Automated Malware Analysis Report For

Total Page:16

File Type:pdf, Size:1020Kb

Automated Malware Analysis Report For ID: 219320 Cookbook: browseurl.jbs Time: 00:06:44 Date: 01/04/2020 Version: 28.0.0 Lapis Lazuli Table of Contents Table of Contents 2 Analysis Report http://ib.adnxs.com 4 Overview 4 General Information 4 Detection 5 Confidence 5 Classification Spiderchart 6 Analysis Advice 6 Mitre Att&ck Matrix 7 Signature Overview 7 Networking: 7 System Summary: 7 Malware Analysis System Evasion: 8 Malware Configuration 8 Behavior Graph 8 Simulations 8 Behavior and APIs 8 Antivirus, Machine Learning and Genetic Malware Detection 8 Initial Sample 8 Dropped Files 9 Unpacked PE Files 9 Domains 9 URLs 9 Yara Overview 10 Initial Sample 10 PCAP (Network Traffic) 10 Dropped Files 10 Memory Dumps 10 Unpacked PEs 10 Sigma Overview 10 Joe Sandbox View / Context 10 IPs 10 Domains 10 ASN 10 JA3 Fingerprints 10 Dropped Files 11 Screenshots 11 Thumbnails 11 Startup 12 Created / dropped Files 12 Domains and IPs 41 Contacted Domains 41 Contacted URLs 41 URLs from Memory and Binaries 42 Contacted IPs 44 Public 44 Static File Info 45 No static file info 45 Network Behavior 45 Network Port Distribution 45 TCP Packets 45 UDP Packets 47 DNS Queries 49 DNS Answers 49 HTTP Request Dependency Graph 53 HTTP Packets 53 HTTPS Packets 54 Copyright Joe Security LLC 2020 Page 2 of 64 Code Manipulations 63 Statistics 63 Behavior 63 System Behavior 63 Analysis Process: iexplore.exe PID: 4776 Parent PID: 696 63 General 63 File Activities 63 Registry Activities 64 Analysis Process: iexplore.exe PID: 2872 Parent PID: 4776 64 General 64 File Activities 64 Registry Activities 64 Disassembly 64 Copyright Joe Security LLC 2020 Page 3 of 64 Analysis Report http://ib.adnxs.com Overview General Information Joe Sandbox Version: 28.0.0 Lapis Lazuli Analysis ID: 219320 Start date: 01.04.2020 Start time: 00:06:44 Joe Sandbox Product: CloudBasic Overall analysis duration: 0h 6m 35s Hypervisor based Inspection enabled: false Report type: light Cookbook file name: browseurl.jbs Sample URL: ib.adnxs.com Analysis system description: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113 Number of analysed new started processes analysed: 8 Number of new started drivers analysed: 0 Number of existing processes analysed: 0 Number of existing drivers analysed: 0 Number of injected processes analysed: 1 Technologies: EGA enabled Analysis stop reason: Timeout Detection: CLEAN Classification: clean0.win@3/169@26/18 Cookbook Comments: Adjust boot time Enable AMSI Browsing link: https://www.app nexus.com/en/error#main-content Browsing link: https://www.appnexus.com/ Browsing link: https://www.appnexus.com/careers Browsing link: https://www.app nexus.com/careers/life-at-appnexus Browsing link: https://www.app nexus.com/careers/teams Browsing link: https://www.app nexus.com/careers/getting-hired Browsing link: https://www.app nexus.com/careers/students Browsing link: https://xandr.att.jobs/search-jobs Browsing link: https://console.appnexus.com/login Browsing link: https://openadstream- eu1.247realmedia.com/oas/ Browsing link: https://openads tream17.247realmedia.com/oas/ Copyright Joe Security LLC 2020 Page 4 of 64 Warnings: Show All Exclude process from analysis (whitelisted): taskhostw.exe, dllhost.exe, consent.exe, ielowutil.exe, WMIADAP.exe, svchost.exe TCP Packets have been reduced to 100 Created / dropped Files have been reduced to 100 Excluded IPs from analysis (whitelisted): 23.66.21.99, 216.58.208.46, 172.217.18.10, 151.101.2.110, 151.101.66.110, 151.101.130.110, 151.101.194.110, 104.22.78.135, 104.22.79.135, 2.20.218.118, 204.79.197.200, 13.107.21.200, 2.18.68.82, 92.122.215.65, 92.122.215.54, 23.10.249.67, 23.10.249.90, 2.20.142.2, 216.58.208.40, 152.199.19.161, 8.253.207.121, 8.253.207.120, 8.248.131.254, 67.27.157.254, 8.241.121.254, 205.185.216.10, 205.185.216.42, 67.27.158.126, 8.241.121.126, 67.27.159.254, 8.241.122.126, 67.27.158.254, 67.27.157.126, 8.253.95.120, 8.241.122.254 Excluded domains from analysis (whitelisted): e11697.x.akamaiedge.net, www.xandr.jobs.edgekey.net, www.googleadservices.com, e11697.dscx.akamaiedge.net, fs- wildcard.microsoft.com.edgekey.net, fs- wildcard.microsoft.com.edgekey.net.globalredir.aka dns.net, adservice.google.com, tbcdn.talentbrew.com-v1.edgekey.net, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, go.microsoft.com, prod- www.zr-att.com.akadns.net, e25441.f.akamaiedge.net, www.googletagmanager.com, e24999.f.akamaiedge.net, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, bat.bing.com, auto.au.download.windowsupdate.com.c.footprint.n et, www.xandr.com.cdn.cloudflare.net, prod.fs.microsoft.com.akadns.net, xandr.att.jobs.edgekey.net, e37551.b.akamaiedge.net, www.google- analytics.com, fonts.googleapis.com, fs.microsoft.com, www-google- analytics.l.google.com, dual-a-0001.a-msedge.net, ie9comview.vo.msecnd.net, www- googletagmanager.l.google.com, f4.shared.global.fastly.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, bat-bing-com.a-0001.a- msedge.net, www.att.com.edgekey.net, i.xandr.com.cdn.cloudflare.net, go.microsoft.com.edgekey.net, smetrics.att.com.edgekey.net, cs9.wpc.v0cdn.net Report size exceeded maximum capacity and may have missing behavior information. Report size getting too big, too many NtCreateFile calls found. Report size getting too big, too many NtDeviceIoControlFile calls found. Detection Strategy Score Range Reporting Whitelisted Detection Threshold 0 0 - 100 false Confidence Strategy Score Range Further Analysis Required? Confidence Copyright Joe Security LLC 2020 Page 5 of 64 Strategy Score Range Further Analysis Required? Confidence Threshold 4 0 - 5 false Classification Spiderchart Ransomware Miner Spreading mmaallliiiccciiioouusss malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious cccllleeaann clean Exploiter Banker Spyware Trojan / Bot Adware Analysis Advice Uses HTTPS for network communication, use the 'Proxy HTTPS (port 443) to read its encrypted data' cookbook for further analysis Copyright Joe Security LLC 2020 Page 6 of 64 Mitre Att&ck Matrix Remote Initial Privilege Defense Credential Lateral Command Network Service Access Execution Persistence Escalation Evasion Access Discovery Movement Collection Exfiltration and Control Effects Effects Valid Graphical User Winlogon Process Masquerading 1 Credential Security Remote File Data from Data Standard Eavesdrop on Remotely Accounts Interface 2 Helper DLL Injection 1 Dumping Software Copy 1 Local Compressed Cryptographic Insecure Track Device Discovery 1 System Protocol 2 Network Without Communication Authorization Replication Service Port Accessibility Process Network File and Remote Data from Exfiltration Standard Exploit SS7 to Remotely Through Execution Monitors Features Injection 1 Sniffing Directory Services Removable Over Other Non- Redirect Phone Wipe Data Removable Discovery 1 Media Network Application Calls/SMS Without Media Medium Layer Authorization Protocol 2 External Windows Accessibility Path Rootkit Input Query Windows Data from Automated Standard Exploit SS7 to Obtain Remote Management Features Interception Capture Registry Remote Network Exfiltration Application Track Device Device Services Instrumentation Management Shared Layer Location Cloud Drive Protocol 3 Backups Drive-by Scheduled System DLL Search Obfuscated Files Credentials System Logon Input Data Remote File SIM Card Compromise Task Firmware Order or Information in Files Network Scripts Capture Encrypted Copy 1 Swap Hijacking