txt2stix 1.1.8__py3-none-any.whl → 1.1.9__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- txt2stix/includes/extractions/ai/config.yaml +20 -0
- txt2stix/includes/extractions/lookup/config.yaml +33 -15
- txt2stix/includes/lookups/_generate_lookups.py +39 -30
- txt2stix/includes/lookups/{disarm_id_v1_5.txt → disarm_id_v1_6.txt} +95 -32
- txt2stix/includes/lookups/{disarm_name_v1_5.txt → disarm_name_v1_6.txt} +380 -317
- txt2stix/includes/lookups/{mitre_atlas_id_v4_5_2.txt → mitre_atlas_id_v4_9_0.txt} +41 -1
- txt2stix/includes/lookups/mitre_atlas_name_v4_9_0.txt +157 -0
- txt2stix/includes/lookups/{mitre_attack_enterprise_aliases_v16_0.txt → mitre_attack_enterprise_aliases_v18_0.txt} +679 -531
- txt2stix/includes/lookups/mitre_attack_enterprise_id_v18_0.txt +4293 -0
- txt2stix/includes/lookups/mitre_attack_enterprise_name_v18_0.txt +4295 -0
- txt2stix/includes/lookups/{mitre_attack_ics_aliases_v16_0.txt → mitre_attack_ics_aliases_v18_0.txt} +7 -3
- txt2stix/includes/lookups/mitre_attack_ics_id_v18_0.txt +410 -0
- txt2stix/includes/lookups/{mitre_attack_ics_name_v16_0.txt → mitre_attack_ics_name_v18_0.txt} +172 -53
- txt2stix/includes/lookups/{mitre_attack_mobile_aliases_v16_0.txt → mitre_attack_mobile_aliases_v18_0.txt} +33 -0
- txt2stix/includes/lookups/mitre_attack_mobile_id_v18_0.txt +643 -0
- txt2stix/includes/lookups/mitre_attack_mobile_name_v18_0.txt +645 -0
- txt2stix/includes/lookups/mitre_capec_name_v3_9.txt +522 -522
- txt2stix/includes/lookups/{mitre_cwe_id_v4_15.txt → mitre_cwe_id_v4_18.txt} +5 -0
- txt2stix/includes/lookups/{mitre_cwe_name_v4_15.txt → mitre_cwe_name_v4_18.txt} +889 -884
- txt2stix/includes/lookups/sector_aliases_v1_0.txt +751 -0
- txt2stix/includes/tests/test_cases.yaml +8 -0
- txt2stix/retriever.py +6 -0
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/METADATA +1 -1
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/RECORD +27 -26
- txt2stix/includes/lookups/mitre_atlas_name_v4_5_2.txt +0 -117
- txt2stix/includes/lookups/mitre_attack_enterprise_id_v16_0.txt +0 -1656
- txt2stix/includes/lookups/mitre_attack_enterprise_name_v16_0.txt +0 -1765
- txt2stix/includes/lookups/mitre_attack_ics_id_v16_0.txt +0 -254
- txt2stix/includes/lookups/mitre_attack_mobile_id_v16_0.txt +0 -277
- txt2stix/includes/lookups/mitre_attack_mobile_name_v16_0.txt +0 -296
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/WHEEL +0 -0
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/entry_points.txt +0 -0
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/licenses/LICENSE +0 -0
|
@@ -0,0 +1,4295 @@
|
|
|
1
|
+
Revert Cloud Instance
|
|
2
|
+
Modify Cloud Resource Hierarchy
|
|
3
|
+
PowerShell Profile
|
|
4
|
+
Malvertising
|
|
5
|
+
Weaken Encryption
|
|
6
|
+
Active Setup
|
|
7
|
+
Transport Agent
|
|
8
|
+
AppleScript
|
|
9
|
+
Reduce Key Space
|
|
10
|
+
Indirect Command Execution
|
|
11
|
+
Backup Software Discovery
|
|
12
|
+
Systemctl
|
|
13
|
+
Implant Internal Image
|
|
14
|
+
Threat Intel Vendors
|
|
15
|
+
Rogue Domain Controller
|
|
16
|
+
Defacement
|
|
17
|
+
Unused/Unsupported Cloud Regions
|
|
18
|
+
DHCP Spoofing
|
|
19
|
+
Bind Mounts
|
|
20
|
+
Trap
|
|
21
|
+
Bandwidth Hijacking
|
|
22
|
+
Poisoned Pipeline Execution
|
|
23
|
+
Right-to-Left Override
|
|
24
|
+
Container Administration Command
|
|
25
|
+
Disable Crypto Hardware
|
|
26
|
+
Build Image on Host
|
|
27
|
+
DNS Calculation
|
|
28
|
+
Cloud Storage Object Discovery
|
|
29
|
+
Exfiltration to Code Repository
|
|
30
|
+
Cloud Service Hijacking
|
|
31
|
+
Selective Exclusion
|
|
32
|
+
Internal Spearphishing
|
|
33
|
+
Services File Permissions Weakness
|
|
34
|
+
Remote Access Hardware
|
|
35
|
+
Email Bombing
|
|
36
|
+
Cloud Application Integration
|
|
37
|
+
Python Startup Hooks
|
|
38
|
+
Relocate Malware
|
|
39
|
+
Screensaver
|
|
40
|
+
Hardware Additions
|
|
41
|
+
Exclusive Control
|
|
42
|
+
Email Spoofing
|
|
43
|
+
Space after Filename
|
|
44
|
+
Re-opened Applications
|
|
45
|
+
Serverless Execution
|
|
46
|
+
Create Snapshot
|
|
47
|
+
Firmware Corruption
|
|
48
|
+
Network Device Authentication
|
|
49
|
+
FrostyGoop Incident
|
|
50
|
+
ShadowRay
|
|
51
|
+
SPACEHOP Activity
|
|
52
|
+
Leviathan Australian Intrusions
|
|
53
|
+
Network Intrusion Prevention
|
|
54
|
+
Vulnerability Scanning
|
|
55
|
+
Limit Access to Resource Over Network
|
|
56
|
+
Remote Data Storage
|
|
57
|
+
Filter Network Traffic
|
|
58
|
+
Restrict Web-Based Content
|
|
59
|
+
Limit Software Installation
|
|
60
|
+
Application Developer Guidance
|
|
61
|
+
Limit Hardware Installation
|
|
62
|
+
User Training
|
|
63
|
+
User Account Control
|
|
64
|
+
Operating System Configuration
|
|
65
|
+
Data Backup
|
|
66
|
+
Execution Prevention
|
|
67
|
+
Credential Access Protection
|
|
68
|
+
Code Signing
|
|
69
|
+
Environment Variable Permissions
|
|
70
|
+
Data Loss Prevention
|
|
71
|
+
Privileged Process Integrity
|
|
72
|
+
Do Not Mitigate
|
|
73
|
+
Pre-compromise
|
|
74
|
+
SSL/TLS Inspection
|
|
75
|
+
Boot Integrity
|
|
76
|
+
Out-of-Band Communications Channel
|
|
77
|
+
Network Segmentation
|
|
78
|
+
Threat Intelligence Program
|
|
79
|
+
Password Policies
|
|
80
|
+
Behavior Prevention on Endpoint
|
|
81
|
+
User Account Management
|
|
82
|
+
Restrict File and Directory Permissions
|
|
83
|
+
Privileged Account Management
|
|
84
|
+
Restrict Registry Permissions
|
|
85
|
+
Antivirus/Antimalware
|
|
86
|
+
Multi-factor Authentication
|
|
87
|
+
Software Configuration
|
|
88
|
+
Application Isolation and Sandboxing
|
|
89
|
+
Audit
|
|
90
|
+
Exploit Protection
|
|
91
|
+
Active Directory Configuration
|
|
92
|
+
Update Software
|
|
93
|
+
Restrict Library Loading
|
|
94
|
+
Disable or Remove Feature or Program
|
|
95
|
+
Account Use Policies
|
|
96
|
+
Encrypt Sensitive Information
|
|
97
|
+
NEODYMIUM
|
|
98
|
+
GCMAN
|
|
99
|
+
AppleJeus
|
|
100
|
+
Moafee
|
|
101
|
+
Gallmaker
|
|
102
|
+
ZIRCONIUM
|
|
103
|
+
Rocke
|
|
104
|
+
Winter Vivern
|
|
105
|
+
Poseidon Group
|
|
106
|
+
RedCurl
|
|
107
|
+
APT-C-23
|
|
108
|
+
Stealth Falcon
|
|
109
|
+
Silent Librarian
|
|
110
|
+
Equation
|
|
111
|
+
Darkhotel
|
|
112
|
+
Scarlet Mimic
|
|
113
|
+
FIN4
|
|
114
|
+
BlackOasis
|
|
115
|
+
HDoor
|
|
116
|
+
TrickBot
|
|
117
|
+
cd00r
|
|
118
|
+
PowerDuke
|
|
119
|
+
EKANS
|
|
120
|
+
BLINDINGCAN
|
|
121
|
+
Ninja
|
|
122
|
+
Pikabot
|
|
123
|
+
Wiarp
|
|
124
|
+
RCSession
|
|
125
|
+
Spark
|
|
126
|
+
QuietSieve
|
|
127
|
+
SynAck
|
|
128
|
+
Bumblebee
|
|
129
|
+
MURKYTOP
|
|
130
|
+
AcidRain
|
|
131
|
+
GRIFFON
|
|
132
|
+
Exaramel for Windows
|
|
133
|
+
Amadey
|
|
134
|
+
JumbledPath
|
|
135
|
+
RDFSNIFFER
|
|
136
|
+
NICECURL
|
|
137
|
+
Proxysvc
|
|
138
|
+
Orz
|
|
139
|
+
Torisma
|
|
140
|
+
NOKKI
|
|
141
|
+
yty
|
|
142
|
+
Backdoor.Oldrea
|
|
143
|
+
DOGCALL
|
|
144
|
+
Stuxnet
|
|
145
|
+
Downdelph
|
|
146
|
+
RotaJakiro
|
|
147
|
+
AvosLocker
|
|
148
|
+
SEASHARPEE
|
|
149
|
+
Get2
|
|
150
|
+
POWRUNER
|
|
151
|
+
KOPILUWAK
|
|
152
|
+
RobbinHood
|
|
153
|
+
MEDUSA
|
|
154
|
+
VersaMem
|
|
155
|
+
Power Loader
|
|
156
|
+
TDTESS
|
|
157
|
+
Chinoxy
|
|
158
|
+
SharpStage
|
|
159
|
+
PAKLOG
|
|
160
|
+
COATHANGER
|
|
161
|
+
Sardonic
|
|
162
|
+
Smoke Loader
|
|
163
|
+
HALFBAKED
|
|
164
|
+
WindTail
|
|
165
|
+
Misdat
|
|
166
|
+
reGeorg
|
|
167
|
+
FLIPSIDE
|
|
168
|
+
Linux Rabbit
|
|
169
|
+
adbupd
|
|
170
|
+
Emissary
|
|
171
|
+
Exaramel for Linux
|
|
172
|
+
KEYMARBLE
|
|
173
|
+
BUBBLEWRAP
|
|
174
|
+
HAWKBALL
|
|
175
|
+
TAMECAT
|
|
176
|
+
PS1
|
|
177
|
+
Ursnif
|
|
178
|
+
CASTLETAP
|
|
179
|
+
ThreatNeedle
|
|
180
|
+
RansomHub
|
|
181
|
+
ZLib
|
|
182
|
+
RedLeaves
|
|
183
|
+
Miner-C
|
|
184
|
+
POWERSOURCE
|
|
185
|
+
LITTLELAMB.WOOLTEA
|
|
186
|
+
Felismus
|
|
187
|
+
Zeus Panda
|
|
188
|
+
GeminiDuke
|
|
189
|
+
Havoc
|
|
190
|
+
CARROTBAT
|
|
191
|
+
Matryoshka
|
|
192
|
+
FrameworkPOS
|
|
193
|
+
GravityRAT
|
|
194
|
+
WEBC2
|
|
195
|
+
Prestige
|
|
196
|
+
InvisibleFerret
|
|
197
|
+
Bankshot
|
|
198
|
+
SharpDisco
|
|
199
|
+
StrongPity
|
|
200
|
+
HAPPYWORK
|
|
201
|
+
xCaon
|
|
202
|
+
PLAINTEE
|
|
203
|
+
Pony
|
|
204
|
+
WinMM
|
|
205
|
+
Nebulae
|
|
206
|
+
Janicab
|
|
207
|
+
AuditCred
|
|
208
|
+
Lurid
|
|
209
|
+
TONESHELL
|
|
210
|
+
UPSTYLE
|
|
211
|
+
Kasidet
|
|
212
|
+
Hannotog
|
|
213
|
+
OceanSalt
|
|
214
|
+
Playcrypt
|
|
215
|
+
Brave Prince
|
|
216
|
+
Medusa Ransomware
|
|
217
|
+
RainyDay
|
|
218
|
+
Ecipekac
|
|
219
|
+
AppleSeed
|
|
220
|
+
BUSHWALK
|
|
221
|
+
macOS.OSAMiner
|
|
222
|
+
LOWBALL
|
|
223
|
+
NETWIRE
|
|
224
|
+
TinyTurla
|
|
225
|
+
PyDCrypt
|
|
226
|
+
J-magic
|
|
227
|
+
PowerExchange
|
|
228
|
+
BOOKWORM
|
|
229
|
+
HyperStack
|
|
230
|
+
iKitten
|
|
231
|
+
HAMMERTOSS
|
|
232
|
+
OLDBAIT
|
|
233
|
+
Bad Rabbit
|
|
234
|
+
CosmicDuke
|
|
235
|
+
EvilGrab
|
|
236
|
+
EnvyScout
|
|
237
|
+
SslMM
|
|
238
|
+
STATICPLUGIN
|
|
239
|
+
IMAPLoader
|
|
240
|
+
GreyEnergy
|
|
241
|
+
Gomir
|
|
242
|
+
Aria-body
|
|
243
|
+
Emotet
|
|
244
|
+
SNUGRIDE
|
|
245
|
+
Olympic Destroyer
|
|
246
|
+
BOLDMOVE
|
|
247
|
+
Crimson
|
|
248
|
+
Tomiris
|
|
249
|
+
TEARDROP
|
|
250
|
+
DUSTTRAP
|
|
251
|
+
Turian
|
|
252
|
+
THINCRUST
|
|
253
|
+
BADHATCH
|
|
254
|
+
Machete
|
|
255
|
+
PowerLess
|
|
256
|
+
Action RAT
|
|
257
|
+
Avenger
|
|
258
|
+
DUSTPAN
|
|
259
|
+
Prikormka
|
|
260
|
+
PUBLOAD
|
|
261
|
+
Gootloader
|
|
262
|
+
PingPull
|
|
263
|
+
WellMess
|
|
264
|
+
Dacls
|
|
265
|
+
DropBook
|
|
266
|
+
Woody RAT
|
|
267
|
+
Mafalda
|
|
268
|
+
KARAE
|
|
269
|
+
Squirrelwaffle
|
|
270
|
+
ELMER
|
|
271
|
+
CANONSTAGER
|
|
272
|
+
PolyglotDuke
|
|
273
|
+
HexEval Loader
|
|
274
|
+
Umbreon
|
|
275
|
+
AuTo Stealer
|
|
276
|
+
ShrinkLocker
|
|
277
|
+
Hildegard
|
|
278
|
+
Agent.btz
|
|
279
|
+
SLOWDRIFT
|
|
280
|
+
SHUTTERSPEED
|
|
281
|
+
SombRAT
|
|
282
|
+
ODAgent
|
|
283
|
+
BlackByte 2.0 Ransomware
|
|
284
|
+
FlawedGrace
|
|
285
|
+
FLASHFLOOD
|
|
286
|
+
FlawedAmmyy
|
|
287
|
+
Snip3
|
|
288
|
+
FYAnti
|
|
289
|
+
Rifdoor
|
|
290
|
+
SUGARUSH
|
|
291
|
+
LoFiSe
|
|
292
|
+
HOPLIGHT
|
|
293
|
+
Cuckoo Stealer
|
|
294
|
+
GuLoader
|
|
295
|
+
MobileOrder
|
|
296
|
+
WastedLocker
|
|
297
|
+
RegDuke
|
|
298
|
+
ProLock
|
|
299
|
+
Moneybird
|
|
300
|
+
InvisiMole
|
|
301
|
+
CLAIMLOADER
|
|
302
|
+
P.A.S. Webshell
|
|
303
|
+
QUIETEXIT
|
|
304
|
+
Naid
|
|
305
|
+
Apostle
|
|
306
|
+
Volgmer
|
|
307
|
+
WINERACK
|
|
308
|
+
WhisperGate
|
|
309
|
+
FruitFly
|
|
310
|
+
ZeroT
|
|
311
|
+
Keydnap
|
|
312
|
+
AcidPour
|
|
313
|
+
RDAT
|
|
314
|
+
Hacking Team UEFI Rootkit
|
|
315
|
+
Skidmap
|
|
316
|
+
Okrum
|
|
317
|
+
TRANSLATEXT
|
|
318
|
+
Regin
|
|
319
|
+
Bonadan
|
|
320
|
+
Line Dancer
|
|
321
|
+
SamSam
|
|
322
|
+
Neoichor
|
|
323
|
+
Conti
|
|
324
|
+
Raspberry Robin
|
|
325
|
+
Mispadu
|
|
326
|
+
RemoteCMD
|
|
327
|
+
Megazord
|
|
328
|
+
Diavol
|
|
329
|
+
REPTILE
|
|
330
|
+
Raindrop
|
|
331
|
+
Doki
|
|
332
|
+
TEXTMATE
|
|
333
|
+
Siloscape
|
|
334
|
+
BlackCat
|
|
335
|
+
Fysbis
|
|
336
|
+
IcedID
|
|
337
|
+
VERMIN
|
|
338
|
+
UBoatRAT
|
|
339
|
+
Nightdoor
|
|
340
|
+
MarkiRAT
|
|
341
|
+
PowerShower
|
|
342
|
+
Kazuar
|
|
343
|
+
NavRAT
|
|
344
|
+
DarkComet
|
|
345
|
+
NETEAGLE
|
|
346
|
+
POORAIM
|
|
347
|
+
HUI Loader
|
|
348
|
+
CHIMNEYSWEEP
|
|
349
|
+
Ragnar Locker
|
|
350
|
+
FatDuke
|
|
351
|
+
Lucifer
|
|
352
|
+
BlackEnergy
|
|
353
|
+
zwShell
|
|
354
|
+
Zeroaccess
|
|
355
|
+
GLASSTOKEN
|
|
356
|
+
DCSrv
|
|
357
|
+
DRATzarus
|
|
358
|
+
BOOSTWRITE
|
|
359
|
+
Rising Sun
|
|
360
|
+
ASPXSpy
|
|
361
|
+
NotPetya
|
|
362
|
+
ShimRat
|
|
363
|
+
Chrommme
|
|
364
|
+
BADFLICK
|
|
365
|
+
ObliqueRAT
|
|
366
|
+
SHOTPUT
|
|
367
|
+
Avaddon
|
|
368
|
+
Conficker
|
|
369
|
+
SocGholish
|
|
370
|
+
Flagpro
|
|
371
|
+
Hi-Zor
|
|
372
|
+
SpicyOmelette
|
|
373
|
+
XAgentOSX
|
|
374
|
+
Green Lambert
|
|
375
|
+
China Chopper
|
|
376
|
+
SnappyTCP
|
|
377
|
+
CALENDAR
|
|
378
|
+
LockerGoga
|
|
379
|
+
LightSpy
|
|
380
|
+
Chaos
|
|
381
|
+
ISMInjector
|
|
382
|
+
PUNCHBUGGY
|
|
383
|
+
GoldMax
|
|
384
|
+
HELLOKITTY
|
|
385
|
+
CostaBricks
|
|
386
|
+
Cheerscrypt
|
|
387
|
+
LIGHTWIRE
|
|
388
|
+
KeyBoy
|
|
389
|
+
POSHSPY
|
|
390
|
+
MiniDuke
|
|
391
|
+
HyperBro
|
|
392
|
+
Anchor
|
|
393
|
+
Line Runner
|
|
394
|
+
Pteranodon
|
|
395
|
+
DarkTortilla
|
|
396
|
+
BeaverTail
|
|
397
|
+
ROKRAT
|
|
398
|
+
CORESHELL
|
|
399
|
+
RunningRAT
|
|
400
|
+
VPNFilter
|
|
401
|
+
SplatDropper
|
|
402
|
+
Babuk
|
|
403
|
+
Exbyte
|
|
404
|
+
DarkWatchman
|
|
405
|
+
Dyre
|
|
406
|
+
BlackMould
|
|
407
|
+
Javali
|
|
408
|
+
PACEMAKER
|
|
409
|
+
LunarLoader
|
|
410
|
+
BBSRAT
|
|
411
|
+
PlugX
|
|
412
|
+
Reaver
|
|
413
|
+
Bisonal
|
|
414
|
+
MultiLayer Wiper
|
|
415
|
+
S-Type
|
|
416
|
+
Lumma Stealer
|
|
417
|
+
SeaDuke
|
|
418
|
+
BS2005
|
|
419
|
+
DustySky
|
|
420
|
+
Duqu
|
|
421
|
+
Truvasys
|
|
422
|
+
Remsec
|
|
423
|
+
Industroyer2
|
|
424
|
+
Sykipot
|
|
425
|
+
Explosive
|
|
426
|
+
Xbash
|
|
427
|
+
Rover
|
|
428
|
+
Epic
|
|
429
|
+
LightNeuron
|
|
430
|
+
Peppy
|
|
431
|
+
KEYPLUG
|
|
432
|
+
Cuba
|
|
433
|
+
DEATHRANSOM
|
|
434
|
+
Clambling
|
|
435
|
+
Akira
|
|
436
|
+
DarkGate
|
|
437
|
+
Mongall
|
|
438
|
+
NanHaiShu
|
|
439
|
+
LockBit 3.0
|
|
440
|
+
SVCReady
|
|
441
|
+
ThiefQuest
|
|
442
|
+
FoggyWeb
|
|
443
|
+
NGLite
|
|
444
|
+
Carbanak
|
|
445
|
+
XTunnel
|
|
446
|
+
Hydraq
|
|
447
|
+
SHARPSTATS
|
|
448
|
+
Ferocious
|
|
449
|
+
HOMEFRY
|
|
450
|
+
CreepyDrive
|
|
451
|
+
Caterpillar WebShell
|
|
452
|
+
Netwalker
|
|
453
|
+
Elise
|
|
454
|
+
USBferry
|
|
455
|
+
WannaCry
|
|
456
|
+
Gazer
|
|
457
|
+
TSCookie
|
|
458
|
+
Latrodectus
|
|
459
|
+
Saint Bot
|
|
460
|
+
Pay2Key
|
|
461
|
+
Chaes
|
|
462
|
+
Briba
|
|
463
|
+
CharmPower
|
|
464
|
+
TYPEFRAME
|
|
465
|
+
3PARA RAT
|
|
466
|
+
Bundlore
|
|
467
|
+
P8RAT
|
|
468
|
+
VIRTUALPIE
|
|
469
|
+
EVILNUM
|
|
470
|
+
KOMPROGO
|
|
471
|
+
SMOKEDHAM
|
|
472
|
+
Mori
|
|
473
|
+
QUADAGENT
|
|
474
|
+
Sagerunex
|
|
475
|
+
TAINTEDSCRIBE
|
|
476
|
+
Sys10
|
|
477
|
+
pngdowner
|
|
478
|
+
Royal
|
|
479
|
+
BendyBear
|
|
480
|
+
Uroburos
|
|
481
|
+
Metamorfo
|
|
482
|
+
Spica
|
|
483
|
+
Embargo
|
|
484
|
+
Trojan.Karagany
|
|
485
|
+
Bandook
|
|
486
|
+
PipeMon
|
|
487
|
+
SYNful Knock
|
|
488
|
+
MagicRAT
|
|
489
|
+
TINYTYPHON
|
|
490
|
+
KONNI
|
|
491
|
+
T9000
|
|
492
|
+
Winnti for Linux
|
|
493
|
+
RAPIDPULSE
|
|
494
|
+
gh0st RAT
|
|
495
|
+
Shamoon
|
|
496
|
+
Skeleton Key
|
|
497
|
+
DnsSystem
|
|
498
|
+
MoleNet
|
|
499
|
+
CORALDECK
|
|
500
|
+
JHUHUGIT
|
|
501
|
+
SPACESHIP
|
|
502
|
+
BLUELIGHT
|
|
503
|
+
KGH_SPY
|
|
504
|
+
down_new
|
|
505
|
+
Ixeshe
|
|
506
|
+
Micropsia
|
|
507
|
+
Kerrdown
|
|
508
|
+
RARSTONE
|
|
509
|
+
RedLine Stealer
|
|
510
|
+
VBShower
|
|
511
|
+
BPFDoor
|
|
512
|
+
Black Basta
|
|
513
|
+
ZeroCleare
|
|
514
|
+
Catchamas
|
|
515
|
+
StoneDrill
|
|
516
|
+
OopsIE
|
|
517
|
+
4H RAT
|
|
518
|
+
RogueRobin
|
|
519
|
+
Attor
|
|
520
|
+
DealersChoice
|
|
521
|
+
SQLRat
|
|
522
|
+
LitePower
|
|
523
|
+
MegaCortex
|
|
524
|
+
StreamEx
|
|
525
|
+
BoxCaon
|
|
526
|
+
NightClub
|
|
527
|
+
Crutch
|
|
528
|
+
Akira _v2
|
|
529
|
+
SDBbot
|
|
530
|
+
Mosquito
|
|
531
|
+
RTM
|
|
532
|
+
QUIETCANARY
|
|
533
|
+
Derusbi
|
|
534
|
+
BlackByte Ransomware
|
|
535
|
+
SodaMaster
|
|
536
|
+
Hikit
|
|
537
|
+
StrelaStealer
|
|
538
|
+
Grandoreiro
|
|
539
|
+
WellMail
|
|
540
|
+
LiteDuke
|
|
541
|
+
Starloader
|
|
542
|
+
Sakula
|
|
543
|
+
VaporRage
|
|
544
|
+
RawPOS
|
|
545
|
+
Sibot
|
|
546
|
+
ZxxZ
|
|
547
|
+
Tarrask
|
|
548
|
+
GoBear
|
|
549
|
+
WINDSHIELD
|
|
550
|
+
Drovorub
|
|
551
|
+
Shark
|
|
552
|
+
Bazar
|
|
553
|
+
PULSECHECK
|
|
554
|
+
Kobalos
|
|
555
|
+
BadPatch
|
|
556
|
+
MESSAGETAP
|
|
557
|
+
RATANKBA
|
|
558
|
+
SUGARDUMP
|
|
559
|
+
XLoader
|
|
560
|
+
SOUNDBITE
|
|
561
|
+
BADCALL
|
|
562
|
+
hcdLoader
|
|
563
|
+
Nidiran
|
|
564
|
+
MoonWind
|
|
565
|
+
CorKLOG
|
|
566
|
+
Ryuk
|
|
567
|
+
Cryptoistic
|
|
568
|
+
HermeticWiper
|
|
569
|
+
ABK
|
|
570
|
+
Pysa
|
|
571
|
+
Wiper
|
|
572
|
+
Final1stspy
|
|
573
|
+
MgBot
|
|
574
|
+
ccf32
|
|
575
|
+
Kapeka
|
|
576
|
+
LockBit 2.0
|
|
577
|
+
OilCheck
|
|
578
|
+
Zebrocy
|
|
579
|
+
Pandora
|
|
580
|
+
FinFisher
|
|
581
|
+
SpeakUp
|
|
582
|
+
LunarMail
|
|
583
|
+
WARPWIRE
|
|
584
|
+
CrossRAT
|
|
585
|
+
OwaAuth
|
|
586
|
+
Cadelspy
|
|
587
|
+
Cobalt Strike
|
|
588
|
+
SampleCheck5000
|
|
589
|
+
SUNBURST
|
|
590
|
+
EvilBunny
|
|
591
|
+
Wingbird
|
|
592
|
+
Cobian RAT
|
|
593
|
+
HotCroissant
|
|
594
|
+
ServHelper
|
|
595
|
+
JCry
|
|
596
|
+
Unknown Logger
|
|
597
|
+
REvil
|
|
598
|
+
RIPTIDE
|
|
599
|
+
Valak
|
|
600
|
+
Samurai
|
|
601
|
+
PinchDuke
|
|
602
|
+
Milan
|
|
603
|
+
USBStealer
|
|
604
|
+
OSX_OCEANLOTUS.D
|
|
605
|
+
OilBooster
|
|
606
|
+
CCBkdr
|
|
607
|
+
OnionDuke
|
|
608
|
+
Taidoor
|
|
609
|
+
SHIPSHAPE
|
|
610
|
+
Cherry Picker
|
|
611
|
+
SUPERNOVA
|
|
612
|
+
P2P ZeuS
|
|
613
|
+
Kivars
|
|
614
|
+
CaddyWiper
|
|
615
|
+
Cyclops Blink
|
|
616
|
+
Seasalt
|
|
617
|
+
NativeZone
|
|
618
|
+
NanoCore
|
|
619
|
+
TajMahal
|
|
620
|
+
PLEAD
|
|
621
|
+
Raccoon Stealer
|
|
622
|
+
IPsec Helper
|
|
623
|
+
Daserf
|
|
624
|
+
GoldFinder
|
|
625
|
+
Carbon
|
|
626
|
+
LoJax
|
|
627
|
+
Cardinal RAT
|
|
628
|
+
DanBot
|
|
629
|
+
BISCUIT
|
|
630
|
+
Calisto
|
|
631
|
+
Solar
|
|
632
|
+
Pisloader
|
|
633
|
+
GoldenSpy
|
|
634
|
+
Gold Dragon
|
|
635
|
+
RGDoor
|
|
636
|
+
Ramsay
|
|
637
|
+
Neo-reGeorg
|
|
638
|
+
FakeM
|
|
639
|
+
Carberp
|
|
640
|
+
FRAMESTING
