
Rollout of log collection agents (the setup routine often includes a reset of the local Eventlog)įile_event_win_cve_2021_31979_cve_2021_33771_exploits.yml Admins may setup new or modify old spans, or use a monitor for troubleshooting SourceĪn attacker with the iam:UpdateLoginProfile permission on other users can change the password used to login to the AWS console on any user that already has a login profile setup.ĭescription : Show when a monitor or a span/rspan is setup or modified While setup.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes. The following table contains possible examples of setup.exe being misused.

Issuer: CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US.Child Processes:Ĭ:\Program Files (x86)\Microsoft\Edge\Application\85.0.564.68\Installer\setup.exe Could not write "SetupMetrics" persistent histograms to file as the storage directory does not exist.


68 at system - level conflicts with this one at user - level.
