MALICIOUS Threat Names: Win32.Worm.Brontok.AM

Total Page:16

File Type:pdf, Size:1020Kb

MALICIOUS Threat Names: Win32.Worm.Brontok.AM DYNAMIC ANALYSIS REPORT #2195013 Classifications: - MALICIOUS Threat Names: Win32.Worm.Brontok.AM Verdict Reason: - Sample Type Windows Exe (x86-32) File Name _default17292.pif.exe ID #875538 MD5 db947f234febeae1c1c91e971a680eb4 SHA1 1b19ede284dd2ed36e44cdfbac9dda2d0573ca70 SHA256 b4a0a125cb13358e2319648ddc51d1e88b18766a12abaf50e6e3723a8af5c982 File Size 97.66 KB Report Created 2021-08-24 00:36 (UTC+2) Target Environment win10_64_th2_en_mso2016 | exe X-Ray Vision for Malware - www.vmray.com 1 / 20 DYNAMIC ANALYSIS REPORT #2195013 OVERVIEW VMRay Threat Identifiers (10 rules, 55 matches) Score Category Operation Count Classification 4/5 System Modification Disables a crucial system tool 1 - • (Process #1) _default17292.pif.exe disables the Registry Editor via registry. 4/5 Antivirus Malicious content was detected by heuristic scan 5 - • Built-in AV detected the sample itself as "Win32.Worm.Brontok.AM". • Built-in AV detected the dropped file C:\Windows\system32\n10767\winlogon.exe as "Win32.Worm.Brontok.AM". • Built-in AV detected a memory dump of (process #1) _default17292.pif.exe as "Win32.Worm.Brontok.AM". • Built-in AV detected a memory dump of (process #3) smss.exe as "Win32.Worm.Brontok.AM". • Built-in AV detected a memory dump of (process #5) winlogon.exe as "Win32.Worm.Brontok.AM". 1/5 System Modification Modifies operating system directory 23 - • (Process #1) _default17292.pif.exe creates file "C:\Windows\system32\n10767\smss.exe" in the OS directory. • (Process #1) _default17292.pif.exe creates file "C:\Windows\j6199922.exe" in the OS directory. • (Process #1) _default17292.pif.exe creates file "C:\Windows\system32\c_19992k.com" in the OS directory. • (Process #1) _default17292.pif.exe creates file "C:\Windows\system32\n10767\sv712709030r.exe" in the OS directory. • (Process #1) _default17292.pif.exe creates file "C:\Windows\o4199927.exe" in the OS directory. • (Process #1) _default17292.pif.exe creates file "C:\Windows\_default19992.pif" in the OS directory. • (Process #1) _default17292.pif.exe creates file "C:\Windows\system32\msvbvm60.dll.857" in the OS directory. • (Process #3) smss.exe creates file "C:\Windows\system32\n10767\smss.exe" in the OS directory. • (Process #3) smss.exe creates file "C:\Windows\j6199922.exe" in the OS directory. • (Process #3) smss.exe creates file "C:\Windows\system32\c_19992k.com" in the OS directory. • (Process #3) smss.exe creates file "C:\Windows\system32\n10767\sv712709030r.exe" in the OS directory. • (Process #3) smss.exe creates file "C:\Windows\o4199927.exe" in the OS directory. • (Process #3) smss.exe creates file "C:\Windows\_default19992.pif" in the OS directory. • (Process #3) smss.exe creates file "C:\Windows\system32\msvbvm60.dll.871" in the OS directory. • (Process #3) smss.exe creates file "C:\Windows\system32\n10767\sv712709030r.exemsatr.bin" in the OS directory. • (Process #3) smss.exe creates file "C:\Windows\system32\n10767\winlogon.exe" in the OS directory. • (Process #5) winlogon.exe creates file "C:\Windows\system32\n10767\smss.exe" in the OS directory. • (Process #5) winlogon.exe creates file "C:\Windows\j6199922.exe" in the OS directory. • (Process #5) winlogon.exe creates file "C:\Windows\system32\c_19992k.com" in the OS directory. • (Process #5) winlogon.exe creates file "C:\Windows\system32\n10767\sv712709030r.exe" in the OS directory. • (Process #5) winlogon.exe creates file "C:\Windows\o4199927.exe" in the OS directory. • (Process #5) winlogon.exe creates file "C:\Windows\_default19992.pif" in the OS directory. • (Process #5) winlogon.exe creates file "C:\Windows\system32\msvbvm60.dll.874" in the OS directory. 