Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Omics_Journal.one

Overview

General Information

Sample Name:Omics_Journal.one
Analysis ID:828489
MD5:5e5f9e4e0a1fa534737476dacbe48348
SHA1:3554b122b5796893b8cd05b2dce61733a2ec5f81
SHA256:2b8a0bac5cb3d9991acf3b66fdbb60cf0fcfe7fc4bc783ad011315bed88c1221
Tags:one
Infos:

Detection

Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Malicious OneNote
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Sigma detected: Run temp file via regsvr32
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Document exploit detected (process start blacklist hit)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Stores files to the Windows start menu directory
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to call native functions
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Connects to several IPs in different countries
Creates a start menu entry (Start Menu\Programs\Startup)
Registers a DLL
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • ONENOTE.EXE (PID: 5400 cmdline: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE" "C:\Users\user\Desktop\Omics_Journal.one MD5: 8D7E99CB358318E1F38803C9E6B67867)
    • wscript.exe (PID: 2888 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf" MD5: 7075DD7B9BE8807FCA93ACD86F724884)
      • regsvr32.exe (PID: 4412 cmdline: C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\radDBEC2.tmp.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
        • regsvr32.exe (PID: 1132 cmdline: "C:\Users\user\AppData\Local\Temp\radDBEC2.tmp.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
          • regsvr32.exe (PID: 1340 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\BPVAiawSvOgA\ayfcXidefIAOQYvB.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • ONENOTEM.EXE (PID: 5304 cmdline: /tsr MD5: DBCFA6F25577339B877D2305CAD3DEC3)
  • ONENOTEM.EXE (PID: 6004 cmdline: "C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE" /tsr MD5: DBCFA6F25577339B877D2305CAD3DEC3)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
EmotetWhile Emotet historically was a banking malware organized in a botnet, nowadays Emotet is mostly seen as infrastructure as a service for content delivery. For example, since mid 2018 it is used by Trickbot for installs, which may also lead to ransomware attacks using Ryuk, a combination observed several times against high-profile targets.It is always stealing information from victims but what the criminal gang behind it did, was to open up another business channel by selling their infrastructure delivering additional malicious software. From malware analysts it has been classified into epochs depending on command and control, payloads, and delivery solutions which change over time.Emotet had been taken down by authorities in January 2021, though it appears to have sprung back to life in November 2021.
  • GOLD CABIN
  • MUMMY SPIDER
  • Mealybug
https://malpedia.caad.fkie.fraunhofer.de/details/win.emotet
{"C2 list": ["91.121.146.47:8080", "66.228.32.31:7080", "182.162.143.56:443", "187.63.160.88:80", "167.172.199.165:8080", "164.90.222.65:443", "104.168.155.143:8080", "163.44.196.120:8080", "160.16.142.56:8080", "159.89.202.34:443", "159.65.88.10:8080", "186.194.240.217:443", "149.56.131.28:8080", "72.15.201.15:8080", "1.234.2.232:8080", "82.223.21.224:8080", "206.189.28.199:8080", "169.57.156.166:8080", "107.170.39.149:8080", "103.43.75.120:443", "91.207.28.33:8080", "213.239.212.5:443", "45.235.8.30:8080", "119.59.103.152:8080", "164.68.99.3:8080", "95.217.221.146:8080", "153.126.146.25:7080", "197.242.150.244:8080", "202.129.205.3:8080", "103.132.242.26:8080", "139.59.126.41:443", "110.232.117.186:8080", "183.111.227.137:8080", "5.135.159.50:443", "201.94.166.162:443", "103.75.201.2:443", "79.137.35.198:8080", "172.105.226.75:8080", "94.23.45.86:4143", "115.68.227.76:8080", "153.92.5.27:8080", "167.172.253.162:8080", "188.44.20.25:443", "147.139.166.154:8080", "129.232.188.93:443", "173.212.193.249:8080", "185.4.135.165:8080", "45.176.232.124:443"], "Public Key": ["RUNTMSAAAABAX3S2xNjcDD0fBno33Ln5t71eii+mofIPoXkNFOX1MeiwCh48iz97kB0mJjGGZXwardnDXKxI8GCHGNl0PFj5N2pBrwAGAIg=", "RUNLMSAAAADzozW1Di4r9DVWzQpMKT588RDdy7BPILP6AiDOTLYMHkSWvrQO5slbmr1OvZ2Pz+AQWzRMggQmAtO6rPH7nyx2BGpSrwAJAIg="]}
SourceRuleDescriptionAuthorStrings
Omics_Journal.oneJoeSecurity_MalOneNoteYara detected Malicious OneNoteJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\Desktop\Omics_Journal.oneJoeSecurity_MalOneNoteYara detected Malicious OneNoteJoe Security
      SourceRuleDescriptionAuthorStrings
      0000000A.00000003.352934278.00000000052A3000.00000004.00000020.00020000.00000000.sdmpWEBSHELL_asp_genericGeneric ASP webshell which uses any eval/exec function indirectly on user input or writes a fileArnim Rupp
      • 0x2be:$asp_gen_obf1: "+"
      • 0x2ee:$asp_gen_obf1: "+"
      • 0x9d22:$tagasp_classid1: 72C24DD5-D70A-438B-8A42-98424B88AFB8
      • 0x752:$jsp4: public
      • 0xd92:$jsp4: public
      • 0xd2:$asp_input1: request
      • 0x900:$asp_input1: request
      • 0x942:$asp_input1: request
      • 0xa58:$asp_input1: request
      • 0x40c:$asp_payload11: wscript.shell
      • 0xe2:$asp_multi_payload_one1: createobject
      • 0x15a:$asp_multi_payload_one1: createobject
      • 0x1b4:$asp_multi_payload_one1: createobject
      • 0x3f0:$asp_multi_payload_one1: createobject
      • 0xb56:$asp_multi_payload_one1: createobject
      • 0xe8e:$asp_multi_payload_one1: createobject
      • 0xe34:$asp_multi_payload_one3: .run
      • 0xe2:$asp_multi_payload_four1: createobject
      • 0x15a:$asp_multi_payload_four1: createobject
      • 0x1b4:$asp_multi_payload_four1: createobject
      • 0x3f0:$asp_multi_payload_four1: createobject
      0000000C.00000002.333419245.00000000009D1000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        0000000D.00000002.576245215.0000000000DE0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          0000000D.00000002.575109480.0000000000CE8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Emotet_3Yara detected EmotetJoe Security
            0000000A.00000002.359372345.00000000050EB000.00000004.00000020.00020000.00000000.sdmpwebshell_asp_obfuscatedASP webshell obfuscatedArnim Rupp
            • 0xf92:$tagasp_classid1: 72C24DD5-D70A-438B-8A42-98424B88AFB8
            • 0x1ca:$jsp4: public
            • 0x1aaa:$jsp4: public
            • 0x20ea:$jsp4: public
            • 0x332a:$jsp4: public
            • 0x396a:$jsp4: public
            • 0x1764:$asp_payload11: wscript.shell
            • 0x2fe4:$asp_payload11: wscript.shell
            • 0x2c6:$asp_multi_payload_one1: createobject
            • 0x134c:$asp_multi_payload_one1: createobject
            • 0x143a:$asp_multi_payload_one1: createobject
            • 0x14b2:$asp_multi_payload_one1: createobject
            • 0x150c:$asp_multi_payload_one1: createobject
            • 0x1748:$asp_multi_payload_one1: createobject
            • 0x1eae:$asp_multi_payload_one1: createobject
            • 0x21e6:$asp_multi_payload_one1: createobject
            • 0x2bcc:$asp_multi_payload_one1: createobject
            • 0x2cba:$asp_multi_payload_one1: createobject
            • 0x2d32:$asp_multi_payload_one1: createobject
            • 0x2d8c:$asp_multi_payload_one1: createobject
            • 0x2fc8:$asp_multi_payload_one1: createobject
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            13.2.regsvr32.exe.de0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              13.2.regsvr32.exe.de0000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                12.2.regsvr32.exe.9a0000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  12.2.regsvr32.exe.9a0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security

                    Malware Analysis System Evasion

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\radDBEC2.tmp.dll, CommandLine: C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\radDBEC2.tmp.dll, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\regsvr32.exe, NewProcessName: C:\Windows\SysWOW64\regsvr32.exe, OriginalFileName: C:\Windows\SysWOW64\regsvr32.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf", ParentImage: C:\Windows\SysWOW64\wscript.exe, ParentProcessId: 2888, ParentProcessName: wscript.exe, ProcessCommandLine: C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\radDBEC2.tmp.dll, ProcessId: 4412, ProcessName: regsvr32.exe
                    Timestamp:192.168.2.7167.172.199.1654970780802404308 03/17/23-09:08:51.438448
                    SID:2404308
                    Source Port:49707
                    Destination Port:8080
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:192.168.2.791.121.146.474970280802404344 03/17/23-09:08:27.247110
                    SID:2404344
                    Source Port:49702
                    Destination Port:8080
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:192.168.2.766.228.32.314970470802404330 03/17/23-09:08:34.494335
                    SID:2404330
                    Source Port:49704
                    Destination Port:7080
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:192.168.2.7104.168.155.1434971280802404302 03/17/23-09:09:04.438083
                    SID:2404302
                    Source Port:49712
                    Destination Port:8080
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:192.168.2.7182.162.143.56497054432404312 03/17/23-09:08:39.692071
                    SID:2404312
                    Source Port:49705
                    Destination Port:443
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: Omics_Journal.oneReversingLabs: Detection: 30%
                    Source: Omics_Journal.oneVirustotal: Detection: 38%Perma Link
                    Source: https://163.44.196.120:8080/icyAvira URL Cloud: Label: malware
                    Source: https://penshorn.org/admin/Ses8712iGR8du/252Avira URL Cloud: Label: malware
                    Source: https://159.89.202.34/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/jAvira URL Cloud: Label: malware
                    Source: https://182.162.143.56/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/Avira URL Cloud: Label: malware
                    Source: https://159.89.202.34/Avira URL Cloud: Label: malware
                    Source: http://softwareulike.com/cWIYxWMPkK/Avira URL Cloud: Label: malware
                    Source: https://164.90.222.65/VAvira URL Cloud: Label: malware
                    Source: https://163.44.196.120:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/Avira URL Cloud: Label: malware
                    Source: https://www.gomespontes.com.br/logs/pd/w39558Avira URL Cloud: Label: malware
                    Source: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/Avira URL Cloud: Label: malware
                    Source: https://91.121.146.47:8080/Avira URL Cloud: Label: malware
                    Source: https://163.44.196.120:8080/Avira URL Cloud: Label: malware
                    Source: https://182.162.143.56/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/-Avira URL Cloud: Label: malware
                    Source: https://163.44.196.120:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/WAvira URL Cloud: Label: malware
                    Source: https://159.65.88.10:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/Avira URL Cloud: Label: malware
                    Source: https://www.gomespontes.com.br/logs/pd/vMAvira URL Cloud: Label: malware
                    Source: https://167.172.199.165:8080/Avira URL Cloud: Label: malware
                    Source: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dllAvira URL Cloud: Label: malware
                    Source: https://163.44.196.120:8080/lAvira URL Cloud: Label: malware
                    Source: https://penshorn.org/admin/Ses8712iGR8du/ocalAvira URL Cloud: Label: malware
                    Source: http://ozmeydan.com/cekici/9/Avira URL Cloud: Label: malware
                    Source: https://167.172.199.165:8080/YAvira URL Cloud: Label: malware
                    Source: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wMAvira URL Cloud: Label: malware
                    Source: https://www.gomespontes.com.br/logs/pd/Avira URL Cloud: Label: malware
                    Source: https://159.65.88.10:8080/Avira URL Cloud: Label: malware
                    Source: https://penshorn.org/admin/Ses8712iGR8du/tMAvira URL Cloud: Label: malware
                    Source: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/t(Avira URL Cloud: Label: malware
                    Source: http://softwareulike.com/cWIYxWMPkK/#Avira URL Cloud: Label: malware
                    Source: https://159.89.202.34/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/Avira URL Cloud: Label: malware
                    Source: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/uMAvira URL Cloud: Label: malware
                    Source: https://penshorn.org/admin/Ses8712iGR8du/Avira URL Cloud: Label: malware
                    Source: https://91.121.146.47:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/8j~Avira URL Cloud: Label: malware
                    Source: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/Avira URL Cloud: Label: malware
                    Source: https://159.65.88.10:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/#Avira URL Cloud: Label: malware
                    Source: https://187.63.160.88:80/Avira URL Cloud: Label: malware
                    Source: https://91.121.146.47:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/Avira URL Cloud: Label: malware
                    Source: http://softwareulike.com/cWIYxWMPkK/yMAvira URL Cloud: Label: malware
                    Source: https://163.44.196.120:8080/d/Avira URL Cloud: Label: malware
                    Source: https://164.90.222.65/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/Avira URL Cloud: Label: malware
                    Source: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6HAvira URL Cloud: Label: malware
                    Source: http://ozmeydan.com/cekici/9/xMAvira URL Cloud: Label: malware
                    Source: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/Avira URL Cloud: Label: malware
                    Source: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/zMAvira URL Cloud: Label: malware
                    Source: https://penshorn.org:443/admin/Ses8712iGR8du/Avira URL Cloud: Label: malware
                    Source: https://159.65.88.10:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd//WAvira URL Cloud: Label: malware
                    Source: penshorn.orgVirustotal: Detection: 10%Perma Link
                    Source: C:\Users\user\AppData\Local\Temp\radDBEC2.tmp.dllReversingLabs: Detection: 58%
                    Source: C:\Windows\System32\BPVAiawSvOgA\ayfcXidefIAOQYvB.dll (copy)ReversingLabs: Detection: 58%
                    Source: 0000000D.00000002.575109480.0000000000CE8000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Emotet {"C2 list": ["91.121.146.47:8080", "66.228.32.31:7080", "182.162.143.56:443", "187.63.160.88:80", "167.172.199.165:8080", "164.90.222.65:443", "104.168.155.143:8080", "163.44.196.120:8080", "160.16.142.56:8080", "159.89.202.34:443", "159.65.88.10:8080", "186.194.240.217:443", "149.56.131.28:8080", "72.15.201.15:8080", "1.234.2.232:8080", "82.223.21.224:8080", "206.189.28.199:8080", "169.57.156.166:8080", "107.170.39.149:8080", "103.43.75.120:443", "91.207.28.33:8080", "213.239.212.5:443", "45.235.8.30:8080", "119.59.103.152:8080", "164.68.99.3:8080", "95.217.221.146:8080", "153.126.146.25:7080", "197.242.150.244:8080", "202.129.205.3:8080", "103.132.242.26:8080", "139.59.126.41:443", "110.232.117.186:8080", "183.111.227.137:8080", "5.135.159.50:443", "201.94.166.162:443", "103.75.201.2:443", "79.137.35.198:8080", "172.105.226.75:8080", "94.23.45.86:4143", "115.68.227.76:8080", "153.92.5.27:8080", "167.172.253.162:8080", "188.44.20.25:443", "147.139.166.154:8080", "129.232.188.93:443", "173.212.193.249:8080", "185.4.135.165:8080", "45.176.232.124:443"], "Public Key": ["RUNTMSAAAABAX3S2xNjcDD0fBno33Ln5t71eii+mofIPoXkNFOX1MeiwCh48iz97kB0mJjGGZXwardnDXKxI8GCHGNl0PFj5N2pBrwAGAIg=", "RUNLMSAAAADzozW1Di4r9DVWzQpMKT588RDdy7BPILP6AiDOTLYMHkSWvrQO5slbmr1OvZ2Pz+AQWzRMggQmAtO6rPH7nyx2BGpSrwAJAIg="]}
                    Source: unknownHTTPS traffic detected: 203.26.41.131:443 -> 192.168.2.7:49700 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 182.162.143.56:443 -> 192.168.2.7:49705 version: TLS 1.2
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_0000000180008D28 FindFirstFileExW,

                    Software Vulnerabilities

                    barindex
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess created: C:\Windows\SysWOW64\wscript.exe

                    Networking

                    barindex
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 159.65.88.10 8080
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 164.90.222.65 443
                    Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 203.26.41.131 443
                    Source: C:\Windows\SysWOW64\wscript.exeDomain query: penshorn.org
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 66.228.32.31 7080
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 187.63.160.88 80
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 104.168.155.143 8080
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 159.89.202.34 443
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 91.121.146.47 8080
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 160.16.142.56 8080
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 182.162.143.56 443
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 167.172.199.165 8080
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 163.44.196.120 8080
                    Source: TrafficSnort IDS: 2404312 ET CNC Feodo Tracker Reported CnC Server TCP group 7 192.168.2.7:49705 -> 182.162.143.56:443
                    Source: TrafficSnort IDS: 2404344 ET CNC Feodo Tracker Reported CnC Server TCP group 23 192.168.2.7:49702 -> 91.121.146.47:8080
                    Source: TrafficSnort IDS: 2404330 ET CNC Feodo Tracker Reported CnC Server TCP group 16 192.168.2.7:49704 -> 66.228.32.31:7080
                    Source: TrafficSnort IDS: 2404308 ET CNC Feodo Tracker Reported CnC Server TCP group 5 192.168.2.7:49707 -> 167.172.199.165:8080
                    Source: TrafficSnort IDS: 2404302 ET CNC Feodo Tracker Reported CnC Server TCP group 2 192.168.2.7:49712 -> 104.168.155.143:8080
                    Source: Malware configuration extractorIPs: 91.121.146.47:8080
                    Source: Malware configuration extractorIPs: 66.228.32.31:7080
                    Source: Malware configuration extractorIPs: 182.162.143.56:443
                    Source: Malware configuration extractorIPs: 187.63.160.88:80
                    Source: Malware configuration extractorIPs: 167.172.199.165:8080
                    Source: Malware configuration extractorIPs: 164.90.222.65:443
                    Source: Malware configuration extractorIPs: 104.168.155.143:8080
                    Source: Malware configuration extractorIPs: 163.44.196.120:8080
                    Source: Malware configuration extractorIPs: 160.16.142.56:8080
                    Source: Malware configuration extractorIPs: 159.89.202.34:443
                    Source: Malware configuration extractorIPs: 159.65.88.10:8080
                    Source: Malware configuration extractorIPs: 186.194.240.217:443
                    Source: Malware configuration extractorIPs: 149.56.131.28:8080
                    Source: Malware configuration extractorIPs: 72.15.201.15:8080
                    Source: Malware configuration extractorIPs: 1.234.2.232:8080
                    Source: Malware configuration extractorIPs: 82.223.21.224:8080
                    Source: Malware configuration extractorIPs: 206.189.28.199:8080
                    Source: Malware configuration extractorIPs: 169.57.156.166:8080
                    Source: Malware configuration extractorIPs: 107.170.39.149:8080
                    Source: Malware configuration extractorIPs: 103.43.75.120:443
                    Source: Malware configuration extractorIPs: 91.207.28.33:8080
                    Source: Malware configuration extractorIPs: 213.239.212.5:443
                    Source: Malware configuration extractorIPs: 45.235.8.30:8080
                    Source: Malware configuration extractorIPs: 119.59.103.152:8080
                    Source: Malware configuration extractorIPs: 164.68.99.3:8080
                    Source: Malware configuration extractorIPs: 95.217.221.146:8080
                    Source: Malware configuration extractorIPs: 153.126.146.25:7080
                    Source: Malware configuration extractorIPs: 197.242.150.244:8080
                    Source: Malware configuration extractorIPs: 202.129.205.3:8080
                    Source: Malware configuration extractorIPs: 103.132.242.26:8080
                    Source: Malware configuration extractorIPs: 139.59.126.41:443
                    Source: Malware configuration extractorIPs: 110.232.117.186:8080
                    Source: Malware configuration extractorIPs: 183.111.227.137:8080
                    Source: Malware configuration extractorIPs: 5.135.159.50:443
                    Source: Malware configuration extractorIPs: 201.94.166.162:443
                    Source: Malware configuration extractorIPs: 103.75.201.2:443
                    Source: Malware configuration extractorIPs: 79.137.35.198:8080
                    Source: Malware configuration extractorIPs: 172.105.226.75:8080
                    Source: Malware configuration extractorIPs: 94.23.45.86:4143
                    Source: Malware configuration extractorIPs: 115.68.227.76:8080
                    Source: Malware configuration extractorIPs: 153.92.5.27:8080
                    Source: Malware configuration extractorIPs: 167.172.253.162:8080
                    Source: Malware configuration extractorIPs: 188.44.20.25:443
                    Source: Malware configuration extractorIPs: 147.139.166.154:8080
                    Source: Malware configuration extractorIPs: 129.232.188.93:443
                    Source: Malware configuration extractorIPs: 173.212.193.249:8080
                    Source: Malware configuration extractorIPs: 185.4.135.165:8080
                    Source: Malware configuration extractorIPs: 45.176.232.124:443
                    Source: Joe Sandbox ViewASN Name: RACKCORP-APRackCorpAU RACKCORP-APRackCorpAU
                    Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
                    Source: global trafficHTTP traffic detected: POST /rrjjbae/nhkurfvvppt/cnws/lotgiwvd/ HTTP/1.1Connection: Keep-AliveContent-Length: 0Host: 182.162.143.56
                    Source: Joe Sandbox ViewIP Address: 110.232.117.186 110.232.117.186
                    Source: global trafficHTTP traffic detected: GET /admin/Ses8712iGR8du/ HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: penshorn.org
                    Source: global trafficTCP traffic: 192.168.2.7:49702 -> 91.121.146.47:8080
                    Source: global trafficTCP traffic: 192.168.2.7:49704 -> 66.228.32.31:7080
                    Source: global trafficTCP traffic: 192.168.2.7:49707 -> 167.172.199.165:8080
                    Source: global trafficTCP traffic: 192.168.2.7:49712 -> 104.168.155.143:8080
                    Source: global trafficTCP traffic: 192.168.2.7:49713 -> 163.44.196.120:8080
                    Source: global trafficTCP traffic: 192.168.2.7:49714 -> 160.16.142.56:8080
                    Source: global trafficTCP traffic: 192.168.2.7:49719 -> 159.65.88.10:8080
                    Source: unknownNetwork traffic detected: IP country count 18
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                    Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                    Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                    Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                    Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                    Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                    Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                    Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                    Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                    Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                    Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                    Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                    Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                    Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                    Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                    Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                    Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                    Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                    Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                    Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                    Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                    Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                    Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                    Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                    Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                    Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                    Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                    Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                    Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                    Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                    Source: wscript.exe, 0000000A.00000003.356861744.0000000005377000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355424100.0000000005375000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355096801.0000000005373000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359815791.0000000005378000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.418481837.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.551101008.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.547991280.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000D77000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                    Source: regsvr32.exe, 0000000D.00000002.575459710.0000000000D3B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.418409086.0000000000D3B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.417628495.0000000000D3B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.547991280.0000000000D3B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.550924036.0000000000D3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                    Source: regsvr32.exe, 0000000D.00000003.418481837.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.418225796.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.551101008.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.547991280.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.13.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                    Source: regsvr32.exe, 0000000D.00000003.413703684.0000000000DDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?b9b440af02a2a
                    Source: wscript.exe, wscript.exe, 0000000A.00000003.347190593.000000000502C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355096801.000000000532E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350575373.000000000509F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339320074.0000000004E6F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343897480.0000000004FA4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343274627.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352934278.00000000052A3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359696646.0000000005319000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338988190.0000000004E63000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004E9E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352849452.00000000052BE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344462453.0000000004F51000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352675846.00000000052A2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.356687723.00000000051B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339307814.0000000004E75000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349138569.0000000004FFE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352578097.0000000005285000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337736071.0000000004E34000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336058236.00000000029F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ozmeydan.com/cekici/9/
                    Source: wscript.exe, 0000000A.00000003.354752854.0000000004B24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ozmeydan.com/cekici/9/xM
                    Source: wscript.exe, wscript.exe, 0000000A.00000003.347190593.000000000502C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355096801.000000000532E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350575373.000000000509F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339320074.0000000004E6F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343897480.0000000004FA4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343274627.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352934278.00000000052A3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359696646.0000000005319000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338988190.0000000004E63000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004E9E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352849452.00000000052BE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344462453.0000000004F51000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352675846.00000000052A2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.356687723.00000000051B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339307814.0000000004E75000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349138569.0000000004FFE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352578097.0000000005285000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337736071.0000000004E34000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336058236.00000000029F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://softwareulike.com/cWIYxWMPkK/
                    Source: wscript.exe, 0000000A.00000003.356737849.0000000005237000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359464472.0000000005237000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351655555.00000000051E3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.357187163.0000000005237000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352375138.0000000005230000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352221230.0000000005222000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351807181.000000000520B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://softwareulike.com/cWIYxWMPkK/#
                    Source: wscript.exe, 0000000A.00000003.354752854.0000000004B24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://softwareulike.com/cWIYxWMPkK/yM
                    Source: wscript.exe, wscript.exe, 0000000A.00000003.347190593.000000000502C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355096801.000000000532E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350575373.000000000509F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339320074.0000000004E6F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343897480.0000000004FA4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343274627.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352934278.00000000052A3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359696646.0000000005319000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338988190.0000000004E63000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004E9E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352849452.00000000052BE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344462453.0000000004F51000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352675846.00000000052A2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.356687723.00000000051B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339307814.0000000004E75000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349138569.0000000004FFE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352578097.0000000005285000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337736071.0000000004E34000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336058236.00000000029F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/
                    Source: wscript.exe, 0000000A.00000003.354752854.0000000004B24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/zM
                    Source: regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
                    Source: regsvr32.exe, 0000000D.00000002.575459710.0000000000D3B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.547991280.0000000000D3B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.550924036.0000000000D3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.44.196.120:8080/
                    Source: regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://104.168.155.143:8080/
                    Source: regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://159.65.88.10:8080/
                    Source: regsvr32.exe, 0000000D.00000002.575459710.0000000000D71000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://159.65.88.10:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/
                    Source: regsvr32.exe, 0000000D.00000002.575459710.0000000000D77000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://159.65.88.10:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/#
                    Source: regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://159.65.88.10:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd//W
                    Source: regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://159.89.202.34/
                    Source: regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://159.89.202.34/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/
                    Source: regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://159.89.202.34/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/j
                    Source: regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://160.16.142.56:8080/
                    Source: regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://160.16.142.56:8080/8
                    Source: regsvr32.exe, 0000000D.00000003.551101008.0000000000D71000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.551101008.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.547991280.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://160.16.142.56:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/
                    Source: regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://163.44.196.120:8080/
                    Source: regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://163.44.196.120:8080/d/
                    Source: regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://163.44.196.120:8080/icy
                    Source: regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://163.44.196.120:8080/l
                    Source: regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://163.44.196.120:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/
                    Source: regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://163.44.196.120:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/W
                    Source: regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://164.90.222.65/
                    Source: regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://164.90.222.65/V
                    Source: regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://164.90.222.65/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/
                    Source: regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://167.172.199.165:8080/
                    Source: regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://167.172.199.165:8080/Y
                    Source: regsvr32.exe, 0000000D.00000002.576555848.0000000002E0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://169.65.88.10:8080/
                    Source: regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://182.162.143.56/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/
                    Source: regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://182.162.143.56/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/-
                    Source: regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://187.63.160.88:80/
                    Source: regsvr32.exe, 0000000D.00000002.575109480.0000000000CE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://91.121.146.47:8080/
                    Source: regsvr32.exe, 0000000D.00000003.418225796.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575109480.0000000000CE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://91.121.146.47:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/
                    Source: regsvr32.exe, 0000000D.00000002.575109480.0000000000CE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://91.121.146.47:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/8j~
                    Source: wscript.exe, 0000000A.00000002.359523734.000000000525F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6H
                    Source: wscript.exe, wscript.exe, 0000000A.00000003.347190593.000000000502C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355096801.000000000532E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350575373.000000000509F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339320074.0000000004E6F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343897480.0000000004FA4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343274627.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352934278.00000000052A3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359696646.0000000005319000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338988190.0000000004E63000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004E9E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352849452.00000000052BE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344462453.0000000004F51000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352675846.00000000052A2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.356687723.00000000051B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339307814.0000000004E75000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349138569.0000000004FFE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352578097.0000000005285000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337736071.0000000004E34000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336058236.00000000029F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/
                    Source: wscript.exe, 0000000A.00000003.335995742.00000000050EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dll
                    Source: wscript.exe, 0000000A.00000003.354752854.0000000004B24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/uM
                    Source: wscript.exe, 0000000A.00000003.357036755.0000000005363000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355096801.0000000005344000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355096801.0000000005363000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359782022.0000000005363000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355577672.000000000534F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359765538.0000000005350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://penshorn.org/
                    Source: wscript.exe, wscript.exe, 0000000A.00000003.347190593.000000000502C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355096801.000000000532E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350575373.000000000509F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339320074.0000000004E6F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343897480.0000000004FA4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343274627.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352934278.00000000052A3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359696646.0000000005319000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338988190.0000000004E63000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004E9E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352849452.00000000052BE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344462453.0000000004F51000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352675846.00000000052A2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.356687723.00000000051B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.356214229.0000000004B04000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339307814.0000000004E75000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349138569.0000000004FFE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352578097.0000000005285000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337736071.0000000004E34000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://penshorn.org/admin/Ses8712iGR8du/
                    Source: wscript.exe, 0000000A.00000003.354031092.00000000052F8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.353626691.00000000052EC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355411882.000000000531B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359708281.0000000005323000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.354147169.000000000530A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://penshorn.org/admin/Ses8712iGR8du/252
                    Source: wscript.exe, 0000000A.00000003.355096801.0000000005344000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359716807.0000000005344000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://penshorn.org/admin/Ses8712iGR8du/ocal
                    Source: wscript.exe, 0000000A.00000003.354752854.0000000004B24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://penshorn.org/admin/Ses8712iGR8du/tM
                    Source: wscript.exe, 0000000A.00000003.355096801.0000000005344000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359716807.0000000005344000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://penshorn.org:443/admin/Ses8712iGR8du/
                    Source: wscript.exe, wscript.exe, 0000000A.00000003.347190593.000000000502C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355096801.000000000532E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350575373.000000000509F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339320074.0000000004E6F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343897480.0000000004FA4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343274627.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352934278.00000000052A3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359696646.0000000005319000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338988190.0000000004E63000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004E9E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352849452.00000000052BE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344462453.0000000004F51000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352675846.00000000052A2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.356687723.00000000051B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339307814.0000000004E75000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349138569.0000000004FFE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352578097.0000000005285000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337736071.0000000004E34000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336058236.00000000029F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/
                    Source: wscript.exe, 0000000A.00000003.353626691.00000000052EC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.354592807.00000000052EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/t(
                    Source: wscript.exe, 0000000A.00000003.354752854.0000000004B24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wM
                    Source: wscript.exe, wscript.exe, 0000000A.00000003.347190593.000000000502C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355096801.000000000532E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350575373.000000000509F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339320074.0000000004E6F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343897480.0000000004FA4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343274627.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352934278.00000000052A3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359696646.0000000005319000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338988190.0000000004E63000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004E9E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352849452.00000000052BE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344462453.0000000004F51000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352675846.00000000052A2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.356687723.00000000051B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339307814.0000000004E75000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349138569.0000000004FFE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352578097.0000000005285000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337736071.0000000004E34000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336058236.00000000029F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gomespontes.com.br/logs/pd/
                    Source: wscript.exe, 0000000A.00000003.354752854.0000000004B24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gomespontes.com.br/logs/pd/vM
                    Source: wscript.exe, 0000000A.00000003.354031092.00000000052F8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.353626691.00000000052EC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355411882.000000000531B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359708281.0000000005323000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.354147169.000000000530A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gomespontes.com.br/logs/pd/w39558
                    Source: unknownHTTP traffic detected: POST /rrjjbae/nhkurfvvppt/cnws/lotgiwvd/ HTTP/1.1Connection: Keep-AliveContent-Length: 0Host: 182.162.143.56
                    Source: unknownDNS traffic detected: queries for: penshorn.org
                    Source: global trafficHTTP traffic detected: GET /admin/Ses8712iGR8du/ HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: penshorn.org
                    Source: unknownHTTPS traffic detected: 203.26.41.131:443 -> 192.168.2.7:49700 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 182.162.143.56:443 -> 192.168.2.7:49705 version: TLS 1.2

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 0000000D.00000002.575109480.0000000000CE8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 13.2.regsvr32.exe.de0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.regsvr32.exe.de0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.regsvr32.exe.9a0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.regsvr32.exe.9a0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.333419245.00000000009D1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.576245215.0000000000DE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.333370577.00000000009A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.576339106.0000000000E21000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: 0000000A.00000003.352934278.00000000052A3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: WEBSHELL_asp_generic date = 2021-03-07, author = Arnim Rupp, description = Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, score = a8c63c418609c1c291b3e731ca85ded4b3e0fba83f3489c21a3199173b176a75, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
                    Source: 0000000A.00000002.359372345.00000000050EB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: webshell_asp_obfuscated date = 2021/01/12, author = Arnim Rupp, description = ASP webshell obfuscated, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
                    Source: 0000000A.00000002.359372345.00000000050EB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: WEBSHELL_asp_generic date = 2021-03-07, author = Arnim Rupp, description = Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, score = a8c63c418609c1c291b3e731ca85ded4b3e0fba83f3489c21a3199173b176a75, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
                    Source: 0000000A.00000003.352578097.0000000005274000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: WEBSHELL_asp_generic date = 2021-03-07, author = Arnim Rupp, description = Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, score = a8c63c418609c1c291b3e731ca85ded4b3e0fba83f3489c21a3199173b176a75, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
                    Source: 0000000A.00000003.335995742.00000000050EA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: webshell_asp_obfuscated date = 2021/01/12, author = Arnim Rupp, description = ASP webshell obfuscated, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
                    Source: 0000000A.00000003.335995742.00000000050EA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: WEBSHELL_asp_generic date = 2021-03-07, author = Arnim Rupp, description = Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, score = a8c63c418609c1c291b3e731ca85ded4b3e0fba83f3489c21a3199173b176a75, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
                    Source: 0000000A.00000002.359559386.000000000527C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: WEBSHELL_asp_generic date = 2021-03-07, author = Arnim Rupp, description = Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, score = a8c63c418609c1c291b3e731ca85ded4b3e0fba83f3489c21a3199173b176a75, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
                    Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\BPVAiawSvOgA\Jump to behavior
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_0000000180006818
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_000000018000B878
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_0000000180007110
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_0000000180008D28
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_0000000180014555
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00990000
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E709C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DCC14
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009EA000
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D7D6C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D263C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D8BC8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E8FC8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DAC94
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D4C84
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009ECC84
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E5880
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009F94BC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DDCB8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009EA8B0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D98AC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D18DC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D14D4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E3CD4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D80CC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E08CC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DF8C4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E5CC4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D48FC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D90F8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D3CF4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E20E0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009F181C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D9408
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D7C08
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D1000
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DB83C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E1030
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009EEC30
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009EC058
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009F5450
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009EC44C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D7840
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DB07C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D2C78
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DC078
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DD474
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E6C70
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009EB460
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D95BC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009EBDA0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E15C8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009ED5F0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E7518
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009F9910
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E610C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009F8500
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D6138
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D7530
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009EB130
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009EAD28
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E1924
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E4D20
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DBE90
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E4A90
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D8A8C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009F4E8C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D3ABC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009EA6BC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DAAB8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D4EB8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E96D4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DD6CC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009EEAC0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D92F0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D461C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D4214
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D3E0C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E020C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E8E08
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E5A00
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009F8A00
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DBA2C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E8A2C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E0E2C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E662C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DF65C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DB258
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009EA244
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D3274
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E0A70
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DA660
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D1B94
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E5384
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DFFB8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E8BB8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D8FB0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DDBA0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D2FD4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D33D4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E3FD0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E97CC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DA7F0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009F27EC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E4F18
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DEF14
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E3B14
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009EE310
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DD33C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D975C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D4758
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009EE750
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DF77C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D8378
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009ED770
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009ECF70
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_009F0000
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E308CC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2640A
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2CC14
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E27D6C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E26E42
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E40618
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E263F4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E28BC8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E38FC8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E33FD0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E473A4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E29B79
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E320E0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E23CF4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E290F8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E248FC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2F8C4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E35CC4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E280CC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E41CD4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E214D4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E33CD4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E218DC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E444A8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E298AC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3A8B0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E494BC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2DCB8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E35880
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E24C84
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3CC84
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E4488C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E41494
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2AC94
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3709C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3B460
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E45868
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E36C70
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2D474
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E22C78
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2C078
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2B07C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E27840
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3C44C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E45450
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3C058
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E31030
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3EC30
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2B83C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E21000
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3A000
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E29408
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E27C08
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E27410
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E4181C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3D5F0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E315C8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3BDA0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E295BC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E44D64
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E34D20
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E31924
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3AD28
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3B130
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E26138
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E48500
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E42100
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3610C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E49910
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E37518
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E292F0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E436FC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3EAC0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2D6CC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E396D4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E42AB0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2AAB8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E24EB8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E37EBE
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E23ABC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3A6BC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E42E84
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E44E8C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E28A8C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2BE90
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E34A90
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2A660
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E30A70
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E23274
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3A244
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E46E48
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2B258
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2F65C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2BA2C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E38A2C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E30E2C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3662C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2263C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E35A00
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E48A00
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E38E08
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E23E0C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3020C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E24214
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2461C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E427EC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2A7F0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3FFFC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E397CC
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E22FD4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E233D4
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2DBA0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E447A8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E28FB0
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2FFB8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E38BB8
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E35384
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E21B94
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3779A
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E48B68
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3D770
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3CF70
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E28378
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2F77C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3E750
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E24758
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2975C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2D33C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3E310
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E48310
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E2EF14
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E33B14
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E45B1C
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E34F18
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_0000000180010C10 LdrFindResource_U,LdrAccessResource,NtAllocateVirtualMemory,
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_0000000180010AC0 ExitProcess,RtlQueueApcWow64Thread,NtTestAlert,
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_0000000180010DB0 ZwOpenSymbolicLinkObject,ZwOpenSymbolicLinkObject,
                    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
                    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\radDBEC2.tmp.dll 2F39C2879989DDD7F9ECF52B6232598E5595F8BF367846FF188C9DFBF1251253
                    Source: Omics_Journal.oneReversingLabs: Detection: 30%
                    Source: Omics_Journal.oneVirustotal: Detection: 38%
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
                    Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE" "C:\Users\user\Desktop\Omics_Journal.one
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess created: C:\Windows\SysWOW64\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf"
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\radDBEC2.tmp.dll
                    Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Users\user\AppData\Local\Temp\radDBEC2.tmp.dll"
                    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\BPVAiawSvOgA\ayfcXidefIAOQYvB.dll"
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE /tsr
                    Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE "C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE" /tsr
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess created: C:\Windows\SysWOW64\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf"
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE /tsr
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\radDBEC2.tmp.dll
                    Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Users\user\AppData\Local\Temp\radDBEC2.tmp.dll"
                    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\BPVAiawSvOgA\ayfcXidefIAOQYvB.dll"
                    Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{06290BD0-48AA-11D2-8432-006008C3FBFC}\InprocServer32
                    Source: Send to OneNote.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEFile created: C:\Users\user\Documents\{D9851E0B-2C85-4572-9AE5-F7072819B6A0}Jump to behavior
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEFile created: C:\Users\user~1\AppData\Local\Temp\{CB386D8B-5AD0-4126-AEE0-ECF7F4D76FDA} - OProcSessId.datJump to behavior
                    Source: classification engineClassification label: mal100.troj.expl.evad.winONE@12/693@1/50
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEFile read: C:\Program Files (x86)\desktop.iniJump to behavior
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D8BC8 Process32NextW,Process32FirstW,CreateToolhelp32Snapshot,FindCloseChangeNotification,
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXEMutant created: \Sessions\1\BaseNamedObjects\OneNoteM:AppShared
                    Source: C:\Windows\SysWOW64\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_0000000180005C69 push rdi; ret
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00000001800056DD push rdi; ret
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D6C9F pushad ; ret
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D6CDE push esi; iretd
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E80D7 push ebp; retf
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DA0FC push ebp; iretd
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E7987 push ebp; iretd
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DA1D2 push ebp; iretd
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E7D3C push ebp; retf
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E7D25 push 4D8BFFFFh; retf
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E8157 push ebp; retf
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D9D51 push ebp; retf
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E7D4E push ebp; iretd
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009D9E8B push eax; retf
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009E7EAF push 458BCC5Ah; retf
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009DA26E push ebp; ret
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_009EC731 push esi; iretd
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E26CDE push esi; iretd
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E26C9F pushad ; ret
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E37D4E push ebp; iretd
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E37D25 push 4D8BFFFFh; retf
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E46D34 push edi; ret
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E37D3C push ebp; retf
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E37EAF push 458BCC5Ah; retf
                    Source: C:\Windows\System32\regsvr32.exeCode function: 13_2_00E3C731 push esi; iretd
                    Source: radDBEC2.tmp.dll.10.drStatic PE information: section name: _RDATA
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\radDBEC2.tmp.dll
                    Source: C:\Windows\SysWOW64\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\radDBEC2.tmp.dll
                    Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\BPVAiawSvOgA\ayfcXidefIAOQYvB.dll (copy)
                    Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\BPVAiawSvOgA\ayfcXidefIAOQYvB.dll (copy)
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Send to OneNote.lnkJump to behavior
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Send to OneNote.lnkJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\BPVAiawSvOgA\ayfcXidefIAOQYvB.dll:Zone.Identifier read attributes | delete
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\wscript.exe TID: 5796Thread sleep time: -30000s >= -30000s
                    Source: C:\Windows\System32\regsvr32.exe TID: 1836Thread sleep time: -270000s >= -30000s
                    Source: C:\Windows\System32\regsvr32.exeAPI coverage: 9.3 %
                    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-Timer
                    Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformation
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_0000000180008D28 FindFirstFileExW,
                    Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                    Source: wscript.exe, 0000000A.00000003.355096801.0000000005344000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355577672.000000000534F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359765538.0000000005350000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX
                    Source: wscript.exe, 0000000A.00000003.356861744.0000000005377000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355424100.0000000005375000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355096801.0000000005373000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359815791.0000000005378000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.418481837.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.551101008.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.547991280.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000D77000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: regsvr32.exe, 0000000D.00000003.417628495.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.547991280.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000D2B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_0000000180001C48 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_000000018000A878 GetProcessHeap,
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_0000000180010C10 LdrFindResource_U,LdrAccessResource,NtAllocateVirtualMemory,
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_0000000180001C48 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00000001800082EC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00000001800017DC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 159.65.88.10 8080
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 164.90.222.65 443
                    Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 203.26.41.131 443
                    Source: C:\Windows\SysWOW64\wscript.exeDomain query: penshorn.org
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 66.228.32.31 7080
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 187.63.160.88 80
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 104.168.155.143 8080
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 159.89.202.34 443
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 91.121.146.47 8080
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 160.16.142.56 8080
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 182.162.143.56 443
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 167.172.199.165 8080
                    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 163.44.196.120 8080
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\radDBEC2.tmp.dll
                    Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_00000001800070A0 cpuid
                    Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                    Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_0000000180001D98 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: Omics_Journal.one, type: SAMPLE
                    Source: Yara matchFile source: C:\Users\user\Desktop\Omics_Journal.one, type: DROPPED
                    Source: Yara matchFile source: 0000000D.00000002.575109480.0000000000CE8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 13.2.regsvr32.exe.de0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.regsvr32.exe.de0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.regsvr32.exe.9a0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.regsvr32.exe.9a0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.333419245.00000000009D1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.576245215.0000000000DE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.333370577.00000000009A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.576339106.0000000000E21000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: Omics_Journal.one, type: SAMPLE
                    Source: Yara matchFile source: C:\Users\user\Desktop\Omics_Journal.one, type: DROPPED
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts1
                    Scripting
                    2
                    Registry Run Keys / Startup Folder
                    111
                    Process Injection
                    21
                    Masquerading
                    OS Credential Dumping1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    Exfiltration Over Other Network Medium11
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default Accounts1
                    Exploitation for Client Execution
                    1
                    DLL Side-Loading
                    2
                    Registry Run Keys / Startup Folder
                    1
                    Virtualization/Sandbox Evasion
                    LSASS Memory121
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                    Non-Standard Port
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)1
                    DLL Side-Loading
                    111
                    Process Injection
                    Security Account Manager1
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                    Ingress Tool Transfer
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                    Scripting
                    NTDS2
                    Process Discovery
                    Distributed Component Object ModelInput CaptureScheduled Transfer3
                    Non-Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Hidden Files and Directories
                    LSA Secrets1
                    Remote System Discovery
                    SSHKeyloggingData Transfer Size Limits114
                    Application Layer Protocol
                    Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common1
                    Obfuscated Files or Information
                    Cached Domain Credentials2
                    File and Directory Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                    Regsvr32
                    DCSync25
                    System Information Discovery
                    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 828489 Sample: Omics_Journal.one Startdate: 17/03/2023 Architecture: WINDOWS Score: 100 43 129.232.188.93 xneeloZA South Africa 2->43 45 45.235.8.30 WIKINETTELECOMUNICACOESBR Brazil 2->45 47 35 other IPs or domains 2->47 59 Snort IDS alert for network traffic 2->59 61 Multi AV Scanner detection for domain / URL 2->61 63 Antivirus detection for URL or domain 2->63 65 7 other signatures 2->65 10 ONENOTE.EXE 50 501 2->10         started        14 ONENOTEM.EXE 2->14         started        signatures3 process4 dnsIp5 49 192.168.2.1 unknown unknown 10->49 39 C:\Users\user\Desktop\Omics_Journal.one, data 10->39 dropped 16 wscript.exe 2 10->16         started        21 ONENOTEM.EXE 1 10->21         started        file6 process7 dnsIp8 41 penshorn.org 203.26.41.131, 443, 49700 DREAMSCAPE-AS-APDreamscapeNetworksLimitedAU Australia 16->41 33 C:\Users\user\AppData\...\radDBEC2.tmp.dll, PE32+ 16->33 dropped 35 C:\Users\user\AppData\Local\Temp\click.wsf, ASCII 16->35 dropped 57 System process connects to network (likely due to code injection or exploit) 16->57 23 regsvr32.exe 16->23         started        file9 signatures10 process11 process12 25 regsvr32.exe 2 23->25         started        file13 37 C:\Windows\...\ayfcXidefIAOQYvB.dll (copy), PE32+ 25->37 dropped 67 Hides that the sample has been downloaded from the Internet (zone.identifier) 25->67 29 regsvr32.exe 25->29         started        signatures14 process15 dnsIp16 51 160.16.142.56, 8080 SAKURA-BSAKURAInternetIncJP Japan 29->51 53 91.121.146.47, 49702, 8080 OVHFR France 29->53 55 9 other IPs or domains 29->55 69 System process connects to network (likely due to code injection or exploit) 29->69 signatures17

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Omics_Journal.one31%ReversingLabsScript-WScript.Trojan.OneNote
                    Omics_Journal.one39%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Temp\radDBEC2.tmp.dll58%ReversingLabsWin64.Trojan.Emotet
                    C:\Windows\System32\BPVAiawSvOgA\ayfcXidefIAOQYvB.dll (copy)58%ReversingLabsWin64.Trojan.Emotet
                    SourceDetectionScannerLabelLinkDownload
                    13.2.regsvr32.exe.de0000.0.unpack100%AviraHEUR/AGEN.1215476Download File
                    12.2.regsvr32.exe.9a0000.0.unpack100%AviraHEUR/AGEN.1215476Download File
                    SourceDetectionScannerLabelLink
                    c-0001.c-msedge.net0%VirustotalBrowse
                    penshorn.org11%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    https://164.90.222.65/0%URL Reputationsafe
                    https://163.44.196.120:8080/icy100%Avira URL Cloudmalware
                    https://penshorn.org/admin/Ses8712iGR8du/252100%Avira URL Cloudmalware
                    https://159.89.202.34/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/j100%Avira URL Cloudmalware
                    http://www.microsoft.0%URL Reputationsafe
                    https://182.162.143.56/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/100%Avira URL Cloudmalware
                    https://104.168.155.143:8080/0%URL Reputationsafe
                    https://159.89.202.34/100%Avira URL Cloudmalware
                    http://softwareulike.com/cWIYxWMPkK/100%Avira URL Cloudmalware
                    https://164.90.222.65/V100%Avira URL Cloudmalware
                    https://www.gomespontes.com.br/logs/pd/w39558100%Avira URL Cloudmalware
                    https://163.44.196.120:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/100%Avira URL Cloudmalware
                    https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/100%Avira URL Cloudmalware
                    https://91.121.146.47:8080/100%Avira URL Cloudmalware
                    https://163.44.196.120:8080/100%Avira URL Cloudmalware
                    https://182.162.143.56/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/-100%Avira URL Cloudmalware
                    https://163.44.196.120:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/W100%Avira URL Cloudmalware
                    https://159.65.88.10:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/100%Avira URL Cloudmalware
                    https://www.gomespontes.com.br/logs/pd/vM100%Avira URL Cloudmalware
                    https://167.172.199.165:8080/100%Avira URL Cloudmalware
                    https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dll100%Avira URL Cloudmalware
                    https://103.44.196.120:8080/0%Avira URL Cloudsafe
                    https://163.44.196.120:8080/l100%Avira URL Cloudmalware
                    https://169.65.88.10:8080/0%Avira URL Cloudsafe
                    https://penshorn.org/admin/Ses8712iGR8du/ocal100%Avira URL Cloudmalware
                    http://ozmeydan.com/cekici/9/100%Avira URL Cloudmalware
                    https://167.172.199.165:8080/Y100%Avira URL Cloudmalware
                    https://penshorn.org/0%Avira URL Cloudsafe
                    https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wM100%Avira URL Cloudmalware
                    https://www.gomespontes.com.br/logs/pd/100%Avira URL Cloudmalware
                    https://159.65.88.10:8080/100%Avira URL Cloudmalware
                    https://penshorn.org/admin/Ses8712iGR8du/tM100%Avira URL Cloudmalware
                    https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/t(100%Avira URL Cloudmalware
                    http://softwareulike.com/cWIYxWMPkK/#100%Avira URL Cloudmalware
                    https://159.89.202.34/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/100%Avira URL Cloudmalware
                    https://160.16.142.56:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/0%Avira URL Cloudsafe
                    https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/uM100%Avira URL Cloudmalware
                    https://penshorn.org/admin/Ses8712iGR8du/100%Avira URL Cloudmalware
                    https://91.121.146.47:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/8j~100%Avira URL Cloudmalware
                    http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/100%Avira URL Cloudmalware
                    https://159.65.88.10:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/#100%Avira URL Cloudmalware
                    https://187.63.160.88:80/100%Avira URL Cloudmalware
                    https://91.121.146.47:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/100%Avira URL Cloudmalware
                    http://softwareulike.com/cWIYxWMPkK/yM100%Avira URL Cloudmalware
                    https://163.44.196.120:8080/d/100%Avira URL Cloudmalware
                    https://164.90.222.65/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/100%Avira URL Cloudmalware
