Automated Malware Analysis Report For

Total Page:16

File Type:pdf, Size:1020Kb

Automated Malware Analysis Report For ID: 256920 Cookbook: browseurl.jbs Time: 15:47:13 Date: 04/08/2020 Version: 29.0.0 Ocean Jasper Table of Contents Table of Contents 2 Analysis Report http://micromedia.us/videos/Pichincha/Items/RemoteTeller.mp4 4 Overview 4 General Information 4 Detection 4 Signatures 4 Classification 4 Startup 4 Malware Configuration 4 Yara Overview 4 Sigma Overview 4 Signature Overview 4 Networking: 5 Mitre Att&ck Matrix 5 Behavior Graph 5 Screenshots 6 Thumbnails 6 Antivirus, Machine Learning and Genetic Malware Detection 7 Initial Sample 7 Dropped Files 7 Unpacked PE Files 7 Domains 7 URLs 7 Domains and IPs 8 Contacted Domains 8 Contacted URLs 8 URLs from Memory and Binaries 8 Contacted IPs 10 Public 10 General Information 10 Simulations 12 Behavior and APIs 12 Created / dropped Files 12 Static File Info 18 No static file info 18 Network Behavior 18 TCP Packets 18 DNS Queries 20 DNS Answers 20 HTTP Request Dependency Graph 20 Code Manipulations 20 Statistics 20 Behavior 21 System Behavior 21 Analysis Process: iexplore.exe PID: 6692 Parent PID: 800 21 General 21 File Activities 21 Registry Activities 21 Analysis Process: iexplore.exe PID: 6736 Parent PID: 6692 21 General 22 File Activities 22 Registry Activities 22 Analysis Process: ssvagent.exe PID: 6800 Parent PID: 6736 22 General 22 Copyright null 2020 Page 2 of 23 Registry Activities 22 Analysis Process: Video.UI.exe PID: 5616 Parent PID: 800 22 General 22 File Activities 23 File Read 23 Registry Activities 23 Disassembly 23 Code Analysis 23 Copyright null 2020 Page 3 of 23 Analysis Report http://micromedia.us/videos/Pichincha/…Items/RemoteTeller.mp4 Overview General Information Detection Signatures Classification Sample URL: micromedia.us/video s/Pichincha/Items/Remote SSnnoorrrttt IIIDDSS aallleerrrttt fffoorrr nneetttwwoorrrkk tttrrraaffffffiiicc (((ee...… Teller.mp4 ASAbnbnonorotrr rmIDaaSlll hahiiligeghrht CCfoPPr UUn e UUtwssaoagrgkee traffic (e. Analysis ID: 256920 CACobonntottaariiminnsas lff fuhuningcchtttii iooCnnPaaUllliiittt yyU ttstooa cgcaeallllll nnaatttiiivvee fff… Ransomware Most interesting Screenshot: Miner Spreading DCDrroroonpptsas i cnceser rrftttuiiifffiniicccaatttiteoe n fffiaiillleleistsy ( ((tDDoE EcRRa)l))l native f mmaallliiiccciiioouusss malicious Evader Phishing QDuruoeeprrisiee scs e ddritisisfkikc iainntfefoo rfrmileaastt ii(ooDnnE ((Roof)ftteenn uusseedd sssuusssppiiiccciiioouusss Quueerrriiieess ddiiisskk iiinnfffoorrrmaatttiiioonn (((oofffttteenn uusseedd… suspicious cccllleeaann Quueerrriiieess ttdthhiesek vv ioonlllfuuomrmee a iiintnifoffoonrrr m(oaaftttieiioonnn u (((nsneaadm… clean Exploiter Banker UQUsuseessr i eccoso ddtheee oo vbbofffuulussmccaaettt iiioionnnfo tttreemcchahntniioiiqqnuu e(enssa (((m… Uses code obfuscation techniques ( Spyware Trojan / Bot Adware Score: 48 Range: 0 - 100 Whitelisted: false Confidence: 100% Startup System is w10x64 iexplore.exe (PID: 6692 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596) iexplore.exe (PID: 6736 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6692 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A) ssvagent.exe (PID: 6800 cmdline: 'C:\PROGRA~2\Java\JRE18~1.0_2\bin\ssvagent.exe' -new MD5: A3DBA514D38464A5C5A9DEA19E6159F9) Video.UI.exe (PID: 5616 cmdline: 'C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.17112.