1/5 Persistence Installs system startup script or application 18 - X-Ray Vision for Malware - www.vmray.com 2 / 20 DYNAMIC ANALYSIS REPORT #2195013 Score Category Operation Count Classification • (Process #1) _default17292.pif.exe adds ""C:\Windows\system32\n10767\sv712709030r.exe"" to Windows startup via registry. • (Process #1) _default17292.pif.exe adds ""C:\Users\RDhJ0CNFevzX\AppData\Local\dv6270900x\yesbron.com"" to Windows startup via registry. • (Process #1) _default17292.pif.exe adds ""C:\Windows\j6199922.exe"" to Windows startup via registry. • (Process #1) _default17292.pif.exe adds "Explorer.exe "C:\Windows\o4199927.exe"" to Windows startup via registry. • (Process #1) _default17292.pif.exe adds ""C:\Windows\_default19992.pif"" to Windows startup via registry. • (Process #1) _default17292.pif.exe adds "C:\Windows\system32\userinit.exe,C:\Windows\j6199922.exe" to Windows startup via registry. • (Process #3) smss.exe adds ""C:\Windows\system32\n10767\sv712709030r.exe"" to Windows startup via registry. • (Process #3) smss.exe adds ""C:\Users\RDhJ0CNFevzX\AppData\Local\dv6270900x\yesbron.com"" to Windows startup via registry. • (Process #3) smss.exe adds ""C:\Windows\j6199922.exe"" to Windows startup via registry. • (Process #3) smss.exe adds "Explorer.exe "C:\Windows\o4199927.exe"" to Windows startup via registry. • (Process #3) smss.exe adds ""C:\Windows\_default19992.pif"" to Windows startup via registry. • (Process #3) smss.exe adds "C:\Windows\system32\userinit.exe,C:\Windows\j6199922.exe" to Windows startup via registry. • (Process #5) winlogon.exe adds ""C:\Windows\system32\n10767\sv712709030r.exe"" to Windows startup via registry. • (Process #5) winlogon.exe adds ""C:\Users\RDhJ0CNFevzX\AppData\Local\dv6270900x\yesbron.com"" to Windows startup via registry. • (Process #5) winlogon.exe adds ""C:\Windows\j6199922.exe"" to Windows startup via registry. • (Process #5) winlogon.exe adds "Explorer.exe "C:\Windows\o4199927.exe"" to Windows startup via registry. • (Process #5) winlogon.exe adds ""C:\Windows\_default19992.pif"" to Windows startup via registry. • (Process #5) winlogon.exe adds "C:\Windows\system32\userinit.exe,C:\Windows\j6199922.exe" to Windows startup via registry. 1/5 Hide Tracks Creates process with hidden window 2 - • (Process #1) _default17292.pif.exe starts (process #3) smss.exe with a hidden window. • (Process #3) smss.exe starts (process #5) winlogon.exe with a hidden window. 1/5 Discovery Enumerates running processes 1 - • (Process #5) winlogon.exe enumerates running processes. 1/5 Privilege Escalation Enables process privilege 1 - • (Process #5) winlogon.exe enables process privilege "SeDebugPrivilege". 1/5 Execution Executes itself 2 - • (Process #1) _default17292.pif.exe executes a copy of the sample at C:\Users\RDhJ0CNFevzX\Desktop\_default17292.pif.exe. • (Process #3) smss.exe executes a copy of the sample at C:\Users\RDhJ0CNFevzX\Desktop\_default17292.pif.exe. 1/5 Execution Drops PE file 1 - • (Process #3) smss.exe drops file "C:\Windows\system32\n10767\winlogon.exe". 1/5 Execution Executes dropped PE file 1 - • Executes dropped file "C:\Windows\system32\n10767\winlogon.exe". X-Ray Vision for Malware - www.vmray.com 3 / 20 DYNAMIC ANALYSIS REPORT #2195013 Mitre ATT&CK Matrix Privilege Defense Credential Lateral Command Initial Access Execution Persistence Discovery Collection Exfiltration Impact Escalation Evasion Access Movement and Control #T1060 #T1057 Registry Run #T1112 Modify Process Keys / Startup Registry Discovery Folder #T1143 Hidden Window X-Ray Vision for Malware - www.vmray.com 4 / 20 DYNAMIC ANALYSIS REPORT #2195013 Sample Information ID #875538 MD5 db947f234febeae1c1c91e971a680eb4 SHA1 1b19ede284dd2ed36e44cdfbac9dda2d0573ca70 SHA256 b4a0a125cb13358e2319648ddc51d1e88b18766a12abaf50e6e3723a8af5c982 SSDeep 1536:5vXMoORizUPliPsm/gL16ZpQGh6MgHN+PhuLGR/11QrtpvvMoOM:RXxOMUMPsgQvTMY+PhGGR/11QrnvxOM ImpHash 1af1161d37f455fda94db97751b0224e File Name _default17292.pif.exe File Size 97.66 KB Sample Type Windows Exe (x86-32) Has Macros Analysis Information Creation Time 2021-08-24 00:36 (UTC+2) Analysis Duration 00:04:00 Termination Reason Timeout Number of Monitored Processes 3 Execution Successful False Reputation Enabled WHOIS Enabled Built-in AV Enabled Built-in AV Applied On Sample Files, PCAP File, Downloaded Files, Dropped Files, Modified Files, Memory Dumps, Embedded Files Number of AV Matches 8 YARA Enabled YARA Applied On Sample Files, PCAP File, Downloaded Files, Dropped Files, Modified Files, Memory Dumps, Embedded Files Number of YARA Matches 0 X-Ray Vision for Malware - www.vmray.com 5 / 20 DYNAMIC ANALYSIS REPORT #2195013 X-Ray Vision for Malware - www.vmray.com 6 / 20 DYNAMIC ANALYSIS REPORT #2195013 Screenshots truncated X-Ray Vision for Malware - www.vmray.com 7 / 20 DYNAMIC ANALYSIS REPORT #2195013 NETWORK General 0 bytes total sent 0 bytes total received 0 ports 0 contacted IP addresses 0 URLs extracted 0 files downloaded 0 malicious hosts detected DNS 0 DNS requests for 0 domains 0 nameservers contacted 0 total requests returned errors HTTP/S 0 URLs contacted, 0 servers 0 sessions, 0 bytes sent, 0 bytes received X-Ray Vision for Malware - www.vmray.com 8 / 20 DYNAMIC ANALYSIS REPORT #2195013 BEHAVIOR Process Graph #1 Child Process #3 Child Process #5 Sample Start _default17292.pif.exe smss.exe winlogon.exe X-Ray Vision for Malware - www.vmray.com 9 / 20 DYNAMIC ANALYSIS REPORT #2195013 Process #1: _default17292.pif.exe ID 1 File Name c:\users\rdhj0cnfevzx\desktop\_default17292.pif.exe Command Line "C:\Users\RDhJ0CNFevzX\Desktop\_default17292.pif.exe" Initial Working Directory C:\Users\RDhJ0CNFevzX\Desktop\ Monitor Start Time Start Time: 57752, Reason: Analysis Target Unmonitor End Time End Time: 108474, Reason: Terminated Monitor duration 50.72s Return Code 0 PID 5064 Parent PID 1652 Bitness 32 Bit Dropped Files (3) File Name File Size SHA256 YARA Match b4a0a125cb13358e2319648ddc51d1e88b18766a12abaf50e6e3723a8af
Recommended publications
  • Supporting Operating System Installation | 3
    cc01SupportingOperatingSystemInstallation.indd01SupportingOperatingSystemInstallation.indd PagePage 1 08/10/1408/10/14 4:334:33 PMPM martinmartin //208/WB01410/XXXXXXXXXXXXX/ch01/text_s208/WB01410/XXXXXXXXXXXXX/ch01/text_s Supporting Operating LESSON 1 System Installation 70-688 EXAM OBJECTIVE Objective 1.1 – Support operating system installation. This objective may include but is not limited to: Support Windows To Go; manage boot settings, including native virtual hard disk (VHD) and multi-boot; manage desktop images; customize a Windows installation by using Windows Preinstallation Environment (PE). LESSON HEADING EXAM OBJECTIVE Using a Troubleshooting Methodology Viewing System Information Using the Event Viewer Supporting Windows To Go Support Windows To Go Creating and Deploying a Windows To Go Workspace Drive Booting into a Windows To Go Workspace Managing Boot Settings Manage boot settings, including native virtual hard disk (VHD) and multi-boot Using BCDEdit and BCDBoot Configuring a Multi-Boot System Manage boot settings, including native virtual hard disk (VHD) and multi-boot Configuring a Native VHD Boot File Manage boot settings, including native virtual hard disk (VHD) and multi-boot Understanding VHD Formats Installing Windows 8.1 on a VHD with an Operating System Present Installing Windows 8.1 on a VHD Without an Operating SystemCOPYRIGHTED Present MATERIAL Managing Desktop Images Manage desktop images Capturing Images Modifying Images using DISM Customizing a Windows Installation by Using Windows PE Customize a Windows
    [Show full text]
  • Windows 7 Bitlocker™ Drive Encryption Security Policy for FIPS 140-2 Validation
    Windows 7 BitLocker™ Security Policy Page 1 of 16 Windows 7 BitLocker™ Drive Encryption Security Policy For FIPS 140-2 Validation For Windows 7 Document version 1.0 08/31/2011 1. Table of Contents 1. TABLE OF CONTENTS ......................................................................................................................... 1 2. INTRODUCTION .................................................................................................................................. 2 2.1 List of Cryptographic Modules ........................................................................................................................... 2 2.2 Brief Module Description ................................................................................................................................... 3 2.3 Validated Platforms ........................................................................................................................................... 4 3. INTEGRITY CHAIN OF TRUST .......................................................................................................... 4 4. CRYPTOGRAPHIC BOUNDARIES ..................................................................................................... 5 4.1 Overall Cryptographic Boundary........................................................................................................................ 5 4.2 BitLocker™ Components Included in the Boundary .......................................................................................... 5 4.3 Other Windows