Configuration Discovery Signature Overview • Networking • System Summary • Malware Analysis System Evasion Click to jump to signature section Networking: Downloads files from webservers via HTTP Found strings which match to known social media urls Performs DNS lookups Urls found in memory or binary data Uses HTTPS System Summary: Binary contains paths to development resources Classification label Creates files inside the user directory Creates temporary files Reads ini files Spawns processes Found GUI installer (many successful clicks) Copyright Joe Security LLC 2020 Page 7 of 64 Found graphical window changes (likely an installer) Uses new MSVCR Dlls Malware Analysis System Evasion: May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) Malware Configuration No configs have been found Behavior Graph Hide Legend Behavior Graph Legend: ID: 219320 Process URL: http://ib.adnxs.com Signature Startdate: 01/04/2020 Created File Architecture: WINDOWS DNS/IP Info Score: 0 Is Dropped Is Windows Process Number of created Registry Values www.appnexus.com live-appnexus.pantheonsite.io fe2.edge.pantheon.io started Number of created Files Visual Basic Delphi Java iexplore.exe .Net C# or VB.NET C, C++ or other language 4 88 Is malicious Internet started iexplore.exe 6 193 ab13.mktoedge.com cookie-cdn.cookiepro.com 104.16.95.80, 443, 49753, 49754 104.20.184.45, 443, 49766, 49767 44 other IPs or domains unknown unknown United States United States Simulations Behavior and APIs No simulations Antivirus, Machine Learning and Genetic Malware Detection Initial Sample Copyright Joe Security LLC 2020 Page 8 of 64 No Antivirus matches Dropped Files No Antivirus matches Unpacked PE Files No Antivirus matches Domains Source Detection Scanner Label Link bam.nr-data.net 0% Virustotal Browse cookie-cdn.cookiepro.com 0% Virustotal Browse ab13.mktoedge.com 0% Virustotal Browse i.xandr.com 0% Virustotal Browse www.xandr.com 0% Virustotal Browse URLs Source Detection Scanner Label Link https://www.xandr.com/favicon-32x32.png
Recommended publications
  • Line 6 POD Go Owner's Manual
    ® 16C Two–Plus Decades ACTION 1 VIEW Heir Stereo FX Cali Q Apparent Loop Graphic Twin Transistor Particle WAH EXP 1 PAGE PAGE Harmony Tape Verb VOL EXP 2 Time Feedback Wow/Fluttr Scale Spread C D MODE EDIT / EXIT TAP A B TUNER 1.10 OWNER'S MANUAL 40-00-0568 Rev B (For use with POD Go Firmware 1.10) ©2020 Yamaha Guitar Group, Inc. All rights reserved. 0•1 Contents Welcome to POD Go 3 The Blocks 13 Global EQ 31 Common Terminology 3 Input and Output 13 Resetting Global EQ 31 Updating POD Go to the Latest Firmware 3 Amp/Preamp 13 Global Settings 32 Top Panel 4 Cab/IR 15 Rear Panel 6 Effects 17 Restoring All Global Settings 32 Global Settings > Ins/Outs 32 Quick Start 7 Looper 22 Preset EQ 23 Global Settings > Preferences 33 Hooking It All Up 7 Wah/Volume 24 Global Settings > Switches/Pedals 33 Play View 8 FX Loop 24 Global Settings > MIDI/Tempo 34 Edit View 9 U.S. Registered Trademarks 25 USB Audio/MIDI 35 Selecting Blocks/Adjusting Parameters 9 Choosing a Block's Model 10 Snapshots 26 Hardware Monitoring vs. DAW Software Monitoring 35 Moving Blocks 10 Using Snapshots 26 DI Recording and Re-amping 35 Copying/Pasting a Block 10 Saving Snapshots 27 Core Audio Driver Settings (macOS only) 37 Preset List 11 Tips for Creative Snapshot Use 27 ASIO Driver Settings (Windows only) 37 Setlist and Preset Recall via MIDI 38 Saving/Naming a Preset 11 Bypass/Control 28 TAP Tempo 12 Snapshot Recall via MIDI 38 The Tuner 12 Quick Bypass Assign 28 MIDI CC 39 Quick Controller Assign 28 Additional Resources 40 Manual Bypass/Control Assignment 29 Clearing a Block's Assignments 29 Clearing All Assignments 30 Swapping Stomp Footswitches 30 ©2020 Yamaha Guitar Group, Inc.
