1 d

isawherpeeingonceagn?

itmustbeolive simpcity?

The system will now shut down and restart. One technique attackers use is targeting credentials in the windows local security authority subsystem service lsass process memory because it can store not only a current user’s os credentials but also a domain admin’s. I was trying to reboot it and it is also. Exe is a suspicious process that may be malware or spyware.

Post Opinion