I have been getting alerts on another one of our security products detecting both of the DLL files in the title as malicious. From my research it seems to be when the server the changes happen on reboot. It makes a change to the AppInit DLLs. I just wanted to double check if that seems correct. Below is the REG that it changes triggering the alert.
HKEY_LOCAL_MACHINE\\Software\\WOW6432Node\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\AppInit_DLLsThank you all.
Well the keys you mention are only added by the Sophos Anti-Virus installer at install. When Sophos performs a major update, it might uninstall and re-install which could cause it to remove and re-add…
Are you using the on-premise SEC managed client?
Sophos Anti-Virus used to use the AppInit_Dlls key you mention to ensure that the Sophos detours DLL was loaded into processes for the purpose of data control and buffer overflow protection.
In the Central client at least, this is no longer used, mainly because it doesn't work if Secure boot is enabled. Now the sophosed.sys driver injects the DLL as processes start.
So in summary, this is something that the Sophos Anti-Virus install used to do but no longer does. I can only think you must be running an old version of Sophos.
Sophos Endpoint: UEFI and Secure Boot compatible computers prevent Data Control from working details this. What OS are you seeing this on? Windows 7?
It could absolutely be out of date. It does it about once a month. The OS is Windows Server 2012. I think I will check the updates and see if that is once triggering it. Thank you for the help.
I think 2012 and Windows 7 are the same platform, so it could be that Sophos on that OS still uses the appinit_dlls key which is fine. Unless it's causing an issue?
No issues just researching to see if this was malicious as reported or was a false alarm. I am leaning to false alarm but wanted to provide better info on why.