    [Show full text]
  • EFI Printsmith Vision Four51 Integration Guide
    Four51 Integration Guide PrintSmith Vision Version 3.0 June / 2015 2 EFI PrintSmith Vision | Four51 Integration Guide Copyright © 1997 - 2015 by Electronics for Imaging, Inc. All Rights Reserved. EFI PrintSmith Vision | Four51 Integration Guide July 2015 PrintSmith Vision 3.0 This publication is protected by copyright, and all rights are reserved. No part of it may be reproduced or transmitted in any form or by any means for any purpose without express prior written consent from Electronics for Imaging, Inc. Information in this document is subject to change without notice and does not represent a commitment on the part of Electronics for Imaging, Inc. Patents This product may be covered by one or more of the following U.S. Patents: 4,716,978, 4,828,056, 4,917,488, 4,941,038, 5,109,241, 5,170,182, 5,212,546, 5,260,878, 5,276,490, 5,278,599, 5,335,040, 5,343,311, 5,398,107, 5,424,754, 5,442,429, 5,459,560, 5,467,446, 5,506,946, 5,517,334, 5,537,516, 5,543,940, 5,553,200, 5,563,689, 5,565,960, 5,583,623, 5,596,416, 5,615,314, 5,619,624, 5,625,712, 5,640,228, 5,666,436, 5,745,657, 5,760,913, 5,799,232, 5,818,645, 5,835,788, 5,859,711, 5,867,179, 5,940,186, 5,959,867, 5,970,174, 5,982,937, 5,995,724, 6,002,795, 6,025,922, 6,035,103, 6,041,200, 6,065,041, 6,112,665, 6,116,707, 6,122,407, 6,134,018, 6,141,120, 6,166,821, 6,173,286, 6,185,335, 6,201,614, 6,215,562, 6,219,155, 6,219,659, 6,222,641, 6,224,048, 6,225,974, 6,226,419, 6,238,105, 6,239,895, 6,256,108, 6,269,190, 6,271,937, 6,278,901, 6,279,009, 6,289,122, 6,292,270, 6,299,063, 6,310,697,
    [Show full text]
  • Microtemporality: at the Time When Loading-In-Progress
    Microtemporality: At The Time When Loading-in-progress Winnie Soon School of Communication and Culture, Aarhus University [email protected] Abstract which data processing and code inter-actions are Loading images and webpages, waiting for social media feeds operated in real-time. The notion of inter-actions mainly and streaming videos and multimedia contents have become a draws references from the notion of "interaction" from mundane activity in contemporary culture. In many situations Computer Science and the notion of "intra-actions" from nowadays, users encounter a distinctive spinning icon during Philosophy. [3][4][5] The term code inter-actions the loading, waiting and streaming of data content. A highlights the operational process of things happen graphically animated logo called throbber tells users something within, and across, machines through different technical is loading-in-progress, but nothing more. This article substrates, and hence produce agency. investigates the process of data buffering that takes place behind a running throbber. Through artistic practice, an experimental project calls The Spinning Wheel of Life explores This article is informed by artistic practice, including the temporal and computational complexity of buffering. The close reading of a throbber and its operational logics of article draws upon Wolfgang Ernst’s concept of data buffering, as well as making and coding of a “microtemporality,” in which microscopic temporality is throbber. These approaches, following the tradition of expressed through operational micro events. [1] artistic research, allow the artist/researcher to think in, Microtemporality relates to the nature of signals and through and with art. [7] Such mode of inquiry questions communications, mathematics, digital computation and the invisibility of computational culture.
    [Show full text]
  • Biology-Related Parameter Identification in Large Kinetic
    Takustraße 7 Konrad-Zuse-Zentrum D-14195 Berlin-Dahlem für Informationstechnik Berlin Germany T. DIERKES, M. WADE, U. NOWAK, S. RÖBLITZ BioPARKIN — Biology-related Parameter Identification in Large Kinetic Networks ZIB-Report 11-15 (December 2011) Herausgegeben vom Konrad-Zuse-Zentrum für Informationstechnik Berlin Takustraße 7 D-14195 Berlin-Dahlem Telefon: 030-84185-0 Telefax: 030-84185-125 e-mail: [email protected] URL: http://www.zib.de ZIB-Report (Print) ISSN 1438-0064 ZIB-Report (Internet) ISSN 2192-7782 BioPARKIN — Biology-related Parameter Identification in Large Kinetic Networks T. Dierkes M. Wade U. Nowak S. Röblitz∗ 19th December 2011 Abstract Modelling, parameter identification, and simulation play an important rôle in systems biology. In recent years, various software packages have been established for scientific use in both licencing types, open source as well as commercial. Many of these codes are based on inefficient and mathematically outdated algorithms. By introducing the package BioPARKIN recently developed at ZIB, we want to improve this situation significantly. The development of the software BioPARKIN involves long standing mathematical ideas that, however, have not yet entered the field of systems biology, as well as new ideas and tools that are particularly important for the analysis of the dynamics of biological networks. BioPARKIN originates from the package PARKIN, written by P.Deuflhard and U.Nowak, that has been applied successfully for parameter identification in chemical physics for many years. This report is addressed
    [Show full text]
  • Index Images Download 2006 News Crack Serial Warez Full 12 Contact
    index images download 2006 news crack serial warez full 12 contact about search spacer privacy 11 logo blog new 10 cgi-bin faq rss home img default 2005 products sitemap archives 1 09 links 01 08 06 2 07 login articles support 05 keygen article 04 03 help events archive 02 register en forum software downloads 3 security 13 category 4 content 14 main 15 press media templates services icons resources info profile 16 2004 18 docs contactus files features html 20 21 5 22 page 6 misc 19 partners 24 terms 2007 23 17 i 27 top 26 9 legal 30 banners xml 29 28 7 tools projects 25 0 user feed themes linux forums jobs business 8 video email books banner reviews view graphics research feedback pdf print ads modules 2003 company blank pub games copyright common site comments people aboutus product sports logos buttons english story image uploads 31 subscribe blogs atom gallery newsletter stats careers music pages publications technology calendar stories photos papers community data history arrow submit www s web library wiki header education go internet b in advertise spam a nav mail users Images members topics disclaimer store clear feeds c awards 2002 Default general pics dir signup solutions map News public doc de weblog index2 shop contacts fr homepage travel button pixel list viewtopic documents overview tips adclick contact_us movies wp-content catalog us p staff hardware wireless global screenshots apps online version directory mobile other advertising tech welcome admin t policy faqs link 2001 training releases space member static join health
    [Show full text]
  • CSC245 - Web Technologies and Programming Homework Assignment 5: Baby Names
    CSC245 - Web Technologies and Programming Homework Assignment 5: Baby Names This assignment tests your understanding of fetching data from files and web services using Ajax requests. You must match in appearance and behavior the following web page: Background Information: Every 10 years, the Social Security Administration provides data about the 1000 most popular boy and girl names for children born in the US, at http://www.ssa.gov/OACT/babynames/ . Your task for this assignment is to write the JavaScript code for a web page to display the baby names, popularity rankings, and meanings. You do not need to submit any HTML or CSS file. You will be provided with the HTML (names.html) and CSS (names.css) code to use. Turn in only the following file: ◦ names.Js, the JavaScript code for your Baby Names web page Data: Your program will get its data from a web service located at the following URL: https://cs.berry.edu/webdev/scripts/labs/babynames/babynames.php This web service has three “modes,” each of which provides a different type of data. Specify which type of data you want from it by changing a query parameter named type. Each query returns either plain text or JSON as its output. If you make a malformed request, such as one missing a necessary parameter, the service will respond with an HTTP error code of 400 rather than the default 200. If you request data for a name the server doesn't have data for, the service will respond with an error code of 404. (Hint: You can test queries by typing the URL of the web service, along with the appropriate query string parameters, in your web browser's address bar and seeing the result.
