Allows an attacker to control a secondary, hidden desktop session without the user’s knowledge, though users have reported this feature can be slow or unstable on weaker hardware. Indicators of Compromise (IoC) & Identification
Uses methods like fodhelper.exe to escalate privileges.
If you are analyzing a specific file, look for the following: