{
  "type": "URL",
  "indicator": "https://winstudio.eu/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://winstudio.eu/",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3917364713,
      "indicator": "https://winstudio.eu/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 2,
      "pulses": [
        {
          "id": "66246ff49ed29ea9bb2bf122",
          "name": "S\u0105d Rejonowy w Jeleniej Gorze  POLAND",
          "description": "Przechowywania lub dost\u0119pu do plik\u00f3w cookies w Twojej przegl\u0105darce\nhttps://www.virustotal.com/gui/domain/jelenia-gora.sr.gov.pl/relations",
          "modified": "2025-05-14T21:18:36.989000",
          "created": "2024-04-21T01:46:28.554000",
          "tags": [
            "jeleniej grze",
            "aktualnoci",
            "informacje",
            "jednostka",
            "rejonowy",
            "konkurs",
            "najczciej",
            "sd rejonowy",
            "przejd",
            "czytaj",
            "click",
            "sdzia jarosaw",
            "wydziau",
            "sdzia grzegorz",
            "katarzyna",
            "rudnicka dane",
            "kontaktowe sd",
            "jelenia gra",
            "mickiewicza",
            "zawarto",
            "html",
            "nazwa meta",
            "robotw",
            "telefon",
            "brak",
            "skala",
            "ua zgodna",
            "head body",
            "zasb",
            "cname",
            "kod odpowiedzi",
            "kodowanie treci",
            "wygasa",
            "gmt serwer",
            "pragma",
            "kontrola pamici",
            "podrcznej",
            "data",
            "gmt kontrola",
            "dostpuzezwl na",
            "czytaj wicej",
            "sd okrgowy",
            "jednostki",
            "okrgowy",
            "ogoszenia",
            "sha256",
            "vhash",
            "ssdeep",
            "https odcisk",
            "palca jarma",
            "https dane",
            "v3 numer",
            "odcisk palca",
            "tworzy katalog",
            "tworzy pliki",
            "typ pliku",
            "json",
            "ascii",
            "windows",
            "sqlite",
            "foxpro fpt",
            "links typ",
            "mapa",
            "152 x",
            "sqlite w",
            "sha1",
            "sha512",
            "file size",
            "b file",
            "testing",
            "komornik sdowy",
            "sdzie rejonowym",
            "tomasz rodacki",
            "obwieszczenie",
            "komornicze",
            "tumacza migam",
            "tumacz czynny",
            "zamknite",
            "wiadczenia",
            "schedule",
            "error",
            "javascript",
            "bakers hall",
            "ixaction",
            "script",
            "ixchatlauncher",
            "compatibility",
            "com dla",
            "t1055 pewno",
            "unikanie obrony",
            "t1036 maskarada",
            "t1082 pewno",
            "informacje o",
            "nazwa pliku",
            "dokument pdf",
            "rozmiar pliku",
            "zapowied",
            "type",
            "iii dbt",
            "utf8",
            "dziennik"
          ],
          "references": [
            "S?d Rejonowy w Jeleniej G\u00f3rze.htm",
            "II Wydzia? Karny - S?d Rejonowy w Jeleniej G\u00f3rze 1.htm",
            "http://www.jelenia-gora.so.gov.pl/",
            "https://www.jelenia-gora.so.gov.pl/",
            "http://www.jelenia-gora.sr.gov.pl/ogloszenia-komornicze",
            "https://tlumacz.migam.org/sad_rejonowy_jelenia_gora",
            "https://www.jelenia-gora.sr.gov.pl/spacer",
            "https://waf.intelix.pl/957476/Chat/Script/Compatibility"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "",
              "display_name": "",
              "target": null
            },
            {
              "id": "serwer",
              "display_name": "serwer",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 24,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "email": 71,
            "domain": 7651,
            "hostname": 7680,
            "IPv4": 331,
            "FileHash-SHA256": 16168,
            "URL": 10399,
            "FileHash-MD5": 3639,
            "FileHash-SHA1": 3468,
            "CIDR": 4,
            "CVE": 89,
            "YARA": 521,
            "SSLCertFingerprint": 25,
            "JA3": 1,
            "IPv6": 5813
          },
          "indicator_count": 55860,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "339 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "668bfcb0b48a387b9d2c8562",
          "name": "Ministerstwo Finans\u00f3w - Portal Gov.pl",
          "description": "Pliki cookie zosta\u0142y ju\u017c zapisane i wydrukowane.\n5852be629358e18160c5483bfc8c9f0023b974565f2d59ce7f4497cc734b4ecd 30 pa\u017a 2022 b8a2476b55132fdf0531d6cd48126b759dc08a8f5b019917b62373e536a0b8c9 26 pa\u017a 2022 2700fbe4001e27ba55d72841817b0b9454954b496f21e4259c88919027172694 6 wrze\u015bnia 2022 r. 91da570586b7c04e3012215469ed8b8c5aa036068cc48ba7a7ac0d8cce34290e 5 wrze\u015bnia 2022 r. 1757d8363e28b35b9e29c44d0bc87e2a03d90ca50dadd780924528e0a13d49e1 31 sierpnia 2022 r. fe5744ed48406b90eae1747aab5386645406ad61cdc629ebc7ded97aa099ae28 30 lipca 2022 r. c730bac7a1da3b6263e7672c85cb4deb229c45479bd64bc7194a9a8bb16b8cb6 16 lipca 2022 r. 177b428ac63ad3b6c606ed11b33c9fc4d79f6ff5e6b3ac3ee849f1e2d1f2c903 16 lipca 2022 r. a35121637b79b7d926b63afceae409fdb35c14ad5431ecd199179622e1711ca6",
          "modified": "2024-10-17T05:28:49.118000",
          "created": "2024-07-08T14:50:24.496000",
          "tags": [
            "polskiej",
            "przejd",
            "usugi dla",
            "logowanie",
            "profil zaufany",
            "skarbowa",
            "zobacz",
            "ksef",
            "zastpca szefa",
            "stopka",
            "rada",
            "inquest labs",
            "vba project",
            "vbaproject",
            "kopiuj md5",
            "kopiuj sha1",
            "skopiuj sha256",
            "sha1",
            "sha256",
            "typ tekst",
            "opis tekst",
            "ascii md5",
            "rozmiar",
            "typ dane",
            "pdf c",
            "text c",
            "ounizeto",
            "validation ca",
            "sha2",
            "odigicert inc",
            "cusa",
            "authority",
            "rsa ca",
            "cncertum domain",
            "cngeotrust ev",
            "oglobalsign",
            "unicode",
            "z bom",
            "crlf",
            "rgba",
            "dane obrazu",
            "tekst utf8",
            "v2 dokument",
            "dane",
            "dokument html",
            "jpeg",
            "skrt",
            "opis",
            "poczenie",
            "wifi",
            "start",
            "nazwa typ",
            "md5 nazwa",
            "procesu plik",
            "pe32",
            "intel",
            "pejzasz",
            "ms windows",
            "plik dokumentu",
            "nie c",
            "win32 exe",
            "crt.sh",
            "ct",
            "certificate transparency",
            "certificate search",
            "ssl certificate",
            "sectigo",
            "comodo ca",
            "comodo",
            "tls web",
            "criteria id",
            "647257375",
            "timestamp entry",
            "log operator",
            "log url",
            "google https",
            "ca mechanism",
            "provider status",
            "error",
            "log id",