|
|
641
|
+
HARDRAIN
|
|
642
|
+
NKAbuse
|
|
643
|
+
Pillowmint
|
|
644
|
+
TrailBlazer
|
|
645
|
+
Revenge RAT
|
|
646
|
+
MacMa
|
|
647
|
+
FunnyDream
|
|
648
|
+
ROADSWEEP
|
|
649
|
+
SUNSPOT
|
|
650
|
+
MOPSLED
|
|
651
|
+
More_eggs
|
|
652
|
+
SysUpdate
|
|
653
|
+
TinyZBot
|
|
654
|
+
OutSteel
|
|
655
|
+
BackConfig
|
|
656
|
+
PowGoop
|
|
657
|
+
Kwampirs
|
|
658
|
+
Nerex
|
|
659
|
+
BoomBox
|
|
660
|
+
DEADEYE
|
|
661
|
+
PUNCHTRACK
|
|
662
|
+
Proton
|
|
663
|
+
Trojan.Mebromi
|
|
664
|
+
Mango
|
|
665
|
+
InnaputRAT
|
|
666
|
+
WIREFIRE
|
|
667
|
+
Kessel
|
|
668
|
+
GrimAgent
|
|
669
|
+
LookBack
|
|
670
|
+
STEADYPULSE
|
|
671
|
+
Clop
|
|
672
|
+
NetTraveler
|
|
673
|
+
YAHOYAH
|
|
674
|
+
Lokibot
|
|
675
|
+
CallMe
|
|
676
|
+
ROCKBOOT
|
|
677
|
+
CloudDuke
|
|
678
|
+
Egregor
|
|
679
|
+
PoetRAT
|
|
680
|
+
CHOPSTICK
|
|
681
|
+
StealBit
|
|
682
|
+
FELIXROOT
|
|
683
|
+
ZxShell
|
|
684
|
+
RIFLESPINE
|
|
685
|
+
SLIGHTPULSE
|
|
686
|
+
NDiskMonitor
|
|
687
|
+
CoinTicker
|
|
688
|
+
DDKONG
|
|
689
|
+
Penquin
|
|
690
|
+
BabyShark
|
|
691
|
+
Cannon
|
|
692
|
+
CreepySnail
|
|
693
|
+
build_downer
|
|
694
|
+
Melcoz
|
|
695
|
+
Winnti for Windows
|
|
696
|
+
PowerPunch
|
|
697
|
+
BONDUPDATER
|
|
698
|
+
Troll Stealer
|
|
699
|
+
BLACKCOFFEE
|
|
700
|
+
BFG Agonizer
|
|
701
|
+
Ebury
|
|
702
|
+
Kinsing
|
|
703
|
+
PITSTOP
|
|
704
|
+
Meteor
|
|
705
|
+
njRAT
|
|
706
|
+
ZIPLINE
|
|
707
|
+
Maze
|
|
708
|
+
BOOTRASH
|
|
709
|
+
HIUPAN
|
|
710
|
+
ComRAT
|
|
711
|
+
TURNEDUP
|
|
712
|
+
ChChes
|
|
713
|
+
PowerStallion
|
|
714
|
+
ANDROMEDA
|
|
715
|
+
Manjusaka
|
|
716
|
+
IceApple
|
|
717
|
+
JPIN
|
|
718
|
+
VIRTUALPITA
|
|
719
|
+
metaMain
|
|
720
|
+
SideTwist
|
|
721
|
+
KOCTOPUS
|
|
722
|
+
MechaFlounder
|
|
723
|
+
Psylo
|
|
724
|
+
Heyoka Backdoor
|
|
725
|
+
HTTPBrowser
|
|
726
|
+
Mis-Type
|
|
727
|
+
LunarWeb
|
|
728
|
+
XCSSET
|
|
729
|
+
Disco
|
|
730
|
+
Dipsind
|
|
731
|
+
Octopus
|
|
732
|
+
KillDisk
|
|
733
|
+
Qilin
|
|
734
|
+
AppleJeus
|
|
735
|
+
SoreFang
|
|
736
|
+
STARWHALE
|
|
737
|
+
MirageFox
|
|
738
|
+
Industroyer
|
|
739
|
+
DownPaper
|
|
740
|
+
Socksbot
|
|
741
|
+
Pcexter
|
|
742
|
+
HIDEDRV
|
|
743
|
+
CozyCar
|
|
744
|
+
Kevin
|
|
745
|
+
Agent Tesla
|
|
746
|
+
Pasam
|
|
747
|
+
httpclient
|
|
748
|
+
POWERSTATS
|
|
749
|
+
POWERTON
|
|
750
|
+
StarProxy
|
|
751
|
+
ECCENTRICBANDWAGON
|
|
752
|
+
BADNEWS
|
|
753
|
+
Linfo
|
|
754
|
+
Goopy
|
|
755
|
+
ShadowPad
|
|
756
|
+
Remexi
|
|
757
|
+
Astaroth
|
|
758
|
+
QakBot
|
|
759
|
+
SYSCON
|
|
760
|
+
CookieMiner
|
|
761
|
+
Hancitor
|
|
762
|
+
Gelsemium
|
|
763
|
+
jRAT
|
|
764
|
+
Helminth
|
|
765
|
+
Dridex
|
|
766
|
+
BBK
|
|
767
|
+
Komplex
|
|
768
|
+
OSX/Shlayer
|
|
769
|
+
Denis
|
|
770
|
+
INC Ransomware
|
|
771
|
+
DEADWOOD
|
|
772
|
+
GLOOXMAIL
|
|
773
|
+
Dok
|
|
774
|
+
SplatCloak
|
|
775
|
+
Waterbear
|
|
776
|
+
FIVEHANDS
|
|
777
|
+
Comnie
|
|
778
|
+
Vasport
|
|
779
|
+
AutoIt backdoor
|
|
780
|
+
JSS Loader
|
|
781
|
+
PHOREAL
|
|
782
|
+
OSInfo
|
|
783
|
+
MacSpy
|
|
784
|
+
Lizar
|
|
785
|
+
Dtrack
|
|
786
|
+
H1N1
|
|
787
|
+
SLOWPULSE
|
|
788
|
+
Seth-Locker
|
|
789
|
+
LoudMiner
|
|
790
|
+
Azorult
|
|
791
|
+
BitPaymer
|
|
792
|
+
BACKSPACE
|
|
793
|
+
Zox
|
|
794
|
+
UPPERCUT
|
|
795
|
+
ADVSTORESHELL
|
|
796
|
+
StrifeWater
|
|
797
|
+
Mivast
|
|
798
|
+
HiddenWasp
|
|
799
|
+
WarzoneRAT
|
|
800
|
+
Net Crawler
|
|
801
|
+
SLOTHFULMEDIA
|
|
802
|
+
FALLCHILL
|
|
803
|
+
XORIndex Loader
|
|
804
|
+
Small Sieve
|
|
805
|
+
Flame
|
|
806
|
+
HermeticWizard
|
|
807
|
+
Net
|
|
808
|
+
RemoteUtilities
|
|
809
|
+
Covenant
|
|
810
|
+
NPPSPY
|
|
811
|
+
BloodHound
|
|
812
|
+
certutil
|
|
813
|
+
at
|
|
814
|
+
UACMe
|
|
815
|
+
ShimRatReporter
|
|
816
|
+
Sliver
|
|
817
|
+
SILENTTRINITY
|
|
818
|
+
PowerSploit
|
|
819
|
+
Pacu
|
|
820
|
+
Windows Credential Editor
|
|
821
|
+
Impacket
|
|
822
|
+
ipconfig
|
|
823
|
+
AADInternals
|
|
824
|
+
Tasklist
|
|
825
|
+
Lslsass
|
|
826
|
+
Arp
|
|
827
|
+
spwebmember
|
|
828
|
+
Empire
|
|
829
|
+
ifconfig
|
|
830
|
+
FRP
|
|
831
|
+
dsquery
|
|
832
|
+
PcShare
|
|
833
|
+
RawDisk
|
|
834
|
+
netstat
|
|
835
|
+
PoshC2
|
|
836
|
+
Fgdump
|
|
837
|
+
xCmd
|
|
838
|
+
CSPY Downloader
|
|
839
|
+
Rclone
|
|
840
|
+
MimiPenguin
|
|
841
|
+
netsh
|
|
842
|
+
CARROTBALL
|
|
843
|
+
BITSAdmin
|
|
844
|
+
meek
|
|
845
|
+
AsyncRAT
|
|
846
|
+
ROADTools
|
|
847
|
+
Brute Ratel C4
|
|
848
|
+
Peirates
|
|
849
|
+
Remcos
|
|
850
|
+
Systeminfo
|
|
851
|
+
Out1
|
|
852
|
+
ConnectWise
|
|
853
|
+
attrib
|
|
854
|
+
Imminent Monitor
|
|
855
|
+
Ruler
|
|
856
|
+
Forfiles
|
|
857
|
+
Winexe
|
|
858
|
+
MCMD
|
|
859
|
+
Nltest
|
|
860
|
+
MailSniper
|
|
861
|
+
sqlmap
|
|
862
|
+
pwdump
|
|
863
|
+
Responder
|
|
864
|
+
Pass-The-Hash Toolkit
|
|
865
|
+
Donut
|
|
866
|
+
Mimikatz
|
|
867
|
+
gsecdump
|
|
868
|
+
IronNetInjector
|
|
869
|
+
nbtstat
|
|
870
|
+
Invoke-PSImage
|
|
871
|
+
NBTscan
|
|
872
|
+
LaZagne
|
|
873
|
+
Ping
|
|
874
|
+
cmd
|
|
875
|
+
route
|
|
876
|
+
esentutl
|
|
877
|
+
CrackMapExec
|
|
878
|
+
Koadic
|
|
879
|
+
schtasks
|
|
880
|
+
Cachedump
|
|
881
|
+
Expand
|
|
882
|
+
Pupy
|
|
883
|
+
Reg
|
|
884
|
+
ftp
|
|
885
|
+
Mythic
|
|
886
|
+
HTRAN
|
|
887
|
+
SDelete
|
|
888
|
+
QuasarRAT
|
|
889
|
+
cipher.exe
|
|
890
|
+
Rubeus
|
|
891
|
+
Tor
|
|
892
|
+
AdFind
|
|
893
|
+
Wevtutil
|
|
894
|
+
Havij
|
|
895
|
+
Quick Assist
|
|
896
|
+
PsExec
|
|
897
|
+
Analytic 0110
|
|
898
|
+
Analytic 0613
|
|
899
|
+
Analytic 0769
|
|
900
|
+
Analytic 0068
|
|
901
|
+
Analytic 0887
|
|
902
|
+
Analytic 0061
|
|
903
|
+
Analytic 1421
|
|
904
|
+
Analytic 0295
|
|
905
|
+
Analytic 0534
|
|
906
|
+
Analytic 0010
|
|
907
|
+
Analytic 0491
|
|
908
|
+
Analytic 1104
|
|
909
|
+
Analytic 1112
|
|
910
|
+
Analytic 1532
|
|
911
|
+
Analytic 0417
|
|
912
|
+
Analytic 0726
|
|
913
|
+
Analytic 0469
|
|
914
|
+
Analytic 0053
|
|
915
|
+
Analytic 0860
|
|
916
|
+
Analytic 0876
|
|
917
|
+
Analytic 0595
|
|
918
|
+
Analytic 0656
|
|
919
|
+
Analytic 1063
|
|
920
|
+
Analytic 1079
|
|
921
|
+
Analytic 1503
|
|
922
|
+
Analytic 0036
|
|
923
|
+
Analytic 0856
|
|
924
|
+
Analytic 0736
|
|
925
|
+
Analytic 0296
|
|
926
|
+
Analytic 1531
|
|
927
|
+
Analytic 1115
|
|
928
|
+
Analytic 0530
|
|
929
|
+
Analytic 1365
|
|
930
|
+
Analytic 0008
|
|
931
|
+
Analytic 1488
|
|
932
|
+
Analytic 1473
|
|
933
|
+
Analytic 0867
|
|
934
|
+
Analytic 1061
|
|
935
|
+
Analytic 0679
|
|
936
|
+
Analytic 0809
|
|
937
|
+
Analytic 0771
|
|
938
|
+
Analytic 1209
|
|
939
|
+
Analytic 0478
|
|
940
|
+
Analytic 1251
|
|
941
|
+
Analytic 0447
|
|
942
|
+
Analytic 1007
|
|
943
|
+
Analytic 0075
|
|
944
|
+
Analytic 0032
|
|
945
|
+
Analytic 0121
|
|
946
|
+
Analytic 1339
|
|
947
|
+
Analytic 0437
|
|
948
|
+
Analytic 1987
|
|
949
|
+
Analytic 0699
|
|
950
|
+
Analytic 1187
|
|
951
|
+
Analytic 1291
|
|
952
|
+
Analytic 0917
|
|
953
|
+
Analytic 0797
|
|
954
|
+
Analytic 0224
|
|
955
|
+
Analytic 0834
|
|
956
|
+
Analytic 1427
|
|
957
|
+
Analytic 1976
|
|
958
|
+
Analytic 1619
|
|
959
|
+
Analytic 1247
|
|
960
|
+
Analytic 1132
|
|
961
|
+
Analytic 0817
|
|
962
|
+
Analytic 0145
|
|
963
|
+
Analytic 0308
|
|
964
|
+
Analytic 0211
|
|
965
|
+
Analytic 1037
|
|
966
|
+
Analytic 1023
|
|
967
|
+
Analytic 1448
|
|
968
|
+
Analytic 1090
|
|
969
|
+
Analytic 0997
|
|
970
|
+
Analytic 1143
|
|
971
|
+
Analytic 0775
|
|
972
|
+
Analytic 0928
|
|
973
|
+
Analytic 1965
|
|
974
|
+
Analytic 1244
|
|
975
|
+
Analytic 1253
|
|
976
|
+
Analytic 1089
|
|
977
|
+
Analytic 0256
|
|
978
|
+
Analytic 1628
|
|
979
|
+
Analytic 2030
|
|
980
|
+
Analytic 0142
|
|
981
|
+
Analytic 0192
|
|
982
|
+
Analytic 0184
|
|
983
|
+
Analytic 0046
|
|
984
|
+
Analytic 1211
|
|
985
|
+
Analytic 0732
|
|
986
|
+
Analytic 1074
|
|
987
|
+
Analytic 0459
|
|
988
|
+
Analytic 1165
|
|
989
|
+
Analytic 0496
|
|
990
|
+
Analytic 0892
|
|
991
|
+
Analytic 0134
|
|
992
|
+
Analytic 0871
|
|
993
|
+
Analytic 0147
|
|
994
|
+
Analytic 0244
|
|
995
|
+
Analytic 1204
|
|
996
|
+
Analytic 1357
|
|
997
|
+
Analytic 1566
|
|
998
|
+
Analytic 0925
|
|
999
|
+
Analytic 1995
|
|
1000
|
+
Analytic 0872
|
|
1001
|
+
Analytic 0969
|
|
1002
|
+
Analytic 0197
|
|
1003
|
+
Analytic 0665
|
|
1004
|
+
Analytic 0239
|
|
1005
|
+
Analytic 1229
|
|
1006
|
+
Analytic 0034
|
|
1007
|
+
Analytic 0266
|
|
1008
|
+
Analytic 0467
|
|
1009
|
+
Analytic 1156
|
|
1010
|
+
Analytic 1434
|
|
1011
|
+
Analytic 1567
|
|
1012
|
+
Analytic 0023
|
|
1013
|
+
Analytic 1460
|
|
1014
|
+
Analytic 0868
|
|
1015
|
+
Analytic 0312
|
|
1016
|
+
Analytic 0791
|
|
1017
|
+
Analytic 1499
|
|
1018
|
+
Analytic 1093
|
|
1019
|
+
Analytic 1179
|
|
1020
|
+
Analytic 0027
|
|
1021
|
+
Analytic 0805
|
|
1022
|
+
Analytic 2006
|
|
1023
|
+
Analytic 0209
|
|
1024
|
+
Analytic 1207
|
|
1025
|
+
Analytic 1176
|
|
1026
|
+
Analytic 1960
|
|
1027
|
+
Analytic 1621
|
|
1028
|
+
Analytic 0884
|
|
1029
|
+
Analytic 0103
|
|
1030
|
+
Analytic 0396
|
|
1031
|
+
Analytic 0466
|
|
1032
|
+
Analytic 0904
|
|
1033
|
+
Analytic 0081
|
|
1034
|
+
Analytic 0602
|
|
1035
|
+
Analytic 0549
|
|
1036
|
+
Analytic 1119
|
|
1037
|
+
Analytic 0130
|
|
1038
|
+
Analytic 1125
|
|
1039
|
+
Analytic 1134
|
|
1040
|
+
Analytic 0975
|
|
1041
|
+
Analytic 0410
|
|
1042
|
+
Analytic 0982
|
|
1043
|
+
Analytic 1193
|
|
1044
|
+
Analytic 0203
|
|
1045
|
+
Analytic 0372
|
|
1046
|
+
Analytic 1020
|
|
1047
|
+
Analytic 0178
|
|
1048
|
+
Analytic 1085
|
|
1049
|
+
Analytic 0841
|
|
1050
|
+
Analytic 0458
|
|
1051
|
+
Analytic 0794
|
|
1052
|
+
Analytic 0959
|
|
1053
|
+
Analytic 0004
|
|
1054
|
+
Analytic 1420
|
|
1055
|
+
Analytic 0934
|
|
1056
|
+
Analytic 1525
|
|
1057
|
+
Analytic 0705
|
|
1058
|
+
Analytic 0837
|
|
1059
|
+
Analytic 1094
|
|
1060
|
+
Analytic 0164
|
|
1061
|
+
Analytic 0284
|
|
1062
|
+
Analytic 1522
|
|
1063
|
+
Analytic 1216
|
|
1064
|
+
Analytic 1017
|
|
1065
|
+
Analytic 0676
|
|
1066
|
+
Analytic 0195
|
|
1067
|
+
Analytic 1006
|
|
1068
|
+
Analytic 0367
|
|
1069
|
+
Analytic 0765
|
|
1070
|
+
Analytic 1435
|
|
1071
|
+
Analytic 1455
|
|
1072
|
+
Analytic 0045
|
|
1073
|
+
Analytic 1170
|
|
1074
|
+
Analytic 0568
|
|
1075
|
+
Analytic 0219
|
|
1076
|
+
Analytic 0394
|
|
1077
|
+
Analytic 2026
|
|
1078
|
+
Analytic 1031
|
|
1079
|
+
Analytic 1514
|
|
1080
|
+
Analytic 0329
|
|
1081
|
+
Analytic 1437
|
|
1082
|
+
Analytic 0855
|
|
1083
|
+
Analytic 0223
|
|
1084
|
+
Analytic 0782
|
|
1085
|
+
Analytic 0963
|
|
1086
|
+
Analytic 1641
|
|
1087
|
+
Analytic 1417
|
|
1088
|
+
Analytic 0731
|
|
1089
|
+
Analytic 0833
|
|
1090
|
+
Analytic 1595
|
|
1091
|
+
Analytic 0652
|
|
1092
|
+
Analytic 1940
|
|
1093
|
+
Analytic 1356
|
|
1094
|
+
Analytic 0342
|
|
1095
|
+
Analytic 1129
|
|
1096
|
+
Analytic 0236
|
|
1097
|
+
Analytic 0107
|
|
1098
|
+
Analytic 0688
|
|
1099
|
+
Analytic 1468
|
|
1100
|
+
Analytic 1215
|
|
1101
|
+
Analytic 1158
|
|
1102
|
+
Analytic 0537
|
|
1103
|
+
Analytic 0377
|
|
1104
|
+
Analytic 1623
|
|
1105
|
+
Analytic 1969
|
|
1106
|
+
Analytic 1269
|
|
1107
|
+
Analytic 0348
|
|
1108
|
+
Analytic 0057
|
|
1109
|
+
Analytic 1640
|
|
1110
|
+
Analytic 1036
|
|
1111
|
+
Analytic 1066
|
|
1112
|
+
Analytic 1629
|
|
1113
|
+
Analytic 1611
|
|
1114
|
+
Analytic 1554
|
|
1115
|
+
Analytic 0716
|
|
1116
|
+
Analytic 1526
|
|
1117
|
+
Analytic 1360
|
|
1118
|
+
Analytic 1064
|
|
1119
|
+
Analytic 0150
|
|
1120
|
+
Analytic 0596
|
|
1121
|
+
Analytic 0101
|
|
1122
|
+
Analytic 0079
|
|
1123
|
+
Analytic 1281
|
|
1124
|
+
Analytic 1008
|
|
1125
|
+
Analytic 1555
|
|
1126
|
+
Analytic 0521
|
|
1127
|
+
Analytic 1305
|
|
1128
|
+
Analytic 1971
|
|
1129
|
+
Analytic 0409
|
|
1130
|
+
Analytic 1396
|
|
1131
|
+
Analytic 0386
|
|
1132
|
+
Analytic 0605
|
|
1133
|
+
Analytic 0378
|
|
1134
|
+
Analytic 1326
|
|
1135
|
+
Analytic 0291
|
|
1136
|
+
Analytic 1478
|
|
1137
|
+
Analytic 0980
|
|
1138
|
+
Analytic 1416
|
|
1139
|
+
Analytic 0958
|
|
1140
|
+
Analytic 0941
|
|
1141
|
+
Analytic 1183
|
|
1142
|
+
Analytic 1565
|
|
1143
|
+
Analytic 0698
|
|
1144
|
+
Analytic 0795
|
|
1145
|
+
Analytic 0263
|
|
1146
|
+
Analytic 1333
|
|
1147
|
+
Analytic 1592
|
|
1148
|
+
Analytic 0842
|
|
1149
|
+
Analytic 0500
|
|
1150
|
+
Analytic 1948
|
|
1151
|
+
Analytic 1025
|
|
1152
|
+
Analytic 0557
|
|
1153
|
+
Analytic 1106
|
|
1154
|
+
Analytic 2007
|
|
1155
|
+
Analytic 1268
|
|
1156
|
+
Analytic 0968
|
|
1157
|
+
Analytic 1027
|
|
1158
|
+
Analytic 1944
|
|
1159
|
+
Analytic 1021
|
|
1160
|
+
Analytic 0838
|
|
1161
|
+
Analytic 0609
|
|
1162
|
+
Analytic 1614
|
|
1163
|
+
Analytic 0517
|
|
1164
|
+
Analytic 1963
|
|
1165
|
+
Analytic 1265
|
|
1166
|
+
Analytic 0796
|
|
1167
|
+
Analytic 0432
|
|
1168
|
+
Analytic 0879
|
|
1169
|
+
Analytic 1051
|
|
1170
|
+
Analytic 0322
|
|
1171
|
+
Analytic 0735
|
|
1172
|
+
Analytic 1418
|
|
1173
|
+
Analytic 1224
|
|
1174
|
+
Analytic 1138
|
|
1175
|
+
Analytic 0822
|
|
1176
|
+
Analytic 1154
|
|
1177
|
+
Analytic 0227
|
|
1178
|
+
Analytic 0486
|
|
1179
|
+
Analytic 0100
|
|
1180
|
+
Analytic 0727
|
|
1181
|
+
Analytic 0672
|
|
1182
|
+
Analytic 1249
|
|
1183
|
+
Analytic 1497
|
|
1184
|
+
Analytic 1058
|
|
1185
|
+
Analytic 1407
|
|
1186
|
+
Analytic 0196
|
|
1187
|
+
Analytic 0988
|
|
1188
|
+
Analytic 1048
|
|
1189
|
+
Analytic 1059
|
|
1190
|
+
Analytic 0650
|
|
1191
|
+
Analytic 0531
|
|
1192
|
+
Analytic 1245
|
|
1193
|
+
Analytic 0351
|
|
1194
|
+
Analytic 0763
|
|
1195
|
+
Analytic 2032
|
|
1196
|
+
Analytic 0190
|
|
1197
|
+
Analytic 1465
|
|
1198
|
+
Analytic 2004
|
|
1199
|
+
Analytic 0889
|
|
1200
|
+
Analytic 1556
|
|
1201
|
+
Analytic 1422
|
|
1202
|
+
Analytic 0070
|
|
1203
|
+
Analytic 1084
|
|
1204
|
+
Analytic 0913
|
|
1205
|
+
Analytic 1030
|
|
1206
|
+
Analytic 1337
|
|
1207
|
+
Analytic 0397
|
|
1208
|
+
Analytic 0632
|
|
1209
|
+
Analytic 1200
|
|
1210
|
+
Analytic 0304
|
|
1211
|
+
Analytic 0451
|
|
1212
|
+
Analytic 1385
|
|
1213
|
+
Analytic 0337
|
|
1214
|
+
Analytic 0473
|
|
1215
|
+
Analytic 1201
|
|
1216
|
+
Analytic 0540
|
|
1217
|
+
Analytic 1308
|
|
1218
|
+
Analytic 0571
|
|
1219
|
+
Analytic 1146
|
|
1220
|
+
Analytic 0999
|
|
1221
|
+
Analytic 0493
|
|
1222
|
+
Analytic 0514
|
|
1223
|
+
Analytic 0512
|
|
1224
|
+
Analytic 0433
|
|
1225
|
+
Analytic 0626
|
|
1226
|
+
Analytic 0163
|
|
1227
|
+
Analytic 1449
|
|
1228
|
+
Analytic 2005
|
|
1229
|
+
Analytic 1107
|
|
1230
|
+
Analytic 0522
|
|
1231
|
+
Analytic 0758
|
|
1232
|
+
Analytic 0851
|
|
1233
|
+
Analytic 1533
|
|
1234
|
+
Analytic 0939
|
|
1235
|
+
Analytic 1537
|
|
1236
|
+
Analytic 1312
|
|
1237
|
+
Analytic 0083
|
|
1238
|
+
Analytic 1287
|
|
1239
|
+
Analytic 0484
|
|
1240
|
+
Analytic 0545
|
|
1241
|
+
Analytic 0873
|
|
1242
|
+
Analytic 1552
|
|
1243
|
+
Analytic 0584
|
|
1244
|
+
Analytic 0877
|
|
1245
|
+
Analytic 1351
|
|
1246
|
+
Analytic 0042
|
|
1247
|
+
Analytic 0501
|
|
1248
|
+
Analytic 0112
|
|
1249
|
+
Analytic 0356
|
|
1250
|
+
Analytic 1114
|
|
1251
|
+
Analytic 1009
|
|
1252
|
+
Analytic 0314
|
|
1253
|
+
Analytic 1174
|
|
1254
|
+
Analytic 0664
|
|
1255
|
+
Analytic 0819
|
|
1256
|
+
Analytic 0202
|
|
1257
|
+
Analytic 0499
|
|
1258
|
+
Analytic 1214
|
|
1259
|
+
Analytic 0015
|
|
1260
|
+
Analytic 0330
|
|
1261
|
+
Analytic 0407
|
|
1262
|
+
Analytic 0013
|
|
1263
|
+
Analytic 0259
|
|
1264
|
+
Analytic 1399
|
|
1265
|
+
Analytic 0544
|
|
1266
|
+
Analytic 1604
|
|
1267
|
+
Analytic 1026
|
|
1268
|
+
Analytic 0814
|
|
1269
|
+
Analytic 0827
|
|
1270
|
+
Analytic 0686
|
|
1271
|
+
Analytic 0750
|
|
1272
|
+
Analytic 0518
|
|
1273
|
+
Analytic 0770
|
|
1274
|
+
Analytic 0710
|
|
1275
|
+
Analytic 1272
|
|
1276
|
+
Analytic 0149
|
|
1277
|
+
Analytic 0039
|
|
1278
|
+
Analytic 0498
|
|
1279
|
+
Analytic 1517
|
|
1280
|
+
Analytic 1485
|
|
1281
|
+
Analytic 0082
|
|
1282
|
+
Analytic 1246
|
|
1283
|
+
Analytic 1166
|
|
1284
|
+
Analytic 0090
|
|
1285
|
+
Analytic 0141
|
|
1286
|
+
Analytic 0069
|
|
1287
|
+
Analytic 1162
|
|
1288
|
+
Analytic 0956
|
|
1289
|
+
Analytic 0294
|
|
1290
|
+
Analytic 1338
|
|
1291
|
+
Analytic 1570
|
|
1292
|
+
Analytic 0439
|
|
1293
|
+
Analytic 1501
|
|
1294
|
+
Analytic 0371
|
|
1295
|
+
Analytic 0078
|
|
1296
|
+
Analytic 0966
|
|
1297
|
+
Analytic 1203
|
|
1298
|
+
Analytic 1580
|
|
1299
|
+
Analytic 0408
|
|
1300
|
+
Analytic 0049
|
|
1301
|
+
Analytic 1352
|
|
1302
|
+
Analytic 1002
|
|
1303
|
+
Analytic 1217
|
|
1304
|
+
Analytic 1319
|
|
1305
|
+
Analytic 0477
|
|
1306
|
+
Analytic 0844
|
|
1307
|
+
Analytic 0623
|
|
1308
|
+
Analytic 0547
|
|
1309
|
+
Analytic 1494
|
|
1310
|
+
Analytic 1610
|
|
1311
|
+
Analytic 1317
|
|
1312
|
+
Analytic 0170
|
|
1313
|
+
Analytic 0620
|
|
1314
|
+
Analytic 0938
|
|
1315
|
+
Analytic 0059
|
|
1316
|
+
Analytic 0132
|
|
1317
|
+
Analytic 1429
|
|
1318
|
+
Analytic 0604
|
|
1319
|
+
Analytic 0313
|
|
1320
|
+
Analytic 1937
|
|
1321
|
+
Analytic 1442
|
|
1322
|
+
Analytic 1364
|
|
1323
|
+
Analytic 0216
|
|
1324
|
+
Analytic 0067
|
|
1325
|
+
Analytic 0418
|
|
1326
|
+
Analytic 1103
|
|
1327
|
+
Analytic 1381
|
|
1328
|
+
Analytic 0824
|
|
1329
|
+
Analytic 1952
|
|
1330
|
+
Analytic 1088
|
|
1331
|
+
Analytic 0429
|
|
1332
|
+
Analytic 0362
|
|
1333
|
+
Analytic 0399
|
|
1334
|
+
Analytic 1157
|
|
1335
|
+
Analytic 0228
|
|
1336
|
+
Analytic 1500
|
|
1337
|
+
Analytic 1186
|
|
1338
|
+
Analytic 1378
|
|
1339
|
+
Analytic 1065
|
|
1340
|
+
Analytic 0030
|
|
1341
|
+
Analytic 0678
|
|
1342
|
+
Analytic 0171
|
|
1343
|
+
Analytic 0807
|
|
1344
|
+
Analytic 0003
|
|
1345
|
+
Analytic 1992
|
|
1346
|
+
