WebDav Client Execution Via Rundll32.EXE (2dbd9d3d-9e27-42a8-b8df-f13825c6c3d5)
Detects "svchost.exe" spawning "rundll32.exe" with command arguments like "C:\windows\system32\davclnt.dll,DavSetCookie". This could be an indicator of exfiltration or use of WebDav to launch code (hosted on a WebDav server).