{
  "type": "URL",
  "indicator": "https://this.z.call",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://this.z.call",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3187907732,
      "indicator": "https://this.z.call",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 50,
      "pulses": [
        {
          "id": "68abf75bf3b03b94a6762409",
          "name": "(Repost) How to connect listeners to e.intercom | serverhub.com eonix.net",
          "description": "",
          "modified": "2025-08-25T05:40:43.552000",
          "created": "2025-08-25T05:40:43.552000",
          "tags": [
            "context",
            "error",
            "ajaxupdate",
            "request",
            "requestdata",
            "name",
            "xoctoberassets",
            "datarequest",
            "typesubmit",
            "typetext",
            "click",
            "function",
            "typeof c",
            "bootstrap",
            "javascript",
            "azaz",
            "popover",
            "typeof f",
            "typeof g",
            "typeof h",
            "vui",
            "anda",
            "tente",
            "outubro",
            "trackingclient",
            "srpanj",
            "rabu",
            "vasaris",
            "image",
            "typeof atrkopts",
            "800px",
            "40px",
            "i18n",
            "blockedemail",
            "typeof i18n",
            "hubspot",
            "captcha",
            "date",
            "please",
            "april",
            "august",
            "close",
            "february",
            "june",
            "form",
            "klik",
            "download",
            "window",
            "this",
            "next",
            "null",
            "blank",
            "este",
            "anna",
            "rserver",
            "mais",
            "void",
            "object",
            "typeerror",
            "array",
            "symbol",
            "bound",
            "typeof window",
            "typeof t",
            "invalid path",
            "unknown method",
            "phonenumber",
            "ninja",
            "typeof e",
            "edge",
            "dataname",
            "intercom",
            "typeof symbol",
            "apple",
            "webkiti",
            "criosi",
            "trident"
          ],
          "references": [
            "xfe-URL-Eonix.net-stix2-2.1-export.json",
            "xfe-URL-Serverhub.com-stix2-2.1-export.json",
            "xfe-URL-Enom.com-stix2-2.1-export 2.json",
            "https://widget.intercom.io/widget/rbc8ok9w",
            "https://js.hscollectedforms.net/collectedforms.js",
            "https://js.hsleadflows.net/leadflows.js",
            "https://d31qbv1cthcecs.cloudfront.net/atrk.js",
            "https://serverhub.com/combine/a059fe7a562c0b582328162f0ee69fda-1426025688",
            "https://serverhub.com/modules/system/assets/js/framework.js",
            "https://js.hs-scripts.com/3844463.js",
            "xfe-URL-Cloudfront.net-stix2-2.1-export.json",
            "xfe-URL-Intercom.io-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Vui",
              "display_name": "Vui",
              "target": null
            },
            {
              "id": "Outubro",
              "display_name": "Outubro",
              "target": null
            },
            {
              "id": "Tente",
              "display_name": "Tente",
              "target": null
            },
            {
              "id": "Anda",
              "display_name": "Anda",
              "target": null
            },
            {
              "id": "Vasaris",
              "display_name": "Vasaris",
              "target": null
            },
            {
              "id": "Rabu",
              "display_name": "Rabu",
              "target": null
            },
            {
              "id": "Srpanj",
              "display_name": "Srpanj",
              "target": null
            },
            {
              "id": "TrackingClient",
              "display_name": "TrackingClient",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "62719a4dec6d0aa4631b9b2f",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5708,
            "hostname": 1541,
            "FileHash-SHA256": 876,
            "domain": 915,
            "CVE": 1,
            "FileHash-MD5": 1
          },
          "indicator_count": 9042,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "237 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "67f33233092ab19b74879403",
          "name": "MacOS M2 Chip Infiltration: Game Center & XBOX Pod Game & Chat Server",
          "description": "pulse explores a variety of files, objects, and functions that could be associated with different system components, libraries, and protocols. It highlights a wide range of potential vulnerabilities that may exist in software related to system functions, APIs, data handling, and device interactions, including issues in devices like game controllers, HID devices, and platform-specific services (such as Apple and Android). The pulse references several components across different platforms (macOS, iOS, ARM architectures, and others), with a focus on low-level code, encryption libraries, system utilities, and network protocols like TCP, IP, and Bluetooth. The identified vulnerabilities could involve buffer overflows, deprecated functions, improper memory handling, and potential exploit vectors related to system security, performance, and integrity.",
          "modified": "2025-05-07T02:03:20.735000",
          "created": "2025-04-07T02:02:27.322000",
          "tags": [
            "helper macro",
            "param",
            "param inccache",
            "kerberos",
            "ccache",
            "api function",
            "ccapi",
            "api version",
            "param ioccache",
            "ccacheserver",
            "win32",
            "null",
            "code",
            "win64",
            "error",
            "union",
            "ccapideprecated",
            "ccacheapi",
            "ccapiv2h",
            "apple",
            "export",
            "united",
            "ccache api",
            "cplusplus",
            "x8664",
            "typedef",
            "patheq",
            "none",
            "popen",
            "terminate",
            "false",
            "winenv",
            "winexe",
            "frozen",
            "winservice",
            "python",
            "posixthreads",
            "pyhavecondvar",
            "ntthreads",
            "vista",
            "pyemulatedwincv",
            "ntddivista",
            "semaphore",
            "pycondt",
            "win7",
            "pybuildcore",
            "fall",
            "copyright",
            "technology",
            "all rights",
            "reserved",
            "america",
            "government",
            "within that",
            "klprincipal",
            "klloginoptions",
            "inpassword",
            "klboolean",
            "klindex inindex",
            "login",
            "klstatus",
            "kerberos login",
            "inst",
            "regexp",
            "typeof e",
            "function",
            "typeof t",
            "typeof o",
            "width",
            "typeof",
            "pseudo",
            "body",
            "sticky",
            "date",
            "class",
            "this",
            "void",
            "accept",
            "span",
            "krb5callconv",
            "apoptsreserved",
            "tktflgreserved",
            "kdcoptreserved",
            "krb5data",
            "eblock",
            "krb5address",
            "krb5keyblock",
            "service",
            "realm",
            "format",
            "general",
            "internal",
            "entropy",
            "mask",
            "mcpeerid",
            "mcsession",
            "property",
            "protocol",
            "create",
            "nsuinteger",
            "notifies",
            "mcsession api",
            "interface",
            "bonjour",
            "ascii lowercase",
            "abc company",
            "section",
            "bonjour txt",
            "mcextern",
            "attribute",
            "mcextern extern",
            "mcexternweak",
            "nsenum",
            "nsinteger",
            "mcerrorcode",
            "mcerrorunknown",
            "mcerrortimedout",
            "bonjour apis",
            "stop",
            "peer",
            "example",
            "tags",
            "session",
            "nsprogress",
            "nserror",
            "nsstring",
            "nsurl",
            "nsarray",
            "note",
            "ui element",
            "utf8 encoding",
            "nscopying",
            "nsdictionary",
            "webpackrequire",
            "webpackexports",
            "object",
            "adobe systems",
            "adobe",
            "incorporated",
            "dissemination",
            "touchmove",
            "window",
            "launch",
            "close",
            "core",
            "webview",
            "nwebpackrequire",
            "arraybuffer",
            "name",
            "typedarray",
            "prototype",
            "string",
            "number",
            "nvar",
            "meta",
            "infinity",
            "generator",
            "zero",
            "epsilon",
            "observer",
            "android",
            "freeze",
            "trim",
            "canvas",
            "simple",
            "bind",
            "fast",
            "next",
            "patch",
            "rest",
            "middle",
            "find",
            "enumerate",
            "facebook",
            "executor",
            "apiunavailable",
            "gamecontroller",
            "gcbuttoninput",
            "gcswitchinput",
            "nsobject",
            "apiavailable",
            "hid device",
            "cfstr",
            "iohiddeviceref",
            "boolean value",
            "c iohidmanager",
            "iohidmanager",
            "c iohiddevice",
            "issequential",
            "bool sequential",
            "bool canwrap",
            "nsset",
            "nsunavailable",
            "gcswitchelement",
            "bool",
            "share button",
            "xbox controller",
            "xbox elite",
            "xbox series",
            "gcxboxgamepad",
            "gcpoint2",
            "gcpoint2make",
            "gcpoint2 p",
            "cfinline bool",
            "gcpoint2equal",
            "gcpoint2 point1",
            "gcpoint2 point2",
            "gcrelativeinput",
            "isanalog",
            "bool analog",
            "hasinclude",
            "gcaxis2dinput",
            "gcpoint2 value",
            "gcaxiselement",
            "certain",
            "gcaxisinput",
            "gcbuttonelement",
            "gccontroller",
            "nsnotification",
            "chhapticengine",
            "gcmicrogamepad",
            "input",
            "menu button",
            "gcdevicelight",
            "gccolor",
            "x axis",
            "xvalue",
            "developers",
            "functionality",
            "options button",
            "sf symbols",
            "elements",
            "gcdevice",
            "gctouchstate",
            "gctouchstateup",
            "apideprecated",
            "gckeyboard",
            "gcmouse",
            "nsswiftname",
            "gcdevicebattery",
            "battery level",
            "direction pad",
            "directionapad",
            "thumbstick",
            "gcdevicecursor",
            "a controller",
            "gccolor color",
            "gcinputbuttona",
            "gcinputbuttonb",
            "button b",
            "check",
            "a element",
            "c nil",
            "nsenumerator",
            "siri remote",
            "equivalent",
            "down",
            "left",
            "right",
            "kindof",
            "handle button",
            "c device",
            "immediate input",
            "dualsense",
            "positional",
            "sony dualsense",
            "gcmotion",
            "dualshock",
            "uievent",
            "controllers",
            "uikit user",
            "uiview",
            "method",
            "nsdata",
            "axes",
            "nsdata source",
            "return",
            "nullable",
            "nsdata object",
            "button",
            "shoulder",
            "extended",
            "gamepad profile",
            "nsdata api",
            "gcgamepad",
            "sizeof",
            "standard",
            "gckeyboardinput",
            "keyboard",
            "nsstring const",
            "controller",
            "back buttons",
            "game controller",
            "back",
            "keypad",
            "delete",
            "insert",
            "home",
            "right arrow",
            "left arrow",
            "down arrow",
            "up arrow",
            "korean",
            "backspace",
            "alongside",
            "gckeyuparrow",
            "gckeycode const",
            "lang1",
            "gclinearinput",
            "gcquaternion",
            "gcacceleration",
            "y axis",
            "z axis",
            "gcmouse mouse",
            "gcmouse class",
            "mice",
            "gcmouseinput",
            "mouse profile",
            "scroll",
            "nsdata instance",
            "a alias",
            "press",
            "micro profile",
            "siri remotes",
            "b button",
            "a gcinput",
            "button a",
            "nsoptions",
            "examining",
            "c sfsymbolsname",
            "apple tv",
            "remote",
            "control center",
            "a set",
            "game",
            "gcracingwheel",
            "gcbundlewithpid",
            "gcinputbuttonx",
            "gcinputbuttony",
            "gcinputshifter",
            "gckeya",
            "gckeyb",
            "gckeybackslash",
            "rawvalue",
            "apple swift",
            "o librarylevel",
            "swift import",
            "element",
            "indices",
            "iterator",
            "subsequence",
            "kerberoscomerr",
            "const",
            "permission",
            "mit software",
            "suitability",
            "athena",
            "openvision",
            "gssdllimp",
            "gssapigenerich",
            "this software",
            "purpose",
            "disclaims all",
            "warranties with",
            "regard to",
            "constraint",
            "kerberosprofile",
            "krb5profileh",
            "const names",
            "newvalue",
            "1429577728l",
            "gnuc",
            "mach",
            "omuint32",
            "gssapikrb5h",
            "form",
            "uid form",
            "client function",
            "asrep",
            "including",
            "preauth",
            "db entry",
            "free",
            "pointer",
            "rock",
            "neither",
            "direct",
            "damage",
            "minorstatus",
            "gssbuffert",
            "gssctxidt",
            "gssoid",
            "gssnamet",
            "gsscredidt",
            "gssoidset",
            "gssapi",
            "first",
            "alcapi",
            "alcapientry",
            "alcboolean",
            "targetosmac",
            "alcdevice",
            "alcenum param",
            "alalch",
            "alcchar",
            "alcsizei",
            "capture",
            "but not",
            "limited",
            "openal cross",
            "apple computer",
            "redistribution",
            "is provided",
            "type",
            "alvoid",
            "alint",
            "openal",
            "aluint sid",
            "alenum",
            "alint value",
            "aluint property",
            "alvoid nonnull",
            "alfloat",
            "write",
            "openalopenalh",
            "umbrella header",
            "alenum param",
            "alapi",
            "aluint bid",
            "alsizei",
            "alfloat value",
            "alapientry",
            "aluint",
            "verify",
            "play",
            "speed",
            "bits",
            "albuffer3i",
            "albufferdata",
            "albufferf",
            "albufferfv",
            "albufferi",
            "albufferiv",
            "aldistancemodel",
            "aldopplerfactor",
            "algetbooleanv",
            "algetbuffer3f",
            "iousbhostdevice",
            "iousbhostobject",
            "iousbhostpipe",
            "iousbhoststream",
            "iousbhost",
            "brief",
            "usb host",
            "bool yes",
            "bool no",
            "advance",
            "iousbhostfamily",
            "kernel",
            "ioreturn status",
            "nsnumber",
            "ioreturn error",
            "usb device",
            "select",
            "commands",
            "enqueue",
            "nsmutabledata",
            "field",
            "enum",
            "options",
            "retrieve",
            "iosource",
            "current address",
            "bos descriptor",
            "extract",
            "a descriptor",
            "license",
            "io request",
            "abort",
            "discussion",
            "stream",
            "please",
            "swift api",
            "iousbbitrange",
            "iousbbitrange64",
            "iousbbit",
            "client",
            "usb controller",
            "usb descriptor",
            "unknown",
            "critical",
            "refer",
            "link",
            "send",
            "same",
            "common ui",
            "bluetooth",
            "service browser",
            "option",
            "1001",
            "cfstringref",
            "deprecated",
            "macos",
            "returns",
            "abstract",
            "nswindow",
            "creates",
            "mac os",
            "uuids",
            "uuid",
            "sdp service",
            "nsimage",
            "nsview",
            "mpasskeystring",
            "nsmutablearray",
            "uuid array",
            "ioreturn",
            "runmodal",
            "group",
            "command",
            "byte",
            "masks",
            "pduid",
            "l2cap",
            "range",
            "opcode",
            "packet",
            "major",
            "local",
            "profiles",
            "iobluetooth",
            "framework",
            "support",
            "host controller",
            "rfcomm",
            "minor class",
            "pseudoclass",
            "specific device",
            "headset",
            "peripheral",
            "desktop",
            "glasses",
            "device reset",
            "no hci",
            "hci controller",
            "returns number",
            "variable number",
            "packdata",
            "cstring",
            "pass",
            "path",
            "deprecated in",
            "obex session",
            "obexsessionref",
            "rfcomm channel",
            "obex",
            "does not",
            "l2cap channel",
            "inrefcon",
            "device",
            "length",
            "obex spec",
            "error code",
            "make",
            "headerid",
            "april",
            "alarm",
            "avrcplog",
            "audiolog",
            "bccmd16touint16",
            "bccmd16touint8",
            "bccmd32touint32",
            "hfplog",
            "obexcreatevcard",
            "obexsessionget",
            "uint16tobccmd16",
            "intents",
            "created",
            "andrea gottardo",
            "inimage",
            "intentsui",
            "project version",
            "inshortcut",
            "ibdesignable",
            "invoiceshortcut",
            "nsbundle",
            "siri",
            "beralloct",
            "berbvarrayadd",
            "berbvarrayfree",
            "berbvdup",
            "berbvecadd",
            "berbvecfree",
            "berbvfree",
            "berdump",
            "berdup",
            "berdupbv",
            "ldap",
            "vdspinput1",
            "vectorsize",
            "iirchannel",
            "osvkerndsplib",
            "pragmaonce",
            "paul chang",
            "fri mar",
            "original code",
            "apple operating",
            "modifications",
            "apple public",
            "source license",
            "version",
            "lframesize",
            "i386",
            "picify",
            "callmcount",
            "nonlazystub",
            "align",
            "roundtostack",
            "leaf",
            "import",
            "carnegie mellon",
            "carnegie",
            "inline void",
            "software",
            "school",
            "august",
            "xnuarchi386selh",
            "next computer",
            "mike demoney",
            "bruce martin",
            "state segment",
            "nxswappedfloat",
            "osswapint32",
            "inline float",
            "inline double",
            "osswapint64",
            "armlimitsh",
            "arm64",
            "useclangtypes",
            "bsdarmtypesh",
            "int8t",
            "gnuc typedef",
            "uint8t",
            "ansi c",
            "ansi",
            "use wchart",
            "armmcontexth",
            "mcontextt",
            "armparamh",
            "round",
            "darwinsizet",
            "darwinalign",
            "uint32t",
            "darwinalign32",
            "warranties",
            "a particular",
            "university",
            "armarch6zk",
            "armarch6k",
            "armarch4t",
            "armarch4",
            "http",
            "capbitnb",
            "legacy",
            "armfeatureflag",
            "california",
            "notice",
            "berkeley",
            "limited to",
            "define",
            "useclanglimits",
            "lp64",
            "ansisource",
            "darwincsource",
            "longmin",
            "ulongmax",
            "parameter",
            "vmmemcoherent",
            "vmmemearlyack",
            "vmmeminner",
            "vmmemrt",
            "vmmemguarded",
            "armmemorytypesh",
            "armpalroutinesh",
            "read",
            "struct",
            "booleant",
            "cluster",
            "devbsize",
            "mclbytes",
            "unix system",
            "laboratories",
            "devbshift",
            "thumb",
            "armv5",
            "armv7",
            "cache",
            "neon",
            "swift",
            "bsdarmprofileh",
            "xxx todo",
            "block",
            "mcount",
            "mcountinit",
            "mcountenter",
            "splhigh",
            "armthreadh",
            "armtraph",
            "dflssiz",
            "targetososx",
            "maxssiz",
            "rliminfinity",
            "maxcsiz",
            "bsdarmvmparamh",
            "dfldsiz",
            "maxdsiz",
            "xxx stack",
            "armsignal",
            "int64t",
            "armmachtypesh",
            "int32t",
            "methods",
            "thread",
            "hasapplepac",
            "atmatmtypesh",
            "libkernlocksh",
            "fortifysource",
            "libkerncopyioh",
            "sizedby",
            "darwinosinline",
            "stdcversion",
            "osswapint16",
            "libkerncrch",
            "blockexport",
            "vaargs",
            "blockrelease",
            "blockh",
            "collection",
            "blockcopy",
            "ososbaseh",
            "base",
            "byteoffset",
            "host endianess",
            "generic host",
            "generic",
            "osmalloc",
            "osmalloctag tag",
            "osmalloctag",
            "pci device",
            "uint32",
            "uint32 mask",
            "safecastptr",
            "sint32",
            "osaddatomic64",
            "uint8",
            "libkern c",
            "internal error",
            "core osreturn",
            "libkern",
            "values",
            "pragmamark",
            "kexts",
            "kext",
            "c string",
            "grab",
            "osostypesh",
            "boolean",
            "unsignedwide",
            "uint32 hi",
            "buildtime value",
            "libkernversionh",
            "versionmajor",
            "versionminor",
            "versionvariant",
            "versionrevision",
            "ostype",
            "osrelease",
            "libkernsysctlh",
            "instructions",
            "data cache",
            "future",
            "rbleft",
            "rbright",
            "rbgetparent",
            "splayright",
            "splayleft",
            "rbsetcolor",
            "rbblack",
            "rbgetcolor",
            "comp",
            "main",
            "stdc",
            "msdos",
            "windows",
            "sys16bit",
            "zlibdll",
            "zextern",
            "zconfh",
            "model",
            "zextern int",
            "zstreamerror",
            "znull",
            "zbuferror",
            "zmemerror",
            "zstreamend",
            "zdataerror",
            "zfinish",
            "enough",
            "possible",
            "trailer",
            "compiler",
            "countedby",
            "sparta",
            "osatomic",
            "ipcipctypesh",
            "ipcobjectnull",
            "ipcobjectdead",
            "osreturn",
            "nfskrpch",
            "xdrbuf",
            "xdrbuf xbp",
            "xbptr",
            "xbleft",
            "tlen",
            "lval",
            "xbcleanup",
            "xbtype",
            "xbflags",
            "nfsargsversion",
            "file",
            "packed",
            "nfshz",
            "mount",
            "term",
            "restrict",
            "stats",
            "nfsbitmapset",
            "nfsver3",
            "nfsxunsigned",
            "attr",
            "nfsprogram",
            "nfssmallfh",
            "which",
            "from",
            "mark",
            "obsolete",
            "ip address",
            "iaddrt",
            "netinetbootph",
            "nvmaxtext",
            "magic",
            "etheraddrlen",
            "target",
            "byteorder",
            "bigendian",
            "littleendian",
            "dest",
            "igmp",
            "ushort",
            "inpcbptr",
            "inpcblistentry",
            "ipsec",
            "pcbs",
            "cookie",
            "netinetinstath",
            "minimal",
            "result",
            "arp packet",
            "icmpparamprob",
            "icmpredirect",
            "address",
            "ditto",
            "ip filter",
            "ipv4",
            "ip packet",
            "inject",
            "wifi",
            "server",
            "tcpmaxnotifyack",
            "wired",
            "ecn setup",
            "notify",
            "slow",
            "definitions",
            "tcptmax",
            "retransmit",
            "mptcp",
            "tcpsclosewait",
            "tcpsestablished",
            "tcpstimewait",
            "tcpseq",
            "timer drift",
            "sack",
            "char",
            "icmp",
            "synack",
            "tcpoptnop",
            "syndata",
            "ver",
            "internet",
            "iopcidevice",
            "constant",
            "perst",
            "localonly",
            "iooptionbits",
            "optional access",
            "ioservice",
            "open",
            "pcidriverkith",
            "osmetaclassbase",
            "iorpc rpc",
            "auditpipeiobase",
            "auditsdeviobase",
            "ioctls",
            "data",
            "the software",
            "stdargh",
            "hasincludenext",
            "eli friedman",
            "as is",
            "hack",
            "atomic",
            "atomicseqcst",
            "clangstdatomich",
            "stdchosted",
            "stdboolh",
            "needwintt",
            "stddefh",
            "hasbuiltin",
            "const src",
            "xnumembersize",
            "const dst",
            "wcharmax",
            "wcharmin",
            "limits",
            "kernelstdinth",
            "lp64 typedef",
            "intmaxc",
            "uintmaxc",
            "ptrauth",
            "olddata",
            "value",
            "declkey",
            "abi pointer",
            "c function",
            "float16",
            "fltevalmethod",
            "legacy bsd",
            "c standard",
            "sincospi",
            "cosp",
            "x8664monotonich",
            "staticifentry",
            "hasmte",
            "vmmemorytypesh",
            "vmwimgdefault",
            "wimg",
            "extvectortype",
            "utilfunction",
            "aligned",
            "srcptr",
            "vmpmaph",
            "vmdyldpagerh",
            "vmvmfaulth",
            "vmvmmaph",
            "development",
            "debug",
            "vmvmoptionsh",
            "vmvmpageouth",
            "kasantbi",
            "machvmmemtagh",
            "given",
            "vmmemtagptrsize",
            "vmmemtagtagsize",
            "copy",
            "vmsharedregionh",
            "vfsvfssupporth",
            "veclib",
            "master",
            "world wide",
            "various",
            "veclibtypes",
            "carbonlib",
            "availability",
            "carbon",
            "noncarbon cfm",
            "vbasicops",
            "shift",
            "vforceh",
            "vdsplength n",
            "realp",
            "nonnull",
            "vector",
            "dspsplitcomplex",
            "ieee",
            "dspcomplex",
            "uuiduuidh",
            "uuiddefine",
            "public",
            "uuid library",
            "kernelserver",
            "simpleroutine",
            "undkey",
            "execution",
            "strings array",
            "user",
            "title string",
            "info",
            "1024",
            "xmldatat",
            "undreplyref",
            "kernsuccess",
            "osaction",
            "targetosiphone",
            "istargetvendor",
            "targetcpux8664",
            "targetosunix",
            "targetcpuppc",
            "targetcpuppc64",
            "targetcpux86",
            "targetrtmaccfm",
            "bridge",
            "svflags",
            "svpavreal",
            "svpavreify",
            "xpvav",
            "svany",
            "avfillp",
            "for apidoc",
            "mutableav",
            "avrealoff",
            "pltopenv",
            "stmtstart",
            "stmtend",
            "copfile",
            "plcurstackinfo",
            "copfilegv",
            "cophinthashget",
            "loop",
            "stack",
            "beware",
            "orig",
            "loops",
            "this file",
            "the build",
            "plbitcount",
            "u8 value",
            "cvflags",
            "xpvcv",
            "mutableptr",
            "perlcore",
            "cvgv",
            "cvfile",
            "cvfmethod",
            "cvflvalue",
            "cvfconst",
            "anon",
            "doinit extconst",
            "ebcdic",
            "extconst u8",
            "index",
            "ascii platform",
            "confusingly",
            "u8 pla2e",
            "pla2e",
            "u8 ple2a",
            "guard",
            "declspec",
            "extconst",
            "ext externc",
            "init",
            "larry wall",
            "gnu general",
            "readme file",
            "multiplicity",
            "plsawampersand",
            "do not",
            "perliogetc",
            "perlioputc",
            "perliostdoutf",
            "perlio",
            "perlfeatureh",
            "featuresubbit",
            "featuremyrefbit",
            "featurefcbit",
            "featureisabit",
            "featuresaybit",
            "featurestatebit",
            "featuretrybit",
            "hintfeaturemask",
            "ffspace",
            "process",
            "ffdecimal",
            "ffend",
            "gvgp",
            "gvflags",
            "gvnamehek",
            "svtype",
            "gvegv",
            "gvstash",
            "gvxpvgv",
            "svtpvgv",
            "svtpvlv",
            "super",
            "edit directly",
            "djgpp",
            "bitbucket",
            "perlsysinitbody",
            "perlioinit",
            "perlsystermbody",
            "w macros",
            "wexitstatus",
            "shpath",
            "mkdir",
            "rotl64",
            "rotl32",
            "rotate x",
            "rotr32",
            "can64bithash",
            "rotr64",
            "ivsize",
            "u8to16le",
            "rotluv",
            "rotruv",
            "sbox32maxlen",
            "plhashstate",
            "perlhash",
            "perl",
            "usehashseed",
            "perlseenhvfunch",
            "perlhashseed",
            "siphash24",
            "siphash13",
            "seed",
            "c program",
            "c type",
            "c compiler",
            "gcc attribute",
            "longsize",
            "c preprocessor",
            "install",
            "kill",
            "cont",
            "thus",
            "ext declspec",
            "dext",
            "for apidocitem",
            "utf8",
            "ascii",
            "fitsin8bits",
            "nativetolatin1",
            "strwithlen",
            "u8 end",
            "test",
            "poison",
            "february",
            "cray",
            "prior",
            "behaviour",
            "except",
            "alpha",
            "perlvar",
            "perlvari",
            "perlvara",
            "padoffset",
            "true",
            "pmop",
            "hooks",
            "hook",
            "sv invlist",
            "perlinregcompc",
            "svcur",
            "perlinopc",
            "tointernalsize",
            "svtinvlist",
            "invlistlen",
            "strlen",
            "hvaux",
            "heklen",
            "svook",
            "hekutf8",
            "hekkey",
            "hekflags",
            "mutablehv",
            "hvnameheknn",
            "gosh",
            "leave",
            "iperlsock",
            "plsock",
            "iperlstdio",
            "plstdio",
            "iperlproc",
            "plproc",
            "iperllio",
            "pllio",
            "perlimplicitsys",
            "plink",
            "keypackage",
            "keyend",
            "keysub",
            "keydump",
            "keylog",
            "keysend",
            "keystate",
            "perlioclose",
            "perlmemcollxfrm",
            "nativetoneed",
            "plclocaleobj",
            "plno",
            "plwarnall",
            "plwarnnone",
            "plyes",
            "plzero",
            "plc9utf8dfatab",
            "nomathoms",
            "perlintokec",
            "perlinutf8c",
            "perlinsvc",
            "perlinregexecc",
            "debugging",
            "perlinlocalec",
            "pfinet",
            "snoop",
            "ccprint",
            "ccgraph",
            "cccharnamecont",
            "ccascii",
            "ccwordchar",
            "ccalphanumeric",
            "ccidfirst",
            "ccquotemeta",
            "ccalpha",
            "cccased",
            "ordinal",
            "magicvtablemax",
            "extra",
            "regex match",
            "env hash",
            "isa array",
            "debugger",
            "sig hash",
            "available",
            "shadow",
            "array length",
            "magic mg",
            "sv sv",
            "mgftainteddir",
            "hefsvkey",
            "mutablesv",
            "ssizet",
            "mgvtbl entry",
            "mgfbytes",
            "perlmagicsv 0",
            "special",
            "perlmagicarylen",
            "perlmagicrhash",
            "extra data",
            "perlmagicpos",
            "perlmagicsymtab",
            "provides",
            "dtrace probes",
            "stdioh",
            "stdioincluded",
            "sfioversion",
            "rxfpmfcharset",
            "rxfpmfmultiline",
            "rxfpmffold",
            "rxfpmfextended",
            "rxfpmfnocapture",
            "rxfpmfkeepcopy",
            "flags",
            "rxfpmfstrict",
            "ocshift",
            "plop",
            "perlbitfield16",
            "baseop op",
            "useithreads",
            "pmfonce",
            "padop",
            "perlcknull",
            "perlckfun",
            "opparg1mask",
            "opparg4mask",
            "opparg2mask",
            "perlckftst",
            "perlppftrowned",
            "perlckbitop",
            "perlckcmp",
            "perlcklfun",
            "dump",
            "chroot",
            "syscall",
            "flip",
            "undef",
            "crypt",
            "push",
            "stub",
            "trans",
            "predec",
            "flop",
            "prtf",
            "shutdown",
            "perlcontext cx",
            "perlmemlog",
            "c pointer",
            "cxtype",
            "logic",
            "toavamg",
            "tohvamg",
            "opftrread",
            "oplt",
            "opincmp",
            "opbitand",
            "opsbitor",
            "opsend",
            "opgetpeername",
            "opfteexec",
            "opftbinary",
            "opclose",
            "plparser",
            "yylex",
            "lexshared",
            "position",
            "repl",
            "memsize",
            "malloct",
            "perlmallocctlh",
            "uv nfree",
            "uv ntotal",
            "iv topbucket",
            "iv totalsbrk",
            "iv minbucket",
            "level",
            "plcomppad",
            "plcurpad",
            "uvxf",
            "ptr2uv",
            "avarray",
            "padnameflags",
            "plcopseqmax",
            "padlistarray",
            "c array",
            "padnametype",
            "incpushperl5lib",
            "appllibexp",
            "privlibexp",
            "defineincmacros",
            "perlfsversion",
            "perl5lib",
            "sitearchexp",
            "perllanginfoh",
            "hasnllanginfo",
            "ilanginfo",
            "codeset",
            "codeset 1",
            "dtfmt",
            "dtfmt 2",
            "dfmt",
            "dfmt 3",
            "sipround",
            "u8to64le",
            "fallthrough",