                    https://160.16.142.56:8080/80%Avira URL Cloudsafe
                    https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6H100%Avira URL Cloudmalware
                    http://ozmeydan.com/cekici/9/xM100%Avira URL Cloudmalware
                    https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/100%Avira URL Cloudmalware
                    https://160.16.142.56:8080/0%Avira URL Cloudsafe
                    http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/zM100%Avira URL Cloudmalware
                    https://penshorn.org:443/admin/Ses8712iGR8du/100%Avira URL Cloudmalware
                    https://159.65.88.10:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd//W100%Avira URL Cloudmalware
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    c-0001.c-msedge.net
                    13.107.4.50
                    truefalseunknown
                    penshorn.org
                    203.26.41.131
                    truetrueunknown
                    NameMaliciousAntivirus DetectionReputation
                    https://182.162.143.56/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/true
                    • Avira URL Cloud: malware
                    unknown
                    https://penshorn.org/admin/Ses8712iGR8du/true
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://penshorn.org/admin/Ses8712iGR8du/252wscript.exe, 0000000A.00000003.354031092.00000000052F8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.353626691.00000000052EC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355411882.000000000531B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359708281.0000000005323000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.354147169.000000000530A000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    http://softwareulike.com/cWIYxWMPkK/wscript.exe, wscript.exe, 0000000A.00000003.347190593.000000000502C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355096801.000000000532E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350575373.000000000509F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339320074.0000000004E6F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343897480.0000000004FA4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343274627.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352934278.00000000052A3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359696646.0000000005319000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338988190.0000000004E63000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004E9E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352849452.00000000052BE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344462453.0000000004F51000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352675846.00000000052A2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.356687723.00000000051B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339307814.0000000004E75000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349138569.0000000004FFE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352578097.0000000005285000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337736071.0000000004E34000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336058236.00000000029F7000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://159.89.202.34/regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://163.44.196.120:8080/icyregsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://164.90.222.65/regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://159.89.202.34/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/jregsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://163.44.196.120:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://164.90.222.65/Vregsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://www.gomespontes.com.br/logs/pd/w39558wscript.exe, 0000000A.00000003.354031092.00000000052F8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.353626691.00000000052EC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355411882.000000000531B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359708281.0000000005323000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.354147169.000000000530A000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/wscript.exe, wscript.exe, 0000000A.00000003.347190593.000000000502C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355096801.000000000532E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350575373.000000000509F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339320074.0000000004E6F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343897480.0000000004FA4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343274627.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352934278.00000000052A3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359696646.0000000005319000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338988190.0000000004E63000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004E9E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352849452.00000000052BE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344462453.0000000004F51000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352675846.00000000052A2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.356687723.00000000051B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339307814.0000000004E75000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349138569.0000000004FFE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352578097.0000000005285000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337736071.0000000004E34000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336058236.00000000029F7000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://91.121.146.47:8080/regsvr32.exe, 0000000D.00000002.575109480.0000000000CE8000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://163.44.196.120:8080/regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://182.162.143.56/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/-regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://163.44.196.120:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/Wregsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://159.65.88.10:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/regsvr32.exe, 0000000D.00000002.575459710.0000000000D71000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://www.gomespontes.com.br/logs/pd/vMwscript.exe, 0000000A.00000003.354752854.0000000004B24000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://167.172.199.165:8080/regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dllwscript.exe, 0000000A.00000003.335995742.00000000050EA000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://103.44.196.120:8080/regsvr32.exe, 0000000D.00000002.575459710.0000000000D3B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.547991280.0000000000D3B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.550924036.0000000000D3B000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://163.44.196.120:8080/lregsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://169.65.88.10:8080/regsvr32.exe, 0000000D.00000002.576555848.0000000002E0B000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://penshorn.org/admin/Ses8712iGR8du/ocalwscript.exe, 0000000A.00000003.355096801.0000000005344000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359716807.0000000005344000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    http://ozmeydan.com/cekici/9/wscript.exe, wscript.exe, 0000000A.00000003.347190593.000000000502C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355096801.000000000532E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350575373.000000000509F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339320074.0000000004E6F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343897480.0000000004FA4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343274627.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352934278.00000000052A3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359696646.0000000005319000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338988190.0000000004E63000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004E9E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352849452.00000000052BE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344462453.0000000004F51000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352675846.00000000052A2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.356687723.00000000051B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339307814.0000000004E75000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349138569.0000000004FFE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352578097.0000000005285000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337736071.0000000004E34000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336058236.00000000029F7000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://167.172.199.165:8080/Yregsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://penshorn.org/wscript.exe, 0000000A.00000003.357036755.0000000005363000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355096801.0000000005344000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355096801.0000000005363000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359782022.0000000005363000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355577672.000000000534F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359765538.0000000005350000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: safe
                    unknown
                    https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wMwscript.exe, 0000000A.00000003.354752854.0000000004B24000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://www.gomespontes.com.br/logs/pd/wscript.exe, wscript.exe, 0000000A.00000003.347190593.000000000502C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355096801.000000000532E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350575373.000000000509F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339320074.0000000004E6F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343897480.0000000004FA4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343274627.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352934278.00000000052A3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359696646.0000000005319000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338988190.0000000004E63000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004E9E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352849452.00000000052BE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344462453.0000000004F51000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352675846.00000000052A2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.356687723.00000000051B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339307814.0000000004E75000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349138569.0000000004FFE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352578097.0000000005285000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337736071.0000000004E34000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336058236.00000000029F7000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://159.65.88.10:8080/regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://penshorn.org/admin/Ses8712iGR8du/tMwscript.exe, 0000000A.00000003.354752854.0000000004B24000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/t(wscript.exe, 0000000A.00000003.353626691.00000000052EC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.354592807.00000000052EE000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://softwareulike.com/cWIYxWMPkK/#wscript.exe, 0000000A.00000003.356737849.0000000005237000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359464472.0000000005237000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351655555.00000000051E3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.357187163.0000000005237000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352375138.0000000005230000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352221230.0000000005222000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351807181.000000000520B000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://159.89.202.34/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://160.16.142.56:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/regsvr32.exe, 0000000D.00000003.551101008.0000000000D71000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.551101008.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.547991280.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/uMwscript.exe, 0000000A.00000003.354752854.0000000004B24000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://91.121.146.47:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/8j~regsvr32.exe, 0000000D.00000002.575109480.0000000000CE8000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    http://www.microsoft.regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/wscript.exe, wscript.exe, 0000000A.00000003.347190593.000000000502C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355096801.000000000532E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350575373.000000000509F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339320074.0000000004E6F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343897480.0000000004FA4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343274627.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352934278.00000000052A3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359696646.0000000005319000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338988190.0000000004E63000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004E9E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352849452.00000000052BE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344462453.0000000004F51000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352675846.00000000052A2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.356687723.00000000051B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339307814.0000000004E75000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349138569.0000000004FFE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352578097.0000000005285000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337736071.0000000004E34000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336058236.00000000029F7000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://159.65.88.10:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/#regsvr32.exe, 0000000D.00000002.575459710.0000000000D77000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://187.63.160.88:80/regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://91.121.146.47:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/regsvr32.exe, 0000000D.00000003.418225796.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575109480.0000000000CE8000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    http://softwareulike.com/cWIYxWMPkK/yMwscript.exe, 0000000A.00000003.354752854.0000000004B24000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://164.90.222.65/rrjjbae/nhkurfvvppt/cnws/lotgiwvd/regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://163.44.196.120:8080/d/regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://160.16.142.56:8080/8regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://ozmeydan.com/cekici/9/xMwscript.exe, 0000000A.00000003.354752854.0000000004B24000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://104.168.155.143:8080/regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hwscript.exe, 0000000A.00000002.359523734.000000000525F000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wscript.exe, wscript.exe, 0000000A.00000003.347190593.000000000502C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.355096801.000000000532E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350575373.000000000509F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339320074.0000000004E6F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343897480.0000000004FA4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343274627.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352934278.00000000052A3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359696646.0000000005319000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338988190.0000000004E63000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340504481.0000000004E9E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352849452.00000000052BE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344462453.0000000004F51000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352675846.00000000052A2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.356687723.00000000051B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339307814.0000000004E75000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349138569.0000000004FFE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352578097.0000000005285000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337736071.0000000004E34000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336058236.00000000029F7000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/zMwscript.exe, 0000000A.00000003.354752854.0000000004B24000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://160.16.142.56:8080/regsvr32.exe, 0000000D.00000003.551101008.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://penshorn.org:443/admin/Ses8712iGR8du/wscript.exe, 0000000A.00000003.355096801.0000000005344000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.359716807.0000000005344000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://159.65.88.10:8080/rrjjbae/nhkurfvvppt/cnws/lotgiwvd//Wregsvr32.exe, 0000000D.00000002.575459710.0000000000DC1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    110.232.117.186
                    unknownAustralia
                    56038RACKCORP-APRackCorpAUtrue
                    103.132.242.26
                    unknownIndia
                    45117INPL-IN-APIshansNetworkINtrue
                    104.168.155.143
                    unknownUnited States
                    54290HOSTWINDSUStrue
                    79.137.35.198
                    unknownFrance
                    16276OVHFRtrue
                    115.68.227.76
                    unknownKorea Republic of
                    38700SMILESERV-AS-KRSMILESERVKRtrue
                    163.44.196.120
                    unknownSingapore
                    135161GMO-Z-COM-THGMO-ZcomNetDesignHoldingsCoLtdSGtrue
                    206.189.28.199
                    unknownUnited States
                    14061DIGITALOCEAN-ASNUStrue
                    203.26.41.131
                    penshorn.orgAustralia
                    38719DREAMSCAPE-AS-APDreamscapeNetworksLimitedAUtrue
                    107.170.39.149
                    unknownUnited States
                    14061DIGITALOCEAN-ASNUStrue
                    66.228.32.31
                    unknownUnited States
                    63949LINODE-APLinodeLLCUStrue
                    197.242.150.244
                    unknownSouth Africa
                    37611AfrihostZAtrue
                    185.4.135.165
                    unknownGreece
                    199246TOPHOSTGRtrue
                    183.111.227.137
                    unknownKorea Republic of
                    4766KIXS-AS-KRKoreaTelecomKRtrue
                    45.176.232.124
                    unknownColombia
                    267869CABLEYTELECOMUNICACIONESDECOLOMBIASASCABLETELCOCtrue
                    169.57.156.166
                    unknownUnited States
                    36351SOFTLAYERUStrue
                    164.68.99.3
                    unknownGermany
                    51167CONTABODEtrue
                    139.59.126.41
                    unknownSingapore
                    14061DIGITALOCEAN-ASNUStrue
                    167.172.253.162
                    unknownUnited States
                    14061DIGITALOCEAN-ASNUStrue
                    167.172.199.165
                    unknownUnited States
                    14061DIGITALOCEAN-ASNUStrue
                    202.129.205.3
                    unknownThailand
                    45328NIPA-AS-THNIPATECHNOLOGYCOLTDTHtrue
                    147.139.166.154
                    unknownUnited States
                    45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCtrue
                    153.92.5.27
                    unknownGermany
                    47583AS-HOSTINGERLTtrue
                    159.65.88.10
                    unknownUnited States
                    14061DIGITALOCEAN-ASNUStrue
                    172.105.226.75
                    unknownUnited States
                    63949LINODE-APLinodeLLCUStrue
                    164.90.222.65
                    unknownUnited States
                    14061DIGITALOCEAN-ASNUStrue
                    213.239.212.5
                    unknownGermany
                    24940HETZNER-ASDEtrue
                    5.135.159.50
                    unknownFrance
                    16276OVHFRtrue
                    186.194.240.217
                    unknownBrazil
                    262733NetceteraTelecomunicacoesLtdaBRtrue
                    119.59.103.152
                    unknownThailand
                    56067METRABYTE-TH453LadplacoutJorakhaebuaTHtrue
                    159.89.202.34
                    unknownUnited States
                    14061DIGITALOCEAN-ASNUStrue
                    91.121.146.47
                    unknownFrance
                    16276OVHFRtrue
                    160.16.142.56
                    unknownJapan9370SAKURA-BSAKURAInternetIncJPtrue
                    201.94.166.162
                    unknownBrazil
                    28573CLAROSABRtrue
                    91.207.28.33
                    unknownKyrgyzstan
                    39819PROHOSTKGtrue
                    103.75.201.2
                    unknownThailand
                    133496CDNPLUSCOLTD-AS-APCDNPLUSCOLTDTHtrue
                    103.43.75.120
                    unknownJapan20473AS-CHOOPAUStrue
                    188.44.20.25
                    unknownMacedonia
                    57374GIV-ASMKtrue
                    45.235.8.30
                    unknownBrazil
                    267405WIKINETTELECOMUNICACOESBRtrue
                    153.126.146.25
                    unknownJapan7684SAKURA-ASAKURAInternetIncJPtrue
                    72.15.201.15
                    unknownUnited States
                    13649ASN-VINSUStrue
                    187.63.160.88
                    unknownBrazil
                    28169BITCOMPROVEDORDESERVICOSDEINTERNETLTDABRtrue
                    82.223.21.224
                    unknownSpain
                    8560ONEANDONE-ASBrauerstrasse48DEtrue
                    173.212.193.249
                    unknownGermany
                    51167CONTABODEtrue
                    95.217.221.146
                    unknownGermany
                    24940HETZNER-ASDEtrue
                    149.56.131.28
                    unknownCanada
                    16276OVHFRtrue
                    182.162.143.56
                    unknownKorea Republic of
                    3786LGDACOMLGDACOMCorporationKRtrue
                    1.234.2.232
                    unknownKorea Republic of
                    9318SKB-ASSKBroadbandCoLtdKRtrue
                    129.232.188.93
                    unknownSouth Africa
                    37153xneeloZAtrue
                    94.23.45.86
                    unknownFrance
                    16276OVHFRtrue
                    IP
                    192.168.2.1
                    Joe Sandbox Version:37.0.0 Beryl
                    Analysis ID:828489
                    Start date and time:2023-03-17 09:06:12 +01:00
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 10m 20s
                    Hypervisor based Inspection enabled:false
                    Report type:light
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:19
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample file name:Omics_Journal.one
                    Detection:MAL
                    Classification:mal100.troj.expl.evad.winONE@12/693@1/50
                    EGA Information:
                    • Successful, ratio: 100%
                    HDC Information:
                    • Successful, ratio: 50.2% (good quality ratio 42.4%)
                    • Quality average: 60.5%
                    • Quality standard deviation: 35.6%
                    HCA Information:
                    • Successful, ratio: 89%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .one
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                    • TCP Packets have been reduced to 100
                    • Created / dropped Files have been reduced to 100
                    • Excluded IPs from analysis (whitelisted): 52.109.32.24, 20.223.225.174, 20.234.90.154, 8.241.126.121, 8.248.139.254, 8.238.88.248, 67.26.139.254, 8.253.207.120, 209.197.3.8, 23.10.249.161, 23.10.249.147
                    • Excluded domains from analysis (whitelisted): www.bing.com, fg.download.windowsupdate.com.c.footprint.net, fs.microsoft.com, prod-w.nexus.live.com.akadns.net, prod.configsvc1.live.com.akadns.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, a767.dspw65.akamai.net, wu-bg-shim.trafficmanager.net, download.windowsupdate.com.edgesuite.net, config.officeapps.live.com, nexus.officeapps.live.com, officeclient.microsoft.com, europe.configsvc1.live.com.akadns.net
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtCreateFile calls found.
                    • Report size getting too big, too many NtOpenFile calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                    • Report size getting too big, too many NtReadFile calls found.
                    • Report size getting too big, too many NtSetInformationFile calls found.
                    • Report size getting too big, too many NtWriteFile calls found.
                    TimeTypeDescription
                    09:07:57AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Send to OneNote.lnk
                    09:08:01API Interceptor2x Sleep call for process: wscript.exe modified
                    09:08:29API Interceptor10x Sleep call for process: regsvr32.exe modified
                    No context
                    No context
                    No context
                    No context
                    No context
                    Process:C:\Windows\System32\regsvr32.exe
                    File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 62582 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                    Category:dropped
                    Size (bytes):62582
                    Entropy (8bit):7.996063107774368
                    Encrypted:true
                    SSDEEP:1536:Jk3XPi43VgGp0gB2itudTSRAn/TWTdWftu:CHa43V5p022iZ4CgA
                    MD5:E71C8443AE0BC2E282C73FAEAD0A6DD3
                    SHA1:0C110C1B01E68EDFACAEAE64781A37B1995FA94B
                    SHA-256:95B0A5ACC5BF70D3ABDFD091D0C9F9063AA4FDE65BD34DBF16786082E1992E72
                    SHA-512:B38458C7FA2825AFB72794F374827403D5946B1132E136A0CE075DFD351277CF7D957C88DC8A1E4ADC3BCAE1FA8010DAE3831E268E910D517691DE24326391A6
                    Malicious:false
                    Preview:MSCF....v.......,...................I.................BVrl .authroot.stl....oJ5..CK..8U....a..3.1.P. J.".t..2F2e.dHH......$E.KB.2D..-SJE....^..'..y.}..,{m.....\...]4.G.......h....148...e.gr.....48:.L...g.....Xef.x:..t...J...6-....kW6Z>....&......ye.U.Q&z:.vZ..._....a...]..T.E.....B.h.,...[....V.O.3..EW.x.?.Q..$.@.W..=.B.f..8a.Y.JK..g./%p..C.4CD.s..Jd.u..@.g=...a.. .h%..'.xjy7.E..\.....A..':.4TdW?Ko3$.Hg.z.d~....../q..C.....`...A[ W(.........9...GZ.;....l&?........F...p?... .p.....{S.L4..v.+...7.T?.....p..`..&..9.......f...0+.L.....1.2b)..vX5L'.~....2vz.,E.Ni.{#...o..w.?.#.3..h.v<.S%.].tD@!Le.w.q.7.8....QW.FT.....hE.........Y............./.%Q...k...*.Y.n..v.A..../...>B..5\..-Ko.......O<.b.K.{.O.b...._.7...4.;%9N..K.X>......kg-9..r.c.g.G|.*[.-...HT...",?.q...ad....7RE.......!f..#../....?.-.^.K.c^...+{.g......]<..$.=.O....ii7.wJ+S..Z..d.....>..J*...T..Q7..`.r,<$....\d:K`..T.n....N.....C..j.;.1SX..j....1...R....+....Yg....]....3..9..S..D..`.
                    Process:C:\Windows\System32\regsvr32.exe
                    File Type:data
                    Category:modified
                    Size (bytes):328
                    Entropy (8bit):3.1335351732898324
                    Encrypted:false
                    SSDEEP:6:kKYzWry/7UN+SkQlPlEGYRMY9z+4KlDA3RUecZUt:lCvkPlE99SNxAhUext
                    MD5:0F9571383EA8E3551FE718303EAFA2DD
                    SHA1:2688A71457737B77CD3E582A2F55BF0930D8A8B5
                    SHA-256:149849AE8C327E3C1366B724FB148B7B3F999CE0EA7CC1A37BA6A85FC1620A15
                    SHA-512:F754B733AEB2B031C04EEF7832652FEA256A420B2C1A78839054924E5A7F16A37D048EDA41ABEB912250444E94EA003E33263E9031FD61BC37DFE847960B60CE
                    Malicious:false
                    Preview:p...... ............X..(....................................................... ..........).K......&...........v...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.d.2.f.9.2.9.a.7.4.b.d.9.1.:.0."...
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):154907
                    Entropy (8bit):5.352038448082546
                    Encrypted:false
                    SSDEEP:1536:q+C76gfYBIB9guw6LQ9DQl+zQxik4F77nXmvidlXRpE6Lhz67:vcQ9DQl+zrXgb
                    MD5:C66CFA2AE8BCC1C6FCF35CF57F762AB7
                    SHA1:A9A8635CD5F80C7F1C8130E5C510F613B7B93129
                    SHA-256:AD7BEAF1859C86A5D1DAE576F690094052C063DB6940EEDCE5F574E50130AE6C
                    SHA-512:0CC11A329EC12B5B40B688B7E93E0155311ADACD2A901EBD00B3B19B0CE06C71A5E52C10E55838D72BCAFC61B76BEAA37A7924E64A03149535BA2965D9D81E79
                    Malicious:false
                    Preview:<?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2023-03-17T08:07:17">.. Build: 16.0.16310.30525-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://rr.office.microsoft.com/research/query.asmx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId" o:authentication="1">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. <o:ticket o:policy="MBI_SSL_SHORT" o:idprovider="1" o:target="[MAX.AuthHost]" o:headerValue="Passport1.4 from-PP='{}&amp;p='" />.. <o:ticket o:idprovider="3" o:headerValue="Bearer {}" o:resourceId="[MAX.ResourceId]" o:authorityUrl="[ADALAuthorityU
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 165 x 131, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):3679
                    Entropy (8bit):7.931319059366604
                    Encrypted:false
                    SSDEEP:96:tT+LtoQ9jsUBsnwlDGThUe8ww2iJiGEjdKKnnE+Gh:V+Ltt5GwlDQhUe8ww2iJi7MKnnE+K
                    MD5:995CEACAD563F849C4142B6A6F29F081
                    SHA1:44CB3B867CD2917541B7D5AAED2F14F10FEBB0FD
                    SHA-256:3691FB8C60EA1B827092F05FBB1807E34726016C6FF56698D7B81C44D519D22A
                    SHA-512:3C8EFEB966B075D06D8344483352BF92C9292F9970C9377BE254EB355EFAF017916737AECCDC704B84D532B7229F9908951A6F2CC3FAD810791CAB224401AD3D
                    Malicious:false
                    Preview:.PNG........IHDR.............c.L.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^....W...Gh...k.Hm..J.m....,X...Eh..%.n.....PHvy$%...[...R..l...(/..-..yl..Z.h..H!.../.|.y|w...7d3s.s.=.{.s.g.6W.^..)..@..{..'O.LL.......c.^.6xS&O.,...J.(|?...............,.$......@.zk....,.$.........)..7]O...mH7..0..|..&j..t..F...T...AZ7z.....$H...AZ7z.....$H...AZ7z.....$H...AZ7z.....$H....W.6.....0...FTcc.Wi....Q)...<.*.....{...#G....Y.f....KKK..,,,4.....{S.`...+O.[..+.\H...(.<..Qy*..ET.PM...c....~(.g..**...ol.K......Sc8..q.F.KM"<...:t.O.>b..$*t..].........2..y.h."!f.08hT..m.(..C.7n.......@....SVUU).F.).X\\....[j.U....$x$d..e...<.W......=;0L78t+..Gw..-....]......C7......K.w..._..g......A.&M.$^.#.!....e.\.P........;vD..@...Za.@*D..f...! .2w...4#.J..c....K}....F.u.I.b.V2.k...5..`....*........M..!.,.;.E..BZ....K..[7....5....,...........K...7+.6..o....\,`...z..5x...\46x.b......Y....s.^.x=.e.4s.W..t,.iu.G^.....(74....`.....:......]..&..j+t9..3..}..
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 127 x 138, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):2232
                    Entropy (8bit):7.837610270261933
                    Encrypted:false
                    SSDEEP:48:dFQY2WmQbe+TukEC2KgYPsWOuWFk792oP/sWtGOK9Lc+rD0NTHj:3L+wKkEOgx3PG92Eqt9LczFD
                    MD5:EDB5ED43CC6038500A54B90BEC493628
                    SHA1:A8CD63F3914E4347F4C5552FB922C6C03917F45F
                    SHA-256:9F3312E33EB78C6952B5A5D881BBD18751FCFAC41D648C6F053CE781342A504F
                    SHA-512:4EBCEFD69A4C249AA3B0F00A954C4E463DA22FC9CA0B61A0DC46079B438138C509B22188D966FFF6599A3A604858BC4CC8FE6E0685A764E8E0477AB7A237DB32
                    Malicious:false
                    Preview:.PNG........IHDR.....................sRGB.........gAMA......a.....pHYs..........o.d...MIDATx^..hVU..}..s:..6..9g.MM3...j...*........A..!.A.....R.Ai%YH..(M.".h.cf*.B.......:...{w.{.......y.s>.{.{.=.........#.y..r.K...K.0}......Y..b..[N.=....j.=........!......./.6....B.8....p....5P)....@......=}............^.~..@.o`n<.q.....Yw]..mg\V*...y.W.T.>...\n...s.iG.~L]..d.<.8..j<.<1..4...CZ0...}...........oDDh.....]3}#"B..O........0}B.F.L......5.f.FD..L....5.7""4`..p.........'.kt.....>!\.k.oDDh.....]3}#"B..O........0}B.F.L......5.f.FD..I..x........Z^...>B$1.N"}4.....1:&F8..*.X.yL(..s.3......~2.EL%.w.Uc.zJ...B..S..b.7o|%..7..'.....N.|..Vi...q..uO,`/....\W{..y...&iI..|X&T.........-........Z..o.~u..U....cF.M....O4}......~......:T..W.._s...t..Dlb.$Pr././.._4.b......R.T$t..$.>hB. +.{......m.w .Q...05..C.}...}.....?..h.....Y .8.6^t....}.y.%......l=$..[.~..]..h..N.......*....SB.|....8..H......_...G...|......;6YQ|WO.o.}]..'.$..oE.y...i'9.[cmS..@m@.Q
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):1604
                    Entropy (8bit):7.814570704154439
                    Encrypted:false
                    SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                    MD5:3F1535054D4F9626F0EB10CEE47F076E
                    SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                    SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                    SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                    Malicious:false
                    Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 749 x 126, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):13084
                    Entropy (8bit):7.940058639272698
                    Encrypted:false
                    SSDEEP:384:o4KSpFN6Ud4c3p2Il1yavNr5spYVJzimlfZ:wGN6Udv4IKavLBJz/r
                    MD5:0693DABBBC411538D209F32E22F622F6
                    SHA1:FB7E675406FA123CDB7E058D336742D6A2E8DC8E
                    SHA-256:2DFB2E7A1A3AA43C673D2EE540D3C366CEB12105EB5441F98992FC06F4284013
                    SHA-512:F07732660EC62DAE58EB02E2E9476007EA92BF826F642BCA547097136AEA01D29FF69D9B0CD0F5D65A5E15AA66CA4AA4804AA171A3504AAB198631C643C90C16
                    Malicious:false
                    Preview:.PNG........IHDR.......~.............sRGB.........gAMA......a.....pHYs..........o.d..2.IDATx^.w....'m.9c.6"...&.`.N.(.TN.Ne.N.R.eKr..T.*[...?T..:I.D.S>I$A...I......y.9...f......3...Gh.....}_.o....n..A@.....A@...L...2... ..... .x...#. ..... .....1f]9.[.....A@......3 ..... ...fE@x.YWN.....A@......1...... .....Y..J.Y.N.....s"................./..rc.scuyyyu...\s....t.oi..j..lv.....Gr.#9%%%9%--....d.T...r...DH...6.....%U..A@.0.....rAD ........2.5.......L.R..=W...gZ.`o..-?.T.Cy.:...y.9..y.EE...v......1..R.....1.".... `"...ss.......i.!.hY...Fj*....%.-.Gw...HJJr8..6...#.......!(.?P.(.....8(u........*..OOO..........dgg....Q..=..c.y....A`S.@.......3.CC..GFfg. .I.I.COrJFFFNNV^nn^^.z..%..(...^.b$........a..y.LMO-.,ylV+.k...T>Jg..*//-+-......M=..x.....E.... `~..N.Kww.......z...%%.e.%.yy.i...P.)'.,A.5.d.0.Cc35==66>2::33..>..;..Ii.i.gv...DSd....l#...l..............................)**,**...V..1 .F.'7....)..SSs..7..F...C.p....(*,......(RG..B...l!.2. ....|r1
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):1604
                    Entropy (8bit):7.814570704154439
                    Encrypted:false
                    SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                    MD5:3F1535054D4F9626F0EB10CEE47F076E
                    SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                    SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                    SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                    Malicious:false
                    Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 163 x 131, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):4847
                    Entropy (8bit):7.950192613458318
                    Encrypted:false
                    SSDEEP:96:JnieMJz5Tz/gKVp93jQvcv16kjOzbapFJBkjcMNBqmQzOG8qx1QKnse8T:JieMJzph13Evcv16RfapFLxMNBo8qxan
                    MD5:A1A1017A6A7928761CEB56D1D950E123
                    SHA1:28272E9C7F816A1CE8F2033FC00F489005332365
                    SHA-256:72F066CD34EA71D0E1B28FB60D663B0372C5254E1A8239C94A164EEF9389DB88
                    SHA-512:10F4557F102230126BC86CD4B49C93365C38D5CBEAC51F4691B90D861098866A2BDEFEBA507731D4FA14367FEE430453BD716157F9074EF643F2B949B09E1530
                    Malicious:false
                    Preview:.PNG........IHDR.............n.<.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].\TU..}...E.0.T....L~....af..Z.....O..4..>Ms..Js_....5.E.d...Y....?\z.3..}.l..|?~...{.....s.z..Y.............E.X.6...c..u...y..W.j....."}...l.i.`.!-!-......MKH.E.bi.d...b.X.)...X4 .vJ6-...;..+/.->Qyi.t...%.T..k;.U..y.C$[;..Gm.......v..*2..2..eee..."!..)...yy...III./..u........2....M.:''...W.....o..t...._.6m.... .`,k.T.v."..q.......s~~........O....ed.[W0X..HB.V.i.....<=..E^^......MyY..vpp...........^6.....aQQQaaa........]^^nkg../_.d`.%......L&k..B......?C....W.VVV6660t.J+K.:..%q.....e.cp....Kz..%.qZsAR\T.!......>55.R.u.W\\.L....T...K..rE.U.K.-9......y.y.......K....>...HWTT.e....+..B.......%%%......^...|...M'.%.f!/..=p...{O..../...@...DP..hw8....7o>..A.mgg......7-']~.s.OE.E.|=.......'%!y.......\.....MSn.i.........!...U.$0S .......Z.P.}[.%X[.;{....N.....\......6O.....'.N}.}s.m...E..V..f..r...4..~.......H..F.}....4,.R.=.......xT..4......./...,z
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):1604
                    Entropy (8bit):7.814570704154439
                    Encrypted:false
                    SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                    MD5:3F1535054D4F9626F0EB10CEE47F076E
                    SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                    SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                    SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                    Malicious:false
                    Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 123 x 103, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):1657
                    Entropy (8bit):7.80882577056055
                    Encrypted:false
                    SSDEEP:24:q3kLWZefR0kKbfLnNhzzt+acvt2x6pBs/j+7QJU0QbDQ883ASaoUV4hNgq1rsyhy:q322nN+X11GDsg8831Uyhi/vf
                    MD5:D5F7A65469623327F799B516ACBFFD2F
                    SHA1:76C6333C14AF3A7EA091819953E6E12DC289A12C
                    SHA-256:F476FAE1C6D79069239C471D182631AB343749C22B1A6990250465C7EC3738FE
                    SHA-512:351B9E455E97E6247E64E4BC1B59C9524E70AE0D09D3B6FB96937378A70536483B00426EE69C3590DD415A8265D21FD031B524B90E4E86814EC9AD704E57793E
                    Malicious:false
                    Preview:.PNG........IHDR...{...g.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^...h.U..p.T..(.eBR....2.....':.4kec^....0.&.....ugS.8u:i.P.F..f3...D....6.%...xaI.}...y..9...s.w.s..{..y.5<<<...(0Q.............t_..q/.[@.....-.e.....=..J.L.......c.4H......u?.XF.KJ..zb..0..f}..'J.,[&..S.6...w..9..._......<.........?j....H........>....~..}.n.8.WW..B?...?.b.;.....<....~...b...m....&1.=.Pq....w....a_3.k7'...\....d..z.O..w...s...Lh.x..........Q;40.i..`.8V._.@...rd.....kF.@<@..e......e....=mHB;....E./.\h.^....q..>.....%v:.O.:...&q...:.'e..9...h.iG'.L<@......([..|'.n.x...c....._O...[)......S*..Q...d......A....4..t....E..v..}..7...t.b....,/*|.H.]...8.. .@.(.;"..Kt.....].+.[LwJ..B]i.b.k.@..Js......J......6..J._LwS<@..J.YLwV<@G.4w.L..G...]..zu.z.h....;...W.IH..+...c...F....qI....Xul..]...N...wv\.M$..D...+...=.....?U....T..^<6../T*.{q.q..:....y..XL..l..z.d....G..b..g.G..b......SM.{q.q$MUL..R..........^\P..g...e.....L/yqM../.b.f..........J.<
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 59 x 61, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):2210
                    Entropy (8bit):7.86853667196985
                    Encrypted:false
                    SSDEEP:48:naUvGemgl0W5KMDRLEbGAnaHC7ew/fkDSCcE5FTaHWc:aerVlDRIewkXlrTa2c
                    MD5:73E38124F94AD20A2F1571FBBE11AEEC
                    SHA1:87FB8056DC7A0A3B70D51426771C4CCE2099CFE5
                    SHA-256:A700B63B30CBBE5230CC5E977D651E178EA87E73EAB18C8D5FFB1362149ADDF7
                    SHA-512:320FCE64DD6F975384BEC9267348CD5CD24A55B13BB09FEF1238C2216AD8ECABDCCC15601A079CE092ACFA4954829FFEB06FBB0631F6AE26E3A39E43C102048B
                    Malicious:false
                    Preview:.PNG........IHDR...;...=.............sRGB.........gAMA......a.....pHYs..........o.d...7IDAThC.yL.w...r..r....... ...Eq.nnN..i..[.e...-.d.M.dn...x.xmQAT.Q.RN9..EA.k..P`..=}..m.&~............oy....k...}}x..[....g59.}]...~i.SY......."....7Ow../......2...3f)n{..R..R......U?......O.{....c..pT.\.t....5.07.. .....07...7.o..,+.,.V.c...&..%.3I.....:v..\....6.....??..[.N...........nz..Z.B.........v.prs.q1V1|..=':..`.bz..%s.cf.3..RyMNUeV..J.k.}D[~xo..d..c...sO.y\....B...c.07......Rp..J.......{b.......;u...s....N.gko.M...;6...6..c.X5.S..o..\....^).....(......y.72.^....s%...[.q!&Z....C-..+o.....I.....,Y.{......g.1.0..I}.....<.....T..}....t.!x&)..[.7....4.5..{....n.<...#I...:.....r.wW~..zr..9k.^.]KR.*W.J.n.")....%0...)...Fbb5`4'.X..E.../.t.&,t(...@9....\$..........].P..jdU......H;.$.'%}.l7........y..$.....Z..4.Cm.u#&.%N..1..+..8....y...U.(.T.....}.I..5r}...!..K....>f..3.C.G..X1.(<.Gb..b(....0Qv0F.......n.z.s.Y......\.,.h%1...QU..%.}B|CW......sO..\.=..&3...,.
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 563 x 211, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):14458
                    Entropy (8bit):7.944094738048628
                    Encrypted:false
                    SSDEEP:384:uuT43eqJy2jEeSZE0onrAFAOpn5ytFfNrfIkBQTYz8ynth2EB:EugQeS+nrAFZ8tJNrfRQM4ynH2EB
                    MD5:7CEB71F78A193F8C9F7FFDA5F81AEBD8
                    SHA1:EEC1597705EFF1A527C246B86A71878185BA6B1B
                    SHA-256:77911FF7AEAB8FCCAF36DE6E1183FFE1A6C27F77B5714EE780976CE5189E8FD0
                    SHA-512:1D1AB19B64E1E2ABCA61AE78B3B50310B0A6CF19D2ECFCB4499D8D0BF68600B4D95BC0945EF9FF9B1D016ED61EAC518DCCA1A426F460317C07AD51E2E047948C
                    Malicious:false
                    Preview:.PNG........IHDR...3............>....sRGB.........gAMA......a.....pHYs..........o.d..8.IDATx^.}.p\W.ZRKjI.}..[..M.l.N..[..O..B&....?5...@.5.5EQ...T...d*U..*.C6....8..}.Wy.e........k]s..z..^...T....s...}:.{..n..1.."@....P......."@....p @f.s@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....5 ...f.;.0..7141...L.....M.3.L....{M.T...I.C...@E{.w.Y...q.....c3..gf.3..'j...I...{M..@..4555==-...!..f.....d...>i.%&&&%.u....f..[......O`.......G..E6I.< ..3.k...',....Y...<..........u...{9.......S^^.q.<..^....2.bb.E`r...ey........ ..3........Dg@L..a'.x&''.O.Y..!e.c%$..(P__.d.....Sj..S...BLu.[g..mK.SwVe.."@.T.@P.y.........=....40..L...$d..J....cccw...^.RBKKK...heJiS3.0I.X<..}..*O..........QR..q.5GTA..ht.(^.Hno..n.......wvv:..K?.\.JQ/i..h0)G..1Y....K.>FT...8..d&..,+-.T.b.........f.."3.V 6.:...E 1...?.Q.6....A1Smm..K...V}...:.uA'.$.v.cy..<.`.Z322.r.LI.....>......&........"..."......@.Ccccee.[..z{..fL5..{...
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 742 x 104, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):13030
                    Entropy (8bit):7.948664903731204
                    Encrypted:false
                    SSDEEP:384:/06ULmwT2RqfILhmLy4tNpYGL0mvBQhTMHX4PCIVYm:s6USI2RqfGhmDrpYM0ofHX4aIVYm
                    MD5:17E9FF9F735102231846936F0E2BAF1A
                    SHA1:9EC1AE8A3AD55C48C02427D842D6E38DA85B5145
                    SHA-256:DD1CA8DA90893E0B63ABFDD9E60CF2BF844B311964E9D9DDB855C21FCA156EBB
                    SHA-512:71E690D6C87B09659296E6E6DDC8E3F91035DD80C5CE875FA557763E8138900C27FB492885291CEE203D65BCEE8C20C9C39E0590A5FD32B8A00BEB3E3F6D6E8F
                    Malicious:false
                    Preview:.PNG........IHDR.......h.....2......sRGB.........gAMA......a.....pHYs..........o.d..2{IDATx^.wp\.....sN$...$.).Q.")R2ei,kl.%....r..vm.x<...\...u.U.g.ry=..uX.cK.dI..I1G..$.".Fg.q...N.nt...3.w.w..~.v.O.....K.....A@.....A ..H.n.D;A@.....A@......e.y ..... ...1..P..xH.. ..... ..e.9 ..... ...1..P..xH.. ..... ..e.9 ..... ...1.@.$9..S....A@..4....^C..F..VR\\TT.........aHII1......VS..g........... .*....z..|Ek.......<R../55+33;;;+..Y..WC..#...P..... ...s#0::......522...,.v..D......_.....9.2N.L.'..F$.....e..!..... ...N...`1....G.....'&,f..f.X....!.lp......I_........J..z.R,YbYd&.... ......~"b\...b.Z.SS.....c....&..Yl-............... ..[...BY......... ... 1..Z..6NN............._.zw....MKK.Z..vMMnnn.4.v....,q..e... .D%....Q......._..p*M......22..e...k.}.....qU....S.a...~....P..}v.. ...1..2...F.GCC#...].=..C..n#...K+..MOO..........."....d^2=.{....U.p.h%.%n...D.....XB..b..'''....?h.b.B\v..^Q^.UC............Q...I.....U.VD...P..{.2"A@...b..V...........jF.x.
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 165 x 131, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):3879
                    Entropy (8bit):7.9281351307465044
                    Encrypted:false
                    SSDEEP:96:k1hccap27HGVhY2Kn+A3RS+HG3dXrjmg26vh:k1hccewIhYxRmR5
                    MD5:C451B2A146BDD7EF33AB3EA27268796D
                    SHA1:C040BA2F31342CBCBF597C96D4D6EDB83D473B77
                    SHA-256:4C264B2A6E88712234DAA8E3A8D630CBF4EEB338554CB0B794D8031F8943EE65
                    SHA-512:55915A304B261BC6F38F5CFE0389D5195F85FE2C1DA325019C3AA391E8B1773091E078A35BD57F8CEE0BA035956382AE33790EF462053FCE711EEA9665B7F917
                    Malicious:false
                    Preview:.PNG........IHDR.............c.L.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].p.U..g..Bp!...\.!.`pA.+....H.U..."Z..*U.. ..P.D.-.$..,,..$.g.......CB.l......I.g.pc..Lf..~.=.~]S.....w.9..w..'...!L..A ..^.t...v..s4&&&%%..6..`..:.G.D@.7.qS...K....[..,...o...p..2.%..B.Y....|;..gy+.[..,...o...p..2.%..B.Y....|;..gy+.[..,...og...}.W..z\?...y..;_t....=..e\.....6.M|[...B._....[_.\^Pf.....f.....\l..../6....<S.4./..m.......l....B'.n...O...yc...........X...P...k....t..9tf.g>....e..Sy'.L+**.]{..a...,7...p..+......K..y.9p...I{..i58....v..5.`Op.....{.......8.._.S.........p..).........;.....y...2...b.[>gP....C..G.H...........Osp...)..9x!...W.,..^....$r.p.sOJ.l..=.x.9s&:..........h.`..W"V..|.l{..72.....zv@.#.<.........../....F|...c...4.W....:uj@1...~.X............^si....Z..I~.Q.<.....NAOq...+i`.)...$L..gV.6#.....F$..hD.g.L-\..H._.u..]4......h...T.BK\\.Z222....7))..h...1??...~.-i=...X...~h....y[.............p.....x....c...{....Uh.7n.....
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 651 x 254, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):19235
                    Entropy (8bit):7.944867159042578
                    Encrypted:false
                    SSDEEP:384:h4iuxL3Yck5lpMcTyHOypEod/G38lJxqSp5BCU:h4/xjYc2lmcOuuEoJM8fse5BCU
                    MD5:AE32E846559D576FD263BD69FEDBEC28
                    SHA1:D481DF71C858BAECFE33418002D368F2DCF68D4A
                    SHA-256:6E21222B0EADAB8D3CFB0C7D14941D196165D6709271AF317D099F12403CD352
                    SHA-512:9AA4A6DD01D3B745D674721765F2BFCCAB584CA0603F222EDBE9A88190A2A57438041E7A3706CC0656A6ABB79AA18118319F210EFFE3DD917E7B94A6294BD346
                    Malicious:false
                    Preview:.PNG........IHDR.....................sRGB.........gAMA......a.....pHYs..........o.d..J.IDATx^...X.W....D..A......bW.A..[..5.F..D...7.ob71.....b.."...("...(...{/...e......}.....;...S.X...H...@d...... &.....b..... F.....b..... F.....b..... F.....b..... F.....b..... F.....b..... F.....b..O.KVfVfjFzJzVF.}i{.R..l..q..`I....e.'./.'.G.z.*!&>)61.UjVzf..4>Q~...U..=......s.\..WE...2...t..`F....M....'..?.......>BO(m.V.P....Gy.../........B.6.......=|z7.Z.|hQ..u..j............&..Z.bo?.u...S7.G>......]I..7.i...3....<.y.l]....SI>...L.2..<.....[.'=M.Tsprp...T....cE'*..P........eefQ.NKN.x....:-#5#....q/..xq.YzJ:.T.*u.j..S.C=...|.....2..(YF........|...*.7t...{.jz....W..Y..{...nlfj...L.6.[.hS.=.....(!C.......?5..+...[..a.:U.K..C.......w......+..r@.z.7..j..qB..B.....X}..=.fk...>^5[....n.z....wn....Z4.._iWG.^..z6./]t......dhM.9s...Gbo?...U.V..tj.......*&)Io.{q.G...A...l...i7...&....d.E]....#.W.x,.T...&Mz4+].4.$n..F..x...<.ppr.............y.,i./..
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 220 x 170, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):7374
                    Entropy (8bit):7.955141875077912
                    Encrypted:false
                    SSDEEP:192:IfGsPejaVZWzIZKpnFFt0HK5+2Y/SLopWR:IusPe278IZKpnzt0q5+qVR
                    MD5:70DAF02EC717AB54452FA4C707BCAC74
                    SHA1:30F46FAC5E96470848C5A948162CC12455A05154
                    SHA-256:58469BA93EA36498FF9864EB54713A001C52106DE97804506D82EE24B816712B
                    SHA-512:E599FDC22A32CFEDBB23EECEAE0B278EAB9A90959FE6ACB40E2B201E45A7C19261AAF529E7A0D9CAF2A9A4C64C7831343F3BC20810513990AD5D38A32741564F
                    Malicious:false
                    Preview:.PNG........IHDR.............IC......sRGB.........gAMA......a.....pHYs..........o.d...cIDATx^..S[Y..I...B..`...N....t.q..j...+LU.....O..sF.!.I...w@..H.Q.w. ...s..{B.....2......i..q..z{.}^..............J.fQ.....r.\WWw.T....amt.t;...6\N.........z.n...].u.z..Q...?^........;;;;:NO.}.c....<-...........({.^....t.k...F..[m..:........R2...%.y.l^OOONN8)....\y....}...}}.}.Hy6.^.a.....\...!S....K..|>......s.........l..P...LFWW.l..RK..b.h.h .3.F..|.|..~..........e.aa.........0H...<.Y.a`..xA!...7.X....xd=........h?o5........Ay....?6...........*..tb.9.*j...S`](.,P...9.2j..?...z3wD.[......L3.Ng2G|.......&..0ZK1u8.H.2...Z../..P(....BA..aL|..a.Y:.....J...5^x..'.\..&S...L..U..;....<{..."..@x ....J.N...;....WIht.<..B......!HM...&z&..6u..hF..G.D..B..........A.....n...GG...,.,.Q....X,`"....r.........3d.{o.(/...3.H...x:sX....h.8... ....r <..DB. ...y.N...o....5.......L&w....v....w..D......!.a4...."8.U.|.0m.(..zR>..=.+.L.....e....Yd2.-Z.7..D"..pX.I.....e5qYa._&..3..J..++
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):1604
                    Entropy (8bit):7.814570704154439
                    Encrypted:false
                    SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                    MD5:3F1535054D4F9626F0EB10CEE47F076E
                    SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                    SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                    SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                    Malicious:false
                    Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 167 x 131, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):5386
                    Entropy (8bit):7.943706538857394
                    Encrypted:false
                    SSDEEP:96:x4F84/zVJWedudPZZRdbvczHe2ftFJ0y8Ea5b2AELJj:x4FTnodRZ7c7LrabEaMAGp
                    MD5:DB48555480A383CD1D4DD00E2BCFCF29
                    SHA1:8060B6FE12175289F0A71F45B894030A0D9F1AB5
                    SHA-256:807723D8F90A5BD41269A7A62817547026A117D666D5BEF454EB699C97CA3FA2
                    SHA-512:2614C04686299CEE8D56577A1E836A26076D42E041C627177FDB295629F6A80190910947FA794A094C55A45C3D70725EEF29097118E523A38B50C9263C771A41
                    Malicious:false
                    Preview:.PNG........IHDR.............gI......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..xTU..M..B...P........)vQpQ.ED.""......,."....*bC..VT.. M!...@z....1...Wf.w..o29...=.v.TUU..^..@....S..<..;h...5.9r....x..7N{...=........'...N...u...9..5+YW.;..N\..u...9..5.....O....,.K..'.../.....1..T....>.f..9.xo...u.xo...u.xo...u.xo...u.xo...u.xo...u.xo...u.xo........'L...g.UVVz.[.n)...Yqq...Y.f.)//_.l.W_}.,........S^Z^Y..++.*..pF.....?...I.&...O,.k.d...~..w;Q........7}1y......e_............=y._U....{..}.w.O..~.z.{........W\q.."........^.h........}p.+.>m...d...4...`a~Z^....me......:N]..1...g..y.f.......l..g.).......e[........Z..RB.KrJ.....#...{..eff..v.[[<.n..?{.....SN9%...V.yE...s2..........e@Wz..I...B.r..<.-.=/t{.v.|..J....,.@.A.v...s`/.....6f....L?.z[T7..)S0.;c....\s..z-C.....v..}Y..{..j..xF.....'.#_..C....k|3..8...N...5......f....3......f)-.p..%.D.v.v.].f.......33<<......[bbbt.]w...:.r.....z....q..=....m.uhD..,..zXg
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 230 x 68, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):4181
                    Entropy (8bit):7.950380155401321
                    Encrypted:false
                    SSDEEP:96:L6ousL3eslFAmjb89xK6YiSTwtw5dTA1W9lQ:GoFiUFAMbsxJYieZ5dGklQ
                    MD5:BC6C08F8C2C6D1EEE95ABFC40C3C3669
                    SHA1:44DE7375375880ACC24938D7E92A837E85C35321
                    SHA-256:6E54B502C46E1AFA57E28B8ACCCE24F102399F31407827A91E4CD7A42FCBC746
                    SHA-512:2AF4A9B87FA4F362926CD77F272CECBE3ED4F0E110FB8F30F661DF7C61B77B9FD8E7716EEF9177B1038B68C792CA4F844F729DAA48B2E38B9945EC9CB44BB720
                    Malicious:false
                    Preview:.PNG........IHDR.......D.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.yp.....E-.......-v...VY.a.d....R.euF.).KH@.*B..u@YdQ....!&.tjg.!.,a'.L..@H...{'\~yy.....w2z...s.=..;..s.......]..j..b5d.j.X...2D......r.\.#..f...Bl.....5dC....r...............:m.....s..j.f..jK....y.^....'8.....<......g.....=.%..2.p..}<.....G.....Ix.m.4dm..B.......0?..+_.*..c..n.......?....wa..l...p....E.Ly.}...*...C.D.vy).....@.>\...3;.`].q..m../.d.B.../......~.p.U..'...sP\....YH.7.../....R!...O...'.....s....<|.f)....i.{.I..l.a.n...?~.{...h...s.e..-..Q..R..@<;.y.G.+n.....Y.Y'.V.}.o._..?...,.>}..\w....`+.}.{.p"d.RO=&.v..H].....k...X.c..z.{........}.n....s:c...i7N...|....*\..O.*....)w..[>..E..}y....q..u.!.z.D.[`Uf.Y...>z\..x.B.h" \.}...`...|._.....G...hY.../..6>..Z...8^..k.E.5d#..a."....P.CR....OL..U...qY.{.C.<~I=V..x.J..*k.Y....z.;?..^...3.4|i...[DL,..z].._..a.....(s./...W~..q*.\#@[R.N...@.."..=....\q...<.......p...+J..\#...(.,....OQ...$L...G...
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):14553
                    Entropy (8bit):7.951135681293377
                    Encrypted:false
                    SSDEEP:384:EF7aDrPYJ1n3kaEf61xD+KvdokCixTQm7QA96dNT:EF7a/PMeaEf61lT6kCiFQCQq6zT
                    MD5:3E9F7D399DF9CAD3669B7A5445EF7074
                    SHA1:2FBC965DC03EF9203581F595E0D7AB1734726ED7
                    SHA-256:76C80E31F37248C3C787F7972A7B22038390F9D81E72E650071A6F36D36AF27A
                    SHA-512:326F8F9CBF829BF80AAA96062A57255A36EE04DE310634327AA075D14129CFA8E36E48AB2A00B10F9BDC1D94F1AC7A9E41D0D063361920A0332EC124BDF4C3EE
                    Malicious:false
                    Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..8nIDATx^..xT...!=!$..%t..H.tP:.HQP@E,...QQ.^.....* E.(" ]:.K..R......p..n.9{...sv.}.....7.....o..z...,|.......M +.....w........O...>.SJ.O...<...{. .x..g..I..H.......V .. .}.PO..H+$@.$@=.=@.$@.......VH..H.z.{..H...!@=.#...............C.z..GZ!.. ..)... .....T...B.$@..S..$@.$....>.i..H......H..H@...S}8......POy......>....p... ...... .. .}.PO..H+$@.$@=.=@.$@.......VH..H..zz?.......$@.$`i......c;.n..i...0..........<......S....w..c.....y..F4.p..3~..|.]....s.6[..H...N@.=M..|`...3./...I.....'..|..K...r|...nX...'.. .G...ib|...MY8|......9x..Ur'.. ._ .....5..H..d..L.$@..I..o.;kM.$.?........K/.wn......Y....E..%K*.=.......Y.3.!k....[V..WG/?i..H..." T.,z...6h.[..-%9....WMY...z.vH..H@/.BOe....g-P.@.......lH.O...SJ}5.|....?.^..5^}..$.. .....S.@...*<.gJT/......_.R.C.....rj..Cg'\K........K....~Y....l@..)..l.k.s..Yr.....Z]jG..q.+..G...;lNJj.}..T1&&.. .....?...|....W<{...g.&'Ca
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 454 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):8184
                    Entropy (8bit):7.807848176906598
                    Encrypted:false
                    SSDEEP:192:ExqMHYnnEnntvA4Mesu3SXHycmfIEFQp1r/:E0MGEn29esuiXHt0FQp1
                    MD5:5B386BF9A20766956A84F67F913F23D7
                    SHA1:6E72E51F5B4FA64E52D2B80B41409B3DB927A3C7
                    SHA-256:DDF6A1D5B29BD69C65A148B1247FDE8389CC56865E4398E4CBDCBD68A6555043
                    SHA-512:99B4109439D9A688D7747C6847E0FF7399CDA01A89C3181789F913E757A82EE4727F95E506F4B01930EFC7C6E229B94BB89E385B56BC009AB5CFE332585660C5
                    Malicious:false
                    Preview:.PNG........IHDR.............s>.Q....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^...]...!.......!.YTP.A......-..r..$.E.J.I;....T.M.UE[..Q..x....wKB=.m...4.%..|:...9...\{..o.3..g.o~..~s...k...X.r....... ..@Gggg.?.... P_.]]]..*Iu....C...h..$...:... ..... .\.......@R..... ..$.k....@0.Hj0.8... ..r.@....F.I...G.....T...@.... ..P........5...@ ..$5.J.A...@R.. ....#...C.#.@..H*... ..`...`(q...@.I..... ......%. ... .\.......@R..... ..$.k....@0.Hj0.8... ..r.@....F.I...G.....T...@.... ..P........5...@ ..$5.J.A...@R.. ....#...C.#.@..H*... ..`...`(q...@.I..... ......%. ... .\.......@R..... ..$.k....@0.Hj0.8... ..r.@....F.I...G.....T...@.... ..P........5...@ ..$5.J.A..............W_...1c.l..6..`...@ ..I.S..I.I'...5.\..;....'1. ...........c..k.u.Qs..}..g#b.j.@..Y..QR...n.!...-......h..Z.......Xw.U.~q... ..@.%.'............. P..E.T.b.:j.(F..p.... .C.}3.'.|..z..w.a.....\{.:.4[.lY..~...x..'/....g....J..9.K_...'...:..;)......SO=u..E... Py.qf..}O7.o....u?:....6~~..9...?7.
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 213 x 85, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):1924
                    Entropy (8bit):7.836744258175623
                    Encrypted:false
                    SSDEEP:24:rloPN36BoJ9JK5lncTww67QKf5wX5YgM5s6cahePwnR6+eA9zQU13ALcVz7wTQ8U:rYN31JH6lcbjMW5Ytmyqwp9H7wY
                    MD5:B1FDE66F75507567B5F0C6C07B01A3A1
                    SHA1:80B8E6A923E853232F66C874367E90B5C9CAD7AE
                    SHA-256:B9C82D2F31BBE409D159EE3C9129CBAAC7C6F6C81637AB9B6DAB3C11AA74B7F1
                    SHA-512:FC8C6038D3C2F5765D7524E969574ACD10AF6FCCFD45FE7C6DD4A8C2669B13EE3FB1A8833E94A046AB7037018170B5B87B1A2742E0E10557C413AD634BDF343E
                    Malicious:false
                    Preview:.PNG........IHDR.......U.....Q.6.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].O.W....G.lT^M*..J.....".4*....j..H..R^.".m..5....&..j..B..`.`..>...X......]z.[&.>..ef..gB.d...s~.=...3....m..(E...~.[....... .. .E3..7.4.......}..H._.D.,j.)..q\.....7..#.ag.o|.?.......;C|.#.../v.H.......o~.{G......H.|..;..v...G.._...p1d2..&......QS4<..i.".X.....1(..GR.R#.}.!.E<..:LLM......s..:"......Fa...b.....\.T..~OD... ..:j.~..p=Y...Y......?.Y.A...0!6_p.dKctjvZ....\.........V..1)..:.....;7:...(.[...7.....u..'ra.....S.]..........7.#,[..<.l.....[.........90d[.2a.R.........E.CJ..C..S..*._...$^...Q..:>hx.k7.`jN:.W.X..N..p..K..."...q....a.Uy.......[d.:vmkk./cW.>.K..C..?\d...'.@s_.?&.....V .?F..;k.....%+....+.3bk......f....T....S.(2.=...?gQ...K.._,.#....?.1W.......m2.....Z...-..:..?.#J......KS.P|&[<..........Dd.....\.....W$z].k..-..8...>..Q`Yz.}w&..._......?.)_[T...:wy...O8.Om......l.....\....]..."f...........q.o.V>~s...-....N{.n....w..O|.D...