    [Show full text]
  • Guidelines for Designing Embedded Systems with Windows 10 Iot Enterprise
    Guidelines for Designing Embedded Systems with Windows 10 IoT Enterprise Version 2.0 Published July 15, 2016 Guidelines for designing embedded systems 1 CONFIDENTIAL Contents Overview .................................................................................................................................................................................................... 4 Building a task-specific experience ............................................................................................................................................ 4 General Group Policy settings ....................................................................................................................................................... 4 Application control ................................................................................................................................................................................ 5 Application boot options ................................................................................................................................................................. 5 Auto-boot Universal Windows apps ...................................................................................................................................... 5 Auto-boot Classic Windows apps ........................................................................................................................................... 5 Limit application access with AppLocker ...............................................................................................................................
    [Show full text]
  • Disabling Windows Logon Optimization
    Network : connection failures during startup : disabling Windows logon optimization 379 Camille Garick Wed, May 13, 2020 Authentication Accounting Module AAM)™ 61 Warning Modify the registry at your own risk. EnvisionWare does not provide Windows support. Serious problems might occur if you modify the registry incorrectly by using Registry Editor or by using another method. These problems might require that you reinstall the operating system. We recommend that your Operating System support team undertake these changes. Microsoft optimized Windows to enhance the user experience by creating the impression that the operating system starts up faster. This is achieved by having the login prompt display before the network is fully initialized. Additionally, existing users may be logged in with cached credentials. Drawbacks in a domain or corporate environment are that login scripts might not run, drives and printers might not be mapped, policies might not get applied until after logon and GPO software distribution may be delayed. This logon optimization can affect some EnvisionWare Products. EnvisionWare products that make connections across a network may fail to start correctly if the application or associated Windows service starts before the network is fully initialized. We recommend turning off Windows Logon Optimization on PC’s where EnvisionWare products are running. The Logon optimization can be disabled in the following ways: 1. Via Local Policy - Computer Configuration\Administrative Templates\System\Logon\Always wait for the network at computer startup and logon 2. Via Group Policy - Computer Configuration\Administrative Templates\System\Logon\Always wait for the network at computer startup and logon 3. As a Policy via Windows registry - HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\CurrentVersion\Winlogon with registry value SyncForegroundPolicy=dword:00000001 4.