            "uint64c",
            "perlsiphashfnc",
            "siprounds",
            "strlen inlen",
            "sipfinalrounds",
            "could",
            "configure",
            "plout",
            "mine001",
            "argv",
            "plin",
            "localpatchcount",
            "perlapih",
            "xs code",
            "portingglossary",
            "first version",
            "brand",
            "symbols",
            "haswcrtomb",
            "perlionotstdio",
            "perlcallconv",
            "perlio f",
            "perlioh",
            "usestdio",
            "case",
            "bufsiz",
            "sizet",
            "perlstability",
            "perltypedefs",
            "perldtracehin",
            "perlloadedfile",
            "perlloadingfile",
            "perlopentry",
            "perlphasechange",
            "perlsubentry",
            "perlsubreturn",
            "generated",
            "perlcallconv iv",
            "sizet count",
            "sv arg",
            "mode",
            "perliofuncs tab",
            "stdchar",
            "perliolistt",
            "sv args",
            "mutex",
            "perlinterpreter",
            "sigsize",
            "perlioisstdio",
            "perlcallconv op",
            "perldokv",
            "perlppaassign",
            "perlppabs",
            "perlppaccept",
            "perlppadd",
            "perlppaeach",
            "perlppaelem",
            "public license",
            "free software",
            "foundation",
            "yydebug",
            "bison",
            "bareword",
            "funcmeth",
            "arrow",
            "targ",
            "pushs",
            "tops",
            "does",
            "xsub",
            "pops",
            "xpushs",
            "erange",
            "perlreentrapi",
            "perlreentrapi0",
            "hostentsize",
            "getgrentrproto",
            "getpwentrproto",
            "getnetentrproto",
            "grentbuffer",
            "grentsize",
            "hostenterrno",
            "redebugflag",
            "debugvtest",
            "debugr",
            "u16 nextoff",
            "argset",
            "u8 type",
            "nextoff",
            "strings",
            "problem",
            "june",
            "invert",
            "perlfpclass",
            "longdoublekind",
            "plstatusvalue",
            "pldebug",
            "numclasses",
            "locale",
            "grok",
            "pragma",
            "dword",
            "attack",
            "little",
            "lynx",
            "done",
            "reany",
            "rxpextflags",
            "rxextflags",
            "checkpoint cp",
            "rxftaintedseen",
            "rxfcopydone",
            "plsavestackix",
            "plsavestack",
            "plsavestackmax",
            "ssmaxpush",
            "enter",
            "debugscope",
            "state",
            "u32 state",
            "debugsbox32hash",
            "sbox32warn5",
            "line",
            "mutexunlock",
            "mutexinit",
            "noop",
            "mutexlock",
            "condinit",
            "detach",
            "panic",
            "usetm64",
            "should",
            "bsd extension",
            "configuration",
            "time64debug",
            "int64t nv",
            "gnu extension",
            "perltime64h",
            "time64t",
            "int64t int64",
            "int64 time64t",
            "i32 year",
            "tm64",
            "hastmtmgmtoff",
            "decide",
            "svpvx",
            "svgmagic",
            "bonk",
            "anything",
            "turn",
            "crash",
            "fstat",
            "perlmicro",
            "hasioctl",
            "hasutime",
            "hasgroup",
            "haspasswd",
            "usemybinmode",
            "idirent",
            "likely",
            "generated code",
            "utfebcdic",
            "unicode",
            "step",
            "ufeff",
            "u00a0",
            "u00df",
            "u00b5",
            "ufffd",
            "u017f",
            "u0300",
            "unlikely",
            "nativeutf8toi8",
            "utf8skip",
            "nativetouni",
            "lazy",
            "extrasize",
            "regnodemax",
            "exact",
            "match",
            "whilem",
            "anyof",
            "curly",
            "trie",
            "curlym",
            "eval",
            "star",
            "perlutilh",
            "hsmapiverlen",
            "hsxsverlenmax",
            "hskeyp",
            "tools",
            "sv vs",
            "perlversionlt",
            "svpvxnolenconst",
            "perlckwarner",
            "u32 err",
            "scroakxsusage",
            "pluumap",
            "warnings",
            "categories",
            "plcurcop",
            "perlckwarn",
            "perlckwarnd",
            "perlwarnisset",
            "perlwarnoff",
            "perlwarnbit",
            "xsversion",
            "xsreturn",
            "perlxshandshake",
            "plstackbase",
            "hskey",
            "zaphod32mix",
            "u8to32le",
            "zaphod32warn4",
            "zaphod32warn3",
            "zaphod32warn6",
            "perlform",
            "i8tonativeutf8",
            "warnutf8",
            "myshift",
            "c extension",
            "libs",
            "cflags",
            "afkuserlog",
            "kafkeventcancel",
            "kafkeventerror",
            "adamsbagmanager",
            "adjinglerequest",
            "isinternalbuild",
            "kickmcxdforuid",
            "loadappkit",
            "ardconfig",
            "authenticator",
            "dsauthenticator",
            "dsnode",
            "dsrecord",
            "hostconfig",
            "addtofront",
            "calcslope",
            "copyarray",
            "createcachenode",
            "defaultebecurve",
            "deletecache",
            "disablehcucache",
            "dumpcache",
            "dumpoutputhcu",
            "enablet1sim",
            "ascagent",
            "ascagentproxy",
            "asdevice",
            "ddrangecompare",
            "wdosloglauncher",
            "wdoslogprotocol",
            "findchar",
            "ddasllogger",
            "ddfilelogger",
            "ddlog",
            "ddlogfileinfo",
            "ddlogmessage",
            "ddloggernode",
            "mkurlparser",
            "mkerrordomain",
            "mkintegerhash",
            "mklonghash",
            "mkmaprectinset",
            "mkmaprectnull",
            "mkmaprectoffset",
            "mkmaprectworld",
            "mkmapsizeworld",
            "kextensionnonui",
            "wkarraycreate",
            "wkbooleancreate",
            "wkcontextcreate",
            "wkdatacreate",
            "wkdatagettypeid",
            "wkdoublecreate",
            "wkframecopyurl",
            "wkgettypeid",
            "wkimagecreate",
            "wkpagecandelete",
            "webkit",
            "methodkind",
            "wkerrordomain",
            "by apple",
            "document",
            "a block",
            "wkcontentworld",
            "wkwebview",
            "javascript",
            "wkerrorcode",
            "wkerrorunknown",
            "nsswiftasync",
            "wkswiftasync",
            "wkcookiepolicy",
            "nshttpcookie",
            "whether",
            "wknavigation",
            "wkdownload",
            "decides",
            "mime type",
            "wkscriptmessage",
            "wkframeinfo",
            "information",
            "url scheme",
            "wkcontentmode",
            "wkuserscript",
            "wkextern",
            "media",
            "promise",
            "fulfill",
            "cgfloat",
            "targetoswatch",
            "sign",
            "password",
            "provider",
            "uicontrol",
            "nscontrol",
            "opaque user",
            "apple id",
            "nsstring user",
            "asuseragerange",
            "initiate",
            "asauthorization",
            "confirms",
            "apple upgrade",
            "nserrorenum",
            "operation",
            "relying party",
            "targetosvision",
            "a byte",
            "nsdata userid",
            "relying",
            "a string",
            "asapiavailable",
            "http response",
            "authorization",
            "oauth",
            "saml",
            "nsdata readdata",
            "bool didwrite",
            "a cose",
            "nsstring name",
            "bool appid",
            "targetosxr",
            "a state",
            "a json",
            "web token",
            "private seckeys",
            "nsstring appid",
            "mdm profile",
            "nsurl url",
            "returns yes",
            "lacontext",
            "asswiftsendable",
            "keychain",
            "cose algorithm",
            "ecdsa",
            "sha256",
            "cose curve",
            "p256",
            "nsinteger rank",
            "enables",
            "bool success",
            "remove",
            "call",
            "complete",
            "prepare",
            "attempt",
            "list",
            "nsextension",
            "settings",
            "initializes",
            "a key",
            "extensions",
            "hash",
            "json",
            "initialize",
            "nsstring origin",
            "settings app",
            "urls",
            "https urls",
            "safari",
            "cancel",
            "nsuuid uuid",
            "asextern extern",
            "asextern",
            "nsswiftsendable",
            "uiwindow",
            "propertykind",
            "gkplayer",
            "n tags",
            "gkerrordomain",
            "gamecenter",
            "targetosios",
            "targetostv",
            "nsavailable",
            "gkachievement",
            "local player",
            "view",
            "present",
            "optional",
            "gkbaseplayer",
            "game center",
            "uiimage",
            "app store",
            "gkchallenge",
            "gklocalplayer",
            "nsdeprecated",
            "a singleton",
            "gkcloudplayer",
            "returns nil",
            "nsdeprecatedmac",
            "internal2",
            "internal3",
            "internal4",
            "gkscore",
            "gkextern",
            "gkextern extern",
            "gkexternweak",
            "gkerrorcode",
            "gkerrorunknown",
            "gkerrorunderage",
            "friendplayer",
            "standard view",
            "nsresponder",
            "parentwindow",
            "ibaction",
            "gkgamesession",
            "apis",
            "gkplayer player",
            "nsinteger score",
            "nsdate date",
            "gkleaderboard",
            "connect",
            "nsinteger value",
            "load",
            "gktransporttype",
            "nsstring title",
            "loads array",
            "localized",
            "gkmatch",
            "gkmatchrequest",
            "gkinvite",
            "gksession",
            "gksession api",
            "gamekit",
            "asynchronously",
            "welcome",
            "nstimeinterval",
            "delegate",
            "delivery",
            "gksenddatamode",
            "gksessionmode",
            "gkphotosize",
            "callbacks",
            "gkmatchdelegate",
            "gksavedgame",
            "default value",
            "gksessionerror",
            "gkvoicechat",
            "participant",
            "voice chat",
            "clienta"
          ],
          "references": [
            "CredentialsCache.h",
            "CredentialsCache2.h",
            "config.xml",
            "popen_spawn_win32.py",
            "pycore_condvar.h",
            "Kerberos.h",
            "KerberosLogin.h",
            "plugin.js",
            "krb5.h",
            "MultipeerConnectivity.tbd",
            "MCBrowserViewController.h",
            "MCNearbyServiceAdvertiser.h",
            "MCError.h",
            "MCAdvertiserAssistant.h",
            "MCNearbyServiceBrowser.h",
            "MultipeerConnectivity.apinotes",
            "MultipeerConnectivity.h",
            "MCSession.h",
            "MCPeerID.h",
            "canvas.html",
            "capture_0.bundle.js",
            "capture_resize.js",
            "GCRacingWheelInput.h",
            "GCSyntheticDeviceKeys.h",
            "GCSwitchPositionInput.h",
            "GCSteeringWheelElement.h",
            "GCSwitchElement.h",
            "GCTouchedStateInput.h",
            "GCXboxGamepad.h",
            "GCTypes.h",
            "GCRelativeInput.h",
            "GameController.h",
            "GCAxis2DInput.h",
            "GCAxisElement.h",
            "GCAxisInput.h",
            "GCButtonElement.h",
            "GCController.h",
            "GCColor.h",
            "GCControllerAxisInput.h",
            "GCControllerDirectionPad.h",
            "GCControllerInput.h",
            "GCControllerElement.h",
            "GCControllerTouchpad.h",
            "GCDevice.h",
            "GCDeviceBattery.h",
            "GCDeviceCursor.h",
            "GCDeviceHaptics.h",
            "GCDeviceLight.h",
            "GCDevicePhysicalInputState.h",
            "GCDevicePhysicalInputStateDiff.h",
            "GCDirectionalGamepad.h",
            "GCDirectionPadElement.h",
            "GCDevicePhysicalInput.h",
            "GCDualSenseAdaptiveTrigger.h",
            "GCDualSenseGamepad.h",
            "GCDualShockGamepad.h",
            "GCEventViewController.h",
            "GCExtendedGamepadSnapshot.h",
            "GCExtern.h",
            "GCExtendedGamepad.h",
            "GCGamepadSnapshot.h",
            "GCGearShifterElement.h",
            "GCGamepad.h",
            "GCKeyboard.h",
            "GCInputNames.h",
            "GCControllerButtonInput.h",
            "GCKeyNames.h",
            "GCKeyboardInput.h",
            "GCKeyCodes.h",
            "GCLinearInput.h",
            "GCMotion.h",
            "GCMouse.h",
            "GCMouseInput.h",
            "GCMicroGamepadSnapshot.h",
            "GCPhysicalInputElement.h",
            "GCMicroGamepad.h",
            "GCPhysicalInputProfile.h",
            "GCPhysicalInputSource.h",
            "GCPressedStateInput.h",
            "GCProductCategories.h",
            "GCRacingWheel.h",
            "GameController.tbd",
            "arm64e-apple-macos.swiftinterface",
            "x86_64-apple-macos.swiftinterface",
            "module.modulemap",
            "com_err.h",
            "gssapi_generic.h",
            "locate_plugin.h",
            "profile.h",
            "gssapi_krb5.h",
            "preauth_plugin.h",
            "gssapi.h",
            "alc.h",
            "oalStaticBufferExtension.h",
            "oalMacOSX_OALExtensions.h",
            "OpenAL.h",
            "al.h",
            "OpenAL.tbd",
            "IOUSBHost.tbd",
            "IOUSBHostCIEndpointStateMachine.h",
            "IOUSBHostCIControllerStateMachine.h",
            "IOUSBHost.h",
            "IOUSBHostCIPortStateMachine.h",
            "IOUSBHostCIDeviceStateMachine.h",
            "IOUSBHostControllerInterfaceHelpers.h",
            "IOUSBHostDevice.h",
            "IOUSBHostControllerInterface.h",
            "IOUSBHostDefinitions.h",
            "IOUSBHostInterface.h",
            "IOUSBHostIOSource.h",
            "AppleUSBDescriptorParsing.h",
            "IOUSBHostStream.h",
            "IOUSBHostObject.h",
            "IOUSBHostControllerInterfaceDefinitions.h",
            "IOUSBHostPipe.h",
            "IOBluetoothUIUserLib.h",
            "IOBluetoothUI.h",
            "IOBluetoothObjectPushUIController.h",
            "IOBluetoothDeviceSelectorController.h",
            "IOBluetoothPasskeyDisplay.h",
            "IOBluetoothPairingController.h",
            "IOBluetoothServiceBrowserController.h",
            "IOBluetoothUI.tbd",
            "Bluetooth.h",
            "IOBluetooth.h",
            "BluetoothAssignedNumbers.h",
            "IOBluetoothTypes.h",
            "IOBluetoothUtilities.h",
            "OBEXBluetooth.h",
            "IOBluetoothUserLib.h",
            "OBEX.h",
            "IOBluetooth.tbd",
            "INImage+IntentsUI.h",
            "IntentsUI.h",
            "INUIAddVoiceShortcutButton.h",
            "IntentsUI.apinotes",
            "INUIEditVoiceShortcutViewController.h",
            "INUIAddVoiceShortcutViewController.h",
            "LDAP.tbd",
            "OSvKernDSPLib.h",
            "cpu.h",
            "asm_help.h",
            "desc.h",
            "pio.h",
            "io.h",
            "sel.h",
            "reg_help.h",
            "tss.h",
            "table.h",
            "byte_order.h",
            "_limits.h",
            "_types.h",
            "_mcontext.h",
            "_param.h",
            "_endian.h",
            "arch.h",
            "cpuid_internal.h",
            "cpu_capabilities_public.h",
            "arm_features.inc",
            "endian.h",
            "locks.h",
            "limits.h",
            "atomic.h",
            "machine_cpuid.h",
            "memory_types.h",
            "pal_routines.h",
            "machine_routines.h",
            "param.h",
            "cpuid.h",
            "thread.h",
            "trap.h",
            "vmparam.h",
            "signal.h",
            "types.h",
            "AFKMemoryDescriptorOptions.h",
            "machine_machdep.h",
            "atm_types.h",
            "copyio.h",
            "_OSByteOrder.h",
            "crc.h",
            "Block.h",
            "OSBase.h",
            "OSByteOrder.h",
            "OSDebug.h",
            "OSMalloc.h",
            "OSAtomic.h",
            "OSReturn.h",
            "OSKextLib.h",
            "OSTypes.h",
            "version.h",
            "sysctl.h",
            "tree.h",
            "zconf.h",
            "zlib.h",
            "libkern.h",
            "kdp_callout.h",
            "kdp_en_debugger.h",
            "ipc_types.h",
            "krpc.h",
            "rpcv2.h",
            "xdr_subs.h",
            "nfs.h",
            "nfsproto.h",
            "bootp.h",
            "if_ether.h",
            "icmp6.h",
            "icmp_var.h",
            "igmp_var.h",
            "igmp.h",
            "in_pcb.h",
            "in_stat.h",
            "in_private.h",
            "in_arp.h",
            "in_var.h",
            "in_systm.h",
            "ip_var.h",
            "ip_icmp.h",
            "kpi_ipfilter.h",
            "ip6.h",
            "tcp_private.h",
            "ip.h",
            "tcp_timer.h",
            "tcp_fsm.h",
            "udp_var.h",
            "tcp_seq.h",
            "tcpip.h",
            "udp.h",
            "tcp_var.h",
            "tcp.h",
            "IOPCIFamilyDefinitions.h",
            "IOPCIDevice.iig",
            "PCIDriverKit.h",
            "IOPCIDevice.h",
            "audit_ioctl.h",
            "stdarg.h",
            "stdatomic.h",
            "stdbool.h",
            "stddef.h",
            "string.h",
            "stdint.h",
            "ptrauth.h",
            "math.h",
            "monotonic.h",
            "static_if.h",
            "machine_kpc.h",
            "machine_remote_time.h",
            "ipc_pthread_priority_types.h",
            "lz4_assembly_select.h",
            "vm_compressor_algorithms.h",
            "lz4.h",
            "pmap.h",
            "vm_dyld_pager.h",
            "vm_far.h",
            "vm_fault.h",
            "vm_map.h",
            "lz4_constants.h",
            "vm_options.h",
            "vm_pageout.h",
            "vm_memtag.h",
            "vm_shared_region.h",
            "vm_kern.h",
            "vfs_support.h",
            "vecLib.h",
            "vecLibTypes.h",
            "vBasicOps.h",
            "vForce.h",
            "vDSP.h",
            "uuid.h",
            "UNDReply.defs",
            "UNDRequest.defs",
            "KUNCUserNotifications.h",
            "UNDTypes.defs",
            "UNDTypes.h",
            "TargetConditionals.h",
            "apfs_boot_mount.tbd",
            "av.h",
            "cop.h",
            "bitcount.h",
            "cv.h",
            "ebcdic_tables.h",
            "EXTERN.h",
            "embedvar.h",
            "fakesdio.h",
            "feature.h",
            "form.h",
            "gv.h",
            "git_version.h",
            "dosish.h",
            "hv_macro.h",
            "hv_func.h",
            "config.h",
            "INTERN.h",
            "handy.h",
            "intrpvar.h",
            "invlist_inline.h",
            "hv.h",
            "iperlsys.h",
            "keywords.h",
            "libperl.tbd",
            "embed.h",
            "l1_char_class_tab.h",
            "mg_data.h",
            "mg_raw.h",
            "mg.h",
            "mg_vtable.h",
            "mydtrace.h",
            "nostdio.h",
            "op_reg_common.h",
            "op.h",
            "opcode.h",
            "inline.h",
            "overload.h",
            "opnames.h",
            "parser.h",
            "malloc_ctl.h",
            "pad.h",
            "perl_inc_macro.h",
            "perl_langinfo.h",
            "perl_siphash.h",
            "patchlevel.h",
            "perlapi.h",
            "metaconfig.h",
            "perlio.h",
            "perldtrace.h",
            "perliol.h",
            "perlvars.h",
            "perlsdio.h",
            "pp_proto.h",
            "perly.h",
            "pp.h",
            "reentr.h",
            "regcomp.h",
            "perl.h",
            "regexp.h",
            "scope.h",
            "sbox32_hash.h",
            "time64_config.h",
            "time64.h",
            "sv.h",
            "unixish.h",
            "uconfig.h",
            "utfebcdic.h",
            "unicode_constants.h",
            "utf8.h",
            "regnodes.h",
            "util.h",
            "vutil.h",
            "uudmap.h",
            "warnings.h",
            "XSUB.h",
            "zaphod32_hash.h",
            "encode.h",
            "python-3.9.pc",
            "python-3.9-embed.pc",
            "python3-embed.pc",
            "python3.pc",
            "AFKUser.tbd",
            "AdID.tbd",
            "Admin.tbd",
            "AirPlayReceiver.tbd",
            "AppSandbox.tbd",
            "ASEProcessing.tbd",
            "AuthenticationServicesCore.tbd",
            "WebGPU.tbd",
            "WebDriver.tbd",
            "MapKit.tbd",
            "SwiftUI.swiftoverlay",
            "WebKit.tbd",
            "WebKit.apinotes",
            "WKBackForwardList.h",
            "NSAttributedString.h",
            "WebKit.h",
            "WKBackForwardListItem.h",
            "WKContentRuleList.h",
            "WKContentRuleListStore.h",
            "WKContextMenuElementInfo.h",
            "WKDataDetectorTypes.h",
            "WKContentWorld.h",
            "WKError.h",
            "WKFoundation.h",
            "WKFindResult.h",
            "WKHTTPCookieStore.h",
            "WKFrameInfo.h",
            "WKNavigation.h",
            "WKFindConfiguration.h",
            "WKNavigationDelegate.h",
            "WKNavigationResponse.h",
            "WKOpenPanelParameters.h",
            "WebKitLegacy.h",
            "WKPreviewActionItem.h",
            "WKNavigationAction.h",
            "WKPreferences.h",
            "WKPreviewActionItemIdentifiers.h",
            "WKPreviewElementInfo.h",
            "WKProcessPool.h",
            "WKDownload.h",
            "WKPDFConfiguration.h",
            "WKScriptMessage.h",
            "WKSecurityOrigin.h",
            "WKScriptMessageHandler.h",
            "WKSnapshotConfiguration.h",
            "WKUIDelegate.h",
            "WKURLSchemeTask.h",
            "WKWebpagePreferences.h",
            "WKUserContentController.h",
            "WKWebsiteDataStore.h",
            "WKWebsiteDataRecord.h",
            "WKUserScript.h",
            "WKURLSchemeHandler.h",
            "WKWebViewConfiguration.h",
            "WKWebView.h",
            "WKScriptMessageHandlerWithReply.h",
            "WKWindowFeatures.h",
            "WKDownloadDelegate.h",
            "ASAccountAuthenticationModificationController.h",
            "ASAccountAuthenticationModificationViewController.h",
            "ASAuthorization.h",
            "ASAuthorizationAppleIDButton.h",
            "ASAccountAuthenticationModificationRequest.h",
            "ASAuthorizationAppleIDProvider.h",
            "ASAuthorizationAppleIDRequest.h",
            "ASAuthorizationAppleIDCredential.h",
            "ASAuthorizationController.h",
            "ASAuthorizationCredential.h",
            "ASAccountAuthenticationModificationExtensionContext.h",
            "ASAuthorizationError.h",
            "ASAuthorizationCustomMethod.h",
            "ASAuthorizationPasswordRequest.h",
            "ASAuthorizationOpenIDRequest.h",
            "ASAuthorizationPlatformPublicKeyCredentialDescriptor.h",
            "ASAuthorizationPlatformPublicKeyCredentialProvider.h",
            "ASAccountAuthenticationModificationReplacePasswordWithSignInWithAppleRequest.h",
            "ASAccountAuthenticationModificationUpgradePasswordToStrongPasswordRequest.h",
            "ASAuthorizationPlatformPublicKeyCredentialRegistrationRequest.h",
            "ASAuthorizationPlatformPublicKeyCredentialRegistration.h",
            "ASAuthorizationProvider.h",
            "ASAuthorizationPlatformPublicKeyCredentialAssertion.h",
            "ASAuthorizationPublicKeyCredentialAssertion.h",
            "ASAuthorizationPublicKeyCredentialAssertionRequest.h",
            "ASAuthorizationPublicKeyCredentialConstants.h",
            "ASAuthorizationProviderExtensionAuthorizationResult.h",
            "ASAuthorizationPublicKeyCredentialDescriptor.h",
            "ASAuthorizationPublicKeyCredentialLargeBlobAssertionOutput.h",
            "ASAuthorizationPasswordProvider.h",
            "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationInput.h",
            "ASAuthorizationPublicKeyCredentialParameters.h",
            "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationOutput.h",
            "ASAuthorizationPublicKeyCredentialRegistration.h",
            "ASAuthorizationPublicKeyCredentialRegistrationRequest.h",
            "ASAuthorizationPublicKeyCredentialLargeBlobAssertionInput.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialAssertion.h",
            "ASAuthorizationRequest.h",
            "ASAuthorizationPlatformPublicKeyCredentialAssertionRequest.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialProvider.h",
            "ASAuthorizationSingleSignOnCredential.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialDescriptor.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialAssertionRequest.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialRegistration.h",
            "ASAuthorizationSingleSignOnProvider.h",
            "ASAuthorizationWebBrowserExternallyAuthenticatableRequest.h",
            "ASAuthorizationWebBrowserPlatformPublicKeyCredentialAssertionRequest.h",
            "ASAuthorizationWebBrowserPlatformPublicKeyCredentialRegistrationRequest.h",
            "ASAuthorizationWebBrowserPublicKeyCredentialManager.h",
            "ASAuthorizationWebBrowserPlatformPublicKeyCredential.h",
            "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialAssertionRequest.h",
            "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialRegistrationRequest.h",
            "ASCOSEConstants.h",
            "ASCredentialIdentity.h",
            "ASAuthorizationSingleSignOnRequest.h",
            "ASCredentialIdentityStore.h",
            "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialProvider.h",
            "ASCredentialProviderExtensionContext.h",
            "ASCredentialProviderViewController.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialRegistrationRequest.h",
            "ASCredentialServiceIdentifier.h",
            "ASExtensionErrors.h",
            "ASAuthorizationProviderExtensionAuthorizationRequest.h",
            "ASCredentialRequest.h",
            "ASAuthorizationWebBrowserPlatformPublicKeyCredentialProvider.h",
            "ASPasskeyAssertionCredential.h",
            "ASPasskeyCredentialRequest.h",
            "ASPasskeyCredentialRequestParameters.h",
            "ASCredentialIdentityStoreState.h",
            "ASPasskeyRegistrationCredential.h",
            "ASPasswordCredential.h",
            "ASPublicKeyCredential.h",
            "ASPasskeyCredentialIdentity.h",
            "ASPublicKeyCredentialClientData.h",
            "ASSettingsHelper.h",
            "ASWebAuthenticationSessionCallback.h",
            "ASWebAuthenticationSession.h",
            "ASWebAuthenticationSessionRequest.h",
            "ASWebAuthenticationSessionWebBrowserSessionManager.h",
            "AuthenticationServices.h",
            "ASFoundation.h",
            "AuthenticationServices.apinotes",
            "ASWebAuthenticationSessionWebBrowserSessionHandling.h",
            "ASPasswordCredentialIdentity.h",
            "ASPasswordCredentialRequest.h",
            "GameKit.apinotes",
            "GKAccessPoint.h",
            "GameKit.h",
            "GKAchievement.h",
            "GKAchievementViewController.h",
            "GKBasePlayer.h",
            "GKAchievementDescription.h",
            "GKChallengeEventHandler.h",
            "GKCloudPlayer.h",
            "GKChallengesViewController.h",
            "GKChallenge.h",
            "GKDefines.h",
            "GKError.h",
            "GKEventListener.h",
            "GKFriendRequestComposeViewController.h",
            "GKDialogController.h",
            "GKGameSessionEventListener.h",
            "GKGameSessionError.h",
            "GKGameCenterViewController.h",
            "GKGameSessionSharingViewController.h",
            "GKLeaderboardEntry.h",
            "GKLeaderboard.h",
            "GKLeaderboardScore.h",
            "GKGameSession.h",
            "GKLeaderboardSet.h",
            "GKLocalPlayer.h",
            "GKLeaderboardViewController.h",
            "GKMatch.h",
            "GKMatchmaker.h",
            "GKMatchmakerViewController.h",
            "GKPeerPickerController.h",
            "GKNotificationBanner.h",
            "GKPublicConstants.h",
            "GKPlayer.h",
            "GKPublicProtocols.h",
            "GKSavedGameListener.h",
            "GKScore.h",
            "GKSessionError.h",
            "GKVoiceChat.h",
            "GKTurnBasedMatchmakerViewController.h",
            "GKSession.h",
            "GKTurnBasedMatch.h",
            "GKSavedGame.h",
            "GKVoiceChatService.h"
          ],
          "public": 1,
          "adversary": "Turla Group, FIN7, APT34, APT28, DragonForce Malaysia Hacker Group, Indonesia Islamic Warriors Counc",
          "targeted_countries": [
            "United States of America",
            "India",
            "Australia"
          ],
          "malware_families": [
            {
              "id": "OSAtomic",
              "display_name": "OSAtomic",
              "target": null
            },
            {
              "id": "OSReturn",
              "display_name": "OSReturn",
              "target": null
            },
            {
              "id": "Ver",
              "display_name": "Ver",
              "target": null
            },
            {
              "id": "Internet",
              "display_name": "Internet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1016",
              "name": "System Network Configuration Discovery",
              "display_name": "T1016 - System Network Configuration Discovery"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1049",
              "name": "System Network Connections Discovery",
              "display_name": "T1049 - System Network Connections Discovery"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 39,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "ilyailya",
            "id": "298851",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1968,
            "domain": 526,
            "FileHash-SHA256": 207,
            "hostname": 972,
            "email": 55,
            "FileHash-SHA1": 9,
            "FileHash-MD5": 4,
            "CVE": 2,
            "CIDR": 10
          },
          "indicator_count": 3753,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 34,
          "modified_text": "347 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "663d2869e0f3a42bbddc42ff",
          "name": "UPX executable packer.",
          "description": "A new rule has been introduced  a \"suspicious\" ELF binary that is packed with the UPX executable packer.\nSuggested ATT&CK IDs: rule SUSP_ELF_LNX_UPX_Compressed_File { meta: description = \"Detects a suspicious ELF binary with UPX compression\" author = \"Florian Roth (Nextron Systems)\" reference = \"Internal Research\" date = \"2018-12-12\" score = 40 hash1 = \"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4\" id = \"078937de-59b3-538e-a5c3-57f4e6050212\" strings: $s1 = \"PROT_EXEC|PROT_WRITE failed.\" fullword ascii $s2 = \"$Id: UPX\" fullword ascii $s3 = \"$Info: This file is packed with the UPX executable packer\" ascii $fp1 = \"check your UCL installation !\"",
          "modified": "2024-10-14T00:01:17.069000",
          "created": "2024-05-09T19:47:53.786000",
          "tags": [
            "cioch adrian",
            "centrum usug",
            "sieciowych",
            "elf binary",
            "upx compression",
            "roth",
            "nextron",
            "info",
            "javascript",
            "html",
            "office open",
            "xml document",
            "network capture",
            "win32 exe",
            "xml pakietu",
            "pdf zestawy",
            "przechwytywanie",
            "office",
            "filehashsha1",
            "url https",
            "cve cve20201070",
            "cve cve20203153",
            "cve cve20201048",
            "cve cve20211732",
            "cve20201048 apr",
            "filehashmd5",
            "cve cve20010901",
            "cve cve20021841",
            "cve20153202 apr",
            "cve cve20160728",
            "cve cve20161807",
            "cve cve20175123",
            "cve20185407 apr",
            "cve cve20054605",
            "cve cve20060745",
            "cve cve20070452",
            "cve cve20070453",
            "cve cve20070454",
            "cve cve20071355",
            "cve cve20071358",
            "cve cve20071871",
            "cve20149614 apr",
            "cve cve20151503",
            "cve cve20152080",
            "cve cve20157377",
            "cve cve20170131",
            "cve20200796 may",
            "cve cve20113403"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6861,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 5771,
            "domain": 3139,
            "URL": 14525,
            "FileHash-SHA1": 2610,
            "IPv4": 108,
            "CIDR": 40,
            "FileHash-SHA256": 10705,
            "FileHash-MD5": 3373,
            "YARA": 2,
            "CVE": 148,
            "Mutex": 7,
            "FilePath": 3,
            "SSLCertFingerprint": 3,
            "email": 23,
            "JA3": 1,
            "IPv6": 2
          },
          "indicator_count": 40460,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "552 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a958f96f9b29641ea020",
          "name": "Fitbit app link IoC's",
          "description": "",
          "modified": "2023-12-06T17:03:20.219000",
          "created": "2023-12-06T17:03:20.219000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 17,
            "FileHash-SHA256": 3730,
            "hostname": 1052,
            "domain": 446,
            "URL": 2806,
            "FileHash-MD5": 173,
            "FileHash-SHA1": 168,
            "email": 1
          },
          "indicator_count": 8393,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a927b24b94cdd5d344d1",
          "name": "Fitbit app link IoC's",
          "description": "",
          "modified": "2023-12-06T17:02:31.854000",
          "created": "2023-12-06T17:02:31.854000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 17,
            "FileHash-SHA256": 3730,
            "hostname": 1052,
            "domain": 446,
            "URL": 2806,
            "FileHash-MD5": 173,
            "FileHash-SHA1": 168,
            "email": 1
          },
          "indicator_count": 8393,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657098ff4c59f8ac3f86f613",
          "name": "v2 of web.basemark.com plus all suggested ioc,s dont forget about the dropped js files from the 2nd hybrid link",
          "description": "",
          "modified": "2023-12-06T15:53:35.032000",
          "created": "2023-12-06T15:53:35.032000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1168,
            "hostname": 1366,
            "domain": 412,
            "URL": 3576,
            "email": 2,
            "FileHash-MD5": 61,
            "FileHash-SHA1": 54
          },
          "indicator_count": 6639,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708ed8f7d4b5483117bb66",
          "name": "abuse.ch",
          "description": "",
          "modified": "2023-12-06T15:10:16.397000",
          "created": "2023-12-06T15:10:16.397000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 223,
            "domain": 383,
            "URL": 1639,
            "hostname": 560,
            "email": 1,
            "FileHash-MD5": 2
          },
          "indicator_count": 2808,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 114,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708e2d7cb4228401888b63",
          "name": "possibly a central bank",
          "description": "",
          "modified": "2023-12-06T15:07:25.990000",
          "created": "2023-12-06T15:07:25.990000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 622,
            "domain": 2558,
            "URL": 4203,
            "hostname": 1221,
            "CVE": 1
          },
          "indicator_count": 8605,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708e0d95a8c74cc715f7a2",
          "name": "West.cn",
          "description": "",
          "modified": "2023-12-06T15:06:53.350000",
          "created": "2023-12-06T15:06:53.350000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 208,
            "domain": 533,
            "hostname": 757,
            "URL": 1861,
            "FileHash-MD5": 1
          },
          "indicator_count": 3360,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708d657f0895a860febf8f",
          "name": "SafeFrame Container",
          "description": "",
          "modified": "2023-12-06T15:04:05.932000",
          "created": "2023-12-06T15:04:05.932000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1416,
            "domain": 2979,
            "URL": 8250,
            "hostname": 2262
          },
          "indicator_count": 14907,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708d2dc7aa57db55aab29c",
          "name": "serverhub.com eonix.net",
          "description": "",
          "modified": "2023-12-06T15:03:09.373000",