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe' -ServerName:Microsoft.ZuneVide o.AppX758ya5sqdjd98rx6z7g95nw6jy7bqx9y.mca MD5: BEA19F0655789B224CEF4C5AFCE49AD1) cleanup Malware Configuration No configs have been found Yara Overview No yara matches Sigma Overview No Sigma rule has matched Signature Overview Copyright null 2020 Page 4 of 23 • Networking • E-Banking Fraud • System Summary • Data Obfuscation • Hooking and other Techniques for Hiding and Protection • Malware Analysis System Evasion • HIPS / PFW / Operating System Protection Evasion • Language, Device and Operating System Detection Click to jump to signature section Networking: Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) Mitre Att&ck Matrix Initial Privilege Credential Lateral Command Network Access Execution Persistence Escalation Defense Evasion Access Discovery Movement Collection Exfiltration and Control Effects Valid Windows Path Process Masquerading 1 OS Security Software Remote Data from Exfiltration Encrypted Eavesdrop on Accounts Management Interception Injection 2 Credential Discovery 1 1 Services Local Over Other Channel 2 Insecure Instrumentation Dumping System Network Network Medium Communication Default Scheduled Boot or Boot or Virtualization/Sandbox LSASS Virtualization/Sandbox Remote Data from Exfiltration Non- Exploit SS7 to Accounts Task/Job Logon Logon Evasion 1 Memory Evasion 1 Desktop Removable Over Application Redirect Phone Initialization Initialization Protocol Media Bluetooth Layer Calls/SMS Scripts Scripts Protocol 2 Domain At (Linux) Logon Script Logon Process Injection 2 Security Process Discovery 1 SMB/Windows Data from Automated Application Exploit SS7 to Accounts (Windows) Script Account Admin Shares Network Exfiltration Layer Track Device (Windows) Manager Shared Protocol 3 Location Drive Local At (Windows) Logon Script Logon Obfuscated Files or NTDS File and Directory Distributed Input Scheduled Ingress Tool SIM Card Accounts (Mac) Script Information 1 Discovery 1 Component Capture Transfer Transfer 1 Swap (Mac) Object Model Cloud Cron Network Network Software Packing LSA System Information SSH Keylogging Data Fallback Manipulate Accounts Logon Script Logon Secrets Discovery 2 1 Transfer Channels Device Script Size Limits Communication Replication Launchd Rc.common Rc.common Steganography Cached Remote System VNC GUI Input Exfiltration Multiband Jamming or Through Domain Discovery 1 Capture Over C2 Communication Denial of Removable Credentials Channel Service Media Behavior Graph Copyright null 2020 Page 5 of 23 Hide Legend Behavior Graph Legend: ID: 256920 URL: http://micromedia.us/videos... Process Startdate: 04/08/2020 Signature Architecture: WINDOWS Score: 48 Created File DNS/IP Info Snort IDS alert for Is Dropped network traffic (e.g. started started based on Emerging Threat rules) Is Windows Process Number of created Registry Values Number of created Files iexplore.exe Video.UI.exe Visual Basic 19 69 56 49 Delphi Java .Net C# or VB.NET activation2.eastus2.cloudapp.azure.com started 40.79.86.63 settings-ssl.xboxlive.com C, C++ or other language MICROSOFT-CORP-MSN-AS-BLOCKUS United States Is malicious Internet iexplore.exe 28 micromedia.us 69.222.152.74, 49726, 49727, 80 started ATT-INTERNET4US United States ssvagent.exe 501 Screenshots Thumbnails This section contains all screenshots as thumbnails, including those not shown in the slideshow. No bigger version No bigger version No bigger version No bigger version No bigger version No bigger version No bigger version No bigger version No bigger version No bigger version No bigger version No bigger version No bigger version Copyright null 2020 Page 6 of 23 Antivirus, Machine Learning and Genetic Malware Detection Initial Sample No Antivirus matches Dropped Files No Antivirus matches Unpacked PE Files No Antivirus matches Domains No Antivirus matches URLs Source Detection Scanner Label Link www.founder.com.cn/cn/bThe 0% URL Reputation safe www.founder.com.cn/cn/bThe 0% URL Reputation safe www.tiro.com 0% URL Reputation safe www.tiro.com 0% URL Reputation safe www.goodfont.co.kr 0% URL Reputation safe Copyright null 2020 Page 7 of 23 Source Detection Scanner Label Link www.goodfont.co.kr 0% URL Reputation safe www.carterandcone.coml 0% URL Reputation safe www.carterandcone.coml 0% URL Reputation safe www.sajatypeworks.com 0% URL Reputation safe www.sajatypeworks.com 0% URL Reputation safe www.typography.netD 0% URL Reputation safe www.typography.netD 0% URL Reputation safe www.founder.com.cn/cn/cThe 0% URL Reputation safe www.founder.com.cn/cn/cThe 0% URL Reputation safe www.galapagosdesign.com/staff/dennis.htm 0% URL Reputation safe www.galapagosdesign.com/staff/dennis.htm 0% URL Reputation safe fontfabrik.com 0% URL Reputation safe fontfabrik.com 0% URL Reputation safe www.founder.com.cn/cn 0% URL Reputation safe www.founder.com.cn/cn 0% URL Reputation safe www.jiyu-kobo.co.jp/ 0% URL Reputation safe www.jiyu-kobo.co.jp/ 0% URL Reputation safe www.galapagosdesign.com/DPlease 0% URL Reputation safe www.galapagosdesign.com/DPlease 0% URL Reputation safe www.sandoll.co.kr 0% URL Reputation safe www.sandoll.co.kr 0% URL Reputation safe www.urwpp.deDPlease 0% URL Reputation safe www.urwpp.deDPlease 0% URL Reputation safe www.zhongyicts.com.cn 0% URL Reputation safe www.zhongyicts.com.cn 0% URL Reputation safe www.sakkal.com 0% URL Reputation safe www.sakkal.com 0% URL Reputation safe Domains and IPs Contacted Domains Name IP Active Malicious Antivirus Detection Reputation asf-ris-prod- 168.63.67.155 true false high neurope.northeurope.cloudapp.azure.com micromedia.us 69.222.152.74 true false unknown activation2.eastus2.cloudapp.azure.com 40.79.86.63 true false high settings-ssl.xboxlive.com unknown unknown false high Contacted URLs Name Malicious Antivirus Detection Reputation micromedia.us/videos/Pichincha/Items/RemoteTeller.mp4 false unknown URLs from Memory and Binaries Name Source Malicious Antivirus Detection Reputation https://xbox.com Video.UI.exe, 0000000B.0000000 false high 2.645823287.000001BDC3780000.0 0000002.00000001.sdmp www.apache.org/licenses/LICENSE-2.0 Video.UI.exe, 0000000B.0000000 false high 2.635302107.000001BDBD4B6000.0
Recommended publications
  • Entity Framework with Microsoft Azure
    Microsoft Azure Step by Step Guide This free book is provided by courtesy of C# Corner and Mindcracker Network and its authors. Feel free to share this book with your friends and co-workers. Please do not reproduce, republish, edit or copy this book. Nitin Pandit Software Engineer, Microsoft.Net Consultant Noida C# corner Delhi Chapter Lead C# corner MVP Amit Mishra (Co-Author, Format Editor) Index Page No Chapter 1 - Getting Started With Microsoft Azure 1-17 Chapter 2 - How To Host Your Web Apps On Azure Via FileZilla 18-31 Chapter 3 - Configuring A Custom Domain Name For An Azure 32-40 Website Chapter 4 - Virtual Machine In Microsoft Azure Step by Step - Part 41-50 One Chapter 5 - Creating A Virtual Disk Virtual Machine In Microsoft 51-66 Azure Step by Step: Part Two Chapter 6 - Use of SQL Azure In Visual Studio 2015 Step By Step 67-98 Guide Chapter 7 - Entity Framework With Microsoft Azure SQL 99-113 Chapter 8 - Introducing U-SQL- Make Big Data Processing Easy 114-117 Chapter 9 - Installation Of Azure SDK And Blob Storage In Azure: 118-139 Part 1 Chapter 10 - Upload Image To Azure Blob Storage In ASP.NET: Part 140-163 2 Chapter 11 - Demo Project Azure Blob Storage With ASP.NET MVC 164-204 5.0: Part 3 Chapter 12 - Getting Started With Azure DocumentDB: Day 1 205-224 Chapter 13 - Querying In The Azure DocumentDB: Day Two 225-242 Chapter 14 - Manage Azure Mobile Services: Part One 243-259 Chapter 15 - How To Create A Mobile App In Microsoft Azure 260-277 Chapter 16 - Manage Database Settings Of Azure Mobile Services 278-281 Chapter 17
