DLLHost with no Command Line Arguments with Network
Process Injection
Process Injection
Masquerading, Trusted Developer Utilities Proxy Execution, Rename System Utilities
Command and Scripting Interpreter, Windows Command Shell, Windows Service, Create or Modify System Process
System Binary Proxy Execution, Rundll32
Exploit Public-Facing Application, External Remote Services