    [Show full text]
  • AMP for Endpoints
    Windows Process Starts Before AMP Connector Workaround - AMP for Endpoints Contents Introduction Requirements Components Used Limitations Background Information Troubleshoot Steps to delay a Windows service Delay the process with the command line Introduction This document describes the steps to troubleshoot in Advanced Malware Protection (AMP) for Endpoints when a Windows process starts before System Process Protection (SPP). Contributed by Nancy Perez and Uriel Torres, Cisco TAC Engineers. Requirements Cisco recommends that you have knowledge of these topics: ● Windows OS ● AMP connector's engines Components Used The information in this document is based on these software and hardware versions: ● Windows 10 device ● AMP connector 6.2.9 version The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command. Limitations This is a bug that affects the System Process Protection engine when a process starts before the AMP connector CSCvo90440. Background Information The AMP for Endpoints System Process Protection engine protects critical Windows system processes from memory injection attacks by other processes. In order to enable SPP, on the AMP console, navigate to Management > Policies > click on edit in the policy you want to modify > Modes and Engines > System Process Protection, here you can find three options: ● Protect: blocks attacks
    [Show full text]
  • Windows XP Embedded Thin Client Manual
    ______________________________________________________________ Windows XP Embedded Thin Client Manual Version 1.2.1 ___________________________________________________________ Contents Contents Chapter 1 – Introduction 1 Overview 1 XPe File System 2 Chapter 2 - Startup and Configuration 2-1 Default Logon accounts 2-1 Logging On 2-1 XPe Management 2-3 1. Assign AutoLogon User 2-4 2. Setting Display Properties 2-4 3. Computer Management 2-5 4. XPe SNMP Control Utility 2-6 5. RAM Disk Size Properties 2-7 6. PopUp Main Menu 2-8 Network Connections 2-8 Microsoft Firewall 2-9 Chapter 3 - Applications 3-1 Installing New Applications / Device Drivers 3-1 Printer Driver Installation Example 3-1 Setup LPD printer on XPe 3-2 CITRIX Program Neighborhood 3-3 Remote Desktop Connection (RDP) 3-4 Internet Explorer 3-5 Kiosk Mode 3-6 Lock down IE using registry edits 3-6 TermPro Emulations 3-7 802.11a/b/g wireless adapter support 3-7 USB Device Support 3-7 GPEDIT (Group Edit) 3-7 SNMPadm - Remote Management 3-8 i Contents Chapter 4 – TermPro Emulations 4-1 Configure/Edit Sessions 4-3 Display Sessions 4-6 Printer Sessions 4-15 Using Emulation Sessions 4-20 Display Sessions 4-20 Printer Sessions 4-38 Appendix A – XPe Image Recovery A-1 Appendix B – Advanced Configuration Notes B-1 Expand User Access B-1 Auto-re-logon B-2 ii Introduction Chapter 1 – Introduction An overview of the XPe Thin Client is presented along with a description of its file system. Overview The XPe thin client, with its high quality, versatility, and flexibility, is an expandable high-performance terminal that gives users the ability to access Windows, Internet, multimedia, and legacy applications, at a lower total cost of ownership than PCs or other computing products.
    [Show full text]
  • PLATINUM Targeted Attacks in South and Southeast Asia
    PLATINUM Targeted attacks in South and Southeast Asia Windows Defender Advanced Threat Hunting Team This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet website references, may change without notice. You bear the risk of using it. Copyright © 2016 Microsoft Corporation. All rights reserved. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Table of contents PLATINUM: Targeted attacks in South and Southeast Asia........................................... 4 Adversary profile ............................................................................................................................ 4 Methods of attack .......................................................................................................................... 6 Technical details ............................................................................................................................. 11 Dipsind ................................................................................................................................................................................ 11 JPIN ..................................................................................................................................................................................... 15 adbupd ..............................................................................................................................................................................