            "647257567",
            "summary leaf",
            "sectigo https",
            "expired",
            "certificate",
            "lets",
            "key usage",
            "identifier",
            "551852229",
            "digicert https",
            "479894151",
            "479896285",
            "tylne drzwi",
            "win32",
            "imphasz",
            "wirustotal",
            "emaile",
            "emaile pnewell",
            "emaile khunter",
            "emaile eooshea",
            "emaile regadmin",
            "microsoft excel",
            "wed jan",
            "submission",
            "vhash",
            "ssdeep",
            "file type",
            "ms excel",
            "xls magic",
            "file v2",
            "document",
            "number",
            "algorithm",
            "certum",
            "unizeto",
            "warszawa",
            "31915086",
            "nitro pro",
            "nitro sign",
            "nitro",
            "nitro pdf",
            "primopdf",
            "pdfs",
            "business nitro",
            "pdf nitro",
            "pdf pro",
            "desktop",
            "premium",
            "service",
            "ja3s",
            "mnie",
            "sysv",
            "lsb executable",
            "eabi4 version",
            "msb executable",
            "mips",
            "mipsi version",
            "trojan",
            "imphash",
            "pehash",
            "name type",
            "md5 process",
            "fault",
            "header",
            "bezterminowo",
            "adres url",
            "nazwa hosta",
            "ipv4",
            "ccie asnas8075",
            "nie mona",
            "trojandropper",
            "url skryptw",
            "domeny a",
            "kliknij",
            "prbka skrt",
            "uwzgldnij",
            "nieobecny",
            "procesu",
            "ascii z",
            "ascii bez",
            "mirai",
            "win32virut",
            "procesu zastpy",
            "tekst ascii",
            "z terminatorami"
          ],
          "references": [
            "http://www.mf.gov.pl/tutaj/a./p/body/html",
            "https://www.mf.gov.pl/tutaj/a./p/body/html",
            "https://mdec.nelreports.net/api/report?cat=mdocs",
            "https://crt.sh/?id=647257375",
            "https://crt.sh/?id=647257567",
            "https://crt.sh/?id=551852229",
            "https://crt.sh/?id=479894151",
            "https://crt.sh/?id=479896285",
            "https://crt.sh/?d=49659844",
            "https://crt.sh/?id=31915086",
            "http://www.primopdf.com/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "e74755ff8b4927e257566302296e17e5d28cef17a6daf287cda9e63ce6c6f575 ELF :Mirai- MALWARE GH\\ [Trj] 23 pa\u017a 2016 bf0f346f4a51732e31d88eb47dcac82c7f7ed973312926819f1e1023b9c51121 23 pa\u017a 2016 5a92b73f354d54b9",
              "display_name": "e74755ff8b4927e257566302296e17e5d28cef17a6daf287cda9e63ce6c6f575 ELF :Mirai- MALWARE GH\\ [Trj] 23 pa\u017a 2016 bf0f346f4a51732e31d88eb47dcac82c7f7ed973312926819f1e1023b9c51121 23 pa\u017a 2016 5a92b73f354d54b9",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 127,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 627,
            "email": 41,
            "FileHash-SHA1": 1565,
            "FileHash-SHA256": 5520,
            "URL": 1821,
            "FileHash-MD5": 1861,
            "SSLCertFingerprint": 10,
            "domain": 167,
            "IPv4": 31,
            "YARA": 7,
            "CVE": 7
          },
          "indicator_count": 11657,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 127,
          "modified_text": "549 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "II Wydzia? Karny - S?d Rejonowy w Jeleniej G\u00f3rze 1.htm",