          "created": "2023-12-06T15:03:09.373000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 876,
            "URL": 5708,
            "hostname": 1541,
            "domain": 915,
            "FileHash-MD5": 1
          },
          "indicator_count": 9042,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c8a9635f156e79238f1",
          "name": "intel gained from a spam text",
          "description": "",
          "modified": "2023-12-06T15:00:26.727000",
          "created": "2023-12-06T15:00:26.727000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 823,
            "domain": 717,
            "URL": 2245,
            "hostname": 615,
            "email": 4,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 1
          },
          "indicator_count": 4411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c712f63f24552fa3e38",
          "name": "bgp.net malicious hosting",
          "description": "",
          "modified": "2023-12-06T15:00:01.600000",
          "created": "2023-12-06T15:00:01.600000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 173,
            "hostname": 417,
            "URL": 1208,
            "domain": 267,
            "CVE": 1
          },
          "indicator_count": 2066,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c534aadf7adf4f27d77",
          "name": "enom.com & 4vendeta.com - ReduceRight malware hosting/creation",
          "description": "",
          "modified": "2023-12-06T14:59:31.122000",
          "created": "2023-12-06T14:59:31.122000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 302,
            "domain": 634,
            "URL": 2988,
            "hostname": 1208
          },
          "indicator_count": 5132,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c13ee010f81d3f9b3af",
          "name": "Malware hosting - hostrocket.com",
          "description": "",
          "modified": "2023-12-06T14:58:27.115000",
          "created": "2023-12-06T14:58:27.115000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 232,
            "hostname": 963,
            "domain": 412,
            "URL": 2337,
            "email": 3,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 3949,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c0791fece390b1a096e",
          "name": "Choopa.com - vultr",
          "description": "",
          "modified": "2023-12-06T14:58:15.734000",
          "created": "2023-12-06T14:58:15.734000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 453,
            "hostname": 1241,
            "domain": 430,
            "URL": 3454
          },
          "indicator_count": 5578,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c01dca4e6c505e4fca0",
          "name": "Hostgator - whitelisted",
          "description": "",
          "modified": "2023-12-06T14:58:09.135000",
          "created": "2023-12-06T14:58:09.135000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 692,
            "hostname": 1339,
            "domain": 1260,
            "URL": 4622,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 1
          },
          "indicator_count": 7917,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708aa1dca4e6c505e4fc9e",
          "name": "Botnet c&c",
          "description": "",
          "modified": "2023-12-06T14:52:16.286000",
          "created": "2023-12-06T14:52:16.286000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 214,
            "hostname": 334,
            "URL": 1182,
            "FileHash-SHA256": 33
          },
          "indicator_count": 1763,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657080d20f7e10c1e37fcf89",
          "name": "TarrantCounty.com ~ 03.01.2022",
          "description": "",
          "modified": "2023-12-06T14:10:26.301000",
          "created": "2023-12-06T14:10:26.301000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1078,
            "domain": 838,
            "hostname": 1607,
            "URL": 4134,
            "email": 3,
            "FileHash-SHA1": 2,
            "CIDR": 4,
            "FileHash-MD5": 15
          },
          "indicator_count": 7681,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657080735501c11ddbb7a988",
          "name": "Dominionvoting.com 03.03.22",
          "description": "",
          "modified": "2023-12-06T14:08:51.329000",
          "created": "2023-12-06T14:08:51.329000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 663,
            "hostname": 588,
            "domain": 413,
            "URL": 2183,
            "FileHash-MD5": 7
          },
          "indicator_count": 3854,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570805953274b32ec1f981b",
          "name": "Votebuilder.com",
          "description": "",
          "modified": "2023-12-06T14:08:25.588000",
          "created": "2023-12-06T14:08:25.588000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 869,
            "domain": 834,
            "URL": 4755,
            "hostname": 1559,
            "CIDR": 2,
            "FileHash-MD5": 10
          },
          "indicator_count": 8029,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707e5b7df6f60133e8fb50",
          "name": "Jeeng / Powerbox",
          "description": "",
          "modified": "2023-12-06T13:59:55.129000",
          "created": "2023-12-06T13:59:55.129000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 3,
            "FileHash-SHA256": 9072,
            "domain": 2500,
            "hostname": 3584,
            "URL": 13548,
            "FileHash-MD5": 197,
            "FileHash-SHA1": 162,
            "email": 19,
            "CIDR": 20,
            "SSLCertFingerprint": 2,
            "BitcoinAddress": 1
          },
          "indicator_count": 29108,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f147a7e55dd916fe9e3e2",
          "name": "Fitbit app link IoC's",
          "description": "",
          "modified": "2023-11-13T22:04:06.580000",
          "created": "2023-10-30T02:27:06.140000",
          "tags": [
            "ssl certificate",
            "contacted",
            "contacted urls",
            "referrer",
            "march",
            "historical ssl",
            "whois sslcert",
            "suspicious",
            "execution",
            "malware",
            "core",
            "name verdict",
            "falco",
            "pattern match",
            "ascii text",
            "file",
            "png image",
            "sdcwhb",
            "windows nt",
            "jpeg image",
            "jfif",
            "appdata",
            "kg2exe",
            "date",
            "unknown",
            "general",
            "hybrid",
            "this",
            "click",
            "strings",
            "class",
            "critical",
            "error",
            "zfaoz",
            "falcon sandbox",
            "exit",
            "node tcp",
            "traffic",
            "et tor",
            "known tor",
            "relayrouter",
            "tor known",
            "tor relayrouter",
            "detection list",
            "ip address",
            "cisco umbrella",
            "heur",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "malicious url",
            "malicious site",
            "unsafe",
            "riskware",
            "swrort",
            "downldr",
            "artemis",
            "team",
            "phishing",
            "iframe",
            "crack",
            "xrat",
            "installcore",
            "facebook",
            "bank",
            "opencandy",
            "nircmd",
            "exploit",
            "filetour",
            "cleaner",
            "wacatac",
            "win64",
            "unruy",
            "blacknet rat",
            "stealer",
            "azorult",
            "service",
            "runescape",
            "download",
            "tiggre",
            "presenoker",
            "conduit",
            "xtrat",
            "agent",
            "patcher",
            "adload",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "dropper",
            "trojanx",
            "webshell",
            "adposhel",
            "union",
            "trojanspy",
            "webtoolbar",
            "blacklist https",
            "blacklist",
            "command_and_control",
            "Fitbit",
            "hidden tear",
            "google",
            "spyware",
            "potentially unwanted progams",
            "network",
            "bundlers",
            "aware"
          ],
          "references": [
            "https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile",
            "https://www.hybrid-analysis.com/sample/1e5fe7747a445f340ed8db6bd946b6fb2cf2db123b08c3ac818cb8a1c2ae28d0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ZfAoz",
              "display_name": "ZfAoz",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "MediaMagnet",
              "display_name": "MediaMagnet",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WisdomEyes.16070401.9500",
              "display_name": "WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tiggre",
              "display_name": "Trojan:Win32/Tiggre",
              "target": "/malware/Trojan:Win32/Tiggre"
            },
            {
              "id": "Unruy",
              "display_name": "Unruy",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "652b2a8048e6a285461c4a5d",
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1052,
            "FileHash-MD5": 173,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 3730,
            "URL": 2806,
            "domain": 446,
            "CVE": 17,
            "email": 1
          },
          "indicator_count": 8393,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "888 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "652b2a8048e6a285461c4a5d",
          "name": "Fitbit app link IoC's",
          "description": "Critical. Fitbit download link found in Google search results.\n[https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile]\n\nBlackNET is a Remote Access Trojan (RAT) - Advanced Windows Botnet.\nCapabilities: stealing/grabbing files and passwords, keylogging, cryptojacking, loading files, executing commands, etc. \n\nOpenCandy , PUP\nCapabilities: Browser home page hijacker, installs unwanted toolbars, plug-ins, and extensions to web browsers, collects information, user\u2019s surfing habits, distribution to third parties without user consent.\n\nProcess Injection: Privilege escalation adversaries  use to inject arbitrary code.",
          "modified": "2023-11-13T22:04:06.580000",
          "created": "2023-10-14T23:55:42.972000",
          "tags": [
            "ssl certificate",
            "contacted",
            "contacted urls",
            "referrer",
            "march",
            "historical ssl",
            "whois sslcert",
            "suspicious",
            "execution",
            "malware",
            "core",
            "name verdict",
            "falco",
            "pattern match",
            "ascii text",
            "file",
            "png image",
            "sdcwhb",
            "windows nt",
            "jpeg image",
            "jfif",
            "appdata",
            "kg2exe",
            "date",
            "unknown",
            "general",
            "hybrid",
            "this",
            "click",
            "strings",
            "class",
            "critical",
            "error",
            "zfaoz",
            "falcon sandbox",
            "exit",
            "node tcp",
            "traffic",
            "et tor",
            "known tor",
            "relayrouter",
            "tor known",
            "tor relayrouter",
            "detection list",
            "ip address",
            "cisco umbrella",
            "heur",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "malicious url",
            "malicious site",
            "unsafe",
            "riskware",
            "swrort",
            "downldr",
            "artemis",
            "team",
            "phishing",
            "iframe",
            "crack",
            "xrat",
            "installcore",
            "facebook",
            "bank",
            "opencandy",
            "nircmd",
            "exploit",
            "filetour",
            "cleaner",
            "wacatac",
            "win64",
            "unruy",
            "blacknet rat",
            "stealer",
            "azorult",
            "service",
            "runescape",
            "download",
            "tiggre",
            "presenoker",
            "conduit",
            "xtrat",
            "agent",
            "patcher",
            "adload",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "dropper",
            "trojanx",
            "webshell",
            "adposhel",
            "union",
            "trojanspy",
            "webtoolbar",
            "blacklist https",
            "blacklist",
            "command_and_control",
            "Fitbit",
            "hidden tear",
            "google",
            "spyware",
            "potentially unwanted progams",
            "network",
            "bundlers",
            "aware"
          ],
          "references": [
            "https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile",
            "https://www.hybrid-analysis.com/sample/1e5fe7747a445f340ed8db6bd946b6fb2cf2db123b08c3ac818cb8a1c2ae28d0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ZfAoz",
              "display_name": "ZfAoz",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "MediaMagnet",
              "display_name": "MediaMagnet",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WisdomEyes.16070401.9500",
              "display_name": "WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tiggre",
              "display_name": "Trojan:Win32/Tiggre",
              "target": "/malware/Trojan:Win32/Tiggre"
            },
            {
              "id": "Unruy",
              "display_name": "Unruy",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1052,
            "FileHash-MD5": 173,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 3730,
            "URL": 2806,
            "domain": 446,
            "CVE": 17,
            "email": 1
          },
          "indicator_count": 8393,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "888 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "652b2a50c4487060d52346fd",
          "name": "Fitbit app link IoC's",
          "description": "Critical. Fitbit download link found in Google search results.\n[https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile]\n\nBlackNET is a Remote Access Trojan (RAT) - Advanced Windows Botnet.\nCapabilities: stealing/grabbing files and passwords, keylogging, cryptojacking, loading files, executing commands, etc. \n\nOpenCandy , PUP\nCapabilities: Browser home page hijacker, installs unwanted toolbars, plug-ins, and extensions to web browsers, collects information, user\u2019s surfing habits, distribution to third parties without user consent.\n\nProcess Injection: Privilege escalation adversaries  use to inject arbitrary code.",
          "modified": "2023-11-13T22:04:06.580000",
          "created": "2023-10-14T23:54:55.973000",
          "tags": [
            "ssl certificate",
            "contacted",
            "contacted urls",
            "referrer",
            "march",
            "historical ssl",
            "whois sslcert",
            "suspicious",
            "execution",
            "malware",
            "core",
            "name verdict",
            "falco",
            "pattern match",
            "ascii text",
            "file",
            "png image",
            "sdcwhb",
            "windows nt",
            "jpeg image",
            "jfif",
            "appdata",
            "kg2exe",
            "date",
            "unknown",
            "general",
            "hybrid",
            "this",
            "click",
            "strings",
            "class",
            "critical",
            "error",
            "zfaoz",
            "falcon sandbox",
            "exit",
            "node tcp",
            "traffic",
            "et tor",
            "known tor",
            "relayrouter",
            "tor known",
            "tor relayrouter",
            "detection list",
            "ip address",
            "cisco umbrella",
            "heur",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "malicious url",
            "malicious site",
            "unsafe",
            "riskware",
            "swrort",
            "downldr",
            "artemis",
            "team",
            "phishing",
            "iframe",
            "crack",
            "xrat",
            "installcore",
            "facebook",
            "bank",
            "opencandy",
            "nircmd",
            "exploit",
            "filetour",
            "cleaner",
            "wacatac",
            "win64",
            "unruy",
            "blacknet rat",
            "stealer",
            "azorult",
            "service",
            "runescape",
            "download",
            "tiggre",
            "presenoker",
            "conduit",
            "xtrat",
            "agent",
            "patcher",
            "adload",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "dropper",
            "trojanx",
            "webshell",
            "adposhel",
            "union",
            "trojanspy",
            "webtoolbar",
            "blacklist https",
            "blacklist",
            "command_and_control",
            "Fitbit",
            "hidden tear",
            "google",
            "spyware",
            "potentially unwanted progams",
            "network",
            "bundlers",
            "aware"
          ],
          "references": [
            "https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile",
            "https://www.hybrid-analysis.com/sample/1e5fe7747a445f340ed8db6bd946b6fb2cf2db123b08c3ac818cb8a1c2ae28d0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ZfAoz",
              "display_name": "ZfAoz",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "MediaMagnet",
              "display_name": "MediaMagnet",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WisdomEyes.16070401.9500",
              "display_name": "WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tiggre",
              "display_name": "Trojan:Win32/Tiggre",
              "target": "/malware/Trojan:Win32/Tiggre"
            },
            {
              "id": "Unruy",
              "display_name": "Unruy",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1052,
            "FileHash-MD5": 173,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 3730,
            "URL": 2806,
            "domain": 446,
            "CVE": 17,
            "email": 1
          },
          "indicator_count": 8393,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "888 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6425a2f9c155fd53b9922bcd",
          "name": "v2 of web.basemark.com plus all suggested ioc,s dont forget about the dropped js files from the 2nd hybrid link",
          "description": "hope peeps are gona learn from 3cx that false positives are in fact often not false",
          "modified": "2023-04-29T13:05:05.409000",
          "created": "2023-03-30T14:55:53.652000",
          "tags": [
            "trojan",
            "apt",
            "ansi",
            "dropped file",
            "runtime data",
            "chromeua",
            "optout",
            "programfiles",
            "typeof e",
            "localappdata",
            "error",
            "date",
            "generator",
            "path",
            "null",
            "void",
            "win64",
            "twitter",
            "this",
            "critical",
            "desktop",
            "dark",
            "light",
            "meta",
            "roboto",
            "span",
            "class",
            "template",
            "blink",
            "suspicious",
            "facebook",
            "mexico",
            "malicious",
            "mozilla",
            "strings",
            "qakbot",
            "://web.basemark.com/result/?4A3D0fmu%1C%00%00%00B%00a%00s%00e%00"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/e7740c893812cea8e34ffb04331dcc45762dec73def71929bfbabcbfb22e93e9",
            "https://hybrid-analysis.com/sample/e7740c893812cea8e34ffb04331dcc45762dec73def71929bfbabcbfb22e93e9/641e30763dcad56bc2075661",
            "http://web.basemark.com/result/?4A3D0fmu%1C%00%00%00B%00a%00s%00e%00m%00a%00r%00k"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 412,
            "FileHash-SHA256": 1168,
            "URL": 3576,
            "hostname": 1366,
            "email": 2,
            "FileHash-MD5": 61,
            "FileHash-SHA1": 54
          },
          "indicator_count": 6639,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 92,
          "modified_text": "1086 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "63ed8628367c1a4f3f8e773a",
          "name": "just a load of errors on edge watching twitch",
          "description": "load of unknown user pics, but that could just be a twitch thing",
          "modified": "2023-03-18T00:05:45.328000",
          "created": "2023-02-16T01:26:00.959000",
          "tags": [
            "object",
            "typeerror",
            "typeof symbol",
            "error",
            "typeof t",
            "array",
            "string",
            "typeof e",
            "typeof n",
            "referenceerror",
            "date",
            "body",
            "null",
            "local",
            "generator",
            "class",
            "typeof tcfapi",
            "tcfapi",
            "daten",
            "image",
            "typeof comscore",
            "true",
            "regexp",
            "config",
            "nolbundle",
            "novmsjs",
            "nlssdk",
            "retry request",
            "nolsdkbundle",
            "typeof o",
            "bsdk check",
            "optout",
            "basever",
            "lsid",
            "qqfunction",
            "nielsen log",
            "info",
            "stop",
            "logger",
            "android",
            "donate",
            "ukraine relief",
            "requestbuilder",
            "slotbuilder",
            "uint8array",
            "nthis",
            "promise",
            "symbol",
            "fullscreen",
            "adload",
            "false",
            "facebook",
            "unknown",
            "meta",
            "direct",
            "this",
            "close",
            "locale",
            "model",
            "survey",
            "companion",
            "scroll",
            "backspace",
            "insert",
            "infinity",
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "runtime data",
            "ansi",
            "path",
            "hybrid analysis",
            "api call",
            "registry access",
            "function",
            "calls",
            "window",
            "hybrid",
            "general",
            "click",
            "ransomware",
            "february",
            "strings",
            "suspicious",
            "irequestslot",
            "islotbuilder",
            "amazonerrorcode",
            "errortype",
            "adunit",
            "conflict",
            "please"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/5da0de230eb98e5598b152944d0e7e6b355485484052df6c7f1c747e2c5564c0/63ed708125f47738b45a6520",
            "webpack   buildin global.js",
            "SlotBuilder.ts",
            "P34D56F9D-5684-4C83-8EE1-5EA7DE9CF45D.js",
            "apstag.js",
            "nlsSDK600.bundle.min.js",
            "v6s.js",
            "https://sb.scorecardresearch.com/p?c1=2&c2=6745306&ns_type=hidden&ns_st_sv=5.1.3.160420&ns_st_smv=5.1&ns_st_it=r&ns_st_id=1676508021004&ns_st_ec=3&ns_st_sp=1&ns_st_sc=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=hb&ns_st_po=1560430&ns_st_cl=0&ns_st_hc=31&ns_st_mp=js_api&ns_st_mv=5.1.3.160420&ns_st_pn=1&ns_st_tp=0&ns_st_ci=47976339133&ns_st_pt=1560430&ns_st_dpt=360423&ns_st_ipt=60010&ns_st_et=1560430&ns_st_det=360423&ns_st_upc=1560430&ns_st_dupc=360423&ns_st_iupc=60010&ns_st_upa=15604",
            "https://sb.scorecardresearch.com/p?ax_uuid=d247c6142f285bb0488533aa7f2d53c5&c1=9&c2=31864766&ns__t=1676508027511&ns_c=UTF-8&cv=3.1&c8=SecurityWeekly%20-%20Twitch&c7=https%3A%2F%2Fwww.twitch.tv%2Fsecurityweekly&c9=",
            "https://hybrid-analysis.com/sample/b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b/",
            "beacon.js",
            "https://static-cdn.jtvnw.net/jtv_user_pictures/6f4129f6-3750-4c02-b7c8-c88a05064129-profile_image-70x70.png"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "SlotBuilder",
              "display_name": "SlotBuilder",
              "target": null
            },
            {
              "id": "RequestBuilder",
              "display_name": "RequestBuilder",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1353,
            "hostname": 363,
            "domain": 201,
            "FileHash-SHA256": 203,
            "FileHash-MD5": 9,
            "FileHash-SHA1": 3
          },
          "indicator_count": 2132,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1128 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "63ed86228ecb2b03d35b046f",
          "name": "just a load of errors on edge watching twitch",
          "description": "load of unknown user pics, but that could just be a twitch thing",
          "modified": "2023-03-18T00:05:45.328000",
          "created": "2023-02-16T01:25:54.305000",
          "tags": [
            "object",
            "typeerror",
            "typeof symbol",
            "error",
            "typeof t",
            "array",
            "string",
            "typeof e",
            "typeof n",
            "referenceerror",
            "date",
            "body",
            "null",
            "local",
            "generator",
            "class",
            "typeof tcfapi",
            "tcfapi",
            "daten",
            "image",
            "typeof comscore",
            "true",
            "regexp",
            "config",
            "nolbundle",
            "novmsjs",
            "nlssdk",
            "retry request",
            "nolsdkbundle",
            "typeof o",
            "bsdk check",
            "optout",
            "basever",
            "lsid",
            "qqfunction",
            "nielsen log",
            "info",
            "stop",
            "logger",
            "android",
            "donate",
            "ukraine relief",
            "requestbuilder",
            "slotbuilder",
            "uint8array",
            "nthis",
            "promise",
            "symbol",
            "fullscreen",
            "adload",
            "false",
            "facebook",
            "unknown",
            "meta",
            "direct",
            "this",
            "close",
            "locale",
            "model",
            "survey",
            "companion",
            "scroll",
            "backspace",
            "insert",
            "infinity",
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "runtime data",
            "ansi",
            "path",
            "hybrid analysis",
            "api call",
            "registry access",
            "function",
            "calls",
            "window",
            "hybrid",
            "general",
            "click",
            "ransomware",
            "february",
            "strings",
            "suspicious",
            "irequestslot",
            "islotbuilder",
            "amazonerrorcode",
            "errortype",
            "adunit",
            "conflict",
            "please"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/5da0de230eb98e5598b152944d0e7e6b355485484052df6c7f1c747e2c5564c0/63ed708125f47738b45a6520",
            "webpack   buildin global.js",
            "SlotBuilder.ts",
            "P34D56F9D-5684-4C83-8EE1-5EA7DE9CF45D.js",
            "apstag.js",
            "nlsSDK600.bundle.min.js",
            "v6s.js",
            "https://sb.scorecardresearch.com/p?c1=2&c2=6745306&ns_type=hidden&ns_st_sv=5.1.3.160420&ns_st_smv=5.1&ns_st_it=r&ns_st_id=1676508021004&ns_st_ec=3&ns_st_sp=1&ns_st_sc=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=hb&ns_st_po=1560430&ns_st_cl=0&ns_st_hc=31&ns_st_mp=js_api&ns_st_mv=5.1.3.160420&ns_st_pn=1&ns_st_tp=0&ns_st_ci=47976339133&ns_st_pt=1560430&ns_st_dpt=360423&ns_st_ipt=60010&ns_st_et=1560430&ns_st_det=360423&ns_st_upc=1560430&ns_st_dupc=360423&ns_st_iupc=60010&ns_st_upa=15604",
            "https://sb.scorecardresearch.com/p?ax_uuid=d247c6142f285bb0488533aa7f2d53c5&c1=9&c2=31864766&ns__t=1676508027511&ns_c=UTF-8&cv=3.1&c8=SecurityWeekly%20-%20Twitch&c7=https%3A%2F%2Fwww.twitch.tv%2Fsecurityweekly&c9=",
            "https://hybrid-analysis.com/sample/b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b/",
            "beacon.js",
            "https://static-cdn.jtvnw.net/jtv_user_pictures/6f4129f6-3750-4c02-b7c8-c88a05064129-profile_image-70x70.png"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "SlotBuilder",
              "display_name": "SlotBuilder",
              "target": null
            },
            {
              "id": "RequestBuilder",
              "display_name": "RequestBuilder",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1353,
            "hostname": 363,
            "domain": 201,
            "FileHash-SHA256": 203,
            "FileHash-MD5": 9,
            "FileHash-SHA1": 3
          },
          "indicator_count": 2132,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1128 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "63b580a925bb698985fa83ea",
          "name": "vendor.bundle.js",
          "description": "",
          "modified": "2023-02-03T13:00:02.804000",
          "created": "2023-01-04T13:35:37.535000",
          "tags": [
            "vxstream",
            "trojan",
            "apt",
            "memoryfile scan",
            "error",
            "progresstype",
            "graytext",
            "typeof e",
            "highlight",
            "bg96gwp",
            "typeof",
            "window",
            "null",
            "date",
            "span",
            "path",
            "meta",
            "push",
            "unknown",
            "roboto",
            "scroll",
            "suspicious",
            "close",
            "light",
            "template",
            "abcd",
            "android",
            "trident",
            "backspace",
            "insert",
            "4096",
            "void",
            "legend",
            "iframe",
            "webview",
            "infinity",
            "ransomware",
            "malicious",
            "accept toggle",
            "voice",
            "upgrade"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/f90162e65235185a24e9f20d855371b8ad7462d50d7a57851d000cfd5116f76d",
            "This website contains the details of an anti-virus scan conducted by the MetaDefender, which aims to identify and remove malware from websites, websites and social media sites, including Facebook, Twitter and YouTube.",
            "original dropped file discovery url",
            "http://lifehacker.com/assets/stylesheets/app-a873b056f0ea955e4ff0abebb210e5a6.css",
            "Making HTTPS connections using insecure TLS/SSL version details Connection was make using TLSv1.1 [tls.handshake.version: 0x00000302] source Network Traffic relevance 10/10 ATT&CK ID T1573 (Show technique in the MITRE ATT&CK\u2122 matrix)",
            "https://hybrid-analysis.com/sample/f90162e65235185a24e9f20d855371b8ad7462d50d7a57851d000cfd5116f76d/63aef1a83e3bb16765527bb8"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 205,
            "URL": 1340,
            "FileHash-SHA256": 407,
            "hostname": 491,
            "FileHash-MD5": 8,
            "email": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2453,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1171 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62e1ca167a1591e7b4ca1129",
          "name": "VirusTotal view-source on https://www.virustotal.com/en/file/undefined/analysis/",
          "description": "someone really needs to figure out wtf this is all doing it has to be part of the net.sh",
          "modified": "2022-07-28T02:05:04.183000",
          "created": "2022-07-27T23:28:22.504000",
          "tags": [
            "array",
            "object",
            "typeof t",
            "layer1",
            "error",
            "path",
            "function",
            "typeerror",
            "date",
            "svg export",
            "span",
            "null",
            "unknown",
            "click",
            "february",
            "april",
            "june",
            "august",
            "this",
            "void",
            "bounce",
            "string",
            "regexp",
            "number",
            "sxa0",
            "amptoken",
            "optout",
            "notfound",
            "contenttype",
            "form",
            "copyright",
            "element",
            "polymer project",
            "authors",
            "bsd style",
            "code",
            "google",
            "software",
            "window",
            "generator",
            "comment",
            "trident",
            "typeof e",
            "typeof symbol",
            "typeof btoa",
            "btoa",
            "typeof reflect",
            "boolean",
            "customevent",
            "plugin",
            "build",
            "home",
            "intelligence",
            "graph",
            "report",
            "urls",
            "please",
            "javascript",
            "https://www.virustotal.com/en/file/undefined/analysis/",
            "net.sh"
          ],
          "references": [
            "entity%3Aip%20whois%3Ainfo%40anodicnetwork.com.html",
            "14.main.bundle.91f9f7ff635e0b797de3.js",
            "5.main.bundle.e92e5e24e074f9c2a52b.js",
            "0.main.bundle.a9d68f5204cd3ac257b6.js",
            "webcomponent-polyfill.js",
            "analytics.js",
            "12.main.bundle.50be73a11d1d3745a5ee.js",
            "\"<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Strict//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\"> <html xmlns=\"http://www.w3.org/1999/xhtml\">   <head>     <title>           Page not found       </title>       <meta http-equiv=\"Content-type\" content=\"text/html; charset=utf-8\">     <meta http-equiv=\"Pragma\" content=\"no-cache\">     <meta http-equiv=\"Pragma\" content=\"no-store\">     <meta http-equiv=\"Expires\" content=\"-1\">     <meta name=\"keywords\" content=\"virustotal, antivirus, infected, free, sca",
            "https://www.virustotal.com/en/file/undefined/analysis/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1538,
            "FileHash-SHA256": 138,
            "hostname": 363,
            "domain": 235
          },
          "indicator_count": 2274,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 391,
          "modified_text": "1361 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62844b9aeadcab773b3eb51a",
          "name": "DATAHATA - data-xata",
          "description": "ChunkLoadError, a new type of error, failed to load a chunk of JavaScript, according to the web browser operator, E.noconflict.com, as well as the website itself.",
          "modified": "2022-06-16T00:01:26.112000",
          "created": "2022-05-18T01:27:54.809000",
          "tags": [
            "zendesk",
            "integration",
            "offline form",
            "routing website",
            "acquire",
            "english",
            "chatsupport",
            "livechat",
            "genesys dx",
            "drift",
            "live",
            "chat",
            "android",
            "contact",
            "twitter",
            "facebook",
            "fast",
            "enterprise",
            "small",
            "demo",
            "leave",
            "premium",
            "easy",
            "robin",
            "tbody",
            "span",
            "jost",
            "object",
            "thead",
            "tfoot",
            "typecheckbox",
            "typeradio",
            "typeof content",
            "array",
            "error",
            "footer",
            "nuxtlink",
            "combo",
            "cookie",
            "please",
            "cancel",
            "email",
            "zendesk chat",
            "sorry",
            "back",
            "name",
            "function",
            "document",
            "click",
            "close",
            "null",
            "hello",
            "noraid",
            "datav57c71c16",
            "raid0",
            "raid1",
            "raid5",
            "raid6",
            "raid10",
            "republic",
            "islands",
            "rating",
            "guinea",
            "reviewstab",
            "samoa",
            "china",
            "congo",
            "korea",
            "united",
            "albania",
            "armenia",
            "belarus",
            "chad",
            "cuba",
            "indonesia",
            "mexico",
            "panama",
            "paraguay",
            "slovakia",
            "ukraine",
            "uruguay",
            "bitcoin",
            "script",
            "date",
            "scroll",
            "mousemove",
            "touchstart",
            "setaccount",
            "trackpageview",
            "textjavascript",
            "datalayer",
            "gtmngp6lxc",
            "number",
            "string",
            "trackevent",
            "click button",
            "copyright",
            "host",
            "path",
            "order",
            "typeerror",
            "typeof symbol",
            "typeof e",
            "typeof t",
            "referenceerror",
            "promise",
            "boolean",
            "typeof n"
          ],
          "references": [
            "https://www.googletagmanager.com/gtm.js?id=GTM-NGP6LXC",
            "https://www.data-xata.com/js/zopimlaunch.js",
            "https://www.data-xata.com/_nuxt/1e8744d.modern.js",
            "https://www.data-xata.com/_nuxt/65d6cfa.modern.js",
            "https://www.data-xata.com/_nuxt/b799d37.modern.js",
            "https://www.data-xata.com/_nuxt/e7424e3.js",
            "xfe-URL-Data-xata.com-stix2-2.1-export.json",
            "https://zopim.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1531",
              "name": "Account Access Removal",
              "display_name": "T1531 - Account Access Removal"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1543",
              "name": "Create or Modify System Process",
              "display_name": "T1543 - Create or Modify System Process"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [
            "E-Commerce"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 329,
            "URL": 968,
            "FileHash-SHA256": 245,
            "domain": 241,
            "FileHash-MD5": 1,
            "email": 1
          },
          "indicator_count": 1785,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1403 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "628437db120de2ab2ecb49fe",
          "name": "The \u201cconti leak page\u201d - likely conti",
          "description": "Conti leak page https://share.vx-underground.org/Conti/ is likely conti",
          "modified": "2022-06-16T00:01:26.112000",
          "created": "2022-05-18T00:03:39.947000",
          "tags": [
            "woff2",
            "woff",
            "truetype",
            "gelionbold",
            "gelionsemibold",
            "gelionmedium",
            "gelionregular",
            "gelionlight",
            "gelionthin",
            "xe",
            "object",
            "error",
            "element",
            "typeof t",
            "browser",
            "ofunction",
            "typeof e",
            "typeof r",
            "tthis",
            "applepay",
            "date",
            "null",
            "accept",
            "license",
            "or conditions",
            "post",
            "array",
            "copyright",
            "apache license",
            "version",
            "this code",
            "is provided",
            "on an",
            "symbol",
            "typeerror",
            "iterator",
            "string",
            "facebook pixel",
            "pixel code",
            "facebook",
            "service",
            "phonenumber",
            "regexp",
            "function",
            "shadowsizzle",
            "domdata",
            "hexchars",
            "promise",
            "typeof n",
            "agent",
            "launcher",
            "this",
            "android",
            "class",
            "fail",
            "shift",
            "bind",
            "trident",
            "getclass",
            "body",
            "widget",
            "edge",
            "dataname",
            "intercom",
            "typeof symbol",
            "apple",
            "webkiti",
            "criosi",
            "javascript"
          ],
          "references": [
            "xfe-URL-share.vx-underground.org_Conti-stix2-2.1-export.json",
            "https://app.uizard.io/p/c69fa2aa",
            "https://widget.intercom.io/widget/e1nqrt2k",
            "https://cdn.eu.pendo.io/agent/static/82b060a2-2cf8-472e-55d4-bd0833416335/pendo.js",
            "https://connect.facebook.net/signals/plugins/identity.js?v=2.9.60",
            "xfe-URL-vx-underground.org_Conti_-stix2-2.1-export.json",
            "xfe-URL-uizard.io-stix2-2.1-export.json",
            "https://public.profitwell.com/js/profitwell.js?auth=80939adc88898a29e714f6dd3d25e8ba",
            "https://js.stripe.com/v3",
            "https://app.uizard.io/fonts.css?cache=2022-04-29-12-55-57",
            "xfe-URL-Js.stripe.net-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Xe",
              "display_name": "Xe",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 707,
            "URL": 3480,
            "FileHash-SHA256": 438,
            "domain": 458,
            "email": 2,
            "FileHash-MD5": 49
          },
          "indicator_count": 5134,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 70,
          "modified_text": "1403 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6280aa12040a569d19f6285f",
          "name": "possibly a central bank",
          "description": "Tobias Ahlin,",
          "modified": "2022-06-14T00:00:05.659000",
          "created": "2022-05-15T07:21:54.499000",
          "tags": [
            "regexp",
            "typeof e",
            "function",
            "typeof t",
            "width",
            "error",
            "object",
            "pseudo",
            "child",
            "form",
            "class",
            "null",
            "date",
            "this",
            "void",
            "accept",
            "reduceright",
            "number",
            "string",
            "l420",
            "g8m7ft2s1tv",
            "copyright",
            "json",
            "uint8array",
            "ssnull",
            "script",
            "closure library",
            "xdfunction",
            "adfunction",
            "typeerror",
            "symbol",
            "generator",
            "typeof n",
            "array",
            "promise",
            "weakmap",
            "typeof f",
            "natb",
            "409764",
            "animation",
            "suspense",
            "context",
            "forwardref",
            "deleted",
            "10252",
            "meta",
            "facebook",
            "unknown",
            "scroll",
            "backspace",
            "insert",
            "typeof symbol",
            "typeof c",
            "typeof s",
            "sprintf",
            "syntaxerror",
            "vhyj",
            "diefg",
            "bcdiefguxx",
            "constructor",
            "param",
            "rockn",
            "createclass",
            "source",
            "super",
            "infinity",
            "false",
            "contact",
            "internal",
            "phonenumber",
            "middle",
            "path",
            "redemption",
            "pass",
            "click",
            "cont",
            "albania",
            "armenia",
            "burma",
            "belarus",
            "cuba",
            "panama",
            "paraguay",
            "slovakia",
            "chad",
            "uruguay",
            "prop",
            "invert",
            "flip",
            "close",
            "small",
            "green",
            "union",
            "indonesia",
            "lucia",
            "martin",
            "mexico",
            "code",
            "apache",
            "blin",
            "slave",
            "gondi",
            "icelandic",
            "ganda",
            "zulu",
            "christmas",
            "burkina",
            "czech",
            "ukraine",
            "android",
            "format",
            "updater",
            "next",
            "hooks",
            "harmony",
            "trim",
            "python",
            "push",
            "shift",
            "slice",
            "shadowsizzle",
            "domdata",
            "hexchars",
            "agent",
            "launcher",
            "fail",
            "bind",
            "trident",
            "getclass",
            "body",
            "widget",
            "areasmodule",
            "duip",
            "hlwq",
            "fz5i",
            "dehu",
            "tbh0",
            "fwir",
            "x7am",
            "pcnd",
            "valr",
            "boolean",
            "portal",
            "partner",
            "ascio partner",
            "ascio",
            "tlds",
            "login en",
            "en de",
            "join today",
            "idns",
            "skip",
            "ascio domains",
            "tlds offered",
            "global whois",
            "checker",
            "helvetica neue",
            "arial",
            "d67a60",
            "inter",
            "baskerville",
            "15px",
            "180deg",
            "135deg",
            "video",
            "init",
            "wrap",
            "flip direction",
            "stop animation",
            "scale",
            "htmlelement",
            "hide",
            "typeof",
            "property",
            "fill",
            "noscroll",
            "matrix",
            "skew",
            "look",
            "julian garnier",
            "mit license",
            "typeof define",
            "typeof module",
            "htmlcollection",
            "255a",
            "qnull",
            "float32array",
            "nfunction",
            "tobias ahlin",
            "github",
            "spotify",
            "hyper island",
            "strong",
            "tobias",
            "read",
            "view",
            "ahlin bjerrome",
            "minecraft",
            "view project",
            "spinkit",
            "lookback",
            "ruby",
            "hello"
          ],
          "references": [
            "xfe-URL-ascio.com-stix2-2.1-export.json",
            "https://tobiasahlin.com",
            "xfe-URL-tobiasahlin.com-stix2-2.1-export.json",
            "https://tobiasahlin.com/js/anime.min.js",
            "https://tobiasahlin.com/js/app.js?v=1",
            "https://tobiasahlin.com/js/portfolio.js",
            "https://tobiasahlin.com/css/site.css",
            "https://ascio.com",
            "https://portal.ascio.com/login",
            "https://static.zdassets.com/ekr/snippet.js?key=d814ea4a-a8eb-4a9c-aedd-cac0aa0e3551",
            "https://portal.ascio.com/7.602be6705ce7b901b821.js",
            "https://cdn.pendo.io/agent/static/783a696b-ddf4-4152-439e-f3761f54f088/pendo.js",
            "https://portal.ascio.com/runtime.48adad1e07e2679eb1f4.js",
            "https://js.hs-scripts.com/20704235.js",
            "https://www.ascio.com/wp-content/themes/Ascio/dist/js/front.js?ver=1648137806",
            "https://www.ascio.com/wp-includes/js/dist/i18n.min.js?ver=30fcecb428a0e8383d3776bcdd3a7834",
            "https://www.ascio.com/wp-includes/js/dist/hooks.min.js?ver=1e58c8c5a32b2e97491080c5b10dc71c",
            "https://www.ascio.com/wp-includes/js/dist/vendor/react-dom.min.js?ver=17.0.1",
            "https://www.ascio.com/wp-includes/js/dist/vendor/lodash.min.js?ver=4.17.19",
            "xfe-URL-lodash.com-stix2-2.1-export.json",
            "https://www.ascio.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.9",
            "https://www.google-analytics.com/gtm/optimize.js?id=OPT-NVZ8RF3",
            "https://www.googletagmanager.com/gtag/js?id=G-8M7FT2S1TV&l=dataLayer&cx=c"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4203,
            "hostname": 1221,
            "domain": 2558,
            "FileHash-SHA256": 622,
            "CVE": 1
          },
          "indicator_count": 8605,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 73,
          "modified_text": "1405 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6280398780fbe64692dd54fd",
          "name": "West.cn",
          "description": "If you want to know more about Shockwave Flash, spare a thought for the members of your own storage system:mt.co.g.o.mimeTypes.com, mime",
          "modified": "2022-06-13T00:00:32.864000",
          "created": "2022-05-14T23:21:43.936000",
          "tags": [
            "jquery",
            "date",
            "vue jquery",
            "template",
            "layer",
            "paas",
            "dist",
            "wjf3m",
            "ajax",
            "business",
            "string",
            "number",
            "regexp",
            "copyright",
            "uint8array",
            "fnumber",
            "aw1045757556",
            "closure library",
            "xdfunction",
            "code",
            "ddos",
            "image",
            "script",
            "document",
            "unescape",
            "msie",
            "canvas",
            "domain",
            "click",
            "input",
            "label",
            "jdomname",
            "strong",
            "jactive15toast",
            "jclearinput",
            "case",
            "datatarget",
            "jdomainregcount",
            "span",
            "function",
            "x786e",
            "x53d6",
            "cite",
            "x4fe1",
            "iframe",
            "null",
            "prompt",
            "x6700",
            "x591a",
            "array",
            "numarray",
            "data",
            "midsize",
            "action",
            "keyword",
            "firstfix",
            "object",
            "5n3j",
            "3f4r",
            "5p3s",
            "1f5m",
            "hhe2",
            "bbf2",
            "3y3z",
            "1223",
            "6q6m",
            "zfunction",
            "psettimeout",
            "tsettimeout",
            "hsetinterval",
            "iparseint",
            "hnull",
            "pnull",
            "tnull",
            "lv1s",
            "efunction",
            "typeof t",
            "typeof e",
            "adobeedge",
            "typeof r",
            "webkittransform",
            "moztransform",
            "body",
            "this",
            "notifier",
            "invert",
            "name",
            "param",
            "value",
            "error",
            "false",
            "trigger",
            "restart",
            "form",
            "config",
            "constants",
            "true",
            "modalhelper",
            "relative",
            "fixed",
            "account login",
            "activexobject",
            "haslocation",
            "xmlhttprequest",
            "xmlregexp",
            "temp",
            "extpart",
            "foundation",
            "mit license",
            "write",
            "rhino",
            "mark",
            "import",
            "classnamedom",
            "onbeforedestroy",
            "login",
            "auto",
            "init",
            "typeof b",
            "width",
            "pseudo",
            "child",
            "enulle",
            "class",
            "accept",
            "shockwave flash",
            "new date1e3",
            "ka6e5",
            "la10"
          ],
          "references": [
            "xfe-IP-103.24.249.209-stix2-2.1-export.json",
            "xfe-URL-West.cn-stix2-2.1-export.json",
            "https://m.west.cn/jscripts/baidutj/hm.js",
            "http://m.west.cn/jscripts/baidutj/hm.js",
            "https://www.west.cn/js2016/lib/jquery.SuperSlide/jquery.SuperSlide.2.1.1.x.js",
            "https://www.west.cn/js2016/root/jqinclude.js?t=20211126a",
            "https://www.googletagmanager.com/gtag/js?id=AW-1045757556"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 533,
            "URL": 1861,
            "hostname": 757,
            "FileHash-SHA256": 208,
            "FileHash-MD5": 1
          },
          "indicator_count": 3360,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1406 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "620c3b1f8af7ea0dcf2c1218",
          "name": "Jeeng / Powerbox",
          "description": "",
          "modified": "2022-06-12T22:01:23.105000",
          "created": "2022-02-15T23:45:35.234000",
          "tags": [
            "Jeeng",
            "tim pool",
            "timcast"
          ],
          "references": [
            "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scnrscnr",
            "id": "126475",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_126475/resized/80/avatar_67ca5b7bae.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 9072,
            "domain": 2500,
            "URL": 13548,
            "hostname": 3584,
            "FileHash-MD5": 197,
            "FileHash-SHA1": 162,
            "CVE": 3,
            "CIDR": 20,
            "SSLCertFingerprint": 2,
            "email": 19,
            "BitcoinAddress": 1
          },
          "indicator_count": 29108,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 97,
          "modified_text": "1407 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "627565069e58458ddbcb923d",
          "name": "Hostsailor.com - UAE",
          "description": "function(e,t) is a new type of word, and if you can get it by adding it to a single page, you will get the same result as the other, or as you want.",
          "modified": "2022-06-05T00:03:45.266000",
          "created": "2022-05-06T18:12:22.565000",
          "tags": [
            "u10ecu10d8u10dc",
            "typeof define",
            "date",
            "u00e5r siden",
            "instanceof",
            "typeof e",
            "rplginitsvg",
            "rplglang",
            "true",
            "sound icon",
            "click",
            "android",
            "span",
            "reduceright",
            "regexp",
            "typeof t",
            "class",
            "attr",
            "pseudo",
            "child",
            "function",
            "typeof module",
            "error",
            "number",
            "string",
            "copyright",
            "uint8array",
            "fnumber",
            "gtmnxs92ns",
            "host",
            "path",
            "void",
            "code",
            "image",
            "typeof atrkopts",
            "object",
            "typeerror",
            "array",
            "symbol",
            "bound",
            "typeof window",
            "invalid path",
            "unknown method",
            "null",
            "window",
            "phonenumber",
            "ninja",
            "form",
            "addcookiedomain",
            "hubspot",
            "xmlhttprequest",
            "fban",
            "twitter",
            "hstc",
            "trident",
            "helvetica neue",
            "helvetica",
            "arial",
            "n nn",
            "setapibaseurl",
            "hubspot cookie",
            "accept",
            "done"
          ],
          "references": [
            "xfe-URL-Hostsailor.com-stix2-2.1-export.json",
            "https://js.hs-banner.com/6261317.js",
            "https://js.usemessages.com/conversations-embed.js",
            "https://js.hs-analytics.net/analytics/1651860300000/6261317.js",
            "https://js.hscollectedforms.net/collectedforms.js",
            "https://certify-js.alexametrics.com/atrk.js",
            "https://www.googletagmanager.com/gtm.js?id=GTM-NXS92NS",
            "https://hostsailor.com/wp-content/cache/minify/9de48.js",
            "https://hostsailor.com/wp-content/cache/minify/cc4b1.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 625,
            "URL": 1809,
            "domain": 543,
            "FileHash-SHA256": 245
          },
          "indicator_count": 3222,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1414 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62752a3d78ce35783bfc85cc",
          "name": "SafeFrame Container",
          "description": "If you want to know what is going to happen when you create a non-iterable object, try these three pieces of code in the form of a new \"word\" or \"phrase\".",
          "modified": "2022-06-05T00:03:45.266000",
          "created": "2022-05-06T14:01:33.267000",
          "tags": [
            "public",
            "typeof",
            "typeof define",
            "array",
            "typeerror",
            "typeof symbol",
            "error",
            "typeof enulle",
            "sdkversion",
            "internal",
            "date",
            "cnzzdata",
            "czuuid",
            "umdistinctid",
            "typeof e",
            "typeof t",
            "version",
            "swiper",
            "most",
            "copyright",
            "mit license",
            "april",
            "trident",
            "win32",
            "class",
            "lh",
            "vd",
            "function",
            "overlaylevel",
            "zdhxiong",
            "customevent",
            "symbol",
            "object",
            "string",
            "number",
            "null",
            "uint8array",
            "typeof b",
            "iframe",
            "android",
            "embed",
            "meta",
            "0x14a",
            "0x104",
            "0x97",
            "0xe1",
            "0x228",
            "0x12b",
            "0x14e",
            "0xf5",
            "0x11a",
            "0xc6",
            "sxa0",
            "typeof d",
            "closure library",
            "array int8array",
            "b1342177279",
            "regexp",
            "typeof r",
            "pseudo",
            "child",
            "typeof n",
            "template",
            "void",
            "this",
            "ienew ca",
            "quota",
            "aafunction",
            "dafunction",
            "gc",
            "trackpageview",
            "trackevent",
            "gtmmdcvhgd",
            "node",
            "element",
            "path",
            "reduceright",
            "p420",
            "gc3w7t6h5qw",
            "kafunction",
            "fafafa",
            "xlfunction",
            "kkfunction",
            "nkfunction",
            "qkfunction",
            "rkfunction",
            "skfunction",
            "span",
            "edge",
            "bad idp",
            "bad event",
            "crios",
            "invalid attempt",
            "afunction",
            "ufunction",
            "kfunction"
          ],
          "references": [
            "xfe-URL-himado.com-stix2-2.1-export.json",
            "xfe-IP-146.148.236.187-stix2-2.1-export.json",
            "xfe-URL-Psychz.net-stix2-2.1-export.json",
            "https://cdn.ampproject.org/rtv/012204221712000/amp4ads-host-v0.js",
            "https://apis.google.com/_/scs/abc-static/_/js/k=gapi.lb.en.iTmf4rxOyWc.O/m=auth2/rt=j/sv=1/d=1/ed=1/rs=AHpOoo-LTnDn-AS2QlMWYZdnaV1OuFR7Iw/cb=gapi.loaded_0?le=scs",
            "https://securepubads.g.doubleclick.net/gpt/pubads_impl_page_level_ads_2022050201.js",
            "https://www.googletagmanager.com/gtag/js?id=G-C3W7T6H5QW&l=dataLayer&cx=c",
            "https://www.googletagmanager.com/gtm.js?id=GTM-MDCVHGD",
            "https://www.googletagmanager.com/gtag/js?id=UA-122335014-2",
            "https://himado.com/heihei/layui/layui.all.js",
            "https://securepubads.g.doubleclick.net/tag/js/gpt.js",
            "https://himado.com/cdn-cgi/challenge-platform/h/g/scripts/invisible.js?ts=1651842000",
            "https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022050201.js",
            "https://himado.com/heihei/node_modules/mdui/dist/js/mdui.min.js",
            "https://himado.com/heihei/js/swiper.min.js",
            "https://cdn.onesignal.com/sdks/OneSignalSDK.js",
            "https://c.cnzz.com/core.php?web_id=1280305902&t=z",
            "https://s4.cnzz.com/z_stat.php?id=1280305902&web_id=1280305902",
            "https://www.gstatic.com/firebasejs/8.1.2/firebase-app.js",
            "https://281cecd8ae73dff542e13679e60d5fb9.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html",
            "xfe-URL-Cnzz.com-stix2-2.1-export.json",
            "xfe-URL-Aliyun.com-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Lh",
              "display_name": "Lh",
              "target": null
            },
            {
              "id": "Gc",
              "display_name": "Gc",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            },
            {
              "id": "Vd",
              "display_name": "Vd",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2262,
            "URL": 8251,
            "FileHash-SHA256": 1416,
            "domain": 2979
          },
          "indicator_count": 14908,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 71,
          "modified_text": "1414 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62750795ebc8c475f4a3033a",
          "name": "aquanx.com (PegTech botnet hosting)",
          "description": "var b[f, g.g, is a new addition to the list of characters that can be added to a singleElement, as well as a set of numbers, if they are new.",
          "modified": "2022-06-05T00:03:45.266000",
          "created": "2022-05-06T11:33:41.174000",
          "tags": [
            "function",
            "eu cookie",
            "version",
            "tamas schalk",
            "element",
            "lang",
            "datadelay",
            "dataexpire",
            "dataclass",
            "name",
            "date",
            "path",
            "null",
            "cookie",
            "regexp",
            "typeof e",
            "please",
            "typeof t",
            "pseudo",
            "child",
            "array",
            "error",
            "class",
            "void",
            "this",
            "extendedvps",
            "login register",
            "product group",
            "svssdlinux",
            "svssdwindows",
            "password",
            "client area",
            "aquanx english",
            "azerbaijani",
            "catal",
            "colocation\uff0ccustomized service\uff0cone-stop service\uff0caffordable cloud ",
            "aquanx",
            "metal cloud",
            "chat",
            "ddos migration",
            "network",
            "colocation",
            "cloud",
            "colocation bare",
            "cloud hosting",
            "private cloud",
            "bare",
            "service",
            "custom build",
            "https",
            "bootstrap",
            "bootstrap hover",
            "dropdown",
            "author",
            "cameron spear",
            "mattia larentis",
            "dropdown plugin",
            "http",
            "plugin",
            "copyright",
            "twitter",
            "conflict",
            "focus",
            "object",
            "click",
            "open",
            "next",
            "target",
            "trigger",
            "checkbox",
            "delta",
            "scroll",
            "false",
            "type",
            "expando",
            "typeof selector",
            "sizzle",
            "elem",
            "match",
            "data",
            "seed",
            "vd",
            "number",
            "string",
            "ienew ca",
            "closure library",
            "quota",
            "aafunction",
            "dafunction"
          ],
          "references": [
            "https://www.googletagmanager.com/gtag/js?id=UA-59480575-2",
            "https://aquanx.com/js/jquery-1.12.4.min.js",
            "https://aquanx.com/js/bootstrap.js",
            "https://aquanx.com/js/bootstrap-hover-dropdown.min.js",
            "https://aquanx.com/js/modernizr-custom.js",
            "https://aquanx.com/js/cookie-warn.js?v=1_xSax0l",
            "https://aquanx.com/",
            "https://user.aquanx.com/clientarea.php",
            "https://user.aquanx.com/templates/aquanx20190627/js/scripts.min.js?v=8a99af",
            "https://alpha99.raksmart.com/whmcs/assets/js/cookie-warn.js",
            "xfe-URL-raksmart.com-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Vd",
              "display_name": "Vd",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 560,
            "URL": 1236,
            "domain": 184,
            "FileHash-SHA256": 79
          },
          "indicator_count": 2059,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1414 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62719a4dec6d0aa4631b9b2f",
          "name": "serverhub.com eonix.net",
          "description": "If you want to know what to do with your intercoms, spare a thought for e.intercom and add a new listener to your browser.. and use it to make the call.",
          "modified": "2022-06-02T00:03:59.540000",
          "created": "2022-05-03T21:10:37.722000",
          "tags": [
            "context",
            "error",
            "ajaxupdate",
            "request",
            "requestdata",
            "name",
            "xoctoberassets",
            "datarequest",
            "typesubmit",
            "typetext",
            "click",
            "function",
            "typeof c",
            "bootstrap",
            "javascript",
            "azaz",
            "popover",
            "typeof f",
            "typeof g",
            "typeof h",
            "vui",
            "anda",
            "tente",
            "outubro",
            "trackingclient",
            "srpanj",
            "rabu",
            "vasaris",
            "image",
            "typeof atrkopts",
            "800px",
            "40px",
            "i18n",
            "blockedemail",
            "typeof i18n",
            "hubspot",
            "captcha",
            "date",
            "please",
            "april",
            "august",
            "close",
            "february",
            "june",
            "form",
            "klik",
            "download",
            "window",
            "this",
            "next",
            "null",
            "blank",
            "este",
            "anna",
            "rserver",
            "mais",
            "void",
            "object",
            "typeerror",
            "array",
            "symbol",
            "bound",
            "typeof window",
            "typeof t",
            "invalid path",
            "unknown method",
            "phonenumber",
            "ninja",
            "typeof e",
            "edge",
            "dataname",
            "intercom",
            "typeof symbol",
            "apple",
            "webkiti",
            "criosi",
            "trident"
          ],
          "references": [
            "xfe-URL-Eonix.net-stix2-2.1-export.json",
            "xfe-URL-Serverhub.com-stix2-2.1-export.json",
            "xfe-URL-Enom.com-stix2-2.1-export 2.json",
            "https://widget.intercom.io/widget/rbc8ok9w",
            "https://js.hscollectedforms.net/collectedforms.js",
            "https://js.hsleadflows.net/leadflows.js",
            "https://d31qbv1cthcecs.cloudfront.net/atrk.js",
            "https://serverhub.com/combine/a059fe7a562c0b582328162f0ee69fda-1426025688",
            "https://serverhub.com/modules/system/assets/js/framework.js",
            "https://js.hs-scripts.com/3844463.js",
            "xfe-URL-Cloudfront.net-stix2-2.1-export.json",
            "xfe-URL-Intercom.io-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Vui",
              "display_name": "Vui",
              "target": null
            },
            {
              "id": "Outubro",
              "display_name": "Outubro",
              "target": null
            },
            {
              "id": "Tente",
              "display_name": "Tente",
              "target": null
            },
            {
              "id": "Anda",
              "display_name": "Anda",
              "target": null
            },
            {
              "id": "Vasaris",
              "display_name": "Vasaris",
              "target": null
            },
            {
              "id": "Rabu",
              "display_name": "Rabu",
              "target": null
            },
            {
              "id": "Srpanj",
              "display_name": "Srpanj",
              "target": null
            },
            {
              "id": "TrackingClient",
              "display_name": "TrackingClient",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5708,
            "hostname": 1541,
            "FileHash-SHA256": 876,
            "domain": 915,
            "CVE": 1,
            "FileHash-MD5": 1
          },
          "indicator_count": 9042,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 71,
          "modified_text": "1417 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6266f7e0e0264cba210a4e9e",
          "name": "intel gained from a spam text",
          "description": "var b[f]=g, if b(f) is not allowed to reach its maximum by the end of a set, then a.b(b) will be able to do so at the same time as a",
          "modified": "2022-05-25T00:04:03.622000",
          "created": "2022-04-25T19:34:56.772000",
          "tags": [
            "array",
            "typeerror",
            "symbol",
            "null",
            "string",
            "iterator",
            "object",
            "error",
            "boolean",
            "function",
            "service",
            "date",
            "phonenumber",
            "facebook",
            "meta",
            "typeof e",
            "typeof u",
            "typeof window",
            "es modules",
            "use esm",
            "webkit",
            "component",
            "typeof",
            "typeof y",
            "typeof symbol",
            "suspense",
            "context",
            "forwardref",
            "unknown",
            "4096",
            "typeof n",
            "promise",
            "weakmap",
            "dataview",
            "typeof t",
            "webpackrequire",
            "modulenotfound",
            "e1342177279",
            "array int8array",
            "loanup",
            "insurance",
            "group",
            "health",
            "solutions",
            "policy",
            "site",
            "america",
            "company",
            "life",
            "plan",
            "direct",
            "media",
            "alliance",
            "click",
            "team",
            "never",
            "advantage",
            "general",
            "light",
            "february",
            "april",
            "june",
            "august",
            "footer",
            "protect",
            "banker",
            "explorer",
            "fast",
            "martin",
            "union",
            "carrier",
            "next",
            "colony",
            "energy",
            "empire",
            "gerber",
            "philadelphia",
            "hippo",
            "king",
            "agent",
            "mercury",
            "moss",
            "premium",
            "nextgen",
            "oscar",
            "phoenix",
            "loans",
            "pure",
            "ramsey",
            "ranger",
            "solar",
            "titan",
            "tristate",
            "viking",
            "easy",
            "push",
            "code",
            "stop",
            "carriers",
            "live",
            "lucky",
            "moral",
            "story",
            "back",
            "lfunction",
            "dfunction",
            "cfunction",
            "typeof self",
            "number",
            "copyright",
            "closure library",
            "xdfunction",
            "cdfunction",
            "ddfunction",
            "bded",
            "kefunction",
            "reduceright",
            "gj9pcw0f6jv",
            "regexp",
            "r420",
            "uint8array",
            "typeof d",
            "void"
          ],
          "references": [
            "https://www.googletagmanager.com/gtag/js?id=G-J9PCW0F6JV",
            "https://www.googletagmanager.com/gtag/js?id=UA-185991747-1",
            "https://insurancerateusa.com/polyfill-036b4a134d8725752ba0.js",
            "xfe-URL-insurancerateusa.com-stix2-2.1-export.json",
            "https://insurancerateusa.com/app-74647f151b541f3098c2.js",
            "https://insurancerateusa.com/bfcc7b67-0b189ba6da3fc3ae8b88.js",
            "https://insurancerateusa.com/94297995-69529ad7536f090aa776.js",
            "https://insurancerateusa.com/3bea8d40-8926f4790c0b3689a361.js",
            "https://insurancerateusa.com/framework-19eddc0d879a49dfe606.js",
            "https://insurancerateusa.com/webpack-runtime-f014a3267add02a94afb.js",
            "https://connect.facebook.net/signals/config/3689470801106673?v=2.9.57&r=stable"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 615,
            "URL": 2246,
            "FileHash-SHA256": 823,
            "domain": 717,
            "CVE": 1,
            "email": 4,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 1
          },
          "indicator_count": 4412,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 70,
          "modified_text": "1425 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "628d21a4558f3ccf49c07931",
          "name": "abuse.ch",
          "description": "Looking for wizard spider. Some domains have .ru and .su (Soviet Union)",
          "modified": "2022-05-24T18:19:16.027000",
          "created": "2022-05-24T18:19:16.027000",
          "tags": [
            "twitter follow",
            "button follow",
            "reduceright",
            "number",
            "string",
            "regexp",
            "error",
            "f420",
            "gmzsj4f05dr",
            "copyright",
            "deviceandgeo",
            "googlesignals",
            "json",
            "date",
            "void",
            "sxa0",
            "typeerror",
            "cbfunction",
            "deferred",
            "closure library",
            "b1342177279",
            "this",
            "infinity",
            "iframe",
            "trident",
            "show",
            "typeof e",
            "version",
            "hidden",
            "bootstrap",
            "click",
            "javascript",
            "clickdataapi",
            "collapse",
            "typeof t",
            "class",
            "attr",
            "pseudo",
            "child",
            "function",
            "typeof module",
            "button",
            "tridentmsieedge",
            "linux",
            "twttr",
            "area",
            "false",
            "twitter",
            "blank",
            "gvjsj",
            "gvjsyt",
            "license",
            "small batch",
            "apache license",
            "unless",
            "as is",
            "basis",
            "without",
            "warranties or",
            "null",
            "node",
            "dan vanderkam",
            "dygraph",
            "gc",
            "gvjs8s",
            "mmm dd",
            "infinity0",
            "gvjs6s",
            "mmm d",
            "axis",
            "cell",
            "column",
            "arial",
            "drawingframe",
            "select",
            "textarea",
            "line",
            "inside",
            "gvjsih",
            "rnrn",
            "roboto",
            "body",
            "template",
            "outside",
            "rial",
            "gvjsob",
            "azaz09",
            "array",
            "april",
            "june",
            "august",
            "february",
            "span",
            "android",
            "christ",
            "bbfunction",
            "twitter tweet",
            "font awesome",
            "free",
            "cc by",
            "sil ofl",
            "code",
            "mit license",
            "brands",
            "segoe ui",
            "emoji",
            "helvetica neue",
            "noto",
            "apple color",
            "symbol",
            "noto color",
            "typebutton",
            "sprymedia ltd",
            "datatables",
            "typeof f",
            "without any",
            "warranty",
            "merchantability",
            "fitness",
            "a particular",
            "adata",
            "first",
            "next",
            "typeof",
            "typeof n",
            "hide",
            "focusin",
            "focusout",
            "shown",
            "js foundation",
            "g5gqv3cj17n"
          ],
          "references": [
            "https://www.googletagmanager.com/gtag/js?id=G-5GQV3CJ17N",
            "https://bazaar.abuse.ch/js/jquery-3.5.1.min.js",
            "https://bazaar.abuse.ch/js/bootstrap.min.js",
            "https://bazaar.abuse.ch/js/datatables.min.js",
            "https://bazaar.abuse.ch/css/bootstrap.min.css",
            "https://bazaar.abuse.ch/css/all.min.css",
            "https://platform.twitter.com/js/button.3ccb64e61d4c01fae12cd2b0ed9b2bab.js",
            "https://www.gstatic.com/charts/50/loader.js",
            "https://www.gstatic.com/charts/50/js/jsapi_compiled_default_module.js",
            "https://www.gstatic.com/charts/50/js/jsapi_compiled_ui_module.js",