    [Show full text]
  • 1 in the UNITED STATES DISTRICT COURT for the DISTRICT of DELAWARE VIATECH TECHNOLOGIES, INC., ) ) Plaintiff, ) Case No. 1:17Cv5
    Case 1:17-cv-00570-RGA Document 11 Filed 10/01/17 Page 1 of 37 PageID #: 145 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE VIATECH TECHNOLOGIES, INC., ) ) Plaintiff, ) Case No. 1:17cv570 v. ) ) MICROSOFT CORPORATION, ) DEMAND FOR JURY TRIAL ) Defendant. ) AMENDED COMPLAINT FOR PATENT INFRINGEMENT Plaintiff ViaTech Technologies, Inc. (“plaintiff” or “ViaTech”), through its attorneys, for its complaint against defendant Microsoft Corporation (“defendant” or “Microsoft”), alleges as follows: THE PARTIES 1. Plaintiff is a corporation organized and existing under the laws of the State of Delaware having a place of business at 1136 Ashbourne Circle, Trinity, FL 34655-7103. 2. Defendant Microsoft is a corporation organized and existing under the laws of the State of Washington having its principal place of business at One Microsoft Way, Redmond, WA 98052. JURISDICTION AND VENUE 3. This action arises under the patent laws of the United States, Title 35 of the United States Code. Subject matter jurisdiction is proper in this Court pursuant to 28 U.S.C. §§ 1331 and 1338(a). 4. Defendant Microsoft is subject to this Court’s specific and general personal jurisdiction consistent with due process and the Delaware Long Arm Statute, 10 Del. C. § 3104. 1 Case 1:17-cv-00570-RGA Document 11 Filed 10/01/17 Page 2 of 37 PageID #: 146 5. Venue in this Judicial District is proper under 28 U.S.C. § 1400(b). 6. Microsoft is registered to do business in Delaware, and has appointed Corporation Service Company, 2711 Centerville Rd., Suite 400, Wilmington, DE 19808, as its registered agent, and either directly, or indirectly through its distribution network, has transacted and/or continues to transact business in Delaware, and has regularly solicited and continues to regularly solicit business in Delaware.
    [Show full text]
  • Nokia Lumia 925 User Guide
    User Guide Nokia Lumia 925 Issue 2.0 EN-US Psst... This guide isn't all there is... There's a user guide in your phone – it's always with you, available when needed. On the start screen, swipe left, and tap Nokia Care. Check out the videos at www.youtube.com/NokiaSupportVideos. For info on Nokia Service terms and Privacy policy, go to www.nokia.com/privacy. © 2013 Microsoft Mobile. All rights reserved. 2 User Guide Nokia Lumia 925 Contents Safety 5 Social networks 54 Get started 6 Messages 56 Keys and parts 6 Mail 60 Back, start, and search key 6 Camera 65 Antenna locations 7 Camera basics 65 Insert the SIM card 7 Advanced photography 70 Remove the SIM card 8 Photos and videos 74 Charge your phone 9 Maps & navigation 78 First start-up 12 Switch location services on 78 Transfer content to your Nokia Lumia 15 HERE Maps 78 Lock the keys and screen 18 HERE Drive+ 84 Connect the headset 19 Positioning methods 88 Change the volume 20 Internet 89 Icons shown on your phone 20 Define internet connections 89 Basics 22 Connect your computer to the web 89 Get to know your phone 22 Use your data plan efficiently 90 Personalize your phone 28 Web browser 90 Take a screenshot 33 Search the web 92 Extend battery life 34 Close all internet connections 92 Save on data roaming costs 36 Entertainment 94 Text input 36 Watch and listen 94 Scan codes or text 40 FM radio 95 Clock 41 Nokia Music 96 SkyDrive 42 Sync music and videos between your phone and computer 98 Nokia account 43 Games 99 Browse your SIM apps 44 Office 101 Store 44 Microsoft Office Mobile 101 People & messaging 47 Write a note 104 Calls 47 Continue with a document on another Contacts 51 device 104 © 2013 Microsoft Mobile.