Analytic 0542
|
|
1347
|
+
Analytic 0733
|
|
1348
|
+
Analytic 1300
|
|
1349
|
+
Analytic 0494
|
|
1350
|
+
Analytic 1359
|
|
1351
|
+
Analytic 1213
|
|
1352
|
+
Analytic 0395
|
|
1353
|
+
Analytic 0180
|
|
1354
|
+
Analytic 1151
|
|
1355
|
+
Analytic 1404
|
|
1356
|
+
Analytic 1457
|
|
1357
|
+
Analytic 1121
|
|
1358
|
+
Analytic 0757
|
|
1359
|
+
Analytic 0972
|
|
1360
|
+
Analytic 2012
|
|
1361
|
+
Analytic 0124
|
|
1362
|
+
Analytic 0128
|
|
1363
|
+
Analytic 0315
|
|
1364
|
+
Analytic 0567
|
|
1365
|
+
Analytic 1959
|
|
1366
|
+
Analytic 0556
|
|
1367
|
+
Analytic 0900
|
|
1368
|
+
Analytic 1042
|
|
1369
|
+
Analytic 1123
|
|
1370
|
+
Analytic 0208
|
|
1371
|
+
Analytic 0708
|
|
1372
|
+
Analytic 1052
|
|
1373
|
+
Analytic 0381
|
|
1374
|
+
Analytic 0776
|
|
1375
|
+
Analytic 1991
|
|
1376
|
+
Analytic 1410
|
|
1377
|
+
Analytic 0526
|
|
1378
|
+
Analytic 1195
|
|
1379
|
+
Analytic 2008
|
|
1380
|
+
Analytic 1966
|
|
1381
|
+
Analytic 1254
|
|
1382
|
+
Analytic 0520
|
|
1383
|
+
Analytic 1208
|
|
1384
|
+
Analytic 1289
|
|
1385
|
+
Analytic 0577
|
|
1386
|
+
Analytic 0572
|
|
1387
|
+
Analytic 1142
|
|
1388
|
+
Analytic 1636
|
|
1389
|
+
Analytic 1490
|
|
1390
|
+
Analytic 1237
|
|
1391
|
+
Analytic 1415
|
|
1392
|
+
Analytic 1344
|
|
1393
|
+
Analytic 0985
|
|
1394
|
+
Analytic 0191
|
|
1395
|
+
Analytic 0587
|
|
1396
|
+
Analytic 1256
|
|
1397
|
+
Analytic 1325
|
|
1398
|
+
Analytic 1626
|
|
1399
|
+
Analytic 1349
|
|
1400
|
+
Analytic 0155
|
|
1401
|
+
Analytic 0539
|
|
1402
|
+
Analytic 1355
|
|
1403
|
+
Analytic 0306
|
|
1404
|
+
Analytic 0553
|
|
1405
|
+
Analytic 1970
|
|
1406
|
+
Analytic 0250
|
|
1407
|
+
Analytic 0085
|
|
1408
|
+
Analytic 1450
|
|
1409
|
+
Analytic 0965
|
|
1410
|
+
Analytic 1221
|
|
1411
|
+
Analytic 1155
|
|
1412
|
+
Analytic 1583
|
|
1413
|
+
Analytic 1301
|
|
1414
|
+
Analytic 1430
|
|
1415
|
+
Analytic 0038
|
|
1416
|
+
Analytic 1113
|
|
1417
|
+
Analytic 1267
|
|
1418
|
+
Analytic 0799
|
|
1419
|
+
Analytic 0374
|
|
1420
|
+
Analytic 0444
|
|
1421
|
+
Analytic 1152
|
|
1422
|
+
Analytic 1569
|
|
1423
|
+
Analytic 0280
|
|
1424
|
+
Analytic 0440
|
|
1425
|
+
Analytic 1949
|
|
1426
|
+
Analytic 1979
|
|
1427
|
+
Analytic 0597
|
|
1428
|
+
Analytic 0364
|
|
1429
|
+
Analytic 1126
|
|
1430
|
+
Analytic 0747
|
|
1431
|
+
Analytic 0691
|
|
1432
|
+
Analytic 0878
|
|
1433
|
+
Analytic 0694
|
|
1434
|
+
Analytic 0031
|
|
1435
|
+
Analytic 0702
|
|
1436
|
+
Analytic 0911
|
|
1437
|
+
Analytic 0354
|
|
1438
|
+
Analytic 0701
|
|
1439
|
+
Analytic 0193
|
|
1440
|
+
Analytic 1014
|
|
1441
|
+
Analytic 1986
|
|
1442
|
+
Analytic 1549
|
|
1443
|
+
Analytic 0343
|
|
1444
|
+
Analytic 0636
|
|
1445
|
+
Analytic 1994
|
|
1446
|
+
Analytic 1235
|
|
1447
|
+
Analytic 1389
|
|
1448
|
+
Analytic 0787
|
|
1449
|
+
Analytic 0091
|
|
1450
|
+
Analytic 0953
|
|
1451
|
+
Analytic 1330
|
|
1452
|
+
Analytic 0749
|
|
1453
|
+
Analytic 1956
|
|
1454
|
+
Analytic 0108
|
|
1455
|
+
Analytic 1309
|
|
1456
|
+
Analytic 1292
|
|
1457
|
+
Analytic 1321
|
|
1458
|
+
Analytic 0973
|
|
1459
|
+
Analytic 1071
|
|
1460
|
+
Analytic 0457
|
|
1461
|
+
Analytic 0237
|
|
1462
|
+
Analytic 0703
|
|
1463
|
+
Analytic 0403
|
|
1464
|
+
Analytic 1572
|
|
1465
|
+
Analytic 0629
|
|
1466
|
+
Analytic 0785
|
|
1467
|
+
Analytic 2002
|
|
1468
|
+
Analytic 0324
|
|
1469
|
+
Analytic 1320
|
|
1470
|
+
Analytic 0136
|
|
1471
|
+
Analytic 0054
|
|
1472
|
+
Analytic 1538
|
|
1473
|
+
Analytic 0056
|
|
1474
|
+
Analytic 1521
|
|
1475
|
+
Analytic 1578
|
|
1476
|
+
Analytic 1083
|
|
1477
|
+
Analytic 1411
|
|
1478
|
+
Analytic 0402
|
|
1479
|
+
Analytic 1523
|
|
1480
|
+
Analytic 1431
|
|
1481
|
+
Analytic 1573
|
|
1482
|
+
Analytic 0828
|
|
1483
|
+
Analytic 0902
|
|
1484
|
+
Analytic 1548
|
|
1485
|
+
Analytic 0639
|
|
1486
|
+
Analytic 1034
|
|
1487
|
+
Analytic 1401
|
|
1488
|
+
Analytic 0680
|
|
1489
|
+
Analytic 0697
|
|
1490
|
+
Analytic 1452
|
|
1491
|
+
Analytic 0996
|
|
1492
|
+
Analytic 1000
|
|
1493
|
+
Analytic 0783
|
|
1494
|
+
Analytic 1529
|
|
1495
|
+
Analytic 1466
|
|
1496
|
+
Analytic 0272
|
|
1497
|
+
Analytic 0630
|
|
1498
|
+
Analytic 0127
|
|
1499
|
+
Analytic 0936
|
|
1500
|
+
Analytic 1510
|
|
1501
|
+
Analytic 0158
|
|
1502
|
+
Analytic 0253
|
|
1503
|
+
Analytic 0724
|
|
1504
|
+
Analytic 1322
|
|
1505
|
+
Analytic 0167
|
|
1506
|
+
Analytic 2000
|
|
1507
|
+
Analytic 1982
|
|
1508
|
+
Analytic 0508
|
|
1509
|
+
Analytic 1383
|
|
1510
|
+
Analytic 1199
|
|
1511
|
+
Analytic 1491
|
|
1512
|
+
Analytic 0829
|
|
1513
|
+
Analytic 1560
|
|
1514
|
+
Analytic 1519
|
|
1515
|
+
Analytic 0606
|
|
1516
|
+
Analytic 1953
|
|
1517
|
+
Analytic 0113
|
|
1518
|
+
Analytic 0790
|
|
1519
|
+
Analytic 0865
|
|
1520
|
+
Analytic 0647
|
|
1521
|
+
Analytic 1210
|
|
1522
|
+
Analytic 0174
|
|
1523
|
+
Analytic 0102
|
|
1524
|
+
Analytic 0096
|
|
1525
|
+
Analytic 1117
|
|
1526
|
+
Analytic 0275
|
|
1527
|
+
Analytic 1161
|
|
1528
|
+
Analytic 0214
|
|
1529
|
+
Analytic 1189
|
|
1530
|
+
Analytic 0648
|
|
1531
|
+
Analytic 1181
|
|
1532
|
+
Analytic 0515
|
|
1533
|
+
Analytic 0480
|
|
1534
|
+
Analytic 0325
|
|
1535
|
+
Analytic 0619
|
|
1536
|
+
Analytic 1484
|
|
1537
|
+
Analytic 0475
|
|
1538
|
+
Analytic 0122
|
|
1539
|
+
Analytic 1222
|
|
1540
|
+
Analytic 0213
|
|
1541
|
+
Analytic 0187
|
|
1542
|
+
Analytic 1182
|
|
1543
|
+
Analytic 0443
|
|
1544
|
+
Analytic 0820
|
|
1545
|
+
Analytic 1942
|
|
1546
|
+
Analytic 0268
|
|
1547
|
+
Analytic 0419
|
|
1548
|
+
Analytic 0793
|
|
1549
|
+
Analytic 1588
|
|
1550
|
+
Analytic 0502
|
|
1551
|
+
Analytic 1602
|
|
1552
|
+
Analytic 0254
|
|
1553
|
+
Analytic 0420
|
|
1554
|
+
Analytic 1372
|
|
1555
|
+
Analytic 0690
|
|
1556
|
+
Analytic 0286
|
|
1557
|
+
Analytic 1615
|
|
1558
|
+
Analytic 1060
|
|
1559
|
+
Analytic 0384
|
|
1560
|
+
Analytic 1467
|
|
1561
|
+
Analytic 0413
|
|
1562
|
+
Analytic 1406
|
|
1563
|
+
Analytic 0111
|
|
1564
|
+
Analytic 0151
|
|
1565
|
+
Analytic 1534
|
|
1566
|
+
Analytic 1379
|
|
1567
|
+
Analytic 0993
|
|
1568
|
+
Analytic 0188
|
|
1569
|
+
Analytic 1092
|
|
1570
|
+
Analytic 0347
|
|
1571
|
+
Analytic 1336
|
|
1572
|
+
Analytic 0981
|
|
1573
|
+
Analytic 1506
|
|
1574
|
+
Analytic 0586
|
|
1575
|
+
Analytic 1078
|
|
1576
|
+
Analytic 0874
|
|
1577
|
+
Analytic 0510
|
|
1578
|
+
Analytic 0077
|
|
1579
|
+
Analytic 0234
|
|
1580
|
+
Analytic 1001
|
|
1581
|
+
Analytic 1581
|
|
1582
|
+
Analytic 0578
|
|
1583
|
+
Analytic 0427
|
|
1584
|
+
Analytic 0983
|
|
1585
|
+
Analytic 1400
|
|
1586
|
+
Analytic 1240
|
|
1587
|
+
Analytic 0503
|
|
1588
|
+
Analytic 1520
|
|
1589
|
+
Analytic 0267
|
|
1590
|
+
Analytic 0580
|
|
1591
|
+
Analytic 1609
|
|
1592
|
+
Analytic 0185
|
|
1593
|
+
Analytic 1172
|
|
1594
|
+
Analytic 0139
|
|
1595
|
+
Analytic 0673
|
|
1596
|
+
Analytic 0095
|
|
1597
|
+
Analytic 0784
|
|
1598
|
+
Analytic 1062
|
|
1599
|
+
Analytic 0166
|
|
1600
|
+
Analytic 1019
|
|
1601
|
+
Analytic 0309
|
|
1602
|
+
Analytic 1627
|
|
1603
|
+
Analytic 1004
|
|
1604
|
+
Analytic 0905
|
|
1605
|
+
Analytic 0026
|
|
1606
|
+
Analytic 0978
|
|
1607
|
+
Analytic 0246
|
|
1608
|
+
Analytic 0780
|
|
1609
|
+
Analytic 1180
|
|
1610
|
+
Analytic 0668
|
|
1611
|
+
Analytic 0931
|
|
1612
|
+
Analytic 1472
|
|
1613
|
+
Analytic 1483
|
|
1614
|
+
Analytic 0162
|
|
1615
|
+
Analytic 1981
|
|
1616
|
+
Analytic 0779
|
|
1617
|
+
Analytic 0756
|
|
1618
|
+
Analytic 1553
|
|
1619
|
+
Analytic 1508
|
|
1620
|
+
Analytic 1316
|
|
1621
|
+
Analytic 1955
|
|
1622
|
+
Analytic 1462
|
|
1623
|
+
Analytic 0778
|
|
1624
|
+
Analytic 0210
|
|
1625
|
+
Analytic 0899
|
|
1626
|
+
Analytic 0319
|
|
1627
|
+
Analytic 0541
|
|
1628
|
+
Analytic 1108
|
|
1629
|
+
Analytic 1069
|
|
1630
|
+
Analytic 0160
|
|
1631
|
+
Analytic 1147
|
|
1632
|
+
Analytic 0349
|
|
1633
|
+
Analytic 1622
|
|
1634
|
+
Analytic 0616
|
|
1635
|
+
Analytic 0311
|
|
1636
|
+
Analytic 1574
|
|
1637
|
+
Analytic 1443
|
|
1638
|
+
Analytic 1413
|
|
1639
|
+
Analytic 1258
|
|
1640
|
+
Analytic 2024
|
|
1641
|
+
Analytic 0989
|
|
1642
|
+
Analytic 0358
|
|
1643
|
+
Analytic 0660
|
|
1644
|
+
Analytic 0198
|
|
1645
|
+
Analytic 1040
|
|
1646
|
+
Analytic 0560
|
|
1647
|
+
Analytic 0060
|
|
1648
|
+
Analytic 1477
|
|
1649
|
+
Analytic 1540
|
|
1650
|
+
Analytic 0094
|
|
1651
|
+
Analytic 1498
|
|
1652
|
+
Analytic 1219
|
|
1653
|
+
Analytic 0850
|
|
1654
|
+
Analytic 1335
|
|
1655
|
+
Analytic 1544
|
|
1656
|
+
Analytic 0199
|
|
1657
|
+
Analytic 0285
|
|
1658
|
+
Analytic 1190
|
|
1659
|
+
Analytic 0746
|
|
1660
|
+
Analytic 1033
|
|
1661
|
+
Analytic 1375
|
|
1662
|
+
Analytic 0608
|
|
1663
|
+
Analytic 0920
|
|
1664
|
+
Analytic 0916
|
|
1665
|
+
Analytic 1984
|
|
1666
|
+
Analytic 0248
|
|
1667
|
+
Analytic 0274
|
|
1668
|
+
Analytic 1487
|
|
1669
|
+
Analytic 1438
|
|
1670
|
+
Analytic 0846
|
|
1671
|
+
Analytic 0588
|
|
1672
|
+
Analytic 0400
|
|
1673
|
+
Analytic 1341
|
|
1674
|
+
Analytic 0535
|
|
1675
|
+
Analytic 1997
|
|
1676
|
+
Analytic 0897
|
|
1677
|
+
Analytic 0532
|
|
1678
|
+
Analytic 0944
|
|
1679
|
+
Analytic 0328
|
|
1680
|
+
Analytic 1424
|
|
1681
|
+
Analytic 1951
|
|
1682
|
+
Analytic 1591
|
|
1683
|
+
Analytic 0465
|
|
1684
|
+
Analytic 0225
|
|
1685
|
+
Analytic 1218
|
|
1686
|
+
Analytic 0137
|
|
1687
|
+
Analytic 1145
|
|
1688
|
+
Analytic 1277
|
|
1689
|
+
Analytic 0350
|
|
1690
|
+
Analytic 0093
|
|
1691
|
+
Analytic 0255
|
|
1692
|
+
Analytic 0086
|
|
1693
|
+
Analytic 0368
|
|
1694
|
+
Analytic 0269
|
|
1695
|
+
Analytic 1943
|
|
1696
|
+
Analytic 0554
|
|
1697
|
+
Analytic 0005
|
|
1698
|
+
Analytic 0591
|
|
1699
|
+
Analytic 1299
|
|
1700
|
+
Analytic 0825
|
|
1701
|
+
Analytic 0573
|
|
1702
|
+
Analytic 0281
|
|
1703
|
+
Analytic 0685
|
|
1704
|
+
Analytic 0200
|
|
1705
|
+
Analytic 0154
|
|
1706
|
+
Analytic 0722
|
|
1707
|
+
Analytic 0767
|
|
1708
|
+
Analytic 0316
|
|
1709
|
+
Analytic 2022
|
|
1710
|
+
Analytic 0813
|
|
1711
|
+
Analytic 0416
|
|
1712
|
+
Analytic 1559
|
|
1713
|
+
Analytic 1382
|
|
1714
|
+
Analytic 0288
|
|
1715
|
+
Analytic 0715
|
|
1716
|
+
Analytic 0812
|
|
1717
|
+
Analytic 1482
|
|
1718
|
+
Analytic 1637
|
|
1719
|
+
Analytic 1550
|
|
1720
|
+
Analytic 1290
|
|
1721
|
+
Analytic 0947
|
|
1722
|
+
Analytic 0382
|
|
1723
|
+
Analytic 1447
|
|
1724
|
+
Analytic 0635
|
|
1725
|
+
Analytic 0919
|
|
1726
|
+
Analytic 0471
|
|
1727
|
+
Analytic 1423
|
|
1728
|
+
Analytic 1252
|
|
1729
|
+
Analytic 0720
|
|
1730
|
+
Analytic 0229
|
|
1731
|
+
Analytic 0317
|
|
1732
|
+
Analytic 0411
|
|
1733
|
+
Analytic 0745
|
|
1734
|
+
Analytic 0243
|
|
1735
|
+
Analytic 1607
|
|
1736
|
+
Analytic 1118
|
|
1737
|
+
Analytic 0942
|
|
1738
|
+
Analytic 0910
|
|
1739
|
+
Analytic 0561
|
|
1740
|
+
Analytic 0144
|
|
1741
|
+
Analytic 1070
|
|
1742
|
+
Analytic 0283
|
|
1743
|
+
Analytic 1283
|
|
1744
|
+
Analytic 0682
|
|
1745
|
+
Analytic 1493
|
|
1746
|
+
Analytic 0657
|
|
1747
|
+
Analytic 1463
|
|
1748
|
+
Analytic 1471
|
|
1749
|
+
Analytic 0607
|
|
1750
|
+
Analytic 1492
|
|
1751
|
+
Analytic 1613
|
|
1752
|
+
Analytic 0479
|
|
1753
|
+
Analytic 0692
|
|
1754
|
+
Analytic 0847
|
|
1755
|
+
Analytic 0663
|
|
1756
|
+
Analytic 0485
|
|
1757
|
+
Analytic 1096
|
|
1758
|
+
Analytic 1131
|
|
1759
|
+
Analytic 0843
|
|
1760
|
+
Analytic 0373
|
|
1761
|
+
Analytic 1346
|
|
1762
|
+
Analytic 0895
|
|
1763
|
+
Analytic 0504
|
|
1764
|
+
Analytic 0040
|
|
1765
|
+
Analytic 0109
|
|
1766
|
+
Analytic 0334
|
|
1767
|
+
Analytic 0742
|
|
1768
|
+
Analytic 1255
|
|
1769
|
+
Analytic 0017
|
|
1770
|
+
Analytic 0689
|
|
1771
|
+
Analytic 0492
|
|
1772
|
+
Analytic 1160
|
|
1773
|
+
Analytic 0098
|
|
1774
|
+
Analytic 1496
|
|
1775
|
+
Analytic 0326
|
|
1776
|
+
Analytic 1177
|
|
1777
|
+
Analytic 1331
|
|
1778
|
+
Analytic 1010
|
|
1779
|
+
Analytic 0357
|
|
1780
|
+
Analytic 0428
|
|
1781
|
+
Analytic 0361
|
|
1782
|
+
Analytic 0194
|
|
1783
|
+
Analytic 0293
|
|
1784
|
+
Analytic 1486
|
|
1785
|
+
Analytic 0205
|
|
1786
|
+
Analytic 1369
|
|
1787
|
+
Analytic 0957
|
|
1788
|
+
Analytic 0857
|
|
1789
|
+
Analytic 1459
|
|
1790
|
+
Analytic 0454
|
|
1791
|
+
Analytic 0896
|
|
1792
|
+
Analytic 1551
|
|
1793
|
+
Analytic 0097
|
|
1794
|
+
Analytic 0880
|
|
1795
|
+
Analytic 0761
|
|
1796
|
+
Analytic 1585
|
|
1797
|
+
Analytic 0654
|
|
1798
|
+
Analytic 2018
|
|
1799
|
+
Analytic 0816
|
|
1800
|
+
Analytic 0182
|
|
1801
|
+
Analytic 0759
|
|
1802
|
+
Analytic 0072
|
|
1803
|
+
Analytic 2017
|
|
1804
|
+
Analytic 0687
|
|
1805
|
+
Analytic 0218
|
|
1806
|
+
Analytic 0287
|
|
1807
|
+
Analytic 1511
|
|
1808
|
+
Analytic 0548
|
|
1809
|
+
Analytic 0186
|
|
1810
|
+
Analytic 0115
|
|
1811
|
+
Analytic 0614
|
|
1812
|
+
Analytic 1968
|
|
1813
|
+
Analytic 1329
|
|
1814
|
+
Analytic 0450
|
|
1815
|
+
Analytic 1273
|
|
1816
|
+
Analytic 0627
|
|
1817
|
+
Analytic 0649
|
|
1818
|
+
Analytic 0426
|
|
1819
|
+
Analytic 1446
|
|
1820
|
+
Analytic 1297
|
|
1821
|
+
Analytic 0422
|
|
1822
|
+
Analytic 1120
|
|
1823
|
+
Analytic 0992
|
|
1824
|
+
Analytic 0412
|
|
1825
|
+
Analytic 0114
|
|
1826
|
+
Analytic 0231
|
|
1827
|
+
Analytic 1057
|
|
1828
|
+
Analytic 0265
|
|
1829
|
+
Analytic 0126
|
|
1830
|
+
Analytic 1288
|
|
1831
|
+
Analytic 0558
|
|
1832
|
+
Analytic 1476
|
|
1833
|
+
Analytic 1454
|
|
1834
|
+
Analytic 1436
|
|
1835
|
+
Analytic 0773
|
|
1836
|
+
Analytic 0006
|
|
1837
|
+
Analytic 1967
|
|
1838
|
+
Analytic 0345
|
|
1839
|
+
Analytic 1599
|
|
1840
|
+
Analytic 0552
|
|
1841
|
+
Analytic 0226
|
|
1842
|
+
Analytic 1168
|
|
1843
|
+
Analytic 0482
|
|
1844
|
+
Analytic 2013
|
|
1845
|
+
Analytic 0864
|
|
1846
|
+
Analytic 0575
|
|
1847
|
+
Analytic 0441
|
|
1848
|
+
Analytic 0063
|
|
1849
|
+
Analytic 1481
|
|
1850
|
+
Analytic 1055
|
|
1851
|
+
Analytic 1950
|
|
1852
|
+
Analytic 0393
|
|
1853
|
+
Analytic 1586
|
|
1854
|
+
Analytic 0143
|
|
1855
|
+
Analytic 1941
|
|
1856
|
+
Analytic 1635
|
|
1857
|
+
Analytic 0951
|
|
1858
|
+
Analytic 0675
|
|
1859
|
+
Analytic 1194
|
|
1860
|
+
Analytic 1386
|
|
1861
|
+
Analytic 0589
|
|
1862
|
+
Analytic 0832
|
|
1863
|
+
Analytic 0340
|
|
1864
|
+
Analytic 0389
|
|
1865
|
+
Analytic 1332
|
|
1866
|
+
Analytic 0513
|
|
1867
|
+
Analytic 0754
|
|
1868
|
+
Analytic 1512
|
|
1869
|
+
Analytic 1989
|
|
1870
|
+
Analytic 0806
|
|
1871
|
+
Analytic 0628
|
|
1872
|
+
Analytic 2003
|
|
1873
|
+
Analytic 0230
|
|
1874
|
+
Analytic 1035
|
|
1875
|
+
Analytic 0489
|
|
1876
|
+
Analytic 0264
|
|
1877
|
+
Analytic 1077
|
|
1878
|
+
Analytic 0401
|
|
1879
|
+
Analytic 0235
|
|
1880
|
+
Analytic 0962
|
|
1881
|
+
Analytic 0260
|
|
1882
|
+
Analytic 0743
|
|
1883
|
+
Analytic 1307
|
|
1884
|
+
Analytic 0601
|
|
1885
|
+
Analytic 0201
|
|
1886
|
+
Analytic 1280
|
|
1887
|
+
Analytic 0181
|
|
1888
|
+
Analytic 1271
|
|
1889
|
+
Analytic 0370
|
|
1890
|
+
Analytic 0802
|
|
1891
|
+
Analytic 0744
|
|
1892
|
+
Analytic 1479
|
|
1893
|
+
Analytic 1558
|
|
1894
|
+
Analytic 0363
|
|
1895
|
+
Analytic 1327
|
|
1896
|
+
Analytic 0599
|
|
1897
|
+
Analytic 0707
|
|
1898
|
+
Analytic 0387
|
|
1899
|
+
Analytic 0921
|
|
1900
|
+
Analytic 0051
|
|
1901
|
+
Analytic 1192
|
|
1902
|
+
Analytic 0505
|
|
1903
|
+
Analytic 0346
|
|
1904
|
+
Analytic 1225
|
|
1905
|
+
Analytic 0976
|
|
1906
|
+
Analytic 0748
|
|
1907
|
+
Analytic 0366
|
|
1908
|
+
Analytic 0908
|
|
1909
|
+
Analytic 0960
|
|
1910
|
+
Analytic 1405
|
|
1911
|
+
Analytic 1557
|
|
1912
|
+
Analytic 0468
|
|
1913
|
+
Analytic 2025
|
|
1914
|
+
Analytic 1603
|
|
1915
|
+
Analytic 1489
|
|
1916
|
+
Analytic 0594
|
|
1917
|
+
Analytic 0669
|
|
1918
|
+
Analytic 0025
|
|
1919
|
+
Analytic 1983
|
|
1920
|
+
Analytic 1148
|
|
1921
|
+
Analytic 0241
|
|
1922
|
+
Analytic 0421
|
|
1923
|
+
Analytic 1642
|
|
1924
|
+
Analytic 0024
|
|
1925
|
+
Analytic 1248
|
|
1926
|
+
Analytic 0667
|
|
1927
|
+
Analytic 0156
|
|
1928
|
+
Analytic 0979
|
|
1929
|
+
Analytic 1050
|
|
1930
|
+
Analytic 0625
|
|
1931
|
+
Analytic 0404
|
|
1932
|
+
Analytic 1263
|
|
1933
|
+
Analytic 0592
|
|
1934
|
+
Analytic 0804
|
|
1935
|
+
Analytic 0529
|
|
1936
|
+
Analytic 1475
|
|
1937
|
+
Analytic 0644
|
|
1938
|
+
Analytic 2027
|
|
1939
|
+
Analytic 1286
|
|
1940
|
+
Analytic 0998
|
|
1941
|
+
Analytic 0723
|
|
1942
|
+
Analytic 1067
|
|
1943
|
+
Analytic 1985
|
|
1944
|
+
Analytic 0543
|
|
1945
|
+
Analytic 1978
|
|
1946
|
+
Analytic 1368
|
|
1947
|
+
Analytic 0028
|
|
1948
|
+
Analytic 2010
|
|
1949
|
+
Analytic 1226
|
|
1950
|
+
Analytic 1631
|
|
1951
|
+
Analytic 0436
|
|
1952
|
+
Analytic 0945
|
|
1953
|
+
Analytic 0462
|
|
1954
|
+
Analytic 0700
|
|
1955
|
+
Analytic 0729
|
|
1956
|
+
Analytic 0658
|
|
1957
|
+
Analytic 0738
|
|
1958
|
+
Analytic 0434
|
|
1959
|
+
Analytic 0922
|
|
1960
|
+
Analytic 1408
|
|
1961
|
+
Analytic 1039
|
|
1962
|
+
Analytic 0923
|
|
1963
|
+
Analytic 0483
|
|
1964
|
+
Analytic 1575
|
|
1965
|
+
Analytic 1632
|
|
1966
|
+
Analytic 1576
|
|
1967
|
+
Analytic 1412
|
|
1968
|
+
Analytic 0138
|
|
1969
|
+
Analytic 0950
|
|
1970
|
+
Analytic 1403
|
|
1971
|
+
Analytic 1137
|
|
1972
|
+
Analytic 0859
|
|
1973
|
+
Analytic 1173
|
|
1974
|
+
Analytic 1542
|
|
1975
|
+
Analytic 1639
|
|
1976
|
+
Analytic 0940
|
|
1977
|
+
Analytic 0617
|
|
1978
|
+
Analytic 1150
|
|
1979
|
+
Analytic 1954
|
|
1980
|
+
Analytic 1605
|
|
1981
|
+
Analytic 0050
|
|
1982
|
+
Analytic 0618
|
|
1983
|
+
Analytic 1313
|
|
1984
|
+
Analytic 1432
|
|
1985
|
+
Analytic 0157
|
|
1986
|
+
Analytic 0064
|
|
1987
|
+
Analytic 1109
|
|
1988
|
+
Analytic 0022
|
|
1989
|
+
Analytic 1371
|
|
1990
|
+
Analytic 1171
|
|
1991
|
+
Analytic 0415
|
|
1992
|
+
Analytic 0633
|
|
1993
|
