Windows Gather Victim Identity SAM Info
Credentials, Gather Victim Identity Information
Credentials, Gather Victim Identity Information
DLL Search Order Hijacking, Hijack Execution Flow
Remote Access Software, OS Credential Dumping
Process Injection, Portable Executable Injection
GUI Input Capture, Input Capture