    [Show full text]
  • HIPE Owner's Guide 1
    Build 15.0.3262 HIPE Owner's Guide 1. Welcome Welcome to HIPE, the Herschel Interactive Processing Environment! This guide contains everything you need to know about the main software tool for the analysis of Herschel data. Here is what the next pages have in store for you: • Section 2 – Installing HIPE and performing basic configuration. • Section 3 – Basic concepts about HIPE. • Section 4 – Fine-tuning every aspect of HIPE with the Preferences dialogue window. • Section 5 – The Help System and its browsing and search features. • Section 6 – Extending HIPE with plug-ins. • Section 7 – Managing memory. • Section 8 – Managing running jobs. • Section 9 – Opening and running scripts. • Section 10 – Running scripts outside HIPE. • Section 11 – Editing scripts and configuring the editor. • Section 12 – Managing log messages. • Section 13 – Saving and restoring variables and sessions. • Section 14 – Managing calibration sources. • Section 15 – Viewing data products and observations. • Section 16 – Giving feedback about HIPE. • Section 17 – HIPE views. • Section 18 – HIPE perspectives. • Section 19 – Customising views and perspectives. • Section 20 – Mouse click behaviours and keyboard shortcuts. • Section 21 – Managing monospaced fonts. • Section 22 – Comparison tables to translate the most used IDL commands into HIPE. There is much more to HIPE than is contained in this manual: • If you want to learn more about graphical tools to download, visualise and analyse your data, check the Data Analysis Guide. • If you want to learn the scripting language used in HIPE and master the command line interface, have a look at the Scripting Guide. 1 HIPE Owner's Guide Build 15.0.3262 • See the Welcome page of the HIPE Help System for links to our YouTube and Twitter channels.
    [Show full text]
  • Release Notes – Experience 2.35.4.En
    ReDat eXperience v 2.35.4 Release notes ATC-ATM ReDat eXperience 2.35.4 Release notes Issued: 11/2019 v 2.35.4 rev. 2 Producer: RETIA, a.s. Pražská 341 Zelené Předměstí 530 02 Pardubice Czech Republic with certified system of quality control by ISO 9001 and member of AOBP The manual employs the following fonts for distinction of meaning of the text: Bold • names of programs, files, services, modules, functions, parameters, icons, database tables, formats, numbers and names of chapters in the text, paths, IP addresses. Bold, italics • names of selection items (options of combo boxes, degrees of authorization), user names, role names. LINK, REFERENCE . in an electronic form it is a functional link to the chapter. Courier, bold . source code, text from log files, text from config files. Example, demonstration. 2019 Note, hint. Warning, alert. © Copyright RETIA, a.s. a.s. RETIA, Copyright © 2 ReDat eXperience 2.35.4 Release notes Content 1. KNOWN INCOMPATIBILITIES........................................................................................................... 4 2. NEW FEATURES ................................................................................................................................. 5 2.1 INSTALLATION ........................................................................................................................................... 5 2.2 SYSTEM .................................................................................................................................................... 5 2.2.1 SMTP
    [Show full text]
  • Research on the Perception of Progress Bar Distortions
    Research on the Perception of Progress Bar Distortions Bachelor’s Thesis Marek Augustin Masaryk University Faculty of Informatics Brno, Fall 2018 These pages are where the Statement of an Author and the official signed assignment are located in the printed version of the document. These pages are where the Statement of an Author and the official signed assignment are located in the printed version of the document. Declaration Hereby I declare that this thesis is my original authorial work, which I have worked out on my own. All sources, references, and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Marek Augustin Advisor: Mgr. Marek Žuži Aknowledgement I would like to thank my supervisor Mgr. Marek Žuži for all the advices, friendliness and sup- port he gave me during the whole semester I was preparing this thesis. I would also like to thank Mgr. Vojtěch Juřík for all the time he dedicated to giving me an insight to the basics of psychol- ogy research. Abstract In today’s software, the usage of progress phenomenon of “second shown progress bar” bars (of any type) is very high and users come has been discovered. across them everywhere, from their personal computers to public places, like ATMs. Some of the processes that are being visualized by the progress bars consist of multiple subpro- cesses, of which some might have a variable speed that may cause decelerations or stops of the progress bar. This work aims to broaden the research made by Harrison et al.
