Automated Malware Analysis Report For

Total Page:16

File Type:pdf, Size:1020Kb

Automated Malware Analysis Report For ID: 441325 Sample Name: 5101_06282021_REQ_PLANNER 0_MISC.xls Cookbook: defaultwindowsofficecookbook.jbs Time: 17:12:52 Date: 28/06/2021 Version: 32.0.0 Black Diamond Table of Contents Table of Contents 2 Windows Analysis Report 5101_06282021_REQ_PLANNER 0_MISC.xls 3 Overview 3 General Information 3 Detection 3 Signatures 3 Classification 3 Process Tree 3 Malware Configuration 3 Yara Overview 3 Sigma Overview 3 Signature Overview 3 Mitre Att&ck Matrix 4 Behavior Graph 4 Screenshots 4 Thumbnails 4 Antivirus, Machine Learning and Genetic Malware Detection 5 Initial Sample 5 Dropped Files 5 Unpacked PE Files 5 Domains 5 URLs 5 Domains and IPs 7 Contacted Domains 7 URLs from Memory and Binaries 7 Contacted IPs 7 General Information 7 Simulations 8 Behavior and APIs 8 Joe Sandbox View / Context 8 IPs 8 Domains 8 ASN 8 JA3 Fingerprints 8 Dropped Files 8 Created / dropped Files 8 Static File Info 9 General 9 File Icon 9 Network Behavior 9 Network Port Distribution 9 UDP Packets 10 Code Manipulations 10 Statistics 10 System Behavior 10 Analysis Process: EXCEL.EXE PID: 4424 Parent PID: 792 10 General 10 File Activities 10 Registry Activities 10 Key Created 10 Key Value Created 10 Disassembly 10 Copyright Joe Security LLC 2021 Page 2 of 10 Windows Analysis Report 5101_06282021_REQ_PLANN…ER 0_MISC.xls Overview General Information Detection Signatures Classification Sample 5101_06282021_REQ_PL No high impact signatures. Name: ANNER 0_MISC.xls Analysis ID: 441325 MD5: 11aff487dcbd7df… SHA1: 08e9b1c77f3653e… Ransomware Miner Spreading SHA256: e99b4d5df922cc6… mmaallliiiccciiioouusss Infos: malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious Most interesting Screenshot: cccllleeaann clean Exploiter Banker Spyware Trojan / Bot Adware Score: 0 Range: 0 - 100 Whitelisted: false Confidence: 80% Process Tree System is w10x64 EXCEL.EXE (PID: 4424 cmdline: 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding MD5: 5D6638F2C8F8571C593999C58866007E) cleanup Malware Configuration No configs have been found Yara Overview No yara matches Sigma Overview No Sigma rule has matched Signature Overview Click to jump to signature section There are no malicious signatures, click here to show all signatures . Copyright Joe Security LLC 2021 Page 3 of 10 Mitre Att&ck Matrix Command Remote Initial Privilege Defense Credential Lateral and Network Service Access Execution Persistence Escalation Evasion Access Discovery Movement Collection Exfiltration Control Effects Effects Impact Valid Windows Path Path Masquerading 1 OS File and Remote Data from Exfiltration Data Eavesdrop on Remotely Modify Accounts Management Interception Interception Credential Directory Services Local Over Other Obfuscation Insecure Track Device System Instrumentation Dumping Discovery 1 System Network Network Without Partition Medium Communication Authorization Default Scheduled Boot or Boot or Rootkit LSASS System Remote Data from Exfiltration Junk Data Exploit SS7 to Remotely Device Accounts Task/Job Logon Logon Memory Information Desktop Removable Over Redirect Phone Wipe Data Lockout Initialization Initialization Discovery 1 Protocol Media Bluetooth Calls/SMS Without Scripts Scripts Authorization Behavior Graph Hide Legend Legend: Process Signature Behavior Graph Created File DNS/IP Info ID: 441325 Is Dropped Is Windows Process Sample: 5101_06282021_REQ_PLANNER 0... Number of created Registry Values Startdate: 28/06/2021 Number of created Files Visual Basic Architecture: WINDOWS Delphi Score: 0 Java .Net C# or VB.NET C, C++ or other language Is malicious started Internet EXCEL.EXE 29 24 Screenshots Thumbnails This section contains all screenshots as thumbnails, including those not shown in the slideshow. Copyright Joe Security LLC 2021 Page 4 of 10 Antivirus, Machine Learning and Genetic Malware Detection Initial Sample No Antivirus matches Dropped Files No Antivirus matches Unpacked PE Files No Antivirus matches Domains No Antivirus matches URLs Copyright Joe Security LLC 2021 Page 5 of 10 Source Detection Scanner Label Link https://cdn.entity. 