Automated Malware Analysis Report For

Total Page:16

File Type:pdf, Size:1020Kb

Automated Malware Analysis Report For ID: 74965 Cookbook: urldownload.jbs Time: 01:35:09 Date: 01/09/2018 Version: 23.0.0 Table of Contents Table of Contents 2 Analysis Report http://cdn.appexnw.com/trident/version5b0ee6680e058.exe 4 Overview 4 General Information 4 Detection 4 Confidence 4 Classification 5 Analysis Advice 5 Signature Overview 6 Cryptography: 6 Bitcoin Miner: 6 Spreading: 6 Networking: 6 Key, Mouse, Clipboard, Microphone and Screen Capturing: 6 System Summary: 6 Data Obfuscation: 7 Persistence and Installation Behavior: 7 Hooking and other Techniques for Hiding and Protection: 7 Malware Analysis System Evasion: 7 Anti Debugging: 7 HIPS / PFW / Operating System Protection Evasion: 7 Language, Device and Operating System Detection: 7 Lowering of HIPS / PFW / Operating System Security Settings: 8 Behavior Graph 8 Simulations 8 Behavior and APIs 8 Antivirus Detection 8 Initial Sample 9 Dropped Files 9 Unpacked PE Files 9 Domains 9 URLs 9 Yara Overview 9 Initial Sample 9 PCAP (Network Traffic) 9 Dropped Files 9 Memory Dumps 9 Unpacked PEs 9 Joe Sandbox View / Context 10 IPs 10 Domains 10 ASN 10 Dropped Files 10 Screenshots 10 Startup 10 Created / dropped Files 11 Domains and IPs 15 Contacted Domains 15 Contacted URLs 15 URLs from Memory and Binaries 15 Contacted IPs 17 Public 17 Static File Info 17 No static file info 17 Copyright Joe Security LLC 2018 Page 2 of 42 Network Behavior 17 Network Port Distribution 17 TCP Packets 18 DNS Queries 19 DNS Answers 19 HTTP Request Dependency Graph 20 Code Manipulations 20 Statistics 20 Behavior 20 System Behavior 20 Analysis Process: cmd.exe PID: 3220 Parent PID: 1780 20 General 20 File Activities 21 File Created 21 Analysis Process: wget.exe PID: 3244 Parent PID: 3220 21 General 21 File Activities 21 File Created 21 File Written 21 Analysis Process: version5b0ee6680e058.exe PID: 3376 Parent PID: 3056 22 General 22 File Activities 22 File Created 22 File Deleted 25 File Written 25 File Read 39 Registry Activities 39 Key Created 39 Key Value Created 40 Key Value Modified 40 Analysis Process: HostAppServiceUpdater.exe PID: 3420 Parent PID: 1432 40 General 40 Analysis Process: taskeng.exe PID: 3440 Parent PID: 848 41 General 41 File Activities 41 File Read 41 Registry Activities 41 Key Value Created 41 Analysis Process: HostAppServiceUpdater.exe PID: 3476 Parent PID: 3440 41 General 41 Disassembly 42 Code Analysis 42 Copyright Joe Security LLC 2018 Page 3 of 42 Analysis Report http://cdn.appexnw.com/trident/version5b0ee6680e058.exe Overview General Information Joe Sandbox Version: 23.0.0 Analysis ID: 74965 Start date: 01.09.2018 Start time: 01:35:09 Joe Sandbox Product: CloudBasic Overall analysis duration: 0h 7m 7s Hypervisor based Inspection enabled: false Report type: light Cookbook file name: urldownload.jbs Sample URL: http://cdn.appexnw.com/trident/version5b0ee6680e05 8.exe Analysis system description: Windows 7 SP1 (with Office 2010 SP2, IE 11, FF 54, Chrome 60, Acrobat Reader DC 17, Flash 26, Java 8.0.1440.1) Number of analysed new started processes analysed: 9 Number of new started drivers analysed: 0 Number of existing processes analysed: 0 Number of existing drivers analysed: 0 Number of injected processes analysed: 0 Technologies HCA enabled EGA enabled HDC enabled Analysis stop reason: Timeout Detection: MAL Classification: mal48.evad.mine.win@8/19@1/1 EGA Information: Successful, ratio: 50% HDC Information: Successful, ratio: 59.7% (good quality ratio 55.5%) Quality average: 74.2% Quality standard deviation: 30.5% HCA Information: Failed Cookbook Comments: Adjust boot time Warnings: Show All Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe TCP Packets have been reduced to 100 Execution Graph export aborted for target HostAppServiceUpdater.exe, PID 3420 because there are no executed function Report size exceeded maximum capacity and may have missing network information. Detection Strategy Score Range Reporting Detection Threshold 48 0 - 100 Report FP / FN Confidence Copyright Joe Security LLC 2018 Page 4 of 42 Strategy Score Range Further Analysis Required? Confidence Threshold 5 0 - 5 false Classification Ransomware Miner Spreading mmaallliiiccciiioouusss malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious cccllleeaann clean Exploiter Banker Spyware Trojan / Bot Adware Analysis Advice Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox Copyright Joe Security LLC 2018 Page 5 of 42 Signature Overview • Cryptography • Bitcoin Miner • Spreading • Networking • Key, Mouse, Clipboard, Microphone and Screen Capturing • System Summary • Data Obfuscation • Persistence and Installation Behavior • Hooking and other Techniques for Hiding and Protection • Malware Analysis System Evasion • Anti Debugging • HIPS / PFW / Operating System Protection Evasion • Language, Device and Operating System Detection • Lowering of HIPS / PFW / Operating System Security Settings Click to jump to signature section Cryptography: Public key (encryption) found Bitcoin Miner: Configures the Internet Explorer emulation mode (likely to run Javascript) Spreading: Creates COM task schedule object (often to register a task for autostart) Contains functionality to enumerate / list files inside a directory Networking: Downloads executable code via HTTP Downloads files from webservers via HTTP Performs DNS lookups Urls found in memory or binary data Key, Mouse, Clipboard, Microphone and Screen Capturing: Contains functionality for read data from the clipboard System Summary: Contains functionality to shutdown / reboot the system Creates mutexes Detected potential crypto function Found potential string decryption / allocating functions PE file contains strange resources Binary contains paths to development resources Classification label Contains functionality to adjust token privileges (e.g. debug / backup) Contains functionality to check free disk space Contains functionality to instantiate COM classes Copyright Joe Security LLC 2018 Page 6 of 42 Contains functionality to load and extract PE file embedded resources Creates files inside the user directory Creates temporary files Reads ini files Reads software policies SQL strings found in memory and binary data Spawns processes Uses an in-process (OLE) Automation server Found graphical window changes (likely an installer) Creates a software uninstall entry Binary contains paths to debug symbols Data Obfuscation: Contains functionality to dynamically determine API calls PE file contains an invalid checksum Uses code obfuscation techniques (call, push, ret) Persistence and Installation Behavior: Drops PE files Hooking and other Techniques for Hiding and Protection: Disables application error messsages (SetErrorMode) Malware Analysis System Evasion: Contains functionality to detect sleep reduction / modifications Checks the free space of harddrives Found dropped PE file which has not been started or loaded Found evasive API chain (date check) May sleep (evasive loops) to hinder dynamic analysis Contains functionality to enumerate / list files inside a directory Contains functionality to query system information Program exit points Anti Debugging: Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation)) Contains functionality to check if a debugger is running (IsDebuggerPresent) Contains functionality to dynamically determine API calls Contains functionality which may be used to detect a debugger (GetProcessHeap) Contains functionality to register its own exception handler HIPS / PFW / Operating System Protection Evasion: Very long cmdline option found, this is very uncommon (may be encrypted or packed) Contains functionality to add an ACL to a security descriptor May try to detect the Windows Explorer process (often used for injection) Language, Device and Operating System Detection: Contains functionality locales information (e.g. system language) Contains functionality to query local / system time Copyright Joe Security LLC 2018 Page 7 of 42 Contains functionality to query the account / user name Contains functionality to query time zone information Contains functionality to query windows version Queries the cryptographic machine GUID Lowering of HIPS / PFW / Operating System Security Settings: Modifies the internet feature controls of the internet explorer Behavior Graph Hide Legend Legend: Process Signature Created File Behavior Graph ID: 74965 DNS/IP Info URL: http://cdn.appexnw.com/trident/version5b0ee6680e058.exe Startdate: 01/09/2018 Is Dropped Architecture: WINDOWS Score: 48 Is Windows Process Contains functionality Number of created Registry Values to detect sleep reduction started started started started / modifications Number of created Files Visual Basic version5b0ee6680e058.exe cmd.exe taskeng.exe HostAppServiceUpdater.exe Delphi 20 47 1 1 Java dropped dropped dropped dropped .Net C# or VB.NET C:\Users\user\AppData\...\SLToolWrapper.dll, PE32 C:\Users\user\...\HostAppServiceUpdater.exe, PE32 C:\Users\HERBBL~1\AppData\...\___aensis.dll, PE32 9 other files (1 malicious) C, C++ or other language started started Is malicious Configures the Internet Explorer emulation mode (likely to run Javascript) wget.exe HostAppServiceUpdater.exe 1 cs47724812.wpc.nucdn.net 152.195.9.15, 49161, 80 cs477248.wpc.nucdn.net 2 other IPs or domains dropped EDGECAST-MCICommunicationsServicesIncdbaVerizonB United States C:\Users\user\...\version5b0ee6680e058.exe, PE32 Simulations Behavior and APIs Time Type Description 01:35:45 API Interceptor 629x Sleep call for process: cmd.exe
Recommended publications
  • On Client Ledger System™ Software
    Focus on Client Ledger System™ Software A Financial MicroSystems, Inc. Publication • Volume 18, Issue 1 • 4th Quarter of 2012 CLS II (1.61) and CLS-DOS (6.3) Updates are Scheduled for Release December 4th Year-end CLS updates for both CLS II and CLS-DOS are currently scheduled for release December 4th. We originally planned to discontinue CLS-DOS at the end of this year, because it has become increasingly difficult for us to make the required programming changes. However, we have decided to release one final year-end update for CLS-DOS and will continue to support it through September 2013. All future development will focus on CLS II. CLS updates include the new 2012 W-2 and 1099/1098 formats for both laser-printed plain-paper and preprinted forms. Dot-matrix preprinted W-2 and 1099 forms are available only in CLS-DOS. Formats for the standard, two-up, preprinted W-2 and W-3 forms are basically unchanged for 2012. However, the 1099- MISC form has alignment changes and formats for the 1099-INT, 1099-DIV, 1099-B, 1099-C, 1098 and 1096 forms are new. All W-2 and W-3 forms (including Copy A) may be printed on plain paper. Submittable 940, 941, 943 and 944 forms may also be printed on plain paper. For 1099, 1098 and 1096 forms, all copies except Copy A may be printed on plain-paper. Copy A must be filed using “official” scannable forms (the IRS may impose a penalty for using non-scannable forms). The CLS updates also include required changes to the federal 940, 941, 943 and 944 forms for the 2012 year-end.
    [Show full text]
  • Microsoft Security Intelligence Report
    Microsoft Security Intelligence Report Volume 20 | July through December, 2015 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet website references, may change without notice. You bear the risk of using it. Copyright © 2016 Microsoft Corporation. All rights reserved. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Authors Charlie Anthe Dana Kaufman Anthony Penta Cloud and Enterprise Security Azure Active Directory Team Safety Platform Nir Ben Zvi Nasos Kladakis Ina Ragragio Enterprise and Cloud Group Azure Active Directory Team Windows and Devices Group Patti Chrzan Daniel Kondratyuk Tim Rains Microsoft Digital Crimes Unit Azure Active Directory Team Commercial Communications Bulent Egilmez Andrea Lelli Paul Rebriy Office 365 - Information Windows Defender Labs Bing Protection Geoff McDonald Stefan Sellmer Elia Florio Windows Defender Labs Windows Defender Labs Windows Defender Labs Michael McLaughlin Mark Simos Chad Foster Identity Services Enterprise Cybersecurity Bing Group Nam Ng Roger Grimes Enterprise Cybersecurity Vikram Thakur Microsoft IT Group Windows Defender Labs Paul Henry Niall O'Sullivan Alex Weinert Wadeware LLC Microsoft Digital Crimes Unit Azure Active Directory Team Beth Jester Daryl Pecelj Terry Zink Windows Defender Microsoft IT Information
    [Show full text]
  • Intel Capital Success Stories
    Intel Capital Success Stories NEXT << Investing in Global Innovation: Stories of Intel Capital’s Impact on Portfolio Companies For questions or to submit a story, contact [email protected] (U.S.) This book is a resource to help you to convey the impact Intel Capital [email protected] (Asia) can have on a start-up. Inside is a series of stories on how individual [email protected] (EMEA) portfolio companies have benefitted from an Intel Capital investment. For each story there is a PowerPoint slide for download, background information, supporting facts, and summaries. All assets on each page are approved for external use. Use these resources in speaking engagements, pipeline meetings, presentations, and other channels. 2 << PREVIOUS NEXT << Table of Contents COMPANY INVESTOR CONSISTENT MARKET EMERGING NETWORK GLOBAL IPO ITD SUCCESS M&A EXPERTISE TECHNOLOGY ADD VALUE REGION Anobit ● ● ● ● Israel Aternity ● ● ● U.S.A./Israel Borqs ● ● ● ● ● China Crisp Media ● ● U.S.A. Fulcrum Microsystems ● ● U.S.A. Gudeng ● ● ● ● Taiwan Happiest Minds ● ● ● India IPTEGO ● ● ● Germany Mall.CZ ● ● ● ● ● Czech Republic Miartech ● ● ● ● China NetPosa ● ● ● China Solera ● ● ● ● ● U.S.A. SweetLabs ● ● ● ● U.S.A. V-Cube ● ● ● Japan Virtustream ● ● ● U.S.A. WS02 ● ● ● ● Sri Lanka 3 << << TABLE OF CONTENTS PREVIOUS NEXT << Anobit SUMMARY: POWERPOINT/TALKING POINTS: Recognizing the huge potential of Anobit’s flash memory technology, Intel Capital invested significantly in the company in 2010 and helped pave the way for the company’s acquisition by Apple in 2012. FULL STORY/BACKGROUND: In recent years, a number of high-tech companies have moved away from hard drives in favor of solid state storage, using flash memory chips to make truly mobile computing devices that are small, compact, and energy efficient.