        "https://www.mf.gov.pl/tutaj/a./p/body/html",
        "https://crt.sh/?d=49659844",
        "http://www.jelenia-gora.so.gov.pl/",
        "https://crt.sh/?id=31915086",
        "https://www.jelenia-gora.so.gov.pl/",
        "https://crt.sh/?id=647257567",
        "http://www.primopdf.com/",
        "https://crt.sh/?id=479896285",
        "S?d Rejonowy w Jeleniej G\u00f3rze.htm",
        "https://waf.intelix.pl/957476/Chat/Script/Compatibility",
        "https://crt.sh/?id=479894151",
        "http://www.jelenia-gora.sr.gov.pl/ogloszenia-komornicze",
        "https://www.jelenia-gora.sr.gov.pl/spacer",
        "http://www.mf.gov.pl/tutaj/a./p/body/html",
        "https://crt.sh/?id=647257375",
        "https://crt.sh/?id=551852229",
        "https://mdec.nelreports.net/api/report?cat=mdocs",
        "https://tlumacz.migam.org/sad_rejonowy_jelenia_gora"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "",
            "E74755ff8b4927e257566302296e17e5d28cef17a6daf287cda9e63ce6c6f575 elf :mirai- malware gh\\ [trj] 23 pa\u017a 2016 bf0f346f4a51732e31d88eb47dcac82c7f7ed973312926819f1e1023b9c51121 23 pa\u017a 2016 5a92b73f354d54b9",
            "Serwer",
            "Mirai"
          ],
          "industries": [],
          "unique_indicators": 57031
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/winstudio.eu",
    "whois": "http://whois.domaintools.com/winstudio.eu",
    "domain": "winstudio.eu",
    "hostname": "Unavailable"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 2,
  "pulses": [
    {
      "id": "66246ff49ed29ea9bb2bf122",
      "name": "S\u0105d Rejonowy w Jeleniej Gorze  POLAND",
      "description": "Przechowywania lub dost\u0119pu do plik\u00f3w cookies w Twojej przegl\u0105darce\nhttps://www.virustotal.com/gui/domain/jelenia-gora.sr.gov.pl/relations",
      "modified": "2025-05-14T21:18:36.989000",
      "created": "2024-04-21T01:46:28.554000",
      "tags": [
        "jeleniej grze",
        "aktualnoci",
        "informacje",
        "jednostka",
        "rejonowy",
        "konkurs",
        "najczciej",
        "sd rejonowy",
        "przejd",
        "czytaj",
        "click",
        "sdzia jarosaw",
        "wydziau",
        "sdzia grzegorz",
        "katarzyna",
        "rudnicka dane",
        "kontaktowe sd",
        "jelenia gra",
        "mickiewicza",
        "zawarto",
        "html",
        "nazwa meta",
        "robotw",
        "telefon",
        "brak",
        "skala",
        "ua zgodna",
        "head body",
        "zasb",
        "cname",
        "kod odpowiedzi",
        "kodowanie treci",
        "wygasa",
        "gmt serwer",
        "pragma",
        "kontrola pamici",
        "podrcznej",
        "data",
        "gmt kontrola",
        "dostpuzezwl na",
        "czytaj wicej",
        "sd okrgowy",
        "jednostki",
        "okrgowy",
        "ogoszenia",
        "sha256",
        "vhash",
        "ssdeep",
        "https odcisk",
        "palca jarma",
        "https dane",
        "v3 numer",
        "odcisk palca",
        "tworzy katalog",
        "tworzy pliki",
        "typ pliku",
        "json",
        "ascii",
        "windows",
        "sqlite",
        "foxpro fpt",
        "links typ",
        "mapa",
        "152 x",
        "sqlite w",
        "sha1",
        "sha512",
        "file size",
        "b file",
        "testing",
        "komornik sdowy",
        "sdzie rejonowym",
        "tomasz rodacki",
        "obwieszczenie",
        "komornicze",
        "tumacza migam",
        "tumacz czynny",
        "zamknite",
        "wiadczenia",
        "schedule",
        "error",
        "javascript",
        "bakers hall",
        "ixaction",
        "script",
        "ixchatlauncher",
        "compatibility",
        "com dla",
        "t1055 pewno",
        "unikanie obrony",
