          "display_name": "Ver",
          "target": null
        },
        {
          "id": "Internet",
          "display_name": "Internet",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1123",
          "name": "Audio Capture",
          "display_name": "T1123 - Audio Capture"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1016",
          "name": "System Network Configuration Discovery",
          "display_name": "T1016 - System Network Configuration Discovery"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1049",
          "name": "System Network Connections Discovery",
          "display_name": "T1049 - System Network Connections Discovery"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 39,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "ilyailya",
        "id": "298851",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1968,
        "domain": 526,
        "FileHash-SHA256": 207,
        "hostname": 972,
        "email": 55,
        "FileHash-SHA1": 9,
        "FileHash-MD5": 4,
        "CVE": 2,
        "CIDR": 10
      },
      "indicator_count": 3753,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 34,
      "modified_text": "347 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65709929c16e0817dea8f7ff",
      "name": "https://www.microsoft.com/en-US/servicesagreement/upcoming-faq.aspx",
      "description": "",
      "modified": "2023-12-06T15:54:17.119000",
      "created": "2023-12-06T15:54:17.119000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 963,
        "domain": 255,
        "hostname": 730,
        "URL": 2400,
        "FileHash-MD5": 50,
        "FileHash-SHA1": 50,
        "email": 1
      },
      "indicator_count": 4449,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "657099064c0c0aa442282397",
      "name": "http://www.xiazai99.com/down/soft9106.html",
      "description": "",
      "modified": "2023-12-06T15:53:42.077000",
      "created": "2023-12-06T15:53:42.077000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1040,
        "domain": 293,
        "FileHash-MD5": 58,
        "FileHash-SHA1": 56,
        "hostname": 809,
        "URL": 2661,
        "email": 1
      },
      "indicator_count": 4918,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://this.i.id",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://this.i.id",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776615186.0514457
}