0% URL Reputation safe https://cdn.entity. 0% URL Reputation safe https://cdn.entity. 0% URL Reputation safe https://cdn.entity. 0% URL Reputation safe https://powerlift.acompli.net 0% URL Reputation safe https://powerlift.acompli.net 0% URL Reputation safe https://powerlift.acompli.net 0% URL Reputation safe https://powerlift.acompli.net 0% URL Reputation safe https://rpsticket.partnerservices.getmicrosoftkey.com 0% URL Reputation safe https://rpsticket.partnerservices.getmicrosoftkey.com 0% URL Reputation safe https://rpsticket.partnerservices.getmicrosoftkey.com 0% URL Reputation safe https://rpsticket.partnerservices.getmicrosoftkey.com 0% URL Reputation safe https://cortana.ai 0% URL Reputation safe https://cortana.ai 0% URL Reputation safe https://cortana.ai 0% URL Reputation safe https://cortana.ai 0% URL Reputation safe https://api.aadrm.com/ 0% URL Reputation safe https://api.aadrm.com/ 0% URL Reputation safe https://api.aadrm.com/ 0% URL Reputation safe https://api.aadrm.com/ 0% URL Reputation safe https://ofcrecsvcapi-int.azurewebsites.net/ 0% Virustotal Browse https://ofcrecsvcapi-int.azurewebsites.net/ 0% Avira URL Cloud safe https://res.getmicrosoftkey.com/api/redemptionevents 0% URL Reputation safe https://res.getmicrosoftkey.com/api/redemptionevents 0% URL Reputation safe https://res.getmicrosoftkey.com/api/redemptionevents 0% URL Reputation safe https://res.getmicrosoftkey.com/api/redemptionevents 0% URL Reputation safe https://powerlift-frontdesk.acompli.net 0% URL Reputation safe https://powerlift-frontdesk.acompli.net 0% URL Reputation safe https://powerlift-frontdesk.acompli.net 0% URL Reputation safe https://powerlift-frontdesk.acompli.net 0% URL Reputation safe https://officeci.azurewebsites.net/api/ 0% Virustotal Browse https://officeci.azurewebsites.net/api/ 0% Avira URL Cloud safe https://store.office.cn/addinstemplate 0% URL Reputation safe https://store.office.cn/addinstemplate 0% URL Reputation safe https://store.office.cn/addinstemplate 0% URL Reputation safe https://store.office.cn/addinstemplate 0% URL Reputation safe https://store.officeppe.com/addinstemplate 0% URL Reputation safe https://store.officeppe.com/addinstemplate 0% URL Reputation safe https://store.officeppe.com/addinstemplate 0% URL Reputation safe https://store.officeppe.com/addinstemplate 0% URL Reputation safe https://dev0-api.acompli.net/autodetect 0% URL Reputation safe https://dev0-api.acompli.net/autodetect 0% URL Reputation safe https://dev0-api.acompli.net/autodetect 0% URL Reputation safe https://dev0-api.acompli.net/autodetect 0% URL Reputation safe https://www.odwebp.svc.ms 0% URL Reputation safe https://www.odwebp.svc.ms 0% URL Reputation safe https://www.odwebp.svc.ms 0% URL Reputation safe https://www.odwebp.svc.ms 0% URL Reputation safe https://dataservice.o365filtering.com/ 0% URL Reputation safe https://dataservice.o365filtering.com/ 0% URL Reputation safe https://dataservice.o365filtering.com/ 0% URL Reputation safe https://dataservice.o365filtering.com/ 0% URL Reputation safe https://officesetup.getmicrosoftkey.com 0% URL Reputation safe https://officesetup.getmicrosoftkey.com 0% URL Reputation safe https://officesetup.getmicrosoftkey.com 0% URL Reputation safe https://officesetup.getmicrosoftkey.com 0% URL Reputation safe https://prod-global-autodetect.acompli.net/autodetect 0% URL Reputation safe https://prod-global-autodetect.acompli.net/autodetect 0% URL Reputation safe https://prod-global-autodetect.acompli.net/autodetect 0% URL Reputation safe https://prod-global-autodetect.acompli.net/autodetect 0% URL Reputation safe https://ncus.contentsync. 