        "t1036 maskarada",
        "t1082 pewno",
        "informacje o",
        "nazwa pliku",
        "dokument pdf",
        "rozmiar pliku",
        "zapowied",
        "type",
        "iii dbt",
        "utf8",
        "dziennik"
      ],
      "references": [
        "S?d Rejonowy w Jeleniej G\u00f3rze.htm",
        "II Wydzia? Karny - S?d Rejonowy w Jeleniej G\u00f3rze 1.htm",
        "http://www.jelenia-gora.so.gov.pl/",
        "https://www.jelenia-gora.so.gov.pl/",
        "http://www.jelenia-gora.sr.gov.pl/ogloszenia-komornicze",
        "https://tlumacz.migam.org/sad_rejonowy_jelenia_gora",
        "https://www.jelenia-gora.sr.gov.pl/spacer",
        "https://waf.intelix.pl/957476/Chat/Script/Compatibility"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "",
          "display_name": "",
          "target": null
        },
        {
          "id": "serwer",
          "display_name": "serwer",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 24,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "email": 71,
        "domain": 7651,
        "hostname": 7680,
        "IPv4": 331,
        "FileHash-SHA256": 16168,
        "URL": 10399,
        "FileHash-MD5": 3639,
        "FileHash-SHA1": 3468,
        "CIDR": 4,
        "CVE": 89,
        "YARA": 521,
        "SSLCertFingerprint": 25,
        "JA3": 1,
        "IPv6": 5813
      },
      "indicator_count": 55860,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "339 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "668bfcb0b48a387b9d2c8562",
      "name": "Ministerstwo Finans\u00f3w - Portal Gov.pl",
      "description": "Pliki cookie zosta\u0142y ju\u017c zapisane i wydrukowane.\n5852be629358e18160c5483bfc8c9f0023b974565f2d59ce7f4497cc734b4ecd 30 pa\u017a 2022 b8a2476b55132fdf0531d6cd48126b759dc08a8f5b019917b62373e536a0b8c9 26 pa\u017a 2022 2700fbe4001e27ba55d72841817b0b9454954b496f21e4259c88919027172694 6 wrze\u015bnia 2022 r. 91da570586b7c04e3012215469ed8b8c5aa036068cc48ba7a7ac0d8cce34290e 5 wrze\u015bnia 2022 r. 1757d8363e28b35b9e29c44d0bc87e2a03d90ca50dadd780924528e0a13d49e1 31 sierpnia 2022 r. fe5744ed48406b90eae1747aab5386645406ad61cdc629ebc7ded97aa099ae28 30 lipca 2022 r. c730bac7a1da3b6263e7672c85cb4deb229c45479bd64bc7194a9a8bb16b8cb6 16 lipca 2022 r. 177b428ac63ad3b6c606ed11b33c9fc4d79f6ff5e6b3ac3ee849f1e2d1f2c903 16 lipca 2022 r. a35121637b79b7d926b63afceae409fdb35c14ad5431ecd199179622e1711ca6",
      "modified": "2024-10-17T05:28:49.118000",
      "created": "2024-07-08T14:50:24.496000",
      "tags": [
        "polskiej",
        "przejd",
        "usugi dla",
        "logowanie",
        "profil zaufany",
        "skarbowa",
        "zobacz",
        "ksef",
        "zastpca szefa",
        "stopka",
        "rada",
        "inquest labs",
        "vba project",
        "vbaproject",
        "kopiuj md5",
        "kopiuj sha1",
        "skopiuj sha256",
        "sha1",
        "sha256",
        "typ tekst",
        "opis tekst",
        "ascii md5",
        "rozmiar",
        "typ dane",
        "pdf c",
        "text c",
        "ounizeto",
        "validation ca",
        "sha2",
        "odigicert inc",
        "cusa",
        "authority",
        "rsa ca",
        "cncertum domain",
        "cngeotrust ev",
        "oglobalsign",
        "unicode",
        "z bom",
        "crlf",
        "rgba",
        "dane obrazu",
        "tekst utf8",
        "v2 dokument",
        "dane",
        "dokument html",
        "jpeg",
        "skrt",
        "opis",
        "poczenie",
        "wifi",
        "start",
        "nazwa typ",
        "md5 nazwa",
        "procesu plik",
        "pe32",
        "intel",
        "pejzasz",
        "ms windows",
        "plik dokumentu",
        "nie c",
        "win32 exe",
        "crt.sh",
        "ct",
        "certificate transparency",