    [Show full text]
  • Download Literotica Android App to My Phone Download Literotica Android App to My Phone
    download literotica android app to my phone Download literotica android app to my phone. Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. Cloudflare Ray ID: 67a15666ddcdc447 • Your IP : 188.246.226.140 • Performance & security by Cloudflare. Mobile devices help & learning. Your device. We’ll help you find the optimal setup for your Android or iPhone. Your apps. Link up Office, Outlook, and other apps that connect your phone to your PC. Your stuff. Learn how to make switching between your devices a little less complicated. Microsoft and Samsung—a partnership for your productivity. Learn how to connect your Samsung Galaxy or other Android device to your PC so you can make calls, respond to texts, sync your photos, and use your favorite mobile apps all in one place. Litapp. Older changelogs can be found on the releases page (Press . after version). Older APKs can be found in the releases folder. Features. Read stories Automatically open the next story in a series See story details, related stories, rate
    [Show full text]
  • Microsoft Security Intelligence Report
    Microsoft Security Intelligence Report Volume 22 | January through March, 2017 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. Copyright © 2017 Microsoft Corporation. All rights reserved. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Authors Roger Capriotti Volv Grebennikov Carmen Liang Microsoft Edge Product Bing Windows Defender Research Marketing team Team Vidya Gururaja Rao Zheng Dong Windows Active Defense Data Ryan McGee Windows Defender ATP Engineering and Analytics Cloud and Enterprise Research Marketing Chris Hallum Eric Douglas Windows Active Defense Matt Miller Windows Defender Research Product Marketing team Windows Active Defense Team Paul Henry Chad Mills Matt Duncan Wadeware LLC Windows Defender ATP Windows Active Defense Research Susan Higgs Matthew Duncan Windows Defender ATP Phillip Misner Windows Active Defense Data Research Security Research Engineering and Analytics Michael Johnson Abdul Mohammed Sarah Fender Windows Defender Research Windows Defender Research Azure Security Team Team Meths Ferrer Kasia Kaplinska Hamish O'Dea Windows Active Defense Cloud and Enterprise Windows Defender Research Marketing Team Zarestel Ferrer Security Research Seema Kathuria
    [Show full text]
  • PSG Consumer 2C14 Desktop Datasheet
    Datasheet HP Desktop PC 110-352na Just what you need. The HP 110 sticks to the basics, providing the competitive performance and familiar, essential features you need for routine tasks like email and social networking, homework and personal finances, or casual Web browsing and online shopping.1 The clean modern styling makes it reliable, easy-to-use, and extremely affordable. HP recommends Windows. An approachable design. The HP 110 blends in elegantly with its surroundings thanks to a simple, modern design that fits neatly into just about any space. Essentials you can rely on. Feel good about your purchase with a brand you trust. The HP 110 is the smart choice when you want to spend less and accomplish more. Save and share in a snap. Easily save and share your favorite files with the built-in, 6-in-1 media card reader. HP Connected Music. Get access to unlimited listening of radio playlists for 12 months2. Enjoy the latest songs of your favorite music styles, ad-free, and get a chance to win concert tickets and experiences with your preferred artists. 1 Internet access is required and not included. 2 Subject to purchasing a Windows 8 and 8.1 consumer HP Notebook or Desktop PC or Tablet between April 10th 2014 and June 30th 2015. Terms and Conditions apply. hp.com/go/music Datasheet HP Desktop PC HP recommends Windows. 110-352na Operating System Windows 8.1 64 Processor AMD Quad-Core A6-5200 APU with Radeon HD 8400 Graphics (2 GHz, 2 MB cache) Processor family: AMD Quad-Core A-Series processor Memory 8 GB DDR3 (1 x 8 GB); Total slots:
    [Show full text]
  • PSG Consumer 2C14 Desktop Datasheet
    Datasheet HP Pavilion All-in-One PC 23-p030na Keep entertainment and productivity at your fingertips with the sleek, space-saving HP Pavilion All-in-One. The Full HD screen and DTS Sound+ Audio provide a full sensory experience, while quick setup and an impressive 10-point capacitive touchscreen help you accomplish more in less time. HP recommends Windows. Stunning IPS display. View photos, videos and games with stunning clarity from almost any angle on a 23-inch diagonal edge-to-edge display with IPS technology. 10-point capacitive touchscreen. Your digital world is always just a tap or a swipe away thanks to the ease of a 10-point capacitive touchscreen optimized for Windows 8.1.1 Ready to entertain. Keep entertained with stunning Full HD2, DTS Sound+ Audio and HP Connected software to help you keep up with your digital world. HP Connected Music. Get access to unlimited listening of radio playlists for 12 months3. Enjoy the latest songs of your favorite music styles, ad-free, and get a chance to win concert tickets and experiences with your preferred artists. 1 Not all features are available in all editions of Windows 8. Systems may require upgraded and/or separately purchased hardware, drivers and/or software to take full advantage of Windows 8 functionality. See www.microsoft.com. For full functionality of the share hot key, internet access is required and not included. 2 High definition (HD) content is required to view high-definition images. 3 Subject to purchasing a Windows 8 and 8.1 consumer HP Notebook or Desktop PC or Tablet between April 10th 2014 and June 30th 2015.