+
Analytic 2019
|
|
1994
|
+
Analytic 0088
|
|
1995
|
+
Analytic 2023
|
|
1996
|
+
Analytic 0021
|
|
1997
|
+
Analytic 0431
|
|
1998
|
+
Analytic 0576
|
|
1999
|
+
Analytic 0615
|
|
2000
|
+
Analytic 1303
|
|
2001
|
+
Analytic 0536
|
|
2002
|
+
Analytic 1298
|
|
2003
|
+
Analytic 1972
|
|
2004
|
+
Analytic 1425
|
|
2005
|
+
Analytic 1095
|
|
2006
|
+
Analytic 0258
|
|
2007
|
+
Analytic 1130
|
|
2008
|
+
Analytic 0551
|
|
2009
|
+
Analytic 0376
|
|
2010
|
+
Analytic 0810
|
|
2011
|
+
Analytic 0474
|
|
2012
|
+
Analytic 1279
|
|
2013
|
+
Analytic 1102
|
|
2014
|
+
Analytic 0435
|
|
2015
|
+
Analytic 1414
|
|
2016
|
+
Analytic 1212
|
|
2017
|
+
Analytic 1260
|
|
2018
|
+
Analytic 0380
|
|
2019
|
+
Analytic 0273
|
|
2020
|
+
Analytic 0751
|
|
2021
|
+
Analytic 0298
|
|
2022
|
+
Analytic 1005
|
|
2023
|
+
Analytic 1387
|
|
2024
|
+
Analytic 1296
|
|
2025
|
+
Analytic 1072
|
|
2026
|
+
Analytic 0220
|
|
2027
|
+
Analytic 1377
|
|
2028
|
+
Analytic 0772
|
|
2029
|
+
Analytic 0058
|
|
2030
|
+
Analytic 0222
|
|
2031
|
+
Analytic 1220
|
|
2032
|
+
Analytic 0257
|
|
2033
|
+
Analytic 1028
|
|
2034
|
+
Analytic 1388
|
|
2035
|
+
Analytic 0318
|
|
2036
|
+
Analytic 2016
|
|
2037
|
+
Analytic 0153
|
|
2038
|
+
Analytic 0881
|
|
2039
|
+
Analytic 1164
|
|
2040
|
+
Analytic 1024
|
|
2041
|
+
Analytic 1480
|
|
2042
|
+
Analytic 1315
|
|
2043
|
+
Analytic 1571
|
|
2044
|
+
Analytic 0331
|
|
2045
|
+
Analytic 0801
|
|
2046
|
+
Analytic 0741
|
|
2047
|
+
Analytic 1233
|
|
2048
|
+
Analytic 0894
|
|
2049
|
+
Analytic 0645
|
|
2050
|
+
Analytic 0948
|
|
2051
|
+
Analytic 0971
|
|
2052
|
+
Analytic 1285
|
|
2053
|
+
Analytic 0481
|
|
2054
|
+
Analytic 0335
|
|
2055
|
+
Analytic 0970
|
|
2056
|
+
Analytic 0176
|
|
2057
|
+
Analytic 1353
|
|
2058
|
+
Analytic 0538
|
|
2059
|
+
Analytic 1939
|
|
2060
|
+
Analytic 1099
|
|
2061
|
+
Analytic 0764
|
|
2062
|
+
Analytic 1546
|
|
2063
|
+
Analytic 1015
|
|
2064
|
+
Analytic 1433
|
|
2065
|
+
Analytic 1231
|
|
2066
|
+
Analytic 1587
|
|
2067
|
+
Analytic 1043
|
|
2068
|
+
Analytic 0161
|
|
2069
|
+
Analytic 1111
|
|
2070
|
+
Analytic 0177
|
|
2071
|
+
Analytic 1993
|
|
2072
|
+
Analytic 0967
|
|
2073
|
+
Analytic 1029
|
|
2074
|
+
Analytic 1239
|
|
2075
|
+
Analytic 1505
|
|
2076
|
+
Analytic 1998
|
|
2077
|
+
Analytic 0891
|
|
2078
|
+
Analytic 1451
|
|
2079
|
+
Analytic 0344
|
|
2080
|
+
Analytic 2031
|
|
2081
|
+
Analytic 0964
|
|
2082
|
+
Analytic 0424
|
|
2083
|
+
Analytic 0336
|
|
2084
|
+
Analytic 1167
|
|
2085
|
+
Analytic 0984
|
|
2086
|
+
Analytic 1105
|
|
2087
|
+
Analytic 0932
|
|
2088
|
+
Analytic 1958
|
|
2089
|
+
Analytic 1311
|
|
2090
|
+
Analytic 0455
|
|
2091
|
+
Analytic 1358
|
|
2092
|
+
Analytic 0379
|
|
2093
|
+
Analytic 0734
|
|
2094
|
+
Analytic 0339
|
|
2095
|
+
Analytic 0674
|
|
2096
|
+
Analytic 1380
|
|
2097
|
+
Analytic 1625
|
|
2098
|
+
Analytic 0175
|
|
2099
|
+
Analytic 1191
|
|
2100
|
+
Analytic 1419
|
|
2101
|
+
Analytic 0661
|
|
2102
|
+
Analytic 0084
|
|
2103
|
+
Analytic 1946
|
|
2104
|
+
Analytic 0129
|
|
2105
|
+
Analytic 0300
|
|
2106
|
+
Analytic 0961
|
|
2107
|
+
Analytic 0392
|
|
2108
|
+
Analytic 0011
|
|
2109
|
+
Analytic 0721
|
|
2110
|
+
Analytic 0603
|
|
2111
|
+
Analytic 1470
|
|
2112
|
+
Analytic 1278
|
|
2113
|
+
Analytic 0247
|
|
2114
|
+
Analytic 0875
|
|
2115
|
+
Analytic 0670
|
|
2116
|
+
Analytic 0798
|
|
2117
|
+
Analytic 0360
|
|
2118
|
+
Analytic 0523
|
|
2119
|
+
Analytic 0278
|
|
2120
|
+
Analytic 1495
|
|
2121
|
+
Analytic 0566
|
|
2122
|
+
Analytic 1439
|
|
2123
|
+
Analytic 0125
|
|
2124
|
+
Analytic 1041
|
|
2125
|
+
Analytic 0974
|
|
2126
|
+
Analytic 1596
|
|
2127
|
+
Analytic 0883
|
|
2128
|
+
Analytic 1964
|
|
2129
|
+
Analytic 1350
|
|
2130
|
+
Analytic 0148
|
|
2131
|
+
Analytic 0643
|
|
2132
|
+
Analytic 0425
|
|
2133
|
+
Analytic 1568
|
|
2134
|
+
Analytic 0800
|
|
2135
|
+
Analytic 0863
|
|
2136
|
+
Analytic 1579
|
|
2137
|
+
Analytic 2029
|
|
2138
|
+
Analytic 1324
|
|
2139
|
+
Analytic 1238
|
|
2140
|
+
Analytic 0585
|
|
2141
|
+
Analytic 0391
|
|
2142
|
+
Analytic 1561
|
|
2143
|
+
Analytic 0506
|
|
2144
|
+
Analytic 0087
|
|
2145
|
+
Analytic 0927
|
|
2146
|
+
Analytic 1242
|
|
2147
|
+
Analytic 0762
|
|
2148
|
+
Analytic 1230
|
|
2149
|
+
Analytic 1022
|
|
2150
|
+
Analytic 0681
|
|
2151
|
+
Analytic 0943
|
|
2152
|
+
Analytic 1366
|
|
2153
|
+
Analytic 1310
|
|
2154
|
+
Analytic 0994
|
|
2155
|
+
Analytic 0338
|
|
2156
|
+
Analytic 1980
|
|
2157
|
+
Analytic 1159
|
|
2158
|
+
Analytic 0310
|
|
2159
|
+
Analytic 0495
|
|
2160
|
+
Analytic 0826
|
|
2161
|
+
Analytic 0249
|
|
2162
|
+
Analytic 0696
|
|
2163
|
+
Analytic 0290
|
|
2164
|
+
Analytic 0624
|
|
2165
|
+
Analytic 0009
|
|
2166
|
+
Analytic 0179
|
|
2167
|
+
Analytic 1302
|
|
2168
|
+
Analytic 0926
|
|
2169
|
+
Analytic 1391
|
|
2170
|
+
Analytic 0173
|
|
2171
|
+
Analytic 1076
|
|
2172
|
+
Analytic 1638
|
|
2173
|
+
Analytic 1294
|
|
2174
|
+
Analytic 0456
|
|
2175
|
+
Analytic 0430
|
|
2176
|
+
Analytic 0666
|
|
2177
|
+
Analytic 0014
|
|
2178
|
+
Analytic 1370
|
|
2179
|
+
Analytic 1016
|
|
2180
|
+
Analytic 0929
|
|
2181
|
+
Analytic 0574
|
|
2182
|
+
Analytic 1594
|
|
2183
|
+
Analytic 0848
|
|
2184
|
+
Analytic 1044
|
|
2185
|
+
Analytic 1620
|
|
2186
|
+
Analytic 1169
|
|
2187
|
+
Analytic 0818
|
|
2188
|
+
Analytic 0152
|
|
2189
|
+
Analytic 1293
|
|
2190
|
+
Analytic 0089
|
|
2191
|
+
Analytic 1241
|
|
2192
|
+
Analytic 1202
|
|
2193
|
+
Analytic 1962
|
|
2194
|
+
Analytic 0232
|
|
2195
|
+
Analytic 0390
|
|
2196
|
+
Analytic 0383
|
|
2197
|
+
Analytic 1474
|
|
2198
|
+
Analytic 1097
|
|
2199
|
+
Analytic 1445
|
|
2200
|
+
Analytic 1100
|
|
2201
|
+
Analytic 1444
|
|
2202
|
+
Analytic 1056
|
|
2203
|
+
Analytic 1101
|
|
2204
|
+
Analytic 0525
|
|
2205
|
+
Analytic 0823
|
|
2206
|
+
Analytic 0463
|
|
2207
|
+
Analytic 0207
|
|
2208
|
+
Analytic 1243
|
|
2209
|
+
Analytic 0341
|
|
2210
|
+
Analytic 0037
|
|
2211
|
+
Analytic 1306
|
|
2212
|
+
Analytic 1227
|
|
2213
|
+
Analytic 0693
|
|
2214
|
+
Analytic 1340
|
|
2215
|
+
Analytic 1398
|
|
2216
|
+
Analytic 0016
|
|
2217
|
+
Analytic 0092
|
|
2218
|
+
Analytic 0131
|
|
2219
|
+
Analytic 0671
|
|
2220
|
+
Analytic 1197
|
|
2221
|
+
Analytic 0768
|
|
2222
|
+
Analytic 1617
|
|
2223
|
+
Analytic 1343
|
|
2224
|
+
Analytic 0786
|
|
2225
|
+
Analytic 0105
|
|
2226
|
+
Analytic 1441
|
|
2227
|
+
Analytic 1228
|
|
2228
|
+
Analytic 0684
|
|
2229
|
+
Analytic 1348
|
|
2230
|
+
Analytic 0369
|
|
2231
|
+
Analytic 1630
|
|
2232
|
+
Analytic 1081
|
|
2233
|
+
Analytic 0725
|
|
2234
|
+
Analytic 0189
|
|
2235
|
+
Analytic 0206
|
|
2236
|
+
Analytic 0907
|
|
2237
|
+
Analytic 1562
|
|
2238
|
+
Analytic 0080
|
|
2239
|
+
Analytic 0116
|
|
2240
|
+
Analytic 0414
|
|
2241
|
+
Analytic 0712
|
|
2242
|
+
Analytic 1149
|
|
2243
|
+
Analytic 1988
|
|
2244
|
+
Analytic 1961
|
|
2245
|
+
Analytic 0271
|
|
2246
|
+
Analytic 0590
|
|
2247
|
+
Analytic 0490
|
|
2248
|
+
Analytic 1047
|
|
2249
|
+
Analytic 0307
|
|
2250
|
+
Analytic 1284
|
|
2251
|
+
Analytic 0320
|
|
2252
|
+
Analytic 1259
|
|
2253
|
+
Analytic 0019
|
|
2254
|
+
Analytic 0918
|
|
2255
|
+
Analytic 0808
|
|
2256
|
+
Analytic 1354
|
|
2257
|
+
Analytic 0183
|
|
2258
|
+
Analytic 0169
|
|
2259
|
+
Analytic 1590
|
|
2260
|
+
Analytic 0472
|
|
2261
|
+
Analytic 1598
|
|
2262
|
+
Analytic 1624
|
|
2263
|
+
Analytic 0986
|
|
2264
|
+
Analytic 0861
|
|
2265
|
+
Analytic 2001
|
|
2266
|
+
Analytic 0204
|
|
2267
|
+
Analytic 0497
|
|
2268
|
+
Analytic 0683
|
|
2269
|
+
Analytic 1003
|
|
2270
|
+
Analytic 1395
|
|
2271
|
+
Analytic 1257
|
|
2272
|
+
Analytic 1616
|
|
2273
|
+
Analytic 0305
|
|
2274
|
+
Analytic 0562
|
|
2275
|
+
Analytic 0076
|
|
2276
|
+
Analytic 1276
|
|
2277
|
+
Analytic 0052
|
|
2278
|
+
Analytic 1122
|
|
2279
|
+
Analytic 2011
|
|
2280
|
+
Analytic 0739
|
|
2281
|
+
Analytic 0119
|
|
2282
|
+
Analytic 0924
|
|
2283
|
+
Analytic 0641
|
|
2284
|
+
Analytic 1323
|
|
2285
|
+
Analytic 0516
|
|
2286
|
+
Analytic 1282
|
|
2287
|
+
Analytic 1363
|
|
2288
|
+
Analytic 0251
|
|
2289
|
+
Analytic 0276
|
|
2290
|
+
Analytic 1012
|
|
2291
|
+
Analytic 0212
|
|
2292
|
+
Analytic 1938
|
|
2293
|
+
Analytic 2009
|
|
2294
|
+
Analytic 0789
|
|
2295
|
+
Analytic 0301
|
|
2296
|
+
Analytic 0839
|
|
2297
|
+
Analytic 1266
|
|
2298
|
+
Analytic 1342
|
|
2299
|
+
Analytic 0135
|
|
2300
|
+
Analytic 0662
|
|
2301
|
+
Analytic 0120
|
|
2302
|
+
Analytic 1545
|
|
2303
|
+
Analytic 1541
|
|
2304
|
+
Analytic 0546
|
|
2305
|
+
Analytic 0048
|
|
2306
|
+
Analytic 0885
|
|
2307
|
+
Analytic 0598
|
|
2308
|
+
Analytic 0507
|
|
2309
|
+
Analytic 0987
|
|
2310
|
+
Analytic 0470
|
|
2311
|
+
Analytic 0882
|
|
2312
|
+
Analytic 1144
|
|
2313
|
+
Analytic 1038
|
|
2314
|
+
Analytic 0718
|
|
2315
|
+
Analytic 1582
|
|
2316
|
+
Analytic 0869
|
|
2317
|
+
Analytic 0527
|
|
2318
|
+
Analytic 0261
|
|
2319
|
+
Analytic 0423
|
|
2320
|
+
Analytic 0890
|
|
2321
|
+
Analytic 1295
|
|
2322
|
+
Analytic 1530
|
|
2323
|
+
Analytic 0292
|
|
2324
|
+
Analytic 0849
|
|
2325
|
+
Analytic 0303
|
|
2326
|
+
Analytic 0033
|
|
2327
|
+
Analytic 0811
|
|
2328
|
+
Analytic 0583
|
|
2329
|
+
Analytic 1011
|
|
2330
|
+
Analytic 0906
|
|
2331
|
+
Analytic 0385
|
|
2332
|
+
Analytic 1513
|
|
2333
|
+
Analytic 1601
|
|
2334
|
+
Analytic 1223
|
|
2335
|
+
Analytic 2015
|
|
2336
|
+
Analytic 1509
|
|
2337
|
+
Analytic 1196
|
|
2338
|
+
Analytic 0104
|
|
2339
|
+
Analytic 1045
|
|
2340
|
+
Analytic 0352
|
|
2341
|
+
Analytic 1234
|
|
2342
|
+
Analytic 1139
|
|
2343
|
+
Analytic 1456
|
|
2344
|
+
Analytic 0912
|
|
2345
|
+
Analytic 0488
|
|
2346
|
+
Analytic 1608
|
|
2347
|
+
Analytic 0460
|
|
2348
|
+
Analytic 0133
|
|
2349
|
+
Analytic 1392
|
|
2350
|
+
Analytic 1153
|
|
2351
|
+
Analytic 0903
|
|
2352
|
+
Analytic 0323
|
|
2353
|
+
Analytic 1518
|
|
2354
|
+
Analytic 0438
|
|
2355
|
+
Analytic 0297
|
|
2356
|
+
Analytic 1618
|
|
2357
|
+
Analytic 0677
|
|
2358
|
+
Analytic 1390
|
|
2359
|
+
Analytic 0977
|
|
2360
|
+
Analytic 1232
|
|
2361
|
+
Analytic 1502
|
|
2362
|
+
Analytic 0029
|
|
2363
|
+
Analytic 0252
|
|
2364
|
+
Analytic 1367
|
|
2365
|
+
Analytic 0461
|
|
2366
|
+
Analytic 1393
|
|
2367
|
+
Analytic 0830
|
|
2368
|
+
Analytic 1328
|
|
2369
|
+
Analytic 0579
|
|
2370
|
+
Analytic 1250
|
|
2371
|
+
Analytic 0870
|
|
2372
|
+
Analytic 1597
|
|
2373
|
+
Analytic 2014
|
|
2374
|
+
Analytic 0245
|
|
2375
|
+
Analytic 1426
|
|
2376
|
+
Analytic 0704
|
|
2377
|
+
Analytic 0840
|
|
2378
|
+
Analytic 1593
|
|
2379
|
+
Analytic 2020
|
|
2380
|
+
Analytic 0570
|
|
2381
|
+
Analytic 0123
|
|
2382
|
+
Analytic 1275
|
|
2383
|
+
Analytic 1990
|
|
2384
|
+
Analytic 0655
|
|
2385
|
+
Analytic 0600
|
|
2386
|
+
Analytic 0634
|
|
2387
|
+
Analytic 1206
|
|
2388
|
+
Analytic 0240
|
|
2389
|
+
Analytic 1547
|
|
2390
|
+
Analytic 0071
|
|
2391
|
+
Analytic 0159
|
|
2392
|
+
Analytic 1091
|
|
2393
|
+
Analytic 0550
|
|
2394
|
+
Analytic 1973
|
|
2395
|
+
Analytic 0893
|
|
2396
|
+
Analytic 0146
|
|
2397
|
+
Analytic 1049
|
|
2398
|
+
Analytic 1314
|
|
2399
|
+
Analytic 1402
|
|
2400
|
+
Analytic 0788
|
|
2401
|
+
Analytic 0282
|
|
2402
|
+
Analytic 0221
|
|
2403
|
+
Analytic 1606
|
|
2404
|
+
Analytic 0737
|
|
2405
|
+
Analytic 0946
|
|
2406
|
+
Analytic 1643
|
|
2407
|
+
Analytic 1270
|
|
2408
|
+
Analytic 1198
|
|
2409
|
+
Analytic 1304
|
|
2410
|
+
Analytic 0711
|
|
2411
|
+
Analytic 0781
|
|
2412
|
+
Analytic 1977
|
|
2413
|
+
Analytic 1564
|
|
2414
|
+
Analytic 0990
|
|
2415
|
+
Analytic 0933
|
|
2416
|
+
Analytic 0406
|
|
2417
|
+
Analytic 0858
|
|
2418
|
+
Analytic 0476
|
|
2419
|
+
Analytic 0753
|
|
2420
|
+
Analytic 0528
|
|
2421
|
+
Analytic 1073
|
|
2422
|
+
Analytic 0740
|
|
2423
|
+
Analytic 1384
|
|
2424
|
+
Analytic 0565
|
|
2425
|
+
Analytic 0299
|
|
2426
|
+
Analytic 0555
|
|
2427
|
+
Analytic 0642
|
|
2428
|
+
Analytic 0821
|
|
2429
|
+
Analytic 0815
|
|
2430
|
+
Analytic 0106
|
|
2431
|
+
Analytic 1075
|
|
2432
|
+
Analytic 0898
|
|
2433
|
+
Analytic 1345
|
|
2434
|
+
Analytic 0446
|
|
2435
|
+
Analytic 2021
|
|
2436
|
+
Analytic 0610
|
|
2437
|
+
Analytic 0442
|
|
2438
|
+
Analytic 1535
|
|
2439
|
+
Analytic 0752
|
|
2440
|
+
Analytic 0835
|
|
2441
|
+
Analytic 0774
|
|
2442
|
+
Analytic 1128
|
|
2443
|
+
Analytic 1098
|
|
2444
|
+
Analytic 0949
|
|
2445
|
+
Analytic 1264
|
|
2446
|
+
Analytic 0935
|
|
2447
|
+
Analytic 0713
|
|
2448
|
+
Analytic 0375
|
|
2449
|
+
Analytic 0452
|
|
2450
|
+
Analytic 1184
|
|
2451
|
+
Analytic 1175
|
|
2452
|
+
Analytic 0242
|
|
2453
|
+
Analytic 0355
|
|
2454
|
+
Analytic 0862
|
|
2455
|
+
Analytic 1262
|
|
2456
|
+
Analytic 0792
|
|
2457
|
+
Analytic 0803
|
|
2458
|
+
Analytic 1947
|
|
2459
|
+
Analytic 1046
|
|
2460
|
+
Analytic 1974
|
|
2461
|
+
Analytic 0233
|
|
2462
|
+
Analytic 0937
|
|
2463
|
+
Analytic 0930
|
|
2464
|
+
Analytic 1374
|
|
2465
|
+
Analytic 0836
|
|
2466
|
+
Analytic 1612
|
|
2467
|
+
Analytic 0044
|
|
2468
|
+
Analytic 1110
|
|
2469
|
+
Analytic 0262
|
|
2470
|
+
Analytic 0353
|
|
2471
|
+
Analytic 1633
|
|
2472
|
+
Analytic 0564
|
|
2473
|
+
Analytic 0638
|
|
2474
|
+
Analytic 1397
|
|
2475
|
+
Analytic 0901
|
|
2476
|
+
Analytic 0995
|
|
2477
|
+
Analytic 0043
|
|
2478
|
+
Analytic 1116
|
|
2479
|
+
Analytic 0777
|
|
2480
|
+
Analytic 2028
|
|
2481
|
+
Analytic 0066
|
|
2482
|
+
Analytic 0852
|
|
2483
|
+
Analytic 0464
|
|
2484
|
+
Analytic 1394
|
|
2485
|
+
Analytic 0622
|
|
2486
|
+
Analytic 1318
|
|
2487
|
+
Analytic 0659
|
|
2488
|
+
Analytic 1464
|
|
2489
|
+
Analytic 1205
|
|
2490
|
+
Analytic 0055
|
|
2491
|
+
Analytic 0651
|
|
2492
|
+
Analytic 0954
|
|
2493
|
+
Analytic 0563
|
|
2494
|
+
Analytic 1600
|
|
2495
|
+
Analytic 1133
|
|
2496
|
+
Analytic 0007
|
|
2497
|
+
Analytic 1032
|
|
2498
|
+
Analytic 1536
|
|
2499
|
+
Analytic 0640
|
|
2500
|
+
Analytic 0611
|
|
2501
|
+
Analytic 1469
|
|
2502
|
+
Analytic 0730
|
|
2503
|
+
Analytic 0453
|
|
2504
|
+
Analytic 1975
|
|
2505
|
+
Analytic 0631
|
|
2506
|
+
Analytic 0238
|
|
2507
|
+
Analytic 0041
|
|
2508
|
+
Analytic 0118
|
|
2509
|
+
Analytic 1440
|
|
2510
|
+
Analytic 1507
|
|
2511
|
+
Analytic 0062
|
|
2512
|
+
Analytic 1163
|
|
2513
|
+
Analytic 1086
|
|
2514
|
+
Analytic 1458
|
|
2515
|
+
Analytic 1274
|
|
2516
|
+
Analytic 0766
|
|
2517
|
+
Analytic 0270
|
|
2518
|
+
Analytic 0333
|
|
2519
|
+
Analytic 1516
|
|
2520
|
+
Analytic 0653
|
|
2521
|
+
Analytic 1141
|
|
2522
|
+
Analytic 1082
|
|
2523
|
+
Analytic 0831
|
|
2524
|
+
Analytic 0012
|
|
2525
|
+
Analytic 0854
|
|
2526
|
+
Analytic 1453
|
|
2527
|
+
Analytic 0018
|
|
2528
|
+
Analytic 1053
|
|
2529
|
+
Analytic 1634
|
|
2530
|
+
Analytic 0559
|
|
2531
|
+
Analytic 1236
|
|
2532
|
+
Analytic 0289
|
|
2533
|
+
Analytic 0706
|
|
2534
|
+
Analytic 0002
|
|
2535
|
+
Analytic 1178
|
|
2536
|
+
Analytic 1188
|
|
2537
|
+
Analytic 0321
|
|
2538
|
+
Analytic 0695
|
|
2539
|
+
Analytic 0365
|
|
2540
|
+
Analytic 1018
|
|
2541
|
+
Analytic 0509
|
|
2542
|
+
Analytic 1362
|
|
2543
|
+
Analytic 0760
|
|
2544
|
+
Analytic 1347
|
|
2545
|
+
Analytic 0277
|
|
2546
|
+
Analytic 0637
|
|
2547
|
+
Analytic 1539
|
|
2548
|
+
Analytic 0853
|
|
2549
|
+
Analytic 1957
|
|
2550
|
+
Analytic 1068
|
|
2551
|
+
Analytic 1515
|
|
2552
|
+
Analytic 0065
|
|
2553
|
+
Analytic 0165
|
|
2554
|
+
Analytic 0646
|
|
2555
|
+
Analytic 0445
|
|
2556
|
+
Analytic 1361
|
|
2557
|
+
Analytic 0582
|
|
2558
|
+
Analytic 0073
|
|
2559
|
+
Analytic 1999
|
|
2560
|
+
Analytic 0581
|
|
2561
|
+
Analytic 1577
|
|
2562
|
+
Analytic 0388
|
|
2563
|
+
Analytic 0172
|
|
2564
|
+
Analytic 1135
|
|
2565
|
+
Analytic 0569
|
|
2566
|
+
Analytic 0359
|
|
2567
|
+
Analytic 0755
|
|
2568
|
+
Analytic 1373
|
|
2569
|
+
Analytic 0728
|
|
2570
|
+
Analytic 0001
|
|
2571
|
+
Analytic 0449
|
|
2572
|
+
Analytic 1524
|
|
2573
|
+
Analytic 1261
|
|
2574
|
+
Analytic 1136
|
|
2575
|
+
Analytic 0709
|
|
2576
|
+
Analytic 0914
|
|
2577
|
+
Analytic 0099
|
|
2578
|
+
Analytic 0533
|
|
2579
|
+
Analytic 0117
|
|
2580
|
+
Analytic 1087
|
|
2581
|
+
Analytic 1584
|
|
2582
|
+
Analytic 0621
|
|
2583
|
+
Analytic 0047
|
|
2584
|
+
Analytic 1054
|
|
2585
|
+
Analytic 0332
|
|
2586
|
+
Analytic 0519
|
|
2587
|
+
Analytic 0991
|
|
2588
|
+
Analytic 0487
|
|
2589
|
+
Analytic 0327
|
|
2590
|
+
Analytic 0279
|
|
2591
|
+
Analytic 1528
|
|
2592
|
+
Analytic 0593
|
|
2593
|
+
Analytic 0909
|
|
2594
|
+
Analytic 1334
|
|
2595
|
+
Analytic 0302
|
|
2596
|
+
Analytic 0524
|
|
2597
|
+
Analytic 1543
|
|
2598
|
+
Analytic 0035
|
|
2599
|
+
Analytic 0511
|
|
2600
|
+
Analytic 0952
|
|
2601
|
+
Analytic 0168
|
|
2602
|
+
Analytic 0020
|
|
2603
|
+
Analytic 1461
|
|
2604
|
+
Analytic 0888
|
|
2605
|
+
Analytic 1080
|
|
2606
|
+
Analytic 0215
|
|
2607
|
+
Analytic 0217
|
|
2608
|
+
Analytic 0398
|
|
2609
|
+
Analytic 0955
|
|
2610
|
+
Analytic 0448
|
|
2611
|
+
Analytic 1504
|
|
2612
|
+
Analytic 0612
|
|
2613
|
+
Analytic 0717
|
|
2614
|
+
Analytic 1376
|
|
2615
|
+
Analytic 0915
|
|
2616
|
+
Analytic 0405
|
|
2617
|
+
Analytic 1996
|
|
2618
|
+
Analytic 0140
|
|
2619
|
+
Analytic 1013
|
|
2620
|
+
Analytic 1140
|
|
2621
|
+
Analytic 1409
|
|
2622
|
+
Analytic 0714
|
|
2623
|
+
Analytic 1589
|
|
2624
|
+
Analytic 1124
|
|
2625
|
+
Analytic 0845
|
|
2626
|
+
Analytic 1127
|
|
2627
|
+
Analytic 0886
|
|
2628
|
+
Analytic 1945
|
|
2629
|
+
Analytic 1185
|
|
2630
|
+
Analytic 1428
|
|
2631
|
+
Analytic 0719
|
|
2632
|
+
Analytic 0866
|
|
2633
|
+
Analytic 1527
|
|
2634
|
+
Analytic 1563
|
|
2635
|
+
Analytic 0074
|
|
2636
|
+
Active Directory Credential Request
|
|
2637
|
+
WMI Creation
|
|
2638
|
+
Group Modification
|
|
