{
  "type": "URL",
  "indicator": "https://window.document.documentelement.style",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://window.document.documentelement.style",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3158407723,
      "indicator": "https://window.document.documentelement.style",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 39,
      "pulses": [
        {
          "id": "69a3c685d4b7c139ffe62930",
          "name": "Clone Pulse Reference",
          "description": "",
          "modified": "2026-04-01T00:44:45.494000",
          "created": "2026-03-01T04:54:29.384000",
          "tags": [
            "ipv4",
            "active related",
            "trojandropper",
            "mtb jun",
            "lowfi",
            "trojan",
            "mtb jan",
            "fastly error",
            "please",
            "united",
            "ttl value",
            "get na",
            "total",
            "delete",
            "search",
            "yara detections",
            "sinkhole cookie",
            "value snkz",
            "write",
            "suspicious",
            "ransom",
            "malware",
            "Ransom.Win32.Birele.gsg Checkin",
            "AnubisNetworks Sinkhole Cookie Value Snkz",
            "Possible Compromised Host",
            "dynamicloader",
            "delete c",
            "default",
            "medium",
            "write c",
            "settingswpad",
            "intel",
            "ms windows",
            "users",
            "number",
            "title",
            "installer",
            "top source",
            "top destination",
            "source source",
            "port",
            "filehash",
            "av detections",
            "ids detections",
            "yara rule",
            "gravityrat",
            "detectvm",
            "x00 x00",
            "x00x00",
            "doviacmd",
            "rootjob",
            "getfiles",
            "updateserver",
            "ethernetid",
            "ids signatures",
            "exploits",
            "sid name",
            "malware cve",
            "dns query",
            "dnsbin demo",
            "data exfil",
            "exif data",
            "DNS Query for Webhook/HTTP Request Inspection Service (x .pipedr",
            "DNSBin Demo (requestbin .net) - Data Exfitration",
            "source port",
            "destination",
            "present sep",
            "script urls",
            "script script",
            "a domains",
            "script domains",
            "ip address",
            "meta",
            "present nov",
            "passive dns",
            "next associated",
            "domain add",
            "pe executable",
            "entries",
            "show",
            "msie",
            "windows nt",
            "wow64",
            "copy",
            "present jan",
            "present feb",
            "domain",
            "pulse pulses",
            "urls",
            "files",
            "tam legal",
            "christopher ahmann",
            "https://unicef.se/assets/apple",
            "treece alfrey",
            "hours ago",
            "information",
            "report spam",
            "ahmann colorado",
            "state",
            "special cousel",
            "created",
            "expiro",
            "capture"
          ],
          "references": [
            "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
            "Fastly Error and Palantir blocked several times over the last few months.",
            "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
            "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
            "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
            "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
            "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
            "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
            "https://unicef.se/assets/apple"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/Neconyd.A",
              "display_name": "Trojan:Win32/Neconyd.A",
              "target": "/malware/Trojan:Win32/Neconyd.A"
            },
            {
              "id": "PWS:Win32/QQpass.FC",
              "display_name": "PWS:Win32/QQpass.FC",
              "target": "/malware/PWS:Win32/QQpass.FC"
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "Win.Malware.Urelas-9863836-0",
              "display_name": "Win.Malware.Urelas-9863836-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "target": null
            },
            {
              "id": "Win.Trojan.Vundo-7170412-0",
              "display_name": "Win.Trojan.Vundo-7170412-0",
              "target": null
            },
            {
              "id": "#Lowfi:SuspiciousSectionName",
              "display_name": "#Lowfi:SuspiciousSectionName",
              "target": null
            },
            {
              "id": "Multiple Malware\u2019s , Trojans and Rats",
              "display_name": "Multiple Malware\u2019s , Trojans and Rats",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6906bd99cadbd4140014c6af",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 909,
            "domain": 454,
            "hostname": 1404,
            "URL": 3557,
            "CIDR": 1,
            "FileHash-MD5": 242,
            "FileHash-SHA1": 185,
            "email": 1,
            "CVE": 1
          },
          "indicator_count": 6754,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "18 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6906bd99cadbd4140014c6af",
          "name": "Espionage - Gravity RAT + | Legal entities are State owned.  Attacking severely injured  PT\u2019s SA victim.",
          "description": "Fastly CDN for Palantir (Verizon) unless updated.  Very malicious IoC\u2019s found evaluating IoC\u2019 from Christopher Ahmann - TAM Legal link.\n- Made contact with victim several times.\n- Illegal contact made with attorneys considering representing Tsara. \n- https://unicef.se/assets/apple - link related to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage.\n\nAhmann is named as special counsel but he , like Brian Sabey are \u2018ONLY\u2019  cyber attacking Tsara Brashears.\n\n- protecting Jeffrey Reimer DPT, multiple doctors, Concentra,  blocked and denied care , hired a hitman/men and it would have. Even cheaper to pay her for the injuries she never sought compensation for due to aggressive attacks and threats.",
          "modified": "2025-12-02T01:05:30.331000",
          "created": "2025-11-02T02:10:33.546000",
          "tags": [
            "ipv4",
            "active related",
            "trojandropper",
            "mtb jun",
            "lowfi",
            "trojan",
            "mtb jan",
            "fastly error",
            "please",
            "united",
            "ttl value",
            "get na",
            "total",
            "delete",
            "search",
            "yara detections",
            "sinkhole cookie",
            "value snkz",
            "write",
            "suspicious",
            "ransom",
            "malware",
            "Ransom.Win32.Birele.gsg Checkin",
            "AnubisNetworks Sinkhole Cookie Value Snkz",
            "Possible Compromised Host",
            "dynamicloader",
            "delete c",
            "default",
            "medium",
            "write c",
            "settingswpad",
            "intel",
            "ms windows",
            "users",
            "number",
            "title",
            "installer",
            "top source",
            "top destination",
            "source source",
            "port",
            "filehash",
            "av detections",
            "ids detections",
            "yara rule",
            "gravityrat",
            "detectvm",
            "x00 x00",
            "x00x00",
            "doviacmd",
            "rootjob",
            "getfiles",
            "updateserver",
            "ethernetid",
            "ids signatures",
            "exploits",
            "sid name",
            "malware cve",
            "dns query",
            "dnsbin demo",
            "data exfil",
            "exif data",
            "DNS Query for Webhook/HTTP Request Inspection Service (x .pipedr",
            "DNSBin Demo (requestbin .net) - Data Exfitration",
            "source port",
            "destination",
            "present sep",
            "script urls",
            "script script",
            "a domains",
            "script domains",
            "ip address",
            "meta",
            "present nov",
            "passive dns",
            "next associated",
            "domain add",
            "pe executable",
            "entries",
            "show",
            "msie",
            "windows nt",
            "wow64",
            "copy",
            "present jan",
            "present feb",
            "domain",
            "pulse pulses",
            "urls",
            "files",
            "tam legal",
            "christopher ahmann",
            "https://unicef.se/assets/apple",
            "treece alfrey",
            "hours ago",
            "information",
            "report spam",
            "ahmann colorado",
            "state",
            "special cousel",
            "created",
            "expiro",
            "capture"
          ],
          "references": [
            "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
            "Fastly Error and Palantir blocked several times over the last few months.",
            "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
            "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
            "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
            "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
            "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
            "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
            "https://unicef.se/assets/apple"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/Neconyd.A",
              "display_name": "Trojan:Win32/Neconyd.A",
              "target": "/malware/Trojan:Win32/Neconyd.A"
            },
            {
              "id": "PWS:Win32/QQpass.FC",
              "display_name": "PWS:Win32/QQpass.FC",
              "target": "/malware/PWS:Win32/QQpass.FC"
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "Win.Malware.Urelas-9863836-0",
              "display_name": "Win.Malware.Urelas-9863836-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "target": null
            },
            {
              "id": "Win.Trojan.Vundo-7170412-0",
              "display_name": "Win.Trojan.Vundo-7170412-0",
              "target": null
            },
            {
              "id": "#Lowfi:SuspiciousSectionName",
              "display_name": "#Lowfi:SuspiciousSectionName",
              "target": null
            },
            {
              "id": "Multiple Malware\u2019s , Trojans and Rats",
              "display_name": "Multiple Malware\u2019s , Trojans and Rats",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 909,
            "domain": 449,
            "hostname": 1403,
            "URL": 3552,
            "CIDR": 1,
            "FileHash-MD5": 242,
            "FileHash-SHA1": 185,
            "email": 1
          },
          "indicator_count": 6742,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "138 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "663d2869e0f3a42bbddc42ff",
          "name": "UPX executable packer.",
          "description": "A new rule has been introduced  a \"suspicious\" ELF binary that is packed with the UPX executable packer.\nSuggested ATT&CK IDs: rule SUSP_ELF_LNX_UPX_Compressed_File { meta: description = \"Detects a suspicious ELF binary with UPX compression\" author = \"Florian Roth (Nextron Systems)\" reference = \"Internal Research\" date = \"2018-12-12\" score = 40 hash1 = \"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4\" id = \"078937de-59b3-538e-a5c3-57f4e6050212\" strings: $s1 = \"PROT_EXEC|PROT_WRITE failed.\" fullword ascii $s2 = \"$Id: UPX\" fullword ascii $s3 = \"$Info: This file is packed with the UPX executable packer\" ascii $fp1 = \"check your UCL installation !\"",
          "modified": "2024-10-14T00:01:17.069000",
          "created": "2024-05-09T19:47:53.786000",
          "tags": [
            "cioch adrian",
            "centrum usug",
            "sieciowych",
            "elf binary",
            "upx compression",
            "roth",
            "nextron",
            "info",
            "javascript",
            "html",
            "office open",
            "xml document",
            "network capture",
            "win32 exe",
            "xml pakietu",
            "pdf zestawy",
            "przechwytywanie",
            "office",
            "filehashsha1",
            "url https",
            "cve cve20201070",
            "cve cve20203153",
            "cve cve20201048",
            "cve cve20211732",
            "cve20201048 apr",
            "filehashmd5",
            "cve cve20010901",
            "cve cve20021841",
            "cve20153202 apr",
            "cve cve20160728",
            "cve cve20161807",
            "cve cve20175123",
            "cve20185407 apr",
            "cve cve20054605",
            "cve cve20060745",
            "cve cve20070452",
            "cve cve20070453",
            "cve cve20070454",
            "cve cve20071355",
            "cve cve20071358",
            "cve cve20071871",
            "cve20149614 apr",
            "cve cve20151503",
            "cve cve20152080",
            "cve cve20157377",
            "cve cve20170131",
            "cve20200796 may",
            "cve cve20113403"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6861,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 5771,
            "domain": 3139,
            "URL": 14525,
            "FileHash-SHA1": 2610,
            "IPv4": 108,
            "CIDR": 40,
            "FileHash-SHA256": 10705,
            "FileHash-MD5": 3373,
            "YARA": 2,
            "CVE": 148,
            "Mutex": 7,
            "FilePath": 3,
            "SSLCertFingerprint": 3,
            "email": 23,
            "JA3": 1,
            "IPv6": 2
          },
          "indicator_count": 40460,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "552 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708efbe1108a2df26f5c5f",
          "name": "Theconstantcompany.com \u2014>Elizabeth Messer &#8211; Spiritual Encouragement for your beautiful, messy life",
          "description": "",
          "modified": "2023-12-06T15:10:51.712000",
          "created": "2023-12-06T15:10:51.712000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 538,
            "hostname": 307,
            "domain": 220,
            "URL": 1053
          },
          "indicator_count": 2118,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708ee4e69d8c30c04154d0",
          "name": "develapp.me - weglot.com",
          "description": "",
          "modified": "2023-12-06T15:10:28.836000",
          "created": "2023-12-06T15:10:28.836000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 75,
            "domain": 265,
            "hostname": 482,
            "URL": 731,
            "FileHash-MD5": 4,
            "FileHash-SHA1": 1,
            "email": 1
          },
          "indicator_count": 1559,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708e0d95a8c74cc715f7a2",
          "name": "West.cn",
          "description": "",
          "modified": "2023-12-06T15:06:53.350000",
          "created": "2023-12-06T15:06:53.350000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 208,
            "domain": 533,
            "hostname": 757,
            "URL": 1861,
            "FileHash-MD5": 1
          },
          "indicator_count": 3360,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708cc78755574d9812e4c8",
          "name": "one google maps api call and one generic key - causing a large chunk of cyber disruption and compromise",
          "description": "",
          "modified": "2023-12-06T15:01:27.166000",
          "created": "2023-12-06T15:01:27.166000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 135,
            "hostname": 149,
            "URL": 352,
            "domain": 53
          },
          "indicator_count": 689,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c0f5981b6d81d0fa423",
          "name": "data102 and colohouse. Malware hosting",
          "description": "",
          "modified": "2023-12-06T14:58:23.206000",
          "created": "2023-12-06T14:58:23.206000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 458,
            "domain": 557,
            "URL": 2599,
            "hostname": 952
          },
          "indicator_count": 4566,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708b72abe90961af1737c9",
          "name": "reCAPTCHA",
          "description": "",
          "modified": "2023-12-06T14:55:46.172000",
          "created": "2023-12-06T14:55:46.172000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 362,
            "domain": 330,
            "URL": 1790,
            "hostname": 586,
            "email": 1
          },
          "indicator_count": 3069,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708a8b61abf1b451f2aebc",
          "name": "Botnet",
          "description": "",
          "modified": "2023-12-06T14:51:55.086000",
          "created": "2023-12-06T14:51:55.086000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "hostname": 619,
            "URL": 1547,
            "domain": 246,
            "FileHash-SHA256": 124
          },
          "indicator_count": 2538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708a87eeed875a212dff0a",
          "name": "Botnet",
          "description": "",
          "modified": "2023-12-06T14:51:51.546000",
          "created": "2023-12-06T14:51:51.546000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "hostname": 619,
            "URL": 1547,
            "domain": 246,
            "FileHash-SHA256": 124
          },
          "indicator_count": 2538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657089b1d50beac095ca3859",
          "name": "forgotten45s.com",
          "description": "",
          "modified": "2023-12-06T14:48:17.639000",
          "created": "2023-12-06T14:48:17.639000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 500,
            "hostname": 362,
            "domain": 356,
            "URL": 1063,
            "email": 3,
            "CIDR": 4,
            "FileHash-MD5": 22,
            "FileHash-SHA1": 16
          },
          "indicator_count": 2327,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657080d20f7e10c1e37fcf89",
          "name": "TarrantCounty.com ~ 03.01.2022",
          "description": "",
          "modified": "2023-12-06T14:10:26.301000",
          "created": "2023-12-06T14:10:26.301000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1078,
            "domain": 838,
            "hostname": 1607,
            "URL": 4134,
            "email": 3,
            "FileHash-SHA1": 2,
            "CIDR": 4,
            "FileHash-MD5": 15
          },
          "indicator_count": 7681,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707f8475d8a8785dfc5a2f",
          "name": "Zetalytics API",
          "description": "",
          "modified": "2023-12-06T14:04:52.250000",
          "created": "2023-12-06T14:04:52.250000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 754,
            "hostname": 833,
            "domain": 441,
            "URL": 2375,
            "CIDR": 5,
            "FileHash-MD5": 2,
            "email": 1
          },
          "indicator_count": 4411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "63b580a925bb698985fa83ea",
          "name": "vendor.bundle.js",
          "description": "",
          "modified": "2023-02-03T13:00:02.804000",
          "created": "2023-01-04T13:35:37.535000",
          "tags": [
            "vxstream",
            "trojan",
            "apt",
            "memoryfile scan",
            "error",
            "progresstype",
            "graytext",
            "typeof e",
            "highlight",
            "bg96gwp",
            "typeof",
            "window",
            "null",
            "date",
            "span",
            "path",
            "meta",
            "push",
            "unknown",
            "roboto",
            "scroll",
            "suspicious",
            "close",
            "light",
            "template",
            "abcd",
            "android",
            "trident",
            "backspace",
            "insert",
            "4096",
            "void",
            "legend",
            "iframe",
            "webview",
            "infinity",
            "ransomware",
            "malicious",
            "accept toggle",
            "voice",
            "upgrade"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/f90162e65235185a24e9f20d855371b8ad7462d50d7a57851d000cfd5116f76d",
            "This website contains the details of an anti-virus scan conducted by the MetaDefender, which aims to identify and remove malware from websites, websites and social media sites, including Facebook, Twitter and YouTube.",
            "original dropped file discovery url",
            "http://lifehacker.com/assets/stylesheets/app-a873b056f0ea955e4ff0abebb210e5a6.css",
            "Making HTTPS connections using insecure TLS/SSL version details Connection was make using TLSv1.1 [tls.handshake.version: 0x00000302] source Network Traffic relevance 10/10 ATT&CK ID T1573 (Show technique in the MITRE ATT&CK\u2122 matrix)",
            "https://hybrid-analysis.com/sample/f90162e65235185a24e9f20d855371b8ad7462d50d7a57851d000cfd5116f76d/63aef1a83e3bb16765527bb8"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 205,
            "URL": 1340,
            "FileHash-SHA256": 407,
            "hostname": 491,
            "FileHash-MD5": 8,
            "email": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2453,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1170 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "63a3b9aaaca8891186e6f7a2",
          "name": "vt errors on edge 21 dec 2022",
          "description": "var n-i,n-n, r.test, is a new type of webpack, which uses a set of rules to store data in the form of a single address, or code.",
          "modified": "2023-01-21T00:01:41.590000",
          "created": "2022-12-22T01:58:02.495000",
          "tags": [
            "eaca",
            "eace",
            "iaca",
            "iace",
            "boolean",
            "object",
            "path",
            "aacf",
            "customevent",
            "string",
            "span",
            "error",
            "code",
            "virustotal",
            "date",
            "null",
            "contact",
            "blank",
            "close",
            "twitter",
            "unknown",
            "download",
            "this",
            "easy",
            "desktop",
            "body",
            "requires",
            "footer",
            "refresh",
            "patch",
            "write",
            "cobalt strike",
            "shell",
            "zero",
            "harmless",
            "main",
            "aalfe",
            "getclass",
            "copy",
            "iframe",
            "divi",
            "roboto",
            "insert",
            "template",
            "class",
            "void",
            "form",
            "back",
            "ransomware",
            "trace",
            "comment",
            "tools",
            "premium",
            "bufferwriter",
            "bufferreader",
            "array",
            "typeerror",
            "vtuibutton",
            "number",
            "typeof o",
            "urls",
            "please",
            "javascript",
            "https://www.virustotal.com/gui/vt-ui-sw-installer.e0eb1a1e08d651",
            "https://www.virustotal.com/gui/main.900e36f7a852b9863014.js"
          ],
          "references": [
            "https://www.virustotal.com/gui/vt-ui-sw-installer.e0eb1a1e08d6512ba355.js/ Depreciated",
            "https://www.virustotal.com/gui/main.900e36f7a852b9863014.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "BufferReader",
              "display_name": "BufferReader",
              "target": null
            },
            {
              "id": "BufferWriter",
              "display_name": "BufferWriter",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1051,
            "FileHash-SHA256": 204,
            "hostname": 275,
            "domain": 212,
            "CVE": 1,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 1745,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 92,
          "modified_text": "1184 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62e80d56fba248bac0744780",
          "name": "\ud83e\udd14\ud83d\udea8 Could this be the source of all Evil? \ud83d\udea8\ud83e\udd14 Nubotnet - Team:KU Leuven/test2 - 2021.igem.org",
          "description": "",
          "modified": "2022-08-31T00:01:05.509000",
          "created": "2022-08-01T17:28:54.991000",
          "tags": [
            "apt",
            "runtime data",
            "decrypted ssl",
            "pcap",
            "windows nt",
            "tops",
            "cookie",
            "typeof t",
            "element",
            "error",
            "matrix",
            "typeerror",
            "bmfloor",
            "frameelement",
            "null",
            "skew",
            "parade"
          ],
          "references": [
            "https://2021.igem.org/Team:KU_Leuven/test2",
            "https://hybrid-analysis.com/sample/e126ff94aac3340dc05a27f062c4267cbfeaa998248bef0e72f000bba711aa76/62e6fb475edc950b894aa7b0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1696,
            "domain": 586,
            "hostname": 613,
            "FileHash-SHA256": 533,
            "FileHash-MD5": 34,
            "FileHash-SHA1": 33,
            "email": 1
          },
          "indicator_count": 3496,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 393,
          "modified_text": "1327 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6280398780fbe64692dd54fd",
          "name": "West.cn",
          "description": "If you want to know more about Shockwave Flash, spare a thought for the members of your own storage system:mt.co.g.o.mimeTypes.com, mime",
          "modified": "2022-06-13T00:00:32.864000",
          "created": "2022-05-14T23:21:43.936000",
          "tags": [
            "jquery",
            "date",
            "vue jquery",
            "template",
            "layer",
            "paas",
            "dist",
            "wjf3m",
            "ajax",
            "business",
            "string",
            "number",
            "regexp",
            "copyright",
            "uint8array",
            "fnumber",
            "aw1045757556",
            "closure library",
            "xdfunction",
            "code",
            "ddos",
            "image",
            "script",
            "document",
            "unescape",
            "msie",
            "canvas",
            "domain",
            "click",
            "input",
            "label",
            "jdomname",
            "strong",
            "jactive15toast",
            "jclearinput",
            "case",
            "datatarget",
            "jdomainregcount",
            "span",
            "function",
            "x786e",
            "x53d6",
            "cite",
            "x4fe1",
            "iframe",
            "null",
            "prompt",
            "x6700",
            "x591a",
            "array",
            "numarray",
            "data",
            "midsize",
            "action",
            "keyword",
            "firstfix",
            "object",
            "5n3j",
            "3f4r",
            "5p3s",
            "1f5m",
            "hhe2",
            "bbf2",
            "3y3z",
            "1223",
            "6q6m",
            "zfunction",
            "psettimeout",
            "tsettimeout",
            "hsetinterval",
            "iparseint",
            "hnull",
            "pnull",
            "tnull",
            "lv1s",
            "efunction",
            "typeof t",
            "typeof e",
            "adobeedge",
            "typeof r",
            "webkittransform",
            "moztransform",
            "body",
            "this",
            "notifier",
            "invert",
            "name",
            "param",
            "value",
            "error",
            "false",
            "trigger",
            "restart",
            "form",
            "config",
            "constants",
            "true",
            "modalhelper",
            "relative",
            "fixed",
            "account login",
            "activexobject",
            "haslocation",
            "xmlhttprequest",
            "xmlregexp",
            "temp",
            "extpart",
            "foundation",
            "mit license",
            "write",
            "rhino",
            "mark",
            "import",
            "classnamedom",
            "onbeforedestroy",
            "login",
            "auto",
            "init",
            "typeof b",
            "width",
            "pseudo",
            "child",
            "enulle",
            "class",
            "accept",
            "shockwave flash",
            "new date1e3",
            "ka6e5",
            "la10"
          ],
          "references": [
            "xfe-IP-103.24.249.209-stix2-2.1-export.json",
            "xfe-URL-West.cn-stix2-2.1-export.json",
            "https://m.west.cn/jscripts/baidutj/hm.js",
            "http://m.west.cn/jscripts/baidutj/hm.js",
            "https://www.west.cn/js2016/lib/jquery.SuperSlide/jquery.SuperSlide.2.1.1.x.js",
            "https://www.west.cn/js2016/root/jqinclude.js?t=20211126a",
            "https://www.googletagmanager.com/gtag/js?id=AW-1045757556"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 533,
            "URL": 1861,
            "hostname": 757,
            "FileHash-SHA256": 208,
            "FileHash-MD5": 1
          },
          "indicator_count": 3360,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1406 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "626a8a564da0d5b27dc02619",
          "name": "App By Web",
          "description": "Israeli malware hosting",
          "modified": "2022-05-28T00:03:46.141000",
          "created": "2022-04-28T12:36:38.103000",
          "tags": [
            "hebrew",
            "truetype",
            "woff2",
            "woff",
            "body",
            "fh5cooffcanvas",
            "function",
            "click",
            "main menu",
            "superfish var",
            "parallax",
            "offcanvas",
            "mobile menu",
            "animations var",
            "mstouchaction",
            "superfish menu",
            "plugin",
            "copyright",
            "joel birch",
            "dual",
            "fill",
            "touchaction",
            "y position",
            "hoverintent",
            "brian cherne",
            "param",
            "threshold",
            "mit license",
            "or selector",
            "author",
            "1parseint",
            "mark dalgleish",
            "http",
            "webkitopacity",
            "webkit",
            "khtmlopacity",
            "khtml",
            "typeof d",
            "error",
            "this",
            "caleb troughton",
            "typeof f",
            "adapter",
            "bootstrap",
            "javascript",
            "typeof c",
            "twitter",
            "focus",
            "azaz",
            "including",
            "this software",
            "but not",
            "limited to",
            "terms of",
            "open",
            "bsd license",
            "redistribution",
            "redistributions",
            "neither",
            "direct",
            "gc",
            "regexp",
            "typeof b",
            "pseudo",
            "child",
            "array",
            "width",
            "sufeffxa0",
            "class",
            "null",
            "date",
            "accept",
            "boolean",
            "modernizr",
            "custom build",
            "build",
            "afunction",
            "cfunction",
            "typeerror",
            "object",
            "documenttouch",
            "websocket",
            "string",
            "silk",
            "script",
            "arial",
            "edge",
            "iframe",
            "promise",
            "void",
            "android",
            "trident",
            "embed",
            "meta",
            "roboto",
            "term",
            "\u05d4\u05d6\u05de\u05e0\u05ea \u05de\u05d5\u05e0\u05d9\u05ea",
            "wtaxi",
            "wapp",
            "app by web ltd",
            "03-5115656",
            "03-5109109",
            "+97235115656",
            "\u05de\u05e2\u05e8\u05db\u05d5\u05ea \u05d4\u05e1\u05e2\u05d9\u05dd",
            "\u05db\u05e8\u05d8\u05d9\u05e1 \u05d0\u05e9\u05e8\u05d0\u05d9 \u05d1\u05de\u05d5\u05e0\u05d9\u05ea",
            "web ltd",
            "reserved"
          ],
          "references": [
            "xfe-URL-appbyweb.net-stix2-2.1-export.json",
            "http://appbyweb.net/AppByWeb",
            "https://partner.googleadservices.com/gampad/cookie.js?domain=appbyweb.net&callback=_gfp_s_&client=ca-pub-2581829468247892",
            "https://pagead2.googlesyndication.com/pagead/managed/js/adsense/m202204200101/show_ads_impl_fy2019.js",
            "http://appbyweb.net/AppByWeb/js/modernizr-2.6.2.min.js",
            "http://appbyweb.net/AppByWeb/js/jquery.min.js",
            "http://appbyweb.net/AppByWeb/js/jquery.easing.1.3.js",
            "http://appbyweb.net/AppByWeb/js/bootstrap.min.js",
            "http://appbyweb.net/AppByWeb/js/jquery.waypoints.min.js",
            "http://appbyweb.net/AppByWeb/js/jquery.stellar.min.js",
            "http://appbyweb.net/AppByWeb/js/hoverIntent.js",
            "http://appbyweb.net/AppByWeb/js/superfish.js",
            "http://appbyweb.net/AppByWeb/js/main.js",
            "https://files.appbyweb.net/Fonts/OpenSansHebrew/font.css",
            "https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2581829468247892&output=html&adk=1812271804&adf=3025194257&lmt=1651149220&plat=16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C32%3A32&format=0x0&url=http%3A%2F%2Fappbyweb.net%2FAppByWeb%2F&ea=0&pra=5&wgl=1&dt=1651149220376&bpp=1&bdt=121&idt=18&shv=r20220425&mjsv=m202204200101&ptt=9&saldr=aa&abxe=1&cookie=ID%3De83d6067a4dac5b6-229192c549d200d1%3AT%3D1651148802%3ART%3D1651148802%3AS%3DALNI_MZSt9utXhYBHAIH9xwQp72WuxQxTw&nras=1&correlator=1655793633284&"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Gc",
              "display_name": "Gc",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1554,
            "hostname": 533,
            "domain": 211,
            "FileHash-SHA256": 199
          },
          "indicator_count": 2497,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1422 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "628eefdf98ddb360733b23c2",
          "name": "Theconstantcompany.com \u2014>Elizabeth Messer &#8211; Spiritual Encouragement for your beautiful, messy life",
          "description": "This is blasphemy",
          "modified": "2022-05-26T03:20:44.885000",
          "created": "2022-05-26T03:11:27.710000",
          "tags": [
            "5deg",
            "3deg",
            "10deg",
            "30px",
            "15px",
            "4px0",
            "20deg",
            "sans",
            "styles",
            "type",
            "form",
            "widget",
            "helvetica neue",
            "typeemail",
            "typetext",
            "classshare",
            "typetel",
            "typeurl",
            "typecheckbox",
            "canvas",
            "typeradio",
            "segoe ui",
            "roboto",
            "span",
            "open",
            "click",
            "getclicktarget",
            "date",
            "contexttrack",
            "view",
            "installtrigger",
            "processlink",
            "typeof blog",
            "msie",
            "image",
            "paul irish",
            "typeof b",
            "kfunction",
            "true",
            "body",
            "optinid",
            "pageid",
            "listid",
            "cookieduration",
            "scrollpos",
            "etbloompopup",
            "etbloomformleft",
            "service",
            "typebutton",
            "choose file",
            "reset",
            "submit",
            "screenw",
            "containerh",
            "function",
            "ratio1",
            "ratio2",
            "containerw",
            "index",
            "nectar",
            "null",
            "youtubeid",
            "jquery",
            "nnull",
            "annull",
            "touch swipe",
            "touchswipe",
            "method",
            "phasemove",
            "phaseend",
            "phasecancel",
            "left",
            "right",
            "typeof define",
            "typeof module",
            "typeof t",
            "mspointerdown",
            "input",
            "touch",
            "gplv3",
            "license",
            "copyright",
            "metafizzy",
            "typeof require",
            "new dateu",
            "flash player",
            "arrow",
            "chinese",
            "typeof symbol",
            "wrapper",
            "javascript",
            "flash",
            "error",
            "fullscreen",
            "czech",
            "icelandic",
            "korean",
            "slovak",
            "infinite scroll",
            "easeoutcubic",
            "bind",
            "destroy",
            "html",
            "resume",
            "luke shumard",
            "mit license",
            "next",
            "unknown",
            "false",
            "done",
            "minimal",
            "transparent",
            "megamenu",
            "edge",
            "superfish menu",
            "plugin",
            "joel birch",
            "dual",
            "ttttttt ttttttt",
            "gravatar",
            "ttttttttname",
            "tttttt tttttt",
            "tttttt ttttt",
            "symbol",
            "array",
            "typeof window",
            "typeof self",
            "string",
            "object",
            "ieproto",
            "activexobject",
            "typeerror",
            "asynciterator",
            "generator",
            "number",
            "closure library",
            "xdfunction",
            "adfunction",
            "bdfunction",
            "lefunction",
            "qefunction",
            "boolean",
            "moz o",
            "custom build",
            "https",
            "android",
            "mobile safari",
            "chrome",
            "phone",
            "worker",
            "typeof n",
            "typeof e",
            "uint8array",
            "vcgitemlink",
            "addingtocart",
            "addedtocart",
            "button",
            "version",
            "requires",
            "thanks",
            "window",
            "please wait",
            "typeof f",
            "html tags",
            "ox20trnf",
            "dom element",
            "regexp",
            "class",
            "attr",
            "pseudo",
            "child",
            "bible studies",
            "bible study",
            "leed",
            "ebay",
            "microsoft",
            "jesus",
            "john",
            "saint ignatius",
            "loyola"
          ],
          "references": [
            "http://www.elizabethmesser.com/",
            "http://theconstantcompany.com",
            "http://www.elizabethmesser.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
            "http://www.elizabethmesser.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2",
            "http://www.elizabethmesser.com/wp-content/plugins/woocommerce/assets/js/jquery-blockui/jquery.blockUI.min.js?ver=2.7.0-wc.6.5.1",
            "http://www.elizabethmesser.com/wp-content/plugins/woocommerce/assets/js/frontend/add-to-cart.min.js?ver=6.5.1",
            "http://www.elizabethmesser.com/wp-content/plugins/js_composer_salient/assets/js/vendors/woocommerce-add-to-cart.js?ver=5.0.1",
            "https://stats.wp.com/s-202221.js",
            "http://www.elizabethmesser.com/wp-content/themes/salient/js/modernizr.js?ver=2.6.2",
            "https://www.googletagmanager.com/gtag/js?id=UA-115476727-1",
            "http://www.elizabethmesser.com/wp-content/plugins/jetpack/_inc/build/photon/photon.min.js?ver=20191001",
            "http://www.elizabethmesser.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.9",
            "http://www.elizabethmesser.com/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=3.15.0",
            "http://www.elizabethmesser.com/wp-content/plugins/woocommerce/assets/js/frontend/woocommerce.min.js?ver=6.5.1",
            "https://secure.gravatar.com/js/gprofiles.js?ver=202221",
            "http://www.elizabethmesser.com/wp-content/themes/salient/js/superfish.js?ver=1.4.8",
            "http://www.elizabethmesser.com/wp-content/themes/salient/js/infinitescroll.js?ver=1.1",
            "http://www.elizabethmesser.com/wp-includes/js/mediaelement/mediaelement-and-player.min.js?ver=4.2.16",
            "http://www.elizabethmesser.com/wp-content/themes/salient/js/flickity.min.js?ver=1.1.1",
            "http://www.elizabethmesser.com/wp-content/themes/salient/js/touchswipe.min.js?ver=1.0",
            "http://www.elizabethmesser.com/wp-content/plugins/js_composer_salient/assets/js/dist/js_composer_front.min.js?ver=5.0.1",
            "http://www.elizabethmesser.com/wp-content/plugins/bloom/js/jquery.uniform.min.js?ver=1.1.8",
            "http://www.elizabethmesser.com/wp-content/plugins/bloom/js/custom.js?ver=1.1.8",
            "http://www.elizabethmesser.com/wp-content/plugins/bloom/js/idle-timer.min.js?ver=1.1.8",
            "https://stats.wp.com/e-202221.js",
            "http://www.elizabethmesser.com/wp-content/plugins/jetpack/css/jetpack.css?ver=10.9.1",
            "http://www.elizabethmesser.com/wp-content/plugins/bloom/css/style.css?ver=1.1.8"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Bible Study",
              "display_name": "Bible Study",
              "target": null
            },
            {
              "id": "Bible Studies",
              "display_name": "Bible Studies",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 220,
            "hostname": 307,
            "URL": 1054,
            "FileHash-SHA256": 538
          },
          "indicator_count": 2119,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 70,
          "modified_text": "1424 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "628d7dd1aeef31a652eadab3",
          "name": "develapp.me - weglot.com",
          "description": "function R(a,b,c,d,e,f) is a new type of JavaScript, which allows the browser to control its browser without a set of buttons or controls..",
          "modified": "2022-05-25T00:52:33.987000",
          "created": "2022-05-25T00:52:33.987000",
          "tags": [
            "configrender",