    [Show full text]
  • PSG Consumer 1C14 Notebook Datasheet
    Datasheet HP Pavilion Notebook PC 17-f085sa Serious performance. Colourful personality. The HP Pavilion Notebook provides all of the benefits of a desktop in a sleek, portable package. Astounding sound from BeatsAudio™ and a crisp, clear HD1 display are just some of the benefits you can rely on for a superior computing experience. HP recommends Windows. See it clearly with HD or optional Full HD1. Get the ultimate Windows experience with the crystal-clear HD or optional Full HD1 display optimized for Windows 8.1.2 BeatsAudio™. With BeatsAudio™ and dual speakers, the HP Pavilion Notebook is designed for the best-sounding, richest audio on a PC. Get yourself connected. Sync photos across your PC, smartphone and tablet with HP Connected Photo. Print photos and make memories more vivid on your Windows 8.12 and Android™ devices when you crop, rotate, add captions and more. Store and order prints on Snapfish and share them with friends and family through your social networks.3 HP Connected Music. Get access to unlimited listening of radio playlists for 12 months. Enjoy the latest songs of your favorite music styles, ad-free, and get a chance to win concert tickets and experiences with your preferred artists.4 1 High definition (HD) content is required to view high-definition images. 2 Not all features are available in all editions of Windows 8. Systems may require upgraded and/or separately purchased hardware, drivers and/or software to take full advantage of Windows 8 functionality. See www.microsoft.com. 3 Availability of features varies by country and operating system.
    [Show full text]
  • Five Cs for the Future
    The RSS Feed Five Cs for the future hen you try and take a loan, a bank music, you’re Consuming content. This is what or a lender looks at five Cs for devices today are best at achieving – your PC Wyou – Character, Capacity, Col- and your phone are equally capable of satiating lateral, Capital and Conditions. Character is this need of yours. your reputation – do you have a history of bad Communication is what is responsible for credit? Capacity is your ability to repay – a big Facebook, cell phones, emailing, IM-ing, video enough salary, existing debts, etc. Collateral is conferencing, etc., Regardless of whether we what you’re putting up to minimise the risk to communicate using PCs, phones or tablets, all the lender – property for example. Capital is form factors of devices of today seem to excel similar, in the sense it refers to how much you at Communication. have, and are risking from your own pocket. Creation is the real chink in technology Finally, Conditions define the loan amount and armour, and has always been. There’s always the interest rate, based on your age – how close some device that’s better at creating certain or far away from retirement you are… types of content than another. Your phone can Robert Sovereign-Smith No, I’m not going to give you a finance lesson click a photo like a dedicated camera can, make Executive Editor this month, especially since I consider myself a call as clear as a landline, video chat like on [email protected] to be pretty terrible on the subject.
    [Show full text]
  • HP ENVY Phoenix Desktop PC 810-211Na Game On
    Datasheet HP ENVY Phoenix Desktop PC 810-211na Game on. Step up your game with the powerful HP ENVY Phoenix 810—clad in battle-worthy armor and designed to dominate opponents with performance that’s simply game changing. Get in the zone like never before with lightning-fast processing, stunning graphics, and sound that puts you right in the middle of the action. HP recommends Windows. Change the game. Power up! Unleash the combination of extreme processing and stunning graphics for gaming performance that’s absolutely thrilling. Customize with ease. Easily expand your machine’s performance for an experience that’s all you. It's simple to reach the hardware and quickly upgrade parts between battles. Don’t miss a beat. Feel the game like never before with BeatsAudio™, designed for the best sounding, richest audio available on a PC. HP Connected Music. Get access to unlimited listening of radio playlists for 12 months1. Enjoy the latest songs of your favorite music styles, ad-free, and get a chance to win concert tickets and experiences with your preferred artists. 1 Subject to purchasing a Windows 8 and 8.1 consumer HP Notebook or Desktop PC or Tablet between April 10th 2014 and June 30th 2015. Terms and Conditions apply. hp.com/go/music Datasheet HP ENVY Phoenix Desktop PC HP recommends Windows. 810-211na Operating System Windows 8.1 64 Processor Intel® Core™ i7-4790 with Intel HD Graphics 4600 (3.6 GHz, 8 MB cache, 4 cores) Processor family: Intel® Core™ i7 processor Chipset Intel Z87 Memory 16 GB DDR3 (2 x 8 GB); Total slots: 4 DIMM Storage 256 GB SATA SSD; 3 TB 7200 rpm SATA; DVD SATA writer Display LCD Monitor (buy separately): HP ENVY 23 58.4 cm (23") Diagonal IPS LED Backlit Monitor.