    [Show full text]
  • L23-Animation.Pdf
    1 Today’s hall-of-fame-and-shame discussion concerns the recent trend in web browsers to replace the window’s title bar with a row of tabs (as in Google Chrome, top, and the beta release of Apple Safari 4, bottom). Let’s talk about this idea from a few perspectives: - Simplicity - Visibility - Graphic design - Consistency - Affordances (what is the little triangle on the right edge of the Safari tab?) - Errors 2 Today we’re going to talk about using animation in graphical user interfaces. Some might say, based on bad experiences with the Web, that animation has no place in a usable interface. Indeed, the <blink> tag originally introduced by the Netscape browser was an abomination. And many advertisements on the Web use animation to grab your attention, which distracts you from what you’re really trying to do and makes you annoyed. So animation has gotten a bad rap in UI. Others complain that animation is just eye candy – it makes interfaces prettier, but that’s all. But neither of those viewpoints is completely fair. Used judiciously, animation can make an important contribution to the usability of an interface. And it’s not as hard to implement as you might think. We’ll talk about both design issues and implementation today. 3 Why would we want to use animation in a GUI? First, it might be an essential part of the application itself. Games and educational simulations generally have to use animation to be realistic and engaging, because they’re simulating a virtual world in which time passes and things move.
    [Show full text]
  • Appway 6.3.2 Release Notes
    Release Notes 6.3.2 - Patch Release | 30.03.2016 Remarks Release notes with changes since version 6.3.1. Upgrade Notes: No special actions are required when upgrading from Appway 6.3.1 to 6.3.2. Appway Platform (Core) Feature Area Importance Description Workspace Medium Now a default Viewport component is automatically added to the rendered screen if no Viewport component exists in the screen. It is possible to disable the default viewport setting to "false" the global configuration "nm.workspace.screen.metatags.defaultviewport" (true by default). Change Area Importance Description Process Engine Low Pre-populating the workflow token lookup cache with local content on start-up. This change makes the PortalAddOns extension obsolete. Workspace Low Replace the placeholder "{ACCESS_TOKEN}" with the access token for the current session. This access token is used to protect from cross-site request forgery (CSRF) attacks. Workspace Low The screen component "HTML Doctype" has been deprecated. Workspace Low Tooltip: The tooltip for Info Boxes' colors can now be changed with Color Business Objects: "aw.generic.TooltipBorder" will be applied to the border and the newly created "aw.generic.TooltipText" will allow changing the text. Also, the tooltip positioning has been changed so that it appears correctly on top of the info icon. Bugfix Area Importance Description Catalogs Low Filter "Column Manipulation": Validation no longer breaks if the user has not entered a new column name for a mapping. At runtime, mappings without a new colum name are now ignored. Validation now also checks if there is a mapping for a non-existing column.
    [Show full text]
  • Portal Agency Training Manual Advanced Editors Guide Drupal 7 – Georgiagov Platform
    Portal Agency Training Manual Advanced Editors Guide Drupal 7 – GeorgiaGov Platform Prepared By: GeorgiaGov Interactive Support: For further assistance, fill out a Support Request at http://portal.georgia.gov/support Revised 11/03/2016 pg. 1 Table of Contents 1.0 Review 2.0 Webforms..............................................................................................................................4 2.1 Building a Webform .................................................................................................................. 4 2.2 Completing a Webform ........................................................................................................... 17 2.3 Setting Up E-mail Recipients for a Webform .......................................................................... 18 2.4 Setting Up E-mail Confirmation .............................................................................................. 19 2.4 Viewing & Exporting Results ...................................................................................................... 19 2.5 Editing a Webform .................................................................................................................. 21 2.6 Closing or Deleting a Webform ............................................................................................... 21 2.7 Convert a Webform to PDF ..................................................................................................... 22 Note: If you need a custom template for your Webform please submit a ticket
    [Show full text]