            "commandremove",
            "targetdom",
            "webpackrequire",
            "mixitup",
            "webpackexports",
            "typeerror",
            "nn function",
            "false",
            "error",
            "typeof o",
            "function",
            "click",
            "span",
            "prop",
            "sticky",
            "body",
            "enterprise",
            "null",
            "jquery",
            "next",
            "scroll",
            "win32",
            "win64",
            "example",
            "startr",
            "endr",
            "copyright",
            "federico zivolo",
            "distributed",
            "mit license",
            "html",
            "statict",
            "flip",
            "bootstrap",
            "typeof",
            "javascript",
            "hidden",
            "show",
            "focusin",
            "focusout",
            "mouseleave",
            "font awesome",
            "free",
            "license",
            "cc by",
            "sil ofl",
            "code",
            "typeof window",
            "typeof document",
            "msie",
            "trident",
            "date",
            "color",
            "swiper",
            "waypoint",
            "chart",
            "typeof pdata",
            "pdatawrapper",
            "close",
            "cnew date",
            "regexp",
            "pseudo",
            "child",
            "sufeffxa0",
            "class",
            "attr",
            "js foundation",
            "typeof module",
            "object",
            "hj",
            "typeof require",
            "modulenotfound",
            "typeof symbol",
            "hotjar",
            "typeof e",
            "data",
            "array",
            "surveys",
            "meta",
            "survey",
            "keypress",
            "widget",
            "window",
            "footer",
            "fullscreen",
            "generic",
            "experiment",
            "live",
            "mutation",
            "number",
            "string",
            "xsnull",
            "g6q8lh84qh0",
            "script",
            "fragment",
            "replace",
            "nonce",
            "please do",
            "not copy",
            "and paste",
            "this code",
            "cgrecaptchacfg",
            "ngrecaptcha",
            "recaptchaapi",
            "render",
            "vrai",
            "revenir",
            "rgpd",
            "axeptio",
            "gdpr",
            "black",
            "green",
            "canvas",
            "super",
            "spacer",
            "target",
            "reduceright",
            "xu",
            "pageview",
            "trackevent",
            "uetpush",
            "pageload",
            "viewcontent",
            "path",
            "derek",
            "void",
            "offer",
            "instanceof",
            "xmlhttprequest",
            "cookie",
            "generator",
            "accept",
            "select",
            "strong",
            "uint8array",
            "math",
            "svoid",
            "this",
            "iframe",
            "verify",
            "android",
            "stop",
            "form",
            "f420",
            "deviceandgeo",
            "googlesignals",
            "json",
            "typeof hj",
            "https",
            "learn",
            "surveyv2",
            "surveyisolated",
            "heatmapviewer",
            "beacon",
            "publicurl",
            "beaconenv",
            "beaconid",
            "beaconversion",
            "isdocker",
            "isscout",
            "deployurl",
            "scattr",
            "help scout",
            "promise",
            "typeof n",
            "request",
            "kontakt",
            "landstrae",
            "d85521",
            "mehr",
            "jahre erfahrung",
            "gratis beratung",
            "kontaktiere",
            "mit mehr",
            "kunden die",
            "ergebnisse",
            "typesubmit",
            "button",
            "woff2",
            "fontface",
            "display",
            "u0259",
            "u1e001eff",
            "u2020",
            "u20a020ab",
            "u20ad20cf",
            "u2113",
            "u2c602c7f",
            "montserrat",
            "typesearch",
            "a4ssliche",
            "90deg",
            "lato",
            "typecheckbox",
            "typeradio",
            "typenumber",
            "truetype",
            "weglot",
            "self",
            "typeof t",
            "franais",
            "acronym",
            "small",
            "unknown",
            "webflow",
            "typeof self",
            "chrome",
            "small batch",
            "apache license",
            "version",
            "unless",
            "as is",
            "basis",
            "without",
            "warranties or",
            "apache"
          ],
          "references": [
            "https://d3e54v103j8qbb.cloudfront.net/js/jquery-3.5.1.min.dc5e7f18c8.js?site=5f087b2cc04e635c7a4b7e35",
            "https://assets.website-files.com/5f087b2cc04e635c7a4b7e35/js/develapp.b94842ca8.js",
            "https://cdn.weglot.com/weglot.min.js",
            "https://assets.website-files.com/5f087b2cc04e635c7a4b7e35/css/develapp.36c3d32f6.min.css",
            "https://fonts.googleapis.com/css?family=Montserrat:100,100italic,200,200italic,300,300italic,400,400italic,500,500italic,600,600italic,700,700italic,800,800italic,900,900italic%7CLato:100,100italic,300,300italic,400,400italic,700,700italic,900,900italic%7CKarla:regular,italic,700,700italic%7CPlayfair+Display:regular,500,600,700,800,900,italic,500italic,600italic,700italic,800italic,900italic",
            "https://cdn.weglot.com/weglot.min.css?v=4",
            "https://www.develapp.me/kontakt#formular",
            "https://beacon-v2.helpscout.net/static/js/vendor.90fe6783.js",
            "https://beacon-v2.helpscout.net/static/js/main.4a4d1187.js",
            "https://beacon-v2.helpscout.net/",
            "https://static.hotjar.com/c/hotjar-2950866.js?sv=7",
            "https://www.googletagmanager.com/gtag/js?id=G-6Q8LH84QH0&l=dataLayer&cx=c",
            "https://www.gstatic.com/recaptcha/releases/1_E1Jb45wiBZrQd45oGZ-2cU/recaptcha__en.js",
            "https://loader.wisepops.com/get-loader.js?v=1&site=ybdeB8PyA7",
            "https://cdn.firstpromoter.com/fprom.js",
            "https://www.googletagmanager.com/gtm.js?id=GTM-NTC6C23",
            "https://static.axept.io/sdk.js",
            "https://www.google.com/recaptcha/api.js?render=6LdxYT4dAAAAAFyqSRoLKTBh7Q9kh0D0StIaGfzK",
            "https://www.googleoptimize.com/optimize.js?id=OPT-PJMGV95",
            "https://script.hotjar.com/modules.7a321ecb93fde9f07226.js",
            "https://widget.trustpilot.com/bootstrap/v5/tp.widget.bootstrap.min.js",
            "https://ajax.googleapis.com/ajax/libs/jquery/3.2.1/jquery.min.js",
            "https://weglot.com/wp-content/plugins/addon-elements-for-elementor-page-builder/assets/js/eae.min.js",
            "https://weglot.com/wp-content/plugins/elementor/assets/lib/font-awesome/js/v4-shims.min.js",
            "https://weglot.com/wp-content/plugins/addon-elements-for-elementor-page-builder/assets/js/animated-main.min.js",
            "https://stackpath.bootstrapcdn.com/bootstrap/4.1.1/js/bootstrap.min.js",
            "https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Tunisia"
          ],
          "malware_families": [
            {
              "id": "ConfigRender",
              "display_name": "ConfigRender",
              "target": null
            },
            {
              "id": "TargetDom",
              "display_name": "TargetDom",
              "target": null
            },
            {
              "id": "CommandRemove",
              "display_name": "CommandRemove",
              "target": null
            },
            {
              "id": "hj",
              "display_name": "hj",
              "target": null
            },
            {
              "id": "xU",
              "display_name": "xU",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 482,
            "URL": 731,
            "FileHash-SHA256": 75,
            "domain": 265,
            "FileHash-MD5": 4,
            "FileHash-SHA1": 1,
            "email": 1
          },
          "indicator_count": 1559,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1425 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62634f4db80546374654f4c4",
          "name": "frantech.ca - malware",
          "description": "T,t.F, t.f, is written in the same place as the following:t, d. F, has been added to the end of the document, as well as its own propertyDescriptor.",
          "modified": "2022-05-22T00:01:01.264000",
          "created": "2022-04-23T00:58:53.444000",
          "tags": [
            "overview",
            "typeof symbol",
            "error",
            "typeerror",
            "object",
            "typeof t",
            "string",
            "typeof e",
            "function",
            "array",
            "promise",
            "date",
            "target",
            "class",
            "path",
            "back",
            "bounce",
            "this",
            "iframe",
            "null",
            "0x105684",
            "0xb66229",
            "0xb9b329",
            "0x3eed40",
            "0x2923e0",
            "cookie",
            "0x1d2d25",
            "0x2d6b",
            "0x538ea5",
            "0x240c1a",
            "push",
            "shift",
            "open"
          ],
          "references": [
            "xfe-URL-https___my.frantech.ca_-stix2-2.1-export.json",
            "xfe-URL-frantech.ca-stix2-2.1-export.json",
            "https://my.frantech.ca/templates/lagom/assets/js/lagom-app.min.js?v=1.4.3",
            "https://my.frantech.ca/templates/lagom/assets/js/whmcs-custom.min.js?v=1.4.3"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 757,
            "hostname": 498,
            "domain": 311,
            "FileHash-SHA256": 21
          },
          "indicator_count": 1587,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1428 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "626078c9aeb1f4837a1bfc7e",
          "name": "Malware hosting - allwest.com",
          "description": "\u00c2\u00a31.5m, \u00e2\u201a\u00ac2.4m \u00c3\u20ac\u00a6, is the source of a new version of the JavaScript code, which is being developed by the Apache web browser.",
          "modified": "2022-05-20T00:01:19.453000",
          "created": "2022-04-20T21:19:05.670000",
          "tags": [
            "guji",
            "regexp",
            "cfunction",
            "event",
            "afunction",
            "efunction",
            "function",
            "xfunction",
            "jnull",
            "yefunction",
            "customevent",
            "typeof n",
            "typeof wpcf7",
            "nonce",
            "script",
            "please do",
            "not copy",
            "and paste",
            "this code",
            "cgrecaptchacfg",
            "ngrecaptcha",
            "recaptchaapi",
            "render",
            "filter",
            "typenumber",
            "totalvalue",
            "linear",
            "secs",
            "index",
            "nameregion",
            "typevalue",
            "rangeto",
            "customuserspeed",
            "code",
            "typeof define",
            "date",
            "click",
            "smoothscroll",
            "number",
            "property",
            "fancybox",
            "null",
            "false",
            "scroll",
            "stop",
            "speed",
            "body",
            "error",
            "this",
            "typeerror",
            "symbol",
            "generator",
            "typeof e",
            "copyright",
            "closure library",
            "reduceright",
            "string",
            "aw981889198",
            "uint8array",
            "quota",
            "aafunction",
            "void",
            "hj",
            "object",
            "hotjar",
            "email",
            "typeof symbol",
            "telefon",
            "array",
            "survey",
            "meta",
            "cookie",
            "keypress",
            "trident",
            "live",
            "fullscreen",
            "generic",
            "window",
            "widget",
            "ciudad",
            "adore",
            "experiment",
            "mutation",
            "qe",
            "fnumber",
            "xhfunction",
            "yhfunction",
            "awconversionid",
            "g0cbkgbkb3j",
            "xdfunction",
            "adfunction",
            "cdfunction",
            "ddfunction",
            "typeof hj",
            "surveyv2",
            "surveyisolated",
            "heatmapviewer",
            "notification",
            "sentry",
            "ua411335272",
            "gfvhxsm5zyl",
            "xmlhttprequest",
            "domparser",
            "typeof module",
            "html tags",
            "ox20trnf",
            "dom element",
            "typeof t",
            "class",
            "attr",
            "pseudo",
            "child",
            "udc66udc67",
            "ud83d",
            "ufe0f",
            "ud83e",
            "udc68udc69",
            "udfcbudfcc",
            "u2640u2642",
            "source",
            "image",
            "ud83dudc6cud83c",
            "bsnull",
            "gtmmwm9r93",
            "typeof",
            "facebook pixel",
            "pixel code",
            "iterator",
            "constantvalue",
            "globalvariable",
            "facebook",
            "service",
            "phonenumber",
            "boolean",
            "select",
            "strong",
            "input",
            "iframe",
            "android",
            "verify",
            "span",
            "enterprise",
            "form",
            "reload",
            "adwords",
            "linkedin",
            "hs pixel",
            "loader",
            "addcookiedomain",
            "hubspot",
            "vui",
            "anda",
            "tente",
            "outubro",
            "trackingclient",
            "srpanj",
            "rabu",
            "vasaris",
            "helvetica neue",
            "helvetica",
            "arial",
            "accept",
            "n nn",
            "policy",
            "done",
            "800px",
            "40px",
            "i18n",
            "blockedemail",
            "typeof i18n",
            "captcha",
            "please",
            "april",
            "august",
            "close",
            "february",
            "june",
            "klik",
            "download",
            "next",
            "blank",
            "este",
            "rserver",
            "mais",
            "r300",
            "typeof d",
            "path",
            "caca",
            "pfunction",
            "contenttype",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction",
            "array int8array",
            "caregexp",
            "legacy"
          ],
          "references": [
            "xfe-URL-allwest.com-stix2-2.1-export.json",
            "https://www.googleadservices.com/pagead/conversion_async.js",
            "https://www.google-analytics.com/analytics.js",
            "https://www.googletagmanager.com/gtag/js?id=G-FVHXSM5ZYL&l=dataLayer&cx=c",
            "https://www.googletagmanager.com/gtag/js?id=G-0CBKGBKB3J&l=dataLayer&cx=c",
            "https://js.hsleadflows.net/leadflows.js",
            "https://js.hs-banner.com/9251231.js",
            "https://js.hs-analytics.net/analytics/1650488100000/9251231.js",
            "https://js.hsadspixel.net/fb.js",
            "https://www.gstatic.com/recaptcha/releases/QENb_qRrX0-mQMyENQjD6Fuj/recaptcha__en.js",
            "https://connect.facebook.net/signals/config/661596171311072?v=2.9.57&r=stable",
            "https://connect.facebook.net/signals/plugins/identity.js?v=2.9.57",
            "https://connect.facebook.net/en_US/fbevents.js",
            "https://www.googleoptimize.com/optimize.js?id=GTM-MWM9R93",
            "https://www.allwest.com/wp-includes/js/wp-emoji-release.min.js?ver=5.9.3",
            "https://www.allwest.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
            "https://www.allwest.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2",
            "https://www.allwest.com/wp-content/plugins/svg-support/js/min/svgs-inline-min.js?ver=1.0.0",
            "https://www.googletagmanager.com/gtag/js?id=UA-41133527-3",
            "https://static.hotjar.com/c/hotjar-2836981.js?sv=5",
            "https://www.googletagmanager.com/gtag/js?id=UA-41133527-2",
            "https://www.googletagmanager.com/gtag/js?id=AW-CONVERSION_ID",
            "https://script.hotjar.com/modules.0076bf93c385ddf0ff58.js",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/981889198/?random=1650488340057&cv=9&fst=1650488340057&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2oa4i1&sendb=1&ig=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fwww.allwest.com%2F&tiba=All%20West%20Communications%20-%20telecommunication%20company&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
            "https://www.googletagmanager.com/gtag/js?id=AW-981889198",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/981889198/?random=1650488340630&cv=9&fst=1650488340630&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2oa4i1&sendb=1&ig=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fwww.allwest.com%2F&tiba=All%20West%20Communications%20-%20telecommunication%20company&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
            "https://www.allwest.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.9",
            "https://www.allwest.com/wp-content/uploads/hummingbird-assets/c4be4d65e707f6328e3a72e79cfdfcb7.js",
            "https://www.allwest.com/wp-content/themes/allwestcommunications/js/jquery.main.js?ver=5.9.3",
            "https://www.allwest.com/wp-content/themes/allwestcommunications/js/custom.js?ver=5.9.3",
            "https://www.google.com/recaptcha/api.js?render=6Ld8S6EUAAAAAExG_6DO_Jj4DLY35ybebbA8R_eA&ver=3.0",
            "https://www.allwest.com/wp-content/plugins/contact-form-7/modules/recaptcha/index.js?ver=5.5.6",
            "https://www.allwest.com/wp-content/plugins/wp-smushit/app/assets/js/smush-lazy-load.min.js?ver=3.9.5",
            "https://js.hs-scripts.com/9251231.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Tunisia"
          ],
          "malware_families": [
            {
              "id": "hj",
              "display_name": "hj",
              "target": null
            },
            {
              "id": "Qe",
              "display_name": "Qe",
              "target": null
            },
            {
              "id": "Vui",
              "display_name": "Vui",
              "target": null
            },
            {
              "id": "Outubro",
              "display_name": "Outubro",
              "target": null
            },
            {
              "id": "Tente",
              "display_name": "Tente",
              "target": null
            },
            {
              "id": "Anda",
              "display_name": "Anda",
              "target": null
            },
            {
              "id": "Vasaris",
              "display_name": "Vasaris",
              "target": null
            },
            {
              "id": "Rabu",
              "display_name": "Rabu",
              "target": null
            },
            {
              "id": "Srpanj",
              "display_name": "Srpanj",
              "target": null
            },
            {
              "id": "TrackingClient",
              "display_name": "TrackingClient",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 821,
            "URL": 1568,
            "domain": 251,
            "FileHash-SHA256": 70,
            "FileHash-MD5": 4,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2715,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1430 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62601d5f1c8672141d3c2afb",
          "name": "Malware hosting - rackip.com = astutemedia.asia",
          "description": "New RegExp:function(a,b), a new type, has its own built-up property, as well as an ability to store information in place when it is not already available.",
          "modified": "2022-05-20T00:01:19.453000",
          "created": "2022-04-20T14:49:03.781000",
          "tags": [
            "datasecret",
            "easeoutcubic",
            "jquery",
            "select",
            "span",
            "class js",
            "html",
            "topsearch",
            "menu",
            "mobile",
            "menu dropdown",
            "class",
            "retinaimagepath",
            "copyright",
            "imulus",
            "mit license",
            "retina",
            "function",
            "xmlhttprequest",
            "head",
            "contenttype",
            "imagei",
            "viljamis",
            "navigation",
            "date",
            "typeof h",
            "woothemes",
            "tyler smith",
            "documenttouch",
            "number",
            "knumber",
            "previous",
            "next",
            "supersubs",
            "joel birch",
            "dual",
            "google group",
            "fontsize",
            "whitespace",
            "nowrap",
            "float",