        "certificate search",
        "ssl certificate",
        "sectigo",
        "comodo ca",
        "comodo",
        "tls web",
        "criteria id",
        "647257375",
        "timestamp entry",
        "log operator",
        "log url",
        "google https",
        "ca mechanism",
        "provider status",
        "error",
        "log id",
        "647257567",
        "summary leaf",
        "sectigo https",
        "expired",
        "certificate",
        "lets",
        "key usage",
        "identifier",
        "551852229",
        "digicert https",
        "479894151",
        "479896285",
        "tylne drzwi",
        "win32",
        "imphasz",
        "wirustotal",
        "emaile",
        "emaile pnewell",
        "emaile khunter",
        "emaile eooshea",
        "emaile regadmin",
        "microsoft excel",
        "wed jan",
        "submission",
        "vhash",
        "ssdeep",
        "file type",
        "ms excel",
        "xls magic",
        "file v2",
        "document",
        "number",
        "algorithm",
        "certum",
        "unizeto",
        "warszawa",
        "31915086",
        "nitro pro",
        "nitro sign",
        "nitro",
        "nitro pdf",
        "primopdf",
        "pdfs",
        "business nitro",
        "pdf nitro",
        "pdf pro",
        "desktop",
        "premium",
        "service",
        "ja3s",
        "mnie",
        "sysv",
        "lsb executable",
        "eabi4 version",
        "msb executable",
        "mips",
        "mipsi version",
        "trojan",
        "imphash",
        "pehash",
        "name type",
        "md5 process",
        "fault",
        "header",
        "bezterminowo",
        "adres url",
        "nazwa hosta",
        "ipv4",
        "ccie asnas8075",
        "nie mona",
        "trojandropper",
        "url skryptw",
        "domeny a",
        "kliknij",
        "prbka skrt",
        "uwzgldnij",
        "nieobecny",
        "procesu",
        "ascii z",
        "ascii bez",
        "mirai",
        "win32virut",
        "procesu zastpy",
        "tekst ascii",
        "z terminatorami"
      ],
      "references": [
        "http://www.mf.gov.pl/tutaj/a./p/body/html",
        "https://www.mf.gov.pl/tutaj/a./p/body/html",
        "https://mdec.nelreports.net/api/report?cat=mdocs",
        "https://crt.sh/?id=647257375",
        "https://crt.sh/?id=647257567",
        "https://crt.sh/?id=551852229",
        "https://crt.sh/?id=479894151",
        "https://crt.sh/?id=479896285",
        "https://crt.sh/?d=49659844",
        "https://crt.sh/?id=31915086",
        "http://www.primopdf.com/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "e74755ff8b4927e257566302296e17e5d28cef17a6daf287cda9e63ce6c6f575 ELF :Mirai- MALWARE GH\\ [Trj] 23 pa\u017a 2016 bf0f346f4a51732e31d88eb47dcac82c7f7ed973312926819f1e1023b9c51121 23 pa\u017a 2016 5a92b73f354d54b9",
          "display_name": "e74755ff8b4927e257566302296e17e5d28cef17a6daf287cda9e63ce6c6f575 ELF :Mirai- MALWARE GH\\ [Trj] 23 pa\u017a 2016 bf0f346f4a51732e31d88eb47dcac82c7f7ed973312926819f1e1023b9c51121 23 pa\u017a 2016 5a92b73f354d54b9",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 127,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 627,
        "email": 41,
        "FileHash-SHA1": 1565,
        "FileHash-SHA256": 5520,
        "URL": 1821,
        "FileHash-MD5": 1861,
        "SSLCertFingerprint": 10,
        "domain": 167,
        "IPv4": 31,
        "YARA": 7,
        "CVE": 7
      },
      "indicator_count": 11657,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 127,
      "modified_text": "549 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://winstudio.eu/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://winstudio.eu/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776616770.582001
}