If you want an instant kernel dump, kill the SMSS process... :)

It might not get you what you need in terms of info, though, but it is
worth one try on a different (victim) system.






*ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>
*Providing Virtual CIO Services (IT Operations & Information Security) for
the SMB market...*




On Thu, Aug 28, 2014 at 8:51 PM, Ben Scott <[email protected]> wrote:

> On Thu, Aug 28, 2014 at 8:40 PM, Daniel Chenault <[email protected]>
> wrote:
> > My first step would be to scan my machine for malware.
>
>   Everything here runs Trend OfficeScan real-time, and does a full
> scan once a week.  Nobody runs with admin rights for day-to-day.
> Software Restriction Policies deny execute to most user-writable
> locations, including most everything under <C:\Users>.  Our email
> filters trap any executable of any kind (by signature, not name).  Our
> web filter tries to block executables from being downloaded (efficacy
> is an open question).  AutoRun is completely disabled via registry
> redirection.  Windows Updates are forced via WSUS.  We update apps via
> GPO/MSI when possible.
>
>   While I will *never* rule out a malware compromise, and we do have
> some weaknesses (as do all), we're in a better position than most.
>
> > After that I'd get a known good machine on my network segment
> > running WireShark, set as large a buffer as possible and let it run.
> > When the fault occurs I've caught it and can examine from there.
>
>   Hmmm.  I've been assuming it's of machine local origin, but it's
> good point that it might actually be triggered by something on the
> network.  I can set-up another PC with a sniffer, and mirror my switch
> port to that.  Wireshark does have a circular buffer feature.
>
>   I'll keep that in mind and give it a shot if nothing better comes along
> soon.
>
>   Thanks...
>
> -- Ben
>
>
>

Reply via email to