Windows Gather Victim Host Information Camera
Hardware, Gather Victim Host Information
Hardware, Gather Victim Host Information
Exfiltration Over Unencrypted Non-C2 Protocol, Exfiltration Over Alternative Protocol
Print Processors, Boot or Logon Autostart Execution
Path Interception by Unquoted Path, Hijack Execution Flow
Abuse Elevation Control Mechanism