            "superfish",
            "changelog",
            "visibility",
            "hidden",
            "setposition",
            "isset",
            "srcyoutube",
            "srcvimeo",
            "image",
            "lightbox clone",
            "stephane caron",
            "typeof therel",
            "regexp",
            "play",
            "close",
            "isotope",
            "commercial use",
            "http",
            "david desandro",
            "metafizzy",
            "moz webkit",
            "o ms",
            "reset",
            "null",
            "value",
            "clamp",
            "nullrgba",
            "nullhsla",
            "execresult",
            "cache",
            "local",
            "right",
            "including",
            "this software",
            "but not",
            "limited to",
            "terms of",
            "open",
            "bsd license",
            "redistribution",
            "redistributions",
            "neither",
            "direct",
            "placeheld",
            "form",
            "wpcf7",
            "alert",
            "minimum",
            "tooshort",
            "unittag",
            "false",
            "fast",
            "typesubmit",
            "form plugin",
            "version",
            "requires jquery",
            "examples",
            "typeof define",
            "typeimage",
            "formdata",
            "stop",
            "modernizr",
            "custom build",
            "build",
            "afunction",
            "cfunction",
            "typeerror",
            "object",
            "kfunction",
            "pseudo",
            "child",
            "typeof b",
            "array",
            "error",
            "sufeffxa0",
            "attr",
            "void",
            "udc66udc67",
            "ud83d",
            "ufe0f",
            "ud83e",
            "udc68udc69",
            "udfcbudfcc",
            "u2640u2642",
            "source",
            "ud83dudc6cud83c",
            "secure",
            "result"
          ],
          "references": [
            "http://www.powr.io/powr.js",
            "http://astutemedia.asia/rackip/wp-includes/js/wp-emoji-release.min.js?ver=5.5.9",
            "xfe-URL-astutemedia.asia-stix2-2.1-export.json",
            "http://astutemedia.asia/rackip/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/modernizr.js?ver=2.5.3",
            "http://astutemedia.asia/rackip/wp-includes/js/comment-reply.min.js?ver=5.5.9",
            "http://astutemedia.asia/rackip/wp-content/plugins/contact-form-7/includes/js/jquery.form.min.js?ver=3.51.0-2014.06.20",
            "http://astutemedia.asia/rackip/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=4.5.1",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/jquery.easing.js?ver=1.2",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/jquery.color.js?ver=2.0",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/jquery.isotope.min.js?ver=1.0",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/jquery.prettyPhoto.js?ver=3.0",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/superfish.js?ver=1.4.8",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/supersubs.js?ver=0.2",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/jquery.flexslider-min.js?ver=1.8",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/tinynav.min.js?ver=1.03",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/retina.min.js?ver=1.1.0",
            "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/custom.js?ver=1.0",
            "http://astutemedia.asia/rackip/wp-includes/js/wp-embed.min.js?ver=5.5.9",
            "xfe-URL-Powr.io-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 515,
            "URL": 1487,
            "domain": 242,
            "FileHash-SHA256": 351,
            "CVE": 1
          },
          "indicator_count": 2596,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1430 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "625f42dcc369f59f6a1e8b58",
          "name": "data102 and colohouse. Malware hosting",
          "description": "var a,b,c,d, f.substr(d),a=f, a.href, and a number of other elements:a.b.search.com.",
          "modified": "2022-05-19T00:00:49.028000",
          "created": "2022-04-19T23:16:44.418000",
          "tags": [
            "regexp",
            "rangeerror",
            "typeerror",
            "date",
            "array",
            "error",
            "this",
            "uint8array",
            "typeof b",
            "buffer",
            "class",
            "null",
            "path",
            "void",
            "marketo forms",
            "cross domain",
            "typetext",
            "typeurl",
            "typeemail",
            "typetel",
            "typenumber",
            "typedate",
            "color",
            "label",
            "input",
            "typerange",
            "typecheckbox",
            "woff2",
            "fontface",
            "u1c801c88",
            "u20b4",
            "u2de02dff",
            "ua640a69f",
            "ufe2efe2f",
            "u04b004b1",
            "u2116",
            "u1ea01ef9",
            "franklin",
            "woff",
            "u20ab",
            "u0259",
            "u1e001eff",
            "u2020",
            "u20a020ab",
            "u20ad20cf",
            "gradienttype0",
            "webkitkeyframes",
            "span",
            "button",
            "tbody",
            "textarea",
            "helvetica neue",
            "tfoot",
            "body",
            "alpha",
            "twitter",
            "roboto",
            "pitch",
            "datasecret",
            "q1kg",
            "q17g",
            "d2dg",
            "c d3r",
            "q171zg",
            "e c2ttttb",
            "c g7",
            "6n184z",
            "6f6g",
            "typeof",
            "wpcf7redirect",
            "cf7mlscurrentfs",
            "handle fire",
            "popuptemplate",
            "templatename",
            "click",
            "fieldset",
            "cf7mlsbackfs",
            "section",
            "classwidget",
            "idmenu",
            "idfooter",
            "idwidget",
            "idcomment",
            "classmenu",
            "classfooter",
            "classcomment",
            "target",
            "blank",
            "typeof e",
            "formdata",
            "typeof symbol",
            "customevent",
            "post",
            "refill",
            "wpcf7",
            "wpcf7locale",
            "wpcf7unittag",
            "typeof wpcf7",
            "boolean",
            "modernizr",
            "custom build",
            "build",
            "afunction",
            "cfunction",
            "object",
            "documenttouch",
            "websocket",
            "symbol",
            "generator",
            "function",
            "select",
            "harvest",
            "mit license",
            "optgroup",
            "nnn n",
            "n nnnn",
            "explorer",
            "options",
            "abbr",
            "element",
            "unknownerror",
            "overquerylimit",
            "requestdenied",
            "zeroresults",
            "node",
            "edge",
            "android",
            "trident",
            "unknown",
            "false",
            "iframe",
            "marker",
            "hybrid",
            "tawkspinner",
            "failed",
            "resend",
            "tawkavatar",
            "tawkvideo",
            "tawkalert",
            "tawkemoji",
            "tawkicon",
            "enter",
            "number",
            "startchatbutton",
            "u26a1",
            "typeof t",
            "invalid attempt",
            "copyright",
            "marketo",
            "remove",
            "commentform",
            "author",
            "mouseenter",
            "secure",
            "ccpa",
            "bottom",
            "fixed",
            "widget",
            "embed",
            "trigger",
            "antispam",
            "please",
            "cleantalk",
            "typeof o",
            "ajaxnonce",
            "unkown",
            "apbctajaxerror",
            "typeof define",
            "typeof module",
            "html tags",
            "ox20trnf",
            "dom element",
            "attr",
            "pseudo",
            "child",
            "udc66udc67",
            "ud83d",
            "ufe0f",
            "ud83e",
            "udc68udc69",
            "udfcbudfcc",
            "u2640u2642",
            "source",
            "image",
            "ud83dudc6cud83c",
            "qe",
            "string",
            "xhfunction",
            "yhfunction",
            "gtmptxlxz4",
            "host",
            "code",
            "script",
            "promise",
            "complete",
            "reduceright",
            "g7be8pmlskx",
            "r300",
            "typeof d",
            "caca",
            "ufunction",
            "ffunction",
            "gfunction",
            "mchtd",
            "azaz",
            "firefox",
            "opera",
            "chrome",
            "iemobile",
            "black",
            "incorrect",
            "xfunction",
            "typeof p",
            "typeof btoa",
            "vnode",
            "colohouse",
            "york",
            "learn more",
            "data center",
            "miami",
            "e cermak",
            "springs",
            "read",
            "cloud",
            "managed",
            "fast",
            "philadelphia",
            "bare",
            "metal",
            "chat",
            "accept",
            "placeheld",
            "minimum",
            "tooshort",
            "wpcf7wfreetext",
            "alert",
            "invert",
            "form",
            "animation",
            "value",
            "foundation",
            "migrate",
            "backcompat",
            "quirks mode",
            "typeof f",
            "html",
            "sufeffxa0",
            "legacy",
            "contenttype",
            "wivobjkey",
            "typehit",
            "data",
            "closure library",
            "pfunction",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction"
          ],
          "references": [
            "xfe-URL-Data102.com-stix2-2.1-export.json",
            "https://www.google-analytics.com/analytics.js",
            "https://chimpstatic.com/mcjs-connected/js/users/6c3abfa7ff8634c75cdb2b22e/ddf7a436c1746be666f330e4a.js",
            "https://app.whoisvisiting.com/who.js",
            "https://www.data102.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp",
            "https://www.data102.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1",
            "https://www.data102.com/?wordfence_lh=1&hid=2D6A812A7EB197E80D5A3978A6386BE4&r=0.5029022326538093",
            "https://www.data102.com/wp-includes/js/wp-embed.min.js?ver=00b0ffc433836dcf9f57035fded0b908",
            "https://www.data102.com/wp-content/plugins/cta/shared//shortcodes/js/spin.min.js",
            "https://www.data102.com/wp-content/plugins/contact-form-7/includes/js/scripts.js",
            "https://colohouse.com/",
            "xfe-URL-colohouse.com-stix2-2.1-export.json",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-main.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-vendor.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-vendors.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-common.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-runtime.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-app.js",
            "https://munchkin.marketo.net/161/munchkin.js",
            "https://www.googletagmanager.com/gtag/js?id=G-7BE8PMLSKX&l=dataLayer&cx=c",
            "https://embed.tawk.to/5697c34527b9b5d40b66960f/default",
            "https://www.googletagmanager.com/gtm.js?id=GTM-PTXLXZ4",
            "https://colohouse.com/wp-includes/js/wp-emoji-release.min.js?ver=5.8",
            "https://colohouse.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
            "https://colohouse.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2",
            "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/apbct-public--functions.min.js?ver=5.173",
            "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/apbct-public.min.js?ver=5.173",
            "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/cleantalk-modal.min.js?ver=5.173",
            "https://colohouse.com/wp-content/plugins/cookie-law-info/public/js/cookie-law-info-public.js?ver=2.0.4",
            "https://colohouse.com/wp-content/plugins/stop-user-enumeration/frontend/js/frontend.js?ver=1.3.31",
            "https://colohouse.com/wp-content/plugins/duracelltomi-google-tag-manager/js/gtm4wp-form-move-tracker.js?ver=1.13.1",
            "https://munchkin.marketo.net/munchkin.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-2d0d2b7c.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-32507910.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-f163fcd0.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-2d0b9454.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-4fe9d5dd.js",
            "https://app-ab02.marketo.com/js/forms2/js/forms2.min.js",
            "https://maps.googleapis.com/maps/api/js?v=3.exp&key=AIzaSyDR76rjQL_2raonHiZ6ZrPqJr-FPb7pGH0",
            "https://colohouse.com/wp-content/themes/Netrouting/assets/chosen/chosen.jquery.min.js",
            "https://colohouse.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.7",
            "https://colohouse.com/wp-content/themes/Netrouting/js/vendor/modernizr-2.8.3-respond-1.4.2.min.js",
            "https://colohouse.com/wp-content/plugins/contact-form-7/includes/js/index.js?ver=5.4.2",
            "https://colohouse.com/wp-content/plugins/link-whisper-premium/js/frontend.js?ver=1632756485",
            "https://colohouse.com/wp-content/plugins/wpcf7-redirect/build/js/wpcf7-redirect-frontend-script.js?ver=1.1",
            "https://colohouse.com/wp-content/plugins/kingcomposer/assets/frontend/js/kingcomposer.min.js?ver=2.9.6",
            "https://colohouse.com/wp-includes/js/wp-embed.min.js?ver=5.8",
            "https://colohouse.com/wp-content/plugins/wp-schema-pro/admin/assets/min-js/frontend.min.js?ver=2.7.2",
            "https://colohouse.com/wp-content/cache/autoptimize/css/autoptimize_5e11636f7dd8fb4f55e0ff84f0ed5faa.css",
            "https://fonts.googleapis.com/css?family=Libre+Franklin%3A300%2C300i%2C400%2C400i%2C600%2C600i%2C800%2C800i&subset=latin%2Clatin-ext",
            "https://fonts.googleapis.com/css?family=Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic&subset=greek%2Clatin%2Cvietnamese%2Clatin-ext%2Ccyrillic%2Ccyrillic-ext%2Cgreek-ext&ver=2.9.6",
            "https://app-ab02.marketo.com/js/forms2/css/forms2.css",
            "https://app-ab02.marketo.com/js/forms2/css/forms2-theme-simple.css",
            "https://app-ab02.marketo.com/index.php/form/XDFrame"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Qe",
              "display_name": "Qe",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1049",
              "name": "System Network Connections Discovery",
              "display_name": "T1049 - System Network Connections Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2599,
            "hostname": 952,
            "FileHash-SHA256": 458,
            "domain": 557
          },
          "indicator_count": 4566,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1431 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6252df03791ceb2df29742fe",
          "name": "reCAPTCHA",
          "description": "var a,r, i,o, r, c+(((s>>>16)*c&65535)<<16, as well as the Object, to be used as a decoder.",
          "modified": "2022-05-10T00:02:48.350000",
          "created": "2022-04-10T13:43:30.961000",
          "tags": [
            "arial",
            "roboto",
            "helvetica neue",
            "typesubmit",
            "webkitkeyframes",
            "typeerror",
            "typeof t",
            "string",
            "object",
            "typeof e",
            "symbol",
            "typeof symbol",
            "typeof window",
            "typeof self",
            "typeof r",
            "date",
            "body",
            "html",
            "typeof n",
            "error",
            "version",
            "shown",
            "click",
            "dataspy",
            "trident",
            "window",
            "lpmlightbox",
            "messaging1",
            "chat0",
            "href",
            "tabindex",
            "copyright",
            "closure library",
            "info",
            "smsclientapi",
            "null",
            "typeof",
            "regexp",
            "debug",
            "chat",
            "scraper",
            "cookie",
            "stop",
            "iframe",
            "explorer",
            "small",
            "seppuku",
            "jsloader",
            "token",
            "viewed",
            "kbcontentclick",
            "blank",
            "post",
            "document",
            "typeof storage",
            "unknownerror",
            "element",
            "overquerylimit",
            "requestdenied",
            "zeroresults",
            "notfound",
            "node",
            "edge",
            "android",
            "unknown",
            "false",
            "june",
            "generator",
            "marker",
            "hybrid",
            "month",
            "azaz09",
            "hours",
            "function",
            "number",
            "fullyear",
            "controller",
            "christ",
            "sufeffxa0",
            "class",
            "attr",
            "pseudo",
            "child",
            "js foundation",
            "typeof module",
            "directclick",
            "x22loansx22",
            "x221x22",
            "9o7nxzt",
            "x22applyx22",
            "x3dw",
            "x3dnew",
            "x22pageloadx22",
            "x22scriptx22",
            "x22uetqx22",
            "viewcontent",
            "addtocart",
            "purchase",
            "array",
            "customevent",
            "09af",
            "ver0",
            "tag0",
            "extdata0",
            "ua ch",
            "invalid",
            "license",
            "calltrkswap",
            "typeof s",
            "xmlhttprequest",
            "65535",
            "awindow",
            "cwm fjordbank",
            "activexobject",
            "tfunction",
            "sfunction",
            "yfunction",
            "googlendt"
          ],
          "references": [
            "xfe-URL-ihagoogle.com-stix2-2.1-export.json",
            "http://pagead2.googlesyndication.com/apps/domainpark/show_afd_ads.js",
            "http://sedoparking.com/frmpark/ihagoogle.com/sedopark/park.js",
            "http://instantfwding.com/px.js?ch=1",
            "http://pxlgnpgecom-a.akamaihd.net/javascripts/browserfp.min.js?templateId=11&customerId=7CUHNT0E1",
            "https://pxlgnpgecom-a.akamaihd.net/javascripts/bfp_ssn.js?templateId=11",
            "https://s.thebrighttag.com/tag?site=9O7NXzt&H=-5nu6gjg&referrer=https%3A%2F%2Fwww.zealcu.org%2Fhome-loans%2F%3Fmsclkid%3D3ef1349815a11e52b0b256cacc0bc952%26utm_source%3Dbing%26utm_medium%3Dcpc%26utm_campaign%3DSearch%253A%2520Zeal%2520Credit%2520Union%2520-%2520Mortgages%26utm_term%3Dhouse%2520mortgage%26utm_content%3DMortgage%2520General&docReferrer=http%3A%2F%2Finstantfwding.com%2F&mode=v2&cf=7500150%2C7500152&btpdb.9O7NXzt.dGZjLjc1MDAxNTE=UkVRVUVTVFMuMA&btpdb.9O7NXzt.dGZjLjc1MTUyNDU=U0VTU0lPTg&btpdb.9O7N",
            "https://cdn.callrail.com/companies/448598242/66d5efd6cbf06378ea1f/12/swap.js",
            "https://bat.bing.com/bat.js",
            "https://tag.perfectaudience.com/serve/5f59021d1911b61034000d8d.js",
            "https://s.thebrighttag.com/tag?site=9O7NXzt&referrer=https%3A%2F%2Fwww.zealcu.org%2Fhome-loans%2F%3Fmsclkid%3D3ef1349815a11e52b0b256cacc0bc952%26utm_source%3Dbing%26utm_medium%3Dcpc%26utm_campaign%3DSearch%253A%2520Zeal%2520Credit%2520Union%2520-%2520Mortgages%26utm_term%3Dhouse%2520mortgage%26utm_content%3DMortgage%2520General&docReferrer=http%3A%2F%2Finstantfwding.com%2F&H=-5nu6gjg",
            "https://code.jquery.com/jquery-3.4.1.min.js?ver=3.4.1",
            "https://integration.silvercloudinc.com/js/bundle/vendor.js",
            "https://maps.googleapis.com/maps/api/js?key=AIzaSyAMbtdeFB5s623T4LwRldWj_Vdy2t4wLkw&libraries=places",
            "https://lptag.liveperson.net/tag/tag.js?site=22027291",
            "https://integration.silvercloudinc.com/js/bundle/8.engageware-bundle.js",
            "https://lptag.liveperson.net/lptag/api/account/22027291/configuration/applications/taglets/.jsonp?v=2.0&df=2&b=2",
            "https://pixel-geo.prfct.co/tagjs?a_id=131352&source=js_tag",
            "https://bat.bing.com/p/action/56358236.js",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/388043112/?random=1649597062436&cv=9&fst=1649597062436&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=2&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2oa3u0&sendb=1&ig=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fwww.zealcu.org%2Fhome-loans%2F%3Fmsclkid%3D3ef1349815a11e52b0b256cacc0bc952%26utm_source%3Dbing%26utm_medium%3Dcpc%26utm_campaign%3DSearch%3A%2520Zeal%2520Credit%2520",
            "https://lpcdn.lpsnmedia.net/le_re/3.50.0.1-release_5103/jsv2/overlay.js?_v=3.50.0.1-release_5103",
            "https://www.zealcu.org/app/uploads/cache/js/aggregated_single_eb9d05879e4cb943b965deb3cccf05ee.js",
            "https://integration.silvercloudinc.com/js/silvercloudjs/silvercloud.js",
            "https://js.callrail.com/group/0/66d5efd6cbf06378ea1f/02836fdf-c99c-4a90-b31b-373093db654e/poll.js?t=1649597153888&ids%5B%5D=448598242",
            "https://js.callrail.com/group/0/66d5efd6cbf06378ea1f/02836fdf-c99c-4a90-b31b-373093db654e/poll.js?t=1649598014683&ids%5B%5D=448598242",
            "https://www.zealcu.org/app/uploads/cache/css/aggregated_cd3154a65f0e94fa98c08398cba54caa.css",
            "https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfjFjMaAAAAACpmnf2RfTg2U2m4Cdnku25XccJW&co=aHR0cHM6Ly93d3cuemVhbGN1Lm9yZzo0NDM.&hl=en&v=Y-cOIEkAqcfDdup_qnnmkxIC&theme=light&size=normal&cb=j4msjl4zxy97",
            "https://va.idp.liveperson.net/postmessage/postmessage.min.html?bust=1649597064004&loc=https%3A%2F%2Fwww.zealcu.org",
            "https://bid.g.doubleclick.net/xbbe/pixel?d=KAE"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1790,
            "hostname": 586,
            "FileHash-SHA256": 362,
            "domain": 330,
            "email": 1
          },
          "indicator_count": 3069,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 70,
          "modified_text": "1440 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "624de06b6d7b6fb1caada56a",
          "name": "\u542b\u7f9e\u8349\u7814\u7a76\u6240|Fi11.com",
          "description": "var a,b,c,d, f.substr(d),a=f, a.href, and a number of other elements:a.b.search.com.",
          "modified": "2022-05-06T18:05:54.002000",
          "created": "2022-04-06T18:48:11.932000",
          "tags": [
            "date",
            "cnzzdata",
            "czuuid",
            "umdistinctid",
            "toast",
            "android",
            "androidig",
            "linuxig",
            "iphoneipodiosig",
            "ipadig",
            "windows",
            "alert",
            "image",
            "object",
            "boolean",
            "error",
            "typeof t",
            "number",
            "67108863",
            "string",
            "typeerror",
            "array",
            "promise",
            "null",
            "this",
            "unknown",
            "write",
            "iframe",
            "window",
            "backspace",
            "body",
            "verify",
            "fullscreen",
            "copyright",
            "closure library",
            "pfunction",
            "contenttype",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction"
          ],
          "references": [
            "xfe-IP-137.220.241.241-stix2-2.0-export.json",
            "https://h5.hxcpp100.com/?id=22929",
            "https://www.google-analytics.com/analytics.js",
            "https://h5.hxcpp100.com/js/linkChange.js",
            "https://imgs.qgddmy.com/static_h5/js/manifest.2ae2e69a05c33dfc65f8.js",
            "https://imgs.qgddmy.com/static_h5/js/vendor.4071e145e4ea91fa5ab1.js",
            "http://push.zhanzhang.baidu.com/push.js",
            "https://js.users.51.la/21185805.js",
            "https://www.hxcpp100.com/js/linkChange.js",
            "https://c.cnzz.com/core.php?web_id=1280798474&t=z",
            "https://s9.cnzz.com/z_stat.php?id=1280743953&web_id=1280743953"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 981,
            "hostname": 279,
            "domain": 202,
            "FileHash-SHA256": 73,
            "CVE": 1
          },
          "indicator_count": 1536,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1443 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "624de0699b9516c5c53a4c60",
          "name": "\u542b\u7f9e\u8349\u7814\u7a76\u6240|Fi11.com",
          "description": "var a,b,c,d, f.substr(d),a=f, a.href, and a number of other elements:a.b.search.com.",
          "modified": "2022-05-06T18:05:54.002000",
          "created": "2022-04-06T18:48:09.891000",
          "tags": [
            "date",
            "cnzzdata",
            "czuuid",
            "umdistinctid",
            "toast",
            "android",
            "androidig",
            "linuxig",
            "iphoneipodiosig",
            "ipadig",
            "windows",
            "alert",
            "image",
            "object",
            "boolean",
            "error",
            "typeof t",
            "number",
            "67108863",
            "string",
            "typeerror",
            "array",
            "promise",
            "null",
            "this",
            "unknown",
            "write",
            "iframe",
            "window",
            "backspace",
            "body",
            "verify",
            "fullscreen",
            "copyright",
            "closure library",
            "pfunction",
            "contenttype",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction"
          ],
          "references": [
            "xfe-IP-137.220.241.241-stix2-2.0-export.json",
            "https://h5.hxcpp100.com/?id=22929",
            "https://www.google-analytics.com/analytics.js",
            "https://h5.hxcpp100.com/js/linkChange.js",
            "https://imgs.qgddmy.com/static_h5/js/manifest.2ae2e69a05c33dfc65f8.js",
            "https://imgs.qgddmy.com/static_h5/js/vendor.4071e145e4ea91fa5ab1.js",
            "http://push.zhanzhang.baidu.com/push.js",
            "https://js.users.51.la/21185805.js",
            "https://www.hxcpp100.com/js/linkChange.js",
            "https://c.cnzz.com/core.php?web_id=1280798474&t=z",
            "https://s9.cnzz.com/z_stat.php?id=1280743953&web_id=1280743953"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 981,
            "hostname": 279,
            "domain": 202,
            "FileHash-SHA256": 73,
            "CVE": 1
          },
          "indicator_count": 1536,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1443 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "624de05d2c58343224615255",
          "name": "\u542b\u7f9e\u8349\u7814\u7a76\u6240|Fi11.com",
          "description": "var a,b,c,d, f.substr(d),a=f, a.href, and a number of other elements:a.b.search.com.",
          "modified": "2022-05-06T18:05:54.002000",
          "created": "2022-04-06T18:47:57.704000",
          "tags": [
            "date",
            "cnzzdata",
            "czuuid",
            "umdistinctid",
            "toast",
            "android",
            "androidig",
            "linuxig",
            "iphoneipodiosig",
            "ipadig",
            "windows",
            "alert",
            "image",
            "object",
            "boolean",
            "error",
            "typeof t",
            "number",
            "67108863",
            "string",
            "typeerror",
            "array",
            "promise",
            "null",
            "this",
            "unknown",
            "write",
            "iframe",
            "window",
            "backspace",
            "body",
            "verify",
            "fullscreen",
            "copyright",
            "closure library",
            "pfunction",
            "contenttype",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction"
          ],
          "references": [
            "xfe-IP-137.220.241.241-stix2-2.0-export.json",
            "https://h5.hxcpp100.com/?id=22929",
            "https://www.google-analytics.com/analytics.js",
            "https://h5.hxcpp100.com/js/linkChange.js",
            "https://imgs.qgddmy.com/static_h5/js/manifest.2ae2e69a05c33dfc65f8.js",
            "https://imgs.qgddmy.com/static_h5/js/vendor.4071e145e4ea91fa5ab1.js",
            "http://push.zhanzhang.baidu.com/push.js",
            "https://js.users.51.la/21185805.js",
            "https://www.hxcpp100.com/js/linkChange.js",
            "https://c.cnzz.com/core.php?web_id=1280798474&t=z",
            "https://s9.cnzz.com/z_stat.php?id=1280743953&web_id=1280743953"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 981,
            "hostname": 279,
            "domain": 202,
            "FileHash-SHA256": 73,
            "CVE": 1
          },
          "indicator_count": 1536,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1443 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "624dbf64e7682b3bf049129c",
          "name": "Malware-USA",
          "description": "Shopseg Sistemas, a company specialising in software and equipamentos for supermercados, wedi dweud eu s\u00f4n i'n \u00f4l.",
          "modified": "2022-05-06T16:01:29.122000",
          "created": "2022-04-06T16:27:16.842000",
          "tags": [
            "dataaos",
            "100px00",
            "dataaosfade",
            "100px0",
            "dataaoszoom",
            "dataaosflip",
            "woff2",
            "fontface",
            "sans",
            "u0259",
            "u1e001eff",
            "u2020",
            "u20a020ab",
            "u20ad20cf",
            "u2113",
            "u2c602c7f",
            "reduceright",
            "number",
            "string",
            "gtl5jtn10ss",
            "regexp",
            "error",
            "r300",
            "copyright",
            "dafunction",
            "gafunction",
            "uint8array",
            "date",
            "path",
            "void",
            "const",
            "click",
            "select",
            "scroll",
            "mobile",
            "template",
            "template url",
            "license",
            "easy selector",
            "easy event",
            "easy",
            "back",
            "typeof e",
            "typeof t",
            "this",
            "main",
            "swiper",
            "button",
            "most",
            "mit license",
            "android",
            "win32",
            "null",
            "dblock",
            "email form",
            "validation",
            "action",
            "formdata",
            "api url",
            "typeof define",
            "typeof module",
            "gplv3",
            "metafizzy",
            "math",
            "plyr",
            "typeof symbol",
            "typeerror",
            "tnull",
            "cnull",
            "typeof",
            "inject",
            "playbook",
            "name",
            "getconfig",
            "default",
            "area",
            "event",
            "shadowroot",
            "boolean",
            "window",
            "trident",
            "body",
            "ofunction",
            "symbol",
            "mfunction",
            "sfunction",
            "quando",
            "quem",
            "fundada em",
            "informtica",
            "sistemas",
            "segurana",
            "softwares",
            "supermercados",
            "lojas",
            "restaurantes",
            "padarias"
          ],
          "references": [
            "http://www.shopsegsistemas.com.br/",
            "http://www.shopsegsistemas.com.br/assets/vendor/aos/aos.js",
            "http://www.shopsegsistemas.com.br/assets/vendor/bootstrap/js/bootstrap.bundle.min.js",
            "http://www.shopsegsistemas.com.br/assets/vendor/glightbox/js/glightbox.min.js",
            "http://www.shopsegsistemas.com.br/assets/vendor/isotope-layout/isotope.pkgd.min.js",
            "http://www.shopsegsistemas.com.br/assets/vendor/php-email-form/validate.js",
            "http://www.shopsegsistemas.com.br/assets/vendor/swiper/swiper-bundle.min.js",
            "http://www.shopsegsistemas.com.br/assets/js/main.js",
            "https://www.googletagmanager.com/gtag/js?id=G-TL5JTN10SS",
            "https://fonts.googleapis.com/css?family=Open+Sans:300,300i,400,400i,600,600i,700,700i%7CRaleway:300,300i,400,400i,500,500i,600,600i,700,700i%7CPoppins:300,300i,400,400i,500,500i,600,600i,700,700i",
            "http://www.shopsegsistemas.com.br/assets/vendor/aos/aos.css",
            "https://www.google.com/maps/embed?pb=!1m18!1m12!1m3!1d3730.503584706544!2d-41.67284568552043!3d-20.770905270369408!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0xbb93dcc0beb01f%3A0x97397d38847b3692!2sShopSeg%20Sistemas!5e0!3m2!1spt-BR!2sbr!4v1636561779046!5m2!1spt-BR!2sbr",
            "xfe-IP-50.116.87.164-stix2-2.0-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            },
            {
              "id": "Quando",
              "display_name": "Quando",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 254,
            "URL": 815,
            "FileHash-SHA256": 168,
            "domain": 174
          },
          "indicator_count": 1411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1443 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "624dbf641e6a04169629e662",
          "name": "Malware-USA",
          "description": "Shopseg Sistemas, a company specialising in software and equipamentos for supermercados, wedi dweud eu s\u00f4n i'n \u00f4l.",
          "modified": "2022-05-06T16:01:29.122000",
          "created": "2022-04-06T16:27:16.093000",
          "tags": [
            "dataaos",
            "100px00",
            "dataaosfade",
            "100px0",
            "dataaoszoom",
            "dataaosflip",
            "woff2",
            "fontface",
            "sans",
            "u0259",
            "u1e001eff",
            "u2020",
            "u20a020ab",
            "u20ad20cf",
            "u2113",
            "u2c602c7f",
            "reduceright",
            "number",
            "string",
            "gtl5jtn10ss",
            "regexp",
            "error",
            "r300",
            "copyright",
            "dafunction",
            "gafunction",
            "uint8array",
            "date",
            "path",
            "void",
            "const",
            "click",
            "select",
            "scroll",
            "mobile",
            "template",
            "template url",
            "license",
            "easy selector",
            "easy event",
            "easy",
            "back",
            "typeof e",
            "typeof t",
            "this",
            "main",
            "swiper",
            "button",
            "most",
            "mit license",
            "android",
            "win32",
            "null",
            "dblock",
            "email form",
            "validation",
            "action",
            "formdata",
            "api url",
            "typeof define",
            "typeof module",
            "gplv3",
            "metafizzy",
            "math",
            "plyr",
            "typeof symbol",
            "typeerror",
            "tnull",
            "cnull",
            "typeof",
            "inject",
            "playbook",
            "name",
            "getconfig",
            "default",
            "area",
            "event",
            "shadowroot",
            "boolean",
            "window",
            "trident",
            "body",
            "ofunction",
            "symbol",
            "mfunction",
            "sfunction",
            "quando",
            "quem",
            "fundada em",
            "informtica",
            "sistemas",
            "segurana",
            "softwares",
            "supermercados",
            "lojas",
            "restaurantes",
            "padarias"
          ],
          "references": [
            "http://www.shopsegsistemas.com.br/",
            "http://www.shopsegsistemas.com.br/assets/vendor/aos/aos.js",
            "http://www.shopsegsistemas.com.br/assets/vendor/bootstrap/js/bootstrap.bundle.min.js",
            "http://www.shopsegsistemas.com.br/assets/vendor/glightbox/js/glightbox.min.js",
            "http://www.shopsegsistemas.com.br/assets/vendor/isotope-layout/isotope.pkgd.min.js",
            "http://www.shopsegsistemas.com.br/assets/vendor/php-email-form/validate.js",
            "http://www.shopsegsistemas.com.br/assets/vendor/swiper/swiper-bundle.min.js",
            "http://www.shopsegsistemas.com.br/assets/js/main.js",
            "https://www.googletagmanager.com/gtag/js?id=G-TL5JTN10SS",
            "https://fonts.googleapis.com/css?family=Open+Sans:300,300i,400,400i,600,600i,700,700i%7CRaleway:300,300i,400,400i,500,500i,600,600i,700,700i%7CPoppins:300,300i,400,400i,500,500i,600,600i,700,700i",
            "http://www.shopsegsistemas.com.br/assets/vendor/aos/aos.css",
            "https://www.google.com/maps/embed?pb=!1m18!1m12!1m3!1d3730.503584706544!2d-41.67284568552043!3d-20.770905270369408!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0xbb93dcc0beb01f%3A0x97397d38847b3692!2sShopSeg%20Sistemas!5e0!3m2!1spt-BR!2sbr!4v1636561779046!5m2!1spt-BR!2sbr",
            "xfe-IP-50.116.87.164-stix2-2.0-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            },
            {
              "id": "Quando",
              "display_name": "Quando",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 254,
            "URL": 815,
            "FileHash-SHA256": 168,
            "domain": 174
          },
          "indicator_count": 1411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1443 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6249814713d29e4f994fc037",
          "name": "Botnet",
          "description": "function ra(a,b,c,d,e,f, a new type of node, which can only be defined by its own type, is the same as its current type.",
          "modified": "2022-05-03T00:01:26.398000",
          "created": "2022-04-03T11:13:11.584000",
          "tags": [
            "hide",
            "regexp",
            "enter",
            "date",
            "arrowup",
            "down",
            "arrowdown",
            "left",
            "arrowleft",
            "right",
            "blank",
            "typeof e",
            "function",
            "arraybuffer",
            "promise",
            "matt zabriskie",
            "typeof",
            "typeof define",
            "array",
            "typeof formdata",
            "error",
            "null",
            "typeof console",
            "mit license",
            "object",
            "tfunction",
            "knew t",
            "qfunction",
            "typeof window",
            "typeof r",
            "string",
            "azaz",
            "button",
            "vnode",
            "number",
            "backspace",
            "uint8array",
            "typeof t",
            "typeof location",
            "blob",
            "typeof symbol",
            "typeof n",
            "javascript",
            "please",
            "strong",
            "tbody",
            "span",
            "thead",
            "tfoot",
            "typecheckbox",
            "typeradio",
            "href",
            "typesearch",
            "typedate",
            "typetime",
            "twitter",
            "applewebkit",
            "gecko",
            "khtml",
            "safari",
            "mac os",
            "alert",
            "base",
            "trident",
            "presto",
            "android",
            "webpackrequire",
            "name",
            "iterator",
            "typedarray",
            "prototype",
            "index",
            "meta",
            "target",
            "infinity",
            "zero",
            "epsilon",
            "observer",
            "trim",
            "enumerate",
            "freeze",
            "internal",
            "bind",
            "window",
            "next",
            "find",
            "this",
            "rest",
            "middle",
            "sweetalert2",
            "yfunction",
            "boolean",
            "cancel",
            "typeof document",
            "n okn",
            "canceln n",
            "cfunction",
            "typeof c",
            "copyright",
            "bootstrap",
            "rolemenu",
            "typeof f",
            "typeof g",
            "cookie plugin",
            "https",
            "klaus hartl",
            "register",
            "nodecommonjs",
            "factory",
            "jquery",
            "write",
            "typeof b",
            "pseudo",
            "child",
            "sufeffxa0",
            "class",
            "attr"
          ],
          "references": [
            "https://app.fanzhi.xyz/dist/js/jquery.min.js",
            "https://app.fanzhi.xyz/dist/js/jquery.cookie.js",
            "https://app.fanzhi.xyz/dist/vendors/bootstrap/js/bootstrap.min.js",
            "https://pv.sohu.com/cityjson?ie=utf-8",
            "https://app.fanzhi.xyz/dist/vendors/sweetalert2/sweetalert2.min.js",
            "https://app.fanzhi.xyz/dist/vendors/core-js/core.js",
            "https://app.fanzhi.xyz/dist/js/app.base.js",
            "https://app.fanzhi.xyz/dist/vendors/bootstrap/css/bootstrap.min.css",
            "https://app.fanzhi.xyz/dist/css/vip.css",
            "https://fengweics.com/",
            "https://kf.cdsanheli.com/online.html?cid=e3e6922f27c54ad485cf59aee1204615",
            "https://kf.cdsanheli.com/js/socket.io.min.js",
            "https://kf.cdsanheli.com/js/vue.min.js",
            "https://kf.cdsanheli.com/js/vue-i18n.min.js",
            "https://kf.cdsanheli.com/js/axios.min.js",
            "https://kf.cdsanheli.com/js/online.3de8ba00.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1547,
            "domain": 246,
            "hostname": 619,
            "FileHash-SHA256": 124,
            "CVE": 2
          },
          "indicator_count": 2538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1447 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6249814433d08ebcfc2b6e2a",
          "name": "Botnet",
          "description": "function ra(a,b,c,d,e,f, a new type of node, which can only be defined by its own type, is the same as its current type.",
          "modified": "2022-05-03T00:01:26.398000",
          "created": "2022-04-03T11:13:08.540000",
          "tags": [
            "hide",
            "regexp",
