Should I block it?

No, this file is 100% safe to run.

VersionsAdditional versions

6.1.7600.16385 (win7_rtm.090713-1255) 7.39%
6.1.7600.16385 (win7_rtm.090713-1255) 51.83%
6.1.7600.16385 (win7_rtm.090713-1255) 24.08%
6.1.7600.16385 (win7_rtm.090713-1255) 4.78%
6.1.7600.16385 (win7_rtm.090713-1255) 0.06%
6.1.7600.16385 (win7_rtm.090713-1255) 0.12%
6.1.7600.16385 (win7_rtm.090713-1255) 0.06%
6.0.6001.18000 (longhorn_rtm.080118-1840) 9.12%
6.0.6001.18000 (longhorn_rtm.080118-1840) 1.99%
6.0.6000.16386 (vista_rtm.061101-2205) 0.56%

Relationships

Parent process
Related files

PE structurePE file structure

Show functions
Import table
advapi32.dll
TraceMessage, GetTraceEnableFlags, GetTraceEnableLevel, GetTraceLoggerHandle, RegisterTraceGuidsW, UnregisterTraceGuids, RegCloseKey, RegQueryValueExW, RegOpenKeyExW, SetSecurityDescriptorDacl, SetEntriesInAclW, SetSecurityDescriptorGroup, SetSecurityDescriptorOwner, InitializeSecurityDescriptor, GetTokenInformation, OpenProcessToken, OpenThreadToken, RegNotifyChangeKeyValue, AdjustTokenPrivileges, CloseServiceHandle, OpenSCManagerW, RevertToSelf, ImpersonateLoggedOnUser, LogonUserW, OpenServiceW, RegSetValueExW, NotifyServiceStatusChangeW, AccessCheckAndAuditAlarmW, SetThreadToken, DuplicateTokenEx, AuditFree, AuditQuerySystemPolicy, QueryServiceStatus, CreateWellKnownSid, MakeSelfRelativeSD, MakeAbsoluteSD, CheckTokenMembership, QueryServiceConfigW, StartServiceW, DuplicateToken, LookupAccountSidW, AddAce, GetAce, InitializeAcl, CopySid, GetLengthSid, GetAclInformation, GetSecurityDescriptorDacl, LsaFreeMemory, LsaGetUserName, ControlTraceW, StartTraceW, EnableTrace, QueryTraceW, ReportEventW, DeregisterEventSource, RegisterEventSourceW, IsValidSecurityDescriptor, RegCreateKeyExW, RegConnectRegistryW, RegOpenCurrentUser, I_ScSendTSMessage, RegEnumKeyExW, RegDeleteKeyW, GetSecurityDescriptorLength, PerfSetCounterRefValue, PerfCreateInstance, PerfStopProvider, PerfSetCounterSetInfo, PerfStartProvider
api-ms-win-core-errorhandling-l1-1-0.dll
SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetLastError
api-ms-win-core-handle-l1-1-0.dll
CloseHandle, DuplicateHandle
api-ms-win-core-heap-l1-1-0.dll
HeapSetInformation
api-ms-win-core-interlocked-l1-1-0.dll
InterlockedIncrement, InterlockedDecrement, InterlockedExchange, InterlockedCompareExchange
api-ms-win-core-libraryloader-l1-1-0.dll
LoadStringW, GetModuleHandleW, GetProcAddress, FreeLibrary, GetModuleHandleA, LoadLibraryExA
api-ms-win-core-localregistry-l1-1-0.dll
RegNotifyChangeKeyValue, RegQueryValueExW, RegOpenKeyExW, RegSetValueExW, RegCloseKey
api-ms-win-core-misc-l1-1-0.dll
LocalAlloc, Sleep, LocalFree
api-ms-win-core-processthreads-l1-1-0.dll
OpenProcessToken, OpenThreadToken, GetCurrentThread, ProcessIdToSessionId, SetThreadToken, GetCurrentProcess, GetProcessId, GetCurrentThreadId, GetCurrentProcessId, TerminateProcess
api-ms-win-core-profile-l1-1-0.dll
QueryPerformanceCounter
api-ms-win-core-synch-l1-1-0.dll
WaitForSingleObject, OpenEventW, SetEvent, InitializeCriticalSection, OpenProcess, CreateEventW, WaitForMultipleObjectsEx, ResetEvent, DeleteCriticalSection
api-ms-win-core-sysinfo-l1-1-0.dll
GetTickCount, GetSystemTimeAsFileTime, GetTickCount64
api-ms-win-core-threadpool-l1-1-0.dll
UnregisterWaitEx
api-ms-win-security-base-l1-1-0.dll
SetSecurityDescriptorGroup, CopySid, InitializeSecurityDescriptor, GetTokenInformation, AdjustTokenPrivileges, SetSecurityDescriptorDacl, GetLengthSid, IsValidSid, DuplicateTokenEx, GetSecurityDescriptorLength, CreateWellKnownSid, MakeSelfRelativeSD, MakeAbsoluteSD, CheckTokenMembership, DuplicateToken, AddAce, GetAce, InitializeAcl, GetAclInformation, GetSecurityDescriptorDacl, RevertToSelf, ImpersonateLoggedOnUser, AccessCheckAndAuditAlarmW, IsValidSecurityDescriptor, EqualSid, SetSecurityDescriptorOwner