            "https://www.gstatic.com/charts/50/js/jsapi_compiled_graphics_module.js",
            "https://www.gstatic.com/charts/50/js/jsapi_compiled_corechart_module.js",
            "https://www.gstatic.com/charts/50/js/jsapi_compiled_fw_module.js",
            "https://www.gstatic.com/charts/50/third_party/dygraphs/dygraph-tickers-combined.js",
            "https://www.gstatic.com/charts/50/third_party/webfontloader/webfont.js",
            "https://www.gstatic.com/charts/50/js/jsapi_compiled_line_module.js",
            "https://www.gstatic.com/charts/50/js/jsapi_compiled_bar_module.js",
            "https://abuse.ch/js/twitter_widget.js",
            "https://abuse.ch/js/jquery-3.6.0.min.js",
            "https://abuse.ch/js/bootstrap.min.js",
            "https://abuse.ch/js/google-charts.js",
            "https://www.googletagmanager.com/gtag/js?id=G-MZSJ4F05DR",
            "https://platform.twitter.com/widgets/follow_button.f8c8d971a6ac545cf416e3c1ad4bbc65.en.html#dnt=false&id=twitter-widget-0&lang=en&screen_name=abuse_ch&show_count=false&show_screen_name=true&size=l&time=1653415551742"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Gc",
              "display_name": "Gc",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 560,
            "URL": 1639,
            "FileHash-SHA256": 223,
            "domain": 383,
            "email": 1,
            "FileHash-MD5": 2
          },
          "indicator_count": 2808,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 73,
          "modified_text": "1426 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62630d254b29696c094f7cb8",
          "name": "bgp.net malicious hosting",
          "description": "",
          "modified": "2022-05-22T00:01:01.264000",
          "created": "2022-04-22T20:16:37.675000",
          "tags": [
            "2000px",
            "20px",
            "90deg",
            "10px",
            "30px",
            "3deg",
            "10deg",
            "5deg",
            "1deg",
            "30deg",
            "datasecret",
            "typeof",
            "wpbakery page",
            "copyright",
            "michael m",
            "wpbakery",
            "license",
            "jscs",
            "index1",
            "prev",
            "parallaximage",
            "error",
            "yfunction",
            "bfunction",
            "date",
            "nulld",
            "dfunction",
            "ffunction",
            "efunction",
            "nullb",
            "typeof console",
            "nonce",
            "script",
            "please do",
            "not copy",
            "and paste",
            "this code",
            "cgrecaptchacfg",
            "ngrecaptcha",
            "recaptchaapi",
            "render",
            "boolean",
            "modernizr",
            "custom build",
            "build",
            "afunction",
            "cfunction",
            "typeerror",
            "object",
            "documenttouch",
            "websocket",
            "regexp",
            "pseudo",
            "child",
            "typeof b",
            "array",
            "sufeffxa0",
            "class",
            "attr",
            "null",
            "void",
            "function",
            "width",
            "body",
            "accept",
            "udc66udc67",
            "ud83d",
            "ufe0f",
            "ud83e",
            "udc68udc69",
            "image",
            "udfcbudfcc",
            "u2640u2642",
            "09af",
            "source",
            "ud83dudc6cud83c"
          ],
          "references": [
            "xfe-URL-bgp.net-stix2-2.1-export.json",
            "https://bgp.net/wp-includes/js/wp-emoji-release.min.js?ver=5.5.9",
            "https://bgp.net/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp",
            "https://bgp.net/wp-content/themes/multihost/framework/js/public/modernizr.min.js?ver=5.5.9",
            "https://www.google.com/recaptcha/api.js?render=6LfPdckUAAAAAMPH_0crY_k4tdvDN7GVgKtWUyjU&ver=3.0",
            "https://bgp.net/wp-content/themes/multihost/framework/js/public/pace.min.js?ver=5.5.9",
            "https://bgp.net/wp-content/plugins/js_composer/assets/js/dist/js_composer_front.min.js?ver=6.0.3",
            "https://bgp.net/wp-includes/js/wp-embed.min.js?ver=5.5.9",
            "https://bgp.net/wp-content/plugins/designthemes-core-features/shortcodes/css/animations.css?ver=5.5.9"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 417,
            "URL": 1208,
            "CVE": 1,
            "domain": 267,
            "FileHash-SHA256": 173
          },
          "indicator_count": 2066,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1428 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "626224efc28c918470fa07ed",
          "name": "inflect.com - malware",
          "description": "var e,t, r.o, is a new type of code, which can be used to build a website, but can't do so without a special code.. and the following:",
          "modified": "2022-05-21T00:03:44.725000",
          "created": "2022-04-22T03:45:51.681000",
          "tags": [
            "object",
            "typeof symbol",
            "typeerror",
            "html",
            "body",
            "software",
            "pops",
            "width",
            "error",
            "provider",
            "null",
            "code",
            "trident",
            "trcomponent",
            "typeof t",
            "referenceerror",
            "component",
            "date",
            "array",
            "header",
            "contact",
            "backspace",
            "next",
            "footer",
            "copy",
            "february",
            "april",
            "june",
            "august",
            "open",
            "project",
            "this",
            "unknown",
            "heapdeps",
            "number",
            "hki3",
            "ogr1",
            "function",
            "regexp",
            "typeof self",
            "typeof",
            "facebook pixel",
            "pixel code",
            "symbol",
            "iterator",
            "constantvalue",
            "globalvariable",
            "facebook",
            "string",
            "boolean",
            "service",
            "phonenumber",
            "meta",
            "typeof e",
            "sesprops",
            "nthis",
            "href",
            "image",
            "input",
            "class",
            "logger",
            "download",
            "target",
            "form",
            "push"
          ],
          "references": [
            "xfe-URL-inflect.com-stix2-2.1-export.json",
            "https://cdn.heapanalytics.com/js/heap-2001511295.js",
            "https://connect.facebook.net/signals/config/534474930374151?v=2.9.57&r=stable",
            "https://connect.facebook.net/en_US/fbevents.js",
            "https://cdn.segment.com/next-integrations/integrations/vendor/commons.54701049fd6fb8497e9e.js.gz",
            "https://cdn.segment.com/next-integrations/integrations/heap/2.1.2/heap.dynamic.js.gz",
            "https://storage.googleapis.com/inflect-frontend-assets/adb460de2098568d4c3580de1fde2f6690bcbd04/_next/static/s0TytVz2d0zNgb~bjg~~D/pages/search.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrComponent",
              "display_name": "TrComponent",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1064,
            "FileHash-SHA256": 222,
            "hostname": 162,
            "domain": 294
          },
          "indicator_count": 1742,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1429 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6261fd6a8d527fa569351e63",
          "name": "Malware hosting - unrealservers.net & heymman.com",
          "description": "function S.name, a.com, has been added to the end of a page to make sure it does not end up in an unauthorised place. and it will not get any more.",
          "modified": "2022-05-21T00:03:44.725000",
          "created": "2022-04-22T00:57:14.125000",
          "tags": [
            "e2f0fc",
            "fd7a07",
            "f0482b",
            "gradienttype0",
            "a5bcce",
            "helvetica",
            "negative",
            "arial",
            "bcd3e4",
            "style sheet",
            "nonce",
            "script",
            "please do",
            "not copy",
            "and paste",
            "this code",
            "cgrecaptchacfg",
            "ngrecaptcha",
            "recaptchaapi",
            "render",
            "onload",
            "select",
            "error",
            "strong",
            "uint8array",
            "string",
            "null",
            "number",
            "function",
            "input",
            "array",
            "iframe",
            "date",
            "android",
            "verify",
            "stop",
            "this",
            "span",
            "enterprise",
            "click",
            "widget",
            "window",
            "form",
            "generator",
            "reload",
            "void",
            "dd2d2f",
            "e8e8e8",
            "d8d8d8",
            "fcfcfc",
            "e5e5e5",
            "lucida",
            "unicode",
            "lucida grande",
            "f9f9f9",
            "footer",
            "unavailable",
            "ngsanitize",
            "order now",
            "invalid",
            "snippet",
            "month",
            "hours",
            "fullyear",
            "regexp",
            "eeee",
            "mmmm d",
            "mena",
            "christ"
          ],
          "references": [
            "xfe-URL-heymman.com-stix2-2.1-export.json",
            "https://ajax.googleapis.com/ajax/libs/angularjs/1.4.8/angular.min.js",
            "https://ajax.googleapis.com/ajax/libs/angularjs/1.4.2/angular-sanitize.js",
            "https://www.heymman.com/script.js",
            "https://www.heymman.com/style/main.css",
            "https://www.gstatic.com/recaptcha/releases/QENb_qRrX0-mQMyENQjD6Fuj/recaptcha__en.js",
            "https://www.google.com/recaptcha/api.js",
            "https://unrealservers.net/master.css",
            "xfe-URL-Ndevix.com-stix2-2.1-export.json",
            "xfe-URL-Misk.com-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 427,
            "URL": 1183,
            "FileHash-SHA256": 162,
            "domain": 441,
            "email": 4
          },
          "indicator_count": 2217,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1429 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62616627ee302d24b23523c3",
          "name": "enom.com & 4vendeta.com - ReduceRight malware hosting/creation",
          "description": "New RegExp(M) is a new type, and it will change any of the elements to the same type if you want to add them to your HTML page or add a third element.",
          "modified": "2022-05-21T00:03:44.725000",
          "created": "2022-04-21T14:11:51.629000",
          "tags": [
            "tbody",
            "span",
            "thead",
            "tfoot",
            "multiple",
            "type",
            "href",
            "input",
            "halflings",
            "gradienttype1",
            "twitter",
            "false",
            "fontface",
            "fatface",
            "woff2",
            "u0259",
            "u1e001eff",
            "u2020",
            "u20a020ab",
            "u20ad20cf",
            "u2113",
            "u2c602c7f",
            "typesubmit",
            "function",
            "typeof c",
            "formdata",
            "this",
            "typeof define",
            "null",
            "typeof f",
            "object",
            "boolean",
            "typeof module",
            "error",
            "reflect",
            "math",
            "regexp",
            "number",
            "array",
            "typeerror",
            "string",
            "symbol",
            "typeof e",
            "typeof t",
            "class",
            "attr",
            "pseudo",
            "child",
            "js foundation",
            "account",
            "open",
            "navitem",
            "text",
            "mainnav",
            "click",
            "blank",
            "copyright",
            "u0027",
            "value",
            "body",
            "firefox",
            "enum",
            "html",
            "msie",
            "applewebkit",
            "traceconsole",
            "form",
            "iframe",
            "legend",
            "nonmsdombrowser",
            "callbackindex",
            "callbackframeid",
            "eventtarget",
            "eventargument",
            "validation",
            "explorer",
            "target",
            "plugin",
            "bootstrap",
            "https",
            "conflict",
            "focus",
            "next",
            "trigger",
            "checkbox",
            "delta",
            "scroll",
            "sourceid",
            "date",
            "sessiontoken",
            "sessionexpires",
            "void",
            "rangeerror",
            "utf16",
            "illegal input",
            "global",
            "chrome",
            "opredge",
            "opera",
            "safari",
            "version",
            "sxa0",
            "browser",
            "typeof require",
            "dom node",
            "typeof d",
            "component",
            "typeof h",
            "bubble",
            "reduceright",
            "script",
            "typeof n",
            "jhnew ia",
            "gtm5sn6brv",
            "path",
            "host",
            "trackpageview",
            "gw8yd4p2eny",
            "select",
            "strong",
            "uint8array",
            "android",
            "verify",
            "stop",
            "enterprise",
            "widget",
            "window",
            "generator",
            "reload",
            "r300",
            "caca",
            "closure library",
            "xdfunction",
            "adfunction",
            "cdfunction",
            "ddfunction",
            "bded",
            "please",
            "typeemail",
            "email",
            "jarallaxinner",
            "webkit",
            "property",
            "transform",
            "trident",
            "edge",
            "ipodi",
            "ipadi",
            "androidi",
            "blackberryi",
            "windows phonei",
            "xfunction",
            "pfunction",
            "wfunction",
            "show navigation",
            "mjquery",
            "typeof",
            "defaulttype",
            "hidden",
            "show",
            "shown",
            "startr",
            "endr",
            "federico zivolo",
            "distributed",
            "mit license",
            "statict",
            "flip"
          ],
          "references": [
            "xfe-IP-78.142.35.163-stix2-2.1-export.json",
            "xfe-URL-Enom.com-stix2-2.1-export.json",
            "xfe-URL-4vendeta.com-stix2-2.1-export.json",
            "https://4vendeta.com/assets/js/jquery.min.js",
            "https://4vendeta.com/assets/js/popper.min.js",
            "https://4vendeta.com/assets/js/bootstrap.min.js",
            "https://4vendeta.com/assets/js/meanmenu.min.js",
            "https://4vendeta.com/assets/js/parallax.min.js",
            "https://4vendeta.com/assets/js/ajaxchimp.min.js",
            "https://www.googletagmanager.com/gtag/js?id=UA-92521958-1",
            "https://www.googletagmanager.com/gtag/js?id=G-W8YD4P2ENY&l=dataLayer&cx=c",
            "https://www.gstatic.com/recaptcha/releases/QENb_qRrX0-mQMyENQjD6Fuj/recaptcha__en.js",
            "https://www.googletagmanager.com/gtm.js?id=GTM-5SN6BRV",
            "https://static.zdassets.com/ekr/snippet.js?key=7342b695-e394-4f25-89a0-da9d262a48da",
            "https://cp.enom.com/js/jquery-3.5.1.min.js",
            "https://cp.enom.com/responsive/_js/knockout-3.3.0.min.js",
            "https://cp.enom.com/js/global-functions.js",
            "https://cp.enom.com/js/punycode.min.js",
            "https://cp.enom.com/js/jquery.disableonsubmit.min.js",
            "https://cp.enom.com/js/jquery.cookie.min.js",
            "https://cp.enom.com/js/cart.minicart.min.js",
            "https://cp.enom.com/js/openWin.min.js",
            "https://cp.enom.com/js/jquery.jgrowl.min.js",
            "https://cp.enom.com/scripts/Session.min.js",
            "https://cp.enom.com/responsive/_js/init.min.js",
            "https://cp.enom.com/responsive/_js/bootstrap.js",
            "https://cp.enom.com/WebResource.axd?d=6rtXrDcnyiYD-9dFDFOkxTRcPVSrAN8fR-cHKzNqPTy7bHic-2LLMHDnielTzEI-sd1KplHrRBudcZJOm0-lxubO7k41&t=637453818340000000",
            "https://cp.enom.com/ScriptResource.axd?d=fVjQa-0YyNqO6JmV36bw6eBJdTjE2YSdtcunOWcKYcBNn73MOJKQA_rxX3YMhcxLTgyDsGTKy0p9NEPvxzpqEpBKtm3GLb2GgI1LFYMC0Xr2lh71ZCttzgNGFnc5mS_Fc_DY5UH0M19Mr958h1jvmK4kzAM1&t=363be08",
            "https://cp.enom.com/ScriptResource.axd?d=lDjPFfAIWSrEAVNgTHTrISQmLEFmHAaibvNJQuGRZDbWpGFPLrFwaGVpjCUsI6HkqzbpwmaAa0cJCrq8f0eqEvIsQM8lvN_dVYVyESnohON4oTvdMZHDmwG83uJA4m2oqykP8TTTSIeV2oaNrlIXaX8cOxC5Cv6aGmjpdB2u-227wdn30&t=363be08",
            "https://cdn.optimizely.com/js/26241557.js",
            "https://cp.enom.com/verisign-seal.htm",
            "https://cp.enom.com/global/TopMenu.ascx.js",
            "http://alp-vision.com/wp-includes/js/jquery/jquery.min.js?ver=3.5.1",
            "http://alp-vision.com/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=7.4.4",
            "http://alp-vision.com/wp-content/cache/autoptimize/js/autoptimize_78b4f9b28399aa3c8a405e45931ad058.js",
            "http://alp-vision.com/wp-includes/css/dist/block-library/style.min.css?ver=5.7.6",
            "http://fonts.googleapis.com/css?family=Abril+Fatface%3Aregular&subset=latin%2Ccyrillic&ver=5.7.6",
            "http://alp-vision.com/wp-content/themes/alp-vision/css/bootstrap.css?ver=1.0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2989,
            "hostname": 1208,
            "domain": 634,
            "FileHash-SHA256": 302
          },
          "indicator_count": 5133,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1429 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "625f86049cb1c945f7701075",
          "name": "Hetzner - malware hosting",
          "description": "function ar(aw,av,au,at) is a new type of tracking, which uses the same code as the Matomo tracking tool and its built-up functionality to track where a tracker is located.",
          "modified": "2022-05-20T00:01:19.453000",
          "created": "2022-04-20T04:03:16.817000",
          "tags": [
            "param",
            "locale",
            "return",
            "stripped",
            "regexp",
            "html",
            "lang",
            "lightweight",
            "dual",
            "javascript i18n",
            "entity",
            "body",
            "meta",
            "typeradio",
            "ttav",
            "width",
            "ttaelt",
            "shadowwidth",
            "tagtotip",
            "html element",
            "shadow",
            "closebtncolors",
            "fadein",
            "null",
            "sticky",
            "close",
            "false",
            "path",
            "config",
            "span",
            "iframe",
            "kill",
            "inside",
            "first",
            "typetext",
            "typepassword",
            "input",
            "typeof define",
            "typeof module",
            "html tags",
            "px20trnf",
            "dom element",
            "date",
            "this",
            "typeof e",
            "function",
            "left",
            "bottom",
            "nullt",
            "right",
            "next",
            "february",
            "april",
            "june",
            "august",
            "atom",
            "cookie",
            "back",
            "bounce",
            "typeof t",
            "class",
            "attr",
            "pseudo",
            "child",
            "js foundation",
            "error",
            "captcha",
            "access site",
            "click",
            "strong",
            "ddos",
            "hetzner online",
            "gmbh element",
            "lztextlink",
            "script",
            "lzrscr",
            "scrb64d",
            "livezilladata",
            "ovlcwm",
            "activedocument",
            "lzsds",
            "lzsde",
            "lzsdeg",
            "cant load",
            "gv1023",
            "typecheckbox",
            "5deg",
            "20deg",
            "45deg",
            "2000px00",
            "2000px0",
            "10px00",
            "60px0",
            "mintime",
            "await",
            "number",
            "typeof n",
            "typeof symbol",
            "cookieconsent",
            "showcookiemodal",
            "cookie banner",
            "agree",
            "agreed",
            "expiresthu",
            "anchorregex",
            "typeerror",
            "swiper",
            "hammer",
            "bnm",
            "software",
            "azaz",
            "form",
            "void",
            "zert",
            "accept",
            "android",
            "trace",
            "import",
            "string",
            "please",
            "blob",
            "matomo",
            "post",
            "javascript",
            "link",
            "license"
          ],
          "references": [
            "xfe-IP-136.243.64.87-stix2-2.1-export.json",
            "https://matomo.hetzner.com/matomo.js",
            "xfe-URL-matomo.hetzner.com-stix2-2.1-export.json",
            "https:///livesupport.hetzner.de/resource.php?t=js&1=jsglobal.min.js&2=jsbox.min.js&3=jstrack.min.js&v=ahgzixd7&4=jsextern.min.js",
            "https://livesupport.hetzner.de/server.php?rqst=track&output=jcrpt&group=Produktberatung&hg=Pw__&hcgs=MQ__&htgs=MQ__&ovltwo=MQ__&ovlv=djI_&ovlc=MQ__&esc=IzU4NTg1YQ__&epc=I0JFMTUyRA__&ovlts=MA__&ovlmr=MTAw&ovlmb=MjY_&hfk=MQ__&ovloo=MQ__&hots=MQ__&hott=MQ__&nse=0.615520170244701",
            "https://livesupport.hetzner.de/script.php?id=eec8dcd79d6fdf905136b99875c1d599",
            "https://accounts.hetzner.com/login",
            "https://accounts.hetzner.com/build/runtime.188fa053.js",
            "https://accounts.hetzner.com/build/755.5a8586e9.js",
            "https://accounts.hetzner.com/build/app.dc073715.js",
            "https://accounts.hetzner.com/build/802.3a7546ef.js",
            "https://konsoleh.your-server.de/templates/ui-default/de/javascripts/jquery/jquery.js",
            "https://konsoleh.your-server.de/templates/ui-default/de/javascripts/jquery/jquery-migrate.js",
            "https://konsoleh.your-server.de/templates/ui-default/de/javascripts/jquery/ui/jquery-ui.js",
            "https://konsoleh.your-server.de/templates/ui-default/de/styles/login.css.php",
            "https://konsoleh.your-server.de/templates/ui-default/de/javascripts/wz_tooltip.js",
            "xfe-URL-livesupport.hetzner.de-stix2-2.1-export.json",
            "xfe-URL-konsoleh.your-server.de-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ActiveDocument",
              "display_name": "ActiveDocument",
              "target": null
            },
            {
              "id": "OVLCWM",
              "display_name": "OVLCWM",
              "target": null
            },
            {
              "id": "Hammer",
              "display_name": "Hammer",
              "target": null
            },
            {
              "id": "BNM",
              "display_name": "BNM",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2308,
            "hostname": 949,
            "FileHash-SHA256": 125,
            "domain": 372,
            "FileHash-SHA1": 3,
            "FileHash-MD5": 256
          },
          "indicator_count": 4013,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1430 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "625f492a0581b2eb202e47c9",
          "name": "Malware hosting - hostrocket.com",
          "description": "ChunkLoadError, a new type of error, failed to load a chunk of JavaScript, according to the web browser operator, E.noconflict.com, as well as the website itself.",
          "modified": "2022-05-19T00:00:49.028000",
          "created": "2022-04-19T23:43:38.539000",
          "tags": [
            "jxuiwidget",
            "null",
            "function",
            "jxuihtmldiv",
            "date",
            "jxuilabel",
            "zendesk chat",
            "regexp",
            "api update",
            "jxuihtmla",
            "window",
            "chat",
            "void",
            "error",
            "loader",
            "back",
            "click",
            "close",
            "agent",
            "hello",
            "form",
            "banned",
            "cookie",
            "small",
            "legacy",
            "direct",
            "colorbox core",
            "style",
            "user style",
            "colorbox",
            "html",
            "6deg",
            "e5e5e5",
            "dbdbdb",
            "d2d2d2",
            "eaedef",
            "michael farrell",
            "home",
            "helvetica",
            "ssd shared",
            "page",
            "formnum",
            "hidden",
            "current",
            "hostrocket",
            "dotblock",
            "fast",
            "href",
            "price slider",
            "tooltip",
            "dotblock popup",
            "callback",
            "rect",
            "cycle plugin",
            "number",
            "auto",
            "shuffle",
            "manual",
            "roll",
            "speed",
            "stop",
            "false",
            "first",
            "look",
            "copyright",
            "gpl version",
            "http",
            "document",
            "ui effects",
            "width",
            "left",
            "bottom",
            "this",
            "atom",
            "html id",
            "price",
            "timer",
            "value",
            "processor",
            "example",
            "storage",
            "string",
            "class",
            "thecookie",
            "create",
            "thevalue",
            "param",
            "type",
            "pluginscookie",
            "author",
            "jquery",
            "u00a0",
            "option",
            "body",
            "optgroup",
            "multiple",
            "selectboxhover",
            "selectbox",
            "label",
            "control",
            "slideshow",
            "jack moore",
            "mit license",
            "overlay",
            "wrapper",
            "content",
            "loadedcontent",
            "loadingoverlay",
            "next",
            "iframe",
            "array",
            "attr",
            "tools",
            "ui library",
            "no copyrights",
            "or licenses",
            "like",
            "media",
            "john resig",
            "dual",
            "gtmkw8b5l",
            "classes",
            "host",
            "path",
            "element",
            "trackpageview",
            "typeerror",
            "typeof symbol",
            "typeof e",
            "typeof t",
            "referenceerror",
            "promise",
            "script",
            "boolean",
            "typeof n"
          ],
          "references": [
            "xfe-URL-hostrocket.com-stix2-2.1-export 2.json",
            "https://www.googletagmanager.com/gtm.js?id=GTM-KW8B5L",
            "https://www.hostrocket.com/js/jquery-1.6.1.min.js",
            "https://www.hostrocket.com/js/jquery.tools.min.js",
            "https://www.hostrocket.com/js/jquery.colorbox-min.js",
            "https://www.hostrocket.com/js/jquery.selectBox.min.js",
            "https://www.hostrocket.com/js/jquery.cookie.js",
            "https://www.hostrocket.com/js/jquery.price_slider.js",
            "https://www.hostrocket.com/js/jquery-ui-1.8.13.custom.min.js",
            "https://www.hostrocket.com/js/jquery.cycle.all.js",
            "https://www.hostrocket.com/js/jquery.behavior.js",
            "https://www.hostrocket.com/contact-files/contact-form.js",
            "https://www.hostrocket.com/css/style.css",
            "https://www.hostrocket.com/css/colorbox.css",
            "https://www.hostrocket.com/css/style-nophone.css",
            "https://v2.zopim.com/bin/v/widget_v2.329.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 963,
            "email": 3,
            "domain": 412,
            "URL": 2338,
            "FileHash-SHA256": 232,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 3950,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1431 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "625f2b6a1f2c9d5631d261d5",
          "name": "Choopa.com - vultr",
          "description": "New RegExp(M) is a new type, and it will change any of the elements to the same type if you want to add them to your HTML page or add a third element.",
          "modified": "2022-05-19T00:00:49.028000",
          "created": "2022-04-19T21:36:42.286000",
          "tags": [
            "regexp",
            "typeof e",
            "typeof t",
            "function",
            "width",
            "error",
            "object",
            "pseudo",
            "child",
            "form",
            "class",
            "null",
            "date",
            "this",
            "void",
            "accept",
            "680876936",
            "389564586",
            "17606105819",
            "1044525330",
            "176418897",
            "121200080426",
            "1473231341",
            "45705983",
            "71770035416",
            "1958414417",
            "copyright",
            "closure library",
            "trunc",
            "msie",
            "tagpath",
            "fbcd",
            "body",
            "html",
            "gettarget",
            "571256413046247",
            "prop",
            "click",
            "typeof l",
            "json",
            "array",
            "string",
            "8760",
            "image",
            "adveid",
            "typeof c",
            "typeerror",
            "typeof",
            "facebook pixel",
            "pixel code",
            "symbol",
            "iterator",
            "constantvalue",
            "globalvariable",
            "facebook",
            "boolean",
            "service",
            "phonenumber",
            "meta",
            "invalid uuid",
            "uint8array",
            "nullu",
            "1099511627776",
            "t4294967296",
            "typeof symbol",
            "customevent",
            "09af",
            "ver0",
            "tag0",
            "extdata0",
            "ua ch",
            "invalid",
            "reduceright",
            "number",
            "gk6536fhn4d",
            "r300",
            "typeof d",
            "path",
            "caca",
            "addtocart",
            "signup",
            "addtowishlist",
            "lead",
            "custom",
            "typeof require",
            "sha256",
            "viewcontent",
            "search",
            "pfunction",
            "contenttype",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction",
            "functional",
            "member",
            "hnew regexp",
            "qfunction",
            "adview",
            "addbillinginfo",
            "addtolist",
            "contact",
            "download",
            "install",
            "pnull",
            "style",
            "ctnull",
            "post",
            "uint32array",
            "fanull",
            "license",
            "ynull",
            "config",
            "iframe",
            "javascript",
            "code",
            "hoverpopup",
            "please",
            "output",
            "popupmodal",
            "country",
            "checkall",
            "invcid",
            "base64",
            "score",
            "attr",
            "js foundation",
            "typeof module",
            "ffffff",
            "acce22",
            "f0f0f0",
            "dadada",
            "typesubmit",
            "typebutton",
            "f4f4f4",
            "trebuchet ms",
            "tahoma",
            "woff",
            "footer",
            "segoe ui",
            "emoji",
            "tbody",
            "roboto",
            "helvetica neue",
            "arial",
            "apple color",
            "noto color",
            "type",
            "twitter",
            "xava",
            "gbva",
            "hbva",
            "ibva",
            "lcva",
            "cdva",
            "oeva",
            "peva",
            "onclickpopup",
            "discountmonthly",
            "grayoverlay",
            "popup into",
            "popup var",
            "center",
            "price",
            "first",
            "classname",
            "eventkey",
            "event",
            "selector",
            "name",
            "datakey",
            "version",
            "default",
            "shown",
            "target",
            "close",
            "false",
            "trigger",
            "jquery",
            "delta",
            "open",
            "arrow",
            "protected",
            "leave",
            "dataspy",
            "typeof define",
            "eventlistener"
          ],
          "references": [
            "xfe-URL-Choopa.com-stix2-2.1-export.json",
            "https://www.choopa.com/commonimages/jquery-3.5.1.min.js",
            "https://www.choopa.com/_js/dragscroll.js",
            "https://www.choopa.com/_js/bootstrap.js",
            "https://www.choopa.com/_js/global.js?v=209",
            "https://ssl.google-analytics.com/ga.js",
            "https://www.choopa.com/css/bootstrap.css",
            "https://www.choopa.com/css/global.css?v=209",
            "https://my.choopa.com/js/jquery-3.5.1.min.js",
            "https://my.choopa.com/js/desktop.js?v=41",
            "https://my.choopa.com/js/global.js?v=41",
            "xfe-URL-Vultr.com-stix2-2.1-export.json",
            "https://www.clarity.ms/eus2/s/0.6.34/clarity.js",
            "https://snap.licdn.com/li.lms-analytics/insight.min.js",
            "https://www.google-analytics.com/analytics.js",
            "https://www.redditstatic.com/ads/pixel.js",
            "https://www.googletagmanager.com/gtag/js?id=G-K6536FHN4D&l=dataLayer&cx=c",
            "https://bat.bing.com/bat.js",
            "https://static.ads-twitter.com/uwt.js",
            "https://connect.facebook.net/signals/config/571256413046247?v=2.9.57&r=stable",
            "https://connect.facebook.net/signals/config/438248060937995?v=2.9.57&r=stable",
            "https://connect.facebook.net/signals/config/828098694004178?v=2.9.57&r=stable",
            "https://connect.facebook.net/en_US/fbevents.js",
            "https://js.partnerstack.com/v1/",
            "https://bat.bing.com/p/action/17528422.js",
            "https://s.adroll.com/j/roundtrip.js",
            "https://s.adroll.com/j/exp/DUKHAKVYIJASHDUBG4V7RE/index.js",
            "https://s.adroll.com/j/sendrolling.js",
            "https://d.adroll.com/pixel/DUKHAKVYIJASHDUBG4V7RE/E23RMKDBEFAEXMXLWK3IWO?adroll_fpc=838a57acc6141112b6107bdce5e3fde6-1650403057055&arrfrr=https%3A%2F%2Fwww.vultr.com%2F&pv=70707106758.07146&cookie=&adroll_s_ref=&keyw=",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/858656304/?random=1650403054497&cv=9&fst=1650403054497&num=1&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=3&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.vultr.com%2F&tiba=SSD%20VPS%20Servers%2C%20Cloud%20Servers%20and%20Cloud%20Hosting%20by%20Vultr%20-%20Vultr.com&hn=www.googleadservices.com&rfmt=3&fmt=4"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1241,
            "URL": 3454,
            "domain": 430,
            "FileHash-SHA256": 453
          },
          "indicator_count": 5578,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1431 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "625f112112bb456382bee7c9",
          "name": "Hostgator - whitelisted",
          "description": "Firing Rule, IRF.util.com, is set to go live on the internet after it was triggered by a new rule, but if it is not already in place, it will not load.",
          "modified": "2022-05-19T00:00:49.028000",
          "created": "2022-04-19T19:44:33.964000",
          "tags": [
            "webkitkeyframes",
            "helvetica neue",
            "helvetica",
            "arial",
            "45deg",
            "100vw",
            "typetext",
            "copyright",
            "closure library",
            "affiliatepage",
            "tospage",
            "banner",
            "iab2",
            "acceptall",
            "rejectall",
            "genven",
            "expecting iab",
            "iab tcf",
            "oldcctid",
            "newdomainid",
            "unknown",
            "checkbox",
            "date",
            "component",
            "apptree",
            "hnull",
            "fcee",
            "typeof t",
            "typeerror",
            "qss7",
            "error",
            "promise",
            "hfunction",
            "typeof e",
            "rfc3986",
            "string",
            "array",
            "rfc1738",
            "object",
            "sr1t",
            "typeof symbol",
            "animation",
            "null",
            "rnull",
            "forwardref",
            "typeof n",
            "nullt",
            "cxlc",
            "dptw",
            "dtha",
            "gdzw",
            "gurp",
            "w0b4",
            "kjy9",
            "uigm",
            "ve6h",
            "event",
            "currency",
            "currencysymbol",
            "ucvw",
            "ofunction",
            "ocsf",
            "xfunction",
            "urlsearchparams",
            "open",
            "symbol",
            "nfunction",
            "lfunction",
            "ufunction",
            "typeof window",
            "typeof self",
            "hj",
            "09af",
            "regexp",
            "irmstevent",
            "bad expr",
            "hotjar",
            "email",
            "telefon",
            "survey",
            "meta",
            "cookie",
            "keypress",
            "trident",
            "live",
            "fullscreen",
            "generic",
            "window",
            "widget",
            "ciudad",
            "adore",
            "experiment",
            "mutation",
            "n color",
            "number",
            "customevent",
            "n strictly",
            "hostn host",
            "button",
            "cookie tracking",
            "close",
            "campaign",
            "decision",
            "action",
            "page",
            "controller",
            "must",
            "visitor",
            "groupstart",
            "info",
            "obsolete",
            "false",
            "reduceright",
            "portland",