    [Show full text]
  • Gaikai - Wikipedia Case 3:19-Cv-07027-WHA Document 28-2 Filed 10/14/19 Page 2 of 8 Not Logged in Talk Contributions Create Account Log In
    Case 3:19-cv-07027-WHA Document 28-2 Filed 10/14/19 Page 1 of 8 EXHIBIT B Gaikai - Wikipedia Case 3:19-cv-07027-WHA Document 28-2 Filed 10/14/19 Page 2 of 8 Not logged in Talk Contributions Create account Log in Article Talk Read Edit View history Gaikai From Wikipedia, the free encyclopedia Main page Gaikai (外海, lit. "open sea", i.e. an expansive outdoor space) is an American company which provides technology for the streaming of high- Contents Gaikai Featured content end video games.[1] Founded in 2008, it was acquired by Sony Interactive Entertainment in 2012. Its technology has multiple applications, Current events including in-home streaming over a local wired or wireless network (as in Remote Play between the PlayStation 4 and PlayStation Vita), as Random article well as cloud-based gaming where video games are rendered on remote servers and delivered to end users via internet streaming (such as Donate to Wikipedia the PlayStation Now game streaming service.[2]) As a startup, before its acquisition by Sony, the company announced many partners using Wikipedia store [3] the technology from 2010 through 2012 including game publishers, web portals, retailers and consumer electronics manufacturers. On July Founded November 2008 Interaction 2, 2012, Sony announced that a formal agreement had been reached to acquire the company for $380 million USD with plans of establishing Headquarters Aliso Viejo, California, U.S. [4] Help their own new cloud-based gaming service, as well as integrating streaming technology built by Gaikai into PlayStation products, resulting Owner Sony [5] [6] About Wikipedia in PlayStation Now and Remote Play.
    [Show full text]
  • Microsoft Security Intelligence Report
    Microsoft Security Intelligence Report Volume 22 | January through March, 2017 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. Copyright © 2017 Microsoft Corporation. All rights reserved. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Authors Roger Capriotti Volv Grebennikov Carmen Liang Microsoft Edge Product Bing Windows Defender Research Marketing team Team Vidya Gururaja Rao Zheng Dong Windows Active Defense Data Ryan McGee Windows Defender ATP Engineering and Analytics Cloud and Enterprise Research Marketing Chris Hallum Eric Douglas Windows Active Defense Matt Miller Windows Defender Research Product Marketing team Windows Active Defense Team Paul Henry Chad Mills Matt Duncan Wadeware LLC Windows Defender ATP Windows Active Defense Research Susan Higgs Matthew Duncan Windows Defender ATP Phillip Misner Windows Active Defense Data Research Security Research Engineering and Analytics Michael Johnson Abdul Mohammed Sarah Fender Windows Defender Research Windows Defender Research Azure Security Team Team Meths Ferrer Kasia Kaplinska Hamish O'Dea Windows Active Defense Cloud and Enterprise Windows Defender Research Marketing Team Zarestel Ferrer Security Research Seema Kathuria
    [Show full text]