0% URL Reputation safe https://ncus.contentsync. 0% URL Reputation safe https://ncus.contentsync. 0% URL Reputation safe https://ncus.contentsync. 0% URL Reputation safe Copyright Joe Security LLC 2021 Page 6 of 10 Source Detection Scanner Label Link https://apis.live.net/v5.0/ 0% URL Reputation safe https://apis.live.net/v5.0/ 0% URL Reputation safe https://apis.live.net/v5.0/ 0% URL Reputation safe https://apis.live.net/v5.0/ 0% URL Reputation safe https://wus2.contentsync. 0% URL Reputation safe https://wus2.contentsync. 0% URL Reputation safe https://wus2.contentsync. 0% URL Reputation safe https://wus2.contentsync. 0% URL Reputation safe https://asgsmsproxyapi.azurewebsites.net/ 0% Virustotal Browse https://asgsmsproxyapi.azurewebsites.net/ 0% Avira URL Cloud safe https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile 0% URL Reputation safe https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile 0% URL Reputation safe https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile 0% URL Reputation safe https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile 0% URL Reputation safe https://ncus.pagecontentsync. 0% URL Reputation safe https://ncus.pagecontentsync. 0% URL Reputation safe https://ncus.pagecontentsync. 0% URL Reputation safe https://ncus.pagecontentsync. 0% URL Reputation safe https://skyapi.live.net/Activity/ 0% URL Reputation safe https://skyapi.live.net/Activity/ 0% URL Reputation safe https://skyapi.live.net/Activity/ 0% URL Reputation safe https://skyapi.live.net/Activity/ 0% URL Reputation safe https://dataservice.o365filtering.com 0% URL Reputation safe https://dataservice.o365filtering.com 0% URL Reputation safe https://dataservice.o365filtering.com 0% URL Reputation safe https://dataservice.o365filtering.com 0% URL Reputation safe https://api.cortana.ai
Recommended publications
  • Dipartimento Di Impresa E Management Cattedra Di Strategia
    Dipartimento di Impresa e Management Cattedra di Strategia di Impresa CORPORATE VENTURE CAPITAL ED OPEN INNOVATION: MOTORI PER LA CRESCITA INNOVATIVA AZIENDALE RELATORE Prof. Paolo Boccardelli CANDIDATO Carlo Maria Torregrossa Matricola 681361 CORRELATORE Prof. Luca Pirolo ANNO ACCADEMICO 2017/2018 INDICE INTRODUZIONE ............................................................................................................................. 3 CAPITOLO 1 – CORPORATE VENTURE CAPITAL ................................................................ 4 1.1 - Definizione, numeri e classificazione ...................................................................................... 4 1.2 - Principali tipologie di investimento ......................................................................................... 9 1.3 - Modelli e fasi di corporate venture capital ............................................................................ 11 1.4 - Il concetto di open innovation ............................................................................................... 14 CAPITOLO 2 – L’INVESTIMENTO IN INNOVAZIONE ........................................................ 23 2.1 - Start-up e corporate venturing ............................................................................................... 23 2.2 - Il fenomeno delle start-up nel mondo e in Italia .................................................................... 25 2.3 - Valutazione d’azienda: come valutare grandi imprese e start-up .........................................
