Indicators of malicious activity


Question goes here