investigating malicious office documents: analyzing macros malwares used in cyber attacks

36

Upload: cysinfo-cyber-security-community

Post on 16-Apr-2017

807 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 2: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 3: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 4: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 5: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 6: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 7: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 8: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 9: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 10: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 11: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 12: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 13: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 14: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 15: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 16: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 17: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 18: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 19: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 20: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 21: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 22: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 23: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 24: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 25: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 26: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 27: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 28: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 29: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 30: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 31: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 32: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 33: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 34: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 35: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks
Page 36: Investigating Malicious Office Documents: Analyzing Macros Malwares used in Cyber Attacks