    [Show full text]
  • UI Design and Interaction Guide for Windows Phone 7
    UI Design and Interaction Guide 7 for Windows Phone 7 July 2010 Version 2.0 UI Design and Interaction Guide for Windows Phone 7 July 2010 Version 2.0 This is pre-release documentation and is subject to change in future releases. This document supports a preliminary release of a software product that may be changed substantially prior to final commercial release. This docu- ment is provided for informational purposes only and Microsoft makes no warranties, either express or implied, in this document. Information in this document, including URL and other Internet Web site references, is subject to change without notice. The entire risk of the use or the results from the use of this document remains with the user. Unless otherwise noted, the companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted in examples herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this docu- ment. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
    [Show full text]
  • Overview of Collective Licensing Models and of DRM Systems and Technologies Used for IPR Protection and Management
    Overview of collective licensing models and of DRM systems and technologies used for IPR protection and management ECP-2007-DILI-517005 ATHENA Overview of collective licensing models and of DRM systems and technologies used for IPR protection and management Deliverable number D6.2 Dissemination level Public Delivery date 31 October 2009 Status Final Barbara Dierickx (PACKED) & Dimitrios Author(s) Tsolis (University of Patras) eContentplus This project is funded under the eContentplus programme1, a multiannual Community programme to make digital content in Europe more accessible, usable and exploitable. 1 OJ L 79, 24.3.2005, p. 1. 1/125 Overview of collective licensing models and of DRM systems and technologies used for IPR protection and management Table of Contents EXECUTIVE SUMMARY .............................................................................................................................................. 4 PART ONE – OVERVIEW OF COLLECTIVE LICENSING MODELS ................................................................. 5 1. GENERAL INTRODUCTION .............................................................................................................................. 5 1.1. INTRODUCTION 5 1.2. CULTURAL HERITAGE IN AN ONLINE ENVIRONMENT 7 2. THE SCOPE OF COPYRIGHT............................................................................................................................. 8 2.1. SCOPE AND EXCEPTIONS 8 2.2. THE EUROPEAN FRAMEWORK 9 2.3. SPECIAL POINTS OF INTEREST 9 3. THE COLLECTIVE LICENSING OF RIGHTS
    [Show full text]
  • Webroot Secureanywhere® Business – DNS Protection Apache License 2.0 • Aws-Sdk-Net Copyright © Amazon.Com, Inc. Apache
    Webroot SecureAnywhere® Business – DNS Protection Apache License 2.0 • aws-sdk-net Copyright © Amazon.com, Inc. Apache License Version 2.0, January 2004 TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. “License” shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. “Licensor” shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. “Legal Entity” shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, “control” means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity. “You” (or “Your”) shall mean an individual or Legal Entity exercising permissions granted by this License. “Source” form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files. “Object” form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types. “Work” shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below).