    [Show full text]
  • Automated Malware Analysis Report For
    ID: 446205 Sample Name: Open_Purchase_Order_Report_by_Supplier_- _ProReport_188165628308.xlsx Cookbook: default.jbs Time: 00:16:48 Date: 09/07/2021 Version: 32.0.0 Black Diamond Table of Contents Table of Contents 2 Windows Analysis Report Open_Purchase_Order_Report_by_Supplier_- _ProReport_188165628308.xlsx 3 Overview 3 General Information 3 Detection 3 Signatures 3 Classification 3 Process Tree 3 Malware Configuration 3 Yara Overview 3 Sigma Overview 3 Jbx Signature Overview 3 Mitre Att&ck Matrix 4 Behavior Graph 4 Screenshots 4 Thumbnails 4 Antivirus, Machine Learning and Genetic Malware Detection 5 Initial Sample 5 Dropped Files 5 Unpacked PE Files 5 Domains 5 URLs 5 Domains and IPs 7 Contacted Domains 7 URLs from Memory and Binaries 7 Contacted IPs 7 General Information 7 Simulations 8 Behavior and APIs 8 Joe Sandbox View / Context 8 IPs 8 Domains 8 ASN 8 JA3 Fingerprints 8 Dropped Files 8 Created / dropped Files 8 Static File Info 9 General 9 File Icon 10 Network Behavior 10 Network Port Distribution 10 UDP Packets 10 Code Manipulations 10 Statistics 10 System Behavior 10 Analysis Process: EXCEL.EXE PID: 6512 Parent PID: 800 10 General 10 File Activities 11 File Written 11 Registry Activities 11 Key Created 11 Key Value Created 11 Disassembly 11 Copyright Joe Security LLC 2021 Page 2 of 11 Windows Analysis Report Open_Purchase_Order_Repo…rt_by_Supplier_-_ProReport_188165628308.xlsx Overview General Information Detection Signatures Classification Sample Open_Purchase_Order_Re No high impact signatures. Name: port_by_Supplier_- _ProReport_188165628308
    [Show full text]
  • Agrofuels in the Americas.Pdf
    Agrofuels in the Americas. Edited by Richard Jonasse, PhD. Copyright © 2009 Institute for Food and Development Policy. All rights reserved. Food First Books 398 60th Street Oakland, CA 94618 510-654-4400 www.foodfirst.org Cover and text design by Richard Jonasse Production: Richard Jonasse Acknowledgements: This project began a little over a year ago with five of the authors sitting around a table at Food First in Oakland, CA. They included Annie Shattuck, Isabella Kenfield, Jessica Aguirre, Gretchen Gordon, Ellen Tarby, and myself. Beyond the wonderful work of the authors herein, we would like to thank Eric Holt-Giménez for providing his insights and many key paragraphs to most of the pieces herein. Annie Shattuck, had a hand in every article. Marilyn Borchardt provided tremendous support, humor, feedback, and commentary. Martha and Rowena shared their kindness and mung beans. There have been a number of people here who have stepped in to help with research, fact checking, translation, proofreading, citation hunting, fact-finding, and general commentary. These include: Annie, Marilyn, Martha, Jessica Aguirre, Jody Zaitlin, Karla Pena, Tamara Wattnem, Leonora Hurtado, Loren Peabody, Zack Zimbalist, Matt Dintenfass, Angie Rodriguez, Maria Barrera, Ellen Tyler, Amanda El-Khoury, Mihir Mankad, Jasmine Tilley, William Wroblewski, and Matt King. About the Author: Richard Jonasse is currently a Research Fellow at Food First in Oakland, CA. His research interests lie in development issues, including International Finance Institutions, food sovereignty, labor/human rights, and environmental sustainability. He has a Masters Degree in Telecommunication and Film from University of Oregon, and a Ph.D. in Communication (emphasis in technology studies) from U.
