Keyword: lsass
1161 Total Search   |   Showing Results : 1 - 20
   Next  
file infector adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run lsass = %Windows%\system
the following folders: %AppDataLocal%\LSASS %AppDataLocal%\LSASS\1.exe_Url_{Random Characters} %AppDataLocal%\LSASS\Information %AppDataLocal%\LSASS\Storage (Note: %AppDataLocal% is the Application Data
could cause a denial of service on the target system's LSASS service, which triggers an automatic reboot of the system. Apply associated Trend Micro DPI Rules. 1008119|
registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run lsass = "%Windows%\Fonts\lsass.exe" HKEY_LOCAL_MACHINE\SOFTWARE
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Control\SafeBoot\Minimal\ lsass (Default) = "Service" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Control\SafeBoot\Network\ lsass (Default) = "Service" It adds the following
Technique This hacking tool adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run LSASS = "{malware
following format: {malware full path} cmd {one of the following pipes} List of pipes used: lsarpc efsrpc samr lsass netlogon The default pipe it uses is lsarpc
Backdoor Routine This Hacking Tool executes the following commands from a remote malicious user: clr_dumplsass → Dump LSASS memory. It can contain a directory where the dumped LSASS is being stored, or, by
\Software\Microsoft\ Windows\CurrentVersion\Run lsass = "%Current%\{malware file name}.exe" Other Details This spyware connects to the following possibly malicious URL: http://www.{BLOCKED}nias.com.br/saj/
nor remotely. More specifically, this update addresses the vulnerability by correcting the manner in which LSASS handles specific values used in the authentication process. Windows XP Service Pack
elevate the privilege once an attacker sent specially crafted Lightweight Directory Access Protocol (LDAP) messages to a listening LSASS server. Windows 7 for 32-bit Systems,Windows 7 for x64-based
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run lsass = "%Windows%\lsass.exe" This report is generated via an automated analysis system. TrojanDownloader:Win32/Renos.FJ (Microsoft); Packed.Mystic
vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1003821| 1003821 - LSASS Recursive Stack Overflow Vulnerability
enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run lsass = "%System Root%\lsass.exe" This report is generated via an automated analysis
Description Name: LSASS Dump File Upload . This is Trend Micro detection for packets passing through SMB2 and SMB network protocols that manifests Hack Tool activities which can be a potential intrusion. Below are some indicators of unusual behavior:...
Description Name: Debugging Symbol Download - LSASS . This is Trend Micro detection for packets passing through HTTP network protocols that manifests unusual behavior which can be a potential intrusion. Below are some indicators of unusual behavior:S...
system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run lsass = "%Windows%\lsass.exe" Other Details This Trojan connects to the following possibly malicious URL:
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run lsass = "%Application Data%\isass.exe " Other System Modifications This Trojan deletes the following files:
input/output redirected to the C&C server Connect to another C&C server Start WinVNC server Enumerate stored user credentials in the LSASS process It connects to the following URL(s) to send and receive commands
every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run lsass = "%System%\lsass.exe" Other System Modifications This spyware adds the following registry keys: