title: Password Dumper Remote Thread in LSASS description: Detects password dumper activity by monitoring remote thread creation EventID 8 in combination with the lsass.exe process as TargetImage. The process in field Process is the malicious program. A single execution can lead to hundrets of events. author: Thomas Patzke logsource: product: windows service: sysmon detection: selection: EventID: 8 TargetImage: 'C:\Windows\System32\lsass.exe' StartModule: null condition: selection falsepositives: - unknown level: high