2639
|
+
Image Modification
|
|
2640
|
+
Pod Enumeration
|
|
2641
|
+
Response Content
|
|
2642
|
+
Volume Metadata
|
|
2643
|
+
Response Metadata
|
|
2644
|
+
Windows Registry Key Deletion
|
|
2645
|
+
Instance Stop
|
|
2646
|
+
Malware Content
|
|
2647
|
+
Snapshot Deletion
|
|
2648
|
+
Network Connection Creation
|
|
2649
|
+
Process Access
|
|
2650
|
+
Active Directory Object Creation
|
|
2651
|
+
Certificate Registration
|
|
2652
|
+
File Access
|
|
2653
|
+
Kernel Module Load
|
|
2654
|
+
Instance Enumeration
|
|
2655
|
+
File Creation
|
|
2656
|
+
Active DNS
|
|
2657
|
+
Driver Load
|
|
2658
|
+
Network Traffic Content
|
|
2659
|
+
Logon Session Metadata
|
|
2660
|
+
Volume Deletion
|
|
2661
|
+
Process Creation
|
|
2662
|
+
Drive Creation
|
|
2663
|
+
Snapshot Creation
|
|
2664
|
+
Cloud Storage Modification
|
|
2665
|
+
Instance Modification
|
|
2666
|
+
Instance Metadata
|
|
2667
|
+
Cloud Storage Deletion
|
|
2668
|
+
Drive Modification
|
|
2669
|
+
Pod Creation
|
|
2670
|
+
Service Creation
|
|
2671
|
+
Cloud Storage Access
|
|
2672
|
+
Cloud Storage Creation
|
|
2673
|
+
Active Directory Object Modification
|
|
2674
|
+
Active Directory Object Access
|
|
2675
|
+
Web Credential Creation
|
|
2676
|
+
Container Start
|
|
2677
|
+
Process Termination
|
|
2678
|
+
File Metadata
|
|
2679
|
+
Service Modification
|
|
2680
|
+
Pod Modification
|
|
2681
|
+
Command Execution
|
|
2682
|
+
Drive Access
|
|
2683
|
+
Firewall Metadata
|
|
2684
|
+
Service Metadata
|
|
2685
|
+
Instance Deletion
|
|
2686
|
+
Scheduled Job Metadata
|
|
2687
|
+
Windows Registry Key Creation
|
|
2688
|
+
File Modification
|
|
2689
|
+
Host Status
|
|
2690
|
+
Image Deletion
|
|
2691
|
+
Snapshot Metadata
|
|
2692
|
+
Cloud Service Enumeration
|
|
2693
|
+
Group Metadata
|
|
2694
|
+
Group Enumeration
|
|
2695
|
+
Social Media
|
|
2696
|
+
Active Directory Object Deletion
|
|
2697
|
+
Container Enumeration
|
|
2698
|
+
Malware Metadata
|
|
2699
|
+
OS API Execution
|
|
2700
|
+
Application Log Content
|
|
2701
|
+
Logon Session Creation
|
|
2702
|
+
Script Execution
|
|
2703
|
+
Container Creation
|
|
2704
|
+
Network Traffic Flow
|
|
2705
|
+
User Account Authentication
|
|
2706
|
+
Image Creation
|
|
2707
|
+
Cloud Service Metadata
|
|
2708
|
+
Image Metadata
|
|
2709
|
+
Instance Creation
|
|
2710
|
+
User Account Metadata
|
|
2711
|
+
Named Pipe Metadata
|
|
2712
|
+
Firmware Modification
|
|
2713
|
+
Firewall Enumeration
|
|
2714
|
+
Module Load
|
|
2715
|
+
Firewall Disable
|
|
2716
|
+
Passive DNS
|
|
2717
|
+
User Account Modification
|
|
2718
|
+
Firewall Rule Modification
|
|
2719
|
+
Volume Modification
|
|
2720
|
+
Process Modification
|
|
2721
|
+
User Account Deletion
|
|
2722
|
+
Windows Registry Key Modification
|
|
2723
|
+
Volume Creation
|
|
2724
|
+
User Account Creation
|
|
2725
|
+
Cloud Storage Metadata
|
|
2726
|
+
Cloud Service Modification
|
|
2727
|
+
File Deletion
|
|
2728
|
+
Cloud Service Disable
|
|
2729
|
+
Volume Enumeration
|
|
2730
|
+
Windows Registry Key Access
|
|
2731
|
+
Process Metadata
|
|
2732
|
+
Snapshot Modification
|
|
2733
|
+
Scheduled Job Creation
|
|
2734
|
+
Network Share Access
|
|
2735
|
+
Driver Metadata
|
|
2736
|
+
Instance Start
|
|
2737
|
+
Scheduled Job Modification
|
|
2738
|
+
Cloud Storage Enumeration
|
|
2739
|
+
Web Credential Usage
|
|
2740
|
+
Domain Registration
|
|
2741
|
+
Snapshot Enumeration
|
|
2742
|
+
Behavioral Detection of Network Share Connection Removal via CLI and SMB Disconnects
|
|
2743
|
+
Detect Abuse of vSphere Installation Bundles (VIBs) for Persistent Access
|
|
2744
|
+
Detection of Kernel/User-Level Rootkit Behavior Across Platforms
|
|
2745
|
+
Detect Remote Email Collection via Abnormal Login and Programmatic Access
|
|
2746
|
+
Detection of Malicious Control Panel Item Execution via control.exe or Rundll32
|
|
2747
|
+
Detect Suspicious or Malicious Code Signing Abuse
|
|
2748
|
+
Detection of Link Target
|
|
2749
|
+
Detection of Botnet
|
|
2750
|
+
Detect Archiving and Encryption of Collected Data (T1560)
|
|
2751
|
+
Multi-Event Detection for SMB Admin Share Lateral Movement
|
|
2752
|
+
Detection Strategy for T1546.016 - Event Triggered Execution via Installer Packages
|
|
2753
|
+
Detection of Malware
|
|
2754
|
+
Behavioral Detection of User Discovery via Local and Remote Enumeration
|
|
2755
|
+
Detection Strategy for Plist File Modification (T1647)
|
|
2756
|
+
Detection Strategy for Impair Defenses Indicator Blocking
|
|
2757
|
+
Detection Strategy for Accessibility Feature Hijacking via Binary Replacement or Registry Modification
|
|
2758
|
+
Detection of Msiexec Abuse for Local, Network, and DLL Execution
|
|
2759
|
+
Detection Strategy for Dynamic API Resolution via Hash-Based Function Lookups
|
|
2760
|
+
Detection Strategy for Hijack Execution Flow across OS platforms.
|
|
2761
|
+
Detection Strategy for Hijack Execution Flow using Executable Installer File Permissions Weakness
|
|
2762
|
+
Detection Strategy for Event Triggered Execution via Trap (T1546.005)
|
|
2763
|
+
Behavioral Detection of Mailbox Data and Log Deletion for Anti-Forensics
|
|
2764
|
+
Detection Strategy for Encrypted Channel across OS Platforms
|
|
2765
|
+
Detection Strategy for NTFS File Attribute Abuse (ADS/EAs)
|
|
2766
|
+
Detection of Establish Accounts
|
|
2767
|
+
User-Initiated Malicious Library Installation via Package Manager (T1204.005)
|
|
2768
|
+
Detection Strategy for System Binary Proxy Execution: Regsvr32
|
|
2769
|
+
Detecting Steganographic Command and Control via File + Network Correlation
|
|
2770
|
+
Behavior-chain detection for T1134.001 Access Token Manipulation: Token Impersonation/Theft on Windows
|
|
2771
|
+
User Execution – Malicious Copy & Paste (browser/email → shell with obfuscated one-liner) – T1204.004
|
|
2772
|
+
Detect Adversary-in-the-Middle via Network and Configuration Anomalies
|
|
2773
|
+
Detection Strategy for Resource Forking on macOS
|
|
2774
|
+
Detection of Botnet
|
|
2775
|
+
Detection Strategy for SQL Stored Procedures Abuse via T1505.001
|
|
2776
|
+
Detecting Malicious Browser Extensions Across Platforms
|
|
2777
|
+
Detection of Registry Query for Environmental Discovery
|
|
2778
|
+
Detect Compromise of Host Software Binaries
|
|
2779
|
+
Detection Strategy for Hidden Windows
|
|
2780
|
+
Multi-Platform Cloud Storage Exfiltration Behavior Chain
|
|
2781
|
+
Detect Suspicious Access to Windows Credential Manager
|
|
2782
|
+
Detection of Data Staging Prior to Exfiltration
|
|
2783
|
+
Detection Strategy for Disable or Modify Cloud Firewall
|
|
2784
|
+
Detection of Network Topology
|
|
2785
|
+
Suspicious Addition to Local or Domain Groups
|
|
2786
|
+
Detection Strategy for Exploitation for Credential Access
|
|
2787
|
+
Credential Dumping from SAM via Registry Dump and Local File Access
|
|
2788
|
+
Brute Force Authentication Failures with Multi-Platform Log Correlation
|
|
2789
|
+
Detect LSA Authentication Package Persistence via Registry and LSASS DLL Load
|
|
2790
|
+
Detection of Command and Control Over Application Layer Protocols
|
|
2791
|
+
Detection Strategy for Lateral Tool Transfer across OS platforms
|
|
2792
|
+
Detection of Digital Certificates
|
|
2793
|
+
Detection Strategy for Modify Cloud Compute Infrastructure: Create Snapshot
|
|
2794
|
+
Masquerading via Space After Filename - Behavioral Detection Strategy
|
|
2795
|
+
Behavioral Detection of Publish/Subscribe Protocol Misuse for C2
|
|
2796
|
+
Detection of Spearphishing Service
|
|
2797
|
+
Detection Strategy for Log Enumeration
|
|
2798
|
+
Detection of Social Media Accounts
|
|
2799
|
+
Behavioral Detection of System Network Configuration Discovery
|
|
2800
|
+
Detection Strategy for Exfiltration Over Web Service
|
|
2801
|
+
Detection Strategy for ListPlanting Injection on Windows
|
|
2802
|
+
Detection Strategy of Transmitted Data Manipulation
|
|
2803
|
+
Credential Access via /etc/passwd and /etc/shadow Parsing
|
|
2804
|
+
Behavioral Detection of Windows Command Shell Execution
|
|
2805
|
+
Exploitation for Client Execution – cross-platform behavior chain (browser/Office/3rd-party apps)
|
|
2806
|
+
Behavioral detection for Supply Chain Compromise (package/update tamper → install → first-run)
|
|
2807
|
+
Suspicious Database Access and Dump Activity Across Environments (T1213.006)
|
|
2808
|
+
Cross-Platform Behavioral Detection of Python Execution
|
|
2809
|
+
Detect Credentials Access from Password Stores
|
|
2810
|
+
Detection Strategy for Endpoint DoS via Service Exhaustion Flood
|
|
2811
|
+
Detection Strategy for Extra Window Memory (EWM) Injection on Windows
|
|
2812
|
+
Detection Strategy for T1218.012 Verclsid Abuse
|
|
2813
|
+
Detection Strategy for Disable or Modify Linux Audit System
|
|
2814
|
+
Detection Strategy for Exclusive Control
|
|
2815
|
+
Detection Strategy for Disk Structure Wipe via Boot/Partition Overwrite
|
|
2816
|
+
Detection Strategy for Impersonation
|
|
2817
|
+
Traffic Signaling (Port-knock / magic-packet → firewall or service activation) – T1205
|
|
2818
|
+
Detection of Code Signing Certificates
|
|
2819
|
+
Behavior-chain detection for T1132.001 Data Encoding: Standard Encoding (Base64/Hex/MIME) across Windows, Linux, macOS, ESXi
|
|
2820
|
+
Detection of Cloud Accounts
|
|
2821
|
+
Detection of File Transfer Protocol-Based C2 (FTP, FTPS, SMB, TFTP)
|
|
2822
|
+
Detection Strategy for Junk Code Obfuscation with Suspicious Execution Patterns
|
|
2823
|
+
Behavioral Detection of Log File Clearing on Linux and macOS
|
|
2824
|
+
Detection of Remote Data Staging Prior to Exfiltration
|
|
2825
|
+
Detection Strategy for Reflection Amplification DoS (T1498.002)
|
|
2826
|
+
Detection Strategy for Temporary Elevated Cloud Access Abuse (T1548.005)
|
|
2827
|
+
Detection Strategy for Network Address Translation Traversal
|
|
2828
|
+
Local Account Enumeration Across Host Platforms
|
|
2829
|
+
Detection Strategy for Cloud Infrastructure Discovery
|
|
2830
|
+
T1136.001 Detection Strategy - Local Account Creation Across Platforms
|
|
2831
|
+
Cross-Platform Detection of Data Transfer to Cloud Account
|
|
2832
|
+
Detection Strategy for Debugger Evasion (T1622)
|
|
2833
|
+
Detection Strategy for Application Shimming via sdbinst.exe and Registry Artifacts (Windows)
|
|
2834
|
+
Email Collection via Local Email Access and Auto-Forwarding Behavior
|
|
2835
|
+
Behavioral Detection of Internet Connection Discovery
|
|
2836
|
+
Endpoint Resource Saturation and Crash Pattern Detection Across Platforms
|
|
2837
|
+
Detect Mark-of-the-Web (MOTW) Bypass via Container and Disk Image Files
|
|
2838
|
+
Detection Strategy for Dynamic Resolution using Domain Generation Algorithms.
|
|
2839
|
+
Detection Strategy for Role Addition to Cloud Accounts
|
|
2840
|
+
Container CLI and API Abuse via Docker/Kubernetes (T1059.013)
|
|
2841
|
+
Detection of Bluetooth-Based Data Exfiltration
|
|
2842
|
+
Detection Strategy for Hijack Execution Flow through Path Interception by Unquoted Path
|
|
2843
|
+
Detection of Web Session Cookie Theft via File, Memory, and Network Artifacts
|
|
2844
|
+
Detection fo Remote Service Session Hijacking for RDP.
|
|
2845
|
+
Detection Strategy for Process Argument Spoofing on Windows
|
|
2846
|
+
Detection Strategy for T1505 - Server Software Component
|
|
2847
|
+
Internal Proxy Behavior via Lateral Host-to-Host C2 Relay
|
|
2848
|
+
Detection Strategy for Endpoint DoS via Application or System Exploitation
|
|
2849
|
+
Detection Strategy for Ignore Process Interrupts
|
|
2850
|
+
Detection of Phishing for Information
|
|
2851
|
+
Multi-Platform Shutdown or Reboot Detection via Execution and Host Status Events
|
|
2852
|
+
Behavioral Detection Strategy for Use Alternate Authentication Material (T1550)
|
|
2853
|
+
Detection of Non-Application Layer Protocols for C2
|
|
2854
|
+
Cross-host C2 via Removable Media Relay
|
|
2855
|
+
Defacement via File and Web Content Modification Across Platforms
|
|
2856
|
+
Detect LLMNR/NBT-NS Poisoning and SMB Relay on Windows
|
|
2857
|
+
Detection Strategy for SNMP (MIB Dump) on Network Devices
|
|
2858
|
+
macOS AuthorizationExecuteWithPrivileges Elevation Prompt Detection
|
|
2859
|
+
Detection of Digital Certificates
|
|
2860
|
+
Detect Network Logon Script Abuse via Multi-Event Correlation on Windows
|
|
2861
|
+
Detection Strategy for Container and Resource Discovery
|
|
2862
|
+
Detect abuse of Trusted Relationships (third-party and delegated admin access)
|
|
2863
|
+
Detection Strategy for Weaken Encryption: Disable Crypto Hardware on Network Devices
|
|
2864
|
+
Detection Strategy for T1547.009 – Shortcut Modification (Windows)
|
|
2865
|
+
Detection of DNS
|
|
2866
|
+
Detection of Adversarial Process Discovery Behavior
|
|
2867
|
+
Behavioral Detection Strategy for Abuse of Sudo and Sudo Caching
|
|
2868
|
+
Detection of Network Devices
|
|
2869
|
+
Unix-like File Permission Manipulation Behavioral Chain Detection Strategy
|
|
2870
|
+
Detection of Employee Names
|
|
2871
|
+
Detection Strategy for T1505.004 - Malicious IIS Components
|
|
2872
|
+
Detection Strategy for Encrypted Channel via Symmetric Cryptography across OS Platforms
|
|
2873
|
+
Detection of Email Addresses
|
|
2874
|
+
Recursive Enumeration of Files and Directories Across Privilege Contexts
|
|
2875
|
+
Behavioral Detection of External Website Defacement across Platforms
|
|
2876
|
+
Detection of Domain Trust Discovery via API, Script, and CLI Enumeration
|
|
2877
|
+
Detecting Suspicious Access to CRM Data in SaaS Environments
|
|
2878
|
+
Detection of Domains
|
|
2879
|
+
Detect Kerberos Ticket Theft or Forgery (T1558)
|
|
2880
|
+
Behavioral Detection of Native API Invocation via Unusual DLL Loads and Direct Syscalls
|
|
2881
|
+
Detection of Local Data Collection Prior to Exfiltration
|
|
2882
|
+
Detection of Unauthorized DCSync Operations via Replication API Abuse
|
|
2883
|
+
Detection Strategy for Polymorphic Code Mutation and Execution
|
|
2884
|
+
Detection Strategy for System Services across OS platforms.
|
|
2885
|
+
Detection Strategy for Hijack Execution Flow through the AppDomainManager on Windows.
|
|
2886
|
+
Detection of Business Relationships
|
|
2887
|
+
Detection Strategy for Disk Content Wipe via Direct Access and Overwrite
|
|
2888
|
+
Unauthorized Network Firewall Rule Modification (T1562.013)
|
|
2889
|
+
Detect Domain Controller Authentication Process Modification (Skeleton Key)
|
|
2890
|
+
Detection of Search Open Websites/Domains
|
|
2891
|
+
Detection of Systemd Service Creation or Modification on Linux
|
|
2892
|
+
Detection of SEO Poisoning
|
|
2893
|
+
Programmatic and Excessive Access to Confluence Documentation
|
|
2894
|
+
Detection Strategy for AppCert DLLs Persistence via Registry Injection
|
|
2895
|
+
Detection of Local Browser Artifact Access for Reconnaissance
|
|
2896
|
+
Detection of Drive-by Target
|
|
2897
|
+
Detection of Domain or Tenant Policy Modifications via AD and Identity Provider
|
|
2898
|
+
Detection Strategy for Scheduled Transfer and Recurrent Exfiltration Patterns
|
|
2899
|
+
IDE Tunneling Detection via Process, File, and Network Behaviors
|
|
2900
|
+
Detect Logon Script Modifications and Execution
|
|
2901
|
+
Detect Abuse of Dynamic Data Exchange (T1559.002)
|
|
2902
|
+
Detection of Search Closed Sources
|
|
2903
|
+
Detection Strategy for Hidden Files and Directories
|
|
2904
|
+
Detection of Malware Relocation via Suspicious File Movement
|
|
2905
|
+
Detection Strategy for Power Settings Abuse
|
|
2906
|
+
Multi-hop Proxy Behavior via Relay Node Chaining, Onion Routing, and Network Tunneling
|
|
2907
|
+
Behavioral Detection of Masquerading Across Platforms via Metadata and Execution Discrepancy
|
|
2908
|
+
Detection Strategy for T1546.017 - Udev Rules (Linux)
|
|
2909
|
+
Detection of Malvertising
|
|
2910
|
+
Detection Strategy for Runtime Data Manipulation.
|
|
2911
|
+
Detection of Serverless
|
|
2912
|
+
Application Exhaustion Flood Detection Across Platforms
|
|
2913
|
+
Detect malicious IDE extension install/usage and IDE tunneling
|
|
2914
|
+
Detection of Firmware
|
|
2915
|
+
Resource Hijacking Detection Strategy
|
|
2916
|
+
Detection Strategy for Forged Web Credentials
|
|
2917
|
+
Detection Strategy for /proc Memory Injection on Linux
|
|
2918
|
+
Behavioral Detection of Asynchronous Procedure Call (APC) Injection via Remote Thread Queuing
|
|
2919
|
+
Detection Strategy for Dynamic Resolution using Fast Flux DNS
|
|
2920
|
+
Detection of Masqueraded Tasks or Services with Suspicious Naming and Execution
|
|
2921
|
+
Behavioral Detection of Network History and Configuration Tampering
|
|
2922
|
+
Clipboard Data Access with Anomalous Context
|
|
2923
|
+
Behavioral Detection of Thread Execution Hijacking via Thread Suspension and Context Switching
|
|
2924
|
+
Template Injection Detection - Windows
|
|
2925
|
+
Detection Strategy for Compile After Delivery - Source Code to Executable Transformation
|
|
2926
|
+
Abuse of Information Repositories for Data Collection
|
|
2927
|
+
Detection Strategy for Network Sniffing Across Platforms
|
|
2928
|
+
Detect XSL Script Abuse via msxsl and wmic
|
|
2929
|
+
Detect Remote Access via USB Hardware (TinyPilot, PiKVM)
|
|
2930
|
+
Behavioral Detection of Visual Basic Execution (VBS/VBA/VBScript)
|
|
2931
|
+
Behavioral Detection of Unix Shell Execution
|
|
2932
|
+
Detection Strategy for Hijack Execution Flow using Path Interception by PATH Environment Variable.
