Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

pwdmon.dll

Posted on 2006-11-28
8
Medium Priority
?
2,763 Views
Last Modified: 2011-10-03
I found this dll in the system32 folder: pwdmon.dll.  It also has an entry in the Notification Packages key of  HKLM\SYSTEM\CurrentControlSet\Control\Lsa .  I can't find any information on this dll.  Can anyone shed some light on its purpose and where it comes from?
0
Comment
Question by:dhenderson12
8 Comments
 
LVL 2

Expert Comment

by:LanBuddha
ID: 18033311
That is a registry key for windows security.

I am not sure what the file does but if you right click on the file and look at the properties you should be able to find out the manufacturer if it is legit. Some information about it should be found in the properties.
0
 

Author Comment

by:dhenderson12
ID: 18040057
Thanks for the reply.  There are NO values listed in the properties of this file ... none.
0
 
LVL 2

Expert Comment

by:LanBuddha
ID: 18040488
Look at the creation date. Did you install anything on that date? I would be very suspicious of the file. Maybe save your registry and then remove the key and see what happens. What other processes are running? Or just try renaming the file and see if a program complains. Do you have anything like a finger print reader on your computer?

Search Google for Rootkit analyzer and see if that DLL is hooking your keyboard or something..
0
New Tabletop Appliances Blow Competitors Away!

WatchGuard’s new T15, T35 and T55 tabletop UTMs provide the highest-performing security inspection in their class, allowing users at small offices, home offices and distributed enterprises to experience blazing-fast Internet speeds without sacrificing enterprise-grade security.

 
LVL 2

Expert Comment

by:score_under
ID: 18040796
You could assume that it is spyware or adware, or possibly a component for some obscure program, because I have a virus-free laptop and the file does not exist on it. I am running xp(pro)sp2.
0
 
LVL 12

Expert Comment

by:kneH
ID: 18044208
What I usually do with files like these is the following:
- Create a backupcopy of the file and place it somewhere easy to acces from the command line (eg the c:\ root)
- Then rename the file in the system32 dir. Will it allow it? If not it is in use.
- if you cannot rename the file.. boot into safemode and try then
- if you can rename it that's cool. Now delete it. Does windows put it back?
- if so it might be a system file.
- after you've renamed it test your system for a while. Does it give any errors anywhere?

hope that'll help somewhat.


0
 
LVL 27

Expert Comment

by:Tolomir
ID: 18199523
I've found this: http://www.brightstrand.com/simple.html

It uses a pwdmon program.

Tolomir
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 18400686
PAQed with no points refunded (of 125)

Computer101
EE Admin
0

Featured Post

Hire Technology Freelancers with Gigs

Work with freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely, and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

963 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question