            "trackevent",
            "query",
            "u003cu003e",
            "trackpageview",
            "code",
            "path",
            "click",
            "derek",
            "void",
            "gsxr89skrrs",
            "r300",
            "uint8array",
            "typeof d",
            "caca",
            "typeof",
            "facebook pixel",
            "pixel code",
            "iterator",
            "constantvalue",
            "globalvariable",
            "facebook",
            "boolean",
            "function",
            "service",
            "phonenumber",
            "ver0",
            "tag0",
            "extdata0",
            "ua ch",
            "invalid",
            "which",
            "thank",
            "hostgator",
            "poll",
            "primary intent",
            "iwe didn",
            "f39c11",
            "team",
            "script",
            "array int8array",
            "caregexp",
            "legacy",
            "irfcd",
            "error setting",
            "irgbd",
            "outer",
            "dynamic tag",
            "variable",
            "rule",
            "expr",
            "inline script"
          ],
          "references": [
            "xfe-URL-hostgator.com-stix2-2.1-export.json",
            "https://a.impactradius-tag.com/foundation-tags-SD382-d393-452e-9c15-ac1e4a6fc6fb1.js",
            "https://d3cxv97fi8q177.cloudfront.net/foundation-A122588-852f-4501-9972-9515a4f53da31.js",
            "https://www.googleadservices.com/pagead/conversion_async.js",
            "https://static.hotjar.com/c/hotjar-23213.js?sv=7",
            "https://bat.bing.com/bat.js",
            "https://connect.facebook.net/signals/config/393095817498804?v=2.9.57&r=stable",
            "https://connect.facebook.net/en_US/fbevents.js",
            "https://www.googletagmanager.com/gtag/js?id=G-SXR89SKRRS&l=dataLayer&cx=c",
            "https://www.googletagmanager.com/gtm.js?id=GTM-PPNLL2",
            "https://cdn3.optimizely.com/js/geo4.js",
            "https://cdn.optimizely.com/js/13477600374.js",
            "https://bat.bing.com/p/action/5797759.js",
            "https://cdn.cookielaw.org/scripttemplates/6.32.0/otBannerSdk.js",
            "https://script.hotjar.com/modules.0076bf93c385ddf0ff58.js",
            "https://a.impactradius-tag.com/mediasource-A122588-852f-4501-9972-9515a4f53da31.js",
            "https://www.hostgator.com/_next/static/runtime/polyfills-31f3ad766330c3157d95.js",
            "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/pages/_app.js",
            "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/pages/index.js",
            "https://www.hostgator.com/_next/static/runtime/webpack-83bd83ab777f80a6c75c.js",
            "https://www.hostgator.com/_next/static/chunks/framework.4fc08a4a599cac03ddf5.js",
            "https://www.hostgator.com/_next/static/chunks/60aafdb66a57b57b76936ce193fee053374e679c.cdd375bd63e4f4a5a41b.js",
            "https://www.hostgator.com/_next/static/runtime/main-a00d7acfcccd82e343f6.js",
            "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/_ssgManifest.js",
            "https://cdn.cookielaw.org/scripttemplates/otSDKStub.js",
            "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/_buildManifest.js",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1071979603/?random=1650396033510&cv=9&fst=1650396033510&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.hostgator.com%2F&tiba=Web%20Hosting%20-%202022%27s%20Best%20Website%20Hosting%20%7C%20HostGator&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
            "https://www.hostgator.com/_next/static/css/1746e01e071caaad90f08af905f64c7649b9fd98_CSS.27b3968e.chunk.css",
            "https://6241250.fls.doubleclick.net/activityi;src=6241250;type=remar0;cat=hg-al0;ord=1;num=152669004837;gtm=2wg4i1;auiddc=30830049.1650396032;u1=prospect;u2=%2F;u5=noConsent-none;~oref=https%3A%2F%2Fwww.hostgator.com%2F",
            "https://vars.hotjar.com/box-4924254a9ce4dc9b959b6e4a9b662d60.html"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Tunisia"
          ],
          "malware_families": [
            {
              "id": "hj",
              "display_name": "hj",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1339,
            "URL": 4622,
            "domain": 1260,
            "FileHash-SHA256": 692,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 1
          },
          "indicator_count": 7917,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 71,
          "modified_text": "1431 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6266f3fed330d1f702c04108",
          "name": "piekids.us/MUiY37 - rushphone.net",
          "description": "it was a secret mineral called \u201cThe New Fat Blocking Code\u2019s secret!",
          "modified": "2022-04-25T19:18:22.610000",
          "created": "2022-04-25T19:18:22.610000",
          "tags": [
            "f72210",
            "f2f2f2",
            "90deg",
            "c0c0c0",
            "ffffff",
            "e3e3e3",
            "45deg",
            "month",
            "b8b8b8",
            "side",
            "date",
            "regexp",
            "error",
            "typeof b",
            "pseudo",
            "child",
            "array",
            "sufeffxa0",
            "class",
            "attr",
            "typeof c",
            "null",
            "typeerror",
            "typeof",
            "facebook pixel",
            "pixel code",
            "symbol",
            "iterator",
            "constantvalue",
            "globalvariable",
            "facebook",
            "string",
            "object",
            "boolean",
            "function",
            "service",
            "phonenumber",
            "meta",
            "k3 spark",
            "keto maxx",
            "fat buring",
            "mineral",
            "emily",
            "solution",
            "new fat",
            "blocking code",
            "university",
            "harvard",
            "code",
            "melissa",
            "crazy",
            "life",
            "april",
            "fast",
            "austin",
            "philadelphia",
            "spin",
            "mcmahon",
            "click"
          ],
          "references": [
            "https://ddailyworkouts.com/tip/?art25=AP25CVA8",
            "https://ddailyworkouts.com/tip/340185964810871",
            "https://ddailyworkouts.com/tip/fbevents.js.download",
            "https://ddailyworkouts.com/tip/jquery.min.js.download",
            "https://ddailyworkouts.com/tip/dr-dtime.js.download",
            "https://ddailyworkouts.com/tip/style.css"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 88,
            "URL": 810,
            "hostname": 250,
            "domain": 87
          },
          "indicator_count": 1235,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1455 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://bazaar.abuse.ch/js/datatables.min.js",
        "GCInputNames.h",
        "capture_resize.js",
        "GCAxisElement.h",
        "IOUSBHost.tbd",
        "ASAuthorizationAppleIDCredential.h",
        "iperlsys.h",
        "https://www.googletagmanager.com/gtm.js?id=GTM-5SN6BRV",
        "sv.h",
        "zaphod32_hash.h",
        "WKNavigationDelegate.h",
        "uudmap.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredential.h",
        "https://www.gstatic.com/charts/50/js/jsapi_compiled_corechart_module.js",
        "ASAuthorizationProvider.h",
        "https://www.hostgator.com/_next/static/runtime/webpack-83bd83ab777f80a6c75c.js",
        "https://tobiasahlin.com/js/portfolio.js",
        "https://www.googletagmanager.com/gtag/js?id=G-MZSJ4F05DR",
        "hv.h",
        "OSBase.h",
        "vm_memtag.h",
        "mg.h",
        "WKScriptMessage.h",
        "GKVoiceChat.h",
        "asm_help.h",
        "vm_map.h",
        "ASAuthorization.h",
        "https://cdn.segment.com/next-integrations/integrations/heap/2.1.2/heap.dynamic.js.gz",
        "intrpvar.h",
        "WKWindowFeatures.h",
        "https://livesupport.hetzner.de/server.php?rqst=track&output=jcrpt&group=Produktberatung&hg=Pw__&hcgs=MQ__&htgs=MQ__&ovltwo=MQ__&ovlv=djI_&ovlc=MQ__&esc=IzU4NTg1YQ__&epc=I0JFMTUyRA__&ovlts=MA__&ovlmr=MTAw&ovlmb=MjY_&hfk=MQ__&ovloo=MQ__&hots=MQ__&hott=MQ__&nse=0.615520170244701",
        "https://www.hostrocket.com/css/style-nophone.css",
        "GCControllerInput.h",
        "https://static.zdassets.com/ekr/snippet.js?key=7342b695-e394-4f25-89a0-da9d262a48da",
        "icmp6.h",
        "GCProductCategories.h",
        "xfe-URL-West.cn-stix2-2.1-export.json",
        "https://www.hostrocket.com/js/jquery.colorbox-min.js",
        "https://www.hostgator.com/_next/static/runtime/polyfills-31f3ad766330c3157d95.js",
        "oalStaticBufferExtension.h",
        "GKPeerPickerController.h",
        "ASAuthorizationProviderExtensionAuthorizationRequest.h",
        "GCControllerTouchpad.h",
        "https://www.hostrocket.com/js/jquery-1.6.1.min.js",
        "OSByteOrder.h",
        "http://m.west.cn/jscripts/baidutj/hm.js",
        "https://www.hostgator.com/_next/static/runtime/main-a00d7acfcccd82e343f6.js",
        "python3-embed.pc",
        "xfe-URL-hostgator.com-stix2-2.1-export.json",
        "WKURLSchemeTask.h",
        "xfe-URL-Psychz.net-stix2-2.1-export.json",
        "machine_routines.h",
        "https://www.gstatic.com/charts/50/js/jsapi_compiled_fw_module.js",
        "_limits.h",
        "ASCredentialIdentityStore.h",
        "_mcontext.h",
        "libperl.tbd",
        "GKPlayer.h",
        "IntentsUI.h",
        "https://serverhub.com/modules/system/assets/js/framework.js",
        "AirPlayReceiver.tbd",
        "ASAuthorizationPublicKeyCredentialLargeBlobAssertionInput.h",
        "ASCredentialServiceIdentifier.h",
        "lz4_assembly_select.h",
        "INUIAddVoiceShortcutButton.h",
        "stddef.h",
        "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialRegistrationRequest.h",
        "GKSession.h",
        "GKGameSessionEventListener.h",
        "https://snap.licdn.com/li.lms-analytics/insight.min.js",
        "krpc.h",
        "GCDevicePhysicalInputState.h",
        "https://www.gstatic.com/firebasejs/8.1.2/firebase-app.js",
        "WKWebsiteDataStore.h",
        "https://widget.intercom.io/widget/rbc8ok9w",
        "GCRacingWheel.h",
        "GKCloudPlayer.h",
        "https://bgp.net/wp-content/plugins/js_composer/assets/js/dist/js_composer_front.min.js?ver=6.0.3",
        "https://cp.enom.com/js/jquery-3.5.1.min.js",
        "https://bat.bing.com/p/action/5797759.js",
        "GKLocalPlayer.h",
        "https://cp.enom.com/js/global-functions.js",
        "igmp_var.h",
        "https://www.ascio.com/wp-content/themes/Ascio/dist/js/front.js?ver=1648137806",
        "GCDeviceLight.h",
        "https://portal.ascio.com/7.602be6705ce7b901b821.js",
        "https://cdn.segment.com/next-integrations/integrations/vendor/commons.54701049fd6fb8497e9e.js.gz",
        "WKNavigationAction.h",
        "lz4_constants.h",
        "https://bazaar.abuse.ch/css/all.min.css",
        "https://4vendeta.com/assets/js/meanmenu.min.js",
        "https://www.googletagmanager.com/gtm.js?id=GTM-PPNLL2",
        "GCMicroGamepadSnapshot.h",
        "https://www.ascio.com/wp-includes/js/dist/hooks.min.js?ver=1e58c8c5a32b2e97491080c5b10dc71c",
        "IOUSBHostCIPortStateMachine.h",
        "MultipeerConnectivity.apinotes",
        "embed.h",
        "https://a.impactradius-tag.com/foundation-tags-SD382-d393-452e-9c15-ac1e4a6fc6fb1.js",
        "arm_features.inc",
        "nlsSDK600.bundle.min.js",
        "version.h",
        "https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile",
        "https://www.googletagmanager.com/gtag/js?id=UA-59480575-2",
        "math.h",
        "xfe-URL-Cnzz.com-stix2-2.1-export.json",
        "stdarg.h",
        "audit_ioctl.h",
        "WKFrameInfo.h",
        "https://cdn.cookielaw.org/scripttemplates/otSDKStub.js",
        "vm_far.h",
        "AFKUser.tbd",
        "WKBackForwardListItem.h",
        "nfsproto.h",
        "https://cp.enom.com/global/TopMenu.ascx.js",
        "xfe-URL-Hostsailor.com-stix2-2.1-export.json",
        "https://v2.zopim.com/bin/v/widget_v2.329.js",
        "xfe-URL-Choopa.com-stix2-2.1-export.json",
        "https://www.googletagmanager.com/gtag/js?id=AW-1045757556",
        "GKChallenge.h",
        "xfe-URL-livesupport.hetzner.de-stix2-2.1-export.json",
        "GCPhysicalInputElement.h",
        "WKContentRuleList.h",
        "IOBluetoothUI.h",
        "ASAuthorizationPlatformPublicKeyCredentialRegistration.h",
        "GCKeyCodes.h",
        "IOUSBHostPipe.h",
        "vForce.h",
        "https://insurancerateusa.com/polyfill-036b4a134d8725752ba0.js",
        "WKContextMenuElementInfo.h",
        "GKDialogController.h",
        "pp.h",
        "https://unrealservers.net/master.css",
        "IOBluetooth.h",
        "WKBackForwardList.h",
        "ip_icmp.h",
        "machine_remote_time.h",
        "xfe-URL-share.vx-underground.org_Conti-stix2-2.1-export.json",
        "https://ascio.com",
        "https://4vendeta.com/assets/js/parallax.min.js",
        "xfe-URL-uizard.io-stix2-2.1-export.json",
        "GKVoiceChatService.h",
        "parser.h",
        "https://insurancerateusa.com/webpack-runtime-f014a3267add02a94afb.js",
        "GKGameCenterViewController.h",
        "https://sb.scorecardresearch.com/p?ax_uuid=d247c6142f285bb0488533aa7f2d53c5&c1=9&c2=31864766&ns__t=1676508027511&ns_c=UTF-8&cv=3.1&c8=SecurityWeekly%20-%20Twitch&c7=https%3A%2F%2Fwww.twitch.tv%2Fsecurityweekly&c9=",
        "gssapi_krb5.h",
        "https://cp.enom.com/ScriptResource.axd?d=lDjPFfAIWSrEAVNgTHTrISQmLEFmHAaibvNJQuGRZDbWpGFPLrFwaGVpjCUsI6HkqzbpwmaAa0cJCrq8f0eqEvIsQM8lvN_dVYVyESnohON4oTvdMZHDmwG83uJA4m2oqykP8TTTSIeV2oaNrlIXaX8cOxC5Cv6aGmjpdB2u-227wdn30&t=363be08",
        "nostdio.h",
        "oalMacOSX_OALExtensions.h",
        "kdp_en_debugger.h",
        "MultipeerConnectivity.h",
        "GKNotificationBanner.h",
        "https://app.uizard.io/p/c69fa2aa",
        "arm64e-apple-macos.swiftinterface",
        "ASAccountAuthenticationModificationController.h",
        "IOUSBHostIOSource.h",
        "ASAuthorizationAppleIDButton.h",
        "bitcount.h",
        "https://www.googletagmanager.com/gtm.js?id=GTM-KW8B5L",
        "IOUSBHost.h",
        "IOBluetoothDeviceSelectorController.h",
        "WKFindConfiguration.h",
        "ASPasskeyCredentialRequest.h",
        "https://cp.enom.com/responsive/_js/init.min.js",
        "https://ddailyworkouts.com/tip/340185964810871",
        "WKPreviewActionItem.h",
        "https://tobiasahlin.com",
        "https://insurancerateusa.com/94297995-69529ad7536f090aa776.js",
        "_types.h",
        "ebcdic_tables.h",
        "GCGamepadSnapshot.h",
        "ASAuthorizationRequest.h",
        "GKSessionError.h",
        "desc.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialRegistrationRequest.h",
        "WKSecurityOrigin.h",
        "GCTypes.h",
        "https://www.gstatic.com/charts/50/js/jsapi_compiled_bar_module.js",
        "GCEventViewController.h",
        "tcp_var.h",
        "popen_spawn_win32.py",
        "https://www.hostrocket.com/js/jquery.price_slider.js",
        "https://aquanx.com/js/jquery-1.12.4.min.js",
        "https://s.adroll.com/j/sendrolling.js",
        "_OSByteOrder.h",
        "https://www.data-xata.com/_nuxt/65d6cfa.modern.js",
        "GCButtonElement.h",
        "https://www.ascio.com/wp-includes/js/dist/i18n.min.js?ver=30fcecb428a0e8383d3776bcdd3a7834",
        "https://www.gstatic.com/charts/50/third_party/webfontloader/webfont.js",
        "regnodes.h",
        "https://platform.twitter.com/widgets/follow_button.f8c8d971a6ac545cf416e3c1ad4bbc65.en.html#dnt=false&id=twitter-widget-0&lang=en&screen_name=abuse_ch&show_count=false&show_screen_name=true&size=l&time=1653415551742",
        "warnings.h",
        "WebGPU.tbd",
        "https://ajax.googleapis.com/ajax/libs/angularjs/1.4.2/angular-sanitize.js",
        "xfe-URL-4vendeta.com-stix2-2.1-export.json",
        "IOBluetoothServiceBrowserController.h",
        "https://www.hostrocket.com/js/jquery.behavior.js",
        "http://alp-vision.com/wp-includes/js/jquery/jquery.min.js?ver=3.5.1",
        "ASAuthorizationSecurityKeyPublicKeyCredentialAssertion.h",
        "GCDirectionPadElement.h",
        "https://cp.enom.com/ScriptResource.axd?d=fVjQa-0YyNqO6JmV36bw6eBJdTjE2YSdtcunOWcKYcBNn73MOJKQA_rxX3YMhcxLTgyDsGTKy0p9NEPvxzpqEpBKtm3GLb2GgI1LFYMC0Xr2lh71ZCttzgNGFnc5mS_Fc_DY5UH0M19Mr958h1jvmK4kzAM1&t=363be08",
        "WKError.h",
        "https://himado.com/cdn-cgi/challenge-platform/h/g/scripts/invisible.js?ts=1651842000",
        "ipc_types.h",
        "xdr_subs.h",
        "UNDReply.defs",
        "5.main.bundle.e92e5e24e074f9c2a52b.js",
        "xfe-URL-Ndevix.com-stix2-2.1-export.json",
        "https://konsoleh.your-server.de/templates/ui-default/de/styles/login.css.php",
        "https://connect.facebook.net/signals/config/534474930374151?v=2.9.57&r=stable",
        "IOBluetoothObjectPushUIController.h",
        "https://www.hostrocket.com/js/jquery.selectBox.min.js",
        "xfe-URL-tobiasahlin.com-stix2-2.1-export.json",
        "keywords.h",
        "ASAuthorizationPublicKeyCredentialRegistrationRequest.h",
        "https://cp.enom.com/js/jquery.cookie.min.js",
        "https://accounts.hetzner.com/build/app.dc073715.js",
        "GCTouchedStateInput.h",
        "WKFindResult.h",
        "uconfig.h",
        "https://apis.google.com/_/scs/abc-static/_/js/k=gapi.lb.en.iTmf4rxOyWc.O/m=auth2/rt=j/sv=1/d=1/ed=1/rs=AHpOoo-LTnDn-AS2QlMWYZdnaV1OuFR7Iw/cb=gapi.loaded_0?le=scs",
        "GCMouse.h",
        "ip6.h",
        "vm_fault.h",
        "config.h",
        "AdID.tbd",
        "GKChallengesViewController.h",
        "WebDriver.tbd",
        "WebKitLegacy.h",
        "ASCredentialIdentityStoreState.h",
        "https://www.choopa.com/_js/global.js?v=209",
        "https://www.googletagmanager.com/gtag/js?id=G-SXR89SKRRS&l=dataLayer&cx=c",
        "inline.h",
        "GKFriendRequestComposeViewController.h",
        "https://bazaar.abuse.ch/js/bootstrap.min.js",
        "xfe-IP-146.148.236.187-stix2-2.1-export.json",
        "https://www.googletagmanager.com/gtag/js?id=G-C3W7T6H5QW&l=dataLayer&cx=c",
        "https://www.gstatic.com/charts/50/third_party/dygraphs/dygraph-tickers-combined.js",
        "perly.h",
        "Admin.tbd",
        "udp_var.h",
        "xfe-URL-Js.stripe.net-stix2-2.1-export.json",
        "com_err.h",
        "ASWebAuthenticationSessionCallback.h",
        "pmap.h",
        "profile.h",
        "ipc_pthread_priority_types.h",
        "patchlevel.h",
        "IOBluetoothUIUserLib.h",
        "hv_func.h",
        "WKURLSchemeHandler.h",
        "al.h",
        "ASCredentialRequest.h",
        "WKContentRuleListStore.h",
        "apfs_boot_mount.tbd",
        "https://www.hostrocket.com/js/jquery.cycle.all.js",
        "https://js.hs-scripts.com/3844463.js",
        "types.h",
        "ASAuthorizationProviderExtensionAuthorizationResult.h",
        "mg_vtable.h",
        "unixish.h",
        "pal_routines.h",
        "GKChallengeEventHandler.h",
        "memory_types.h",
        "mydtrace.h",
        "http://alp-vision.com/wp-content/cache/autoptimize/js/autoptimize_78b4f9b28399aa3c8a405e45931ad058.js",
        "ASPasskeyAssertionCredential.h",
        "ip.h",
        "GCController.h",
        "GKLeaderboardScore.h",
        "GCDualShockGamepad.h",
        "OSAtomic.h",
        "cop.h",
        "malloc_ctl.h",
        "WKWebsiteDataRecord.h",
        "WKWebViewConfiguration.h",
        "GKAccessPoint.h",
        "python-3.9-embed.pc",
        "SwiftUI.swiftoverlay",
        "https://www.hostrocket.com/css/style.css",
        "GCExtendedGamepadSnapshot.h",
        "https://cp.enom.com/js/punycode.min.js",
        "https://konsoleh.your-server.de/templates/ui-default/de/javascripts/jquery/ui/jquery-ui.js",
        "https://www.googletagmanager.com/gtag/js?id=G-J9PCW0F6JV",
        "https://connect.facebook.net/signals/config/393095817498804?v=2.9.57&r=stable",
        "https://www.googletagmanager.com/gtag/js?id=G-K6536FHN4D&l=dataLayer&cx=c",
        "IOUSBHostCIControllerStateMachine.h",
        "byte_order.h",
        "https://281cecd8ae73dff542e13679e60d5fb9.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html",
        "ASSettingsHelper.h",
        "GCDirectionalGamepad.h",
        "https://cdn.pendo.io/agent/static/783a696b-ddf4-4152-439e-f3761f54f088/pendo.js",
        "https://bgp.net/wp-content/plugins/designthemes-core-features/shortcodes/css/animations.css?ver=5.5.9",
        "OSMalloc.h",
        "WebKit.tbd",
        "GameKit.h",
        "https://cdn.eu.pendo.io/agent/static/82b060a2-2cf8-472e-55d4-bd0833416335/pendo.js",
        "tss.h",
        "form.h",
        "INUIAddVoiceShortcutViewController.h",
        "perl_langinfo.h",
        "ASAuthorizationAppleIDRequest.h",
        "ASCredentialProviderExtensionContext.h",
        "ASPublicKeyCredentialClientData.h",
        "IOUSBHostCIDeviceStateMachine.h",
        "OSReturn.h",
        "http://fonts.googleapis.com/css?family=Abril+Fatface%3Aregular&subset=latin%2Ccyrillic&ver=5.7.6",
        "GCSwitchPositionInput.h",
        "https://securepubads.g.doubleclick.net/gpt/pubads_impl_page_level_ads_2022050201.js",
        "https://connect.facebook.net/signals/config/571256413046247?v=2.9.57&r=stable",
        "gssapi_generic.h",
        "14.main.bundle.91f9f7ff635e0b797de3.js",
        "WebKit.apinotes",
        "https://www.data-xata.com/_nuxt/1e8744d.modern.js",
        "https://static.ads-twitter.com/uwt.js",
        "https://www.hostrocket.com/js/jquery-ui-1.8.13.custom.min.js",
        "GCAxis2DInput.h",
        "vDSP.h",
        "https://js.hs-banner.com/6261317.js",
        "trap.h",
        "https://accounts.hetzner.com/login",
        "machine_cpuid.h",
        "ASAuthorizationError.h",
        "av.h",
        "gssapi.h",
        "unicode_constants.h",
        "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/_buildManifest.js",
        "limits.h",
        "AppSandbox.tbd",
        "GCGearShifterElement.h",
        "ASAccountAuthenticationModificationExtensionContext.h",
        "xfe-URL-Cloudfront.net-stix2-2.1-export.json",
        "https://connect.facebook.net/en_US/fbevents.js",
        "WKNavigation.h",
        "https://ssl.google-analytics.com/ga.js",
        "https://static.zdassets.com/ekr/snippet.js?key=d814ea4a-a8eb-4a9c-aedd-cac0aa0e3551",
        "https://www.data-xata.com/_nuxt/e7424e3.js",
        "OSvKernDSPLib.h",
        "http://alp-vision.com/wp-content/themes/alp-vision/css/bootstrap.css?ver=1.0",
        "WKPreferences.h",
        "_endian.h",
        "https://accounts.hetzner.com/build/755.5a8586e9.js",
        "ASEProcessing.tbd",
        "pio.h",
        "arch.h",
        "vecLib.h",
        "utf8.h",
        "NSAttributedString.h",
        "static_if.h",
        "https://www.choopa.com/css/global.css?v=209",
        "https://www.redditstatic.com/ads/pixel.js",
        "https://cp.enom.com/js/openWin.min.js",
        "GCControllerButtonInput.h",
        "x86_64-apple-macos.swiftinterface",
        "IOBluetoothUI.tbd",
        "WKOpenPanelParameters.h",
        "https://user.aquanx.com/templates/aquanx20190627/js/scripts.min.js?v=8a99af",
        "crc.h",
        "feature.h",
        "WKProcessPool.h",
        "https://www.gstatic.com/recaptcha/releases/QENb_qRrX0-mQMyENQjD6Fuj/recaptcha__en.js",
        "https://static-cdn.jtvnw.net/jtv_user_pictures/6f4129f6-3750-4c02-b7c8-c88a05064129-profile_image-70x70.png",
        "https://connect.facebook.net/signals/config/828098694004178?v=2.9.57&r=stable",
        "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/pages/_app.js",
        "GKLeaderboardSet.h",
        "GCKeyboard.h",
        "GCMicroGamepad.h",
        "https://d3cxv97fi8q177.cloudfront.net/foundation-A122588-852f-4501-9972-9515a4f53da31.js",
        "PCIDriverKit.h",
        "https://js.hsleadflows.net/leadflows.js",
        "xfe-URL-heymman.com-stix2-2.1-export.json",
        "ASAuthorizationOpenIDRequest.h",
        "https://www.gstatic.com/charts/50/js/jsapi_compiled_ui_module.js",
        "MultipeerConnectivity.tbd",
        "https://www.gstatic.com/charts/50/js/jsapi_compiled_line_module.js",
        "https://user.aquanx.com/clientarea.php",
        "ASAccountAuthenticationModificationViewController.h",
        "ASCOSEConstants.h",
        "https://bgp.net/wp-content/themes/multihost/framework/js/public/modernizr.min.js?ver=5.5.9",
        "https://aquanx.com/js/modernizr-custom.js",
        "canvas.html",
        "IOUSBHostControllerInterface.h",
        "GKBasePlayer.h",
        "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap",
        "xfe-URL-Serverhub.com-stix2-2.1-export.json",
        "Kerberos.h",
        "GameController.tbd",
        "https://www.west.cn/js2016/root/jqinclude.js?t=20211126a",
        "IOBluetoothUserLib.h",
        "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialProvider.h",
        "bootp.h",
        "cv.h",
        "utfebcdic.h",
        "tcp_timer.h",
        "GCDeviceCursor.h",
        "ASAuthorizationSingleSignOnRequest.h",
        "https://aquanx.com/js/cookie-warn.js?v=1_xSax0l",
        "https://securepubads.g.doubleclick.net/tag/js/gpt.js",
        "ASAccountAuthenticationModificationUpgradePasswordToStrongPasswordRequest.h",
        "krb5.h",
        "perl.h",
        "https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022050201.js",
        "xfe-URL-vx-underground.org_Conti_-stix2-2.1-export.json",
        "ASAccountAuthenticationModificationReplacePasswordWithSignInWithAppleRequest.h",
        "reg_help.h",
        "GKMatch.h",
        "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialAssertionRequest.h",
        "pycore_condvar.h",
        "https://www.heymman.com/script.js",
        "op_reg_common.h",
        "GCPhysicalInputProfile.h",
        "regexp.h",
        "hv_macro.h",
        "locate_plugin.h",
        "https://tobiasahlin.com/js/anime.min.js",
        "preauth_plugin.h",
        "https://www.gstatic.com/charts/50/js/jsapi_compiled_default_module.js",
        "OpenAL.tbd",
        "xfe-URL-Aliyun.com-stix2-2.1-export.json",
        "IOUSBHostDefinitions.h",
        "IOBluetoothPairingController.h",
        "ip_var.h",
        "tcp.h",
        "ASAuthorizationController.h",
        "ASPasskeyCredentialRequestParameters.h",
        "ASWebAuthenticationSessionWebBrowserSessionManager.h",
        "https://www.gstatic.com/charts/50/loader.js",
        "stdint.h",
        "perl_inc_macro.h",
        "https://insurancerateusa.com/bfcc7b67-0b189ba6da3fc3ae8b88.js",
        "http://web.basemark.com/result/?4A3D0fmu%1C%00%00%00B%00a%00s%00e%00m%00a%00r%00k",
        "EXTERN.h",
        "https://www.hostrocket.com/css/colorbox.css",
        "MCNearbyServiceAdvertiser.h",
        "https://cp.enom.com/verisign-seal.htm",
        "https://www.hostrocket.com/js/jquery.tools.min.js",
        "MCPeerID.h",
        "capture_0.bundle.js",
        "WKContentWorld.h",
        "GKError.h",
        "WKHTTPCookieStore.h",
        "INImage+IntentsUI.h",
        "vm_options.h",
        "https://himado.com/heihei/js/swiper.min.js",
        "https://www.google.com/recaptcha/api.js",
        "xfe-URL-Data-xata.com-stix2-2.1-export.json",
        "https://www.googletagmanager.com/gtag/js?id=UA-122335014-2",
        "MCNearbyServiceBrowser.h",
        "in_stat.h",
        "IOUSBHostObject.h",
        "perliol.h",
        "ptrauth.h",
        "https://www.data-xata.com/js/zopimlaunch.js",
        "GCRacingWheelInput.h",
        "cpu_capabilities_public.h",
        "https://www.googletagmanager.com/gtm.js?id=GTM-MDCVHGD",
        "icmp_var.h",
        "https://hostsailor.com/wp-content/cache/minify/9de48.js",
        "ASAuthorizationSecurityKeyPublicKeyCredentialDescriptor.h",
        "https://www.hostrocket.com/js/jquery.cookie.js",
        "ASAuthorizationPublicKeyCredentialAssertionRequest.h",
        "embedvar.h",
        "GCMotion.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationOutput.h",
        "WKWebpagePreferences.h",
        "ASPublicKeyCredential.h",
        "https://4vendeta.com/assets/js/popper.min.js",
        "ASAuthorizationPublicKeyCredentialAssertion.h",
        "IOUSBHostInterface.h",
        "https://platform.twitter.com/js/button.3ccb64e61d4c01fae12cd2b0ed9b2bab.js",
        "https://certify-js.alexametrics.com/atrk.js",
        "ASPasswordCredentialIdentity.h",
        "GCColor.h",
        "GKGameSession.h",
        "https://www.ascio.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.9",
        "https://accounts.hetzner.com/build/runtime.188fa053.js",
        "https://bazaar.abuse.ch/css/bootstrap.min.css",
        "rpcv2.h",
        "ASFoundation.h",
        "https://app.uizard.io/fonts.css?cache=2022-04-29-12-55-57",
        "lz4.h",
        "https://www.choopa.com/_js/bootstrap.js",
        "locks.h",
        "pp_proto.h",
        "https://www.googletagmanager.com/gtag/js?id=UA-92521958-1",
        "https://www.googleadservices.com/pagead/conversion_async.js",
        "vBasicOps.h",
        "https://connect.facebook.net/signals/plugins/identity.js?v=2.9.60",
        "ASCredentialIdentity.h",
        "GCDeviceHaptics.h",
        "IOBluetooth.tbd",
        "param.h",
        "https://www.google.com/recaptcha/api.js?render=6LfPdckUAAAAAMPH_0crY_k4tdvDN7GVgKtWUyjU&ver=3.0",
        "zconf.h",
        "ASAuthorizationPasswordRequest.h",
        "https://www.west.cn/js2016/lib/jquery.SuperSlide/jquery.SuperSlide.2.1.1.x.js",
        "https://abuse.ch/js/bootstrap.min.js",
        "webcomponent-polyfill.js",
        "https://www.googletagmanager.com/gtag/js?id=G-5GQV3CJ17N",
        "GCRelativeInput.h",
        "uuid.h",
        "ASAuthorizationCustomMethod.h",
        "ASExtensionErrors.h",
        "python-3.9.pc",
        "stdatomic.h",
        "https:///livesupport.hetzner.de/resource.php?t=js&1=jsglobal.min.js&2=jsbox.min.js&3=jstrack.min.js&v=ahgzixd7&4=jsextern.min.js",
        "perlvars.h",
        "https://bazaar.abuse.ch/js/jquery-3.5.1.min.js",
        "ASAuthorizationPublicKeyCredentialRegistration.h",
        "https://tobiasahlin.com/css/site.css",
        "https://cp.enom.com/WebResource.axd?d=6rtXrDcnyiYD-9dFDFOkxTRcPVSrAN8fR-cHKzNqPTy7bHic-2LLMHDnielTzEI-sd1KplHrRBudcZJOm0-lxubO7k41&t=637453818340000000",
        "v6s.js",
        "GCDevicePhysicalInputStateDiff.h",
        "https://d31qbv1cthcecs.cloudfront.net/atrk.js",
        "UNDTypes.defs",
        "WKPreviewElementInfo.h",
        "mg_raw.h",
        "GKTurnBasedMatch.h",
        "GCPressedStateInput.h",
        "IOUSBHostCIEndpointStateMachine.h",
        "metaconfig.h",
        "https://bgp.net/wp-includes/js/wp-embed.min.js?ver=5.5.9",
        "GKLeaderboardEntry.h",
        "https://cp.enom.com/scripts/Session.min.js",
        "opcode.h",
        "OpenAL.h",
        "GKPublicProtocols.h",
        "https://my.choopa.com/js/desktop.js?v=41",
        "util.h",
        "https://portal.ascio.com/runtime.48adad1e07e2679eb1f4.js",
        "GKTurnBasedMatchmakerViewController.h",
        "INTERN.h",
        "WKNavigationResponse.h",
        "Making HTTPS connections using insecure TLS/SSL version details Connection was make using TLSv1.1 [tls.handshake.version: 0x00000302] source Network Traffic relevance 10/10 ATT&CK ID T1573 (Show technique in the MITRE ATT&CK\u2122 matrix)",
        "https://js.hs-scripts.com/20704235.js",
        "WKDownloadDelegate.h",
        "https://www.ascio.com/wp-includes/js/dist/vendor/react-dom.min.js?ver=17.0.1",
        "https://insurancerateusa.com/3bea8d40-8926f4790c0b3689a361.js",
        "copyio.h",
        "https://abuse.ch/js/jquery-3.6.0.min.js",
        "ASPasswordCredential.h",
        "entity%3Aip%20whois%3Ainfo%40anodicnetwork.com.html",
        "vm_compressor_algorithms.h",
        "xfe-URL-konsoleh.your-server.de-stix2-2.1-export.json",
        "https://cp.enom.com/responsive/_js/bootstrap.js",
        "WKDataDetectorTypes.h",
        "alc.h",
        "cpu.h",
        "GCPhysicalInputSource.h",
        "https://bat.bing.com/p/action/17528422.js",
        "GCDeviceBattery.h",
        "ASWebAuthenticationSessionRequest.h",
        "https://www.googletagmanager.com/gtag/js?id=UA-185991747-1",
        "WKUserContentController.h",
        "in_pcb.h",
        "GKEventListener.h",
        "ASAuthorizationWebBrowserExternallyAuthenticatableRequest.h",
        "https://www.google-analytics.com/analytics.js",
        "time64_config.h",
        "plugin.js",
        "ASAuthorizationPublicKeyCredentialParameters.h",
        "GameController.h",
        "time64.h",
        "perlio.h",
        "http://alp-vision.com/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=7.4.4",
        "https://connect.facebook.net/signals/config/438248060937995?v=2.9.57&r=stable",
        "encode.h",
        "https://s.adroll.com/j/exp/DUKHAKVYIJASHDUBG4V7RE/index.js",
        "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/pages/index.js",
        "https://livesupport.hetzner.de/script.php?id=eec8dcd79d6fdf905136b99875c1d599",
        "INUIEditVoiceShortcutViewController.h",
        "udp.h",
        "GCSwitchElement.h",
        "vm_pageout.h",
        "GKAchievementDescription.h",
        "xfe-URL-insurancerateusa.com-stix2-2.1-export.json",
        "reentr.h",
        "handy.h",
        "https://script.hotjar.com/modules.0076bf93c385ddf0ff58.js",
        "https://cp.enom.com/js/jquery.jgrowl.min.js",
        "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationInput.h",
        "https://js.usemessages.com/conversations-embed.js",
        "xfe-URL-matomo.hetzner.com-stix2-2.1-export.json",
        "12.main.bundle.50be73a11d1d3745a5ee.js",
        "https://js.hscollectedforms.net/collectedforms.js",
        "https://www.hostgator.com/_next/static/5a0OWA7iirtDqpl2xeXE4/_ssgManifest.js",
        "if_ether.h",
        "WKScriptMessageHandlerWithReply.h",
        "xfe-URL-himado.com-stix2-2.1-export.json",
        "WKWebView.h",
        "GCExtendedGamepad.h",
        "kdp_callout.h",
        "Bluetooth.h",
        "sel.h",
        "GCAxisInput.h",
        "scope.h",
        "ASAuthorizationPasswordProvider.h",
        "\"<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Strict//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\"> <html xmlns=\"http://www.w3.org/1999/xhtml\">   <head>     <title>           Page not found       </title>       <meta http-equiv=\"Content-type\" content=\"text/html; charset=utf-8\">     <meta http-equiv=\"Pragma\" content=\"no-cache\">     <meta http-equiv=\"Pragma\" content=\"no-store\">     <meta http-equiv=\"Expires\" content=\"-1\">     <meta name=\"keywords\" content=\"virustotal, antivirus, infected, free, sca",
        "ASAuthorizationPlatformPublicKeyCredentialProvider.h",
        "in_arp.h",
        "https://konsoleh.your-server.de/templates/ui-default/de/javascripts/jquery/jquery.js",
        "ASAccountAuthenticationModificationRequest.h",
        "xfe-IP-136.243.64.87-stix2-2.1-export.json",
        "vmparam.h",
        "ASAuthorizationSingleSignOnCredential.h",
        "https://konsoleh.your-server.de/templates/ui-default/de/javascripts/wz_tooltip.js",
        "GCGamepad.h",
        "https://www.hostrocket.com/contact-files/contact-form.js",
        "module.modulemap",
        "libkern.h",
        "kpi_ipfilter.h",
        "ASCredentialProviderViewController.h",
        "beacon.js",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1071979603/?random=1650396033510&cv=9&fst=1650396033510&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.hostgator.com%2F&tiba=Web%20Hosting%20-%202022%27s%20Best%20Website%20Hosting%20%7C%20HostGator&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredentialAssertionRequest.h",
        "perl_siphash.h",
        "stdbool.h",
        "xfe-URL-Eonix.net-stix2-2.1-export.json",
        "vm_shared_region.h",
        "WKUIDelegate.h",
        "GCMouseInput.h",
        "GCDualSenseAdaptiveTrigger.h",
        "in_var.h",
        "in_private.h",
        "perlsdio.h",
        "https://s4.cnzz.com/z_stat.php?id=1280305902&web_id=1280305902",
        "GCKeyNames.h",
        "GKScore.h",
        "https://c.cnzz.com/core.php?web_id=1280305902&t=z",
        "vecLibTypes.h",
        "opnames.h",
        "ASWebAuthenticationSession.h",
        "https://himado.com/heihei/node_modules/mdui/dist/js/mdui.min.js",
        "GKGameSessionSharingViewController.h",
        "IntentsUI.apinotes",
        "GKAchievementViewController.h",
        "https://ajax.googleapis.com/ajax/libs/angularjs/1.4.8/angular.min.js",
        "https://www.choopa.com/_js/dragscroll.js",
        "overload.h",
        "webpack   buildin global.js",
        "_param.h",
        "GCLinearInput.h",
        "xfe-URL-bgp.net-stix2-2.1-export.json",
        "vutil.h",
        "https://ddailyworkouts.com/tip/jquery.min.js.download",
        "string.h",
        "https://cp.enom.com/js/cart.minicart.min.js",
        "nfs.h",
        "vfs_support.h",
        "config.xml",
        "https://cdn.ampproject.org/rtv/012204221712000/amp4ads-host-v0.js",
        "https://aquanx.com/js/bootstrap.js",
        "https://4vendeta.com/assets/js/bootstrap.min.js",
        "GCExtern.h",
        "https://www.choopa.com/css/bootstrap.css",
        "python3.pc",
        "https://hybrid-analysis.com/sample/e7740c893812cea8e34ffb04331dcc45762dec73def71929bfbabcbfb22e93e9/641e30763dcad56bc2075661",
        "http://lifehacker.com/assets/stylesheets/app-a873b056f0ea955e4ff0abebb210e5a6.css",
        "https://hybrid-analysis.com/sample/f90162e65235185a24e9f20d855371b8ad7462d50d7a57851d000cfd5116f76d/63aef1a83e3bb16765527bb8",
        "https://aquanx.com/js/bootstrap-hover-dropdown.min.js",
        "https://www.choopa.com/commonimages/jquery-3.5.1.min.js",
        "xfe-IP-78.142.35.163-stix2-2.1-export.json",
        "https://6241250.fls.doubleclick.net/activityi;src=6241250;type=remar0;cat=hg-al0;ord=1;num=152669004837;gtm=2wg4i1;auiddc=30830049.1650396032;u1=prospect;u2=%2F;u5=noConsent-none;~oref=https%3A%2F%2Fwww.hostgator.com%2F",
        "https://ddailyworkouts.com/tip/style.css",
        "WKSnapshotConfiguration.h",
        "https://public.profitwell.com/js/profitwell.js?auth=80939adc88898a29e714f6dd3d25e8ba",
        "https://tobiasahlin.com/js/app.js?v=1",
        "KerberosLogin.h",
        "https://static.hotjar.com/c/hotjar-23213.js?sv=7",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/858656304/?random=1650403054497&cv=9&fst=1650403054497&num=1&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=3&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.vultr.com%2F&tiba=SSD%20VPS%20Servers%2C%20Cloud%20Servers%20and%20Cloud%20Hosting%20by%20Vultr%20-%20Vultr.com&hn=www.googleadservices.com&rfmt=3&fmt=4",
        "OSDebug.h",
        "IOBluetoothTypes.h",
        "WKFoundation.h",
        "https://4vendeta.com/assets/js/jquery.min.js",
        "tcp_fsm.h",
        "https://accounts.hetzner.com/build/802.3a7546ef.js",
        "https://my.choopa.com/js/jquery-3.5.1.min.js",
        "https://bat.bing.com/bat.js",
        "cpuid.h",
        "https://cdn.heapanalytics.com/js/heap-2001511295.js",
        "perlapi.h",
        "ASAuthorizationPlatformPublicKeyCredentialRegistrationRequest.h",
        "https://d.adroll.com/pixel/DUKHAKVYIJASHDUBG4V7RE/E23RMKDBEFAEXMXLWK3IWO?adroll_fpc=838a57acc6141112b6107bdce5e3fde6-1650403057055&arrfrr=https%3A%2F%2Fwww.vultr.com%2F&pv=70707106758.07146&cookie=&adroll_s_ref=&keyw=",
        "https://abuse.ch/js/twitter_widget.js",
        "MCSession.h",
        "atomic.h",
        "GCControllerDirectionPad.h",
        "https://himado.com/heihei/layui/layui.all.js",
        "xfe-URL-inflect.com-stix2-2.1-export.json",
        "https://4vendeta.com/assets/js/ajaxchimp.min.js",
        "IOPCIFamilyDefinitions.h",
        "https://www.googletagmanager.com/gtm.js?id=GTM-NGP6LXC",
        "https://zopim.com",
        "OBEX.h",
        "https://matomo.hetzner.com/matomo.js",
        "xfe-URL-Misk.com-stix2-2.1-export.json",
        "WKScriptMessageHandler.h",
        "CredentialsCache2.h",
        "ASAuthorizationPlatformPublicKeyCredentialAssertion.h",
        "xfe-URL-raksmart.com-stix2-2.1-export.json",
        "fakesdio.h",
        "https://js.stripe.com/v3",
        "AuthenticationServices.h",
        "ASAuthorizationCredential.h",
        "UNDRequest.defs",
        "https://www.heymman.com/style/main.css",
        "AuthenticationServicesCore.tbd",
        "mg_data.h",
        "monotonic.h",
        "AuthenticationServices.apinotes",
        "GKMatchmaker.h",
        "signal.h",
        "endian.h",
        "ASPasskeyRegistrationCredential.h",
        "ASPasswordCredentialRequest.h",
        "https://www.hostgator.com/_next/static/chunks/framework.4fc08a4a599cac03ddf5.js",
        "in_systm.h",
        "https://bgp.net/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp",
        "https://www.virustotal.com/en/file/undefined/analysis/",
        "https://a.impactradius-tag.com/mediasource-A122588-852f-4501-9972-9515a4f53da31.js",
        "GCKeyboardInput.h",
        "regcomp.h",
        "LDAP.tbd",
        "IOUSBHostControllerInterfaceHelpers.h",
        "https://hybrid-analysis.com/sample/f90162e65235185a24e9f20d855371b8ad7462d50d7a57851d000cfd5116f76d",
        "MapKit.tbd",
        "machine_machdep.h",
        "xfe-URL-Enom.com-stix2-2.1-export 2.json",
        "vm_dyld_pager.h",
        "l1_char_class_tab.h",
        "https://hostsailor.com/wp-content/cache/minify/cc4b1.js",
        "AFKMemoryDescriptorOptions.h",
        "https://ddailyworkouts.com/tip/fbevents.js.download",
        "IOUSBHostStream.h",
        "xfe-URL-Intercom.io-stix2-2.1-export.json",
        "https://storage.googleapis.com/inflect-frontend-assets/adb460de2098568d4c3580de1fde2f6690bcbd04/_next/static/s0TytVz2d0zNgb~bjg~~D/pages/search.js",
        "GKMatchmakerViewController.h",
        "https://my.choopa.com/js/global.js?v=41",
        "IOUSBHostDevice.h",
        "OSTypes.h",
        "GCControllerElement.h",
        "IOUSBHostControllerInterfaceDefinitions.h",
        "vm_kern.h",
        "IOPCIDevice.iig",
        "ASAuthorizationPlatformPublicKeyCredentialDescriptor.h",
        "table.h",
        "GKGameSessionError.h",
        "https://insurancerateusa.com/framework-19eddc0d879a49dfe606.js",
        "ASAuthorizationPublicKeyCredentialDescriptor.h",
        "https://www.googletagmanager.com/gtag/js?id=G-W8YD4P2ENY&l=dataLayer&cx=c",
        "https://bgp.net/wp-includes/js/wp-emoji-release.min.js?ver=5.5.9",
        "https://cdn.onesignal.com/sdks/OneSignalSDK.js",
        "igmp.h",
        "GCControllerAxisInput.h",
        "ASAuthorizationSingleSignOnProvider.h",
        "https://hybrid-analysis.com/sample/5da0de230eb98e5598b152944d0e7e6b355485484052df6c7f1c747e2c5564c0/63ed708125f47738b45a6520",
        "zlib.h",
        "https://serverhub.com/combine/a059fe7a562c0b582328162f0ee69fda-1426025688",
        "https://www.hybrid-analysis.com/sample/1e5fe7747a445f340ed8db6bd946b6fb2cf2db123b08c3ac818cb8a1c2ae28d0",
        "CredentialsCache.h",
        "https://hybrid-analysis.com/sample/b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b/",
        "apstag.js",
        "UNDTypes.h",
        "https://www.hostgator.com/_next/static/css/1746e01e071caaad90f08af905f64c7649b9fd98_CSS.27b3968e.chunk.css",
        "ASAuthorizationAppleIDProvider.h",
        "OBEXBluetooth.h",
        "sbox32_hash.h",
        "op.h",
        "https://cdn3.optimizely.com/js/geo4.js",
        "perldtrace.h",
        "BluetoothAssignedNumbers.h",
        "ASWebAuthenticationSessionWebBrowserSessionHandling.h",
        "https://hybrid-analysis.com/sample/e7740c893812cea8e34ffb04331dcc45762dec73def71929bfbabcbfb22e93e9",
        "xfe-URL-Vultr.com-stix2-2.1-export.json",
        "https://cdn.optimizely.com/js/26241557.js",
        "xfe-URL-Enom.com-stix2-2.1-export.json",
        "GKSavedGame.h",
        "invlist_inline.h",
        "ASAuthorizationPlatformPublicKeyCredentialAssertionRequest.h",
        "MCAdvertiserAssistant.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobAssertionOutput.h",
        "GCDevicePhysicalInput.h",
        "https://js.partnerstack.com/v1/",
        "https://m.west.cn/jscripts/baidutj/hm.js",
        "tcp_private.h",
        "XSUB.h",
        "xfe-URL-ascio.com-stix2-2.1-export.json",
        "tcpip.h",
        "https://sb.scorecardresearch.com/p?c1=2&c2=6745306&ns_type=hidden&ns_st_sv=5.1.3.160420&ns_st_smv=5.1&ns_st_it=r&ns_st_id=1676508021004&ns_st_ec=3&ns_st_sp=1&ns_st_sc=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=hb&ns_st_po=1560430&ns_st_cl=0&ns_st_hc=31&ns_st_mp=js_api&ns_st_mv=5.1.3.160420&ns_st_pn=1&ns_st_tp=0&ns_st_ci=47976339133&ns_st_pt=1560430&ns_st_dpt=360423&ns_st_ipt=60010&ns_st_et=1560430&ns_st_det=360423&ns_st_upc=1560430&ns_st_dupc=360423&ns_st_iupc=60010&ns_st_upa=15604",
        "https://portal.ascio.com/login",
        "https://konsoleh.your-server.de/templates/ui-default/de/javascripts/jquery/jquery-migrate.js",
        "GCXboxGamepad.h",
        "tree.h",
        "GKAchievement.h",
        "https://www.data-xata.com/_nuxt/b799d37.modern.js",
        "thread.h",
        "atm_types.h",
        "P34D56F9D-5684-4C83-8EE1-5EA7DE9CF45D.js",
        "https://widget.intercom.io/widget/e1nqrt2k",
        "ASAuthorizationSecurityKeyPublicKeyCredentialAssertionRequest.h",
        "https://www.gstatic.com/charts/50/js/jsapi_compiled_graphics_module.js",
        "https://vars.hotjar.com/box-4924254a9ce4dc9b959b6e4a9b662d60.html",
        "MCBrowserViewController.h",
        "GCDualSenseGamepad.h",
        "ASAuthorizationWebBrowserPublicKeyCredentialManager.h",
        "xfe-URL-hostrocket.com-stix2-2.1-export 2.json",
        "ASAuthorizationPublicKeyCredentialConstants.h",
        "0.main.bundle.a9d68f5204cd3ac257b6.js",
        "tcp_seq.h",
        "https://www.hostgator.com/_next/static/chunks/60aafdb66a57b57b76936ce193fee053374e679c.cdd375bd63e4f4a5a41b.js",
        "GameKit.apinotes",
        "WKDownload.h",
        "TargetConditionals.h",
        "IOBluetoothUtilities.h",
        "cpuid_internal.h",
        "https://cdn.cookielaw.org/scripttemplates/6.32.0/otBannerSdk.js",
        "https://insurancerateusa.com/app-74647f151b541f3098c2.js",
        "OSKextLib.h",
        "WKUserScript.h",
        "https://connect.facebook.net/signals/config/3689470801106673?v=2.9.57&r=stable",
        "git_version.h",
        "WKPreviewActionItemIdentifiers.h",
        "GKPublicConstants.h",
        "SlotBuilder.ts",
        "https://aquanx.com/",
        "IOBluetoothPasskeyDisplay.h",
        "This website contains the details of an anti-virus scan conducted by the MetaDefender, which aims to identify and remove malware from websites, websites and social media sites, including Facebook, Twitter and YouTube.",
        "https://js.hs-analytics.net/analytics/1651860300000/6261317.js",
        "GCSteeringWheelElement.h",
        "ASPasskeyCredentialIdentity.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialProvider.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredentialProvider.h",
        "GKLeaderboardViewController.h",
        "Block.h",
        "IOPCIDevice.h",
        "https://www.google-analytics.com/gtm/optimize.js?id=OPT-NVZ8RF3",
        "GKSavedGameListener.h",
        "io.h",
        "gv.h",
        "WebKit.h",
        "dosish.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredentialRegistrationRequest.h",
        "machine_kpc.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialRegistration.h",
        "https://www.googletagmanager.com/gtm.js?id=GTM-NXS92NS",
        "https://www.ascio.com/wp-includes/js/dist/vendor/lodash.min.js?ver=4.17.19",
        "https://s.adroll.com/j/roundtrip.js",
        "sysctl.h",
        "pad.h",
        "xfe-URL-lodash.com-stix2-2.1-export.json",
        "https://www.googletagmanager.com/gtag/js?id=G-8M7FT2S1TV&l=dataLayer&cx=c",
        "https://bgp.net/wp-content/themes/multihost/framework/js/public/pace.min.js?ver=5.5.9",
        "https://abuse.ch/js/google-charts.js",
        "https://www.clarity.ms/eus2/s/0.6.34/clarity.js",
        "analytics.js",
        "AppleUSBDescriptorParsing.h",
        "GKLeaderboard.h",
        "https://ddailyworkouts.com/tip/dr-dtime.js.download",
        "GCDevice.h",
        "GKDefines.h",
        "GCSyntheticDeviceKeys.h",
        "MCError.h",
        "original dropped file discovery url",
        "https://cp.enom.com/responsive/_js/knockout-3.3.0.min.js",
        "KUNCUserNotifications.h",
        "http://alp-vision.com/wp-includes/css/dist/block-library/style.min.css?ver=5.7.6",
        "https://alpha99.raksmart.com/whmcs/assets/js/cookie-warn.js",
        "https://ddailyworkouts.com/tip/?art25=AP25CVA8",
        "xfe-IP-103.24.249.209-stix2-2.1-export.json",
        "WKPDFConfiguration.h",
        "https://cdn.optimizely.com/js/13477600374.js",
        "https://cp.enom.com/js/jquery.disableonsubmit.min.js"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "Turla Group, FIN7, APT34, APT28, DragonForce Malaysia Hacker Group, Indonesia Islamic Warriors Counc"
          ],
          "malware_families": [
            "Webtoolbar",
            "Osatomic",
            "Gc",
            "Vasaris",
            "Tente",
            "Bnm",
            "Trcomponent",
            "Srpanj",
            "Hj",
            "Rabu",
            "Blacknet rat",
            "Ver",
            "Vui",
            "Vd",
            "Reduceright",
            "Osreturn",
            "Internet",
            "Anda",
            "Xe",
            "Mediamagnet",
            "Wisdomeyes.16070401.9500",
            "Activedocument",
            "Slotbuilder",
            "Hammer",
            "Trojan:win32/tiggre",
            "Trojanspy",
            "Zfaoz",
            "Outubro",
            "Unruy",
            "Lh",
            "Maltiverse",
            "Wacatac",
            "Trackingclient",
            "Ovlcwm",
            "Requestbuilder"
          ],
          "industries": [
            "E-commerce"
          ],
          "unique_indicators": 146222
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/z.call",
    "whois": "http://whois.domaintools.com/z.call",
    "domain": "z.call",
    "hostname": "this.z.call"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 50,
  "pulses": [
    {
      "id": "68abf75bf3b03b94a6762409",
      "name": "(Repost) How to connect listeners to e.intercom | serverhub.com eonix.net",
      "description": "",
      "modified": "2025-08-25T05:40:43.552000",
      "created": "2025-08-25T05:40:43.552000",
      "tags": [
        "context",
        "error",
        "ajaxupdate",
        "request",
        "requestdata",
        "name",
        "xoctoberassets",
        "datarequest",
        "typesubmit",
        "typetext",
        "click",
        "function",
        "typeof c",
        "bootstrap",
        "javascript",
        "azaz",
        "popover",
        "typeof f",
        "typeof g",
        "typeof h",
        "vui",
        "anda",
        "tente",
        "outubro",
        "trackingclient",
        "srpanj",
        "rabu",
        "vasaris",
        "image",
        "typeof atrkopts",
        "800px",
        "40px",
        "i18n",
        "blockedemail",
        "typeof i18n",
        "hubspot",
        "captcha",
        "date",
        "please",
        "april",
        "august",
        "close",
        "february",
        "june",
        "form",
        "klik",
        "download",
        "window",
        "this",
        "next",
        "null",
        "blank",
        "este",
        "anna",
        "rserver",
        "mais",
        "void",
        "object",
        "typeerror",
        "array",
        "symbol",
        "bound",
        "typeof window",
        "typeof t",
        "invalid path",
        "unknown method",
        "phonenumber",
        "ninja",
        "typeof e",
        "edge",
        "dataname",
        "intercom",
        "typeof symbol",
        "apple",
        "webkiti",
        "criosi",
        "trident"
      ],
      "references": [
        "xfe-URL-Eonix.net-stix2-2.1-export.json",
        "xfe-URL-Serverhub.com-stix2-2.1-export.json",
        "xfe-URL-Enom.com-stix2-2.1-export 2.json",
        "https://widget.intercom.io/widget/rbc8ok9w",
        "https://js.hscollectedforms.net/collectedforms.js",
        "https://js.hsleadflows.net/leadflows.js",
        "https://d31qbv1cthcecs.cloudfront.net/atrk.js",
        "https://serverhub.com/combine/a059fe7a562c0b582328162f0ee69fda-1426025688",
        "https://serverhub.com/modules/system/assets/js/framework.js",
        "https://js.hs-scripts.com/3844463.js",
        "xfe-URL-Cloudfront.net-stix2-2.1-export.json",
        "xfe-URL-Intercom.io-stix2-2.1-export.json"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Vui",
          "display_name": "Vui",
          "target": null
        },
        {
          "id": "Outubro",
          "display_name": "Outubro",
          "target": null
        },
        {
          "id": "Tente",
          "display_name": "Tente",
          "target": null
        },
        {
          "id": "Anda",
          "display_name": "Anda",
          "target": null
        },
        {
          "id": "Vasaris",
          "display_name": "Vasaris",
          "target": null
        },
        {
          "id": "Rabu",
          "display_name": "Rabu",
          "target": null
        },
        {
          "id": "Srpanj",
          "display_name": "Srpanj",
          "target": null
        },
        {
          "id": "TrackingClient",
          "display_name": "TrackingClient",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "62719a4dec6d0aa4631b9b2f",
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5708,
        "hostname": 1541,
        "FileHash-SHA256": 876,
        "domain": 915,
        "CVE": 1,
        "FileHash-MD5": 1
      },
      "indicator_count": 9042,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "237 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "67f33233092ab19b74879403",
      "name": "MacOS M2 Chip Infiltration: Game Center & XBOX Pod Game & Chat Server",
      "description": "pulse explores a variety of files, objects, and functions that could be associated with different system components, libraries, and protocols. It highlights a wide range of potential vulnerabilities that may exist in software related to system functions, APIs, data handling, and device interactions, including issues in devices like game controllers, HID devices, and platform-specific services (such as Apple and Android). The pulse references several components across different platforms (macOS, iOS, ARM architectures, and others), with a focus on low-level code, encryption libraries, system utilities, and network protocols like TCP, IP, and Bluetooth. The identified vulnerabilities could involve buffer overflows, deprecated functions, improper memory handling, and potential exploit vectors related to system security, performance, and integrity.",
      "modified": "2025-05-07T02:03:20.735000",
      "created": "2025-04-07T02:02:27.322000",
      "tags": [
        "helper macro",
        "param",
        "param inccache",
        "kerberos",
        "ccache",
        "api function",
        "ccapi",
        "api version",
        "param ioccache",
        "ccacheserver",
        "win32",
        "null",
        "code",
        "win64",
        "error",
        "union",
        "ccapideprecated",
        "ccacheapi",
        "ccapiv2h",
        "apple",
        "export",
        "united",
        "ccache api",
        "cplusplus",
        "x8664",
        "typedef",
        "patheq",
        "none",
        "popen",
        "terminate",
        "false",
        "winenv",
        "winexe",
        "frozen",
        "winservice",
        "python",
        "posixthreads",
        "pyhavecondvar",
        "ntthreads",
        "vista",
        "pyemulatedwincv",
        "ntddivista",
        "semaphore",
        "pycondt",
        "win7",
        "pybuildcore",
        "fall",
        "copyright",
        "technology",
        "all rights",
        "reserved",
        "america",
        "government",
        "within that",
        "klprincipal",
        "klloginoptions",
        "inpassword",
        "klboolean",
        "klindex inindex",
        "login",
        "klstatus",
        "kerberos login",
        "inst",
        "regexp",
        "typeof e",
        "function",
        "typeof t",
        "typeof o",
        "width",
        "typeof",
        "pseudo",
        "body",
        "sticky",
        "date",
        "class",
        "this",
        "void",
        "accept",
        "span",
        "krb5callconv",
        "apoptsreserved",
        "tktflgreserved",
        "kdcoptreserved",
        "krb5data",
        "eblock",
        "krb5address",
        "krb5keyblock",
        "service",
        "realm",
        "format",
        "general",
        "internal",
        "entropy",
        "mask",
        "mcpeerid",
        "mcsession",
        "property",
        "protocol",
        "create",
        "nsuinteger",
        "notifies",
        "mcsession api",
        "interface",
        "bonjour",
        "ascii lowercase",
        "abc company",
        "section",
        "bonjour txt",
        "mcextern",
        "attribute",
        "mcextern extern",
        "mcexternweak",
        "nsenum",
        "nsinteger",
        "mcerrorcode",
        "mcerrorunknown",
        "mcerrortimedout",
        "bonjour apis",
        "stop",
        "peer",
        "example",
        "tags",
        "session",
        "nsprogress",
        "nserror",
        "nsstring",
        "nsurl",
        "nsarray",
        "note",
        "ui element",
        "utf8 encoding",
        "nscopying",
        "nsdictionary",
        "webpackrequire",
        "webpackexports",
        "object",
        "adobe systems",
        "adobe",
        "incorporated",
        "dissemination",
        "touchmove",
        "window",
        "launch",
        "close",
        "core",
        "webview",
        "nwebpackrequire",
        "arraybuffer",
        "name",
        "typedarray",
        "prototype",
        "string",
        "number",
        "nvar",
        "meta",
        "infinity",
        "generator",
        "zero",
        "epsilon",
        "observer",
        "android",
        "freeze",
        "trim",
        "canvas",
        "simple",
        "bind",
        "fast",
        "next",
        "patch",
        "rest",
        "middle",
        "find",
        "enumerate",
        "facebook",
        "executor",
        "apiunavailable",
        "gamecontroller",
        "gcbuttoninput",
        "gcswitchinput",
        "nsobject",
        "apiavailable",
        "hid device",
        "cfstr",
        "iohiddeviceref",
        "boolean value",
        "c iohidmanager",
        "iohidmanager",
        "c iohiddevice",
        "issequential",
        "bool sequential",
        "bool canwrap",
        "nsset",
        "nsunavailable",
        "gcswitchelement",
        "bool",
        "share button",
        "xbox controller",
        "xbox elite",
        "xbox series",
        "gcxboxgamepad",
        "gcpoint2",
        "gcpoint2make",
        "gcpoint2 p",
        "cfinline bool",
        "gcpoint2equal",
        "gcpoint2 point1",
        "gcpoint2 point2",
        "gcrelativeinput",
        "isanalog",
        "bool analog",
        "hasinclude",
        "gcaxis2dinput",
        "gcpoint2 value",
        "gcaxiselement",
        "certain",
        "gcaxisinput",
        "gcbuttonelement",
        "gccontroller",
        "nsnotification",
        "chhapticengine",
        "gcmicrogamepad",
        "input",
        "menu button",
        "gcdevicelight",
        "gccolor",
        "x axis",
        "xvalue",
        "developers",
        "functionality",
        "options button",
        "sf symbols",
        "elements",
        "gcdevice",
        "gctouchstate",
        "gctouchstateup",
        "apideprecated",
        "gckeyboard",
        "gcmouse",
        "nsswiftname",
        "gcdevicebattery",
        "battery level",
        "direction pad",
        "directionapad",
        "thumbstick",
        "gcdevicecursor",
        "a controller",
        "gccolor color",
        "gcinputbuttona",
        "gcinputbuttonb",
        "button b",
        "check",
        "a element",
        "c nil",
        "nsenumerator",
        "siri remote",
        "equivalent",
        "down",
        "left",
        "right",
        "kindof",
        "handle button",
        "c device",
        "immediate input",
        "dualsense",
        "positional",
        "sony dualsense",
        "gcmotion",
        "dualshock",
        "uievent",
        "controllers",
        "uikit user",
        "uiview",
        "method",
        "nsdata",
        "axes",
        "nsdata source",
        "return",
        "nullable",
        "nsdata object",
        "button",
        "shoulder",
        "extended",
        "gamepad profile",
        "nsdata api",
        "gcgamepad",
        "sizeof",
        "standard",
        "gckeyboardinput",
        "keyboard",
        "nsstring const",
        "controller",
        "back buttons",
        "game controller",
        "back",
        "keypad",
        "delete",
        "insert",
        "home",
        "right arrow",
        "left arrow",
        "down arrow",
        "up arrow",
        "korean",
        "backspace",
        "alongside",
        "gckeyuparrow",
        "gckeycode const",
        "lang1",
        "gclinearinput",
        "gcquaternion",
        "gcacceleration",
        "y axis",
        "z axis",
        "gcmouse mouse",
        "gcmouse class",
        "mice",
        "gcmouseinput",
        "mouse profile",
        "scroll",
        "nsdata instance",
        "a alias",
        "press",
        "micro profile",
        "siri remotes",
        "b button",
        "a gcinput",
        "button a",
        "nsoptions",
        "examining",
        "c sfsymbolsname",
        "apple tv",
        "remote",
        "control center",
        "a set",
        "game",
        "gcracingwheel",
        "gcbundlewithpid",
        "gcinputbuttonx",
        "gcinputbuttony",
        "gcinputshifter",
        "gckeya",
        "gckeyb",
        "gckeybackslash",
        "rawvalue",
        "apple swift",
        "o librarylevel",
        "swift import",
        "element",
        "indices",
        "iterator",
        "subsequence",
        "kerberoscomerr",
        "const",
        "permission",
        "mit software",
        "suitability",
        "athena",
        "openvision",
        "gssdllimp",
        "gssapigenerich",
        "this software",
        "purpose",
        "disclaims all",
        "warranties with",
        "regard to",
        "constraint",
        "kerberosprofile",
        "krb5profileh",
        "const names",
        "newvalue",
        "1429577728l",
        "gnuc",
        "mach",
        "omuint32",
        "gssapikrb5h",
        "form",
        "uid form",
        "client function",
        "asrep",
        "including",
        "preauth",
        "db entry",
        "free",
        "pointer",
        "rock",
        "neither",
        "direct",
        "damage",
        "minorstatus",
        "gssbuffert",
        "gssctxidt",
        "gssoid",
        "gssnamet",
        "gsscredidt",
        "gssoidset",
        "gssapi",
        "first",
        "alcapi",
        "alcapientry",
        "alcboolean",
        "targetosmac",
        "alcdevice",
        "alcenum param",
        "alalch",
        "alcchar",
        "alcsizei",
        "capture",
        "but not",
        "limited",
        "openal cross",
        "apple computer",
        "redistribution",
        "is provided",
        "type",
        "alvoid",
        "alint",
        "openal",
        "aluint sid",
        "alenum",
        "alint value",
        "aluint property",
        "alvoid nonnull",
        "alfloat",
        "write",
        "openalopenalh",
        "umbrella header",
        "alenum param",
        "alapi",
        "aluint bid",
        "alsizei",
        "alfloat value",
        "alapientry",
        "aluint",
        "verify",
        "play",
        "speed",
        "bits",
        "albuffer3i",
        "albufferdata",
        "albufferf",
        "albufferfv",
        "albufferi",
        "albufferiv",
        "aldistancemodel",
        "aldopplerfactor",
        "algetbooleanv",
        "algetbuffer3f",
        "iousbhostdevice",
        "iousbhostobject",
        "iousbhostpipe",
        "iousbhoststream",
        "iousbhost",
        "brief",
        "usb host",
        "bool yes",
        "bool no",
        "advance",
        "iousbhostfamily",
        "kernel",
        "ioreturn status",
        "nsnumber",
        "ioreturn error",
        "usb device",
        "select",
        "commands",
        "enqueue",
        "nsmutabledata",
        "field",
        "enum",
        "options",
        "retrieve",
        "iosource",
        "current address",
        "bos descriptor",
        "extract",
        "a descriptor",
        "license",
        "io request",
        "abort",
        "discussion",
        "stream",
        "please",
        "swift api",
        "iousbbitrange",
        "iousbbitrange64",
        "iousbbit",
        "client",
        "usb controller",
        "usb descriptor",
        "unknown",
        "critical",
        "refer",
        "link",
        "send",
        "same",
        "common ui",
        "bluetooth",
        "service browser",
        "option",
        "1001",
        "cfstringref",
        "deprecated",
        "macos",
        "returns",
        "abstract",
        "nswindow",
        "creates",
        "mac os",
        "uuids",
        "uuid",
        "sdp service",
        "nsimage",
        "nsview",
        "mpasskeystring",
        "nsmutablearray",
        "uuid array",
        "ioreturn",
        "runmodal",
        "group",
        "command",
        "byte",
        "masks",
        "pduid",
        "l2cap",
        "range",
        "opcode",
        "packet",
        "major",
        "local",
        "profiles",
        "iobluetooth",
        "framework",
        "support",
        "host controller",
        "rfcomm",
        "minor class",
        "pseudoclass",
        "specific device",
        "headset",
        "peripheral",
        "desktop",
        "glasses",
        "device reset",
        "no hci",
        "hci controller",
        "returns number",
        "variable number",
        "packdata",
        "cstring",
        "pass",
        "path",
        "deprecated in",
        "obex session",
        "obexsessionref",
        "rfcomm channel",
        "obex",
        "does not",
        "l2cap channel",
        "inrefcon",
        "device",
        "length",
        "obex spec",
        "error code",
        "make",
        "headerid",
        "april",
        "alarm",
        "avrcplog",
        "audiolog",
        "bccmd16touint16",
        "bccmd16touint8",
        "bccmd32touint32",
        "hfplog",
        "obexcreatevcard",
        "obexsessionget",
        "uint16tobccmd16",
        "intents",
        "created",
        "andrea gottardo",
        "inimage",
        "intentsui",
        "project version",
        "inshortcut",
        "ibdesignable",
        "invoiceshortcut",
        "nsbundle",
        "siri",
        "beralloct",
        "berbvarrayadd",
        "berbvarrayfree",
        "berbvdup",
        "berbvecadd",
        "berbvecfree",
        "berbvfree",
        "berdump",
        "berdup",
        "berdupbv",
        "ldap",
        "vdspinput1",
        "vectorsize",
        "iirchannel",
        "osvkerndsplib",
        "pragmaonce",
        "paul chang",
        "fri mar",
        "original code",
        "apple operating",
        "modifications",
        "apple public",
        "source license",
        "version",
        "lframesize",
        "i386",
        "picify",
        "callmcount",
        "nonlazystub",
        "align",
        "roundtostack",
        "leaf",
        "import",
        "carnegie mellon",
        "carnegie",
        "inline void",
        "software",
        "school",
        "august",
        "xnuarchi386selh",
        "next computer",
        "mike demoney",
        "bruce martin",
        "state segment",
        "nxswappedfloat",
        "osswapint32",
        "inline float",
        "inline double",
        "osswapint64",
        "armlimitsh",
        "arm64",
        "useclangtypes",
        "bsdarmtypesh",
        "int8t",
        "gnuc typedef",
        "uint8t",
        "ansi c",
        "ansi",
        "use wchart",
        "armmcontexth",
        "mcontextt",
        "armparamh",
        "round",
        "darwinsizet",
        "darwinalign",
        "uint32t",
        "darwinalign32",
        "warranties",
        "a particular",
        "university",
        "armarch6zk",
        "armarch6k",
        "armarch4t",
        "armarch4",
        "http",
        "capbitnb",
        "legacy",
        "armfeatureflag",
        "california",
        "notice",
        "berkeley",
        "limited to",
        "define",
        "useclanglimits",
        "lp64",
        "ansisource",
        "darwincsource",
        "longmin",
        "ulongmax",
        "parameter",
        "vmmemcoherent",
        "vmmemearlyack",
        "vmmeminner",
        "vmmemrt",
        "vmmemguarded",
        "armmemorytypesh",
        "armpalroutinesh",
        "read",
        "struct",
        "booleant",
        "cluster",
        "devbsize",
        "mclbytes",
        "unix system",
        "laboratories",
        "devbshift",
        "thumb",
        "armv5",
        "armv7",
        "cache",
        "neon",
        "swift",
        "bsdarmprofileh",
        "xxx todo",
        "block",
        "mcount",
        "mcountinit",
        "mcountenter",
        "splhigh",
        "armthreadh",
        "armtraph",
        "dflssiz",
        "targetososx",
        "maxssiz",
        "rliminfinity",
        "maxcsiz",
        "bsdarmvmparamh",
        "dfldsiz",
        "maxdsiz",
        "xxx stack",
        "armsignal",
        "int64t",
        "armmachtypesh",
        "int32t",
        "methods",
        "thread",
        "hasapplepac",
        "atmatmtypesh",
        "libkernlocksh",
        "fortifysource",
        "libkerncopyioh",
        "sizedby",
        "darwinosinline",
        "stdcversion",
        "osswapint16",
        "libkerncrch",
        "blockexport",
        "vaargs",
        "blockrelease",
        "blockh",
        "collection",
        "blockcopy",
        "ososbaseh",
        "base",
        "byteoffset",
        "host endianess",
        "generic host",
        "generic",
        "osmalloc",
        "osmalloctag tag",
        "osmalloctag",
        "pci device",
        "uint32",
        "uint32 mask",
        "safecastptr",
        "sint32",
        "osaddatomic64",
        "uint8",
        "libkern c",
        "internal error",
        "core osreturn",
        "libkern",
        "values",
        "pragmamark",
        "kexts",
        "kext",
        "c string",
        "grab",
        "osostypesh",
        "boolean",
        "unsignedwide",
        "uint32 hi",
        "buildtime value",
        "libkernversionh",
        "versionmajor",
        "versionminor",
        "versionvariant",
        "versionrevision",
        "ostype",
        "osrelease",
        "libkernsysctlh",
        "instructions",
        "data cache",
        "future",
        "rbleft",
        "rbright",
        "rbgetparent",
        "splayright",
        "splayleft",
        "rbsetcolor",
        "rbblack",
        "rbgetcolor",
        "comp",
        "main",
        "stdc",
        "msdos",
        "windows",
        "sys16bit",
        "zlibdll",
        "zextern",
        "zconfh",
        "model",
        "zextern int",
        "zstreamerror",
        "znull",
        "zbuferror",
        "zmemerror",
        "zstreamend",
        "zdataerror",
        "zfinish",
        "enough",
        "possible",
        "trailer",
        "compiler",
        "countedby",
        "sparta",
        "osatomic",
        "ipcipctypesh",
        "ipcobjectnull",
        "ipcobjectdead",
        "osreturn",
        "nfskrpch",
        "xdrbuf",
        "xdrbuf xbp",
        "xbptr",
        "xbleft",
        "tlen",
        "lval",
        "xbcleanup",
        "xbtype",
        "xbflags",
        "nfsargsversion",
        "file",
        "packed",
        "nfshz",
        "mount",
        "term",
        "restrict",
        "stats",
        "nfsbitmapset",
        "nfsver3",
        "nfsxunsigned",
        "attr",
        "nfsprogram",
        "nfssmallfh",
        "which",
        "from",
        "mark",
        "obsolete",
        "ip address",
        "iaddrt",
        "netinetbootph",
        "nvmaxtext",
        "magic",
        "etheraddrlen",
        "target",
        "byteorder",
        "bigendian",
        "littleendian",
        "dest",
        "igmp",
        "ushort",
        "inpcbptr",
        "inpcblistentry",
        "ipsec",
        "pcbs",
        "cookie",
        "netinetinstath",
        "minimal",
        "result",
        "arp packet",
        "icmpparamprob",
        "icmpredirect",
        "address",
        "ditto",
        "ip filter",
        "ipv4",
        "ip packet",
        "inject",
        "wifi",
        "server",
        "tcpmaxnotifyack",
        "wired",
        "ecn setup",
        "notify",
        "slow",
        "definitions",
        "tcptmax",
        "retransmit",
        "mptcp",
        "tcpsclosewait",
        "tcpsestablished",
        "tcpstimewait",
        "tcpseq",
        "timer drift",
        "sack",
        "char",
        "icmp",
        "synack",
        "tcpoptnop",
        "syndata",
        "ver",
        "internet",
        "iopcidevice",
        "constant",
        "perst",
        "localonly",
        "iooptionbits",
        "optional access",
        "ioservice",
        "open",
        "pcidriverkith",
        "osmetaclassbase",
        "iorpc rpc",
        "auditpipeiobase",
        "auditsdeviobase",
        "ioctls",
        "data",
        "the software",
        "stdargh",
        "hasincludenext",
        "eli friedman",
        "as is",
        "hack",
        "atomic",
        "atomicseqcst",
        "clangstdatomich",
        "stdchosted",
        "stdboolh",
        "needwintt",
        "stddefh",
        "hasbuiltin",
        "const src",
        "xnumembersize",
        "const dst",
        "wcharmax",
        "wcharmin",
        "limits",
        "kernelstdinth",
        "lp64 typedef",
        "intmaxc",
        "uintmaxc",
        "ptrauth",
        "olddata",
        "value",
        "declkey",
        "abi pointer",
        "c function",
        "float16",
        "fltevalmethod",
        "legacy bsd",
        "c standard",
        "sincospi",
        "cosp",
        "x8664monotonich",
        "staticifentry",
        "hasmte",
        "vmmemorytypesh",
        "vmwimgdefault",
        "wimg",
        "extvectortype",
        "utilfunction",
        "aligned",
        "srcptr",
        "vmpmaph",
        "vmdyldpagerh",
        "vmvmfaulth",
        "vmvmmaph",
        "development",
        "debug",
        "vmvmoptionsh",
        "vmvmpageouth",
        "kasantbi",
        "machvmmemtagh",
        "given",
        "vmmemtagptrsize",
        "vmmemtagtagsize",
        "copy",
        "vmsharedregionh",
        "vfsvfssupporth",
        "veclib",
        "master",
        "world wide",
        "various",
        "veclibtypes",
        "carbonlib",
        "availability",
        "carbon",
        "noncarbon cfm",
        "vbasicops",
        "shift",
        "vforceh",
        "vdsplength n",
        "realp",
        "nonnull",
        "vector",
        "dspsplitcomplex",
        "ieee",
        "dspcomplex",
        "uuiduuidh",
        "uuiddefine",
        "public",
        "uuid library",
        "kernelserver",
        "simpleroutine",
        "undkey",
        "execution",
        "strings array",
        "user",
        "title string",
        "info",
        "1024",
        "xmldatat",
        "undreplyref",
        "kernsuccess",
        "osaction",
        "targetosiphone",
        "istargetvendor",
        "targetcpux8664",
        "targetosunix",
        "targetcpuppc",
        "targetcpuppc64",
        "targetcpux86",
        "targetrtmaccfm",
        "bridge",
        "svflags",
        "svpavreal",
        "svpavreify",
        "xpvav",
        "svany",
        "avfillp",
        "for apidoc",
        "mutableav",
        "avrealoff",
        "pltopenv",
        "stmtstart",
        "stmtend",
        "copfile",
        "plcurstackinfo",
        "copfilegv",
        "cophinthashget",
        "loop",
        "stack",
        "beware",
        "orig",
        "loops",
        "this file",
        "the build",
        "plbitcount",
        "u8 value",
        "cvflags",
        "xpvcv",
        "mutableptr",
        "perlcore",
        "cvgv",
        "cvfile",
        "cvfmethod",
        "cvflvalue",
        "cvfconst",
        "anon",
        "doinit extconst",
        "ebcdic",
        "extconst u8",
        "index",
        "ascii platform",
        "confusingly",
        "u8 pla2e",
        "pla2e",
        "u8 ple2a",
        "guard",
        "declspec",
        "extconst",
        "ext externc",
        "init",
        "larry wall",
        "gnu general",
        "readme file",
        "multiplicity",
        "plsawampersand",
        "do not",
        "perliogetc",
        "perlioputc",
        "perliostdoutf",
        "perlio",
        "perlfeatureh",
        "featuresubbit",
        "featuremyrefbit",
        "featurefcbit",
        "featureisabit",
        "featuresaybit",
        "featurestatebit",
        "featuretrybit",
        "hintfeaturemask",
        "ffspace",
        "process",
        "ffdecimal",
        "ffend",
        "gvgp",
        "gvflags",
        "gvnamehek",
        "svtype",
        "gvegv",
        "gvstash",
        "gvxpvgv",
        "svtpvgv",
        "svtpvlv",
        "super",
        "edit directly",
        "djgpp",
        "bitbucket",
        "perlsysinitbody",
        "perlioinit",
        "perlsystermbody",
        "w macros",
        "wexitstatus",
        "shpath",
        "mkdir",
        "rotl64",
        "rotl32",
        "rotate x",
        "rotr32",
        "can64bithash",
        "rotr64",
        "ivsize",
        "u8to16le",
        "rotluv",
        "rotruv",
        "sbox32maxlen",
        "plhashstate",
        "perlhash",
        "perl",
        "usehashseed",
        "perlseenhvfunch",
        "perlhashseed",
        "siphash24",
        "siphash13",
        "seed",
        "c program",
        "c type",
        "c compiler",
        "gcc attribute",
        "longsize",
        "c preprocessor",
        "install",
        "kill",
        "cont",
        "thus",
        "ext declspec",
        "dext",
        "for apidocitem",
        "utf8",
        "ascii",
        "fitsin8bits",
        "nativetolatin1",
        "strwithlen",
        "u8 end",
        "test",
        "poison",
        "february",
        "cray",
        "prior",
        "behaviour",
        "except",
        "alpha",
        "perlvar",
        "perlvari",
        "perlvara",
        "padoffset",
        "true",
        "pmop",
        "hooks",
        "hook",
        "sv invlist",
        "perlinregcompc",
        "svcur",
        "perlinopc",
        "tointernalsize",
        "svtinvlist",
        "invlistlen",
        "strlen",
        "hvaux",
        "heklen",
        "svook",
        "hekutf8",
        "hekkey",
        "hekflags",
        "mutablehv",
        "hvnameheknn",
        "gosh",
        "leave",
        "iperlsock",
        "plsock",
        "iperlstdio",
        "plstdio",
        "iperlproc",
        "plproc",
        "iperllio",
        "pllio",
        "perlimplicitsys",
        "plink",
        "keypackage",
        "keyend",
        "keysub",
        "keydump",
        "keylog",
        "keysend",
        "keystate",
        "perlioclose",
        "perlmemcollxfrm",
        "nativetoneed",
        "plclocaleobj",
        "plno",
        "plwarnall",
        "plwarnnone",
        "plyes",
        "plzero",
        "plc9utf8dfatab",
        "nomathoms",
        "perlintokec",
        "perlinutf8c",
        "perlinsvc",
        "perlinregexecc",
        "debugging",
        "perlinlocalec",
        "pfinet",
        "snoop",
        "ccprint",
        "ccgraph",
        "cccharnamecont",
        "ccascii",
        "ccwordchar",
        "ccalphanumeric",
        "ccidfirst",
        "ccquotemeta",
        "ccalpha",
        "cccased",
        "ordinal",
        "magicvtablemax",
        "extra",
        "regex match",
        "env hash",
        "isa array",
        "debugger",
        "sig hash",
        "available",
        "shadow",
        "array length",
        "magic mg",
        "sv sv",
        "mgftainteddir",
        "hefsvkey",
        "mutablesv",
        "ssizet",
        "mgvtbl entry",
        "mgfbytes",
        "perlmagicsv 0",
        "special",
        "perlmagicarylen",
        "perlmagicrhash",
        "extra data",
        "perlmagicpos",
        "perlmagicsymtab",
        "provides",
        "dtrace probes",
        "stdioh",
        "stdioincluded",
        "sfioversion",
        "rxfpmfcharset",
        "rxfpmfmultiline",
        "rxfpmffold",
        "rxfpmfextended",
        "rxfpmfnocapture",
        "rxfpmfkeepcopy",
        "flags",
        "rxfpmfstrict",
        "ocshift",
        "plop",
        "perlbitfield16",
        "baseop op",
        "useithreads",
        "pmfonce",
        "padop",
        "perlcknull",
        "perlckfun",
        "opparg1mask",
        "opparg4mask",
        "opparg2mask",
        "perlckftst",
        "perlppftrowned",
        "perlckbitop",
        "perlckcmp",
        "perlcklfun",
        "dump",
        "chroot",
        "syscall",
        "flip",
        "undef",
        "crypt",
        "push",
        "stub",
        "trans",
        "predec",
        "flop",
        "prtf",
        "shutdown",
        "perlcontext cx",
        "perlmemlog",
        "c pointer",
        "cxtype",
        "logic",
        "toavamg",
        "tohvamg",
        "opftrread",
        "oplt",
        "opincmp",
        "opbitand",
        "opsbitor",
        "opsend",
        "opgetpeername",
        "opfteexec",
        "opftbinary",
        "opclose",
        "plparser",
        "yylex",
        "lexshared",
        "position",
        "repl",
        "memsize",
        "malloct",
        "perlmallocctlh",
        "uv nfree",
        "uv ntotal",
        "iv topbucket",
        "iv totalsbrk",
        "iv minbucket",
        "level",
        "plcomppad",
        "plcurpad",
        "uvxf",
        "ptr2uv",
        "avarray",
        "padnameflags",
        "plcopseqmax",
        "padlistarray",
        "c array",
        "padnametype",
        "incpushperl5lib",
        "appllibexp",
        "privlibexp",
        "defineincmacros",
        "perlfsversion",
        "perl5lib",
        "sitearchexp",
        "perllanginfoh",
        "hasnllanginfo",
        "ilanginfo",
        "codeset",
        "codeset 1",
        "dtfmt",
        "dtfmt 2",
        "dfmt",
        "dfmt 3",
        "sipround",
        "u8to64le",
        "fallthrough",
        "uint64c",
        "perlsiphashfnc",
        "siprounds",
        "strlen inlen",
        "sipfinalrounds",
        "could",
        "configure",
        "plout",
        "mine001",
        "argv",
        "plin",
        "localpatchcount",
        "perlapih",
        "xs code",
        "portingglossary",
        "first version",
        "brand",
        "symbols",
        "haswcrtomb",
        "perlionotstdio",
        "perlcallconv",
        "perlio f",
        "perlioh",
        "usestdio",
        "case",
        "bufsiz",
        "sizet",
        "perlstability",
        "perltypedefs",
        "perldtracehin",
        "perlloadedfile",
        "perlloadingfile",
        "perlopentry",
        "perlphasechange",
        "perlsubentry",
        "perlsubreturn",
        "generated",
        "perlcallconv iv",
        "sizet count",
        "sv arg",
        "mode",
        "perliofuncs tab",
        "stdchar",
        "perliolistt",
        "sv args",
        "mutex",
        "perlinterpreter",
        "sigsize",
        "perlioisstdio",
        "perlcallconv op",
        "perldokv",
        "perlppaassign",
        "perlppabs",
        "perlppaccept",
        "perlppadd",
        "perlppaeach",
        "perlppaelem",
        "public license",
        "free software",
        "foundation",
        "yydebug",
        "bison",
        "bareword",
        "funcmeth",
        "arrow",
        "targ",
        "pushs",
        "tops",
        "does",
        "xsub",
        "pops",
        "xpushs",
        "erange",
        "perlreentrapi",
        "perlreentrapi0",
        "hostentsize",
        "getgrentrproto",
        "getpwentrproto",
        "getnetentrproto",
        "grentbuffer",
        "grentsize",
        "hostenterrno",
        "redebugflag",
        "debugvtest",
        "debugr",
        "u16 nextoff",
        "argset",
        "u8 type",
        "nextoff",
        "strings",
        "problem",
        "june",
        "invert",
        "perlfpclass",
        "longdoublekind",
        "plstatusvalue",
        "pldebug",
        "numclasses",
        "locale",
        "grok",
        "pragma",
        "dword",
        "attack",
        "little",
        "lynx",
        "done",
        "reany",
        "rxpextflags",
        "rxextflags",
        "checkpoint cp",
        "rxftaintedseen",
        "rxfcopydone",
        "plsavestackix",
        "plsavestack",
        "plsavestackmax",
        "ssmaxpush",
        "enter",
        "debugscope",
        "state",
        "u32 state",
        "debugsbox32hash",
        "sbox32warn5",
        "line",
        "mutexunlock",
        "mutexinit",
        "noop",
        "mutexlock",
        "condinit",
        "detach",
        "panic",
        "usetm64",
        "should",
        "bsd extension",
        "configuration",
        "time64debug",
        "int64t nv",
        "gnu extension",
        "perltime64h",
        "time64t",
        "int64t int64",
        "int64 time64t",
        "i32 year",
        "tm64",
        "hastmtmgmtoff",
        "decide",
        "svpvx",
        "svgmagic",
        "bonk",
        "anything",
        "turn",
        "crash",
        "fstat",
        "perlmicro",
        "hasioctl",
        "hasutime",
        "hasgroup",
        "haspasswd",
        "usemybinmode",
        "idirent",
        "likely",
        "generated code",
        "utfebcdic",
        "unicode",
        "step",
        "ufeff",
        "u00a0",
        "u00df",
        "u00b5",
        "ufffd",
        "u017f",
        "u0300",
        "unlikely",
        "nativeutf8toi8",
        "utf8skip",
        "nativetouni",
        "lazy",
        "extrasize",
        "regnodemax",
        "exact",
        "match",
        "whilem",
        "anyof",
        "curly",
        "trie",
        "curlym",
        "eval",
        "star",
        "perlutilh",
        "hsmapiverlen",
        "hsxsverlenmax",
        "hskeyp",
        "tools",
        "sv vs",
        "perlversionlt",
        "svpvxnolenconst",
        "perlckwarner",
        "u32 err",
        "scroakxsusage",
        "pluumap",
        "warnings",
        "categories",
        "plcurcop",
        "perlckwarn",
        "perlckwarnd",
        "perlwarnisset",
        "perlwarnoff",
        "perlwarnbit",
        "xsversion",
        "xsreturn",
        "perlxshandshake",
        "plstackbase",
        "hskey",
        "zaphod32mix",
        "u8to32le",
        "zaphod32warn4",
        "zaphod32warn3",
        "zaphod32warn6",
        "perlform",
        "i8tonativeutf8",
        "warnutf8",
        "myshift",
        "c extension",
        "libs",
        "cflags",
        "afkuserlog",
        "kafkeventcancel",
        "kafkeventerror",
        "adamsbagmanager",
        "adjinglerequest",
        "isinternalbuild",
        "kickmcxdforuid",
        "loadappkit",
        "ardconfig",
        "authenticator",
        "dsauthenticator",
        "dsnode",
        "dsrecord",
        "hostconfig",
        "addtofront",
        "calcslope",
        "copyarray",
        "createcachenode",
        "defaultebecurve",
        "deletecache",
        "disablehcucache",
        "dumpcache",
        "dumpoutputhcu",
        "enablet1sim",
        "ascagent",
        "ascagentproxy",
        "asdevice",
        "ddrangecompare",
        "wdosloglauncher",
        "wdoslogprotocol",
        "findchar",
        "ddasllogger",
        "ddfilelogger",
        "ddlog",
        "ddlogfileinfo",
        "ddlogmessage",
        "ddloggernode",
        "mkurlparser",
        "mkerrordomain",
        "mkintegerhash",
        "mklonghash",
        "mkmaprectinset",
        "mkmaprectnull",
        "mkmaprectoffset",
        "mkmaprectworld",
        "mkmapsizeworld",
        "kextensionnonui",
        "wkarraycreate",
        "wkbooleancreate",
        "wkcontextcreate",
        "wkdatacreate",
        "wkdatagettypeid",
        "wkdoublecreate",
        "wkframecopyurl",
        "wkgettypeid",
        "wkimagecreate",
        "wkpagecandelete",
        "webkit",
        "methodkind",
        "wkerrordomain",
        "by apple",
        "document",
        "a block",
        "wkcontentworld",
        "wkwebview",
        "javascript",
        "wkerrorcode",
        "wkerrorunknown",
        "nsswiftasync",
        "wkswiftasync",
        "wkcookiepolicy",
        "nshttpcookie",
        "whether",
        "wknavigation",
        "wkdownload",
        "decides",
        "mime type",
        "wkscriptmessage",
        "wkframeinfo",
        "information",
        "url scheme",
        "wkcontentmode",
        "wkuserscript",
        "wkextern",
        "media",
        "promise",
        "fulfill",
        "cgfloat",
        "targetoswatch",
        "sign",
        "password",
        "provider",
        "uicontrol",
        "nscontrol",
        "opaque user",
        "apple id",
        "nsstring user",
        "asuseragerange",
        "initiate",
        "asauthorization",
        "confirms",
        "apple upgrade",
        "nserrorenum",
        "operation",
        "relying party",
        "targetosvision",
        "a byte",
        "nsdata userid",
        "relying",
        "a string",
        "asapiavailable",
        "http response",
        "authorization",
        "oauth",
        "saml",
        "nsdata readdata",
        "bool didwrite",
        "a cose",
        "nsstring name",
        "bool appid",
        "targetosxr",
        "a state",
        "a json",
        "web token",
        "private seckeys",
        "nsstring appid",
        "mdm profile",
        "nsurl url",
        "returns yes",
        "lacontext",
        "asswiftsendable",
        "keychain",
        "cose algorithm",
        "ecdsa",
        "sha256",
        "cose curve",
        "p256",
        "nsinteger rank",
        "enables",
        "bool success",
        "remove",
        "call",
        "complete",
        "prepare",
        "attempt",
        "list",
        "nsextension",
        "settings",
        "initializes",
        "a key",
        "extensions",
        "hash",
        "json",
        "initialize",
        "nsstring origin",
        "settings app",
        "urls",
        "https urls",
        "safari",
        "cancel",
        "nsuuid uuid",
        "asextern extern",
        "asextern",
        "nsswiftsendable",
        "uiwindow",
        "propertykind",
        "gkplayer",
        "n tags",
        "gkerrordomain",
        "gamecenter",
        "targetosios",
        "targetostv",
        "nsavailable",
        "gkachievement",
        "local player",
        "view",
        "present",
        "optional",
        "gkbaseplayer",
        "game center",
        "uiimage",
        "app store",
        "gkchallenge",
        "gklocalplayer",
        "nsdeprecated",
        "a singleton",
        "gkcloudplayer",
        "returns nil",
        "nsdeprecatedmac",
        "internal2",
        "internal3",
        "internal4",
        "gkscore",
        "gkextern",
        "gkextern extern",
        "gkexternweak",
        "gkerrorcode",
        "gkerrorunknown",
        "gkerrorunderage",
        "friendplayer",
        "standard view",
        "nsresponder",
        "parentwindow",
        "ibaction",
        "gkgamesession",
        "apis",
        "gkplayer player",
        "nsinteger score",
        "nsdate date",
        "gkleaderboard",
        "connect",
        "nsinteger value",
        "load",
        "gktransporttype",
        "nsstring title",
        "loads array",
        "localized",
        "gkmatch",
        "gkmatchrequest",
        "gkinvite",
        "gksession",
        "gksession api",
        "gamekit",
        "asynchronously",
        "welcome",
        "nstimeinterval",
        "delegate",
        "delivery",
        "gksenddatamode",
        "gksessionmode",
        "gkphotosize",
        "callbacks",
        "gkmatchdelegate",
        "gksavedgame",
        "default value",
        "gksessionerror",
        "gkvoicechat",
        "participant",
        "voice chat",
        "clienta"
      ],
      "references": [
        "CredentialsCache.h",
        "CredentialsCache2.h",
        "config.xml",
        "popen_spawn_win32.py",
        "pycore_condvar.h",
        "Kerberos.h",
        "KerberosLogin.h",
        "plugin.js",
        "krb5.h",
        "MultipeerConnectivity.tbd",
        "MCBrowserViewController.h",
        "MCNearbyServiceAdvertiser.h",
        "MCError.h",
        "MCAdvertiserAssistant.h",
        "MCNearbyServiceBrowser.h",
        "MultipeerConnectivity.apinotes",
        "MultipeerConnectivity.h",
        "MCSession.h",
        "MCPeerID.h",
        "canvas.html",
        "capture_0.bundle.js",
        "capture_resize.js",
        "GCRacingWheelInput.h",
        "GCSyntheticDeviceKeys.h",
        "GCSwitchPositionInput.h",
        "GCSteeringWheelElement.h",
        "GCSwitchElement.h",
        "GCTouchedStateInput.h",
        "GCXboxGamepad.h",
        "GCTypes.h",
        "GCRelativeInput.h",
        "GameController.h",
        "GCAxis2DInput.h",
        "GCAxisElement.h",
        "GCAxisInput.h",
        "GCButtonElement.h",
        "GCController.h",
        "GCColor.h",
        "GCControllerAxisInput.h",
        "GCControllerDirectionPad.h",
        "GCControllerInput.h",
        "GCControllerElement.h",
        "GCControllerTouchpad.h",
        "GCDevice.h",
        "GCDeviceBattery.h",
        "GCDeviceCursor.h",
        "GCDeviceHaptics.h",
        "GCDeviceLight.h",
        "GCDevicePhysicalInputState.h",
        "GCDevicePhysicalInputStateDiff.h",
        "GCDirectionalGamepad.h",
        "GCDirectionPadElement.h",
        "GCDevicePhysicalInput.h",
        "GCDualSenseAdaptiveTrigger.h",
        "GCDualSenseGamepad.h",
        "GCDualShockGamepad.h",
        "GCEventViewController.h",
        "GCExtendedGamepadSnapshot.h",
        "GCExtern.h",
        "GCExtendedGamepad.h",
        "GCGamepadSnapshot.h",
        "GCGearShifterElement.h",
        "GCGamepad.h",
        "GCKeyboard.h",
        "GCInputNames.h",
        "GCControllerButtonInput.h",
        "GCKeyNames.h",
        "GCKeyboardInput.h",
        "GCKeyCodes.h",
        "GCLinearInput.h",
        "GCMotion.h",
        "GCMouse.h",
        "GCMouseInput.h",
        "GCMicroGamepadSnapshot.h",
        "GCPhysicalInputElement.h",
        "GCMicroGamepad.h",
        "GCPhysicalInputProfile.h",
        "GCPhysicalInputSource.h",
        "GCPressedStateInput.h",
        "GCProductCategories.h",
        "GCRacingWheel.h",
        "GameController.tbd",
        "arm64e-apple-macos.swiftinterface",
        "x86_64-apple-macos.swiftinterface",
        "module.modulemap",
        "com_err.h",
        "gssapi_generic.h",
        "locate_plugin.h",
        "profile.h",
        "gssapi_krb5.h",
        "preauth_plugin.h",
        "gssapi.h",
        "alc.h",
        "oalStaticBufferExtension.h",
        "oalMacOSX_OALExtensions.h",
        "OpenAL.h",
        "al.h",
        "OpenAL.tbd",
        "IOUSBHost.tbd",
        "IOUSBHostCIEndpointStateMachine.h",
        "IOUSBHostCIControllerStateMachine.h",
        "IOUSBHost.h",
        "IOUSBHostCIPortStateMachine.h",
        "IOUSBHostCIDeviceStateMachine.h",
        "IOUSBHostControllerInterfaceHelpers.h",
        "IOUSBHostDevice.h",
        "IOUSBHostControllerInterface.h",
        "IOUSBHostDefinitions.h",
        "IOUSBHostInterface.h",
        "IOUSBHostIOSource.h",
        "AppleUSBDescriptorParsing.h",
        "IOUSBHostStream.h",
        "IOUSBHostObject.h",
        "IOUSBHostControllerInterfaceDefinitions.h",
        "IOUSBHostPipe.h",
        "IOBluetoothUIUserLib.h",
        "IOBluetoothUI.h",
        "IOBluetoothObjectPushUIController.h",
        "IOBluetoothDeviceSelectorController.h",
        "IOBluetoothPasskeyDisplay.h",
        "IOBluetoothPairingController.h",
        "IOBluetoothServiceBrowserController.h",
        "IOBluetoothUI.tbd",
        "Bluetooth.h",
        "IOBluetooth.h",
        "BluetoothAssignedNumbers.h",
        "IOBluetoothTypes.h",
        "IOBluetoothUtilities.h",
        "OBEXBluetooth.h",
        "IOBluetoothUserLib.h",
        "OBEX.h",
        "IOBluetooth.tbd",
        "INImage+IntentsUI.h",
        "IntentsUI.h",
        "INUIAddVoiceShortcutButton.h",
        "IntentsUI.apinotes",
        "INUIEditVoiceShortcutViewController.h",
        "INUIAddVoiceShortcutViewController.h",
        "LDAP.tbd",
        "OSvKernDSPLib.h",
        "cpu.h",
        "asm_help.h",
        "desc.h",
        "pio.h",
        "io.h",
        "sel.h",
        "reg_help.h",
        "tss.h",
        "table.h",
        "byte_order.h",
        "_limits.h",
        "_types.h",
        "_mcontext.h",
        "_param.h",
        "_endian.h",
        "arch.h",
        "cpuid_internal.h",
        "cpu_capabilities_public.h",
        "arm_features.inc",
        "endian.h",
        "locks.h",
        "limits.h",
        "atomic.h",
        "machine_cpuid.h",
        "memory_types.h",
        "pal_routines.h",
        "machine_routines.h",
        "param.h",
        "cpuid.h",
        "thread.h",
        "trap.h",
        "vmparam.h",
        "signal.h",
        "types.h",
        "AFKMemoryDescriptorOptions.h",
        "machine_machdep.h",
        "atm_types.h",
        "copyio.h",
        "_OSByteOrder.h",
        "crc.h",
        "Block.h",
        "OSBase.h",
        "OSByteOrder.h",
        "OSDebug.h",
        "OSMalloc.h",
        "OSAtomic.h",
        "OSReturn.h",
        "OSKextLib.h",
        "OSTypes.h",
        "version.h",
        "sysctl.h",
        "tree.h",
        "zconf.h",
        "zlib.h",
        "libkern.h",
        "kdp_callout.h",
        "kdp_en_debugger.h",
        "ipc_types.h",
        "krpc.h",
        "rpcv2.h",
        "xdr_subs.h",
        "nfs.h",
        "nfsproto.h",
        "bootp.h",
        "if_ether.h",
        "icmp6.h",
        "icmp_var.h",
        "igmp_var.h",
        "igmp.h",
        "in_pcb.h",
        "in_stat.h",
        "in_private.h",
        "in_arp.h",
        "in_var.h",
        "in_systm.h",
        "ip_var.h",
        "ip_icmp.h",
        "kpi_ipfilter.h",
        "ip6.h",
        "tcp_private.h",
        "ip.h",
        "tcp_timer.h",
        "tcp_fsm.h",
        "udp_var.h",
        "tcp_seq.h",
        "tcpip.h",
        "udp.h",
        "tcp_var.h",
        "tcp.h",
        "IOPCIFamilyDefinitions.h",
        "IOPCIDevice.iig",
        "PCIDriverKit.h",
        "IOPCIDevice.h",
        "audit_ioctl.h",
        "stdarg.h",
        "stdatomic.h",
        "stdbool.h",
        "stddef.h",
        "string.h",
        "stdint.h",
        "ptrauth.h",
        "math.h",
        "monotonic.h",
        "static_if.h",
        "machine_kpc.h",
        "machine_remote_time.h",
        "ipc_pthread_priority_types.h",
        "lz4_assembly_select.h",
        "vm_compressor_algorithms.h",
        "lz4.h",
        "pmap.h",
        "vm_dyld_pager.h",
        "vm_far.h",
        "vm_fault.h",
        "vm_map.h",
        "lz4_constants.h",
        "vm_options.h",
        "vm_pageout.h",
        "vm_memtag.h",
        "vm_shared_region.h",
        "vm_kern.h",
        "vfs_support.h",
        "vecLib.h",
        "vecLibTypes.h",
        "vBasicOps.h",
        "vForce.h",
        "vDSP.h",
        "uuid.h",
        "UNDReply.defs",
        "UNDRequest.defs",
        "KUNCUserNotifications.h",
        "UNDTypes.defs",
        "UNDTypes.h",
        "TargetConditionals.h",
        "apfs_boot_mount.tbd",
        "av.h",
        "cop.h",
        "bitcount.h",
        "cv.h",
        "ebcdic_tables.h",
        "EXTERN.h",
        "embedvar.h",
        "fakesdio.h",
        "feature.h",
        "form.h",
        "gv.h",
        "git_version.h",
        "dosish.h",
        "hv_macro.h",
        "hv_func.h",
        "config.h",
        "INTERN.h",
        "handy.h",
        "intrpvar.h",
        "invlist_inline.h",
        "hv.h",
        "iperlsys.h",
        "keywords.h",
        "libperl.tbd",
        "embed.h",
        "l1_char_class_tab.h",
        "mg_data.h",
        "mg_raw.h",
        "mg.h",
        "mg_vtable.h",
        "mydtrace.h",
        "nostdio.h",
        "op_reg_common.h",
        "op.h",
        "opcode.h",
        "inline.h",
        "overload.h",
        "opnames.h",
        "parser.h",
        "malloc_ctl.h",
        "pad.h",
        "perl_inc_macro.h",
        "perl_langinfo.h",
        "perl_siphash.h",
        "patchlevel.h",
        "perlapi.h",
        "metaconfig.h",
        "perlio.h",
        "perldtrace.h",
        "perliol.h",
        "perlvars.h",
        "perlsdio.h",
        "pp_proto.h",
        "perly.h",
        "pp.h",
        "reentr.h",
        "regcomp.h",
        "perl.h",
        "regexp.h",
        "scope.h",
        "sbox32_hash.h",
        "time64_config.h",
        "time64.h",
        "sv.h",
        "unixish.h",
        "uconfig.h",
        "utfebcdic.h",
        "unicode_constants.h",
        "utf8.h",
        "regnodes.h",
        "util.h",
        "vutil.h",
        "uudmap.h",
        "warnings.h",
        "XSUB.h",
        "zaphod32_hash.h",
        "encode.h",
        "python-3.9.pc",
        "python-3.9-embed.pc",
        "python3-embed.pc",
        "python3.pc",
        "AFKUser.tbd",
        "AdID.tbd",
        "Admin.tbd",
        "AirPlayReceiver.tbd",
        "AppSandbox.tbd",
        "ASEProcessing.tbd",
        "AuthenticationServicesCore.tbd",
        "WebGPU.tbd",
        "WebDriver.tbd",
        "MapKit.tbd",
        "SwiftUI.swiftoverlay",
        "WebKit.tbd",
        "WebKit.apinotes",
        "WKBackForwardList.h",
        "NSAttributedString.h",
        "WebKit.h",
        "WKBackForwardListItem.h",
        "WKContentRuleList.h",
        "WKContentRuleListStore.h",
        "WKContextMenuElementInfo.h",
        "WKDataDetectorTypes.h",
        "WKContentWorld.h",
        "WKError.h",
        "WKFoundation.h",
        "WKFindResult.h",
        "WKHTTPCookieStore.h",
        "WKFrameInfo.h",
        "WKNavigation.h",
        "WKFindConfiguration.h",
        "WKNavigationDelegate.h",
        "WKNavigationResponse.h",
        "WKOpenPanelParameters.h",
        "WebKitLegacy.h",
        "WKPreviewActionItem.h",
        "WKNavigationAction.h",
        "WKPreferences.h",
        "WKPreviewActionItemIdentifiers.h",
        "WKPreviewElementInfo.h",
        "WKProcessPool.h",
        "WKDownload.h",
        "WKPDFConfiguration.h",
        "WKScriptMessage.h",
        "WKSecurityOrigin.h",
        "WKScriptMessageHandler.h",
        "WKSnapshotConfiguration.h",
        "WKUIDelegate.h",
        "WKURLSchemeTask.h",
        "WKWebpagePreferences.h",
        "WKUserContentController.h",
        "WKWebsiteDataStore.h",
        "WKWebsiteDataRecord.h",
        "WKUserScript.h",
        "WKURLSchemeHandler.h",
        "WKWebViewConfiguration.h",
        "WKWebView.h",
        "WKScriptMessageHandlerWithReply.h",
        "WKWindowFeatures.h",
        "WKDownloadDelegate.h",
        "ASAccountAuthenticationModificationController.h",
        "ASAccountAuthenticationModificationViewController.h",
        "ASAuthorization.h",
        "ASAuthorizationAppleIDButton.h",
        "ASAccountAuthenticationModificationRequest.h",
        "ASAuthorizationAppleIDProvider.h",
        "ASAuthorizationAppleIDRequest.h",
        "ASAuthorizationAppleIDCredential.h",
        "ASAuthorizationController.h",
        "ASAuthorizationCredential.h",
        "ASAccountAuthenticationModificationExtensionContext.h",
        "ASAuthorizationError.h",
        "ASAuthorizationCustomMethod.h",
        "ASAuthorizationPasswordRequest.h",
        "ASAuthorizationOpenIDRequest.h",
        "ASAuthorizationPlatformPublicKeyCredentialDescriptor.h",
        "ASAuthorizationPlatformPublicKeyCredentialProvider.h",
        "ASAccountAuthenticationModificationReplacePasswordWithSignInWithAppleRequest.h",
        "ASAccountAuthenticationModificationUpgradePasswordToStrongPasswordRequest.h",
        "ASAuthorizationPlatformPublicKeyCredentialRegistrationRequest.h",
        "ASAuthorizationPlatformPublicKeyCredentialRegistration.h",
        "ASAuthorizationProvider.h",
        "ASAuthorizationPlatformPublicKeyCredentialAssertion.h",
        "ASAuthorizationPublicKeyCredentialAssertion.h",
        "ASAuthorizationPublicKeyCredentialAssertionRequest.h",
        "ASAuthorizationPublicKeyCredentialConstants.h",
        "ASAuthorizationProviderExtensionAuthorizationResult.h",
        "ASAuthorizationPublicKeyCredentialDescriptor.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobAssertionOutput.h",
        "ASAuthorizationPasswordProvider.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationInput.h",
        "ASAuthorizationPublicKeyCredentialParameters.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationOutput.h",
        "ASAuthorizationPublicKeyCredentialRegistration.h",
        "ASAuthorizationPublicKeyCredentialRegistrationRequest.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobAssertionInput.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialAssertion.h",
        "ASAuthorizationRequest.h",
        "ASAuthorizationPlatformPublicKeyCredentialAssertionRequest.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialProvider.h",
        "ASAuthorizationSingleSignOnCredential.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialDescriptor.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialAssertionRequest.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialRegistration.h",
        "ASAuthorizationSingleSignOnProvider.h",
        "ASAuthorizationWebBrowserExternallyAuthenticatableRequest.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredentialAssertionRequest.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredentialRegistrationRequest.h",
        "ASAuthorizationWebBrowserPublicKeyCredentialManager.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredential.h",
        "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialAssertionRequest.h",
        "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialRegistrationRequest.h",
        "ASCOSEConstants.h",
        "ASCredentialIdentity.h",
        "ASAuthorizationSingleSignOnRequest.h",
        "ASCredentialIdentityStore.h",
        "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialProvider.h",
        "ASCredentialProviderExtensionContext.h",
        "ASCredentialProviderViewController.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialRegistrationRequest.h",
        "ASCredentialServiceIdentifier.h",
        "ASExtensionErrors.h",
        "ASAuthorizationProviderExtensionAuthorizationRequest.h",
        "ASCredentialRequest.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredentialProvider.h",
        "ASPasskeyAssertionCredential.h",
        "ASPasskeyCredentialRequest.h",
        "ASPasskeyCredentialRequestParameters.h",
        "ASCredentialIdentityStoreState.h",
        "ASPasskeyRegistrationCredential.h",
        "ASPasswordCredential.h",
        "ASPublicKeyCredential.h",
        "ASPasskeyCredentialIdentity.h",
        "ASPublicKeyCredentialClientData.h",
        "ASSettingsHelper.h",
        "ASWebAuthenticationSessionCallback.h",
        "ASWebAuthenticationSession.h",
        "ASWebAuthenticationSessionRequest.h",
        "ASWebAuthenticationSessionWebBrowserSessionManager.h",
        "AuthenticationServices.h",
        "ASFoundation.h",
        "AuthenticationServices.apinotes",
        "ASWebAuthenticationSessionWebBrowserSessionHandling.h",
        "ASPasswordCredentialIdentity.h",
        "ASPasswordCredentialRequest.h",
        "GameKit.apinotes",
        "GKAccessPoint.h",
        "GameKit.h",
        "GKAchievement.h",
        "GKAchievementViewController.h",
        "GKBasePlayer.h",
        "GKAchievementDescription.h",
        "GKChallengeEventHandler.h",
        "GKCloudPlayer.h",
        "GKChallengesViewController.h",
        "GKChallenge.h",
        "GKDefines.h",
        "GKError.h",
        "GKEventListener.h",
        "GKFriendRequestComposeViewController.h",
        "GKDialogController.h",
        "GKGameSessionEventListener.h",
        "GKGameSessionError.h",
        "GKGameCenterViewController.h",
        "GKGameSessionSharingViewController.h",
        "GKLeaderboardEntry.h",
        "GKLeaderboard.h",
        "GKLeaderboardScore.h",
        "GKGameSession.h",
        "GKLeaderboardSet.h",
        "GKLocalPlayer.h",
        "GKLeaderboardViewController.h",
        "GKMatch.h",
        "GKMatchmaker.h",
        "GKMatchmakerViewController.h",
        "GKPeerPickerController.h",
        "GKNotificationBanner.h",
        "GKPublicConstants.h",
        "GKPlayer.h",
        "GKPublicProtocols.h",
        "GKSavedGameListener.h",
        "GKScore.h",
        "GKSessionError.h",
        "GKVoiceChat.h",
        "GKTurnBasedMatchmakerViewController.h",
        "GKSession.h",
        "GKTurnBasedMatch.h",
        "GKSavedGame.h",
        "GKVoiceChatService.h"
      ],
      "public": 1,
      "adversary": "Turla Group, FIN7, APT34, APT28, DragonForce Malaysia Hacker Group, Indonesia Islamic Warriors Counc",
      "targeted_countries": [
        "United States of America",
        "India",
        "Australia"
      ],
      "malware_families": [
        {
          "id": "OSAtomic",
          "display_name": "OSAtomic",
          "target": null
        },
        {
          "id": "OSReturn",
          "display_name": "OSReturn",
          "target": null
        },
        {
          "id": "Ver",
          "display_name": "Ver",
          "target": null
        },
        {
          "id": "Internet",
          "display_name": "Internet",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1123",
          "name": "Audio Capture",
          "display_name": "T1123 - Audio Capture"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1016",
          "name": "System Network Configuration Discovery",
          "display_name": "T1016 - System Network Configuration Discovery"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1049",
          "name": "System Network Connections Discovery",
          "display_name": "T1049 - System Network Connections Discovery"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 39,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "ilyailya",
        "id": "298851",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1968,
        "domain": 526,
        "FileHash-SHA256": 207,
        "hostname": 972,
        "email": 55,
        "FileHash-SHA1": 9,
        "FileHash-MD5": 4,
        "CVE": 2,
        "CIDR": 10
      },
      "indicator_count": 3753,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 34,
      "modified_text": "347 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "663d2869e0f3a42bbddc42ff",
      "name": "UPX executable packer.",
      "description": "A new rule has been introduced  a \"suspicious\" ELF binary that is packed with the UPX executable packer.\nSuggested ATT&CK IDs: rule SUSP_ELF_LNX_UPX_Compressed_File { meta: description = \"Detects a suspicious ELF binary with UPX compression\" author = \"Florian Roth (Nextron Systems)\" reference = \"Internal Research\" date = \"2018-12-12\" score = 40 hash1 = \"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4\" id = \"078937de-59b3-538e-a5c3-57f4e6050212\" strings: $s1 = \"PROT_EXEC|PROT_WRITE failed.\" fullword ascii $s2 = \"$Id: UPX\" fullword ascii $s3 = \"$Info: This file is packed with the UPX executable packer\" ascii $fp1 = \"check your UCL installation !\"",
      "modified": "2024-10-14T00:01:17.069000",
      "created": "2024-05-09T19:47:53.786000",
      "tags": [
        "cioch adrian",
        "centrum usug",
        "sieciowych",
        "elf binary",
        "upx compression",
        "roth",
        "nextron",
        "info",
        "javascript",
        "html",
        "office open",
        "xml document",
        "network capture",
        "win32 exe",
        "xml pakietu",
        "pdf zestawy",
        "przechwytywanie",
        "office",
        "filehashsha1",
        "url https",
        "cve cve20201070",
        "cve cve20203153",
        "cve cve20201048",
        "cve cve20211732",
        "cve20201048 apr",
        "filehashmd5",
        "cve cve20010901",
        "cve cve20021841",
        "cve20153202 apr",
        "cve cve20160728",
        "cve cve20161807",
        "cve cve20175123",
        "cve20185407 apr",
        "cve cve20054605",
        "cve cve20060745",
        "cve cve20070452",
        "cve cve20070453",
        "cve cve20070454",
        "cve cve20071355",
        "cve cve20071358",
        "cve cve20071871",
        "cve20149614 apr",
        "cve cve20151503",
        "cve cve20152080",
        "cve cve20157377",
        "cve cve20170131",
        "cve20200796 may",
        "cve cve20113403"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 6861,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 5771,
        "domain": 3139,
        "URL": 14525,
        "FileHash-SHA1": 2610,
        "IPv4": 108,
        "CIDR": 40,
        "FileHash-SHA256": 10705,
        "FileHash-MD5": 3373,
        "YARA": 2,
        "CVE": 148,
        "Mutex": 7,
        "FilePath": 3,
        "SSLCertFingerprint": 3,
        "email": 23,
        "JA3": 1,
        "IPv6": 2
      },
      "indicator_count": 40460,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "552 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a958f96f9b29641ea020",
      "name": "Fitbit app link IoC's",
      "description": "",
      "modified": "2023-12-06T17:03:20.219000",
      "created": "2023-12-06T17:03:20.219000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 17,
        "FileHash-SHA256": 3730,
        "hostname": 1052,
        "domain": 446,
        "URL": 2806,
        "FileHash-MD5": 173,
        "FileHash-SHA1": 168,
        "email": 1
      },
      "indicator_count": 8393,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a927b24b94cdd5d344d1",
      "name": "Fitbit app link IoC's",
      "description": "",
      "modified": "2023-12-06T17:02:31.854000",
      "created": "2023-12-06T17:02:31.854000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 17,
        "FileHash-SHA256": 3730,
        "hostname": 1052,
        "domain": 446,
        "URL": 2806,
        "FileHash-MD5": 173,
        "FileHash-SHA1": 168,
        "email": 1
      },
      "indicator_count": 8393,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "657098ff4c59f8ac3f86f613",
      "name": "v2 of web.basemark.com plus all suggested ioc,s dont forget about the dropped js files from the 2nd hybrid link",
      "description": "",
      "modified": "2023-12-06T15:53:35.032000",
      "created": "2023-12-06T15:53:35.032000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1168,
        "hostname": 1366,
        "domain": 412,
        "URL": 3576,
        "email": 2,
        "FileHash-MD5": 61,
        "FileHash-SHA1": 54
      },
      "indicator_count": 6639,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708ed8f7d4b5483117bb66",
      "name": "abuse.ch",
      "description": "",
      "modified": "2023-12-06T15:10:16.397000",
      "created": "2023-12-06T15:10:16.397000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 223,
        "domain": 383,
        "URL": 1639,
        "hostname": 560,
        "email": 1,
        "FileHash-MD5": 2
      },
      "indicator_count": 2808,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 114,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708e2d7cb4228401888b63",
      "name": "possibly a central bank",
      "description": "",
      "modified": "2023-12-06T15:07:25.990000",
      "created": "2023-12-06T15:07:25.990000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 622,
        "domain": 2558,
        "URL": 4203,
        "hostname": 1221,
        "CVE": 1
      },
      "indicator_count": 8605,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708e0d95a8c74cc715f7a2",
      "name": "West.cn",
      "description": "",
      "modified": "2023-12-06T15:06:53.350000",
      "created": "2023-12-06T15:06:53.350000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 208,
        "domain": 533,
        "hostname": 757,
        "URL": 1861,
        "FileHash-MD5": 1
      },
      "indicator_count": 3360,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708d657f0895a860febf8f",
      "name": "SafeFrame Container",
      "description": "",
      "modified": "2023-12-06T15:04:05.932000",
      "created": "2023-12-06T15:04:05.932000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1416,
        "domain": 2979,
        "URL": 8250,
        "hostname": 2262
      },
      "indicator_count": 14907,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://this.z.call",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://this.z.call",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776641206.518391
}