An analyst is reviewing logs associated with an attack. The logs indicate an attacker downloaded a malicious file that was quarantined by the AV solution. The attacker utilized a local non-administrative account to restore the malicious file to a new location. The file was then used by another process to execute a payload.
Which of the following attacks did the analyst observe?
stoneface
Highly Voted 2 years, 10 months agostonefaces_kitten
2 years, 7 months agoi_luv_stoneface
2 years, 4 months agostonefacegroupie1
2 years, 1 month agocannon
1 year, 5 months agoRamnathKM
1 year, 3 months agoAhmed_aldouky
Highly Voted 2 years, 3 months agoc56e966
Most Recent 1 year, 1 month ago_deleteme_
1 year, 4 months agoPayu1994
1 year, 4 months agomaggie22
1 year, 5 months agoTheExile
1 year, 6 months agoMavman42
1 year, 5 months agoPayu1994
1 year, 4 months agoTheFivePips
1 year, 7 months agoSynnister
1 year, 8 months agoPayu1994
1 year, 4 months agoha33yp0tt3r69
1 year, 8 months agoBD69
1 year, 3 months agoTheFivePips
1 year, 7 months agoYarzo
1 year, 8 months agoCyberjerry
1 year, 8 months agogoodmate
1 year, 8 months agoOnly12go
1 year, 8 months agoAfel_Null
1 year, 8 months agoSallyabat
1 year, 9 months agoAbbey2
1 year, 9 months agoIT_Newby11111100111
1 year, 9 months ago