    [Show full text]
  • Secure Remote Service Execution for Web Media Streaming
    Secure Remote Service Execution for Web Media Streaming vorgelegt von Dipl.-Ing. Alexandra Mikityuk geb. in Leningrad, UdSSR von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz, Technische Universität Berlin Gutachter: Prof. Dr. Jean-Pierre Seifert, Technische Universität Berlin Gutachter: Prof. Dr. Jean-Claude Dufourd, ParisTech Gutachter: Prof. Dr.-Ing. Ina Schieferdecker, Technische Universität Berlin Tag der wissenschaftlichen Aussprache: 29. August 2017 Berlin 2017 D 83 Abstract Through continuous advancements in streaming and Web technologies over the past decade, the Web has become a platform for media delivery. Web standards like HTML5 have been designed accordingly, allowing for the delivery of applications, high-quality streaming video, and hooks for interoperable content protection. Efficient video encoding algorithms such as AVC/HEVC and streaming protocols such as MPEG-DASH have served as additional triggers for this evolution. Users now employ Web browsers as a tool for receiving streaming media and rendering Web applications, and browsers have been embedded into almost every kind of connected device. The drawback of these technical developments and quick rate of user adoption is that modern Web browsers have introduced significant constraints on devices’ capabilities. First, the computational requirements have risen continuously, resulting in a cycle where modern devices can be nearly outdated after a year or two. Second, as the integration of browser technologies is a complicated matter, not every platform provides the same performance. Different Operating Systems (OSs), chipsets and software engines are the main reasons for this difference in performance.
    [Show full text]
  • Digital Right Management Anagement
    DRM Digital Right Management Bronzetti Stefano mat: 264848 A. A. 2007/2008 1 DRM(Gestione dei diritti digitali) definizione: tutti quei sistemi tecnologici di controllo usati per limitare l’accesso e l’utili zzo a dati o hard ware. Chi detiene i diritti d’autore, può far valere i propri diritti in ambiente digitale grazie alla possibilità di rendere protetti, identificabili e tracc ia bili tu tti gli usi in rete di mater ia li adegua tamen te marchia ti. esempio: evitare duplicati senza autorizzazione (copy protection) spinti da: Chi detiene i diritti d’autore: case discografiche/cinematografiche aziende software/videogiochi/ebook osteggiati da: Gli utenti: Limitazione dei diritti degli utenti (chi compra regolarmente il materiale non può farne l’uso che vuole) DRM = DIGITAL RESTRICTION MANAGEMENT 2 FUNZIONAMENTO DEI SISTEMI DRM idea semplice: i file audio/video vengono codificati e criptati in modo da garantire la protezione contro la copia e l’inoltro verso terzi non autorizzati, consentendo così un uso limitato(ad esempio nel tempo) e predefinito nella licenza d’accesso fornita agli utenti finali. informazioni aggiuntive: la codifica permette di includere informazioni aggiuntive: copyright, licenza, biografia autore ecc.. accesso ai dati: procedure di autenticazione che permettono di distribuire i file richiesti nelle modalità previste dalla licenza sottoscritta dall’utente. EFFETTI: Utenti infastiditi e limitati anche se in buonafede. Non riescono realmente ad arginare le copie illegali, in quanto sono sempre sttitati scava lca tiiti in qua lhlche mo do. 3 PERCHE’ I DRM? nuove tecnologie: banda larga, p2p, lettori mp3/mp4, telefonini di ultima generazione, lettori divx, negozi di contenuti multimediali online.