    [Show full text]
  • Zenworks Application 2017 Update 4 January 2019
    ZENworks Application 2017 Update 4 January 2019 1 Documentation Updates This section contains information on documentation content changes that were made in ZENworks Configuration Management (ZENworks Application). The information can help you to keep current on updates to the documentation. The documentation was updated on the following date: 2 Overview ZENworks Application (ZAPP) leverages the capabilities of a unified endpoint management solution to provide an enhanced user experience, while using the same functionality as that of the old Novell Application Launcher (NAL) window. The features include: A brand new user interface that serves as a single place for all ZENworks end user functionality on Windows. An integrated search to help you find the app of your choice. The search includes full and split pattern matching by name, description, and contact information. A new branding policy that enables your organization to customize certain aspects of the ZENworks Application based on your own branding requirements, such as the ZAPP icon, wallpaper, and color. You can pin and unpin bundles to the Desktop, Taskbar, and Start menu tiles. An improved user experience, including: Providing remote assistance to end users from the ZAPP window. You do not need to go to the ZENworks system tray icon, you can click the menu from ZAPP itself to request remote assistance. This document includes the following: Section 2.1, “Launching ZAPP,” on page 2 Section 2.2, “Logging into ZENworks,” on page 2 Section 2.3, “Launching help,” on page 2
    [Show full text]
  • Advanced Authentication - Windows Client
    Installation and Configuration Guide Advanced Authentication - Windows Client Version 6.1 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.netiq.com/company/legal/. Copyright © 2018 NetIQ Corporation, a Micro Focus company. All Rights Reserved. Contents About This Book 5 About NetIQ Corporation 7 1 System Requirements 9 2 Offline Support for Windows Client 11 3 Configuring the Preliminary Settings 13 Configuring the Mandatory Settings . 13 Using a Specific Advanced Authentication Server in a Non-DNS Mode . 13 Setting a DNS for Advanced Authentication Server Discovery . 14 Configuring Optional Settings . 17 Disabling 1:N . 18 Disabling the Local Accounts . 19 Configuration Settings for Multitenancy . 19 Selecting an Event . 19 Configuring Timeout for Card Waiting . 19 Enabling Login Failure After Card Timeout . 20 Configuring Automatic Login . 20 Customizing a Logo . 20 Configuring to Verify Server Certificates . 21 Configuring to Force Offline Login Manually . 21 Configuring the Enforced Cached Login . 22 Configuring Single Sign-on Support for Citrix and Remote Desktop . 22 Customizing the Login Page Background Screen . 23 Changing an Endpoint Name . 23 Configuring to Enable the Authentication Agent Chain . 24 Configuring Integration with Sophos SafeGuard 8. 25 Configuring the Credential Provider Chaining . 25 4 Installing and Uninstalling Windows Client 27 Installing Windows Client . 27 Uninstalling Windows Client . 27 Microsoft Windows 7 . 28 Microsoft Windows 8.1 . 28 Microsoft Windows 10 . 28 5 Client Login Extension Support for Windows Client 29 6 Troubleshooting for Windows Client 31 Debugging Logs for Advanced Authentication . 31 Using a Diagnostic Tool .
