Anomalous usage of 7zip
Archive via Utility, Archive Collected Data
Archive via Utility, Archive Collected Data
Archive via Utility, Archive Collected Data
Steal or Forge Authentication Certificates, Archive Collected Data
Query Registry, System Network Connections Discovery, Permission Groups Discovery, System Network Configuration Discovery, OS Credential Dumping, System Info...
Browser Session Hijacking
Automated Collection
Automated Collection
Automated Collection
Screen Capture
Browser Session Hijacking
Browser Session Hijacking
Clipboard Data
GUI Input Capture, Input Capture
GUI Input Capture, Input Capture
Clipboard Data
Screen Capture
Screen Capture
Email Collection, Local Email Collection
Email Collection, Local Email Collection
Archive via Utility, Archive Collected Data
Archive via Utility, Archive Collected Data
Screen Capture
Archive via Utility, Archive Collected Data
Archive via Utility, Archive Collected Data
Archive via Utility, Archive Collected Data
Archive via Utility, Archive Collected Data
Archive via Utility, Archive Collected Data
Archive via Utility, Archive Collected Data
Data from Local System
Archive via Utility, Archive Collected Data
Archive via Utility, Archive Collected Data
Data from Cloud Storage
Data from Cloud Storage
Data Staged
Email Forwarding Rule, Email Collection
Email Forwarding Rule, Email Collection
Email Forwarding Rule, Email Collection
Email Forwarding Rule, Email Collection
Email Collection
Remote Email Collection, Email Collection
Remote Email Collection, Email Collection
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle, ARP Cache Poisoning
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle, ARP Cache Poisoning
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle, ARP Cache Poisoning
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle, ARP Cache Poisoning
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle, ARP Cache Poisoning
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle, ARP Cache Poisoning
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle
Data from Cloud Storage
Data from Cloud Storage
Email Collection, Local Email Collection
Email Collection, Local Email Collection
Email Collection, Remote Email Collection
Email Collection, Remote Email Collection
Remote Email Collection, Email Collection
Remote Email Collection, Email Collection
Data from Cloud Storage
Data from Cloud Storage