Process Discovery
Adversaries may attempt to get information about running processes on a system. Information obtained could be used to gain an understanding of common software/applications running on systems within the network. Administrator or otherwise elevated access may provide better process details. Adversaries may use the information from [Process Discovery](https://attack.mitre.org/techniques/T1057) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infe...
BY SOURCE
PROCEDURES (16)
Auto-extracted: 2 detections for child process
Auto-extracted: 2 detections for network connection monitoring
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for dump
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for process creation monitoring
Auto-extracted: 1 detections for inject
Auto-extracted: 1 detections for dump
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for inject
Auto-extracted: 1 detections for script execution monitoring
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for general monitoring
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for wmi
Auto-extracted: 1 detections for wmi