Windows Gather Victim Identity SAM Info
Credentials, Gather Victim Identity Information
Credentials, Gather Victim Identity Information
DLL Search Order Hijacking, Hijack Execution Flow
Remote Access Software, OS Credential Dumping
Create Process with Token, Access Token Manipulation
Process Injection, Portable Executable Injection