Binary Padding, Code Signing, Compile After Delivery, Compiled HTML File, Component Firmware, Component Object Model Hijacking,DLL Search Order Hijacking, Execution Guardrails, Exploitation for Defense Evasion, Extra Window Memory Injection, File Permissions Modification, File System Logical Offsets, Group Policy Modification, Access Token Manipulation, BITS Jobs, Bypass User Account Control, CMSTP, Control Panel Items, DCShadow, Deobfuscate/Decode Files or Information, Disabling Security Tools, DLL Side-Loading, File Deletion, Hidden Files and Directories, Image File Execution Options Injection, Indicator Blocking, Indicator Removal on Host, Indirect Command Execution, Install Root Certificate, InstallUtil, Masquerading, Modify Registry, Mshta, Network Share Connection Removal, NTFS File Attributes, Obfuscated Files or Information, Process Injection, Regsvcs/Regasm, Regsvr32, Rundll32,Scripting, Signed Binary Proxy Execution, Signed Script Proxy Execution, Timestomp, Trusted Developer Utilities, Web Service