{"id":19586,"date":"2013-03-09T09:39:11","date_gmt":"2013-03-09T05:39:11","guid":{"rendered":"http:\/\/greatis.com\/blog\/how-to-remove-malware\/lsasc-exe.htm"},"modified":"2013-03-09T09:39:11","modified_gmt":"2013-03-09T05:39:11","slug":"lsasc-exe","status":"publish","type":"post","link":"https:\/\/greatis.com\/blog\/how-to-remove-malware\/lsasc-exe.htm","title":{"rendered":"LSASC.EXE is Trojan Inject1"},"content":{"rendered":"<div class=\"wpInsert wpInsertInPostMy wpInsertAbove\" style=\"padding: 0px;\"><\/div><p class=\"sign\">The file <b>LSASC.EXE<\/b>  is identified as the Trojan Program that is used for stealing bank information and  users passwords.<br \/>\nTo delete  <b>LSASC.EXE<\/b>  we suggest you should use UnHackMe:<br \/>\n<a title=\"http:\/\/www.unhackme.com\" href=\"http:\/\/www.unhackme.com\">http:\/\/www.unhackme.com<\/a><\/p>\n<h2>Malware Analysis of LSASC.EXE<br \/>\nFull path on a computer: %LOCAL APPDATA%\\LSASC.EXE<\/h2>\n<div id=\"alist\">\n<h3>Detected by <a href=\"http:\/\/www.greatis.com\/iunhackme\">UnHackMe<\/a>:<\/h3>\n<p><b>LSASC.EXE<\/b><br \/>\nDefault location: %LOCAL APPDATA%\\LSASC.EXE<\/p>\n<h3>Removal Results: Success<br \/>\nNumber of reboot: 1<\/h3>\n<\/div>\n<div id=\"blist\">\n<h3><strong>LSASC.EXE<\/strong>  is known as:<\/h3>\n<p>Trojan.Inject1\n<\/p><div class=\"wpInsert wpInsertInPostMy wpInsertMiddle\"><\/div><\/div>\n<div id=\"clist\">\nHow to quickly detect <strong>LSASC.EXE<\/strong> presence?<\/p>\n<div class=\"icon\"><img loading=\"lazy\" title=\"Files\" src=\"\/blog\/wp-content\/themes\/revolution-code-blue\/images\/files.gif\" width=\"32\" height=\"32\" \/>Files:<\/div>\n<ul>\n<li>%APPDATA%MICROSOFT\\SYSTEM\\SERVICES\\18.EXE\n<li>%LOCAL APPDATA%\\LSASC.EXE\n<\/ul>\n<\/div>\n<p><!-- end --><\/p>\n<div class=\"wpInsert wpInsertInPostMy wpInsertBelow\" style=\"padding: 0px;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>The file LSASC.EXE is identified as the Trojan Program that is used for stealing bank information and users passwords. To delete LSASC.EXE we suggest you should use UnHackMe: http:\/\/www.unhackme.com Malware Analysis of LSASC.EXE Full path on a computer: %LOCAL APPDATA%\\LSASC.EXE Detected by UnHackMe: LSASC.EXE Default location: %LOCAL APPDATA%\\LSASC.EXE Removal Results: Success Number of reboot: 1 [&hellip;]<br \/><a style=\"color: #42A2CE\" href=\"https:\/\/greatis.com\/blog\/how-to-remove-malware\/lsasc-exe.htm\"><u>More&#8230;<\/u><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[3],"tags":[10488,8043],"_links":{"self":[{"href":"https:\/\/greatis.com\/blog\/wp-json\/wp\/v2\/posts\/19586"}],"collection":[{"href":"https:\/\/greatis.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/greatis.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/greatis.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/greatis.com\/blog\/wp-json\/wp\/v2\/comments?post=19586"}],"version-history":[{"count":0,"href":"https:\/\/greatis.com\/blog\/wp-json\/wp\/v2\/posts\/19586\/revisions"}],"wp:attachment":[{"href":"https:\/\/greatis.com\/blog\/wp-json\/wp\/v2\/media?parent=19586"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/greatis.com\/blog\/wp-json\/wp\/v2\/categories?post=19586"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/greatis.com\/blog\/wp-json\/wp\/v2\/tags?post=19586"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}