    [Show full text]
  • CIS Microsoft Windows Server 2012 Benchmarkv1.0.0
    CIS Microsoft Windows Server 2012 Benchmarkv1.0.0 01-31-2013 The CIS Security Benchmarks division provides consensus-oriented information security products, services, tools, metrics, suggestions, and recommendations (the “SB Products”) as a public service to Internet users worldwide. Downloading or using SB Products in any way signifies and confirms your acceptance of and your binding agreement to these CIS Security Benchmarks Terms of Use. CIS SECURITY BENCHMARKS TERMS OF USE BOTH CIS SECURITY BENCHMARKS DIVISION MEMBERS AND NON-MEMBERS MAY: Download, install, and use each of the SB Products on a single computer, and/or Print one or more copies of any SB Product that is in a .txt, .pdf, .doc, .mcw, or .rtf format, but only if each such copy is printed in its entirety and is kept intact, including without limitation the text of these CIS Security Benchmarks Terms of Use. UNDER THE FOLLOWING TERMS AND CONDITIONS: SB Products Provided As Is. CIS is providing the SB Products “as is” and “as available” without: (1) any representations, warranties, or covenants of any kind whatsoever (including the absence of any warranty regarding: (a) the effect or lack of effect of any SB Product on the operation or the security of any network, system, software, hardware, or any component of any of them, and (b) the accuracy, utility, reliability, timeliness, or completeness of any SB Product); or (2) the responsibility to make or notify you of any corrections, updates, upgrades, or fixes. Intellectual Property and Rights Reserved. You are not acquiring any title or ownership rights in or to any SB Product, and full title and all ownership rights to the SB Products remain the exclusive property of CIS.
    [Show full text]
  • Windows Internals
    Windows Internals David Solomon ([email protected]) David Solomon Expert Seminars www.solsem.com Mark Russinovich ([email protected]) Winternals www.winternals.com, www.sysinternals.com About the Speaker: David Solomon 1982-1992: VMS operating systems development at Digital 1992-present: Researching, writing, and teaching Windows operating system internals Frequent speaker at technical conferences (Microsoft TechEd, IT Forum, PDCs, …) Microsoft Most Valuable Professional (1993, 2005) Books Windows Internals, 4th edition PDF version ships with Server 2003 Resource Kit Inside Windows 2000, 3rd edition Inside Windows NT, 2nd edition Windows NT for OpenVMS Professionals Live Classes 2-5 day classes on Windows Internals, Advanced Troubleshooting Video Training 12 hour interactive internals tutorial Licensed by MS for internal use 2 About the Speaker: Mark Russinovich Co-author of Inside Windows 2000, 3rd Edition and Windows Internals, 4th edition with David Solomon Senior Contributing Editor to Windows IT Pro Magazine Co-authors Windows Power Tools column Author of tools on www.sysinternals.com Microsoft Most Valuable Professional (MVP) Co-founder and chief software architect of Winternals Software (www.winternals.com) Ph.D. in Computer Engineering 3 Purpose of Tutorial Give Windows developers a foundation understanding of the system’s kernel architecture Design better for performance & scalability Debug problems more effectively Understand system performance issues We’re covering a small, but important set of core topics: The “plumbing in the boiler room” 4 System Architecture System Processes Services Applications Environment Service Subsystems Control Mgr. POSIX LSASS SvcHost.Exe Task Manager WinMgt.Exe Explorer WinLogon SpoolSv.Exe User OS/2 User Session Services.Exe Application Mode Manager Subsystem DLLs Windows System NTDLL.DLL Threads Kernel Mode System Service Dispatcher (kernel mode callable interfaces) Windows I/O Mgr USER, GDI File ObjectPlug andPower Security ProcessesConfigura- Local Device & System ReferenceVirtual & tion MgrProcedure Mgr.
    [Show full text]
  • Bitlocker™ Drive Encryption Security Policy for FIPS 140-2 Validation
    BitLocker™ Security Policy Page 1 of 16 BitLocker™ Drive Encryption Security Policy For FIPS 140-2 Validation v 1.1 8/31/11 1. Table of Contents 1. TABLE OF CONTENTS ......................................................................................................................... 1 2. INTRODUCTION .................................................................................................................................. 1 2.1 List of Cryptographic Modules ........................................................................................................................... 2 2.2 Brief Module Description ................................................................................................................................... 2 2.3 Validated Platforms ........................................................................................................................................... 3 3. INTEGRITY CHAIN OF TRUST .......................................................................................................... 3 4. CRYPTOGRAPHIC BOUNDARIES ..................................................................................................... 4 4.1 Overall Cryptographic Boundary........................................................................................................................ 4 4.2 BitLocker™ Components Included in the Boundary .......................................................................................... 4 4.3 Other Server 2008 Components .......................................................................................................................
    [Show full text]