api-ms-win-service-management-l1-1-0.dll
OpenSCManagerW, OpenServiceW, StartServiceW, CloseServiceHandle
api-ms-win-service-management-l2-1-0.dll
QueryServiceConfigW, NotifyServiceStatusChangeW
api-ms-win-service-winsvc-l1-1-0.dll
QueryServiceStatus, I_ScSendTSMessage
kernel32.dll
QueueUserWorkItem, GetComputerNameW, WaitForMultipleObjects, RegisterWaitForSingleObject, LoadLibraryW, DelayLoadFailureHook, HeapAlloc, GetProcessHeap, HeapFree, ExpandEnvironmentStringsW, SetLastError, OutputDebugStringA, RtlCaptureStackBackTrace, LocalSize, SleepEx, GetVersionExW, CreateProcessW, DebugBreak, IsDebuggerPresent, GetSystemDirectoryW, RegCreateKeyExW, RegOpenCurrentUser, RegEnumKeyExW, VerifyVersionInfoW, VerSetConditionMask, LocalAlloc, UnhandledExceptionFilter, TerminateProcess, GetSystemTimeAsFileTime, GetCurrentProcessId, GetCurrentThreadId, GetTickCount, QueryPerformanceCounter, GetModuleHandleA, FormatMessageW, DeleteCriticalSection, GetProcAddress, InitializeCriticalSection, InterlockedCompareExchange, GetProcessId, UnregisterWaitEx, OpenProcess, DuplicateHandle, InterlockedExchange, ProcessIdToSessionId, HeapSetInformation, SetUnhandledExceptionFilter, CreateEventW, WaitForSingleObject, Sleep, InterlockedDecrement, InterlockedIncrement, WaitForMultipleObjectsEx, GetCurrentThread, GetCurrentProcess, CloseHandle, LocalFree, ResetEvent, OpenEventW, GetLastError, SetEvent, FreeLibrary
msvcrt.dll
DllMain
ntdll.dll
NtDelayExecution, RtlUnhandledExceptionFilter, EtwUnregisterTraceGuids, EtwRegisterTraceGuidsW, EtwGetTraceLoggerHandle, EtwGetTraceEnableLevel, EtwGetTraceEnableFlags, EtwTraceMessage, EtwEventWrite, RtlInitializeResource, EtwEventUnregister, RtlDeleteResource, NtNotifyChangeSession, RtlInsertElementGenericTable, RtlLookupElementGenericTable, RtlDeleteElementGenericTable, NtOpenEvent, RtlInitUnicodeString, RtlInitializeGenericTable, RtlEnumerateGenericTable, NtOpenSession, NtSetSystemInformation, NtQuerySystemTime, NtFreeVirtualMemory, NtAllocateVirtualMemory, RtlConnectToSm, RtlSendMsgToSm, NtDuplicateToken, RtlRaiseException, RtlAcquireResourceExclusive, RtlAcquireResourceShared, RtlReleaseResource, NtQuerySystemInformation, RtlEqualSid, NtSetSecurityObject, NtQuerySecurityObject, NtOpenSymbolicLinkObject, NtQueryDirectoryObject, NtCreateDirectoryObject, NtQueryValueKey, NtOpenKey, NtDuplicateObject, NtQueryInformationProcess, RtlMapGenericMask, RtlGetAce, RtlQueryInformationAcl, RtlGetDaclSecurityDescriptor, RtlCreateUserSecurityObject, RtlGetOwnerSecurityDescriptor, RtlDeleteAce, RtlSetGroupSecurityDescriptor, RtlCopySecurityDescriptor, RtlGetGroupSecurityDescriptor, NtTerminateProcess, NtWaitForSingleObject, RtlPrefixUnicodeString, NtClose, NtCreateEvent, RtlNumberGenericTableElements, RtlFreeSid, RtlSetDaclSecurityDescriptor, RtlAddAccessAllowedAce, RtlCreateAcl, RtlCreateSecurityDescriptor, RtlLengthSid, RtlAllocateAndInitializeSid, NtCreatePort, NtCompleteConnectPort, NtAcceptConnectPort, NtReplyPort, DbgPrint, NtOpenProcess, NtCreateSection, NtReplyWaitReceivePort, RtlNtStatusToDosError, NtQueryLicenseValue, RtlLeaveCriticalSection, RtlEnterCriticalSection, RtlAdjustPrivilege, NtQueryInformationToken, EtwEventRegister, DbgBreakPoint
rpcrt4.dll
RpcServerTestCancel, NdrAsyncServerCall, NdrServerCall2, RpcImpersonateClient, RpcRevertToSelf, I_RpcMapWin32Status, UuidCreate, UuidToStringW, RpcAsyncCompleteCall, RpcServerSubscribeForNotification, RpcServerInqCallAttributesW, RpcServerInqDefaultPrincNameW, RpcServerRegisterAuthInfoW, RpcServerUnsubscribeForNotification, I_RpcBindingIsClientLocal, I_RpcBindingInqLocalClientPID, RpcServerUseProtseqEpW, RpcServerRegisterIfEx, RpcServerListen, RpcBindingToStringBindingW, RpcStringBindingParseW, RpcMgmtWaitServerListen, RpcStringFreeW, UuidFromStringW
sysntfy.dll
SysNotifyStartServer
wmsgapi.dll
WmsgSendMessage

lsm.exe

Local Session Manager Service by Microsoft

Remove lsm.exe
Version:   6.1.7600.16385 (win7_rtm.090713-1255)
MD5:   1e974d77ee32c7bd66f4f37ee5fb7f2f
SHA1:   c8615bbce5f2198fe10e2eff7c5d7118f78f8f71
SHA256:   8b6e65cc3465dd7c9e01be1ec47e0480d7eb56c843eb1bbca334ef987431dcfc
This is a Windows system installed file with Windows File Protection (WFP) enabled.

What is lsm.exe?

Local Security Authority Subsystem Service (LSASS), is a process in Microsoft Windows operating systems that is responsible for enforcing the security policy on the system. It verifies users logging on to a Windows computer or server, handles password changes, and creates access tokens.

Overview

lsm.exe executes as a process under the SYSTEM account with extensive privileges (the system and the administrator accounts have the same file privileges) typically within the context of its parent wininit.exe (Windows Start-Up Application by Microsoft). This version is designed to run on Windows 7 and is compiled as a 32 bit program.

DetailsDetails

File name:lsm.exe
Publisher:Microsoft Corporation
Product name:Local Session Manager Service
Description:Microsoft® Windows® Operating System
Typical file path:C:\Windows\System32\lsm.exe
Original name:lsm.exe.mui
File version:6.1.7600.16385 (win7_rtm.090713-1255)
Product version:6.1.7600.16385
Size:262 KB (268,288 bytes)
Digital DNA
Entropy:6.506473
File packed:No
Code language:Microsoft Visual C++
.NET CLR:No
More details

ResourcesResource utilization

(Note: statistics below are averages based on a minimum sample size of 200 unique participants)
Averages
 
CPU
Total CPU:0.00047518%
0.028634%
Kernel CPU:0.00024675%
0.013761%
User CPU:0.00022843%
0.014873%
Kernel CPU time:2,028,013 ms/min
100,923,805ms/min
Memory
Private memory:2 MB
21.59 MB
Private (maximum):4.32 MB
Private (minimum):1.18 MB
Non-paged memory:2 MB
21.59 MB
Virtual memory:25.04 MB
140.96 MB
Virtual memory (peak):25.04 MB
169.69 MB
Working set:1.43 MB
18.61 MB
Working set (peak):4.36 MB
37.95 MB
Resource allocations
Threads:11
12
Handles:164
600

BehaviorsProcess properties

Integrety level:System
Platform:32-bit
Command line:C:\Windows\System32\lsm.exe
Owner:SYSTEM
Parent process:wininit.exe (Windows Start-Up Application by Microsoft)

Windows OS versionsDistribution by Windows OS

OS versiondistribution
Windows 7 Home Premium 56.00%
Windows 7 Ultimate 26.00%
Windows 7 Professional 9.00%
Windows 7 Home Basic 3.50%
Windows Vista Home Premium 3.50%
Windows 7 Starter 1.00%
Windows Seven Black Edition 0.50%
Windows Vista Home Basic 0.50%

Distribution by countryDistribution by country

United States installs about 47.24% of Local Session Manager Service.

OEM distributionDistribution by PC manufacturer

PC Manufacturerdistribution
Dell 26.42%
Hewlett-Packard 18.87%
ASUS 13.58%
Acer 12.83%
Toshiba 12.08%
Sony 3.77%
Lenovo 3.02%
Samsung 2.26%
GIGABYTE 2.26%
MSI 1.51%
Alienware 0.75%
Medion 0.75%
Intel 0.75%
Gateway 0.75%
Sahara 0.38%
Should I remove It? Clean your PC of unwanted adware, toolbars and bloatware.

Download it for FREE