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):11886
                    Entropy (8bit):7.946442244439929
                    Encrypted:false
                    SSDEEP:192:sqNuEpzsnKxkfLaZCdMh+cLApmRausyZwYMAisQKShDBlhr34ckckcZ:JNu6DMLaZsMhtLAIa0wYMAvI5V4DDQ
                    MD5:875CFB3B5C3619253223731E8C9879E5
                    SHA1:6372F4F5BEB6EEAE3EDBE5B62EE73039B40AD01E
                    SHA-256:CC69BAE5D2C8F56B28BA4E3C6A11F57C4E8CCCE69943ACFBE7E63B4FC90EE5F2
                    SHA-512:47F45A3275B8454F8000F4567153DD7D4AF3012005D8E34CB18AED6AD69083BEC753E607F275FBF3EFCCB7BA00310A04ADFBD5FA5B73E6BBE47CE73901C35CA8
                    Malicious:false
                    Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..x.U..I...JB..;H..."..(U.EE\\..._v]W..b...Az..{G:J..B.$...H.IHB.o2xE..3gf..w..2....w..s|.....C.$@.$.....t.!........8......RR....<...6..P||....$@.$@...PO..$@.$ ...T.GZ!.. ..)c..H........H+$@.$@=e.........S1.i..H....... ...C.z*.#........1@.$@.b.PO.p... ....2.H..H@......B.$@..S.......!@=..VH..H.z.. .. .1...b8......PO..$@.$ ...T.GZ!.. ..)c..H........H+$@.$@=e.........S1.i..H....... ...C.'++kH.G.=Z!.U...73o^.IH..O|jrj.D.......I.M.........Kph.............R.x.......RU8_".......j.......B"O.z.|.9.."..L....Y.d.Rej.-Y.dhX....:.xH.z.!(>&..4.....O.<..T\.%a..e...*..UnR....+j...2.."..M.O>.z......T...].j....m...S.`..&..)....f..2..............+..SP..?.a...=.....3......K.zj.5.fP.......2:..?.....%....d.qxC..W.~.._....!.W..6....iJ)*.(..wg.}.]sw\.r]...r"...e_-....5_9.YN'...PO-.d.:.%..wZQ...H...JMJ.6c....|g*..,.3.....T...o..Nyc.W.....A.3.._...U%...PG.z.....&.%.v....AIm.....~.
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 171 x 50, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):2270
                    Entropy (8bit):7.845368393313232
                    Encrypted:false
                    SSDEEP:48:3Cxnazs22lovji2Ez2iqBU2C+hJWizJNzIu1coqAYClBeMsk1:3dm2Ez2iUhBzhyjAxqQ
                    MD5:6EFE6733E10E011FFDD6711B5F37C9E2
                    SHA1:C72549E824EAD899944A38C46FBC28BDCDAAD611
                    SHA-256:92B5056DAA03DF3EA85AF49FFE4F9CFE8699BDF3539576A99F02418FF49AD9CB
                    SHA-512:EC14B553A5780CD9B33D438CE13A6932DE43E346D8D2DEC8D093A6A2048675423948F8E2C604A73460980C3C68D9276B65D76C2A6BC7B24FDF10CA92FDA2583E
                    Malicious:false
                    Preview:.PNG........IHDR.......2............sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^.\kL.W...*.F......@.*.(H4."iI}..B!.iD...I-....y.I.h.....<..1.....C..(XSy.l....,-,.......3..3...;.{...{.{g.....Q..x.T/q...F.V...B..'..?{:.:...`.........+.0s.e...w....{.`. ....5...d..9S]../............$Y.>.I....i..8....;,r8r!Ee'"..!*.&E.....n...=.@..Sp.GF..c*....1QH3....?,.T.el......t?..([Q`.0....k.G.....X..C...k|p...I.q;.d..N....c.u.a.5.%.k.fS\)..H..T.~l*k.[.n...x2.1...........%...yK..a..l.[.?#..fD%.FMT. =r.jt^..fT...c.&..Lr..............\..V.ll....Br^6..U27...O..N*..K.gm.K..g.;..l..Fe...w?..Q.E......0.........7...(.e..t...x.c6..Q..n.92:%....l..4.h]Z.....w..|..!.p.~..B.y..&.......gl...\.wI......G.6.K.$...%.-.h]\8.LT.....}{a...^.i......4.0.ji...........n.pk ......7t....U9..b...I.....#...<q..(|=F.......0@^......+..........X. .>p....S..t.].f.x.0....7d..n..'..'... .M.qqn...G.t8'.=..V.PK....K...X.z.#..I.....@...Y....BH..I.....,..K....=`&Z.41$..a'o.:....i{o
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):16003
                    Entropy (8bit):7.959532793770661
                    Encrypted:false
                    SSDEEP:384:1l+zN+iNurNE/tBdEC/vkape2XHYdhOm+Bl6C4:L+zN+iNurGNEC3fpe2X8Pa+
                    MD5:3A5CD52E925A7C4A345047D8F06C3C41
                    SHA1:9C02828D83206BBD3EB58930C8C65A6CA5DBCF40
                    SHA-256:477277E8CAAAE1D3B3EAB5B3660239AEEABC433743A191727B1A71E529872AC7
                    SHA-512:8D8B6AC645ECC7C8BD374E6190819006C71AC0B5993419C42463009116214E5EC4B4235D94B4AE4CDA132E7DDA9807ADC51525824AC5F12696517FFC8890891E
                    Malicious:false
                    Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..>.IDATx^..|.....+)..H..C.K... ....x).rU..T..*E...;....*.@Z.....@...9q.g7[fgggg.............1//.."@....0..#.t..f.C..."@.....@OIR.#P...0..$...y.Pl"@....( @zJ]...." ...Si8R*D.....S..D....i...J.R!.D....R. .D..HC..T..... .D...... .D@.....p.T... ........ ... =..#.B.... =.>@........4.)."@....).."@...4.HO..H..."@.HO...."@..!@z*.GJ...."@zJ}...." ...Si8R*D.....S..D....i...J.R!.D....R. .D..HC..T..... .D...... .D@.....y.?.`.T... .f.P...$47........~E....!.D..X............].`....0..N.a...>[||...t.T.w *.. .....)'...=X?c.......+OE....<-84...=.....w.8...7.Ro&.D@!...GS.....s.......:...Gg..8..T...u...~..............<...S...../Y.......W........#. .vB...u.. .+.999YYY......wf..._.{6....=..]>Y?..;=02eb......2...;.%..\...P..R5....XMO.....6....W]...3g.5;.n{t.......F7S....r...[n.......AAX..j[.j.;.neef).2.....{ ..r..{7.-........i..S........<..pm.u.V....M.333....K..Mr.s..Ek..=t_.#.P...
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 454 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):13241
                    Entropy (8bit):7.931391290415517
                    Encrypted:false
                    SSDEEP:384:a99pmP85w/MAMszG+iHGgrw8Ld+9aEsjQR:mgP85AMs6+UtrX+9mjQR
                    MD5:01367FEEE0A83E8765E971E0D3740900
                    SHA1:CAE1FD22CE2539FA2ACC0242C615CB7EA3F866E1
                    SHA-256:18B8E53505DA3C412890F4D74AE2A6B26C4B0827E15E830F92A024D292AF20ED
                    SHA-512:8CFBDC014C42AE6417038B80424D2E9FBDDD7DFDDF579E349C3C17C9B52AF33A72463154D29539457C4ADAB2DB00CC28A67902FA8D9209E4AF00EDD46D52E5CA
                    Malicious:false
                    Preview:.PNG........IHDR.............s>.Q....sRGB.........gAMA......a.....pHYs..........o.d..3NIDATx^...U...Y.]:.T...G.5..lX...B..Xb4F,I0X.....F...("vET4H......*EX........wo9..9.|...rw..;...;o......z.....B.......v.mn..>......E."....U...4s! ..F...u?.@...! .~F@... ....p..Q.kP.#! ...(U{@...!....T.TGB@...Q......B.5.D..A.......~.*.U{.].....S.e...K.A.......7^?....D...h;...!.Eu...o.^..B@..# J...B@....(.5(....B@..= ....p..Q.kP.#! ...(U{@...!....T.TGB@...Q......B.5.D..A........T..! ...k..R].R...! .D...B@..........:..B@..R........! Ju.Ju$......j...! .\C@.....H...! J....B@....(.5(....B@..= ....p..Q.kP.#! ...(U{@...!....T.TGB@...Q......B.5.D..A........T..! ...k.D.RK.K.m.V.......(.^^^ZV^Z.7.a..........T..xsqYi....L......z....}....?..yyy.M\.b..U3W.0{...~.`}..M%.J*.w.mdv.&*..@....R..o/.^..5...x.g.>..ag....GM|t....\<s..y+6.X.? ,.R...-.W.m\..o..0g..i...h..W.Z.i...2.....o.&..@...-.B|.K..^.....u.}.M..6...,(...e.V.X........nkE....5.8....-.!.TtRxs....Q..2}.-..`....mX6i.w...
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 164 x 89, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):4190
                    Entropy (8bit):7.94161730428269
                    Encrypted:false
                    SSDEEP:96:GHfueo3dRLZKOSYDzGsEgfB9nqS0WKt/z2jOrrz7yrT7N:8A6AzZfBtqS0WKNC2vyx
                    MD5:8B3AEC1986A522951942BA72B85CCAA0
                    SHA1:7E0DC78FC65EE4C804A4B0C72AA53E2DFDF26C14
                    SHA-256:8B02CEC726DECF033B67689F369FDE1002ACFD5F8C32E0F248AC575997204F2F
                    SHA-512:8EE1A1F6F0023EB4F60760C2E23EAFD56E6D298CAB49D819CF1D62C0CCF608D4211D3767856255F7CF8FF45AD835FE5475EB92C608989C522CD48D00A050B189
                    Malicious:false
                    Preview:.PNG........IHDR.......Y.....?.......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.]ip...fu.VBBZ..V'.>........CR......?r...pU\....v*...T~.U)0..('`....."..,a..Y..$t!...D...Mkvf4.VhW;S........{...zZw...i......fj..$..7......[Z*.[.[..Zk...?.t:M..,..`.^...X,..sUK[..Rg.=$..!.3<....74...iY..i...k.,.fA..Z.n...`G.%..H.l7..7J...u.R..6....E..!....N@.....M....Q`...U2.w.WP[!fX......c ./@7Mz....^...k.)....v.Q`..z..1A..P.{...||...vY.....>.`...K...m.?CX./v.8.....]..;...6..kw......N....z.Q...f..q..xk.5....;.?.Z.c...`......4....?.....VV.u~..<_......sU4e.....g.c.G....O/..r...`.G)....#d5.O..w..{....twL1l.)#&hF..K...M[@.Dl..V2..j.3..s....3M.....v..!....V..c..B...|..e.1....7.WA0.[.\.u.).$7f.+.......8..e2K/.%.Ii..`w6w.E..[?_.?.?..I.k2.s....]..f....HM.?w..d.9..Rr....Y.c.}.s.zk..rc...a..I(9~........m...Z............I........7.K:.:Bf.......m..1.......&..,...?a...c.@.@.g%...s.#...;..c6...g.lZ....}.WX.3.8.....W....N.w...L...}....?.".......;cI.............pS
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 162 x 89, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):4081
                    Entropy (8bit):7.943373267196131
                    Encrypted:false
                    SSDEEP:96:KQJAeRumk2zXWySlEmWL9zi6wknB4qLx+ppNhQrW8Oy:Ke9S482LE6wQB6pNeqi
                    MD5:29B87BEEC5D3899824AA390530CD47FB
                    SHA1:55108E8E5692E4444F72EE5CEB91915E7A2AEFC8
                    SHA-256:F00E4F1C9B1D9ABEAAEC8E5CAB02A07FD74F00ACE15E36C6F6469DE5AB07A9FC
                    SHA-512:1A5AD45BBA8C29C32CDD3C4D1E460C30ECA305D851FAAC73DF165306BC338337525680B9906D367A0CD3852B9D2DAAA8FD0603276BA969495B4E29C7EC8A3530
                    Malicious:false
                    Preview:.PNG........IHDR.......Y.....2.h.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].LTW.f..O.a.......*.....k...M.Z.n.q.h....ht.f.M.n.6..t.h.k.h5.6][[....X..p...?..g.`..7.o..of....^.ys..{.{...s.UMMM.(.l.@.l..R?.......(0+0.......5...*.F..#.].........1.....B[>[..a..L.....x...0.5t.v..S.h!.........Y....B..&.......f#.w5u...............0...x.sC....a.4j5V..Z..n....K..>...3t..wm..3hB.BD.P..FkcJ6.....O........7...S.........6..P.]mf.+o....w..<.......Y..Z.whd.....*zf+.....#."_?....`.._... qf+.?.?"k...zgME..j..!.k.U*.....&z..N....ma.......R.{.r0.S..KP..fU....g~..=..Q.n.*.* 8T=/'9,*.KDW...GN;0(P3_....1......'.;..;|.L.a.&<*\.d......o...Y... {E.F..}.e.\..=W..#..W....c./~..b.EWXI.#.''&.........:....X...b.....+2...5..6+)we~ja:lZ.d.Ey....l.2.5r........!.!._|.A.....j2.5.o.....WOM....V......GC9..'.... ....C..,._...cS....b.1.....t.........._........a.3..K..>V.f]...~....K...-........#.o.Y.P........a.7..,#..'s...T.....b..]..3..dPPP..Y.i...c.b
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 452 x 277, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):22634
                    Entropy (8bit):7.974332204835705
                    Encrypted:false
                    SSDEEP:384:5ojjyi45m1/9gyhgFsH1ud103Pl39o0qjfsH37mNHy7QPaNbZy0:+r45m1/BWKy10tN22rmNHycobE0
                    MD5:548D234C9AB4021CA5FAB7BF22502465
                    SHA1:2F7495D250DC86EA99473CC342D164B859926021
                    SHA-256:7D549C3418CD90F42571D00936B23D242837CE2A8B19FC4C719E182ECB2624C6
                    SHA-512:261523F5EAE6FCE2829B53AAC5938B1A0021C119E00CE82EFFDBD690FE71064E0F3B313ED1AB2F67A16C488AD5B1A91F5AF98029D88A7896F271C108410D42C5
                    Malicious:false
                    Preview:.PNG........IHDR.............._......sRGB.........gAMA......a.....pHYs..........o.d..W.IDATx^..i.=YY6z@..DP.i.IAA........l.Dd0"p0.ON.~....s>.?zbH8..%$`....b7..=....25*.".L. ..u_..f...j.........Uk..^UW]...u..}.{.]t.-.(...J......e...t.....@i.k......_.(.....@...Z.6J......2.O.-P....._.u.=T..4p...e..q..5^f~....@i`....?.....@i..k.........?...u..O|bN.~?MbT%...@.LO.Or.`....$..y.{..o....~..(.;......SNi...6....w....~.{..^w......~.S...g?../|.O........7_...Oj....|......40......9....?..<.3nw...x...g...7.....(<.d...(3.K...;....\..:...'.5.....&...>...t.;....8..SO;../...._.}.{..D.jt.......jc...s..........Z...0q...@......Z]S.(..o.....Og.u.l.i.-.9..)j..~...5.l}..........G......k....Z..c.....}.c.?.\....t+u...15p.....[|......2..;..;...........w...........v.7...I.-w...K/.J...[..N.....W..U#...._.j(...//z.|..kv....];j|../m....t.9.;-0.:.4p..@K.....~.9.$qu.E....!.9|.m.+`).|......x..vak-].../.....G'....4.>B6$.......-o.q..L;*.N+....>...=.!.Y..Q...?......7..,....}
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):17289
                    Entropy (8bit):7.962998633267186
                    Encrypted:false
                    SSDEEP:384:ruwwXKZuqnOnZprU3+OXBruY4UkcY+TpI/BSqCrEoMXMEr3KbzHIDqqAmk+xob:tGcxE4PBruV3Uy5SqCAoMXzrQHoqAk+m
                    MD5:708E8EB906BC105CCA0535AE669AA651
                    SHA1:38D82DEDFE97D3001188C2E18FE13BD741FD520F
                    SHA-256:1C3D07765294566E17270D0F3B9257A3DB7905D4E7EF746AEE80CD591CE0308F
                    SHA-512:1EFC74C28190DEE2D2732390B74049A1B120F05EFB8DC6925207C6990AD20450FFAB40249899A9DBB82E8F92A61F770E120A450CAAC7F8C5F0742586CCE0EDB6
                    Malicious:false
                    Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..C.IDATx^...Uc.._"oB.Hr.m(.0......r..[1.D....R..q)%FBDiB.."w*.k.Jz.Y..l....>...9{.......g..Y.z~..k?.z.^k..+V...! ....(.....\sM.tD@...!P...HW.S....u^.....@.r.^.....B@...U.H.J....... }....".....>....! ..A@.4..EE...! }*...B@....i<8.....B@.T2 .........xp..! .....d@...!......(*B@....S....B ...O..QT........! ..@<.H......! ..O%.B@...x..9...C'|..{.>Z../~^.s<<V4..ujo..v.Z7..EwT.....@.....?.......~{...K.........C........bB@.$.....C.{....Kf'S.....T.*&....@<.....'..D`...;~v.DT]...r!..>....ru...}.....#uG.T.....>..z ...3v....P.M.....5.@<...?....F.}..c.W[.._!P...O..>.M.d<..J....E .}ZZ.+.5v.p>..N.{B....>M.Nzfb...OB@.." }.D.y...IdK<..! }.:.....f.K..bX.T9...&T.&?.VB9.[B@..@@.4..1}.4.@H..-!..}..~M.<.z..I}.G....>..S...N..@yj..n..s.d._.....(..R"....Wf\.oO.^...\h.\.`)...ni.'.].vk.1-.k.^....#.,}.{.RM...~Z.S.. .@U!.&}......h...{K..@.........W.8.N.s.Y.0)..f+...%4.......5.@j.):k.+3...I..(
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 452 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):13737
                    Entropy (8bit):7.916899917415529
                    Encrypted:false
                    SSDEEP:384:jgxmx2Fa/+76A6M6Y7rSYRv47cwbkkapeIiRmDGd+gUwOSpQ:KgyoWrJWRkkRXmad+gE8Q
                    MD5:830632032C7DDBCCDE126F4BAE935540
                    SHA1:9FEF1DA9FF1D7762B779553B5F873BE54C8D01EF
                    SHA-256:2328D09EC845433DC31808FD6B12616F1D28B9B3BA7DD969ADEB6C32D8EB049A
                    SHA-512:5C17EF9A0063499F2C34FAB2C4D968D29E20F20868921FA914E5737995AA0C166F224995109FF7ACA57B5B0F8647715DC670C4AEE385F61B5F8E6E8422C49EA8
                    Malicious:false
                    Preview:.PNG........IHDR.............w.pl....sRGB.........gAMA......a.....pHYs..........o.d..5>IDATx^....E...,"o.....&....AY$....AE..".l....+G.>AP@D..e..".".A.Y.@...K..IXB !..!..c1.On...===3=.3=.>9O..u....w.z..-].t9]B@...!.......Z...B@...^G`.Q.&S..u$d....B.Y..P.w5[]......B.m.D...! ..@...Ls.Q"....."S....B ..D.9.(.B@.....b@...!..."..@..! ....T1 ........i. J....B@d....B@...4..%B...! 2U...! .r@@d....!......*......9 2..D...B@..L..B@..........D..! .D...! ..@...Ls.Q"....."S....B ..D.9.(.B@.....b@...!..."..@..! ....T1 ........i. J....B@d....B@...4..%B...! 2U...! .r@@d....!......*......9 2..D...B@......5jT.@.{..O.;k....>.._o.+......{V...&C..(?.m.....F....gd.....?.....3u..x^L.1n^...@../.....XE....L..!...t.....L..B.).=..sn..U........@.O..$..o..L.....g.(D...(....Lo8.....,....f;o..i.f.h.9........\./..[W.9.....+....,X..+.d.....Xc..7.p.m.Yg.u:YO.V..l.t.].Z.g.U...]...5.^..._.~.WL...o.3f..s.,Y.X.7.x5...K/-..._.......{........W.(Y....?...!....W;.....iwNMW.............@+Q.5.#.
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 185 x 76, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):2332
                    Entropy (8bit):7.8822150338370776
                    Encrypted:false
                    SSDEEP:48:jB5Gg4vMs30WIn5IVeRy1bY7DqbqQBAeNjukXlN4AXat:PGYuEWV/YH7e1uA0AXat
                    MD5:91CB7F1273AA003076401081B8A22237
                    SHA1:5157144069E7D2FDAE60B397BE5851E75BDF7707
                    SHA-256:80682DD6472E8D1136BC5E20F6DE87B595562414B19EAB8E965736FE992921B0
                    SHA-512:5A8E3C0ED0DB94BFE359C63793F12F3D7B3C37F3A13A5C96634BA1DC8C9E50FB1142FE4752FD9FBFA39A682F78C54AF868AD337EAA787801FE5F66D8F55A8196
                    Malicious:false
                    Preview:.PNG........IHDR.......L.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.\.LUe......Ji("....9....-.."..5L.Y.Y.....$350.."2.lK3Cg...T..DWZ.......i.?!<..~x..z.......w.sw......9....s...w..l6.:....p"dH...F..B<...qE,R$G\!..E..".).#...."..{f.PyI.d..l;....;.=.S...O.S[.\Y^P.aj]9*Y!. ..~..#...S.s...l..h.[m....%...P..@.kG......G..X.r|%..AO.}-..G>35..c....Ac.&[W.d..+...zG........=..l...VS.d..+...tGd..k-._.....oL.:}.p.~.W$C..|...I...n...~......,.i......e..=..?{......>r~.Lw.+2..\w.)w~...c....h..u..%...PE...f..'..m.ZE.1.\....U.`X......$...P%..UH{[K..o7~.k.49..W.t.~.^_..7.,....f."q....+....;...~;.c.......Xb.\?...........0h.lV..WX!.....ljm.1c..U...[..X.)......B=.0~..W...rO..j...ehI5U:..66V5sJ.....V...]Y>...1kQH..2.........d....S....I...+..].p.....m7...Z....s.D>.K/]..?.l....2..=..~.mq..".+.....,..8. v.o.).Z......>..Xv..i...TA....M.....>[X...Y.7lJ..e7..S.....02q.O&9.......:L....N.......W....d..FqE..T..N.....R....kXv[..j......g.K.\@`.M..B}8n
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):11332
                    Entropy (8bit):7.9324721568775285
                    Encrypted:false
                    SSDEEP:192:vpXZavBpl00n1Pt7JquG9GYHDK/5cxektxMQjcie9ZZkx30eXJIb8FKRN:vpZaDyc1P1Je9G62/5clpjre9nQkeXJY
                    MD5:31579CA3352DF8FA4E3E7F48C7CDF672
                    SHA1:AA682A3C781BF8EE43B5EDC9718E64CB79135F25
                    SHA-256:B0E7824BEE2C896279457D87E61E902431BEB528D830524CC4DFAE126E89FC24
                    SHA-512:782FF9492E3ECB11C72D316DDD94D1F3E94CD908FC9452A37DA6CA30ABCFE9AB2BCCED8583A569DA68626BCEC730408AF86997E295637BF64AFF5BC768F3E309
                    Malicious:false
                    Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..+.IDATx^.{...u./-...&....6..+z..Q."b*. &M.d-e.*.. ....J..Z-T.Z$....R..F...%*`bn..<.....W.E ..w....^...;g..[w.5w.9g...3......t8t.P.?$@.$@.5...=.8qb.... ...5...a=...#.y. ...@B.....am. .. .......$@.$`.....G.B.$@..S... ...C.zj.#[!.. ..).......!@=..........}..H.........VH..H.z.>@.$@.v.PO.pd+$@.$@=e. .. .;...v8... ...................f.o_o{....~t...n.S.N..?..._..L;J.H ..,....7.}...|....7...b...|.........ObVa1. .?.X.....~.....t2..V>.b.}..0.F....%`GO7.n#~..F....K.~...FX..H.^....k.Z/.2v.W..M.<.;$...v.t..,UO.-]............D.....o.J..Y........5.%.l....{.....'O..dC$....=uks..;{x.,.N.=.."..Q]..w>.E.H........AV=...f.&. ..ip}._0.~[pf.`..9..v.W.,..2.E.$P........+...OcC.H..=..|..[..g%(h.....W...?...UDh..T$..?....|.]..)?[Wo.h.'..2P.1..!.......$.NO.5..}...c.;...~.x,|Q....B..6.@>..y..}...m...D~z....L#.0`_.`.s?|....I.....a...=N....c.._.2.._..6 .]...5....{.^>.lM..;n...k..9J..S.G..{.
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 167 x 92, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):4181
                    Entropy (8bit):7.943341403425058
                    Encrypted:false
                    SSDEEP:96:b6JWqvCl45Da8kuGzhRwZvwIutfij19MQ8EpW14LBGJVCq:b6JTCl45DalsBws1R8914V5q
                    MD5:817D5A35EDB2B0E052194D4F49FDA19C
                    SHA1:FA6CB2016C5F43B76102B63D60359139227E07EA
                    SHA-256:0A87B8418B7F8E6E117BADDA11D7CDD38B8B7320C6BA3D3E9AF93EB9ACB2CE14
                    SHA-512:E0686BDBFC589401F0EAAE2B1598199EFA285F8392742B1C928B9274088804B23DCB584B6FEF68CE6D7E54DFF9C10338104F4C0F3F80A04471F0B2E8F9935CC0
                    Malicious:false
                    Preview:.PNG........IHDR.......\......!2a....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.]iPTW..iv..D.....%DQ#A$...d..h,.T~..+...TM\cj*.)k.fj~L~$...L&...,...:.FdU..f_......._.n.m.....q.s.9.=..w.9......$..b.*..%....@A]A..%..<......l.h.+../..OSe.....]...>..C........^cCy.0nz.4<......g..?~..>.1ws.B....07W65.74T....=..v.......D....6.....tR....}]}....4z..^....7..;.."......^.....|=.#.=.32..o.<.Tn*Q....g.zN...n*...!/.........!....F..]...6...m...CX..~...+..U...E.|.........7]=rE?i(..$`e.%.`.....w._.Y...l.1...@....t.P..=.}..*...N...N.|.xS.5&.....Pe......Z.Z^XJkx.....^.....?7..._....Wsz......}G..]...\.....,[.y....}.J....'.R?a...G5..l.i.?....MH..l.DC^._.c.m.....%{;z.&.*+x;...S.....zxyH..`.._]...el^........U.T..^..p..z[.6(2x..,#;o##..}Zv|Z..............V.....0}Z....]..m.....x..).k]&e.._.W!Vry..%...I..d..}w.....^..\............m[.^.3r.......-8......j....>...Q..T..{\V\ptH.?........1..w....FHl...x.....\.`.ei.w..)`...g..V{..Z.....8..........o.._..
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 221 x 77, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):2599
                    Entropy (8bit):7.903700862190034
                    Encrypted:false
                    SSDEEP:48:PmCwDJh8w9JewaF2zQNXXj8zq1KM43sxXxjYbTgJW1MFsrJ075CawGjGj:P1Ah8UewaFcgz82Kx8xXNYb3id/yj
                    MD5:E88131C9AAC52649FF044905ACAB9B76
                    SHA1:34AE73B9165CBED0DDF33AC20E4B3E7D622C19BF
                    SHA-256:30F22340F582F9A352A7ED3048D1088F178E83CCAACAC1CCFD86852C8F9C78E3
                    SHA-512:97AFE8F3A2A3138613934AC737C390A35F6757BFC3D381EA7C7CD148F739932380DCD46D0BA6F590C274F8BFB4D4286B3C0433AA69E090102A8A9ABDD7C97EB1
                    Malicious:false
                    Preview:.PNG........IHDR.......M.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.]kl.U....B|E..>...*..Q........b[.K........m.(..... ...!%1%*-B.C~(&`[.....-.....~.w3..Kw.3wvfzn.2{..s.....{w..\....!.3..:..!..../..zD.x...O.K... ^.1*...8.G...z...D.$...........>!..V..`v.CQQQ!..-L...../3.2......ZH.?s...Iu\N..,3.?.p..N......<....E.<.=z..Iu<ll.dX...g....+.{X.p.....:..t...a...cKK.|...Yszl.N.:......KPs.):).T.5...&B...*..5j``@...(_r.V.j..m...?x.sg...t\.dz.'^.=.\.h..<.y....:.I...w..ze.m.\.qPJu.....D.|..@......W..t.+.....X....e....\H+.Ns%^r.VS.N.3:...&...._..#^....d! ..F.....xc..M...q...17.z...z&C...K9(.Ifm.35.v.>.'X,...p.:=.H...J.K.,...:~...7.t.....R..R..9..?....l../.(...0z0.M.f.)H..Y_"e......B........L...q.K......|;..L.........xI.K3.M..%........./..){....R....s...7....).q.._R.4O.a3......<..%....3#.|>..y...u...R'.P..$Klz...........,...g.....`.7..\...x>.{p\;>+.,.....e.-..Re@.N..FY_....*....]}...[..h.M.oq.S.U...c_}`......8TP....
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 232 x 50, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):1570
                    Entropy (8bit):7.780157858994452
                    Encrypted:false
                    SSDEEP:48:r+em8Tlk2APr2fEd72tTqiVJlcLzqeVzYwS:r+erTlk5S+zoyGahS
                    MD5:EF9AA5B2ADBE5DF68AC4F4D716DF7708
                    SHA1:363B93AAAB9DB2832F6CA0EE3C27C9310C344BA8
                    SHA-256:3D94FCC4821A135ABAAE6579011441B94F9C04DAD1E66BB5211B0C019A5968B9
                    SHA-512:EC9B024AEA46F7B97D14F0A7E12704D09B85F0017CC9E273CE50F2F889DFDAE81DE549CCD546BBB8F8BAAAAAB7781FEF77BF783E02CCC9605304552F7DD5903D
                    Malicious:false
                    Preview:.PNG........IHDR.......2......n.f....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.[MK.W...t!.fU..b!....*JBA......%-.F.4$.Nw].....E.$...)T......?@.O{...3w..y.=/"o.9...<.y...X....c.1P6..e.lx....0..J....e3.&\.@)............o.*>.E,;.....~..|....Z.3`K..W0S.&.L._..M.e.`..M.....i_.......\...6g..^....4..L.Y.9.$M...4..L.Y.9.$M...4..L.Y.9.$M...4..L.Y.9.$M...4..2.......q...&...........*.Qg.+.p.......a.:.X6...o2......A.....[).,.p......P......_..>......3.......z8j............>...fww.6....../....S<......^%.4........{.N$..`.!H....`........a..(.G^>~|txx....K\mF..'d.d:9J!.....j..i24.A...`O.......s.....?={....H'._..~..O......*>...ZXX.3...;C....\....%..s=...w<h.......0....~..y..._.......+.n.P.M]c...A..Er|.R...$.g...9*._.jg.....x...&+.JWM4xe..^....0...11.[.....f....r#.h.h$....[=t >...r....L.0.KL..B\..x........4J.0....vY...\dA. w...........g....};.}.....;.......x.|.....)......x....s....N.$.n..g<Z.q.a9.C.....oX..%,KNNN..i.8J..p].1....B>{......n.D|3t.-\g...Q
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 340 x 79, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):4490
                    Entropy (8bit):7.928016176674318
                    Encrypted:false
                    SSDEEP:96:WXKr7Xwf6Obg+XaGOnsjbbGSb+ydWtRvEOhDE6XqPeosv02tR45boo:3rTUgXZnsHKSb+n+8DdKlwm
                    MD5:7F161B19B937AB48D4FD2F6E5E16FDBD
                    SHA1:BDCE4F1C73E87E609A7FDF245A512CA4F73B35B9
                    SHA-256:C863C5E71D1116D69561BD0637F4FE4C4240E9CED05B8A5B056073AD13E6495D
                    SHA-512:E915B76FAAC9512D2AD11CF4E4530A19BEA1C7D8508BC218C69CB041F1EEABA3E2E03B1D56E61B032A6418829752C21B8354AF1335466D7E1528A06E6742A461
                    Malicious:false
                    Preview:.PNG........IHDR...T...O.....;.......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..p.U..'...rD.WX.... Q.. ....."$.ZHP.Z...C...........R..%G8R..... .R.C6..A.b...0...^...#..g..........z2.....nB...l..X.&._.a,...a,...a,...a,...a,._.73'N..ukeee.6mZ.n.m.G.}...n...a.9s.DGG....y...8??.o.pE1....Y.,......).ca.i.M.:5$$.........Lr...ye........6...8...z.-r....d.(.xc..U..^11...._>.QX..y..2...T...sss1..."A.?_.;w..S.F>......4.G.......D.|...@.K...............C...k...P...q....6.`QQEE................7;;;.._\q.k.|...\.z..6j>..n....Y.&G*.n.S$))).....r........}.{[Dv:,..w..A...`..........a.~.N.f.s...P...*..'7n....eK....+.n;:.W..C..9}..O..D.q..X..5i.s~en.c..F&..?.....l.]3r...W`..#..7o..R.@^..*...W..?}t...{.B.8..D...UPa..~..C...|.C].a.9..R...c.Y0..9.u...d...C.......X.U....WK.....5...'..PM.`...<. ._.z.F^^.EH.K>_.0.d..S...Yj<..~.5.?l.fZ0.@d.....*..G...K.....e...b.|e..Q.4.....('z...!G.....2..XQx\......X...2.\h..X~.e....Z....=....C.1.......w.....d.z.
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):11449
                    Entropy (8bit):7.91552812501629
                    Encrypted:false
                    SSDEEP:192:/zgGDSJ0ke0kBER0C31jm1OSZi6/ccccccc3zzRmKHDr1NFnAaLJ5rBX8iaD7:/UGe6m7XdJS86kvRBHD5/nAa95rB9aD7
                    MD5:163E6791C87E4999C343EC5E23843B15
                    SHA1:43CE3BAE19E22876483A7FD0E93DB45790373600
                    SHA-256:DEB2B126977EA150E49CDB3ACF4F5387639C7B7B5583454EDF55ADF83DFAB720
                    SHA-512:98BE1F4684F99A9FD2F313B09A113B5C310EC8BA8EB0EBF5FD69765E5B48B001D39999E3F25A7E76C7344DCF57B4F0BF2E4614FB0E0DFCCB6F02E6D1CAAF7FDD
                    Malicious:false
                    Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..,NIDATx^....E...@^.T.....H..$..(.!..3....O=Q...<.9.`@E...CE.(""..H.$..6.......]3......tW}U...w*~....W./. .. ..........m..H..H... ..........'...G...W.=#.M.$@.$p...........!@=U.VH..H.z.g..H........H+$@.$@=.3@.$@.j.PO.p... ...... .. .5...j8......PO..........o....+.Z.Pb.FH.......D.g\........._..'0.......9.>............&..PO.z..)-..........R....'@=U..I.&.g......../....SO.\.,._.@7Q.g.}V+../..Ht.I=..WZ%.{......_v.....%U.)^H(!!..q....|.H.E.DG_....o../...T.i...z.%.4K..# %.-.(...4J`i..,.P....F.D.zj..#..@.).(...o.....S..)..i.z.g...h..8.......A<d.z....<...n.]...E....(Jj4P;._.N..Q...)..8U.u.e).j.e...E|.]."..t6.[.K..5.6.....B..(.=W./....S'.......z.FY.. ...PO.".tI...F...Q....c.o.....}...r>..3c9I../.......}......I..G.|..|...~.b.e.5.OGb..o.....w....i.e...5&.,Z.H......g..KY.<.nZ.x...HHbdS.Z.\.O..1Q.K...9....Z.L....\g#.._~9###%%.O.>.Rvu..C.....S..g01..j...?-../...Q..N.:._....1.!
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 165 x 131, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):3679
                    Entropy (8bit):7.931319059366604
                    Encrypted:false
                    SSDEEP:96:tT+LtoQ9jsUBsnwlDGThUe8ww2iJiGEjdKKnnE+Gh:V+Ltt5GwlDQhUe8ww2iJi7MKnnE+K
                    MD5:995CEACAD563F849C4142B6A6F29F081
                    SHA1:44CB3B867CD2917541B7D5AAED2F14F10FEBB0FD
                    SHA-256:3691FB8C60EA1B827092F05FBB1807E34726016C6FF56698D7B81C44D519D22A
                    SHA-512:3C8EFEB966B075D06D8344483352BF92C9292F9970C9377BE254EB355EFAF017916737AECCDC704B84D532B7229F9908951A6F2CC3FAD810791CAB224401AD3D
                    Malicious:false
                    Preview:.PNG........IHDR.............c.L.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^....W...Gh...k.Hm..J.m....,X...Eh..%.n.....PHvy$%...[...R..l...(/..-..yl..Z.h..H!.../.|.y|w...7d3s.s.=.{.s.g.6W.^..)..@..{..'O.LL.......c.^.6xS&O.,...J.(|?...............,.$......@.zk....,.$.........)..7]O...mH7..0..|..&j..t..F...T...AZ7z.....$H...AZ7z.....$H...AZ7z.....$H...AZ7z.....$H....W.6.....0...FTcc.Wi....Q)...<.*.....{...#G....Y.f....KKK..,,,4.....{S.`...+O.[..+.\H...(.<..Qy*..ET.PM...c....~(.g..**...ol.K......Sc8..q.F.KM"<...:t.O.>b..$*t..].........2..y.h."!f.08hT..m.(..C.7n.......@....SVUU).F.).X\\....[j.U....$x$d..e...<.W......=;0L78t+..Gw..-....]......C7......K.w..._..g......A.&M.$^.#.!....e.\.P........;vD..@...Za.@*D..f...! .2w...4#.J..c....K}....F.u.I.b.V2.k...5..`....*........M..!.,.;.E..BZ....K..[7....5....,...........K...7+.6..o....\,`...z..5x...\46x.b......Y....s.^.x=.e.4s.W..t,.iu.G^.....(74....`.....:......]..&..j+t9..3..}..
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 127 x 138, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):2232
                    Entropy (8bit):7.837610270261933
                    Encrypted:false
                    SSDEEP:48:dFQY2WmQbe+TukEC2KgYPsWOuWFk792oP/sWtGOK9Lc+rD0NTHj:3L+wKkEOgx3PG92Eqt9LczFD
                    MD5:EDB5ED43CC6038500A54B90BEC493628
                    SHA1:A8CD63F3914E4347F4C5552FB922C6C03917F45F
                    SHA-256:9F3312E33EB78C6952B5A5D881BBD18751FCFAC41D648C6F053CE781342A504F
                    SHA-512:4EBCEFD69A4C249AA3B0F00A954C4E463DA22FC9CA0B61A0DC46079B438138C509B22188D966FFF6599A3A604858BC4CC8FE6E0685A764E8E0477AB7A237DB32
                    Malicious:false
                    Preview:.PNG........IHDR.....................sRGB.........gAMA......a.....pHYs..........o.d...MIDATx^..hVU..}..s:..6..9g.MM3...j...*........A..!.A.....R.Ai%YH..(M.".h.cf*.B.......:...{w.{.......y.s>.{.{.=.........#.y..r.K...K.0}......Y..b..[N.=....j.=........!......./.6....B.8....p....5P)....@......=}............^.~..@.o`n<.q.....Yw]..mg\V*...y.W.T.>...\n...s.iG.~L]..d.<.8..j<.<1..4...CZ0...}...........oDDh.....]3}#"B..O........0}B.F.L......5.f.FD..L....5.7""4`..p.........'.kt.....>!\.k.oDDh.....]3}#"B..O........0}B.F.L......5.f.FD..I..x........Z^...>B$1.N"}4.....1:&F8..*.X.yL(..s.3......~2.EL%.w.Uc.zJ...B..S..b.7o|%..7..'.....N.|..Vi...q..uO,`/....\W{..y...&iI..|X&T.........-........Z..o.~u..U....cF.M....O4}......~......:T..W.._s...t..Dlb.$Pr././.._4.b......R.T$t..$.>hB. +.{......m.w .Q...05..C.}...}.....?..h.....Y .8.6^t....}.y.%......l=$..[.~..]..h..N.......*....SB.|....8..H......_...G...|......;6YQ|WO.o.}]..'.$..oE.y...i'9.[cmS..@m@.Q
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):1604
                    Entropy (8bit):7.814570704154439
                    Encrypted:false
                    SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                    MD5:3F1535054D4F9626F0EB10CEE47F076E
                    SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                    SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                    SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                    Malicious:false
                    Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 749 x 126, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):13084
                    Entropy (8bit):7.940058639272698
                    Encrypted:false
                    SSDEEP:384:o4KSpFN6Ud4c3p2Il1yavNr5spYVJzimlfZ:wGN6Udv4IKavLBJz/r
                    MD5:0693DABBBC411538D209F32E22F622F6
                    SHA1:FB7E675406FA123CDB7E058D336742D6A2E8DC8E
                    SHA-256:2DFB2E7A1A3AA43C673D2EE540D3C366CEB12105EB5441F98992FC06F4284013
                    SHA-512:F07732660EC62DAE58EB02E2E9476007EA92BF826F642BCA547097136AEA01D29FF69D9B0CD0F5D65A5E15AA66CA4AA4804AA171A3504AAB198631C643C90C16
                    Malicious:false
                    Preview:.PNG........IHDR.......~.............sRGB.........gAMA......a.....pHYs..........o.d..2.IDATx^.w....'m.9c.6"...&.`.N.(.TN.Ne.N.R.eKr..T.*[...?T..:I.D.S>I$A...I......y.9...f......3...Gh.....}_.o....n..A@.....A@...L...2... ..... .x...#. ..... .....1f]9.[.....A@......3 ..... ...fE@x.YWN.....A@......1...... .....Y..J.Y.N.....s"................./..rc.scuyyyu...\s....t.oi..j..lv.....Gr.#9%%%9%--....d.T...r...DH...6.....%U..A@.0.....rAD ........2.5.......L.R..=W...gZ.`o..-?.T.Cy.:...y.9..y.EE...v......1..R.....1.".... `"...ss.......i.!.hY...Fj*....%.-.Gw...HJJr8..6...#.......!(.?P.(.....8(u........*..OOO..........dgg....Q..=..c.y....A`S.@.......3.CC..GFfg. .I.I.COrJFFFNNV^nn^^.z..%..(...^.b$........a..y.LMO-.,ylV+.k...T>Jg..*//-+-......M=..x.....E.... `~..N.Kww.......z...%%.e.%.yy.i...P.)'.,A.5.d.0.Cc35==66>2::33..>..;..Ii.i.gv...DSd....l#...l..............................)**,**...V..1 .F.'7....)..SSs..7..F...C.p....(*,......(RG..B...l!.2. ....|r1
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):1604
                    Entropy (8bit):7.814570704154439
                    Encrypted:false
                    SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                    MD5:3F1535054D4F9626F0EB10CEE47F076E
                    SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                    SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                    SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                    Malicious:false
                    Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 163 x 131, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):4847
                    Entropy (8bit):7.950192613458318
                    Encrypted:false
                    SSDEEP:96:JnieMJz5Tz/gKVp93jQvcv16kjOzbapFJBkjcMNBqmQzOG8qx1QKnse8T:JieMJzph13Evcv16RfapFLxMNBo8qxan
                    MD5:A1A1017A6A7928761CEB56D1D950E123
                    SHA1:28272E9C7F816A1CE8F2033FC00F489005332365
                    SHA-256:72F066CD34EA71D0E1B28FB60D663B0372C5254E1A8239C94A164EEF9389DB88
                    SHA-512:10F4557F102230126BC86CD4B49C93365C38D5CBEAC51F4691B90D861098866A2BDEFEBA507731D4FA14367FEE430453BD716157F9074EF643F2B949B09E1530
                    Malicious:false
                    Preview:.PNG........IHDR.............n.<.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].\TU..}...E.0.T....L~....af..Z.....O..4..>Ms..Js_....5.E.d...Y....?\z.3..}.l..|?~...{.....s.z..Y.............E.X.6...c..u...y..W.j....."}...l.i.`.!-!-......MKH.E.bi.d...b.X.)...X4 .vJ6-...;..+/.->Qyi.t...%.T..k;.U..y.C$[;..Gm.......v..*2..2..eee..."!..)...yy...III./..u........2....M.:''...W.....o..t...._.6m.... .`,k.T.v."..q.......s~~........O....ed.[W0X..HB.V.i.....<=..E^^......MyY..vpp...........^6.....aQQQaaa........]^^nkg../_.d`.%......L&k..B......?C....W.VVV6660t.J+K.:..%q.....e.cp....Kz..%.qZsAR\T.!......>55.R.u.W\\.L....T...K..rE.U.K.-9......y.y.......K....>...HWTT.e....+..B.......%%%......^...|...M'.%.f!/..=p...{O..../...@...DP..hw8....7o>..A.mgg......7-']~.s.OE.E.|=.......'%!y.......\.....MSn.i.........!...U.$0S .......Z.P.}[.%X[.;{....N.....\......6O.....'.N}.}s.m...E..V..f..r...4..~.......H..F.}....4,.R.=.......xT..4......./...,z
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):1604
                    Entropy (8bit):7.814570704154439
                    Encrypted:false
                    SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                    MD5:3F1535054D4F9626F0EB10CEE47F076E
                    SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                    SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                    SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                    Malicious:false
                    Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 123 x 103, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):1657
                    Entropy (8bit):7.80882577056055
                    Encrypted:false
                    SSDEEP:24:q3kLWZefR0kKbfLnNhzzt+acvt2x6pBs/j+7QJU0QbDQ883ASaoUV4hNgq1rsyhy:q322nN+X11GDsg8831Uyhi/vf
                    MD5:D5F7A65469623327F799B516ACBFFD2F
                    SHA1:76C6333C14AF3A7EA091819953E6E12DC289A12C
                    SHA-256:F476FAE1C6D79069239C471D182631AB343749C22B1A6990250465C7EC3738FE
                    SHA-512:351B9E455E97E6247E64E4BC1B59C9524E70AE0D09D3B6FB96937378A70536483B00426EE69C3590DD415A8265D21FD031B524B90E4E86814EC9AD704E57793E
                    Malicious:false
                    Preview:.PNG........IHDR...{...g.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^...h.U..p.T..(.eBR....2.....':.4kec^....0.&.....ugS.8u:i.P.F..f3...D....6.%...xaI.}...y..9...s.w.s..{..y.5<<<...(0Q.............t_..q/.[@.....-.e.....=..J.L.......c.4H......u?.XF.KJ..zb..0..f}..'J.,[&..S.6...w..9..._......<.........?j....H........>....~..}.n.8.WW..B?...?.b.;.....<....~...b...m....&1.=.Pq....w....a_3.k7'...\....d..z.O..w...s...Lh.x..........Q;40.i..`.8V._.@...rd.....kF.@<@..e......e....=mHB;....E./.\h.^....q..>.....%v:.O.:...&q...:.'e..9...h.iG'.L<@......([..|'.n.x...c....._O...[)......S*..Q...d......A....4..t....E..v..}..7...t.b....,/*|.H.]...8.. .@.(.;"..Kt.....].+.[LwJ..B]i.b.k.@..Js......J......6..J._LwS<@..J.YLwV<@G.4w.L..G...]..zu.z.h....;...W.IH..+...c...F....qI....Xul..]...N...wv\.M$..D...+...=.....?U....T..^<6../T*.{q.q..:....y..XL..l..z.d....G..b..g.G..b......SM.{q.q$MUL..R..........^\P..g...e.....L/yqM../.b.f..........J.<
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 59 x 61, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):2210
                    Entropy (8bit):7.86853667196985
                    Encrypted:false
                    SSDEEP:48:naUvGemgl0W5KMDRLEbGAnaHC7ew/fkDSCcE5FTaHWc:aerVlDRIewkXlrTa2c
                    MD5:73E38124F94AD20A2F1571FBBE11AEEC
                    SHA1:87FB8056DC7A0A3B70D51426771C4CCE2099CFE5
                    SHA-256:A700B63B30CBBE5230CC5E977D651E178EA87E73EAB18C8D5FFB1362149ADDF7
                    SHA-512:320FCE64DD6F975384BEC9267348CD5CD24A55B13BB09FEF1238C2216AD8ECABDCCC15601A079CE092ACFA4954829FFEB06FBB0631F6AE26E3A39E43C102048B
                    Malicious:false
                    Preview:.PNG........IHDR...;...=.............sRGB.........gAMA......a.....pHYs..........o.d...7IDAThC.yL.w...r..r....... ...Eq.nnN..i..[.e...-.d.M.dn...x.xmQAT.Q.RN9..EA.k..P`..=}..m.&~............oy....k...}}x..[....g59.}]...~i.SY......."....7Ow../......2...3f)n{..R..R......U?......O.{....c..pT.\.t....5.07.. .....07...7.o..,+.,.V.c...&..%.3I.....:v..\....6.....??..[.N...........nz..Z.B.........v.prs.q1V1|..=':..`.bz..%s.cf.3..RyMNUeV..J.k.}D[~xo..d..c...sO.y\....B...c.07......Rp..J.......{b.......;u...s....N.gko.M...;6...6..c.X5.S..o..\....^).....(......y.72.^....s%...[.q!&Z....C-..+o.....I.....,Y.{......g.1.0..I}.....<.....T..}....t.!x&)..[.7....4.5..{....n.<...#I...:.....r.wW~..zr..9k.^.]KR.*W.J.n.")....%0...)...Fbb5`4'.X..E.../.t.&,t(...@9....\$..........].P..jdU......H;.$.'%}.l7........y..$.....Z..4.Cm.u#&.%N..1..+..8....y...U.(.T.....}.I..5r}...!..K....>f..3.C.G..X1.(<.Gb..b(....0Qv0F.......n.z.s.Y......\.,.h%1...QU..%.}B|CW......sO..\.=..&3...,.
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 563 x 211, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):14458
                    Entropy (8bit):7.944094738048628
                    Encrypted:false
                    SSDEEP:384:uuT43eqJy2jEeSZE0onrAFAOpn5ytFfNrfIkBQTYz8ynth2EB:EugQeS+nrAFZ8tJNrfRQM4ynH2EB
                    MD5:7CEB71F78A193F8C9F7FFDA5F81AEBD8
                    SHA1:EEC1597705EFF1A527C246B86A71878185BA6B1B
                    SHA-256:77911FF7AEAB8FCCAF36DE6E1183FFE1A6C27F77B5714EE780976CE5189E8FD0
                    SHA-512:1D1AB19B64E1E2ABCA61AE78B3B50310B0A6CF19D2ECFCB4499D8D0BF68600B4D95BC0945EF9FF9B1D016ED61EAC518DCCA1A426F460317C07AD51E2E047948C
                    Malicious:false
                    Preview:.PNG........IHDR...3............>....sRGB.........gAMA......a.....pHYs..........o.d..8.IDATx^.}.p\W.ZRKjI.}..[..M.l.N..[..O..B&....?5...@.5.5EQ...T...d*U..*.C6....8..}.Wy.e........k]s..z..^...T....s...}:.{..n..1.."@....P......."@....p @f.s@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....5 ...f.;.0..7141...L.....M.3.L....{M.T...I.C...@E{.w.Y...q.....c3..gf.3..'j...I...{M..@..4555==-...!..f.....d...>i.%&&&%.u....f..[......O`.......G..E6I.< ..3.k...',....Y...<..........u...{9.......S^^.q.<..^....2.bb.E`r...ey........ ..3........Dg@L..a'.x&''.O.Y..!e.c%$..(P__.d.....Sj..S...BLu.[g..mK.SwVe.."@.T.@P.y.........=....40..L...$d..J....cccw...^.RBKKK...heJiS3.0I.X<..}..*O..........QR..q.5GTA..ht.(^.Hno..n.......wvv:..K?.\.JQ/i..h0)G..1Y....K.>FT...8..d&..,+-.T.b.........f.."3.V 6.:...E 1...?.Q.6....A1Smm..K...V}...:.uA'.$.v.cy..<.`.Z322.r.LI.....>......&........"..."......@.Ccccee.[..z{..fL5..{...
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 742 x 104, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):13030
                    Entropy (8bit):7.948664903731204
                    Encrypted:false
                    SSDEEP:384:/06ULmwT2RqfILhmLy4tNpYGL0mvBQhTMHX4PCIVYm:s6USI2RqfGhmDrpYM0ofHX4aIVYm
                    MD5:17E9FF9F735102231846936F0E2BAF1A
                    SHA1:9EC1AE8A3AD55C48C02427D842D6E38DA85B5145
                    SHA-256:DD1CA8DA90893E0B63ABFDD9E60CF2BF844B311964E9D9DDB855C21FCA156EBB
                    SHA-512:71E690D6C87B09659296E6E6DDC8E3F91035DD80C5CE875FA557763E8138900C27FB492885291CEE203D65BCEE8C20C9C39E0590A5FD32B8A00BEB3E3F6D6E8F
                    Malicious:false
                    Preview:.PNG........IHDR.......h.....2......sRGB.........gAMA......a.....pHYs..........o.d..2{IDATx^.wp\.....sN$...$.).Q.")R2ei,kl.%....r..vm.x<...\...u.U.g.ry=..uX.cK.dI..I1G..$.".Fg.q...N.nt...3.w.w..~.v.O.....K.....A@.....A ..H.n.D;A@.....A@......e.y ..... ...1..P..xH.. ..... ..e.9 ..... ...1..P..xH.. ..... ..e.9 ..... ...1.@.$9..S....A@..4....^C..F..VR\\TT.........aHII1......VS..g........... .*....z..|Ek.......<R../55+33;;;+..Y..WC..#...P..... ...s#0::......522...,.v..D......_.....9.2N.L.'..F$.....e..!..... ...N...`1....G.....'&,f..f.X....!.lp......I_........J..z.R,YbYd&.... ......~"b\...b.Z.SS.....c....&..Yl-............... ..[...BY......... ... 1..Z..6NN............._.zw....MKK.Z..vMMnnn.4.v....,q..e... .D%....Q......._..p*M......22..e...k.}.....qU....S.a...~....P..}v.. ...1..2...F.GCC#...].=..C..n#...K+..MOO..........."....d^2=.{....U.p.h%.%n...D.....XB..b..'''....?h.b.B\v..^Q^.UC............Q...I.....U.VD...P..{.2"A@...b..V...........jF.x.
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 165 x 131, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):3879
                    Entropy (8bit):7.9281351307465044
                    Encrypted:false
                    SSDEEP:96:k1hccap27HGVhY2Kn+A3RS+HG3dXrjmg26vh:k1hccewIhYxRmR5
                    MD5:C451B2A146BDD7EF33AB3EA27268796D
                    SHA1:C040BA2F31342CBCBF597C96D4D6EDB83D473B77
                    SHA-256:4C264B2A6E88712234DAA8E3A8D630CBF4EEB338554CB0B794D8031F8943EE65
                    SHA-512:55915A304B261BC6F38F5CFE0389D5195F85FE2C1DA325019C3AA391E8B1773091E078A35BD57F8CEE0BA035956382AE33790EF462053FCE711EEA9665B7F917
                    Malicious:false
                    Preview:.PNG........IHDR.............c.L.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].p.U..g..Bp!...\.!.`pA.+....H.U..."Z..*U.. ..P.D.-.$..,,..$.g.......CB.l......I.g.pc..Lf..~.=.~]S.....w.9..w..'...!L..A ..^.t...v..s4&&&%%..6..`..:.G.D@.7.qS...K....[..,...o...p..2.%..B.Y....|;..gy+.[..,...o...p..2.%..B.Y....|;..gy+.[..,...og...}.W..z\?...y..;_t....=..e\.....6.M|[...B._....[_.\^Pf.....f.....\l..../6....<S.4./..m.......l....B'.n...O...yc...........X...P...k....t..9tf.g>....e..Sy'.L+**.]{..a...,7...p..+......K..y.9p...I{..i58....v..5.`Op.....{.......8.._.S.........p..).........;.....y...2...b.[>gP....C..G.H...........Osp...)..9x!...W.,..^....$r.p.sOJ.l..=.x.9s&:..........h.`..W"V..|.l{..72.....zv@.#.<.........../....F|...c...4.W....:uj@1...~.X............^si....Z..I~.Q.<.....NAOq...+i`.)...$L..gV.6#.....F$..hD.g.L-\..H._.u..]4......h...T.BK\\.Z222....7))..h...1??...~.-i=...X...~h....y[.............p.....x....c...{....Uh.7n.....
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 651 x 254, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):19235
                    Entropy (8bit):7.944867159042578
                    Encrypted:false
                    SSDEEP:384:h4iuxL3Yck5lpMcTyHOypEod/G38lJxqSp5BCU:h4/xjYc2lmcOuuEoJM8fse5BCU
                    MD5:AE32E846559D576FD263BD69FEDBEC28
                    SHA1:D481DF71C858BAECFE33418002D368F2DCF68D4A
                    SHA-256:6E21222B0EADAB8D3CFB0C7D14941D196165D6709271AF317D099F12403CD352
                    SHA-512:9AA4A6DD01D3B745D674721765F2BFCCAB584CA0603F222EDBE9A88190A2A57438041E7A3706CC0656A6ABB79AA18118319F210EFFE3DD917E7B94A6294BD346
                    Malicious:false
                    Preview:.PNG........IHDR.....................sRGB.........gAMA......a.....pHYs..........o.d..J.IDATx^...X.W....D..A......bW.A..[..5.F..D...7.ob71.....b.."...("...(...{/...e......}.....;...S.X...H...@d...... &.....b..... F.....b..... F.....b..... F.....b..... F.....b..... F.....b..... F.....b..O.KVfVfjFzJzVF.}i{.R..l..q..`I....e.'./.'.G.z.*!&>)61.UjVzf..4>Q~...U..=......s.\..WE...2...t..`F....M....'..?.......>BO(m.V.P....Gy.../........B.6.......=|z7.Z.|hQ..u..j............&..Z.bo?.u...S7.G>......]I..7.i...3....<.y.l]....SI>...L.2..<.....[.'=M.Tsprp...T....cE'*..P........eefQ.NKN.x....:-#5#....q/..xq.YzJ:.T.*u.j..S.C=...|.....2..(YF........|...*.7t...{.jz....W..Y..{...nlfj...L.6.[.hS.=.....(!C.......?5..+...[..a.:U.K..C.......w......+..r@.z.7..j..qB..B.....X}..=.fk...>^5[....n.z....wn....Z4.._iWG.^..z6./]t......dhM.9s...Gbo?...U.V..tj.......*&)Io.{q.G...A...l...i7...&....d.E]....#.W.x,.T...&Mz4+].4.$n..F..x...<.ppr.............y.,i./..
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 220 x 170, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):7374
                    Entropy (8bit):7.955141875077912
                    Encrypted:false
                    SSDEEP:192:IfGsPejaVZWzIZKpnFFt0HK5+2Y/SLopWR:IusPe278IZKpnzt0q5+qVR
                    MD5:70DAF02EC717AB54452FA4C707BCAC74
                    SHA1:30F46FAC5E96470848C5A948162CC12455A05154
                    SHA-256:58469BA93EA36498FF9864EB54713A001C52106DE97804506D82EE24B816712B
                    SHA-512:E599FDC22A32CFEDBB23EECEAE0B278EAB9A90959FE6ACB40E2B201E45A7C19261AAF529E7A0D9CAF2A9A4C64C7831343F3BC20810513990AD5D38A32741564F
                    Malicious:false
                    Preview:.PNG........IHDR.............IC......sRGB.........gAMA......a.....pHYs..........o.d...cIDATx^..S[Y..I...B..`...N....t.q..j...+LU.....O..sF.!.I...w@..H.Q.w. ...s..{B.....2......i..q..z{.}^..............J.fQ.....r.\WWw.T....amt.t;...6\N.........z.n...].u.z..Q...?^........;;;;:NO.}.c....<-...........({.^....t.k...F..[m..:........R2...%.y.l^OOONN8)....\y....}...}}.}.Hy6.^.a.....\...!S....K..|>......s.........l..P...LFWW.l..RK..b.h.h .3.F..|.|..~..........e.aa.........0H...<.Y.a`..xA!...7.X....xd=........h?o5........Ay....?6...........*..tb.9.*j...S`](.,P...9.2j..?...z3wD.[......L3.Ng2G|.......&..0ZK1u8.H.2...Z../..P(....BA..aL|..a.Y:.....J...5^x..'.\..&S...L..U..;....<{..."..@x ....J.N...;....WIht.<..B......!HM...&z&..6u..hF..G.D..B..........A.....n...GG...,.,.Q....X,`"....r.........3d.{o.(/...3.H...x:sX....h.8... ....r <..DB. ...y.N...o....5.......L&w....v....w..D......!.a4...."8.U.|.0m.(..zR>..=.+.L.....e....Yd2.-Z.7..D"..pX.I.....e5qYa._&..3..J..++
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):1604
                    Entropy (8bit):7.814570704154439
                    Encrypted:false
                    SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                    MD5:3F1535054D4F9626F0EB10CEE47F076E
                    SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                    SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                    SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                    Malicious:false
                    Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 167 x 131, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):5386
                    Entropy (8bit):7.943706538857394
                    Encrypted:false
                    SSDEEP:96:x4F84/zVJWedudPZZRdbvczHe2ftFJ0y8Ea5b2AELJj:x4FTnodRZ7c7LrabEaMAGp
                    MD5:DB48555480A383CD1D4DD00E2BCFCF29
                    SHA1:8060B6FE12175289F0A71F45B894030A0D9F1AB5
                    SHA-256:807723D8F90A5BD41269A7A62817547026A117D666D5BEF454EB699C97CA3FA2
                    SHA-512:2614C04686299CEE8D56577A1E836A26076D42E041C627177FDB295629F6A80190910947FA794A094C55A45C3D70725EEF29097118E523A38B50C9263C771A41
                    Malicious:false
                    Preview:.PNG........IHDR.............gI......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..xTU..M..B...P........)vQpQ.ED.""......,."....*bC..VT.. M!...@z....1...Wf.w..o29...=.v.TUU..^..@....S..<..;h...5.9r....x..7N{...=........'...N...u...9..5+YW.;..N\..u...9..5.....O....,.K..'.../.....1..T....>.f..9.xo...u.xo...u.xo...u.xo...u.xo...u.xo...u.xo...u.xo........'L...g.UVVz.[.n)...Yqq...Y.f.)//_.l.W_}.,........S^Z^Y..++.*..pF.....?...I.&...O,.k.d...~..w;Q........7}1y......e_............=y._U....{..}.w.O..~.z.{........W\q.."........^.h........}p.+.>m...d...4...`a~Z^....me......:N]..1...g..y.f.......l..g.).......e[........Z..RB.KrJ.....#...{..eff..v.[[<.n..?{.....SN9%...V.yE...s2..........e@Wz..I...B.r..<.-.=/t{.v.|..J....,.@.A.v...s`/.....6f....L?.z[T7..)S0.;c....\s..z-C.....v..}Y..{..j..xF.....'.#_..C....k|3..8...N...5......f....3......f)-.p..%.D.v.v.].f.......33<<......[bbbt.]w...:.r.....z....q..=....m.uhD..,..zXg
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 230 x 68, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):4181
                    Entropy (8bit):7.950380155401321
                    Encrypted:false
                    SSDEEP:96:L6ousL3eslFAmjb89xK6YiSTwtw5dTA1W9lQ:GoFiUFAMbsxJYieZ5dGklQ
                    MD5:BC6C08F8C2C6D1EEE95ABFC40C3C3669
                    SHA1:44DE7375375880ACC24938D7E92A837E85C35321
                    SHA-256:6E54B502C46E1AFA57E28B8ACCCE24F102399F31407827A91E4CD7A42FCBC746
                    SHA-512:2AF4A9B87FA4F362926CD77F272CECBE3ED4F0E110FB8F30F661DF7C61B77B9FD8E7716EEF9177B1038B68C792CA4F844F729DAA48B2E38B9945EC9CB44BB720
                    Malicious:false
                    Preview:.PNG........IHDR.......D.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.yp.....E-.......-v...VY.a.d....R.euF.).KH@.*B..u@YdQ....!&.tjg.!.,a'.L..@H...{'\~yy.....w2z...s.=..;..s.......]..j..b5d.j.X...2D......r.\.#..f...Bl.....5dC....r...............:m.....s..j.f..jK....y.^....'8.....<......g.....=.%..2.p..}<.....G.....Ix.m.4dm..B.......0?..+_.*..c..n.......?....wa..l...p....E.Ly.}...*...C.D.vy).....@.>\...3;.`].q..m../.d.B.../......~.p.U..'...sP\....YH.7.../....R!...O...'.....s....<|.f)....i.{.I..l.a.n...?~.{...h...s.e..-..Q..R..@<;.y.G.+n.....Y.Y'.V.}.o._..?...,.>}..\w....`+.}.{.p"d.RO=&.v..H].....k...X.c..z.{........}.n....s:c...i7N...|....*\..O.*....)w..[>..E..}y....q..u.!.z.D.[`Uf.Y...>z\..x.B.h" \.}...`...|._.....G...hY.../..6>..Z...8^..k.E.5d#..a."....P.CR....OL..U...qY.{.C.<~I=V..x.J..*k.Y....z.;?..^...3.4|i...[DL,..z].._..a.....(s./...W~..q*.\#@[R.N...@.."..=....\q...<.......p...+J..\#...(.,....OQ...$L...G...
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):14553
                    Entropy (8bit):7.951135681293377
                    Encrypted:false
                    SSDEEP:384:EF7aDrPYJ1n3kaEf61xD+KvdokCixTQm7QA96dNT:EF7a/PMeaEf61lT6kCiFQCQq6zT
                    MD5:3E9F7D399DF9CAD3669B7A5445EF7074
                    SHA1:2FBC965DC03EF9203581F595E0D7AB1734726ED7
                    SHA-256:76C80E31F37248C3C787F7972A7B22038390F9D81E72E650071A6F36D36AF27A
                    SHA-512:326F8F9CBF829BF80AAA96062A57255A36EE04DE310634327AA075D14129CFA8E36E48AB2A00B10F9BDC1D94F1AC7A9E41D0D063361920A0332EC124BDF4C3EE
                    Malicious:false
                    Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..8nIDATx^..xT...!=!$..%t..H.tP:.HQP@E,...QQ.^.....* E.(" ]:.K..R......p..n.9{...sv.}.....7.....o..z...,|.......M +.....w........O...>.SJ.O...<...{. .x..g..I..H.......V .. .}.PO..H+$@.$@=.=@.$@.......VH..H.z.{..H...!@=.#...............C.z..GZ!.. ..)... .....T...B.$@..S..$@.$....>.i..H......H..H@...S}8......POy......>....p... ...... .. .}.PO..H+$@.$@=.=@.$@.......VH..H..zz?.......$@.$`i......c;.n..i...0..........<......S....w..c.....y..F4.p..3~..|.]....s.6[..H...N@.=M..|`...3./...I.....'..|..K...r|...nX...'.. .G...ib|...MY8|......9x..Ur'.. ._ .....5..H..d..L.$@..I..o.;kM.$.?........K/.wn......Y....E..%K*.=.......Y.3.!k....[V..WG/?i..H..." T.,z...6h.[..-%9....WMY...z.vH..H@/.BOe....g-P.@.......lH.O...SJ}5.|....?.^..5^}..$.. .....S.@...*<.gJT/......_.R.C.....rj..Cg'\K........K....~Y....l@..)..l.k.s..Yr.....Z]jG..q.+..G...;lNJj.}..T1&&.. .....?...|....W<{...g.&'Ca
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 454 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):8184
                    Entropy (8bit):7.807848176906598
                    Encrypted:false
                    SSDEEP:192:ExqMHYnnEnntvA4Mesu3SXHycmfIEFQp1r/:E0MGEn29esuiXHt0FQp1
                    MD5:5B386BF9A20766956A84F67F913F23D7
                    SHA1:6E72E51F5B4FA64E52D2B80B41409B3DB927A3C7
                    SHA-256:DDF6A1D5B29BD69C65A148B1247FDE8389CC56865E4398E4CBDCBD68A6555043
                    SHA-512:99B4109439D9A688D7747C6847E0FF7399CDA01A89C3181789F913E757A82EE4727F95E506F4B01930EFC7C6E229B94BB89E385B56BC009AB5CFE332585660C5
                    Malicious:false
                    Preview:.PNG........IHDR.............s>.Q....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^...]...!.......!.YTP.A......-..r..$.E.J.I;....T.M.UE[..Q..x....wKB=.m...4.%..|:...9...\{..o.3..g.o~..~s...k...X.r....... ..@Gggg.?.... P_.]]]..*Iu....C...h..$...:... ..... .\.......@R..... ..$.k....@0.Hj0.8... ..r.@....F.I...G.....T...@.... ..P........5...@ ..$5.J.A...@R.. ....#...C.#.@..H*... ..`...`(q...@.I..... ......%. ... .\.......@R..... ..$.k....@0.Hj0.8... ..r.@....F.I...G.....T...@.... ..P........5...@ ..$5.J.A...@R.. ....#...C.#.@..H*... ..`...`(q...@.I..... ......%. ... .\.......@R..... ..$.k....@0.Hj0.8... ..r.@....F.I...G.....T...@.... ..P........5...@ ..$5.J.A..............W_...1c.l..6..`...@ ..I.S..I.I'...5.\..;....'1. ...........c..k.u.Qs..}..g#b.j.@..Y..QR...n.!...-......h..Z.......Xw.U.~q... ..@.%.'............. P..E.T.b.:j.(F..p.... .C.}3.'.|..z..w.a.....\{.:.4[.lY..~...x..'/....g....J..9.K_...'...:..;)......SO=u..E... Py.qf..}O7.o....u?:....6~~..9...?7.
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 213 x 85, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):1924
                    Entropy (8bit):7.836744258175623
                    Encrypted:false
                    SSDEEP:24:rloPN36BoJ9JK5lncTww67QKf5wX5YgM5s6cahePwnR6+eA9zQU13ALcVz7wTQ8U:rYN31JH6lcbjMW5Ytmyqwp9H7wY
                    MD5:B1FDE66F75507567B5F0C6C07B01A3A1
                    SHA1:80B8E6A923E853232F66C874367E90B5C9CAD7AE
                    SHA-256:B9C82D2F31BBE409D159EE3C9129CBAAC7C6F6C81637AB9B6DAB3C11AA74B7F1
                    SHA-512:FC8C6038D3C2F5765D7524E969574ACD10AF6FCCFD45FE7C6DD4A8C2669B13EE3FB1A8833E94A046AB7037018170B5B87B1A2742E0E10557C413AD634BDF343E
                    Malicious:false
                    Preview:.PNG........IHDR.......U.....Q.6.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].O.W....G.lT^M*..J.....".4*....j..H..R^.".m..5....&..j..B..`.`..>...X......]z.[&.>..ef..gB.d...s~.=...3....m..(E...~.[....... .. .E3..7.4.......}..H._.D.,j.)..q\.....7..#.ag.o|.?.......;C|.#.../v.H.......o~.{G......H.|..;..v...G.._...p1d2..&......QS4<..i.".X.....1(..GR.R#.}.!.E<..:LLM......s..:"......Fa...b.....\.T..~OD... ..:j.~..p=Y...Y......?.Y.A...0!6_p.dKctjvZ....\.........V..1)..:.....;7:...(.[...7.....u..'ra.....S.]..........7.#,[..<.l.....[.........90d[.2a.R.........E.CJ..C..S..*._...$^...Q..:>hx.k7.`jN:.W.X..N..p..K..."...q....a.Uy.......[d.:vmkk./cW.>.K..C..?\d...'.@s_.?&.....V .?F..;k.....%+....+.3bk......f....T....S.(2.=...?gQ...K.._,.#....?.1W.......m2.....Z...-..:..?.#J......KS.P|&[<..........Dd.....\.....W$z].k..-..8...>..Q`Yz.}w&..._......?.)_[T...:wy...O8.Om......l.....\....]..."f...........q.o.V>~s...-....N{.n....w..O|.D...
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):11886
                    Entropy (8bit):7.946442244439929
                    Encrypted:false
                    SSDEEP:192:sqNuEpzsnKxkfLaZCdMh+cLApmRausyZwYMAisQKShDBlhr34ckckcZ:JNu6DMLaZsMhtLAIa0wYMAvI5V4DDQ
                    MD5:875CFB3B5C3619253223731E8C9879E5
                    SHA1:6372F4F5BEB6EEAE3EDBE5B62EE73039B40AD01E
                    SHA-256:CC69BAE5D2C8F56B28BA4E3C6A11F57C4E8CCCE69943ACFBE7E63B4FC90EE5F2
                    SHA-512:47F45A3275B8454F8000F4567153DD7D4AF3012005D8E34CB18AED6AD69083BEC753E607F275FBF3EFCCB7BA00310A04ADFBD5FA5B73E6BBE47CE73901C35CA8
                    Malicious:false
                    Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..x.U..I...JB..;H..."..(U.EE\\..._v]W..b...Az..{G:J..B.$...H.IHB.o2xE..3gf..w..2....w..s|.....C.$@.$.....t.!........8......RR....<...6..P||....$@.$@...PO..$@.$ ...T.GZ!.. ..)c..H........H+$@.$@=e.........S1.i..H....... ...C.z*.#........1@.$@.b.PO.p... ....2.H..H@......B.$@..S.......!@=..VH..H.z.. .. .1...b8......PO..$@.$ ...T.GZ!.. ..)c..H........H+$@.$@=e.........S1.i..H....... ...C.'++kH.G.=Z!.U...73o^.IH..O|jrj.D.......I.M.........Kph.............R.x.......RU8_".......j.......B"O.z.|.9.."..L....Y.d.Rej.-Y.dhX....:.xH.z.!(>&..4.....O.<..T\.%a..e...*..UnR....+j...2.."..M.O>.z......T...].j....m...S.`..&..)....f..2..............+..SP..?.a...=.....3......K.zj.5.fP.......2:..?.....%....d.qxC..W.~.._....!.W..6....iJ)*.(..wg.}.]sw\.r]...r"...e_-....5_9.YN'...PO-.d.:.%..wZQ...H...JMJ.6c....|g*..,.3.....T...o..Nyc.W.....A.3.._...U%...PG.z.....&.%.v....AIm.....~.
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 171 x 50, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):2270
                    Entropy (8bit):7.845368393313232
                    Encrypted:false
                    SSDEEP:48:3Cxnazs22lovji2Ez2iqBU2C+hJWizJNzIu1coqAYClBeMsk1:3dm2Ez2iUhBzhyjAxqQ
                    MD5:6EFE6733E10E011FFDD6711B5F37C9E2
                    SHA1:C72549E824EAD899944A38C46FBC28BDCDAAD611
                    SHA-256:92B5056DAA03DF3EA85AF49FFE4F9CFE8699BDF3539576A99F02418FF49AD9CB
                    SHA-512:EC14B553A5780CD9B33D438CE13A6932DE43E346D8D2DEC8D093A6A2048675423948F8E2C604A73460980C3C68D9276B65D76C2A6BC7B24FDF10CA92FDA2583E
                    Malicious:false
                    Preview:.PNG........IHDR.......2............sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^.\kL.W...*.F......@.*.(H4."iI}..B!.iD...I-....y.I.h.....<..1.....C..(XSy.l....,-,.......3..3...;.{...{.{g.....Q..x.T/q...F.V...B..'..?{:.:...`.........+.0s.e...w....{.`. ....5...d..9S]../............$Y.>.I....i..8....;,r8r!Ee'"..!*.&E.....n...=.@..Sp.GF..c*....1QH3....?,.T.el......t?..([Q`.0....k.G.....X..C...k|p...I.q;.d..N....c.u.a.5.%.k.fS\)..H..T.~l*k.[.n...x2.1...........%...yK..a..l.[.?#..fD%.FMT. =r.jt^..fT...c.&..Lr..............\..V.ll....Br^6..U27...O..N*..K.gm.K..g.;..l..Fe...w?..Q.E......0.........7...(.e..t...x.c6..Q..n.92:%....l..4.h]Z.....w..|..!.p.~..B.y..&.......gl...\.wI......G.6.K.$...%.-.h]\8.LT.....}{a...^.i......4.0.ji...........n.pk ......7t....U9..b...I.....#...<q..(|=F.......0@^......+..........X. .>p....S..t.].f.x.0....7d..n..'..'... .M.qqn...G.t8'.=..V.PK....K...X.z.#..I.....@...Y....BH..I.....,..K....=`&Z.41$..a'o.:....i{o
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):16003
                    Entropy (8bit):7.959532793770661
                    Encrypted:false
                    SSDEEP:384:1l+zN+iNurNE/tBdEC/vkape2XHYdhOm+Bl6C4:L+zN+iNurGNEC3fpe2X8Pa+
                    MD5:3A5CD52E925A7C4A345047D8F06C3C41
                    SHA1:9C02828D83206BBD3EB58930C8C65A6CA5DBCF40
                    SHA-256:477277E8CAAAE1D3B3EAB5B3660239AEEABC433743A191727B1A71E529872AC7
                    SHA-512:8D8B6AC645ECC7C8BD374E6190819006C71AC0B5993419C42463009116214E5EC4B4235D94B4AE4CDA132E7DDA9807ADC51525824AC5F12696517FFC8890891E
                    Malicious:false
                    Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..>.IDATx^..|.....+)..H..C.K... ....x).rU..T..*E...;....*.@Z.....@...9q.g7[fgggg.............1//.."@....0..#.t..f.C..."@.....@OIR.#P...0..$...y.Pl"@....( @zJ]...." ...Si8R*D.....S..D....i...J.R!.D....R. .D..HC..T..... .D...... .D@.....p.T... ........ ... =..#.B.... =.>@........4.)."@....).."@...4.HO..H..."@.HO...."@..!@z*.GJ...."@zJ}...." ...Si8R*D.....S..D....i...J.R!.D....R. .D..HC..T..... .D...... .D@.....y.?.`.T... .f.P...$47........~E....!.D..X............].`....0..N.a...>[||...t.T.w *.. .....)'...=X?c.......+OE....<-84...=.....w.8...7.Ro&.D@!...GS.....s.......:...Gg..8..T...u...~..............<...S...../Y.......W........#. .vB...u.. .+.999YYY......wf..._.{6....=..]>Y?..;=02eb......2...;.%..\...P..R5....XMO.....6....W]...3g.5;.n{t.......F7S....r...[n.......AAX..j[.j.;.neef).2.....{ ..r..{7.-........i..S........<..pm.u.V....M.333....K..Mr.s..Ek..=t_.#.P...
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 454 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):13241
                    Entropy (8bit):7.931391290415517
                    Encrypted:false
                    SSDEEP:384:a99pmP85w/MAMszG+iHGgrw8Ld+9aEsjQR:mgP85AMs6+UtrX+9mjQR
                    MD5:01367FEEE0A83E8765E971E0D3740900
                    SHA1:CAE1FD22CE2539FA2ACC0242C615CB7EA3F866E1
                    SHA-256:18B8E53505DA3C412890F4D74AE2A6B26C4B0827E15E830F92A024D292AF20ED
                    SHA-512:8CFBDC014C42AE6417038B80424D2E9FBDDD7DFDDF579E349C3C17C9B52AF33A72463154D29539457C4ADAB2DB00CC28A67902FA8D9209E4AF00EDD46D52E5CA
                    Malicious:false
                    Preview:.PNG........IHDR.............s>.Q....sRGB.........gAMA......a.....pHYs..........o.d..3NIDATx^...U...Y.]:.T...G.5..lX...B..Xb4F,I0X.....F...("vET4H......*EX........wo9..9.|...rw..;...;o......z.....B.......v.mn..>......E."....U...4s! ..F...u?.@...! .~F@... ....p..Q.kP.#! ...(U{@...!....T.TGB@...Q......B.5.D..A.......~.*.U{.].....S.e...K.A.......7^?....D...h;...!.Eu...o.^..B@..# J...B@....(.5(....B@..= ....p..Q.kP.#! ...(U{@...!....T.TGB@...Q......B.5.D..A........T..! ...k..R].R...! .D...B@..........:..B@..R........! Ju.Ju$......j...! .\C@.....H...! J....B@....(.5(....B@..= ....p..Q.kP.#! ...(U{@...!....T.TGB@...Q......B.5.D..A........T..! ...k.D.RK.K.m.V.......(.^^^ZV^Z.7.a..........T..xsqYi....L......z....}....?..yyy.M\.b..U3W.0{...~.`}..M%.J*.w.mdv.&*..@....R..o/.^..5...x.g.>..ag....GM|t....\<s..y+6.X.? ,.R...-.W.m\..o..0g..i...h..W.Z.i...2.....o.&..@...-.B|.K..^.....u.}.M..6...,(...e.V.X........nkE....5.8....-.!.TtRxs....Q..2}.-..`....mX6i.w...