|
|
2933
|
+
Detection of Acquire Access
|
|
2934
|
+
Detection of Exploits
|
|
2935
|
+
Detection of Email Accounts
|
|
2936
|
+
Detection of Digital Certificates
|
|
2937
|
+
Detect Conditional Access Policy Modification in Identity and Cloud Platforms
|
|
2938
|
+
Detection of Purchase Technical Data
|
|
2939
|
+
Detection of Launch Agent Creation or Modification on macOS
|
|
2940
|
+
Hardware Supply Chain Compromise Detection via Host Status & Boot Integrity Checks
|
|
2941
|
+
Detecting Remote Script Proxy Execution via PubPrn.vbs
|
|
2942
|
+
Detection of Obtain Capabilities
|
|
2943
|
+
Detection Strategy for LC_LOAD_DYLIB Modification in Mach-O Binaries on macOS
|
|
2944
|
+
Detection of Credentials
|
|
2945
|
+
Domain Account Enumeration Across Platforms
|
|
2946
|
+
Detection Strategy for Dynamic Resolution through DNS Calculation
|
|
2947
|
+
Detection Strategy for Downgrade System Image on Network Devices
|
|
2948
|
+
Detection of Search Victim-Owned Websites
|
|
2949
|
+
Detection Strategy for ESXi Hypervisor CLI Abuse
|
|
2950
|
+
Detect Persistence via Malicious Office Add-ins
|
|
2951
|
+
Behavioral Detection of Remote SSH Logins Followed by Post-Login Execution
|
|
2952
|
+
Detection Strategy for Modify System Image on Network Devices
|
|
2953
|
+
Detection Strategy for Subvert Trust Controls using SIP and Trust Provider Hijacking.
|
|
2954
|
+
Detect User Activity Based Sandbox Evasion via Input & Artifact Probing
|
|
2955
|
+
Detection Strategy for Email Hiding Rules
|
|
2956
|
+
Detect Network Provider DLL Registration and Credential Capture
|
|
2957
|
+
Detection Strategy for T1136 - Create Account across platforms
|
|
2958
|
+
Detection Strategy for Hidden Virtual Instance Execution
|
|
2959
|
+
Detection of IP Addresses
|
|
2960
|
+
Behavioral Detection of Cloud Group Enumeration via API and CLI Access
|
|
2961
|
+
Detection of Acquire Infrastructure
|
|
2962
|
+
Detection Strategy for T1550.002 - Pass the Hash (Windows)
|
|
2963
|
+
Detecting Bulk or Anomalous Access to Private Code Repositories via SaaS Platforms
|
|
2964
|
+
Detection of Vulnerability Scanning
|
|
2965
|
+
Detection Strategy for T1528 - Steal Application Access Token
|
|
2966
|
+
Detection of Determine Physical Locations
|
|
2967
|
+
Detection of Stage Capabilities
|
|
2968
|
+
Detect persistence via reopened application plist modification (macOS)
|
|
2969
|
+
Detect Adversary Deobfuscation or Decoding of Files and Payloads
|
|
2970
|
+
Detection of Identify Roles
|
|
2971
|
+
Virtualization/Sandbox Evasion via System Checks across Windows, Linux, macOS
|
|
2972
|
+
Detection of Malware
|
|
2973
|
+
Detect Kerberos Ccache File Theft or Abuse (T1558.005)
|
|
2974
|
+
Detection of Proxy Infrastructure Setup and Traffic Bridging
|
|
2975
|
+
Detection of Remote Service Session Hijacking
|
|
2976
|
+
Behavioral Detection Strategy for Exfiltration Over Symmetric Encrypted Non-C2 Protocol
|
|
2977
|
+
Detection Strategy for Multi-Factor Authentication Request Generation (T1621)
|
|
2978
|
+
Automated File and API Collection Detection Across Platforms
|
|
2979
|
+
Detection Strategy for T1550.003 - Pass the Ticket (Windows)
|
|
2980
|
+
Behavior-chain detection strategy for T1127.001 Trusted Developer Utilities Proxy Execution: MSBuild (Windows)
|
|
2981
|
+
Detection of Social Media Accounts
|
|
2982
|
+
Linux Python Startup Hook Persistence via .pth and Customize Files (T1546.018)
|
|
2983
|
+
Detect Default File Association Hijack via Registry & Execution Correlation on Windows
|
|
2984
|
+
Detect Access to Cloud Instance Metadata API (IaaS)
|
|
2985
|
+
Detecting Code Injection via mavinject.exe (App-V Injector)
|
|
2986
|
+
Detection Strategy for Build Image on Host
|
|
2987
|
+
Detect Gatekeeper Bypass via Quarantine Flag and Trust Control Manipulation
|
|
2988
|
+
Credential Stuffing Detection via Reused Breached Credentials Across Services
|
|
2989
|
+
Detect Winlogon Helper DLL Abuse via Registry and Process Artifacts on Windows
|
|
2990
|
+
Detect Multi-Stage Command and Control Channels
|
|
2991
|
+
Detecting Downgrade Attacks
|
|
2992
|
+
Detection Strategy for Exploitation for Privilege Escalation
|
|
2993
|
+
Detect Access and Parsing of .bash_history Files for Credential Harvesting
|
|
2994
|
+
Account Access Removal via Multi-Platform Audit Correlation
|
|
2995
|
+
Behavioral Detection of PE Injection via Remote Memory Mapping
|
|
2996
|
+
Detect Ingress Tool Transfers via Behavioral Chain
|
|
2997
|
+
Detection Strategy for Addition of Email Delegate Permissions
|
|
2998
|
+
Behavior-chain detection strategy for T1127.003 Trusted Developer Utilities Proxy Execution: JamPlus (Windows)
|
|
2999
|
+
Multi-Platform File and Directory Permissions Modification Detection Strategy
|
|
3000
|
+
Behavioral Detection of Permission Groups Discovery
|
|
3001
|
+
Port-knock → rule/daemon change → first successful connect (T1205.001)
|
|
3002
|
+
Boot or Logon Initialization Scripts Detection Strategy
|
|
3003
|
+
Detect Access and Decryption of Group Policy Preference (GPP) Credentials in SYSVOL
|
|
3004
|
+
Detection Strategy for Traffic Duplication via Mirroring in IaaS and Network Devices
|
|
3005
|
+
Behavioral Detection of Domain Group Discovery
|
|
3006
|
+
Detection of DNS Server
|
|
3007
|
+
Detection Strategy for Login Hook Persistence on macOS
|
|
3008
|
+
Detection Strategy for Indicator Removal from Tools - Post-AV Evasion Modification
|
|
3009
|
+
Detection Strategy for Exfiltration to Text Storage Sites
|
|
3010
|
+
Detection of Search Threat Vendor Data
|
|
3011
|
+
Registry and LSASS Monitoring for Security Support Provider Abuse
|
|
3012
|
+
Detect Hybrid Identity Authentication Process Modification
|
|
3013
|
+
Cross-Platform Detection of Cron Job Abuse for Persistence and Execution
|
|
3014
|
+
Detection of Server
|
|
3015
|
+
Detection Strategy for SVG Smuggling with Script Execution and Delivery Behavior
|
|
3016
|
+
Detect Credential Discovery via Windows Registry Enumeration
|
|
3017
|
+
Detection Strategy for VBA Stomping
|
|
3018
|
+
Cross-Platform Detection of JavaScript Execution Abuse
|
|
3019
|
+
Detection Strategy for Email Spoofing
|
|
3020
|
+
Detection Strategy for MFA Interception via Input Capture and Smart Card Proxying
|
|
3021
|
+
Direct Network Flood Detection across IaaS, Linux, Windows, and macOS
|
|
3022
|
+
Detection of Virtual Private Server
|
|
3023
|
+
Detection Strategy for Event Triggered Execution: AppInit DLLs (Windows)
|
|
3024
|
+
Detection Strategy for Web Service: Dead Drop Resolver
|
|
3025
|
+
User Execution – multi-surface behavior chain (documents/links → helper/unpacker → LOLBIN/child → egress)
|
|
3026
|
+
Detect Office Startup-Based Persistence via Macros, Forms, and Registry Hooks
|
|
3027
|
+
Detection of Web Services
|
|
3028
|
+
Behavioral Detection of Indicator Removal Across Platforms
|
|
3029
|
+
Multi-event Detection Strategy for RDP-Based Remote Logins and Post-Access Activity
|
|
3030
|
+
Password Policy Discovery – cross-platform behavior-chain analytics
|
|
3031
|
+
Abuse of PowerShell for Arbitrary Execution
|
|
3032
|
+
Detection Strategy for Command Obfuscation
|
|
3033
|
+
Detect Subversion of Trust Controls via Certificate, Registry, and Attribute Manipulation
|
|
3034
|
+
Detection Strategy for File Creation or Modification of Boot Files
|
|
3035
|
+
System Discovery via Native and Remote Utilities
|
|
3036
|
+
Detect Persistence via Outlook Custom Forms Triggered by Malicious Email
|
|
3037
|
+
Behavioral Detection of Systemd Timer Abuse for Scheduled Execution
|
|
3038
|
+
Detect browser session hijacking via privilege, handle access, and remote thread into browsers
|
|
3039
|
+
Suspicious Use of Web Services for C2
|
|
3040
|
+
Detection Strategy for System Services: Launchctl
|
|
3041
|
+
Behavior-chain detection for T1134 Access Token Manipulation on Windows
|
|
3042
|
+
Detecting Protocol or Service Impersonation via Anomalous TLS, HTTP Header, and Port Mismatch Correlation
|
|
3043
|
+
Compromised software/update chain (installer/write → first-run/child → egress/signature anomaly)
|
|
3044
|
+
Detect Forged Kerberos Silver Tickets (T1558.002)
|
|
3045
|
+
Windows COM Hijacking Detection via Registry and DLL Load Correlation
|
|
3046
|
+
Behavior-chain detection for T1134.002 Create Process with Token (Windows)
|
|
3047
|
+
Detection of Credential Dumping from LSASS Memory via Access and Dump Sequence
|
|
3048
|
+
Detection Strategy for Data from Network Shared Drive
|
|
3049
|
+
Detection Strategy for Content Injection
|
|
3050
|
+
Obfuscated Binary Unpacking Detection via Behavioral Patterns
|
|
3051
|
+
Detection Strategy for Serverless Execution (T1648)
|
|
3052
|
+
Detection of Group Policy Modifications via AD Object Changes and File Activity
|
|
3053
|
+
Detection of Data Exfiltration via Removable Media
|
|
3054
|
+
Detection Strategy for T1136.003 - Cloud Account Creation across IaaS, IdP, SaaS, Office
|
|
3055
|
+
Detection of Develop Capabilities
|
|
3056
|
+
Detection Strategy for Steal or Forge Authentication Certificates
|
|
3057
|
+
Detection of Active Scanning
|
|
3058
|
+
Detection of Selective Exclusion
|
|
3059
|
+
Suspicious RoleBinding or ClusterRoleBinding Assignment in Kubernetes
|
|
3060
|
+
Detection of System Network Connections Discovery Across Platforms
|
|
3061
|
+
Detection Strategy for Hijack Execution Flow through Services File Permissions Weakness.
|
|
3062
|
+
Detect Modification of macOS Startup Items
|
|
3063
|
+
Detection Strategy for Phishing across platforms.
|
|
3064
|
+
Detection Strategy for Hijack Execution Flow through the KernelCallbackTable on Windows.
|
|
3065
|
+
Detection of Compromise Infrastructure
|
|
3066
|
+
Detection Strategy for T1497 Virtualization/Sandbox Evasion
|
|
3067
|
+
Detection of Malicious Code Execution via InstallUtil.exe
|
|
3068
|
+
Behavioral Detection of WinRM-Based Remote Access
|
|
3069
|
+
Detection of Vulnerabilities
|
|
3070
|
+
Detection of Upload Tool
|
|
3071
|
+
Detection of Persistence Artifact Removal Across Host Platforms
|
|
3072
|
+
Behavioral Detection of T1498 – Network Denial of Service Across Platforms
|
|
3073
|
+
Detect persistent or elevated container services via container runtime or cluster manipulation
|
|
3074
|
+
Removable Media Execution Chain Detection via File and Process Activity
|
|
3075
|
+
Detection Strategy for Hijack Execution Flow using the Windows COR_PROFILER.
|
|
3076
|
+
Detection Strategy for Hidden File System Abuse
|
|
3077
|
+
Behavioral Detection Strategy for Network Service Discovery Across Platforms
|
|
3078
|
+
Remote Desktop Software Execution and Beaconing Detection
|
|
3079
|
+
Detection Strategy for Process Doppelgänging on Windows
|
|
3080
|
+
Behavioral Detection Strategy for WMI Execution Abuse on Windows
|
|
3081
|
+
Detect Persistence via Malicious Outlook Rules
|
|
3082
|
+
Detect Suspicious Access to Private Key Files and Export Attempts Across Platforms
|
|
3083
|
+
Distributed Password Spraying via Authentication Failures Across Multiple Accounts
|
|
3084
|
+
Detection Strategy for Impair Defenses via Impair Command History Logging across OS platforms.
|
|
3085
|
+
Behavioral Detection of Command and Scripting Interpreter Abuse
|
|
3086
|
+
Detection Strategy for Virtual Machine Discovery
|
|
3087
|
+
Detection Strategy for Escape to Host
|
|
3088
|
+
Detection of Client Configurations
|
|
3089
|
+
Cloud Account Enumeration via API, CLI, and Scripting Interfaces
|
|
3090
|
+
Detection Strategy for System Services: Systemctl
|
|
3091
|
+
Detect Modification of Network Device Authentication via Patched System Images
|
|
3092
|
+
Detection of Script-Based Proxy Execution via Signed Microsoft Utilities
|
|
3093
|
+
Detection of Credential Harvesting via Web Portal Modification
|
|
3094
|
+
Credential Dumping via Sensitive Memory and Registry Access Correlation
|
|
3095
|
+
Detection Strategy for Cloud Application Integration
|
|
3096
|
+
Behavior-chain detection for T1132.002 Data Encoding: Non-Standard Encoding across Windows, Linux, macOS, ESXi
|
|
3097
|
+
Local Storage Discovery via Drive Enumeration and Filesystem Probing
|
|
3098
|
+
Detection Strategy for Safe Mode Boot Abuse
|
|
3099
|
+
Detect Abuse of Container APIs for Credential Access
|
|
3100
|
+
Detecting Mshta-based Proxy Execution via Suspicious HTA or Script Invocation
|
|
3101
|
+
Detect Use of Stolen Web Session Cookies Across Platforms
|
|
3102
|
+
Detection Strategy for Netsh Helper DLL Persistence via Registry and Child Process Monitoring (Windows)
|
|
3103
|
+
Detection Strategy for Spearphishing Attachment across OS Platforms
|
|
3104
|
+
Detection Strategy for Process Hollowing on Windows
|
|
3105
|
+
Detection Strategy for Overwritten Process Arguments Masquerading
|
|
3106
|
+
Detection Strategy for T1542.005 Pre-OS Boot: TFTP Boot
|
|
3107
|
+
Detect Local Email Collection via Outlook Data File Access and Command Line Tooling
|
|
3108
|
+
Detect Registry and Startup Folder Persistence (Windows)
|
|
3109
|
+
Detect Suspicious Access to Browser Credential Stores
|
|
3110
|
+
Detection of Gather Victim Network Information
|
|
3111
|
+
Detection Strategy for Hijack Execution Flow using Path Interception by Search Order Hijacking
|
|
3112
|
+
Behavioral Detection of Spoofed GUI Credential Prompts
|
|
3113
|
+
Detection of Cached Domain Credential Dumping via Local Hash Cache Access
|
|
3114
|
+
Detect Time-Based Evasion via Sleep, Timer Loops, and Delayed Execution
|
|
3115
|
+
Detection Strategy for T1505.002 - Transport Agent Abuse (Windows/Linux)
|
|
3116
|
+
Domain Fronting Behavior via Mismatched TLS SNI and HTTP Host Headers
|
|
3117
|
+
Detection of Exfiltration Over Alternate Network Interfaces
|
|
3118
|
+
Behavior-chain, platform-aware detection strategy for T1129 Shared Modules
|
|
3119
|
+
Detection of WHOIS
|
|
3120
|
+
Detection Strategy for Double File Extension Masquerading
|
|
3121
|
+
Detecting Odbcconf Proxy Execution of Malicious DLLs
|
|
3122
|
+
Detection of Wordlist Scanning
|
|
3123
|
+
Detecting Abnormal SharePoint Data Mining by Privileged or Rare Users
|
|
3124
|
+
Detection Strategy for Abuse Elevation Control Mechanism (T1548)
|
|
3125
|
+
Detection of Software
|
|
3126
|
+
Detection of Serverless
|
|
3127
|
+
Detect Abuse of Component Object Model (T1559.001)
|
|
3128
|
+
Behavioral Detection of Process Injection Across Platforms
|
|
3129
|
+
Behavior-chain, platform-aware detection strategy for T1124 System Time Discovery
|
|
3130
|
+
Detection Strategy for Dynamic Resolution across OS Platforms
|
|
3131
|
+
Detection Strategy for Embedded Payloads
|
|
3132
|
+
Behavior-chain detection for T1610 Deploy Container across Docker & Kubernetes control/node planes
|
|
3133
|
+
Detect ARP Cache Poisoning Across Linux, Windows, and macOS
|
|
3134
|
+
Multi-Platform Execution Guardrails Environmental Validation Detection Strategy
|
|
3135
|
+
Detect WMI Event Subscription for Persistence via WmiPrvSE Process and MOF Compilation
|
|
3136
|
+
Detection Strategy for Email Bombing
|
|
3137
|
+
Detect Malicious Modification of Pluggable Authentication Modules (PAM)
|
|
3138
|
+
Detecting .NET COM Registration Abuse via Regsvcs/Regasm
|
|
3139
|
+
Detection Strategy for Obfuscated Files or Information: Binary Padding
|
|
3140
|
+
Detection Strategy for Resource Hijacking: SMS Pumping via SaaS Application Logs
|
|
3141
|
+
Detect Abuse of Windows Time Providers for Persistence
|
|
3142
|
+
Detection Strategy for System Language Discovery
|
|
3143
|
+
Detection Strategy for System Location Discovery
|
|
3144
|
+
Detection of Trust Relationship Modifications in Domain or Tenant Policies
|
|
3145
|
+
Detection Strategy for Remote System Enumeration Behavior
|
|
3146
|
+
Detect DHCP Spoofing Across Linux, Windows, and macOS
|
|
3147
|
+
Detection of Code Repositories
|
|
3148
|
+
Drive-by Compromise — Behavior-based, Multi-platform Detection Strategy (T1189)
|
|
3149
|
+
Detection Strategy for TLS Callback Injection via PE Memory Modification and Hollowing
|
|
3150
|
+
Detection of DNS Server
|
|
3151
|
+
Detection of Abused or Compromised Cloud Accounts for Access and Persistence
|
|
3152
|
+
Windows DACL Manipulation Behavioral Chain Detection Strategy
|
|
3153
|
+
Detection of Compromise Accounts
|
|
3154
|
+
Detection of Malicious Kubernetes CronJob Scheduling
|
|
3155
|
+
Detection of Impair Defenses through Disabled or Modified Tools across OS Platforms.
|
|
3156
|
+
Backup Software Discovery via CLI, Registry, and Process Inspection (T1518.002)
|
|
3157
|
+
Detect Archiving via Library (T1560.002)
|
|
3158
|
+
Detection Strategy for Hijack Execution Flow through Service Registry Premission Weakness.
|
|
3159
|
+
Detection Strategy for T1218.011 Rundll32 Abuse
|
|
3160
|
+
Detection Strategy for T1542.002 Pre-OS Boot: Component Firmware
|
|
3161
|
+
Detect Unauthorized Access to Password Managers
|
|
3162
|
+
Detection Strategy for Steganographic Abuse in File & Script Execution
|
|
3163
|
+
Detection of Data Access and Collection from Removable Media
|
|
3164
|
+
Environmental Keying Discovery-to-Decryption Behavioral Chain Detection Strategy
|
|
3165
|
+
Detection of Valid Account Abuse Across Platforms
|
|
3166
|
+
Detection Strategy for T1547.010 – Port Monitor DLL Persistence via spoolsv.exe (Windows)
|
|
3167
|
+
Detection of Exfiltration Over Unencrypted Non-C2 Protocol
|
|
3168
|
+
Detection Strategy for HTML Smuggling via JavaScript Blob + Dynamic File Drop
|
|
3169
|
+
Detect Abuse of XPC Services (T1559.003)
|
|
3170
|
+
Detection Strategy for Cloud Service Discovery
|
|
3171
|
+
Detection Strategy for AutoHotKey & AutoIT Abuse
|
|
3172
|
+
Boot or Logon Autostart Execution Detection Strategy
|
|
3173
|
+
Detection of NTDS.dit Credential Dumping from Domain Controllers
|
|
3174
|
+
Detect Unsecured Credentials Shared in Chat Messages
|
|
3175
|
+
Detect Screen Capture via Commands and API Calls
|
|
3176
|
+
T1136.002 Detection Strategy - Domain Account Creation Across Platforms
|
|
3177
|
+
Firmware Modification via Flash Tool or Corrupted Firmware Upload
|
|
3178
|
+
Web Shell Detection via Server Behavior and File Execution Chains
|
|
3179
|
+
Detection Strategy for T1542 Pre-OS Boot
|
|
3180
|
+
Detection Strategy for Exfiltration to Code Repository
|
|
3181
|
+
Detection of Disabled or Modified System Firewalls across OS Platforms.
|
|
3182
|
+
Internal Spearphishing via Trusted Accounts
|
|
3183
|
+
Detection of Spoofed User-Agent
|
|
3184
|
+
Detection of Install Digital Certificate
|
|
3185
|
+
Behavioral Detection for Service Stop across Platforms
|
|
3186
|
+
Detection Strategy for LNK Icon Smuggling
|
|
3187
|
+
Detection Strategy for Fileless Storage via Registry, WMI, and Shared Memory
|
|
3188
|
+
Detection Strategy for Modify Cloud Compute Infrastructure
|
|
3189
|
+
Detection of AppleScript-Based Execution on macOS
|
|
3190
|
+
Behavioral Detection Strategy for Use Alternate Authentication Material: Application Access Token (T1550.001)
|
|
3191
|
+
Detection of Local Account Abuse for Initial Access and Persistence
|
|
3192
|
+
Behavioral Detection for T1490 - Inhibit System Recovery
|
|
3193
|
+
Detection of Gather Victim Host Information
|
|
3194
|
+
Detect Access to Unsecured Credential Files Across Platforms
|
|
3195
|
+
Detect Evil Twin Wi-Fi Access Points on Network Devices
|
|
3196
|
+
Detect Abuse of Inter-Process Communication (T1559)
|
|
3197
|
+
Password Guessing via Multi-Source Authentication Failure Correlation
|
|
3198
|
+
Detect Forced SMB/WebDAV Authentication via lure files and outbound NTLM
|
|
3199
|
+
Socket-filter trigger → on-host raw-socket activity → reverse connection (T1205.002)
|
|
3200
|
+
Detection Strategy for VDSO Hijacking on Linux
|
|
3201
|
+
Detection of Gather Victim Identity Information
|
|
3202
|
+
Windows Detection Strategy for T1547.012 - Print Processor DLL Persistence
|
|
3203
|
+
Detection Strategy for Masquerading via Legitimate Resource Name or Location
|
|
3204
|
+
Detection Strategy for Forged SAML Tokens
|
|
3205
|
+
Detection Strategy for Bind Mounts on Linux
|
|
3206
|
+
Detect Modification of Authentication Process via Reversible Encryption
|
|
3207
|
+
Behavioral Detection of Malicious File Deletion
|
|
3208
|
+
User Execution – Malicious Link (click → suspicious egress → download/write → follow-on activity)
|
|
3209
|
+
Detection Strategy for Hide Infrastructure
|
|
3210
|
+
Detecting PowerShell Execution via SyncAppvPublishingServer.vbs Proxy Abuse
|
|
3211
|
+
Abuse of Domain Accounts
|
|
3212
|
+
Detect Active Setup Persistence via StubPath Execution
|
|
3213
|
+
Behavioral Detection of Wi-Fi Discovery Activity
|
|
3214
|
+
Detecting Junk Data in C2 Channels via Behavioral Analysis
|
|
3215
|
+
Behavioral Detection of Unauthorized VNC Remote Control Sessions
|
|
3216
|
+
Suspicious Device Registration via Entra ID or MFA Platform
|
|
3217
|
+
Setuid/Setgid Privilege Abuse Detection (Linux/macOS)
|
|
3218
|
+
Detection of Mail Protocol-Based C2 Activity (SMTP, IMAP, POP3)
|
|
3219
|
+
Detection of Domain Properties
|
|
3220
|
+
Detection Strategy for Weaken Encryption: Reduce Key Space on Network Devices
|
|
3221
|
+
Detection Strategy for Modify Cloud Compute Infrastructure: Create Cloud Instance
|
|
3222
|
+
Detection Strategy for Hidden Artifacts Across Platforms
|
|
3223
|
+
Detection Strategy for Hijack Execution Flow for DLLs
|
|
3224
|
+
Detection Strategy for SSH Session Hijacking
|
|
3225
|
+
Endpoint DoS via OS Exhaustion Flood Detection Strategy
|
|
3226
|
+
Multi-Platform Behavioral Detection for Compute Hijacking
|
|
3227
|
+
Detection Strategy for Boot or Logon Initialization Scripts: RC Scripts
|
|
3228
|
+
Detection Strategy for Lua Scripting Abuse
|
|
3229
|
+
Detection Strategy for Exfiltration Over C2 Channel
|
|
3230
|
+
External Proxy Behavior via Outbound Relay to Intermediate Infrastructure
|
|
3231
|
+
Detection Strategy for T1525 – Implant Internal Image
|
|
3232
|
+
Detect Excessive or Unauthorized Bandwidth Usage for Botnet, Proxyjacking, or Scanning Purposes
|
|
3233
|
+
Detection Strategy for ESXi Administration Command
|
|
3234
|
+
Detection of Malicious Profile Installation via CMSTP.exe
|
|
3235
|
+
Renamed Legitimate Utility Execution with Metadata Mismatch and Suspicious Path
|
|
3236
|
+
Linux Detection Strategy for T1547.013 - XDG Autostart Entries
|
|
3237
|
+
Behavioral Detection of DNS Tunneling and Application Layer Abuse
|
|
3238
|
+
Detection Strategy for Ptrace-Based Process Injection on Linux
|
|
3239
|
+
Detection of LSA Secrets Dumping via Registry and Memory Extraction
|
|
3240
|
+
Detection of Exploits
|
|
3241
|
+
Detection of Server
|
|
3242
|
+
Detection Strategy for T1542.004 Pre-OS Boot: ROMMONkit
|
|
3243
|
+
Right-to-Left Override Masquerading Detection via Filename and Execution Context
|
|
3244
|
+
Detection Strategy for Hidden User Accounts
|
|
3245
|
+
Detection Strategy for Cloud Storage Object Discovery
|
|
3246
|
+
Detection of Data Destruction Across Platforms via Mass Overwrite and Deletion Patterns
|
|
3247
|
+
Behavioral Detection of Event Triggered Execution Across Platforms
|
|
3248
|
+
Detecting Unauthorized Collection from Messaging Applications in SaaS and Office Environments
|
|
3249
|
+
Behavioral Detection Strategy for T1123 Audio Capture Across Windows, Linux, macOS
|
|
3250
|
+
Detection of Suspicious Scheduled Task Creation and Execution on Windows
|
|
3251
|
+
Detection of Windows Service Creation or Modification
|
|
3252
|
+
Detection Strategy for Exfiltration to Cloud Storage
|
|
3253
|
+
Detection of Code Signing Certificates
|
|
3254
|
+
Internal Website and System Content Defacement via UI or Messaging Modifications
|
|
3255
|
+
Behavioral Detection of Input Capture Across Platforms
|
|
3256
|
+
Detection of Spearphishing Link
|
|
3257
|
+
Detection Strategy for Patch System Image on Network Devices
|
|
3258
|
+
Cross-Platform Detection of Scheduled Task/Job Abuse via `at` Utility
|
|
3259
|
+
Behavioral Detection of CLI Abuse on Network Devices
|
|
3260
|
+
Detection of Scanning IP Blocks
|
|
3261
|
+
Detection Strategy for Poisoned Pipeline Execution via SaaS CI/CD Workflows
|
|
3262
|
+
Detect Persistence via Office Test Registry DLL Injection
|
|
3263
|
+
Detection of Tool
|
|
3264
|
+
Detect Forged Kerberos Golden Tickets (T1558.001)
|
|
3265
|
+
Detect Access to macOS Keychain for Credential Theft
|
|
3266
|
+
Detection Strategy for Non-Standard Ports
|
|
3267
|
+
Detection Strategy for Data Manipulation
|
|
3268
|
+
Detection Strategy for Additional Cloud Credentials in IaaS/IdP/SaaS
|
|
3269
|
+
Detection of Gather Victim Org Information
|
|
3270
|
+
Detection of Tainted Content Written to Shared Storage
|
|
3271
|
+
Detection of Proxy Execution via Trusted Signed Binaries Across Platforms
|
|
3272
|
+
Detection of Spearphishing Voice
|
|
3273
|
+
Detection Strategy for Modify Cloud Compute Infrastructure: Delete Cloud Instance
|
|
3274
|
+
Detection of Search Engines
|
|
3275
|
+
Detection Strategy for SSH Key Injection in Authorized Keys
|
|
3276
|
+
Behavior-Based Registry Modification Detection on Windows
|
|
3277
|
+
Detection of Virtual Private Server
|
|
3278
|
+
Detection of Lifecycle Policy Modifications for Triggered Deletion in IaaS Cloud Storage
|
|
3279
|
+
Detect disabled Windows event logging
|
|
3280
|
+
Detection of Default Account Abuse Across Platforms
|
|
3281
|
+
Detection of Multi-Platform File Encryption for Impact
|
|
3282
|
+
Detection of Social Media
|
|
3283
|
+
Detection of Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
|
|
3284
|
+
Detect Access or Search for Unsecured Credentials Across Platforms
|
|
3285
|
+
Detection of Mutex-Based Execution Guardrails Across Platforms
|
|
3286
|
+
Detection of Application Window Enumeration via API or Scripting
|
|
3287
|
+
Behavior-chain detection for T1134.005 Access Token Manipulation: SID-History Injection (Windows)
|
|
3288
|
+
Behavioral Detection Strategy for Remote Service Logins and Post-Access Activity
|
|
3289
|
+
Detection of Event Log Clearing on Windows via Behavioral Chain
|
|
3290
|
+
Detect Screensaver-Based Persistence via Registry and Execution Chains
|
|
3291
|
+
Detecting Electron Application Abuse for Proxy Execution
|
|
3292
|
+
Detection Strategy for Modify Cloud Compute Infrastructure: Modify Cloud Compute Configurations
|
|
3293
|
+
Detection of Network Trust Dependencies
|
|
3294
|
+
Detection of Email Accounts
|
|
3295
|
+
Detect Modification of Authentication Processes Across Platforms
|
|
3296
|
+
Detection Strategy for IFEO Injection on Windows
|
|
3297
|
+
Detection Strategy for T1548.002 – Bypass User Account Control (UAC)
|
|
3298
|
+
Detection of Artificial Intelligence
|
|
3299
|
+
Account Manipulation Behavior Chain Detection
|
|
3300
|
+
Detection of Hardware
|
|
3301
|
+
Encrypted or Encoded File Payload Detection Strategy
|
|
3302
|
+
Detection Strategy for Data Encoding in C2 Channels
|
|
3303
|
+
Detect AS-REP Roasting Attempts (T1558.004)
|
|
3304
|
+
Detection of System Service Discovery Commands Across OS Platforms
|
|
3305
|
+
Detection Strategy for T1505.005 – Terminal Services DLL Modification (Windows)
|
|
3306
|
+
Detection of Credential Harvesting via API Hooking
|
|
3307
|
+
Detection Strategy for Data Transfer Size Limits and Chunked Exfiltration
|
|
3308
|
+
Behavior‑chain detection for T1134.003 Make and Impersonate Token (Windows)
|
|
3309
|
+
Detection Strategy for Subvert Trust Controls via Install Root Certificate.
|
|
3310
|
+
Detection Strategy for Disk Wipe via Direct Disk Access and Destructive Commands
|
|
3311
|
+
Detection Strategy for Exploitation for Defense Evasion
|
|
3312
|
+
Detection Strategy for Hijack Execution Flow: Dynamic Linker Hijacking
|
|
3313
|
+
Automated Exfiltration Detection Strategy
|
|
3314
|
+
Detection of System Process Creation or Modification Across Platforms
|
|
3315
|
+
Multi-Event Behavioral Detection for DCOM-Based Remote Code Execution
|
|
3316
|
+
Detecting OS Credential Dumping via /proc Filesystem Access on Linux
|
|
3317
|
+
Detection Strategy for Reflective Code Loading
|
|
3318
|
+
Detection of Search Open Technical Databases
|
|
3319
|
+
Detection Strategy for Launch Daemon Creation or Modification (macOS)
|
|
3320
|
+
Detection Strategy for Exfiltration Over Webhook
|
|
3321
|
+
Behavioral Detection of Command History Clearing
|
|
3322
|
+
Detection of Domains
|
|
3323
|
+
Detect Bidirectional Web Service C2 Channels via Process & Network Correlation
|
|
3324
|
+
Detection Strategy for Spearphishing via a Service across OS Platforms
|
|
3325
|
+
Exploit Public-Facing Application – multi-signal correlation (request → error → post-exploit process/egress)
|
|
3326
|
+
Behavioral Detection of Local Group Enumeration Across OS Platforms
|
|
3327
|
+
Detection Strategy for Weaken Encryption on Network Devices
|
|
3328
|
+
Detect abuse of Windows BITS Jobs for download, execution and persistence
|
|
3329
|
+
Detection of Threat Intel Vendors
|
|
3330
|
+
Cross-Platform Behavioral Detection of Scheduled Task/Job Abuse
|
|
3331
|
+
Detection Strategy for Kernel Modules and Extensions Autostart Execution
|
|
3332
|
+
Detection of Cloud Accounts
|
|
3333
|
+
Detect Persistence via Office Template Macro Injection or Registry Hijack
|
|
3334
|
+
Detect Obfuscated C2 via Network Traffic Analysis
|
|
3335
|
+
Detection Strategy for Forged Web Cookies
|
|
3336
|
+
User Execution – Malicious File via download/open → spawn chain (T1204.002)
|
|
3337
|
+
Security Software Discovery Across Platforms
|
|
3338
|
+
Detection of Cloud Service Dashboard Usage via GUI-Based Cloud Access
|
|
3339
|
+
Detection Strategy for Masquerading via File Type Modification
|
|
3340
|
+
Enumeration of Global Address Lists via Email Account Discovery
|
|
3341
|
+
Detection Strategy for Extended Attributes Abuse
|
|
3342
|
+
Detect One-Way Web Service Command Channels
|
|
3343
|
+
Behavioral Detection of Obfuscated Files or Information
|
|
3344
|
+
Detection Strategy for Stored Data Manipulation across OS Platforms.
|
|
3345
|
+
Detection Strategy for Stripped Payloads Across Platforms
|
|
3346
|
+
Detection Strategy for Encrypted Channel via Asymmetric Cryptography across OS Platforms
|
|
3347
|
+
Detect Persistence via Outlook Home Page Exploitation
|
|
3348
|
+
Detection strategy for Group Policy Discovery on Windows
|
|
3349
|
+
Detection of Spearphishing Attachment
|
|
3350
|
+
Detection of Web Protocol-Based C2 Over HTTP, HTTPS, or WebSockets
|
|
3351
|
+
Detection Strategy for Financial Theft
|
|
3352
|
+
Detection Strategy for Cloud Service Hijacking via SaaS Abuse
|
|
3353
|
+
Behavior-chain detection for T1135 Network Share Discovery across Windows, Linux, and macOS
|
|
3354
|
+
Detection of DNS/Passive DNS
|
|
3355
|
+
Behavioral Detection of Malicious Cloud API Scripting
|
|
3356
|
+
Detect Archiving via Utility (T1560.001)
|
|
3357
|
+
Detect unauthorized or suspicious Hardware Additions (USB/Thunderbolt/Network)
|
|
3358
|
+
Detection Strategy for Impair Defenses Across Platforms
|
|
3359
|
+
Detection Strategy for T1542.001 Pre-OS Boot: System Firmware
|
|
3360
|
+
Detection of Local Data Staging Prior to Exfiltration
|
|
3361
|
+
Behavior-chain detection for T1133 External Remote Services across Windows, Linux, macOS, Containers
|
|
3362
|
+
Multi-Platform Detection Strategy for T1678 - Delay Execution
|
|
3363
|
+
Detection Strategy for Container Administration Command Abuse
|
|
3364
|
+
Behavioral Detection of DLL Injection via Windows API
|
|
3365
|
+
Behavior-chain, platform-aware detection strategy for T1125 Video Capture
|
|
3366
|
+
Detection of Adversary Abuse of Software Deployment Tools
|
|
3367
|
+
Detection of Malicious or Unauthorized Software Extensions
|
|
3368
|
+
Behavior-chain detection for T1134.004 Access Token Manipulation: Parent PID Spoofing (Windows)
|
|
3369
|
+
Detection Strategy for Spearphishing Voice across OS platforms
|
|
3370
|
+
Detection of Adversary Use of Unused or Unsupported Cloud Regions (IaaS)
|
|
3371
|
+
Behavior-Chain Detection for Remote Access Tools (Tool-Agnostic)
|
|
3372
|
+
Behavior-chain detection strategy for T1127.002 Trusted Developer Utilities Proxy Execution: ClickOnce (Windows)
|
|
3373
|
+
Supply-chain tamper in dependencies/dev-tools (manager→write/install→first-run→egress)
|
|
3374
|
+
Detection Strategy for Hijack Execution Flow: Dylib Hijacking
|
|
3375
|
+
Detect MFA Modification or Disabling Across Platforms
|
|
3376
|
+
Detection Strategy for Masquerading via Breaking Process Trees
|
|
3377
|
+
Detection Strategy for Spearphishing Links
|
|
3378
|
+
Behavioral Detection Strategy for Exfiltration Over Alternative Protocol
|
|
3379
|
+
Detection of CDNs
|
|
3380
|
+
Detect Archiving via Custom Method (T1560.003)
|
|
3381
|
+
Post-Credential Dump Password Cracking Detection via Suspicious File Access and Hash Analysis Tools
|
|
3382
|
+
Behavioral Detection of Fallback or Alternate C2 Channels
|
|
3383
|
+
Detection of Direct Volume Access for File System Evasion
|
|
3384
|
+
Exploitation of Remote Services – multi-platform lateral movement detection
|
|
3385
|
+
User Execution – Malicious Image (containers & IaaS) – pull/run → start → anomalous behavior (T1204.003)
|
|
3386
|
+
Detect Code Signing Policy Modification (Windows & macOS)
|
|
3387
|
+
Detection Strategy for System Services Service Execution
|
|
3388
|
+
Detection Strategy for Rogue Domain Controller (DCShadow) Registration and Replication Abuse
|
|
3389
|
+
Detection Strategy for Disable or Modify Cloud Logs
|
|
3390
|
+
Detect Suspicious Access to securityd Memory for Credential Extraction
|
|
3391
|
+
Detect Shell Configuration Modification for Persistence via Event-Triggered Execution
|
|
3392
|
+
Detection Strategy for Event Triggered Execution via emond on macOS
|
|
3393
|
+
Detection Strategy for Network Boundary Bridging
|
|
3394
|
+
Multi-Platform Software Discovery Behavior Chain
|
|
3395
|
+
Detection Strategy for Masquerading via Account Name Similarity
|
|
3396
|
+
TCC Database Manipulation via Launchctl and Unprotected SIP
|
|
3397
|
+
Detect Kerberoasting Attempts (T1558.003)
|
|
3398
|
+
Peripheral Device Enumeration via System Utilities and API Calls
|
|
3399
|
+
Detection Strategy for PowerShell Profile Persistence via profile.ps1 Modification
|
|
3400
|
+
Detection of Web Services
|
|
3401
|
+
Detection Strategy for Network Device Configuration Dump via Config Repositories
|
|
3402
|
+
Indirect Command Execution – Windows utility abuse behavior chain
|
|
3403
|
+
Detection Strategy for T1547.015 – Login Items on macOS
|
|
3404
|
+
Detection Strategy for Compressed Payload Creation and Execution
|
|
3405
|
+
Detection of Direct VM Console Access via Cloud-Native Methods
|
|
3406
|
+
Detecting MMC (.msc) Proxy Execution and Malicious COM Activation
|
|
3407
|
+
Behavior-chain, platform-aware detection strategy for T1127 Trusted Developer Utilities Proxy Execution (Windows)
|
|
3408
|
+
Detection Strategy for Input Injection
|
|
3409
|
+
Detection of Identify Business Tempo
|
|
3410
|
+
Detection Strategy for Modify Cloud Compute Infrastructure: Revert Cloud Instance
|
|
3411
|
+
Email Forwarding Rule Abuse Detection Across Platforms
|
|
3412
|
+
Detect Unauthorized Access to Cloud Secrets Management Stores
|
|
3413
|
+
Detection of USB-Based Data Exfiltration
|
|
3414
|
+
Behavioral Detection of Remote Cloud Logins via Valid Accounts
|
|
3415
|
+
Detect Malicious Password Filter DLL Registration
|
|
3416
|
+
Detection Strategy for File/Path Exclusions
|
|
3417
|
+
Detection Strategy for Wi-Fi Networks
|
|
3418
|
+
Cross-Platform Behavioral Detection of File Timestomping via Metadata Tampering
|
|
3419
|
+
Detection of Scan Databases
|
|
3420
|
+
Detection of Upload Malware
|
|
3421
|
+
Detection of Suspicious Compiled HTML File Execution via hh.exe
|
|
3422
|
+
Detection of Network Security Appliances
|
|
3423
|
+
Detect unauthorized LSASS driver persistence via LSA plugin abuse (Windows)
|
|
3424
|
+
Invalid Code Signature Execution Detection via Metadata and Behavioral Context
|
|
3425
|
+
Detection Strategy for Cloud Administration Command
|
|
3426
|
+
Detection Strategy for Modify Cloud Resource Hierarchy
|
|
3427
|
+
Enumeration of User or Account Information Across Platforms
|
|
3428
|
+
Behavioral Detection of Keylogging Activity Across Platforms
|
|
3429
|
+
Detection for Spoofing Security Alerting across OS Platforms
|
|
3430
|
+
Detection Strategy for Device Driver Discovery
|
|
3431
|
+
Detection Strategy for Data from Configuration Repository on Network Devices
|
|
3432
|
+
Detection Strategy for Protocol Tunneling accross OS platforms.
|
|
3433
|
+
Credential Access
|
|
3434
|
+
Execution
|
|
3435
|
+
Impact
|
|
3436
|
+
Persistence
|
|
3437
|
+
Privilege Escalation
|
|
3438
|
+
Lateral Movement
|
|
3439
|
+
Defense Evasion
|
|
3440
|
+
Exfiltration
|
|
3441
|
+
Discovery
|
|
3442
|
+
Collection
|
|
3443
|
+
Resource Development
|
|
3444
|
+
Reconnaissance
|
|
3445
|
+
Command and Control
|
|
3446
|
+
Initial Access
|
|
3447
|
+
Extra Window Memory Injection
|
|
3448
|
+
Scheduled Task
|
|
3449
|
+
Socket Filters
|
|
3450
|
+
Archive via Utility
|
|
3451
|
+
VNC
|
|
3452
|
+
Windows Management Instrumentation
|
|
3453
|
+
Screen Capture
|
|
3454
|
+
Fileless Storage
|
|
3455
|
+
Boot or Logon Initialization Scripts
|
|
3456
|
+
Adversary-in-the-Middle
|
|
3457
|
+
System Owner/User Discovery
|
|
3458
|
+
Acquire Infrastructure
|
|
3459
|
+
Rundll32
|
|
3460
|
+
Container and Resource Discovery
|
|
3461
|
+
Serverless
|
|
3462
|
+
Standard Encoding
|
|
3463
|
+
Embedded Payloads
|
|
3464
|
+
Pluggable Authentication Modules
|
|
3465
|
+
Gather Victim Host Information
|
|
3466
|
+
Digital Certificates
|
|
3467
|
+
Keylogging
|
|
3468
|
+
File/Path Exclusions
|
|
3469
|
+
Linux and Mac File and Directory Permissions Modification
|
|
3470
|
+
Password Guessing
|
|
3471
|
+
PubPrn
|
|
3472
|
+
Purchase Technical Data
|
|
3473
|
+
OS Credential Dumping
|
|
3474
|
+
Shared Modules
|
|
3475
|
+
Data from Configuration Repository
|
|
3476
|
+
Disk Structure Wipe
|
|
3477
|
+
Direct Network Flood
|
|
3478
|
+
Path Interception by PATH Environment Variable
|
|
3479
|
+
Sharepoint
|
|
3480
|
+
Direct Volume Access
|
|
3481
|
+
Artificial Intelligence
|
|
3482
|
+
Email Hiding Rules
|
|
3483
|
+
External Defacement
|
|
3484
|
+
Encrypted/Encoded File
|
|
3485
|
+
IP Addresses
|
|
3486
|
+
OS Exhaustion Flood
|
|
3487
|
+
Rootkit
|
|
3488
|
+
JavaScript
|
|
3489
|
+
DNS
|
|
3490
|
+
Lifecycle-Triggered Deletion
|
|
3491
|
+
Audio Capture
|
|
3492
|
+
Create or Modify System Process
|
|
3493
|
+
External Remote Services
|
|
3494
|
+
LC_LOAD_DYLIB Addition
|
|
3495
|
+
Steal Web Session Cookie
|
|
3496
|
+
Container Orchestration Job
|
|
3497
|
+
Domain Generation Algorithms
|
|
3498
|
+
Double File Extension
|
|
3499
|
+
Bypass User Account Control
|
|
3500
|
+
SMS Pumping
|
|
3501
|
+
Internet Connection Discovery
|
|
3502
|
+
Sudo and Sudo Caching
|
|
3503
|
+
Archive via Custom Method
|
|
3504
|
+
Modify Cloud Compute Infrastructure
|
|
3505
|
+
Network Devices
|
|
3506
|
+
Permission Groups Discovery
|
|
3507
|
+
Email Collection
|
|
3508
|
+
Security Account Manager
|
|
3509
|
+
WHOIS
|
|
3510
|
+
System Firmware
|
|
3511
|
+
Search Victim-Owned Websites
|
|
3512
|
+
Cloud Groups
|
|
3513
|
+
Services Registry Permissions Weakness
|
|
3514
|
+
DNS/Passive DNS
|
|
3515
|
+
Application Exhaustion Flood
|
|
3516
|
+
Compromise Software Dependencies and Development Tools
|
|
3517
|
+
Digital Certificates
|
|
3518
|
+
DNS Server
|
|
3519
|
+
Disk Wipe
|
|
3520
|
+
DNS
|
|
3521
|
+
Cloud Instance Metadata API
|
|
3522
|
+
Securityd Memory
|
|
3523
|
+
Group Policy Discovery
|
|
3524
|
+
Bootkit
|
|
3525
|
+
Data from Removable Media
|
|
3526
|
+
Mavinject
|
|
3527
|
+
Local Data Staging
|
|
3528
|
+
Match Legitimate Resource Name or Location
|
|
3529
|
+
Digital Certificates
|
|
3530
|
+
Stored Data Manipulation
|
|
3531
|
+
Password Cracking
|
|
3532
|
+
Local Email Collection
|
|
3533
|
+
Keychain
|
|
3534
|
+
Boot or Logon Autostart Execution
|
|
3535
|
+
LSA Secrets
|
|
3536
|
+
SAML Tokens
|
|
3537
|
+
Masquerade File Type
|
|
3538
|
+
Service Stop
|
|
3539
|
+
Malware
|
|
3540
|
+
Device Driver Discovery
|
|
3541
|
+
Domain Account
|
|
3542
|
+
Hide Artifacts
|
|
3543
|
+
Dynamic Data Exchange
|
|
3544
|
+
Malicious File
|
|
3545
|
+
Identify Business Tempo
|
|
3546
|
+
Publish/Subscribe Protocols
|
|
3547
|
+
Hardware
|
|
3548
|
+
Taint Shared Content
|
|
3549
|
+
Trust Modification
|
|
3550
|
+
Databases
|
|
3551
|
+
Symmetric Cryptography
|
|
3552
|
+
Local Account
|
|
3553
|
+
Social Media Accounts
|
|
3554
|
+
Browser Extensions
|
|
3555
|
+
Safe Mode Boot
|
|
3556
|
+
TFTP Boot
|
|
3557
|
+
Windows Service
|
|
3558
|
+
Fast Flux DNS
|
|
3559
|
+
System Checks
|
|
3560
|
+
Cron
|
|
3561
|
+
Domain Groups
|
|
3562
|
+
Vulnerabilities
|
|
3563
|
+
Spearphishing Link
|
|
3564
|
+
Clear Linux or Mac System Logs
|
|
3565
|
+
Application or System Exploitation
|
|
3566
|
+
Office Application Startup
|
|
3567
|
+
InstallUtil
|
|
3568
|
+
Spearphishing Link
|
|
3569
|
+
SSH
|
|
3570
|
+
Additional Cloud Roles
|
|
3571
|
+
Print Processors
|
|
3572
|
+
Spearphishing Attachment
|
|
3573
|
+
Stripped Payloads
|
|
3574
|
+
Component Object Model
|
|
3575
|
+
DLL
|
|
3576
|
+
Automated Collection
|
|
3577
|
+
Clipboard Data
|
|
3578
|
+
Proc Filesystem
|
|
3579
|
+
Botnet
|
|
3580
|
+
Password Managers
|
|
3581
|
+
Gatekeeper Bypass
|
|
3582
|
+
ESXi Administration Command
|
|
3583
|
+
Drive-by Target
|
|
3584
|
+
System Service Discovery
|
|
3585
|
+
Network Sniffing
|
|
3586
|
+
Code Signing
|
|
3587
|
+
Data from Cloud Storage
|
|
3588
|
+
Runtime Data Manipulation
|
|
3589
|
+
Credentials in Registry
|
|
3590
|
+
Network Share Discovery
|
|
3591
|
+
Peripheral Device Discovery
|
|
3592
|
+
Break Process Trees
|
|
3593
|
+
Network Topology
|
|
3594
|
+
Code Signing Certificates
|
|
3595
|
+
Windows File and Directory Permissions Modification
|
|
3596
|
+
Add-ins
|
|
3597
|
+
System Information Discovery
|
|
3598
|
+
Application Layer Protocol
|
|
3599
|
+
AppDomainManager
|
|
3600
|
+
Remote Data Staging
|
|
3601
|
+
Additional Container Cluster Roles
|
|
3602
|
+
Scheduled Task/Job
|
|
3603
|
+
Msiexec
|
|
3604
|
+
Network Trust Dependencies
|
|
3605
|
+
Reflection Amplification
|
|
3606
|
+
Password Filter DLL
|
|
3607
|
+
Terminal Services DLL
|
|
3608
|
+
Software Extensions
|
|
3609
|
+
Service Exhaustion Flood
|
|
3610
|
+
Compromise Hardware Supply Chain
|
|
3611
|
+
Native API
|
|
3612
|
+
Ccache Files
|
|
3613
|
+
Clear Network Connection History and Configurations
|
|
3614
|
+
AS-REP Roasting
|
|
3615
|
+
Virtual Private Server
|
|
3616
|
+
AutoHotKey & AutoIT
|
|
3617
|
+
Clear Command History
|
|
3618
|
+
Replication Through Removable Media
|
|
3619
|
+
Data from Local System
|
|
3620
|
+
Deobfuscate/Decode Files or Information
|
|
3621
|
+
Outlook Rules
|
|
3622
|
+
Impair Defenses
|
|
3623
|
+
Cloud Accounts
|
|
3624
|
+
Email Accounts
|
|
3625
|
+
Additional Local or Domain Groups
|
|
3626
|
+
Upload Malware
|
|
3627
|
+
Supply Chain Compromise
|
|
3628
|
+
Exploit Public-Facing Application
|
|
3629
|
+
Steal or Forge Kerberos Tickets
|
|
3630
|
+
Credentials from Password Stores
|
|
3631
|
+
Exfiltration Over Web Service
|
|
3632
|
+
Remote Access Tools
|
|
3633
|
+
Domains
|
|
3634
|
+
Archive via Library
|
|
3635
|
+
Thread Execution Hijacking
|
|
3636
|
+
Masquerading
|
|
3637
|
+
Application Shimming
|
|
3638
|
+
Unsecured Credentials
|
|
3639
|
+
Port Monitors
|
|
3640
|
+
Clear Mailbox Data
|
|
3641
|
+
Login Hook
|
|
3642
|
+
Content Injection
|
|
3643
|
+
Process Injection
|
|
3644
|
+
Exfiltration Over Webhook
|
|
3645
|
+
Traffic Signaling
|
|
3646
|
+
Direct Cloud VM Connections
|
|
3647
|
+
System Binary Proxy Execution
|
|
3648
|
+
Timestomp
|
|
3649
|
+
Evil Twin
|
|
3650
|
+
Reflective Code Loading
|
|
3651
|
+
Wi-Fi Discovery
|
|
3652
|
+
Mutual Exclusion
|
|
3653
|
+
Ignore Process Interrupts
|
|
3654
|
+
Escape to Host
|
|
3655
|
+
Shortcut Modification
|
|
3656
|
+
Application Window Discovery
|
|
3657
|
+
Email Account
|
|
3658
|
+
Time Based Checks
|
|
3659
|
+
CMSTP
|
|
3660
|
+
SSH Hijacking
|
|
3661
|
+
Disable Windows Event Logging
|
|
3662
|
+
Scheduled Transfer
|
|
3663
|
+
SMB/Windows Admin Shares
|
|
3664
|
+
Protocol Tunneling
|
|
3665
|
+
Control Panel
|
|
3666
|
+
Network Address Translation Traversal
|
|
3667
|
+
Upload Tool
|
|
3668
|
+
Security Support Provider
|
|
3669
|
+
Overwrite Process Arguments
|
|
3670
|
+
Use Alternate Authentication Material
|
|
3671
|
+
Exfiltration Over Other Network Medium
|
|
3672
|
+
Network Device Configuration Dump
|
|
3673
|
+
Gather Victim Identity Information
|
|
3674
|
+
Disable or Modify System Firewall
|
|
3675
|
+
Archive Collected Data
|
|
3676
|
+
SIP and Trust Provider Hijacking
|
|
3677
|
+
Browser Session Hijacking
|
|
3678
|
+
Remote Services
|
|
3679
|
+
Mail Protocols
|
|
3680
|
+
Hybrid Identity
|
|
3681
|
+
Vulnerability Scanning
|
|
3682
|
+
Cloud API
|
|
3683
|
+
Search Open Technical Databases
|
|
3684
|
+
Electron Applications
|
|
3685
|
+
Disable or Modify Linux Audit System
|
|
3686
|
+
Code Signing Policy Modification
|
|
3687
|
+
Deploy Container
|
|
3688
|
+
Modify Registry
|
|
3689
|
+
Launch Daemon
|
|
3690
|
+
Cloud Infrastructure Discovery
|
|
3691
|
+
Credentials from Web Browsers
|
|
3692
|
+
Path Interception by Search Order Hijacking
|
|
3693
|
+
Remote Service Session Hijacking
|
|
3694
|
+
Binary Padding
|
|
3695
|
+
Web Shell
|
|
3696
|
+
Group Policy Modification
|
|
3697
|
+
Browser Information Discovery
|
|
3698
|
+
Private Keys
|
|
3699
|
+
Server
|
|
3700
|
+
Windows Remote Management
|
|
3701
|
+
Exfiltration Over Bluetooth
|
|
3702
|
+
Default Accounts
|
|
3703
|
+
Time Providers
|
|
3704
|
+
Dynamic Linker Hijacking
|
|
3705
|
+
Local Account
|
|
3706
|
+
Search Threat Vendor Data
|
|
3707
|
+
Input Injection
|
|
3708
|
+
Communication Through Removable Media
|
|
3709
|
+
Clear Windows Event Logs
|
|
3710
|
+
Email Accounts
|
|
3711
|
+
LLMNR/NBT-NS Poisoning and SMB Relay
|
|
3712
|
+
File and Directory Permissions Modification
|
|
3713
|
+
LSASS Memory
|
|
3714
|
+
IDE Extensions
|
|
3715
|
+
Active Scanning
|
|
3716
|
+
Junk Code Insertion
|
|
3717
|
+
Abuse Elevation Control Mechanism
|
|
3718
|
+
Create Process with Token
|
|
3719
|
+
Setuid and Setgid
|
|
3720
|
+
Winlogon Helper DLL
|
|
3721
|
+
Distributed Component Object Model
|
|
3722
|
+
Password Spraying
|
|
3723
|
+
External Proxy
|
|
3724
|
+
Web Portal Capture
|
|
3725
|
+
Email Addresses
|
|
3726
|
+
Spearphishing Voice
|
|
3727
|
+
Cached Domain Credentials
|
|
3728
|
+
SSH Authorized Keys
|
|
3729
|
+
Virtual Machine Discovery
|
|
3730
|
+
Network Security Appliances
|
|
3731
|
+
Image File Execution Options Injection
|
|
3732
|
+
Odbcconf
|
|
3733
|
+
Search Engines
|
|
3734
|
+
Business Relationships
|
|
3735
|
+
Temporary Elevated Cloud Access
|
|
3736
|
+
Video Capture
|
|
3737
|
+
Process Doppelgänging
|
|
3738
|
+
System Network Configuration Discovery
|
|
3739
|
+
Delete Cloud Instance
|
|
3740
|
+
Code Repositories
|
|
3741
|
+
Executable Installer File Permissions Weakness
|
|
3742
|
+
Accessibility Features
|
|
3743
|
+
Account Discovery
|
|
3744
|
+
Proxy
|
|
3745
|
+
Command and Scripting Interpreter
|
|
3746
|
+
Malicious Library
|
|
3747
|
+
Indicator Blocking
|
|
3748
|
+
Domain Account
|
|
3749
|
+
Extended Attributes
|
|
3750
|
+
Employee Names
|
|
3751
|
+
Domain Trust Discovery
|
|
3752
|
+
Golden Ticket
|
|
3753
|
+
Automated Exfiltration
|
|
3754
|
+
Client Configurations
|
|
3755
|
+
Disable or Modify Cloud Firewall
|
|
3756
|
+
IDE Tunneling
|
|
3757
|
+
Malware
|
|
3758
|
+
SVG Smuggling
|
|
3759
|
+
Component Firmware
|
|
3760
|
+
Indicator Removal
|
|
3761
|
+
Exfiltration Over Symmetric Encrypted Non-C2 Protocol
|
|
3762
|
+
Office Template Macros
|
|
3763
|
+
Virtual Private Server
|
|
3764
|
+
Confluence
|
|
3765
|
+
Pass the Ticket
|
|
3766
|
+
File and Directory Discovery
|
|
3767
|
+
Dynamic Resolution
|
|
3768
|
+
Masquerade Task or Service
|
|
3769
|
+
Asynchronous Procedure Call
|
|
3770
|
+
Traffic Duplication
|
|
3771
|
+
Plist File Modification
|
|
3772
|
+
JamPlus
|
|
3773
|
+
AppCert DLLs
|
|
3774
|
+
Email Forwarding Rule
|
|
3775
|
+
Data Staged
|
|
3776
|
+
Steal or Forge Authentication Certificates
|
|
3777
|
+
Device Registration
|
|
3778
|
+
System Network Connections Discovery
|
|
3779
|
+
Compromise Infrastructure
|
|
3780
|
+
Mark-of-the-Web Bypass
|
|
3781
|
+
Pre-OS Boot
|
|
3782
|
+
Portable Executable Injection
|
|
3783
|
+
Verclsid
|
|
3784
|
+
Compromise Accounts
|
|
3785
|
+
Launchctl
|
|
3786
|
+
Botnet
|
|
3787
|
+
Network Device CLI
|
|
3788
|
+
Shell History
|
|
3789
|
+
Downgrade Attack
|
|
3790
|
+
XPC Services
|
|
3791
|
+
Virtualization/Sandbox Evasion
|
|
3792
|
+
Web Service
|
|
3793
|
+
Credentials In Files
|
|
3794
|
+
Mshta
|
|
3795
|
+
Login Items
|
|
3796
|
+
Stage Capabilities
|
|
3797
|
+
Link Target
|
|
3798
|
+
Multi-Stage Channels
|
|
3799
|
+
Financial Theft
|
|
3800
|
+
Execution Guardrails
|
|
3801
|
+
Web Cookies
|
|
3802
|
+
Log Enumeration
|
|
3803
|
+
Token Impersonation/Theft
|
|
3804
|
+
Cloud Services
|
|
3805
|
+
Port Knocking
|
|
3806
|
+
LNK Icon Smuggling
|
|
3807
|
+
Web Services
|
|
3808
|
+
Steal Application Access Token
|
|
3809
|
+
Spearphishing Attachment
|
|
3810
|
+
Additional Cloud Credentials
|
|
3811
|
+
User Execution
|
|
3812
|
+
Internal Defacement
|
|
3813
|
+
Hidden Users
|
|
3814
|
+
Make and Impersonate Token
|
|
3815
|
+
Group Policy Preferences
|
|
3816
|
+
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
|
|
3817
|
+
Cloud Account
|
|
3818
|
+
Process Discovery
|
|
3819
|
+
Impair Command History Logging
|
|
3820
|
+
Network Provider DLL
|
|
3821
|
+
Windows Management Instrumentation Event Subscription
|
|
3822
|
+
CDNs
|
|
3823
|
+
User Activity Based Checks
|
|
3824
|
+
Cloud Accounts
|
|
3825
|
+
Software Deployment Tools
|
|
3826
|
+
Exfiltration Over C2 Channel
|
|
3827
|
+
Parent PID Spoofing
|
|
3828
|
+
Gather Victim Org Information
|
|
3829
|
+
Forge Web Credentials
|
|
3830
|
+
Multi-Factor Authentication Request Generation
|
|
3831
|
+
Compromise Host Software Binary
|
|
3832
|
+
Chat Messages
|
|
3833
|
+
PowerShell
|
|
3834
|
+
Change Default File Association
|
|
3835
|
+
VDSO Hijacking
|
|
3836
|
+
File Transfer Protocols
|
|
3837
|
+
Exploitation for Credential Access
|
|
3838
|
+
Emond
|
|
3839
|
+
One-Way Communication
|
|
3840
|
+
Gather Victim Network Information
|
|
3841
|
+
Exploitation of Remote Services
|
|
3842
|
+
Registry Run Keys / Startup Folder
|
|
3843
|
+
Trusted Relationship
|
|
3844
|
+
Cloud Account
|
|
3845
|
+
Local Groups
|
|
3846
|
+
Search Open Websites/Domains
|
|
3847
|
+
Disable or Modify Network Device Firewall
|
|
3848
|
+
Account Manipulation
|
|
3849
|
+
Exfiltration Over Alternative Protocol
|
|
3850
|
+
Kernel Modules and Extensions
|
|
3851
|
+
Delay Execution
|
|
3852
|
+
GUI Input Capture
|
|
3853
|
+
Tool
|
|
3854
|
+
Exfiltration over USB
|
|
3855
|
+
KernelCallbackTable
|
|
3856
|
+
Search Closed Sources
|
|
3857
|
+
Systemd Timers
|
|
3858
|
+
Phishing
|
|
3859
|
+
ROMMONkit
|
|
3860
|
+
Compiled HTML File
|
|
3861
|
+
Compute Hijacking
|
|
3862
|
+
Network Share Connection Removal
|
|
3863
|
+
Multi-hop Proxy
|
|
3864
|
+
Brute Force
|
|
3865
|
+
Unix Shell
|
|
3866
|
+
Outlook Forms
|
|
3867
|
+
Disable or Modify Tools
|
|
3868
|
+
Data Manipulation
|
|
3869
|
+
Inter-Process Communication
|
|
3870
|
+
Data Obfuscation
|
|
3871
|
+
Data from Network Shared Drive
|
|
3872
|
+
Web Services
|
|
3873
|
+
Modify System Image
|
|
3874
|
+
Hijack Execution Flow
|
|
3875
|
+
Browser Fingerprint
|
|
3876
|
+
Lua
|
|
3877
|
+
Indicator Removal from Tools
|
|
3878
|
+
Malicious Image
|
|
3879
|
+
Container Service
|
|
3880
|
+
Valid Accounts
|
|
3881
|
+
Non-Standard Port
|
|
3882
|
+
Social Media Accounts
|
|
3883
|
+
Process Hollowing
|
|
3884
|
+
Exploitation for Privilege Escalation
|
|
3885
|
+
Resource Forking
|
|
3886
|
+
Account Access Removal
|
|
3887
|
+
Credential Stuffing
|
|
3888
|
+
Obfuscated Files or Information
|
|
3889
|
+
Multi-Factor Authentication
|
|
3890
|
+
Remote Email Collection
|
|
3891
|
+
IIS Components
|
|
3892
|
+
Invalid Code Signature
|
|
3893
|
+
Run Virtual Instance
|
|
3894
|
+
Polymorphic Code
|
|
3895
|
+
Password Policy Discovery
|
|
3896
|
+
Event Triggered Execution
|
|
3897
|
+
Unix Shell Configuration Modification
|
|
3898
|
+
Forced Authentication
|
|
3899
|
+
SID-History Injection
|
|
3900
|
+
Network Boundary Bridging
|
|
3901
|
+
Data Encrypted for Impact
|
|
3902
|
+
Subvert Trust Controls
|
|
3903
|
+
Elevated Execution with Prompt
|
|
3904
|
+
Firmware
|
|
3905
|
+
Encrypted Channel
|
|
3906
|
+
Authentication Package
|
|
3907
|
+
Regsvr32
|
|
3908
|
+
Exfiltration to Text Storage Sites
|
|
3909
|
+
Software
|
|
3910
|
+
Input Capture
|
|
3911
|
+
Spearphishing Voice
|
|
3912
|
+
Exploits
|
|
3913
|
+
Social Media
|
|
3914
|
+
Customer Relationship Management Software
|
|
3915
|
+
Component Object Model Hijacking
|
|
3916
|
+
Credentials
|
|
3917
|
+
Compromise Software Supply Chain
|
|
3918
|
+
Rename Legitimate Utilities
|
|
3919
|
+
Bidirectional Communication
|
|
3920
|
+
Exploitation for Client Execution
|
|
3921
|
+
Wordlist Scanning
|
|
3922
|
+
Spoof Security Alerting
|
|
3923
|
+
Outlook Home Page
|
|
3924
|
+
Asymmetric Cryptography
|
|
3925
|
+
Exfiltration to Cloud Storage
|
|
3926
|
+
Lateral Tool Transfer
|
|
3927
|
+
Path Interception by Unquoted Path
|
|
3928
|
+
Install Digital Certificate
|
|
3929
|
+
Startup Items
|
|
3930
|
+
System Language Discovery
|
|
3931
|
+
Non-Application Layer Protocol
|
|
3932
|
+
Container CLI/API
|
|
3933
|
+
Steganography
|
|
3934
|
+
DNS Server
|
|
3935
|
+
Protocol or Service Impersonation
|
|
3936
|
+
Query Registry
|
|
3937
|
+
Data Transfer Size Limits
|
|
3938
|
+
Web Session Cookie
|
|
3939
|
+
Domain Accounts
|
|
3940
|
+
Regsvcs/Regasm
|
|
3941
|
+
Install Root Certificate
|
|
3942
|
+
Network Logon Script
|
|
3943
|
+
Endpoint Denial of Service
|
|
3944
|
+
Compile After Delivery
|
|
3945
|
+
System Location Discovery
|
|
3946
|
+
VBA Stomping
|
|
3947
|
+
BITS Jobs
|
|
3948
|
+
MSBuild
|
|
3949
|
+
Impersonation
|
|
3950
|
+
Modify Cloud Compute Configurations
|
|
3951
|
+
Domain Fronting
|
|
3952
|
+
ARP Cache Poisoning
|
|
3953
|
+
Disable or Modify Cloud Logs
|
|
3954
|
+
Security Software Discovery
|
|
3955
|
+
Hidden Window
|
|
3956
|
+
ClickOnce
|
|
3957
|
+
Python
|
|
3958
|
+
Identify Roles
|
|
3959
|
+
Data Encoding
|
|
3960
|
+
AppInit DLLs
|
|
3961
|
+
Phishing for Information
|
|
3962
|
+
Resource Hijacking
|
|
3963
|
+
Establish Accounts
|
|
3964
|
+
Obtain Capabilities
|
|
3965
|
+
Conditional Access Policies
|
|
3966
|
+
Create Cloud Instance
|
|
3967
|
+
Cloud Secrets Management Stores
|
|
3968
|
+
Code Repositories
|
|
3969
|
+
Transmitted Data Manipulation
|
|
3970
|
+
/etc/passwd and /etc/shadow
|
|
3971
|
+
Launch Agent
|
|
3972
|
+
System Services
|
|
3973
|
+
Windows Command Shell
|
|
3974
|
+
Proc Memory
|
|
3975
|
+
Acquire Access
|
|
3976
|
+
Patch System Image
|
|
3977
|
+
Silver Ticket
|
|
3978
|
+
Data from Information Repositories
|
|
3979
|
+
Clear Persistence
|
|
3980
|
+
Hypervisor CLI
|
|
3981
|
+
Windows Credential Manager
|
|
3982
|
+
Masquerade Account Name
|
|
3983
|
+
Remote Desktop Software
|
|
3984
|
+
Server Software Component
|
|
3985
|
+
Data Destruction
|
|
3986
|
+
Non-Standard Encoding
|
|
3987
|
+
Domain Controller Authentication
|
|
3988
|
+
Transfer Data to Cloud Account
|
|
3989
|
+
HTML Smuggling
|
|
3990
|
+
Reversible Encryption
|
|
3991
|
+
Command Obfuscation
|
|
3992
|
+
File Deletion
|
|
3993
|
+
Drive-by Compromise
|
|
3994
|
+
Network Denial of Service
|
|
3995
|
+
Cloud Administration Command
|
|
3996
|
+
Installer Packages
|
|
3997
|
+
Scanning IP Blocks
|
|
3998
|
+
Template Injection
|
|
3999
|
+
RC Scripts
|
|
4000
|
+
Access Token Manipulation
|
|
4001
|
+
Multi-Factor Authentication Interception
|
|
4002
|
+
Software Packing
|
|
4003
|
+
Serverless
|
|
4004
|
+
Web Protocols
|
|
4005
|
+
Visual Basic
|
|
4006
|
+
Hidden File System
|
|
4007
|
+
Systemd Service
|
|
4008
|
+
RDP Hijacking
|
|
4009
|
+
Create Account
|
|
4010
|
+
XDG Autostart Entries
|
|
4011
|
+
Server
|
|
4012
|
+
Cloud Service Discovery
|
|
4013
|
+
Malicious Copy and Paste
|
|
4014
|
+
Remote System Discovery
|
|
4015
|
+
Network Service Discovery
|
|
4016
|
+
Domain Properties
|
|
4017
|
+
Software Discovery
|
|
4018
|
+
Cloud Service Dashboard
|
|
4019
|
+
Thread Local Storage
|
|
4020
|
+
Debugger Evasion
|
|
4021
|
+
SEO Poisoning
|
|
4022
|
+
Pass the Hash
|
|
4023
|
+
Exfiltration Over Physical Medium
|
|
4024
|
+
Ingress Tool Transfer
|
|
4025
|
+
SyncAppvPublishingServer
|
|
4026
|
+
Additional Email Delegate Permissions
|
|
4027
|
+
Code Signing Certificates
|
|
4028
|
+
TCC Manipulation
|
|
4029
|
+
Ptrace System Calls
|
|
4030
|
+
Power Settings
|
|
4031
|
+
Dynamic API Resolution
|
|
4032
|
+
Remote Desktop Protocol
|
|
4033
|
+
Logon Script (Windows)
|
|
4034
|
+
ListPlanting
|
|
4035
|
+
Hide Infrastructure
|
|
4036
|
+
Domain or Tenant Policy Modification
|
|
4037
|
+
XSL Script Processing
|
|
4038
|
+
Scan Databases
|
|
4039
|
+
Hidden Files and Directories
|
|
4040
|
+
Determine Physical Locations
|
|
4041
|
+
Office Test
|
|
4042
|
+
Develop Capabilities
|
|
4043
|
+
NTDS
|
|
4044
|
+
SNMP (MIB Dump)
|
|
4045
|
+
Steganography
|
|
4046
|
+
Malicious Link
|
|
4047
|
+
Application Access Token
|
|
4048
|
+
LSASS Driver
|
|
4049
|
+
Service Execution
|
|
4050
|
+
Cloud Accounts
|
|
4051
|
+
Environmental Keying
|
|
4052
|
+
Fallback Channels
|
|
4053
|
+
Local Storage Discovery
|
|
4054
|
+
NTFS File Attributes
|
|
4055
|
+
Kerberoasting
|
|
4056
|
+
DCSync
|
|
4057
|
+
System Time Discovery
|
|
4058
|
+
At
|
|
4059
|
+
Dynamic-link Library Injection
|
|
4060
|
+
Exploits
|
|
4061
|
+
Modify Authentication Process
|
|
4062
|
+
Udev Rules
|
|
4063
|
+
Credential API Hooking
|
|
4064
|
+
Inhibit System Recovery
|
|
4065
|
+
Netsh Helper DLL
|
|
4066
|
+
Spearphishing via Service
|
|
4067
|
+
Internal Proxy
|
|
4068
|
+
System Script Proxy Execution
|
|
4069
|
+
Dead Drop Resolver
|
|
4070
|
+
Junk Data
|
|
4071
|
+
Spearphishing Service
|
|
4072
|
+
vSphere Installation Bundles
|
|
4073
|
+
Container API
|
|
4074
|
+
Domains
|
|
4075
|
+
SQL Stored Procedures
|
|
4076
|
+
Disk Content Wipe
|
|
4077
|
+
Messaging Applications
|
|
4078
|
+
Exfiltration Over Unencrypted Non-C2 Protocol
|
|
4079
|
+
Compression
|
|
4080
|
+
Dylib Hijacking
|
|
4081
|
+
Downgrade System Image
|
|
4082
|
+
Local Accounts
|
|
4083
|
+
Wi-Fi Networks
|
|
4084
|
+
Exploitation for Defense Evasion
|
|
4085
|
+
Trusted Developer Utilities Proxy Execution
|
|
4086
|
+
System Shutdown/Reboot
|
|
4087
|
+
MMC
|
|
4088
|
+
Process Argument Spoofing
|
|
4089
|
+
COR_PROFILER
|
|
4090
|
+
Operation Dream Job
|
|
4091
|
+
KV Botnet Activity
|
|
4092
|
+
SharePoint ToolShell Exploitation
|
|
4093
|
+
Frankenstein
|
|
4094
|
+
RedDelta Modified PlugX Infection Chain Operations
|
|
4095
|
+
RedPenguin
|
|
4096
|
+
Operation Sharpshooter
|
|
4097
|
+
Operation Honeybee
|
|
4098
|
+
Operation MidnightEclipse
|
|
4099
|
+
Triton Safety Instrumented System Attack
|
|
4100
|
+
Operation Dust Storm
|
|
4101
|
+
2015 Ukraine Electric Power Attack
|
|
4102
|
+
Indian Critical Infrastructure Intrusions
|
|
4103
|
+
Operation Spalax
|
|
4104
|
+
3CX Supply Chain Attack
|
|
4105
|
+
Cutting Edge
|
|
4106
|
+
C0018
|
|
4107
|
+
Water Curupira Pikabot Distribution
|
|
4108
|
+
J-magic Campaign
|
|
4109
|
+
C0021
|
|
4110
|
+
C0015
|
|
4111
|
+
Operation Ghost
|
|
4112
|
+
Juicy Mix
|
|
4113
|
+
HomeLand Justice
|
|
4114
|
+
C0032
|
|
4115
|
+
SolarWinds Compromise
|
|
4116
|
+
Pikabot Distribution February 2024
|
|
4117
|
+
FunnyDream
|
|
4118
|
+
Operation CuckooBees
|
|
4119
|
+
Salesforce Data Exfiltration
|
|
4120
|
+
APT28 Nearest Neighbor Campaign
|
|
4121
|
+
Outer Space
|
|
4122
|
+
ArcaneDoor
|
|
4123
|
+
C0033
|
|
4124
|
+
2016 Ukraine Electric Power Attack
|
|
4125
|
+
C0010
|
|
4126
|
+
APT41 DUST
|
|
4127
|
+
Night Dragon
|
|
4128
|
+
Versa Director Zero Day Exploitation
|
|
4129
|
+
Operation Wocao
|
|
4130
|
+
C0011
|
|
4131
|
+
C0017
|
|
4132
|
+
C0026
|
|
4133
|
+
C0027
|
|
4134
|
+
2022 Ukraine Electric Power Attack
|
|
4135
|
+
Quad7 Activity
|
|
4136
|
+
FLORAHOX Activity
|
|
4137
|
+
CostaRicto
|
|
4138
|
+
The MITRE Corporation
|
|
4139
|
+
APT38
|
|
4140
|
+
Indrik Spider
|
|
4141
|
+
BlackByte
|
|
4142
|
+
Elderwood
|
|
4143
|
+
SideCopy
|
|
4144
|
+
GALLIUM
|
|
4145
|
+
APT17
|
|
4146
|
+
APT3
|
|
4147
|
+
Mustard Tempest
|
|
4148
|
+
Kimsuky
|
|
4149
|
+
EXOTIC LILY
|
|
4150
|
+
TA577
|
|
4151
|
+
admin@338
|
|
4152
|
+
Volt Typhoon
|
|
4153
|
+
Patchwork
|
|
4154
|
+
APT41
|
|
4155
|
+
Salt Typhoon
|
|
4156
|
+
Dragonfly
|
|
4157
|
+
Evilnum
|
|
4158
|
+
Gorgon Group
|
|
4159
|
+
menuPass
|
|
4160
|
+
APT32
|
|
4161
|
+
HAFNIUM
|
|
4162
|
+
MuddyWater
|
|
4163
|
+
Strider
|
|
4164
|
+
Naikon
|
|
4165
|
+
FIN6
|
|
4166
|
+
RedEcho
|
|
4167
|
+
Gamaredon Group
|
|
4168
|
+
Storm-1811
|
|
4169
|
+
Leafminer
|
|
4170
|
+
TeamTNT
|
|
4171
|
+
FIN7
|
|
4172
|
+
Sandworm Team
|
|
4173
|
+
Machete
|
|
4174
|
+
APT18
|
|
4175
|
+
Andariel
|
|
4176
|
+
CURIUM
|
|
4177
|
+
Sidewinder
|
|
4178
|
+
Mustang Panda
|
|
4179
|
+
Scattered Spider
|
|
4180
|
+
APT39
|
|
4181
|
+
UNC3886
|
|
4182
|
+
Contagious Interview
|
|
4183
|
+
TA2541
|
|
4184
|
+
Akira
|
|
4185
|
+
APT37
|
|
4186
|
+
Moses Staff
|
|
4187
|
+
OilRig
|
|
4188
|
+
Windigo
|
|
4189
|
+
Higaisa
|
|
4190
|
+
Carbanak
|
|
4191
|
+
Tropic Trooper
|
|
4192
|
+
Orangeworm
|
|
4193
|
+
Sea Turtle
|
|
4194
|
+
Suckfly
|
|
4195
|
+
Putter Panda
|
|
4196
|
+
POLONIUM
|
|
4197
|
+
TA459
|
|
4198
|
+
Aquatic Panda
|
|
4199
|
+
Aoqin Dragon
|
|
4200
|
+
Ferocious Kitten
|
|
4201
|
+
The White Company
|
|
4202
|
+
Ke3chang
|
|
4203
|
+
Saint Bear
|
|
4204
|
+
APT1
|
|
4205
|
+
DarkHydrus
|
|
4206
|
+
Confucius
|
|
4207
|
+
BlackTech
|
|
4208
|
+
Leviathan
|
|
4209
|
+
MoustachedBouncer
|
|
4210
|
+
Group5
|
|
4211
|
+
Blue Mockingbird
|
|
4212
|
+
SilverTerrier
|
|
4213
|
+
Turla
|
|
4214
|
+
Storm-0501
|
|
4215
|
+
TA505
|
|
4216
|
+
BITTER
|
|
4217
|
+
DarkVishnya
|
|
4218
|
+
FIN5
|
|
4219
|
+
Mofang
|
|
4220
|
+
Lotus Blossom
|
|
4221
|
+
APT29
|
|
4222
|
+
Dark Caracal
|
|
4223
|
+
Cinnamon Tempest
|
|
4224
|
+
Chimera
|
|
4225
|
+
Cleaver
|
|
4226
|
+
Medusa Group
|
|
4227
|
+
BRONZE BUTLER
|
|
4228
|
+
TA551
|
|
4229
|
+
TEMP.Veles
|
|
4230
|
+
BackdoorDiplomacy
|
|
4231
|
+
Star Blizzard
|
|
4232
|
+
Axiom
|
|
4233
|
+
TA578
|
|
4234
|
+
Deep Panda
|
|
4235
|
+
Ember Bear
|
|
4236
|
+
LazyScripter
|
|
4237
|
+
Windshift
|
|
4238
|
+
Volatile Cedar
|
|
4239
|
+
ToddyCat
|
|
4240
|
+
Whitefly
|
|
4241
|
+
LuminousMoth
|
|
4242
|
+
Agrius
|
|
4243
|
+
Water Galura
|
|
4244
|
+
APT28
|
|
4245
|
+
Malteiro
|
|
4246
|
+
Metador
|
|
4247
|
+
APT42
|
|
4248
|
+
APT5
|
|
4249
|
+
Fox Kitten
|
|
4250
|
+
RTM
|
|
4251
|
+
APT12
|
|
4252
|
+
APT-C-36
|
|
4253
|
+
Winnti Group
|
|
4254
|
+
Tonto Team
|
|
4255
|
+
GOLD SOUTHFIELD
|
|
4256
|
+
Lazarus Group
|
|
4257
|
+
INC Ransom
|
|
4258
|
+
Earth Lusca
|
|
4259
|
+
Silence
|
|
4260
|
+
Sowbug
|
|
4261
|
+
Threat Group-1314
|
|
4262
|
+
Thrip
|
|
4263
|
+
APT16
|
|
4264
|
+
LAPSUS$
|
|
4265
|
+
Cobalt Group
|
|
4266
|
+
CopyKittens
|
|
4267
|
+
Wizard Spider
|
|
4268
|
+
Molerats
|
|
4269
|
+
Velvet Ant
|
|
4270
|
+
Transparent Tribe
|
|
4271
|
+
IndigoZebra
|
|
4272
|
+
Moonstone Sleet
|
|
4273
|
+
Inception
|
|
4274
|
+
Play
|
|
4275
|
+
PROMETHIUM
|
|
4276
|
+
APT30
|
|
4277
|
+
HEXANE
|
|
4278
|
+
DragonOK
|
|
4279
|
+
Daggerfly
|
|
4280
|
+
Rancor
|
|
4281
|
+
WIRTE
|
|
4282
|
+
PLATINUM
|
|
4283
|
+
Magic Hound
|
|
4284
|
+
Ajax Security Team
|
|
4285
|
+
Threat Group-3390
|
|
4286
|
+
APT33
|
|
4287
|
+
FIN10
|
|
4288
|
+
FIN8
|
|
4289
|
+
FIN13
|
|
4290
|
+
APT19
|
|
4291
|
+
PittyTiger
|
|
4292
|
+
Nomadic Octopus
|
|
4293
|
+
PoisonIvy
|
|
4294
|
+
None
|
|
4295
|
+
ngrok
|