A company employee downloads an application from the internet. After the installation, the employee begins experiencing noticeable performance issues, and files are appearing on the desktop:
Which of the following processes will the security analyst identify as the MOST likely indicator of system compromise given the processes running in Task Manager?
gnnggnnggnng
Highly Voted 2 years, 3 months ago2Fish
2 years, 1 month ago2Fish
2 years, 1 month ago