            "enter",
            "date",
            "arrowup",
            "down",
            "arrowdown",
            "left",
            "arrowleft",
            "right",
            "blank",
            "typeof e",
            "function",
            "arraybuffer",
            "promise",
            "matt zabriskie",
            "typeof",
            "typeof define",
            "array",
            "typeof formdata",
            "error",
            "null",
            "typeof console",
            "mit license",
            "object",
            "tfunction",
            "knew t",
            "qfunction",
            "typeof window",
            "typeof r",
            "string",
            "azaz",
            "button",
            "vnode",
            "number",
            "backspace",
            "uint8array",
            "typeof t",
            "typeof location",
            "blob",
            "typeof symbol",
            "typeof n",
            "javascript",
            "please",
            "strong",
            "tbody",
            "span",
            "thead",
            "tfoot",
            "typecheckbox",
            "typeradio",
            "href",
            "typesearch",
            "typedate",
            "typetime",
            "twitter",
            "applewebkit",
            "gecko",
            "khtml",
            "safari",
            "mac os",
            "alert",
            "base",
            "trident",
            "presto",
            "android",
            "webpackrequire",
            "name",
            "iterator",
            "typedarray",
            "prototype",
            "index",
            "meta",
            "target",
            "infinity",
            "zero",
            "epsilon",
            "observer",
            "trim",
            "enumerate",
            "freeze",
            "internal",
            "bind",
            "window",
            "next",
            "find",
            "this",
            "rest",
            "middle",
            "sweetalert2",
            "yfunction",
            "boolean",
            "cancel",
            "typeof document",
            "n okn",
            "canceln n",
            "cfunction",
            "typeof c",
            "copyright",
            "bootstrap",
            "rolemenu",
            "typeof f",
            "typeof g",
            "cookie plugin",
            "https",
            "klaus hartl",
            "register",
            "nodecommonjs",
            "factory",
            "jquery",
            "write",
            "typeof b",
            "pseudo",
            "child",
            "sufeffxa0",
            "class",
            "attr"
          ],
          "references": [
            "https://app.fanzhi.xyz/dist/js/jquery.min.js",
            "https://app.fanzhi.xyz/dist/js/jquery.cookie.js",
            "https://app.fanzhi.xyz/dist/vendors/bootstrap/js/bootstrap.min.js",
            "https://pv.sohu.com/cityjson?ie=utf-8",
            "https://app.fanzhi.xyz/dist/vendors/sweetalert2/sweetalert2.min.js",
            "https://app.fanzhi.xyz/dist/vendors/core-js/core.js",
            "https://app.fanzhi.xyz/dist/js/app.base.js",
            "https://app.fanzhi.xyz/dist/vendors/bootstrap/css/bootstrap.min.css",
            "https://app.fanzhi.xyz/dist/css/vip.css",
            "https://fengweics.com/",
            "https://kf.cdsanheli.com/online.html?cid=e3e6922f27c54ad485cf59aee1204615",
            "https://kf.cdsanheli.com/js/socket.io.min.js",
            "https://kf.cdsanheli.com/js/vue.min.js",
            "https://kf.cdsanheli.com/js/vue-i18n.min.js",
            "https://kf.cdsanheli.com/js/axios.min.js",
            "https://kf.cdsanheli.com/js/online.3de8ba00.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1547,
            "domain": 246,
            "hostname": 619,
            "FileHash-SHA256": 124,
            "CVE": 2
          },
          "indicator_count": 2538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1447 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "626957a1170a7e91146c5dea",
          "name": "one google maps api call and one generic key - causing a large chunk of cyber disruption and compromise",
          "description": "",
          "modified": "2022-04-27T14:48:01.672000",
          "created": "2022-04-27T14:48:01.672000",
          "tags": [
            "error",
            "element",
            "unknownerror",
            "overquerylimit",
            "requestdenied",
            "zeroresults",
            "object",
            "edge",
            "node",
            "android",
            "null",
            "trident",
            "unknown",
            "false",
            "date",
            "generator",
            "iframe",
            "marker",
            "hybrid"
          ],
          "references": [
            "https://maps.googleapis.com/maps/api/js?key=AIzaSyBaRgbnzMy4cEMm5e2h7pyryfYav7ComTo"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 352,
            "FileHash-SHA256": 135,
            "hostname": 149,
            "domain": 53
          },
          "indicator_count": 689,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 392,
          "modified_text": "1452 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6236040817a626a23c3218e2",
          "name": "forgotten45s.com",
          "description": "",
          "modified": "2022-04-18T00:07:16.048000",
          "created": "2022-03-19T16:25:44.243000",
          "tags": [
            "server",
            "date",
            "iana id",
            "registrar abuse",
            "contact phone",
            "domain status",
            "registrar url",
            "registrar whois",
            "llc domain",
            "abuse contact",
            "algorithm",
            "key identifier",
            "llc creation",
            "rank value",
            "ingestion time",
            "statvoo",
            "dns records"
          ],
          "references": [
            "forgotten45s.com1.pdf",
            "forgotten45s.com.pdf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 362,
            "URL": 1063,
            "CVE": 1,
            "domain": 356,
            "FileHash-SHA256": 500,
            "email": 3,
            "FileHash-MD5": 22,
            "FileHash-SHA1": 16,
            "CIDR": 4
          },
          "indicator_count": 2327,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 406,
          "modified_text": "1462 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62276abfaa65cd33f64331f8",
          "name": "TarrantCounty.com ~ 03.01.2022",
          "description": "",
          "modified": "2022-04-07T00:04:02.553000",
          "created": "2022-03-08T14:39:59.235000",
          "tags": [
            "march",
            "lookup go",
            "rescan add",
            "verdict report",
            "de summary",
            "http",
            "redirects links",
            "behaviour",
            "similar dom",
            "content api",
            "value",
            "search url",
            "search domain",
            "scan url",
            "url search",
            "domain scan",
            "url url",
            "motor vehicle",
            "aqb1",
            "eventsevent10",
            "meta",
            "show",
            "download go",
            "full url",
            "reverse dns",
            "resource",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "response",
            "main",
            "milan",
            "apache",
            "paris",
            "accept"
          ],
          "references": [
            "TarrantCounty3df.pdf",
            "TarantCounty2df.pdf",
            "TarrantCounty4df.pdf",
            "TarrantCounty5df.pdf",
            "tarrant23df.pdf",
            "TarrantCounty1df.pdf",
            "tarrantcounty.com:en:elections:Voter-Information:Voter- Registration.html%22,.pdf",
            "TarrantCounty6df.pdf",
            "TarrantCounty7df.pdf",
            "TarrantCounty10df.pdf",
            "TarrantCounty9df.pdf",
            "TarrantCounty17df.pdf",
            "TarrantCounty15df.pdf",
            "TarrantCounty12df.pdf",
            "TarrantCounty14df.pdf",
            "tarrantcounty8df.pdf",
            "TarrantCounty18df.pdf",
            "TarrantCounty19df.pdf",
            "TarrantCounty21df.pdf",
            "tarrantcounty22df.pdf",
            "TarrantCounty20df.pdf",
            "tarrantcountydf.pdf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4134,
            "hostname": 1607,
            "domain": 838,
            "FileHash-SHA256": 1078,
            "FileHash-SHA1": 2,
            "email": 3,
            "CIDR": 4,
            "FileHash-MD5": 15
          },
          "indicator_count": 7681,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 406,
          "modified_text": "1473 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6249afa504d9fb8ce09eb0df",
          "name": "\u5fc5\u535a\u4f53\u80b2-botnet",
          "description": "A-word-split-by-words, a-single-sigBytes, is an extension of the word-stringing system used by the BBC to create the words in the English language.",
          "modified": "2022-04-03T14:31:01.201000",
          "created": "2022-04-03T14:31:01.201000",
          "tags": [
            "object",
            "function",
            "kefuheader",
            "kefufooter",
            "scoremodal",
            "error404",
            "date",
            "mmdd hh",
            "chat",
            "aobject",
            "javascript",
            "please",
            "strong",
            "datav1e1730b8",
            "emoji",
            "helvetica",
            "arial",
            "datavce814536",
            "noto color",
            "apple color",
            "segoe ui",
            "datav5edb4000",
            "datav6d25583c",
            "promise",
            "error",
            "array",
            "name",
            "regexp",
            "uint8array",
            "string",
            "typeerror",
            "null",
            "this",
            "void",
            "internal",
            "patch",
            "target",
            "4096",
            "6144",
            "4112",
            "light",
            "dark",
            "generator",
            "infinity",
            "shutdown",
            "direct"
          ],
          "references": [
            "https://ejp3z5.com/h5/js/chunk-vendors.0903293f.js",
            "https://ejp3z5.com/h5/js/app.71cd3a66.js",
            "https://ejp3z5.com/h5/css/app.61c96454.css",
            "http://bibo113.com/",
            "https://ejp3z5.com/#/?business_id=66&access_key=3532E209E7051ED50C08BF7D92C3FC44"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 113,
            "URL": 665,
            "hostname": 145,
            "FileHash-SHA256": 40,
            "email": 1
          },
          "indicator_count": 964,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1476 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62497a9c72edc277fb20e52f",
          "name": "'+titlestr+'",
          "description": "If you want to see what is going on at this time of year, spare a thought for T.t.m.T.g.ts.com; T-t=t,",
          "modified": "2022-04-03T10:44:44.074000",
          "created": "2022-04-03T10:44:44.074000",
          "tags": [
            "typeof t",
            "typeof symbol",
            "nthis",
            "msger",
            "typeof e",
            "image",
            "error",
            "typeerror",
            "new date",
            "codeverify",
            "0xa60881",
            "0x1e0610",
            "0x489cca",
            "0x4d5bd1",
            "0x1a7a9a",
            "0x3145fc",
            "0x2d9acb",
            "0xbf1b3e",
            "0x47699d",
            "push",
            "shift",
            "date",
            "cookie",
            "slice",
            "open",
            "code",
            "path",
            "info",
            "null",
            "this",
            "webpackrequire",
            "othis",
            "object",
            "array",
            "executor",
            "canvas",
            "function",
            "slidercaptcha",
            "createelement",
            "textdanger",
            "plugin",
            "rgba",
            "imagedata",
            "false",
            "touchstart",
            "trident",
            "click",
            "typeof",
            "typeof define",
            "typeof c",
            "copyright",
            "twitter",
            "bootstrap",
            "rolemenu",
            "typeof f",
            "typeof g",
            "james levine",
            "udid",
            "x61x70x70x6cx79",
            "azaz",
            "0x5372",
            "0x19",
            "0x3de55b",
            "0x24a5d4",
            "0x5c",
            "0x19c89f",
            "0x2f1b4a",
            "0x4d1e1f",
            "0x1a",
            "0x29",
            "window",
            "honor",
            "root",
            "length",
            "indexof",
            "x0ax20x20x20x20",
            "location",
            "math",
            "0x10",
            "0x18",
            "history",
            "config",
            "onload",
            "android",
            "regexp",
            "x20trnf",
            "class",
            "attr",
            "pseudo",
            "child",
            "swiper",
            "most",
            "mit license",
            "january",
            "typeof b",
            "sufeffxa0",
            "void",
            "typeof n",
            "appappapp",
            "next",
            "toh5",
            "channelcode",
            "androidos",
            "linux",
            "ipad",
            "macintosh",
            "promise",
            "xmlhttprequest",
            "0x1d9131",
            "0x180bcc",
            "0x4b6177",
            "0x13f349",
            "0x3bcb54",
            "0xbbe80d",
            "0x57b7de",
            "0x2ea74e",
            "0x4fb0f2",
            "0x25f113",
            "tencent",
            "barrio",
            "width",
            "accept",
            "cnzzdata",
            "czuuid",
            "umdistinctid",
            "version",
            "october",
            "win32",
            "name",
            "html",
            "meta",
            "viewport"
          ],
          "references": [
            "http://www.laijcm.com/common.js",
            "http://www.laijcm.com/tj.js",
            "http://kk164.xyz/",
            "https://x4707.com:5443/?register=1",
            "https://6112.hnsstjc.com/a002/xpjtz.php",
            "https://6112.hnsstjc.com/a002/js/fontSize.js",
            "https://6112.hnsstjc.com/a002/js/jquery-1.8.3.min.js",
            "https://6112.hnsstjc.com/a002/js/swiper.min.js",
            "https://6112.hnsstjc.com/a002/xpj.php",
            "https://www.xvsgwa.com/qz1IJUpc.html",
            "https://c.cnzz.com/core.php?web_id=1280875449&t=z",
            "https://s9.cnzz.com/z_stat.php?id=1280875449&web_id=1280875449",
            "https://www.bibo14.app:2611/js/jquery-1.11.3.min.js",
            "https://www.bibo14.app:2611/js/cncc.js",
            "https://www.bibo14.app:2611/js/xinstall_inner_e.min.js?v=1004",
            "https://www.bibo14.app:2611/js/down.js?v=1022",
            "https://www.bibo14.app:2611/css/h5/reset.css",
            "https://www.dongtiankuangye.com/a002/config.js",
            "https://www.dongtiankuangye.com/a002/js/plugins/swiper/swiper.min.js",
            "https://www.dongtiankuangye.com/a002/js/libs/jquery-1.12.4/jquery-1.12.4.min.js",
            "https://www.dongtiankuangye.com/a002/js/plugins/swiper/swiper.min.css",
            "https://pojd783.cc:8443/index.html?shareName=pojd783.cc",
            "https://sdk.51.la/event/js-sdk-event.min.js?u=Je0ztO5GuwfJ6eip",
            "https://sdk.51.la/js-sdk-pro.min.js",
            "https://pojd783.cc:8443/js/sharetrace.min.js",
            "https://js112.oss-accelerate.aliyuncs.com/os.js",
            "https://ty66as.jxdysw.cn/1whpv",
            "https://ty66as.jxdysw.cn/dist/vendors/bootstrap/js/bootstrap.min.js",
            "https://ty66as.jxdysw.cn/dist/vendors/clipboard/clipboard.min.js",
            "https://ty66as.jxdysw.cn/dist/captcha/disk/slidercaptcha.js",
            "https://ssl.captcha.qq.com/TCaptcha.js",
            "https://cstaticdun.126.net/load.min.js?t=202007291602",
            "https://t.captcha.qq.com/template/drag_ele.html?t=1648982190651",
            "https://captcha.gtimg.com/1/tcaptcha-frame.db8b9289.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1528,
            "hostname": 543,
            "domain": 209,
            "FileHash-SHA256": 127,
            "email": 1,
            "FileHash-MD5": 4
          },
          "indicator_count": 2412,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1476 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "621bc3aa050a6c5693595f25",
          "name": "Zetalytics API",
          "description": "",
          "modified": "2022-03-29T00:03:34.773000",
          "created": "2022-02-27T18:32:10.542000",
          "tags": [
            "google",
            "google llc",
            "detected",
            "expand overall",
            "http",
            "amazonaes",
            "openssl",
            "lookup go",
            "rescan add",
            "verdict report",
            "behaviour",
            "june",
            "apache",
            "search url",
            "search domain",
            "scan url",
            "url search",
            "domain scan",
            "url url",
            "us summary",
            "line",
            "google maps",
            "api warning",
            "redirects links",
            "similar dom",
            "content api",
            "domains",
            "Ransomware"
          ],
          "references": [
            "zetalytics .pdf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win.Virus.PolyRansom-5704625-0",
              "display_name": "Win.Virus.PolyRansom-5704625-0",
              "target": null
            },
            {
              "id": "Win32:Cryptor",
              "display_name": "Win32:Cryptor",
              "target": null
            },
            {
              "id": "TELPER:CERT:SoftwareBundler:Win32/Bunpredelt",
              "display_name": "TELPER:CERT:SoftwareBundler:Win32/Bunpredelt",
              "target": null
            },
            {
              "id": "Trojan:Win32/Danabot.G",
              "display_name": "Trojan:Win32/Danabot.G",
              "target": "/malware/Trojan:Win32/Danabot.G"
            },
            {
              "id": "Backdoor:Win32/Poison.E",
              "display_name": "Backdoor:Win32/Poison.E",
              "target": "/malware/Backdoor:Win32/Poison.E"
            },
            {
              "id": "ALF:PUA:Block:IObit.R!MTB",
              "display_name": "ALF:PUA:Block:IObit.R!MTB",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 754,
            "URL": 2375,
            "domain": 441,
            "hostname": 833,
            "CIDR": 5,
            "FileHash-MD5": 2,
            "email": 1
          },
          "indicator_count": 4411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 406,
          "modified_text": "1482 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://tag.perfectaudience.com/serve/5f59021d1911b61034000d8d.js",
        "https://js.hsadspixel.net/fb.js",
        "https://www.googletagmanager.com/gtag/js?id=G-6Q8LH84QH0&l=dataLayer&cx=c",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/modernizr.js?ver=2.5.3",
        "https://app.fanzhi.xyz/dist/vendors/bootstrap/js/bootstrap.min.js",
        "https://www.googletagmanager.com/gtag/js?id=UA-41133527-2",
        "https://app.fanzhi.xyz/dist/vendors/bootstrap/css/bootstrap.min.css",
        "https://www.develapp.me/kontakt#formular",
        "https://www.bibo14.app:2611/js/down.js?v=1022",
        "https://imgs.qgddmy.com/static_h5/js/manifest.2ae2e69a05c33dfc65f8.js",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-runtime.js",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-common.js",
        "https://weglot.com/wp-content/plugins/addon-elements-for-elementor-page-builder/assets/js/animated-main.min.js",
        "xfe-IP-103.24.249.209-stix2-2.1-export.json",
        "http://appbyweb.net/AppByWeb/js/superfish.js",
        "https://stackpath.bootstrapcdn.com/bootstrap/4.1.1/js/bootstrap.min.js",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/jquery.flexslider-min.js?ver=1.8",
        "https://lptag.liveperson.net/lptag/api/account/22027291/configuration/applications/taglets/.jsonp?v=2.0&df=2&b=2",
        "https://www.allwest.com/wp-includes/js/wp-emoji-release.min.js?ver=5.9.3",
        "https://colohouse.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
        "http://www.shopsegsistemas.com.br/assets/vendor/php-email-form/validate.js",
        "https://bat.bing.com/p/action/56358236.js",
        "https://script.hotjar.com/modules.7a321ecb93fde9f07226.js",
        "http://kk164.xyz/",
        "xfe-URL-https___my.frantech.ca_-stix2-2.1-export.json",
        "https://fonts.googleapis.com/css?family=Libre+Franklin%3A300%2C300i%2C400%2C400i%2C600%2C600i%2C800%2C800i&subset=latin%2Clatin-ext",
        "https://colohouse.com/wp-content/plugins/cookie-law-info/public/js/cookie-law-info-public.js?ver=2.0.4",
        "http://www.elizabethmesser.com/wp-content/plugins/bloom/css/style.css?ver=1.1.8",
        "https://s.thebrighttag.com/tag?site=9O7NXzt&referrer=https%3A%2F%2Fwww.zealcu.org%2Fhome-loans%2F%3Fmsclkid%3D3ef1349815a11e52b0b256cacc0bc952%26utm_source%3Dbing%26utm_medium%3Dcpc%26utm_campaign%3DSearch%253A%2520Zeal%2520Credit%2520Union%2520-%2520Mortgages%26utm_term%3Dhouse%2520mortgage%26utm_content%3DMortgage%2520General&docReferrer=http%3A%2F%2Finstantfwding.com%2F&H=-5nu6gjg",
        "https://lpcdn.lpsnmedia.net/le_re/3.50.0.1-release_5103/jsv2/overlay.js?_v=3.50.0.1-release_5103",
        "zetalytics .pdf",
        "https://munchkin.marketo.net/munchkin.js",
        "http://m.west.cn/jscripts/baidutj/hm.js",
        "https://js.callrail.com/group/0/66d5efd6cbf06378ea1f/02836fdf-c99c-4a90-b31b-373093db654e/poll.js?t=1649598014683&ids%5B%5D=448598242",
        "https://assets.website-files.com/5f087b2cc04e635c7a4b7e35/js/develapp.b94842ca8.js",
        "https://kf.cdsanheli.com/js/vue.min.js",
        "https://h5.hxcpp100.com/js/linkChange.js",
        "https://www.data102.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp",
        "https://pojd783.cc:8443/js/sharetrace.min.js",
        "http://www.elizabethmesser.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.9",
        "http://astutemedia.asia/rackip/wp-includes/js/wp-embed.min.js?ver=5.5.9",
        "https://kf.cdsanheli.com/js/vue-i18n.min.js",
        "https://colohouse.com/wp-content/plugins/kingcomposer/assets/frontend/js/kingcomposer.min.js?ver=2.9.6",
        "xfe-URL-astutemedia.asia-stix2-2.1-export.json",
        "TarrantCounty19df.pdf",
        "This website contains the details of an anti-virus scan conducted by the MetaDefender, which aims to identify and remove malware from websites, websites and social media sites, including Facebook, Twitter and YouTube.",
        "https://js.users.51.la/21185805.js",
        "https://www.data102.com/wp-content/plugins/cta/shared//shortcodes/js/spin.min.js",
        "https://www.bibo14.app:2611/js/cncc.js",
        "https://www.googletagmanager.com/gtag/js?id=AW-CONVERSION_ID",
        "https://www.gstatic.com/recaptcha/releases/QENb_qRrX0-mQMyENQjD6Fuj/recaptcha__en.js",
        "https://m.west.cn/jscripts/baidutj/hm.js",
        "https://www.data102.com/?wordfence_lh=1&hid=2D6A812A7EB197E80D5A3978A6386BE4&r=0.5029022326538093",
        "https://www.data102.com/wp-includes/js/wp-embed.min.js?ver=00b0ffc433836dcf9f57035fded0b908",
        "https://colohouse.com/",
        "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
        "http://www.shopsegsistemas.com.br/assets/vendor/swiper/swiper-bundle.min.js",
        "https://app-ab02.marketo.com/js/forms2/css/forms2.css",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/jquery.isotope.min.js?ver=1.0",
        "https://va.idp.liveperson.net/postmessage/postmessage.min.html?bust=1649597064004&loc=https%3A%2F%2Fwww.zealcu.org",
        "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/cleantalk-modal.min.js?ver=5.173",
        "https://kf.cdsanheli.com/js/socket.io.min.js",
        "https://6112.hnsstjc.com/a002/js/swiper.min.js",
        "https://ty66as.jxdysw.cn/dist/captcha/disk/slidercaptcha.js",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/retina.min.js?ver=1.1.0",
        "https://www.dongtiankuangye.com/a002/js/plugins/swiper/swiper.min.js",
        "https://js112.oss-accelerate.aliyuncs.com/os.js",
        "http://www.elizabethmesser.com/wp-content/plugins/bloom/js/idle-timer.min.js?ver=1.1.8",
        "https://weglot.com/wp-content/plugins/elementor/assets/lib/font-awesome/js/v4-shims.min.js",
        "http://www.shopsegsistemas.com.br/assets/vendor/bootstrap/js/bootstrap.bundle.min.js",
        "tarrantcounty.com:en:elections:Voter-Information:Voter- Registration.html%22,.pdf",
        "https://beacon-v2.helpscout.net/static/js/main.4a4d1187.js",
        "tarrantcounty8df.pdf",
        "https://colohouse.com/wp-content/themes/Netrouting/js/vendor/modernizr-2.8.3-respond-1.4.2.min.js",
        "http://theconstantcompany.com",
        "https://colohouse.com/wp-content/plugins/duracelltomi-google-tag-manager/js/gtm4wp-form-move-tracker.js?ver=1.13.1",
        "TarrantCounty18df.pdf",
        "http://www.elizabethmesser.com/wp-content/themes/salient/js/infinitescroll.js?ver=1.1",
        "http://sedoparking.com/frmpark/ihagoogle.com/sedopark/park.js",
        "https://www.bibo14.app:2611/css/h5/reset.css",
        "https://www.dongtiankuangye.com/a002/js/plugins/swiper/swiper.min.css",
        "https://t.captcha.qq.com/template/drag_ele.html?t=1648982190651",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-main.js",
        "https://fengweics.com/",
        "http://astutemedia.asia/rackip/wp-includes/js/comment-reply.min.js?ver=5.5.9",
        "https://kf.cdsanheli.com/js/online.3de8ba00.js",
        "https://assets.website-files.com/5f087b2cc04e635c7a4b7e35/css/develapp.36c3d32f6.min.css",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/superfish.js?ver=1.4.8",
        "http://push.zhanzhang.baidu.com/push.js",
        "https://ty66as.jxdysw.cn/1whpv",
        "https://pagead2.googlesyndication.com/pagead/managed/js/adsense/m202204200101/show_ads_impl_fy2019.js",
        "http://bibo113.com/",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/tinynav.min.js?ver=1.03",
        "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
        "https://integration.silvercloudinc.com/js/bundle/vendor.js",
        "http://lifehacker.com/assets/stylesheets/app-a873b056f0ea955e4ff0abebb210e5a6.css",
        "https://js.hsleadflows.net/leadflows.js",
        "https://www.zealcu.org/app/uploads/cache/js/aggregated_single_eb9d05879e4cb943b965deb3cccf05ee.js",
        "original dropped file discovery url",
        "xfe-IP-50.116.87.164-stix2-2.0-export.json",
        "https://kf.cdsanheli.com/online.html?cid=e3e6922f27c54ad485cf59aee1204615",
        "https://js.hs-scripts.com/9251231.js",
        "http://appbyweb.net/AppByWeb",
        "https://www.data102.com/wp-content/plugins/contact-form-7/includes/js/scripts.js",
        "xfe-IP-137.220.241.241-stix2-2.0-export.json",
        "https://www.googletagmanager.com/gtag/js?id=G-TL5JTN10SS",
        "https://cdn.weglot.com/weglot.min.js",
        "https://secure.gravatar.com/js/gprofiles.js?ver=202221",
        "http://instantfwding.com/px.js?ch=1",
        "TarrantCounty3df.pdf",
        "https://www.googletagmanager.com/gtm.js?id=GTM-PTXLXZ4",
        "TarrantCounty10df.pdf",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-vendor.js",
        "https://ajax.googleapis.com/ajax/libs/jquery/3.2.1/jquery.min.js",
        "xfe-URL-ihagoogle.com-stix2-2.1-export.json",
        "http://www.shopsegsistemas.com.br/assets/vendor/aos/aos.css",
        "https://chimpstatic.com/mcjs-connected/js/users/6c3abfa7ff8634c75cdb2b22e/ddf7a436c1746be666f330e4a.js",
        "https://www.googletagmanager.com/gtm.js?id=GTM-NTC6C23",
        "https://beacon-v2.helpscout.net/static/js/vendor.90fe6783.js",
        "TarrantCounty9df.pdf",
        "https://script.hotjar.com/modules.0076bf93c385ddf0ff58.js",
        "https://www.allwest.com/wp-content/themes/allwestcommunications/js/jquery.main.js?ver=5.9.3",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/jquery.color.js?ver=2.0",
        "tarrantcounty22df.pdf",
        "https://colohouse.com/wp-content/plugins/wpcf7-redirect/build/js/wpcf7-redirect-frontend-script.js?ver=1.1",
        "https://stats.wp.com/e-202221.js",
        "https://www.googletagmanager.com/gtag/js?id=UA-115476727-1",
        "https://bat.bing.com/bat.js",
        "https://www.bibo14.app:2611/js/jquery-1.11.3.min.js",
        "https://fonts.googleapis.com/css?family=Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic&subset=greek%2Clatin%2Cvietnamese%2Clatin-ext%2Ccyrillic%2Ccyrillic-ext%2Cgreek-ext&ver=2.9.6",
        "https://embed.tawk.to/5697c34527b9b5d40b66960f/default",
        "https://kf.cdsanheli.com/js/axios.min.js",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/jquery.easing.js?ver=1.2",
        "https://widget.trustpilot.com/bootstrap/v5/tp.widget.bootstrap.min.js",
        "xfe-URL-allwest.com-stix2-2.1-export.json",
        "http://www.elizabethmesser.com/wp-content/plugins/bloom/js/custom.js?ver=1.1.8",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/custom.js?ver=1.0",
        "Making HTTPS connections using insecure TLS/SSL version details Connection was make using TLSv1.1 [tls.handshake.version: 0x00000302] source Network Traffic relevance 10/10 ATT&CK ID T1573 (Show technique in the MITRE ATT&CK\u2122 matrix)",
        "http://www.elizabethmesser.com/wp-content/plugins/woocommerce/assets/js/frontend/woocommerce.min.js?ver=6.5.1",
        "https://pojd783.cc:8443/index.html?shareName=pojd783.cc",
        "https://s.thebrighttag.com/tag?site=9O7NXzt&H=-5nu6gjg&referrer=https%3A%2F%2Fwww.zealcu.org%2Fhome-loans%2F%3Fmsclkid%3D3ef1349815a11e52b0b256cacc0bc952%26utm_source%3Dbing%26utm_medium%3Dcpc%26utm_campaign%3DSearch%253A%2520Zeal%2520Credit%2520Union%2520-%2520Mortgages%26utm_term%3Dhouse%2520mortgage%26utm_content%3DMortgage%2520General&docReferrer=http%3A%2F%2Finstantfwding.com%2F&mode=v2&cf=7500150%2C7500152&btpdb.9O7NXzt.dGZjLjc1MDAxNTE=UkVRVUVTVFMuMA&btpdb.9O7NXzt.dGZjLjc1MTUyNDU=U0VTU0lPTg&btpdb.9O7N",
        "https://www.googleadservices.com/pagead/conversion_async.js",
        "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/apbct-public.min.js?ver=5.173",
        "tarrant23df.pdf",
        "https://6112.hnsstjc.com/a002/xpjtz.php",
        "TarrantCounty1df.pdf",
        "https://cstaticdun.126.net/load.min.js?t=202007291602",
        "https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2581829468247892&output=html&adk=1812271804&adf=3025194257&lmt=1651149220&plat=16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C32%3A32&format=0x0&url=http%3A%2F%2Fappbyweb.net%2FAppByWeb%2F&ea=0&pra=5&wgl=1&dt=1651149220376&bpp=1&bdt=121&idt=18&shv=r20220425&mjsv=m202204200101&ptt=9&saldr=aa&abxe=1&cookie=ID%3De83d6067a4dac5b6-229192c549d200d1%3AT%3D1651148802%3ART%3D1651148802%3AS%3DALNI_MZSt9utXhYBHAIH9xwQp72WuxQxTw&nras=1&correlator=1655793633284&",
        "https://static.axept.io/sdk.js",
        "https://code.jquery.com/jquery-3.4.1.min.js?ver=3.4.1",
        "https://6112.hnsstjc.com/a002/js/fontSize.js",
        "https://cdn.callrail.com/companies/448598242/66d5efd6cbf06378ea1f/12/swap.js",
        "https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfjFjMaAAAAACpmnf2RfTg2U2m4Cdnku25XccJW&co=aHR0cHM6Ly93d3cuemVhbGN1Lm9yZzo0NDM.&hl=en&v=Y-cOIEkAqcfDdup_qnnmkxIC&theme=light&size=normal&cb=j4msjl4zxy97",
        "http://appbyweb.net/AppByWeb/js/jquery.stellar.min.js",
        "TarrantCounty21df.pdf",
        "https://fonts.googleapis.com/css?family=Montserrat:100,100italic,200,200italic,300,300italic,400,400italic,500,500italic,600,600italic,700,700italic,800,800italic,900,900italic%7CLato:100,100italic,300,300italic,400,400italic,700,700italic,900,900italic%7CKarla:regular,italic,700,700italic%7CPlayfair+Display:regular,500,600,700,800,900,italic,500italic,600italic,700italic,800italic,900italic",
        "http://www.powr.io/powr.js",
        "TarantCounty2df.pdf",
        "https://www.google.com/recaptcha/api.js?render=6Ld8S6EUAAAAAExG_6DO_Jj4DLY35ybebbA8R_eA&ver=3.0",
        "http://appbyweb.net/AppByWeb/js/bootstrap.min.js",
        "https://www.googletagmanager.com/gtag/js?id=G-7BE8PMLSKX&l=dataLayer&cx=c",
        "https://ejp3z5.com/h5/js/chunk-vendors.0903293f.js",
        "https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js",
        "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
        "http://astutemedia.asia/rackip/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp",
        "https://imgs.qgddmy.com/static_h5/js/vendor.4071e145e4ea91fa5ab1.js",
        "https://ejp3z5.com/#/?business_id=66&access_key=3532E209E7051ED50C08BF7D92C3FC44",
        "https://partner.googleadservices.com/gampad/cookie.js?domain=appbyweb.net&callback=_gfp_s_&client=ca-pub-2581829468247892",
        "https://www.googleoptimize.com/optimize.js?id=OPT-PJMGV95",
        "https://www.virustotal.com/gui/vt-ui-sw-installer.e0eb1a1e08d6512ba355.js/ Depreciated",
        "https://ssl.captcha.qq.com/TCaptcha.js",
        "http://www.shopsegsistemas.com.br/assets/vendor/glightbox/js/glightbox.min.js",
        "http://www.elizabethmesser.com/wp-content/plugins/jetpack/css/jetpack.css?ver=10.9.1",
        "http://www.elizabethmesser.com/wp-content/themes/salient/js/touchswipe.min.js?ver=1.0",
        "https://js.callrail.com/group/0/66d5efd6cbf06378ea1f/02836fdf-c99c-4a90-b31b-373093db654e/poll.js?t=1649597153888&ids%5B%5D=448598242",
        "http://astutemedia.asia/rackip/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=4.5.1",
        "https://www.allwest.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
        "https://www.googleoptimize.com/optimize.js?id=GTM-MWM9R93",
        "https://www.data102.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1",
        "https://app.fanzhi.xyz/dist/vendors/core-js/core.js",
        "https://x4707.com:5443/?register=1",
        "https://pixel-geo.prfct.co/tagjs?a_id=131352&source=js_tag",
        "xfe-URL-appbyweb.net-stix2-2.1-export.json",
        "https://www.googletagmanager.com/gtag/js?id=G-FVHXSM5ZYL&l=dataLayer&cx=c",
        "https://www.west.cn/js2016/root/jqinclude.js?t=20211126a",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/supersubs.js?ver=0.2",
        "https://static.hotjar.com/c/hotjar-2950866.js?sv=7",
        "http://astutemedia.asia/rackip/wp-includes/js/wp-emoji-release.min.js?ver=5.5.9",
        "https://app-ab02.marketo.com/js/forms2/js/forms2.min.js",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/981889198/?random=1650488340630&cv=9&fst=1650488340630&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2oa4i1&sendb=1&ig=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fwww.allwest.com%2F&tiba=All%20West%20Communications%20-%20telecommunication%20company&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
        "https://www.hxcpp100.com/js/linkChange.js",
        "TarrantCounty5df.pdf",
        "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
        "TarrantCounty7df.pdf",
        "http://appbyweb.net/AppByWeb/js/modernizr-2.6.2.min.js",
        "http://www.elizabethmesser.com/wp-content/themes/salient/js/flickity.min.js?ver=1.1.1",
        "https://integration.silvercloudinc.com/js/silvercloudjs/silvercloud.js",
        "https://www.allwest.com/wp-content/themes/allwestcommunications/js/custom.js?ver=5.9.3",
        "TarrantCounty20df.pdf",
        "https://6112.hnsstjc.com/a002/xpj.php",
        "https://js.hs-banner.com/9251231.js",
        "https://www.xvsgwa.com/qz1IJUpc.html",
        "https://h5.hxcpp100.com/?id=22929",
        "xfe-URL-frantech.ca-stix2-2.1-export.json",
        "https://2021.igem.org/Team:KU_Leuven/test2",
        "https://hybrid-analysis.com/sample/e126ff94aac3340dc05a27f062c4267cbfeaa998248bef0e72f000bba711aa76/62e6fb475edc950b894aa7b0",
        "https://app.fanzhi.xyz/dist/js/jquery.cookie.js",
        "http://pxlgnpgecom-a.akamaihd.net/javascripts/browserfp.min.js?templateId=11&customerId=7CUHNT0E1",
        "https://colohouse.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2",
        "xfe-URL-Data102.com-stix2-2.1-export.json",
        "https://c.cnzz.com/core.php?web_id=1280875449&t=z",
        "http://www.shopsegsistemas.com.br/assets/js/main.js",
        "https://files.appbyweb.net/Fonts/OpenSansHebrew/font.css",
        "https://www.dongtiankuangye.com/a002/js/libs/jquery-1.12.4/jquery-1.12.4.min.js",
        "https://js.hs-analytics.net/analytics/1650488100000/9251231.js",
        "xfe-URL-Powr.io-stix2-2.1-export.json",
        "https://connect.facebook.net/signals/plugins/identity.js?v=2.9.57",
        "TarrantCounty4df.pdf",
        "https://cdn.weglot.com/weglot.min.css?v=4",
        "https://www.virustotal.com/gui/main.900e36f7a852b9863014.js",
        "https://www.googletagmanager.com/gtag/js?id=AW-1045757556",
        "https://maps.googleapis.com/maps/api/js?key=AIzaSyAMbtdeFB5s623T4LwRldWj_Vdy2t4wLkw&libraries=places",
        "http://www.shopsegsistemas.com.br/assets/vendor/isotope-layout/isotope.pkgd.min.js",
        "https://app.fanzhi.xyz/dist/vendors/sweetalert2/sweetalert2.min.js",
        "https://hybrid-analysis.com/sample/f90162e65235185a24e9f20d855371b8ad7462d50d7a57851d000cfd5116f76d",
        "https://app-ab02.marketo.com/js/forms2/css/forms2-theme-simple.css",
        "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-32507910.js",
        "https://colohouse.com/wp-content/themes/Netrouting/assets/chosen/chosen.jquery.min.js",
        "https://connect.facebook.net/en_US/fbevents.js",
        "https://colohouse.com/wp-content/plugins/contact-form-7/includes/js/index.js?ver=5.4.2",
        "http://appbyweb.net/AppByWeb/js/jquery.easing.1.3.js",
        "https://my.frantech.ca/templates/lagom/assets/js/whmcs-custom.min.js?v=1.4.3",
        "https://ejp3z5.com/h5/css/app.61c96454.css",
        "https://ty66as.jxdysw.cn/dist/vendors/clipboard/clipboard.min.js",
        "https://cdn.firstpromoter.com/fprom.js",
        "https://maps.googleapis.com/maps/api/js?v=3.exp&key=AIzaSyDR76rjQL_2raonHiZ6ZrPqJr-FPb7pGH0",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-2d0b9454.js",
        "https://www.allwest.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.9",
        "https://colohouse.com/wp-content/plugins/stop-user-enumeration/frontend/js/frontend.js?ver=1.3.31",
        "https://lptag.liveperson.net/tag/tag.js?site=22027291",
        "https://stats.wp.com/s-202221.js",
        "http://www.elizabethmesser.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2",
        "http://appbyweb.net/AppByWeb/js/jquery.min.js",
        "https://colohouse.com/wp-content/cache/autoptimize/css/autoptimize_5e11636f7dd8fb4f55e0ff84f0ed5faa.css",
        "https://app-ab02.marketo.com/index.php/form/XDFrame",
        "http://appbyweb.net/AppByWeb/js/jquery.waypoints.min.js",
        "https://www.west.cn/js2016/lib/jquery.SuperSlide/jquery.SuperSlide.2.1.1.x.js",
        "https://bid.g.doubleclick.net/xbbe/pixel?d=KAE",
        "http://www.elizabethmesser.com/wp-content/plugins/bloom/js/jquery.uniform.min.js?ver=1.1.8",
        "https://www.googletagmanager.com/gtag/js?id=G-0CBKGBKB3J&l=dataLayer&cx=c",
        "https://www.google.com/recaptcha/api.js?render=6LdxYT4dAAAAAFyqSRoLKTBh7Q9kh0D0StIaGfzK",
        "https://www.allwest.com/wp-content/plugins/wp-smushit/app/assets/js/smush-lazy-load.min.js?ver=3.9.5",
        "https://www.gstatic.com/recaptcha/releases/1_E1Jb45wiBZrQd45oGZ-2cU/recaptcha__en.js",
        "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
        "https://ejp3z5.com/h5/js/app.71cd3a66.js",
        "http://www.elizabethmesser.com/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=3.15.0",
        "https://ty66as.jxdysw.cn/dist/vendors/bootstrap/js/bootstrap.min.js",
        "https://www.allwest.com/wp-content/plugins/svg-support/js/min/svgs-inline-min.js?ver=1.0.0",
        "https://pv.sohu.com/cityjson?ie=utf-8",
        "https://6112.hnsstjc.com/a002/js/jquery-1.8.3.min.js",
        "http://www.elizabethmesser.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
        "https://app.fanzhi.xyz/dist/css/vip.css",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-vendors.js",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-2d0d2b7c.js",
        "http://www.elizabethmesser.com/wp-includes/js/mediaelement/mediaelement-and-player.min.js?ver=4.2.16",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-app.js",
        "TarrantCounty6df.pdf",
        "http://www.elizabethmesser.com/wp-content/themes/salient/js/superfish.js?ver=1.4.8",
        "forgotten45s.com.pdf",
        "http://appbyweb.net/AppByWeb/js/main.js",
        "https://pxlgnpgecom-a.akamaihd.net/javascripts/bfp_ssn.js?templateId=11",
        "http://www.elizabethmesser.com/wp-content/plugins/woocommerce/assets/js/jquery-blockui/jquery.blockUI.min.js?ver=2.7.0-wc.6.5.1",
        "TarrantCounty17df.pdf",
        "https://munchkin.marketo.net/161/munchkin.js",
        "xfe-URL-West.cn-stix2-2.1-export.json",
        "Fastly Error and Palantir blocked several times over the last few months.",
        "https://integration.silvercloudinc.com/js/bundle/8.engageware-bundle.js",
        "https://colohouse.com/wp-includes/js/wp-emoji-release.min.js?ver=5.8",
        "https://fonts.googleapis.com/css?family=Open+Sans:300,300i,400,400i,600,600i,700,700i%7CRaleway:300,300i,400,400i,500,500i,600,600i,700,700i%7CPoppins:300,300i,400,400i,500,500i,600,600i,700,700i",
        "https://c.cnzz.com/core.php?web_id=1280798474&t=z",
        "http://www.shopsegsistemas.com.br/",
        "https://colohouse.com/wp-content/plugins/link-whisper-premium/js/frontend.js?ver=1632756485",
        "http://astutemedia.asia/rackip/wp-content/plugins/contact-form-7/includes/js/jquery.form.min.js?ver=3.51.0-2014.06.20",
        "https://www.googletagmanager.com/gtag/js?id=UA-41133527-3",
        "https://www.allwest.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2",
        "tarrantcountydf.pdf",
        "http://www.shopsegsistemas.com.br/assets/vendor/aos/aos.js",
        "https://my.frantech.ca/templates/lagom/assets/js/lagom-app.min.js?v=1.4.3",
        "https://www.google.com/maps/embed?pb=!1m18!1m12!1m3!1d3730.503584706544!2d-41.67284568552043!3d-20.770905270369408!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0xbb93dcc0beb01f%3A0x97397d38847b3692!2sShopSeg%20Sistemas!5e0!3m2!1spt-BR!2sbr!4v1636561779046!5m2!1spt-BR!2sbr",
        "https://hybrid-analysis.com/sample/f90162e65235185a24e9f20d855371b8ad7462d50d7a57851d000cfd5116f76d/63aef1a83e3bb16765527bb8",
        "https://www.googletagmanager.com/gtag/js?id=AW-981889198",
        "https://weglot.com/wp-content/plugins/addon-elements-for-elementor-page-builder/assets/js/eae.min.js",
        "https://colohouse.com/wp-content/plugins/cleantalk-spam-protect/js/apbct-public--functions.min.js?ver=5.173",
        "https://www.allwest.com/wp-content/uploads/hummingbird-assets/c4be4d65e707f6328e3a72e79cfdfcb7.js",
        "https://www.google-analytics.com/analytics.js",
        "forgotten45s.com1.pdf",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/388043112/?random=1649597062436&cv=9&fst=1649597062436&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=2&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2oa3u0&sendb=1&ig=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fwww.zealcu.org%2Fhome-loans%2F%3Fmsclkid%3D3ef1349815a11e52b0b256cacc0bc952%26utm_source%3Dbing%26utm_medium%3Dcpc%26utm_campaign%3DSearch%3A%2520Zeal%2520Credit%2520",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/981889198/?random=1650488340057&cv=9&fst=1650488340057&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2oa4i1&sendb=1&ig=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fwww.allwest.com%2F&tiba=All%20West%20Communications%20-%20telecommunication%20company&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4",
        "http://www.elizabethmesser.com/wp-content/themes/salient/js/modernizr.js?ver=2.6.2",
        "https://app.fanzhi.xyz/dist/js/jquery.min.js",
        "https://www.allwest.com/wp-content/plugins/contact-form-7/modules/recaptcha/index.js?ver=5.5.6",
        "http://www.elizabethmesser.com/wp-content/plugins/woocommerce/assets/js/frontend/add-to-cart.min.js?ver=6.5.1",
        "http://www.elizabethmesser.com/",
        "http://pagead2.googlesyndication.com/apps/domainpark/show_afd_ads.js",
        "https://colohouse.com/wp-includes/js/wp-embed.min.js?ver=5.8",
        "https://www.dongtiankuangye.com/a002/config.js",
        "https://connect.facebook.net/signals/config/661596171311072?v=2.9.57&r=stable",
        "https://colohouse.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.7",
        "https://static.hotjar.com/c/hotjar-2836981.js?sv=5",
        "https://www.zealcu.org/app/uploads/cache/css/aggregated_cd3154a65f0e94fa98c08398cba54caa.css",
        "http://www.elizabethmesser.com/wp-content/plugins/jetpack/_inc/build/photon/photon.min.js?ver=20191001",
        "http://www.elizabethmesser.com/wp-content/plugins/js_composer_salient/assets/js/vendors/woocommerce-add-to-cart.js?ver=5.0.1",
        "https://beacon-v2.helpscout.net/",
        "https://app.fanzhi.xyz/dist/js/app.base.js",
        "https://loader.wisepops.com/get-loader.js?v=1&site=ybdeB8PyA7",
        "http://www.laijcm.com/tj.js",
        "https://colohouse.com/wp-content/plugins/wp-schema-pro/admin/assets/min-js/frontend.min.js?ver=2.7.2",
        "http://www.elizabethmesser.com/wp-content/plugins/js_composer_salient/assets/js/dist/js_composer_front.min.js?ver=5.0.1",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-4fe9d5dd.js",
        "http://appbyweb.net/AppByWeb/js/hoverIntent.js",
        "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
        "xfe-URL-colohouse.com-stix2-2.1-export.json",
        "https://captcha.gtimg.com/1/tcaptcha-frame.db8b9289.js",
        "https://unicef.se/assets/apple",
        "TarrantCounty14df.pdf",
        "https://sdk.51.la/event/js-sdk-event.min.js?u=Je0ztO5GuwfJ6eip",
        "TarrantCounty15df.pdf",
        "https://s9.cnzz.com/z_stat.php?id=1280743953&web_id=1280743953",
        "https://app.whoisvisiting.com/who.js",
        "https://www.bibo14.app:2611/js/xinstall_inner_e.min.js?v=1004",
        "https://d3e54v103j8qbb.cloudfront.net/js/jquery-3.5.1.min.dc5e7f18c8.js?site=5f087b2cc04e635c7a4b7e35",
        "http://astutemedia.asia/rackip/wp-content/themes/servereza/js/jquery.prettyPhoto.js?ver=3.0",
        "https://maps.googleapis.com/maps/api/js?key=AIzaSyBaRgbnzMy4cEMm5e2h7pyryfYav7ComTo",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/js/twk-chunk-f163fcd0.js",
        "https://sdk.51.la/js-sdk-pro.min.js",
        "https://s9.cnzz.com/z_stat.php?id=1280875449&web_id=1280875449",
        "http://www.laijcm.com/common.js",
        "TarrantCounty12df.pdf"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Win.malware.urelas-9863836-0",
            "Configrender",
            "Reduceright",
            "Telper:cert:softwarebundler:win32/bunpredelt",
            "Trojan:win32/neconyd.a",
            "Hj",
            "#lowfi:suspicioussectionname",
            "Trojan:win32/danabot.g",
            "Win32:cryptor",
            "Anda",
            "Win.trojan.vundo-7170412-0",
            "Rabu",
            "Vui",
            "Bufferreader",
            "Tente",
            "Targetdom",
            "Trackingclient",
            "Alf:pua:block:iobit.r!mtb",
            "Backdoor:win32/poison.e",
            "Bible studies",
            "Alf:heraklezeval:trojan:msil/gravityrat!rfn",
            "Bible study",
            "Quando",
            "Vasaris",
            "Srpanj",
            "Commandremove",
            "Qe",
            "Win.virus.polyransom-5704625-0",
            "Xu",
            "Trojan:win32/zombie.a",
            "Gc",
            "Pws:win32/qqpass.fc",
            "Outubro",
            "Bufferwriter",
            "Multiple malware\u2019s , trojans and rats"
          ],
          "industries": [
            "Government"
          ],
          "unique_indicators": 65892
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/documentelement.style",
    "whois": "http://whois.domaintools.com/documentelement.style",
    "domain": "documentelement.style",
    "hostname": "window.document.documentelement.style"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 39,
  "pulses": [
    {
      "id": "69a3c685d4b7c139ffe62930",
      "name": "Clone Pulse Reference",
      "description": "",
      "modified": "2026-04-01T00:44:45.494000",
      "created": "2026-03-01T04:54:29.384000",
      "tags": [
        "ipv4",
        "active related",
        "trojandropper",
        "mtb jun",
        "lowfi",
        "trojan",
        "mtb jan",
        "fastly error",
        "please",
        "united",
        "ttl value",
        "get na",
        "total",
        "delete",
        "search",
        "yara detections",
        "sinkhole cookie",
        "value snkz",
        "write",
        "suspicious",
        "ransom",
        "malware",
        "Ransom.Win32.Birele.gsg Checkin",
        "AnubisNetworks Sinkhole Cookie Value Snkz",
        "Possible Compromised Host",
        "dynamicloader",
        "delete c",
        "default",
        "medium",
        "write c",
        "settingswpad",
        "intel",
        "ms windows",
        "users",
        "number",
        "title",
        "installer",
        "top source",
        "top destination",
        "source source",
        "port",
        "filehash",
        "av detections",
        "ids detections",
        "yara rule",
        "gravityrat",
        "detectvm",
        "x00 x00",
        "x00x00",
        "doviacmd",
        "rootjob",
        "getfiles",
        "updateserver",
        "ethernetid",
        "ids signatures",
        "exploits",
        "sid name",
        "malware cve",
        "dns query",
        "dnsbin demo",
        "data exfil",
        "exif data",
        "DNS Query for Webhook/HTTP Request Inspection Service (x .pipedr",
        "DNSBin Demo (requestbin .net) - Data Exfitration",
        "source port",
        "destination",
        "present sep",
        "script urls",
        "script script",
        "a domains",
        "script domains",
        "ip address",
        "meta",
        "present nov",
        "passive dns",
        "next associated",
        "domain add",
        "pe executable",
        "entries",
        "show",
        "msie",
        "windows nt",
        "wow64",
        "copy",
        "present jan",
        "present feb",
        "domain",
        "pulse pulses",
        "urls",
        "files",
        "tam legal",
        "christopher ahmann",
        "https://unicef.se/assets/apple",
        "treece alfrey",
        "hours ago",
        "information",
        "report spam",
        "ahmann colorado",
        "state",
        "special cousel",
        "created",
        "expiro",
        "capture"
      ],
      "references": [
        "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
        "Fastly Error and Palantir blocked several times over the last few months.",
        "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
        "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
        "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
        "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
        "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
        "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
        "https://unicef.se/assets/apple"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/Neconyd.A",
          "display_name": "Trojan:Win32/Neconyd.A",
          "target": "/malware/Trojan:Win32/Neconyd.A"
        },
        {
          "id": "PWS:Win32/QQpass.FC",
          "display_name": "PWS:Win32/QQpass.FC",
          "target": "/malware/PWS:Win32/QQpass.FC"
        },
        {
          "id": "Trojan:Win32/Zombie.A",
          "display_name": "Trojan:Win32/Zombie.A",
          "target": "/malware/Trojan:Win32/Zombie.A"
        },
        {
          "id": "Win.Malware.Urelas-9863836-0",
          "display_name": "Win.Malware.Urelas-9863836-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "target": null
        },
        {
          "id": "Win.Trojan.Vundo-7170412-0",
          "display_name": "Win.Trojan.Vundo-7170412-0",
          "target": null
        },
        {
          "id": "#Lowfi:SuspiciousSectionName",
          "display_name": "#Lowfi:SuspiciousSectionName",
          "target": null
        },
        {
          "id": "Multiple Malware\u2019s , Trojans and Rats",
          "display_name": "Multiple Malware\u2019s , Trojans and Rats",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1197",
          "name": "BITS Jobs",
          "display_name": "T1197 - BITS Jobs"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6906bd99cadbd4140014c6af",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 909,
        "domain": 454,
        "hostname": 1404,
        "URL": 3557,
        "CIDR": 1,
        "FileHash-MD5": 242,
        "FileHash-SHA1": 185,
        "email": 1,
        "CVE": 1
      },
      "indicator_count": 6754,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "18 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6906bd99cadbd4140014c6af",
      "name": "Espionage - Gravity RAT + | Legal entities are State owned.  Attacking severely injured  PT\u2019s SA victim.",
      "description": "Fastly CDN for Palantir (Verizon) unless updated.  Very malicious IoC\u2019s found evaluating IoC\u2019 from Christopher Ahmann - TAM Legal link.\n- Made contact with victim several times.\n- Illegal contact made with attorneys considering representing Tsara. \n- https://unicef.se/assets/apple - link related to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage.\n\nAhmann is named as special counsel but he , like Brian Sabey are \u2018ONLY\u2019  cyber attacking Tsara Brashears.\n\n- protecting Jeffrey Reimer DPT, multiple doctors, Concentra,  blocked and denied care , hired a hitman/men and it would have. Even cheaper to pay her for the injuries she never sought compensation for due to aggressive attacks and threats.",
      "modified": "2025-12-02T01:05:30.331000",
      "created": "2025-11-02T02:10:33.546000",
      "tags": [
        "ipv4",
        "active related",
        "trojandropper",
        "mtb jun",
        "lowfi",
        "trojan",
        "mtb jan",
        "fastly error",
        "please",
        "united",
        "ttl value",
        "get na",
        "total",
        "delete",
        "search",
        "yara detections",
        "sinkhole cookie",
        "value snkz",
        "write",
        "suspicious",
        "ransom",
        "malware",
        "Ransom.Win32.Birele.gsg Checkin",
        "AnubisNetworks Sinkhole Cookie Value Snkz",
        "Possible Compromised Host",
        "dynamicloader",
        "delete c",
        "default",
        "medium",
        "write c",
        "settingswpad",
        "intel",
        "ms windows",
        "users",
        "number",
        "title",
        "installer",
        "top source",
        "top destination",
        "source source",
        "port",
        "filehash",
        "av detections",
        "ids detections",
        "yara rule",
        "gravityrat",
        "detectvm",
        "x00 x00",
        "x00x00",
        "doviacmd",
        "rootjob",
        "getfiles",
        "updateserver",
        "ethernetid",
        "ids signatures",
        "exploits",
        "sid name",
        "malware cve",
        "dns query",
        "dnsbin demo",
        "data exfil",
        "exif data",
        "DNS Query for Webhook/HTTP Request Inspection Service (x .pipedr",
        "DNSBin Demo (requestbin .net) - Data Exfitration",
        "source port",
        "destination",
        "present sep",
        "script urls",
        "script script",
        "a domains",
        "script domains",
        "ip address",
        "meta",
        "present nov",
        "passive dns",
        "next associated",
        "domain add",
        "pe executable",
        "entries",
        "show",
        "msie",
        "windows nt",
        "wow64",
        "copy",
        "present jan",
        "present feb",
        "domain",
        "pulse pulses",
        "urls",
        "files",
        "tam legal",
        "christopher ahmann",
        "https://unicef.se/assets/apple",
        "treece alfrey",
        "hours ago",
        "information",
        "report spam",
        "ahmann colorado",
        "state",
        "special cousel",
        "created",
        "expiro",
        "capture"
      ],
      "references": [
        "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
        "Fastly Error and Palantir blocked several times over the last few months.",
        "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
        "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
        "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
        "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
        "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
        "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
        "https://unicef.se/assets/apple"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/Neconyd.A",
          "display_name": "Trojan:Win32/Neconyd.A",
          "target": "/malware/Trojan:Win32/Neconyd.A"
        },
        {
          "id": "PWS:Win32/QQpass.FC",
          "display_name": "PWS:Win32/QQpass.FC",
          "target": "/malware/PWS:Win32/QQpass.FC"
        },
        {
          "id": "Trojan:Win32/Zombie.A",
          "display_name": "Trojan:Win32/Zombie.A",
          "target": "/malware/Trojan:Win32/Zombie.A"
        },
        {
          "id": "Win.Malware.Urelas-9863836-0",
          "display_name": "Win.Malware.Urelas-9863836-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "target": null
        },
        {
          "id": "Win.Trojan.Vundo-7170412-0",
          "display_name": "Win.Trojan.Vundo-7170412-0",
          "target": null
        },
        {
          "id": "#Lowfi:SuspiciousSectionName",
          "display_name": "#Lowfi:SuspiciousSectionName",
          "target": null
        },
        {
          "id": "Multiple Malware\u2019s , Trojans and Rats",
          "display_name": "Multiple Malware\u2019s , Trojans and Rats",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1197",
          "name": "BITS Jobs",
          "display_name": "T1197 - BITS Jobs"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 909,
        "domain": 449,
        "hostname": 1403,
        "URL": 3552,
        "CIDR": 1,
        "FileHash-MD5": 242,
        "FileHash-SHA1": 185,
        "email": 1
      },
      "indicator_count": 6742,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "138 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "663d2869e0f3a42bbddc42ff",
      "name": "UPX executable packer.",
      "description": "A new rule has been introduced  a \"suspicious\" ELF binary that is packed with the UPX executable packer.\nSuggested ATT&CK IDs: rule SUSP_ELF_LNX_UPX_Compressed_File { meta: description = \"Detects a suspicious ELF binary with UPX compression\" author = \"Florian Roth (Nextron Systems)\" reference = \"Internal Research\" date = \"2018-12-12\" score = 40 hash1 = \"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4\" id = \"078937de-59b3-538e-a5c3-57f4e6050212\" strings: $s1 = \"PROT_EXEC|PROT_WRITE failed.\" fullword ascii $s2 = \"$Id: UPX\" fullword ascii $s3 = \"$Info: This file is packed with the UPX executable packer\" ascii $fp1 = \"check your UCL installation !\"",
      "modified": "2024-10-14T00:01:17.069000",
      "created": "2024-05-09T19:47:53.786000",
      "tags": [
        "cioch adrian",
        "centrum usug",
        "sieciowych",
        "elf binary",
        "upx compression",
        "roth",
        "nextron",
        "info",
        "javascript",
        "html",
        "office open",
        "xml document",
        "network capture",
        "win32 exe",
        "xml pakietu",
        "pdf zestawy",
        "przechwytywanie",
        "office",
        "filehashsha1",
        "url https",
        "cve cve20201070",
        "cve cve20203153",
        "cve cve20201048",
        "cve cve20211732",
        "cve20201048 apr",
        "filehashmd5",
        "cve cve20010901",
        "cve cve20021841",
        "cve20153202 apr",
        "cve cve20160728",
        "cve cve20161807",
        "cve cve20175123",
        "cve20185407 apr",
        "cve cve20054605",
        "cve cve20060745",
        "cve cve20070452",
        "cve cve20070453",
        "cve cve20070454",
        "cve cve20071355",
        "cve cve20071358",
        "cve cve20071871",
        "cve20149614 apr",
        "cve cve20151503",
        "cve cve20152080",
        "cve cve20157377",
        "cve cve20170131",
        "cve20200796 may",
        "cve cve20113403"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 6861,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 5771,
        "domain": 3139,
        "URL": 14525,
        "FileHash-SHA1": 2610,
        "IPv4": 108,
        "CIDR": 40,
        "FileHash-SHA256": 10705,
        "FileHash-MD5": 3373,
        "YARA": 2,
        "CVE": 148,
        "Mutex": 7,
        "FilePath": 3,
        "SSLCertFingerprint": 3,
        "email": 23,
        "JA3": 1,
        "IPv6": 2
      },
      "indicator_count": 40460,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "552 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708efbe1108a2df26f5c5f",
      "name": "Theconstantcompany.com \u2014>Elizabeth Messer &#8211; Spiritual Encouragement for your beautiful, messy life",
      "description": "",
      "modified": "2023-12-06T15:10:51.712000",
      "created": "2023-12-06T15:10:51.712000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 538,
        "hostname": 307,
        "domain": 220,
        "URL": 1053
      },
      "indicator_count": 2118,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708ee4e69d8c30c04154d0",
      "name": "develapp.me - weglot.com",
      "description": "",
      "modified": "2023-12-06T15:10:28.836000",
      "created": "2023-12-06T15:10:28.836000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 75,
        "domain": 265,
        "hostname": 482,
        "URL": 731,
        "FileHash-MD5": 4,
        "FileHash-SHA1": 1,
        "email": 1
      },
      "indicator_count": 1559,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708e0d95a8c74cc715f7a2",
      "name": "West.cn",
      "description": "",
      "modified": "2023-12-06T15:06:53.350000",
      "created": "2023-12-06T15:06:53.350000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 208,
        "domain": 533,
        "hostname": 757,
        "URL": 1861,
        "FileHash-MD5": 1
      },
      "indicator_count": 3360,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708cc78755574d9812e4c8",
      "name": "one google maps api call and one generic key - causing a large chunk of cyber disruption and compromise",
      "description": "",
      "modified": "2023-12-06T15:01:27.166000",
      "created": "2023-12-06T15:01:27.166000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 135,
        "hostname": 149,
        "URL": 352,
        "domain": 53
      },
      "indicator_count": 689,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708c0f5981b6d81d0fa423",
      "name": "data102 and colohouse. Malware hosting",
      "description": "",
      "modified": "2023-12-06T14:58:23.206000",
      "created": "2023-12-06T14:58:23.206000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 458,
        "domain": 557,
        "URL": 2599,
        "hostname": 952
      },
      "indicator_count": 4566,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708b72abe90961af1737c9",
      "name": "reCAPTCHA",
      "description": "",
      "modified": "2023-12-06T14:55:46.172000",
      "created": "2023-12-06T14:55:46.172000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 362,
        "domain": 330,
        "URL": 1790,
        "hostname": 586,
        "email": 1
      },
      "indicator_count": 3069,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708a8b61abf1b451f2aebc",
      "name": "Botnet",
      "description": "",
      "modified": "2023-12-06T14:51:55.086000",
      "created": "2023-12-06T14:51:55.086000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 2,
        "hostname": 619,
        "URL": 1547,
        "domain": 246,
        "FileHash-SHA256": 124
      },
      "indicator_count": 2538,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://window.document.documentelement.style",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://window.document.documentelement.style",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776591682.4498053
}