    [Show full text]
  • Device Data Sheet for Nokia Lumia 710
    DEVICE DATA SHEET FOR NOKIA LUMIA 710 MICROSOFT OFFICE Take your office on the go with Nokia Lumia 710. From the Office Hub you can access pre-loaded mobile versions of Word, Excel, and OneNote to create, edit, and review documents. It also has PowerPoint to make it easy for you to review and edit presentations on your phone. SHARING Start a document on your phone and sync it online to edit on your computer later. With your Windows Live account, you get free* online storage through SkyDrive®. Plus you can easily access, edit, and synchronize SharePoint documents from Office 365 sites to share files with your coworkers. MESSAGING Keep in touch with the people who matter. From the People Hub, create Groups to quickly send emails and messages to your co-workers, family, and friends. For each contact, you can view the conversation history and get one-touch access to recent emails, text messages, phone calls, and NOKIA LUMIA 710 even IMs. You can also link your work and personal email accounts to one inbox so you never miss an important email. *Data charges may apply. TARGET AudIENCE Smartphone Intender/Minimalist NETWORK GSM 850/900/1800/1900 MHz WCDMA Band I (2100), Band II (1900), Band IV (1700/2100), and Band V (850) DIMENSIONS (IN.) 4.68 x 2.45 x 0.5 WEIGHT (OZ.) 4.42 INCludED BATTERY Lithium Ion, 1300mAh TALK TIME1 Up to 7 hours STANDBY TIME1 Up to 16 days HEARING AID M3 & T3 COMPATIBILITY DISPLAY 3.7” LCD touch screen (WVGA, 800 x 480 pixels, 16 million colors), capacitive touch with ClearBlack™ technology MEMORY 512 MB RAM, 8 GB internal
    [Show full text]
  • Microsoft Playready Content Access Technology White Paper
    Microsoft PlayReady Content Access Technology White Paper Microsoft Corporation July 2008 Applies to: Microsoft® PlayReady™ Content Access Technology Summary: Microsoft PlayReady technology provides the premier platform for applying business models to the distribution and use of digital content. This white paper provides an overview of the features, business scenarios, and the technology ecosystem. Legal Notice Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted in examples herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any
    [Show full text]
  • D2.1 System Architecture
    Directorate General for Communications Networks, Content and Technology Innovation Action ICT-687655 D2.1 System Architecture Due date of deliverable: 31 March 2016 Actual submission date: 10 May 2016 Resubmitted with minor changes: 14 July 2017 Start date of project: 1 December 2015 Duration: 36 months Lead contractor for this deliverable: Cisco Version: 14 July 2017 Confidentiality status: Public © 2-IMMERSE Consortium 2017 Page 1 of (135) Grant Agreement number: 687655 — 2-IMMERSE — H2020-ICT-2015 D2.1 System Architecture Abstract This document describes the system architecture being developed by the 2-IMMERSE project. This architecture is designed to enable the four multi-screen service prototypes that will be delivered through the project. The System Architecture is layered as a set of platform services, a client application architecture and production architecture. The system architecture is a work in progress; it will evolve both as we refine it and specify it in more detail, and as we deliver each of the multi-screen service prototypes through the project. Target audience This is a public deliverable and could be read by anyone with an interest in the system architecture being developed by the 2-IMMERSE project. As this is inherently technical in nature, we assume the audience is technically literate with a good grasp of television and Internet technologies in particular. We have included a Technology Overview section that summarises a range of technologies that are potentially applicable within the project. This document will be read by the Project Consortium as it defines the system architecture that will be adopted and evolved throughout the project.
    [Show full text]
  • Nokia 900 User Guide
    Nokia 900 User Guide Issue 1.1 2Contents Contents Divert calls to your voice mailbox or another phone number 30 Make a conference call 31 Safety 4 Silence an incoming call 32 Use your voice to call a contact 32 Get started 6 Keys and parts 6 Contacts & social networking Back, start, and search keys 7 services 32 Insert the SIM card 8 Contacts 32 Charge your phone 9 Social networks 36 Antenna locations 12 Switch the phone on or off 12 Internet 37 Create your Windows Live ID 13 Internet connections 37 Windows Live ID 13 Internet 40 Nokia account 14 Copy contacts from your old phone 14 Messaging & mail 41 Lock or unlock the keys and screen 15 Messages 41 Headset 16 Mail 44 Change the volume 17 Access codes 17 Camera 46 Set your phone to sync with your About the camera 46 computer 18 Take a picture 47 Record a video 47 Basics 18 Camera tips 47 About the start screen and apps Take a self-portrait 48 menu 18 Take a close-up picture 48 Touch screen actions 19 Take a picture in the dark 48 Use your phone when it's locked 21 Take a picture of a moving object 49 Switch between open apps 22 Save location information to your Personalise your phone 22 pictures and videos 49 Write text 24 Send a picture or video 49 Search your phone and the web 27 Share your pictures and videos 50 Control your phone with your voice 27 Indicators on the status bar 28 Your pictures 51 Use your phone in flight mode 28 About the Pictures hub 51 Increase battery life 29 View pictures 51 Mark a picture as a favourite 52 Calls 30 Upload pictures and videos to the Call a contact
    [Show full text]