    [Show full text]
  • DPIA Office 365 for the Web and Mobile Office Apps Data Protection
    authe DPIA Office 365 for the Web and mobile Office apps Data protection impact assessment on the processing of diagnostic data Date 30 June 2020 DPIA Office for the Web and mobile Office apps SLM Microsoft Rijk 30 June 2020 Colophon DPIA by Ministry of Justice and Security Strategic Vendor Management Microsoft (SLM Microsoft Rijk) Turfmarkt 147 2511 DP The Hague PO Box 20301 2500 EH The Hague www.rijksoverheid.nl/jenv Contact Paul van den Berg E [email protected] T 070 370 79 11 Project name DPIA report diagnostic data processing in Microsoft Office 365 for the Web and mobile Office apps (report delivered March 2020, Update June 2020) Appendix Overview telemetry data observed in iOS and Office for the Web apps Authors Privacy Company Sjoera Nas and Floor Terra, senior advisors, with the help of work student Lotte aan de Stegge www.privacycompany.eu Page 3 of 138 DPIA Office for the Web and mobile Office apps SLM Microsoft Rijk 30 June 2020 CONTENTS Colophon 3 Summary 7 Introduction 17 Part A. Description of the data processing 24 1. The processing of diagnostic data 24 1.1 About Office for the Web, the mobile Office apps and the Connected Experiences 24 1.2 Difference between content, functional and diagnostic data 33 1.3 Different types of diagnostic data 34 2. Personal data and data subjects 35 2.1 Definitions of different types of personal data 36 2.2 Diagnostic data mobile Office apps 37 2.3 Outgoing traffic to third parties mobile Office apps 40 2.4 Results access request mobile Office apps 49 2.5 Diagnostic data Office for the Web 51 2.6 Outgoing traffic to third parties Office for the Web 52 2.7 Results access requests Office for the Web 55 2.8 Diagnostic data Connected Experiences 59 2.9 Analytical services based on the system-generated log files 60 2.10 Types of personal data and data subjects 62 3.
    [Show full text]
  • RRN Humanitarian Mine Action
    March 2000 R ELIEF AND REHABILITATION NETWORK RRN 32 paper NETWORK Humanitarian Mine Action: The First Decade of a New Sector in Humanitarian Aid by Chris Horwood Abstract There are two important messages concerning who may have had very little exposure to the mine action that emerge from this paper. The details of mine action and its dramatic growth first is that after only a few years of as a sector in the last 10 years. The paper is mobilisation, campaigning and project also designed to present certain definitions, initiation there are, in place, the forces and premises and issues that have emerged within legislation to effectively address the threat of the mine action sector in recent years. It may landmines in the coming years, rather than also serve as a resource document as it decades or centuries. The second is that mine disassembles and identifies the issues and action cannot be successful as an isolated, main players in global mine action. specialised sub-sector of the aid world but must be seen as a legitimate component of The start of a new century and a decade after emergency, rehabilitation and development the initiation of humanitarian mine action assistance. programmes seems a suitable point to review progress to date, and open the issues facing This paper is specifically written for the aid the mine action sector to the wider aid community outside the mine action sector community. ○○○○○○○○○○○○○ Please send comments on this paper to: As from 1 April 2000 the RRN will be Relief and Rehabilitation Network (RRN) changing its name to the Humanitarian Overseas Development Institute Practice Network – HPN.
    [Show full text]
  • Quarterly Review of the Software & Internet Sector
    Quarterly Review of the Software & Internet Sector Q4 2014 Member: FINRA / SIPC About Navidar Navidar is an investment banking firm providing companies and investors in dynamic industries with strategic M&A advice, capital raising solutions, vital insights and breakthrough opportunities. ■ Big Firm Experience Combined with Senior Banker Attention ■ Global Relationships with Top-Tier Investors and World-Leading Companies ■ Greater Creativity and Customized Solutions ■ Focused on the Middle Corridor of the United States Past Transactions Executed by Navidar October 2014 September 2014 June 2014 April 2014 Has been acquired by Has acquired Has been acquired by Has been acquired by Buyside Advisor Sellside Advisor Sellside Advisor Sellside Advisor March 2014 December 2013 October 2013 December 2012 Has been acquired by Has acquired Has been acquired by Private Equity Placement Sellside Advisor Buyside Advisor Sellside Advisor October 2012 August 2012 February 2012 February 2012 Has been acquired by Has been acquired by NOL Shareholder Rights Capital Structure Review Plan Sellside Advisor Sellside Advisor October 2011 July 2011 January 2011 January 2011 January 2011 Has been acquired by Has been acquired by Debt Placement Sellside Advisor Sellside Advisor Private Equity Placement Debt Placement July 2010 July 2009 November 2010 January 2009 Has acquired World Golf Systems Group PLC Private Equity Placement Recapitalization Private Equity Placement Buyside Advisor Note: Transactions above only represent a sample of past transactions executed
    [Show full text]
  • Automated Malware Analysis Report For
    ID: 434272 Sample Name: HR_IT_Training_Learning_Sample.xlsx Cookbook: defaultwindowsofficecookbook.jbs Time: 17:10:12 Date: 14/06/2021 Version: 32.0.0 Black Diamond Table of Contents Table of Contents 2 Windows Analysis Report HR_IT_Training_Learning_Sample.xlsx 3 Overview 3 General Information 3 Detection 3 Signatures 3 Classification 3 Process Tree 3 Malware Configuration 3 Yara Overview 3 Sigma Overview 3 Signature Overview 3 Mitre Att&ck Matrix 4 Behavior Graph 4 Screenshots 4 Thumbnails 4 Antivirus, Machine Learning and Genetic Malware Detection 5 Initial Sample 5 Dropped Files 5 Unpacked PE Files 5 Domains 5 URLs 5 Domains and IPs 7 Contacted Domains 7 URLs from Memory and Binaries 7 Contacted IPs 7 General Information 7 Simulations 8 Behavior and APIs 8 Joe Sandbox View / Context 8 IPs 8 Domains 8 ASN 8 JA3 Fingerprints 8 Dropped Files 8 Created / dropped Files 8 Static File Info 9 General 9 File Icon 10 Network Behavior 10 Network Port Distribution 10 UDP Packets 10 Code Manipulations 10 Statistics 10 System Behavior 10 Analysis Process: EXCEL.EXE PID: 7036 Parent PID: 800 10 General 10 File Activities 10 File Deleted 10 File Written 10 Registry Activities 10 Key Created 10 Key Value Created 10 Disassembly 11 Copyright Joe Security LLC 2021 Page 2 of 11 Windows Analysis Report HR_IT_Training_Learning_Sa…mple.xlsx Overview General Information Detection Signatures Classification Sample HR_IT_Training_Learning_ No high impact signatures. Name: Sample.xlsx Analysis ID: 434272 MD5: 555d9445299aa4… SHA1: 2648ab606e65f98… Ransomware Miner
    [Show full text]
  • Enterprise Software Market
    ENTERPRISE SOFTWARE REVOLUTIONISING THE MODERN WORKPLACE November 2016 Important disclosures appear at the back of this report GP Bullhound LLP is authorised and regulated by the Financial Conduct Authority GP Bullhound Inc. is a member of FINRA Enterprise Software: Revolutionising the Modern Workplace P3 CONTENTS 05 The Enterprise Software market 10 Our survey: The experts weigh in 17 Key findings 24 Overview of corporate finance activity 34 Selected company profiles 44 Authors 45 Our team 46 Disclaimer ABOUT US GP Bullhound is a technology investment bank providing independent strategic advice on Mergers & Acquisitions and Capital raising to leading technology entrepreneurs, companies and investors across the globe. Our passion for technology, our financial acumen and our understanding of the entrepreneur’s journey differentiate our advice from other investment banks. We help exceptional people build exceptional businesses to create more billion-dollar technology companies across Europe. MERGERS & ACQUISITIONS CAPITAL RAISING, SECONDARIES AND BLOCK TRADES We act as a trusted partner to entrepreneurs and investors planning to sell their businesses In the last 17 years we have built up a or build by acquisition. unique, global set of relationships with investors who, like us, are passionate about Since inception in 1999 we have completed technology. over 230 transactions with category leaders in the technology sector globally. We pride ourselves on building long-term relationships, and we work with our clients More than half of our deals deliver a cross- from growth equity fundraising, through debt border solution. restructuring, secondary fundraising and towards liquidity via trade sale or IPO. Our six offices across Europe and the US allow us to provide expert and experienced, local ASSET MANAGEMENT service to clients as well as market leading access to technology consolidators across the GP Bullhound Asset Management is our globe.
    [Show full text]
  • Strategic Audit of Microsoft Office
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Honors Theses, University of Nebraska-Lincoln Honors Program Spring 4-11-2019 Strategic Audit of Microsoft Office Dylan Dmitri Gray University of Nebraska - Lincoln Follow this and additional works at: https://digitalcommons.unl.edu/honorstheses Part of the Business Administration, Management, and Operations Commons, and the Technology and Innovation Commons Gray, Dylan Dmitri, "Strategic Audit of Microsoft Office" (2019). Honors Theses, University of Nebraska- Lincoln. 189. https://digitalcommons.unl.edu/honorstheses/189 This Thesis is brought to you for free and open access by the Honors Program at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Honors Theses, University of Nebraska-Lincoln by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. MICROSOFT OFFICE: A STRATEGIC AUDIT An Undergraduate Honors Thesis Submitted in Partial fulfillment of University Honors Program Requirements University of Nebraska-Lincoln by Dylan Gray, BS Computer Engineering Department of Engineering April 11th, 2019 Faculty Mentors: Dr. Sam Nelson, PhD, College of Entrepreneurship Abstract Microsoft Office is some of the most iconic software ever made. It empowers people and organizations across the planet to achieve more. The scope of this audit is limited to Office for business. The consumer market, which is less profitable and dominated by free products, is not considered. This audit attempts to explain the strategies currently being pursued by the Office leadership team, and the relation of these strategies to the broader industry. Ultimately, this paper attempts to identify threats to Office and offer suggestions on how best to mitigate those threats.
    [Show full text]
  • Network Requests in Office for Mac
    Network Requests in Office for Mac Revision 3.8 [May 28, 2019] Contact [email protected] Summary Office for Mac applications provide a native app experience on the macOS platform. Each app is designed to work in a variety of scenarios, including states when no network access is available. When a machine is connected to a network, the applications automatically connect to a series of web-based services to provide enhanced functionality. This paper describes which end-points and URLs the applications attempt to reach, and the services provided. This information is useful when troubleshooting network configuration issues, and setting a policy for network proxy servers. The details in this paper are intended to compliment the Office 365 URL and address range article. Most of this paper comprises of tables detailing network URLs, type, and description of service or feature provided by that end-point. Each of the Office apps may differ in its service and end-point usage. The following apps are defined in the tables below: • W: Word • X: Excel • P: PowerPoint • O: Outlook • N: OneNote • D: OneDrive • S: Skype for Business • T: Teams The URL type is defined as follows: • ST: Static – the URL is hard-coded into the client application • SS: Semi-Static – the URL is encoded as part of a web page or redirector • CS: Config Service – the URL is returned as part of the Office Configuration Service • DY: Dynamic – the URL is wholly dependent on user input Unless noted otherwise (e.g. Excel Ideas), all HTTPS requests use the standard outbound port of 443, and all HTTP requests use port 80.
    [Show full text]
  • VR, AI, Robotics, Kinect, Sound 그리고 VR Suit의 시너지가 중요  몰입도 극대화 통한 수익성 확대
    Entertainment Technology - Entertainment Technology가 가져올 우리의 미래 - Analyst 김영우 / 02-3773-9244 / IT총괄, 반도체, 디스플레이 Analyst 최관순 / 02-3773-8812 / 지주, 통신, 게임, 인터넷 AltAnalyst 김민규 /02/ 02-3773-8497 / IT 장비, 소재 Analyst 박형우 / 02-3773-8889 / 휴대폰, 전기전자, 통신장비 [ Table of contents ] Analyst 김영우 (IT총괄/반도체/디스플레이) hermes_ [email protected] 02-3773-9244 1. 자동차 Arcade Game ⇒ 무인자동차 Analyst 2. 인공지능과의 결합 ⇒ AlphaGo 최관순 (통신/지주/인터넷/게임) [email protected] 3. Game에 사용되는 AI의 2가지 종류 02-3773-8812 4. 비몽사몽, 여진여몽의 상태로 이끌어 줄 Technology Analyst 김민규 5. 기타 Industry로의 파급효과 (IT장비/소재/IT중소형주) [email protected] 02-3773-8497 6. 글로벌 리딩업체의 전략적 제휴 및 M&A 7. Global Top-picks와 Supply Chain 구성도 Analyst 박형우 (휴대폰/전기전자/통신장비) [email protected] 02-3773-8889 Summary - E.T Chipset & Set & Cloud 1. 첨단기술 상용화의 시작은 Entertainment Technology에서 출발 - 사용자의 몰입도를 최대한 높이려면, 보다 높은 수준의 Reality와 인공지능(AI) 구현이 기본 - 뛰어난 그래픽 성능 구현 및 병렬컴퓨팅에 의한 인공지능 강화를 위해 필요한 핵심부품은 GPU - VR, AI, Robotics, Kinect, Sound 그리고 VR Suit의 시너지가 중요 몰입도 극대화 통한 수익성 확대 2. 디바이스 H/W Spec 강화를 통한 Reality 향상 - VR 디바이스 보급 확대 명암비와 반응속도가 뛰어난 초고해상도 OLED 및 DRAM 수요 급증 전망 - 과거 PDP TV는 고해상도 구현이 불가 SONY PS2 출시 후 본격화된 FHD TV 경쟁에서 LCD에 도태 - 향후 주목해야 할 기술은 1) GPU에서의 Direct-to-display와 2) VR과 AR 기능이 결합된 Mixed Reality (MR) 3. 강력한 컴퓨팅파워와 뛰어난 알고리즘은 인공지능 향상의 필요충분조건 - 일반적인 게임의 인공지능은 Min-max tree search와 Generic Algorithm의 협업구조로 설계 - GPU에서의 대량 병렬처리를 통해 Tree Search와 Generic Algorithm에서 3~400배 가량 속도 향상 - 1) 저전력 반도체 양산 위한 공정미세화 (Logi c, DRAM) , 2) 서버기능 향상을 위한 3D N and , SCM 등이 중요 3 Summary - E.T Component 1.
    [Show full text]
  • Best Emails Download App Best Email App to Try in 2021
    best emails download app Best Email App To Try In 2021. When Raymond Tomlinson, who is widely known as the Father of Email, implemented the first email app in 1971, he probably couldn’t even imagine that most people would carry infinitely more sophisticated email apps in their pockets. If you’re curious to know what is the best email app in 2021, you’ve come to the right place because this article features the very best the Google Play Store and the Apple App Store have to offer when it comes to email, including a bulk email organizer called Clean Email. Clean Email. Take control of your mailbox. 10 Best Email Apps. 1. Gmail (Web, Android, iOS) Don’t be surprised that the best free email app comes default on most Android devices. After all, when Google initially released Gmail in 2004, the tech giant has single-handedly redefined personal email by offering a much larger storage capacity than its competitors and delivering the sleekest email experience the world had seen. Apart from Android, the Gmail app is also available for iOS, and it works even with non-Gmail addresses like Outlook.com, Yahoo Mail, or any other IMAP/POP email. Google is constantly adding new features and improvements to the app, but there’s a lot you can do with it even in its current state. You can, for example, schedule emails, unsend messages, set an expiry time, use the app offline, or Google's AI to compose your emails for you. Comes default on most Android devices.
    [Show full text]