Hello,
maybe someone else experience the same at the moment. I can see a lot of potential false-positive detections via Threat-Emulation today.
They all have in common, that these detections are from Win10 vm environment, which was the only one that got an detection rule update today. I think todays detection rule update introduced a problematic detection.
All false-positives have the same single activity in the report:
Suspicious Process activity C:\Windows\splwow64.exe (Start)
Detection Rules
============================================== Win10 64b,Office 2016,Adobe DC ------------------------------ UID: 10b4a9c6-e414-425c-ae8b-fe4dd7b25244
Revision: 59312 Status: Ready Size: 118.61KB Start Download Time: Tue Nov 22 19:00:57 2022
Revision: 59314 Status: Ready Size: 118.42KB Start Download Time: Mon Dec 5 15:27:25 2022
The other vm detection rules werent updated today and they dont show this Suspicious Process activity...
br