| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1574 | .001 | 劫持执行流: DLL Search Order Hijacking |
Variants of WEBC2 achieve persistence by using DLL search order hijacking, usually by copying the DLL file to |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell | |
| Enterprise | T1105 | 输入工具传输 | ||