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 164 x 89, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):4190
                    Entropy (8bit):7.94161730428269
                    Encrypted:false
                    SSDEEP:96:GHfueo3dRLZKOSYDzGsEgfB9nqS0WKt/z2jOrrz7yrT7N:8A6AzZfBtqS0WKNC2vyx
                    MD5:8B3AEC1986A522951942BA72B85CCAA0
                    SHA1:7E0DC78FC65EE4C804A4B0C72AA53E2DFDF26C14
                    SHA-256:8B02CEC726DECF033B67689F369FDE1002ACFD5F8C32E0F248AC575997204F2F
                    SHA-512:8EE1A1F6F0023EB4F60760C2E23EAFD56E6D298CAB49D819CF1D62C0CCF608D4211D3767856255F7CF8FF45AD835FE5475EB92C608989C522CD48D00A050B189
                    Malicious:false
                    Preview:.PNG........IHDR.......Y.....?.......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.]ip...fu.VBBZ..V'.>........CR......?r...pU\....v*...T~.U)0..('`....."..,a..Y..$t!...D...Mkvf4.VhW;S........{...zZw...i......fj..$..7......[Z*.[.[..Zk...?.t:M..,..`.^...X,..sUK[..Rg.=$..!.3<....74...iY..i...k.,.fA..Z.n...`G.%..H.l7..7J...u.R..6....E..!....N@.....M....Q`...U2.w.WP[!fX......c ./@7Mz....^...k.)....v.Q`..z..1A..P.{...||...vY.....>.`...K...m.?CX./v.8.....]..;...6..kw......N....z.Q...f..q..xk.5....;.?.Z.c...`......4....?.....VV.u~..<_......sU4e.....g.c.G....O/..r...`.G)....#d5.O..w..{....twL1l.)#&hF..K...M[@.Dl..V2..j.3..s....3M.....v..!....V..c..B...|..e.1....7.WA0.[.\.u.).$7f.+.......8..e2K/.%.Ii..`w6w.E..[?_.?.?..I.k2.s....]..f....HM.?w..d.9..Rr....Y.c.}.s.zk..rc...a..I(9~........m...Z............I........7.K:.:Bf.......m..1.......&..,...?a...c.@.@.g%...s.#...;..c6...g.lZ....}.WX.3.8.....W....N.w...L...}....?.".......;cI.............pS
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 162 x 89, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):4081
                    Entropy (8bit):7.943373267196131
                    Encrypted:false
                    SSDEEP:96:KQJAeRumk2zXWySlEmWL9zi6wknB4qLx+ppNhQrW8Oy:Ke9S482LE6wQB6pNeqi
                    MD5:29B87BEEC5D3899824AA390530CD47FB
                    SHA1:55108E8E5692E4444F72EE5CEB91915E7A2AEFC8
                    SHA-256:F00E4F1C9B1D9ABEAAEC8E5CAB02A07FD74F00ACE15E36C6F6469DE5AB07A9FC
                    SHA-512:1A5AD45BBA8C29C32CDD3C4D1E460C30ECA305D851FAAC73DF165306BC338337525680B9906D367A0CD3852B9D2DAAA8FD0603276BA969495B4E29C7EC8A3530
                    Malicious:false
                    Preview:.PNG........IHDR.......Y.....2.h.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].LTW.f..O.a.......*.....k...M.Z.n.q.h....ht.f.M.n.6..t.h.k.h5.6][[....X..p...?..g.`..7.o..of....^.ys..{.{...s.UMMM.(.l.@.l..R?.......(0+0.......5...*.F..#.].........1.....B[>[..a..L.....x...0.5t.v..S.h!.........Y....B..&.......f#.w5u...............0...x.sC....a.4j5V..Z..n....K..>...3t..wm..3hB.BD.P..FkcJ6.....O........7...S.........6..P.]mf.+o....w..<.......Y..Z.whd.....*zf+.....#."_?....`.._... qf+.?.?"k...zgME..j..!.k.U*.....&z..N....ma.......R.{.r0.S..KP..fU....g~..=..Q.n.*.* 8T=/'9,*.KDW...GN;0(P3_....1......'.;..;|.L.a.&<*\.d......o...Y... {E.F..}.e.\..=W..#..W....c./~..b.EWXI.#.''&.........:....X...b.....+2...5..6+)we~ja:lZ.d.Ey....l.2.5r........!.!._|.A.....j2.5.o.....WOM....V......GC9..'.... ....C..,._...cS....b.1.....t.........._........a.3..K..>V.f]...~....K...-........#.o.Y.P........a.7..,#..'s...T.....b..]..3..dPPP..Y.i...c.b
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 452 x 277, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):22634
                    Entropy (8bit):7.974332204835705
                    Encrypted:false
                    SSDEEP:384:5ojjyi45m1/9gyhgFsH1ud103Pl39o0qjfsH37mNHy7QPaNbZy0:+r45m1/BWKy10tN22rmNHycobE0
                    MD5:548D234C9AB4021CA5FAB7BF22502465
                    SHA1:2F7495D250DC86EA99473CC342D164B859926021
                    SHA-256:7D549C3418CD90F42571D00936B23D242837CE2A8B19FC4C719E182ECB2624C6
                    SHA-512:261523F5EAE6FCE2829B53AAC5938B1A0021C119E00CE82EFFDBD690FE71064E0F3B313ED1AB2F67A16C488AD5B1A91F5AF98029D88A7896F271C108410D42C5
                    Malicious:false
                    Preview:.PNG........IHDR.............._......sRGB.........gAMA......a.....pHYs..........o.d..W.IDATx^..i.=YY6z@..DP.i.IAA........l.Dd0"p0.ON.~....s>.?zbH8..%$`....b7..=....25*.".L. ..u_..f...j.........Uk..^UW]...u..}.{.]t.-.(...J......e...t.....@i.k......_.(.....@...Z.6J......2.O.-P....._.u.=T..4p...e..q..5^f~....@i`....?.....@i..k.........?...u..O|bN.~?MbT%...@.LO.Or.`....$..y.{..o....~..(.;......SNi...6....w....~.{..^w......~.S...g?../|.O........7_...Oj....|......40......9....?..<.3nw...x...g...7.....(<.d...(3.K...;....\..:...'.5.....&...>...t.;....8..SO;../...._.}.{..D.jt.......jc...s..........Z...0q...@......Z]S.(..o.....Og.u.l.i.-.9..)j..~...5.l}..........G......k....Z..c.....}.c.?.\....t+u...15p.....[|......2..;..;...........w...........v.7...I.-w...K/.J...[..N.....W..U#...._.j(...//z.|..kv....];j|../m....t.9.;-0.:.4p..@K.....~.9.$qu.E....!.9|.m.+`).|......x..vak-].../.....G'....4.>B6$.......-o.q..L;*.N+....>...=.!.Y..Q...?......7..,....}
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):17289
                    Entropy (8bit):7.962998633267186
                    Encrypted:false
                    SSDEEP:384:ruwwXKZuqnOnZprU3+OXBruY4UkcY+TpI/BSqCrEoMXMEr3KbzHIDqqAmk+xob:tGcxE4PBruV3Uy5SqCAoMXzrQHoqAk+m
                    MD5:708E8EB906BC105CCA0535AE669AA651
                    SHA1:38D82DEDFE97D3001188C2E18FE13BD741FD520F
                    SHA-256:1C3D07765294566E17270D0F3B9257A3DB7905D4E7EF746AEE80CD591CE0308F
                    SHA-512:1EFC74C28190DEE2D2732390B74049A1B120F05EFB8DC6925207C6990AD20450FFAB40249899A9DBB82E8F92A61F770E120A450CAAC7F8C5F0742586CCE0EDB6
                    Malicious:false
                    Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..C.IDATx^...Uc.._"oB.Hr.m(.0......r..[1.D....R..q)%FBDiB.."w*.k.Jz.Y..l....>...9{.......g..Y.z~..k?.z.^k..+V...! ....(.....\sM.tD@...!P...HW.S....u^.....@.r.^.....B@...U.H.J....... }....".....>....! ..A@.4..EE...! }*...B@....i<8.....B@.T2 .........xp..! .....d@...!......(*B@....S....B ...O..QT........! ..@<.H......! ..O%.B@...x..9...C'|..{.>Z../~^.s<<V4..ujo..v.Z7..EwT.....@.....?.......~{...K.........C........bB@.$.....C.{....Kf'S.....T.*&....@<.....'..D`...;~v.DT]...r!..>....ru...}.....#uG.T.....>..z ...3v....P.M.....5.@<...?....F.}..c.W[.._!P...O..>.M.d<..J....E .}ZZ.+.5v.p>..N.{B....>M.Nzfb...OB@.." }.D.y...IdK<..! }.:.....f.K..bX.T9...&T.&?.VB9.[B@..@@.4..1}.4.@H..-!..}..~M.<.z..I}.G....>..S...N..@yj..n..s.d._.....(..R"....Wf\.oO.^...\h.\.`)...ni.'.].vk.1-.k.^....#.,}.{.RM...~Z.S.. .@U!.&}......h...{K..@.........W.8.N.s.Y.0)..f+...%4.......5.@j.):k.+3...I..(
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 452 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):13737
                    Entropy (8bit):7.916899917415529
                    Encrypted:false
                    SSDEEP:384:jgxmx2Fa/+76A6M6Y7rSYRv47cwbkkapeIiRmDGd+gUwOSpQ:KgyoWrJWRkkRXmad+gE8Q
                    MD5:830632032C7DDBCCDE126F4BAE935540
                    SHA1:9FEF1DA9FF1D7762B779553B5F873BE54C8D01EF
                    SHA-256:2328D09EC845433DC31808FD6B12616F1D28B9B3BA7DD969ADEB6C32D8EB049A
                    SHA-512:5C17EF9A0063499F2C34FAB2C4D968D29E20F20868921FA914E5737995AA0C166F224995109FF7ACA57B5B0F8647715DC670C4AEE385F61B5F8E6E8422C49EA8
                    Malicious:false
                    Preview:.PNG........IHDR.............w.pl....sRGB.........gAMA......a.....pHYs..........o.d..5>IDATx^....E...,"o.....&....AY$....AE..".l....+G.>AP@D..e..".".A.Y.@...K..IXB !..!..c1.On...===3=.3=.>9O..u....w.z..-].t9]B@...!.......Z...B@...^G`.Q.&S..u$d....B.Y..P.w5[]......B.m.D...! ..@...Ls.Q"....."S....B ..D.9.(.B@.....b@...!..."..@..! ....T1 ........i. J....B@d....B@...4..%B...! 2U...! .r@@d....!......*......9 2..D...B@..L..B@..........D..! .D...! ..@...Ls.Q"....."S....B ..D.9.(.B@.....b@...!..."..@..! ....T1 ........i. J....B@d....B@...4..%B...! 2U...! .r@@d....!......*......9 2..D...B@......5jT.@.{..O.;k....>.._o.+......{V...&C..(?.m.....F....gd.....?.....3u..x^L.1n^...@../.....XE....L..!...t.....L..B.).=..sn..U........@.O..$..o..L.....g.(D...(....Lo8.....,....f;o..i.f.h.9........\./..[W.9.....+....,X..+.d.....Xc..7.p.m.Yg.u:YO.V..l.t.].Z.g.U...]...5.^..._.~.WL...o.3f..s.,Y.X.7.x5...K/-..._.......{........W.(Y....?...!....W;.....iwNMW.............@+Q.5.#.
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 185 x 76, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):2332
                    Entropy (8bit):7.8822150338370776
                    Encrypted:false
                    SSDEEP:48:jB5Gg4vMs30WIn5IVeRy1bY7DqbqQBAeNjukXlN4AXat:PGYuEWV/YH7e1uA0AXat
                    MD5:91CB7F1273AA003076401081B8A22237
                    SHA1:5157144069E7D2FDAE60B397BE5851E75BDF7707
                    SHA-256:80682DD6472E8D1136BC5E20F6DE87B595562414B19EAB8E965736FE992921B0
                    SHA-512:5A8E3C0ED0DB94BFE359C63793F12F3D7B3C37F3A13A5C96634BA1DC8C9E50FB1142FE4752FD9FBFA39A682F78C54AF868AD337EAA787801FE5F66D8F55A8196
                    Malicious:false
                    Preview:.PNG........IHDR.......L.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.\.LUe......Ji("....9....-.."..5L.Y.Y.....$350.."2.lK3Cg...T..DWZ.......i.?!<..~x..z.......w.sw......9....s...w..l6.:....p"dH...F..B<...qE,R$G\!..E..".).#...."..{f.PyI.d..l;....;.=.S...O.S[.\Y^P.aj]9*Y!. ..~..#...S.s...l..h.[m....%...P..@.kG......G..X.r|%..AO.}-..G>35..c....Ac.&[W.d..+...zG........=..l...VS.d..+...tGd..k-._.....oL.:}.p.~.W$C..|...I...n...~......,.i......e..=..?{......>r~.Lw.+2..\w.)w~...c....h..u..%...PE...f..'..m.ZE.1.\....U.`X......$...P%..UH{[K..o7~.k.49..W.t.~.^_..7.,....f."q....+....;...~;.c.......Xb.\?...........0h.lV..WX!.....ljm.1c..U...[..X.)......B=.0~..W...rO..j...ehI5U:..66V5sJ.....V...]Y>...1kQH..2.........d....S....I...+..].p.....m7...Z....s.D>.K/]..?.l....2..=..~.mq..".+.....,..8. v.o.).Z......>..Xv..i...TA....M.....>[X...Y.7lJ..e7..S.....02q.O&9.......:L....N.......W....d..FqE..T..N.....R....kXv[..j......g.K.\@`.M..B}8n
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):11332
                    Entropy (8bit):7.9324721568775285
                    Encrypted:false
                    SSDEEP:192:vpXZavBpl00n1Pt7JquG9GYHDK/5cxektxMQjcie9ZZkx30eXJIb8FKRN:vpZaDyc1P1Je9G62/5clpjre9nQkeXJY
                    MD5:31579CA3352DF8FA4E3E7F48C7CDF672
                    SHA1:AA682A3C781BF8EE43B5EDC9718E64CB79135F25
                    SHA-256:B0E7824BEE2C896279457D87E61E902431BEB528D830524CC4DFAE126E89FC24
                    SHA-512:782FF9492E3ECB11C72D316DDD94D1F3E94CD908FC9452A37DA6CA30ABCFE9AB2BCCED8583A569DA68626BCEC730408AF86997E295637BF64AFF5BC768F3E309
                    Malicious:false
                    Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..+.IDATx^.{...u./-...&....6..+z..Q."b*. &M.d-e.*.. ....J..Z-T.Z$....R..F...%*`bn..<.....W.E ..w....^...;g..[w.5w.9g...3......t8t.P.?$@.$@.5...=.8qb.... ...5...a=...#.y. ...@B.....am. .. .......$@.$`.....G.B.$@..S... ...C.zj.#[!.. ..).......!@=..........}..H.........VH..H.z.>@.$@.v.PO.pd+$@.$@=e. .. .;...v8... ...................f.o_o{....~t...n.S.N..?..._..L;J.H ..,....7.}...|....7...b...|.........ObVa1. .?.X.....~.....t2..V>.b.}..0.F....%`GO7.n#~..F....K.~...FX..H.^....k.Z/.2v.W..M.<.;$...v.t..,UO.-]............D.....o.J..Y........5.%.l....{.....'O..dC$....=uks..;{x.,.N.=.."..Q]..w>.E.H........AV=...f.&. ..ip}._0.~[pf.`..9..v.W.,..2.E.$P........+...OcC.H..=..|..[..g%(h.....W...?...UDh..T$..?....|.]..)?[Wo.h.'..2P.1..!.......$.NO.5..}...c.;...~.x,|Q....B..6.@>..y..}...m...D~z....L#.0`_.`.s?|....I.....a...=N....c.._.2.._..6 .]...5....{.^>.lM..;n...k..9J..S.G..{.
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 167 x 92, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):4181
                    Entropy (8bit):7.943341403425058
                    Encrypted:false
                    SSDEEP:96:b6JWqvCl45Da8kuGzhRwZvwIutfij19MQ8EpW14LBGJVCq:b6JTCl45DalsBws1R8914V5q
                    MD5:817D5A35EDB2B0E052194D4F49FDA19C
                    SHA1:FA6CB2016C5F43B76102B63D60359139227E07EA
                    SHA-256:0A87B8418B7F8E6E117BADDA11D7CDD38B8B7320C6BA3D3E9AF93EB9ACB2CE14
                    SHA-512:E0686BDBFC589401F0EAAE2B1598199EFA285F8392742B1C928B9274088804B23DCB584B6FEF68CE6D7E54DFF9C10338104F4C0F3F80A04471F0B2E8F9935CC0
                    Malicious:false
                    Preview:.PNG........IHDR.......\......!2a....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.]iPTW..iv..D.....%DQ#A$...d..h,.T~..+...TM\cj*.)k.fj~L~$...L&...,...:.FdU..f_......._.n.m.....q.s.9.=..w.9......$..b.*..%....@A]A..%..<......l.h.+../..OSe.....]...>..C........^cCy.0nz.4<......g..?~..>.1ws.B....07W65.74T....=..v.......D....6.....tR....}]}....4z..^....7..;.."......^.....|=.#.=.32..o.<.Tn*Q....g.zN...n*...!/.........!....F..]...6...m...CX..~...+..U...E.|.........7]=rE?i(..$`e.%.`.....w._.Y...l.1...@....t.P..=.}..*...N...N.|.xS.5&.....Pe......Z.Z^XJkx.....^.....?7..._....Wsz......}G..]...\.....,[.y....}.J....'.R?a...G5..l.i.?....MH..l.DC^._.c.m.....%{;z.&.*+x;...S.....zxyH..`.._]...el^........U.T..^..p..z[.6(2x..,#;o##..}Zv|Z..............V.....0}Z....]..m.....x..).k]&e.._.W!Vry..%...I..d..}w.....^..\............m[.^.3r.......-8......j....>...Q..T..{\V\ptH.?........1..w....FHl...x.....\.`.ei.w..)`...g..V{..Z.....8..........o.._..
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 221 x 77, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):2599
                    Entropy (8bit):7.903700862190034
                    Encrypted:false
                    SSDEEP:48:PmCwDJh8w9JewaF2zQNXXj8zq1KM43sxXxjYbTgJW1MFsrJ075CawGjGj:P1Ah8UewaFcgz82Kx8xXNYb3id/yj
                    MD5:E88131C9AAC52649FF044905ACAB9B76
                    SHA1:34AE73B9165CBED0DDF33AC20E4B3E7D622C19BF
                    SHA-256:30F22340F582F9A352A7ED3048D1088F178E83CCAACAC1CCFD86852C8F9C78E3
                    SHA-512:97AFE8F3A2A3138613934AC737C390A35F6757BFC3D381EA7C7CD148F739932380DCD46D0BA6F590C274F8BFB4D4286B3C0433AA69E090102A8A9ABDD7C97EB1
                    Malicious:false
                    Preview:.PNG........IHDR.......M.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.]kl.U....B|E..>...*..Q........b[.K........m.(..... ...!%1%*-B.C~(&`[.....-.....~.w3..Kw.3wvfzn.2{..s.....{w..\....!.3..:..!..../..zD.x...O.K... ^.1*...8.G...z...D.$...........>!..V..`v.CQQQ!..-L...../3.2......ZH.?s...Iu\N..,3.?.p..N......<....E.<.=z..Iu<ll.dX...g....+.{X.p.....:..t...a...cKK.|...Yszl.N.:......KPs.):).T.5...&B...*..5j``@...(_r.V.j..m...?x.sg...t\.dz.'^.=.\.h..<.y....:.I...w..ze.m.\.qPJu.....D.|..@......W..t.+.....X....e....\H+.Ns%^r.VS.N.3:...&...._..#^....d! ..F.....xc..M...q...17.z...z&C...K9(.Ifm.35.v.>.'X,...p.:=.H...J.K.,...:~...7.t.....R..R..9..?....l../.(...0z0.M.f.)H..Y_"e......B........L...q.K......|;..L.........xI.K3.M..%........./..){....R....s...7....).q.._R.4O.a3......<..%....3#.|>..y...u...R'.P..$Klz...........,...g.....`.7..\...x>.{p\;>+.,.....e.-..Re@.N..FY_....*....]}...[..h.M.oq.S.U...c_}`......8TP....
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 232 x 50, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):1570
                    Entropy (8bit):7.780157858994452
                    Encrypted:false
                    SSDEEP:48:r+em8Tlk2APr2fEd72tTqiVJlcLzqeVzYwS:r+erTlk5S+zoyGahS
                    MD5:EF9AA5B2ADBE5DF68AC4F4D716DF7708
                    SHA1:363B93AAAB9DB2832F6CA0EE3C27C9310C344BA8
                    SHA-256:3D94FCC4821A135ABAAE6579011441B94F9C04DAD1E66BB5211B0C019A5968B9
                    SHA-512:EC9B024AEA46F7B97D14F0A7E12704D09B85F0017CC9E273CE50F2F889DFDAE81DE549CCD546BBB8F8BAAAAAB7781FEF77BF783E02CCC9605304552F7DD5903D
                    Malicious:false
                    Preview:.PNG........IHDR.......2......n.f....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.[MK.W...t!.fU..b!....*JBA......%-.F.4$.Nw].....E.$...)T......?@.O{...3w..y.=/"o.9...<.y...X....c.1P6..e.lx....0..J....e3.&\.@)............o.*>.E,;.....~..|....Z.3`K..W0S.&.L._..M.e.`..M.....i_.......\...6g..^....4..L.Y.9.$M...4..L.Y.9.$M...4..L.Y.9.$M...4..L.Y.9.$M...4..2.......q...&...........*.Qg.+.p.......a.:.X6...o2......A.....[).,.p......P......_..>......3.......z8j............>...fww.6....../....S<......^%.4........{.N$..`.!H....`........a..(.G^>~|txx....K\mF..'d.d:9J!.....j..i24.A...`O.......s.....?={....H'._..~..O......*>...ZXX.3...;C....\....%..s=...w<h.......0....~..y..._.......+.n.P.M]c...A..Er|.R...$.g...9*._.jg.....x...&+.JWM4xe..^....0...11.[.....f....r#.h.h$....[=t >...r....L.0.KL..B\..x........4J.0....vY...\dA. w...........g....};.}.....;.......x.|.....)......x....s....N.$.n..g<Z.q.a9.C.....oX..%,KNNN..i.8J..p].1....B>{......n.D|3t.-\g...Q
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 340 x 79, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):4490
                    Entropy (8bit):7.928016176674318
                    Encrypted:false
                    SSDEEP:96:WXKr7Xwf6Obg+XaGOnsjbbGSb+ydWtRvEOhDE6XqPeosv02tR45boo:3rTUgXZnsHKSb+n+8DdKlwm
                    MD5:7F161B19B937AB48D4FD2F6E5E16FDBD
                    SHA1:BDCE4F1C73E87E609A7FDF245A512CA4F73B35B9
                    SHA-256:C863C5E71D1116D69561BD0637F4FE4C4240E9CED05B8A5B056073AD13E6495D
                    SHA-512:E915B76FAAC9512D2AD11CF4E4530A19BEA1C7D8508BC218C69CB041F1EEABA3E2E03B1D56E61B032A6418829752C21B8354AF1335466D7E1528A06E6742A461
                    Malicious:false
                    Preview:.PNG........IHDR...T...O.....;.......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..p.U..'...rD.WX.... Q.. ....."$.ZHP.Z...C...........R..%G8R..... .R.C6..A.b...0...^...#..g..........z2.....nB...l..X.&._.a,...a,...a,...a,...a,._.73'N..ukeee.6mZ.n.m.G.}...n...a.9s.DGG....y...8??.o.pE1....Y.,......).ca.i.M.:5$$.........Lr...ye........6...8...z.-r....d.(.xc..U..^11...._>.QX..y..2...T...sss1..."A.?_.;w..S.F>......4.G.......D.|...@.K...............C...k...P...q....6.`QQEE................7;;;.._\q.k.|...\.z..6j>..n....Y.&G*.n.S$))).....r........}.{[Dv:,..w..A...`..........a.~.N.f.s...P...*..'7n....eK....+.n;:.W..C..9}..O..D.q..X..5i.s~en.c..F&..?.....l.]3r...W`..#..7o..R.@^..*...W..?}t...{.B.8..D...UPa..~..C...|.C].a.9..R...c.Y0..9.u...d...C.......X.U....WK.....5...'..PM.`...<. ._.z.F^^.EH.K>_.0.d..S...Yj<..~.5.?l.fZ0.@d.....*..G...K.....e...b.|e..Q.4.....('z...!G.....2..XQx\......X...2.\h..X~.e....Z....=....C.1.......w.....d.z.
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):11449
                    Entropy (8bit):7.91552812501629
                    Encrypted:false
                    SSDEEP:192:/zgGDSJ0ke0kBER0C31jm1OSZi6/ccccccc3zzRmKHDr1NFnAaLJ5rBX8iaD7:/UGe6m7XdJS86kvRBHD5/nAa95rB9aD7
                    MD5:163E6791C87E4999C343EC5E23843B15
                    SHA1:43CE3BAE19E22876483A7FD0E93DB45790373600
                    SHA-256:DEB2B126977EA150E49CDB3ACF4F5387639C7B7B5583454EDF55ADF83DFAB720
                    SHA-512:98BE1F4684F99A9FD2F313B09A113B5C310EC8BA8EB0EBF5FD69765E5B48B001D39999E3F25A7E76C7344DCF57B4F0BF2E4614FB0E0DFCCB6F02E6D1CAAF7FDD
                    Malicious:false
                    Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..,NIDATx^....E...@^.T.....H..$..(.!..3....O=Q...<.9.`@E...CE.(""..H.$..6.......]3......tW}U...w*~....W./. .. ..........m..H..H... ..........'...G...W.=#.M.$@.$p...........!@=U.VH..H.z.g..H........H+$@.$@=.3@.$@.j.PO.p... ...... .. .5...j8......PO..........o....+.Z.Pb.FH.......D.g\........._..'0.......9.>............&..PO.z..)-..........R....'@=U..I.&.g......../....SO.\.,._.@7Q.g.}V+../..Ht.I=..WZ%.{......_v.....%U.)^H(!!..q....|.H.E.DG_....o../...T.i...z.%.4K..# %.-.(...4J`i..,.P....F.D.zj..#..@.).(...o.....S..)..i.z.g...h..8.......A<d.z....<...n.]...E....(Jj4P;._.N..Q...)..8U.u.e).j.e...E|.]."..t6.[.K..5.6.....B..(.=W./....S'.......z.FY.. ...PO.".tI...F...Q....c.o.....}...r>..3c9I../.......}......I..G.|..|...~.b.e.5.OGb..o.....w....i.e...5&.,Z.H......g..KY.<.nZ.x...HHbdS.Z.\.O..1Q.K...9....Z.L....\g#.._~9###%%.O.>.Rvu..C.....S..g01..j...?-../...Q..N.:._....1.!
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 220 x 170, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):7374
                    Entropy (8bit):7.955141875077912
                    Encrypted:false
                    SSDEEP:192:IfGsPejaVZWzIZKpnFFt0HK5+2Y/SLopWR:IusPe278IZKpnzt0q5+qVR
                    MD5:70DAF02EC717AB54452FA4C707BCAC74
                    SHA1:30F46FAC5E96470848C5A948162CC12455A05154
                    SHA-256:58469BA93EA36498FF9864EB54713A001C52106DE97804506D82EE24B816712B
                    SHA-512:E599FDC22A32CFEDBB23EECEAE0B278EAB9A90959FE6ACB40E2B201E45A7C19261AAF529E7A0D9CAF2A9A4C64C7831343F3BC20810513990AD5D38A32741564F
                    Malicious:false
                    Preview:.PNG........IHDR.............IC......sRGB.........gAMA......a.....pHYs..........o.d...cIDATx^..S[Y..I...B..`...N....t.q..j...+LU.....O..sF.!.I...w@..H.Q.w. ...s..{B.....2......i..q..z{.}^..............J.fQ.....r.\WWw.T....amt.t;...6\N.........z.n...].u.z..Q...?^........;;;;:NO.}.c....<-...........({.^....t.k...F..[m..:........R2...%.y.l^OOONN8)....\y....}...}}.}.Hy6.^.a.....\...!S....K..|>......s.........l..P...LFWW.l..RK..b.h.h .3.F..|.|..~..........e.aa.........0H...<.Y.a`..xA!...7.X....xd=........h?o5........Ay....?6...........*..tb.9.*j...S`](.,P...9.2j..?...z3wD.[......L3.Ng2G|.......&..0ZK1u8.H.2...Z../..P(....BA..aL|..a.Y:.....J...5^x..'.\..&S...L..U..;....<{..."..@x ....J.N...;....WIht.<..B......!HM...&z&..6u..hF..G.D..B..........A.....n...GG...,.,.Q....X,`"....r.........3d.{o.(/...3.H...x:sX....h.8... ....r <..DB. ...y.N...o....5.......L&w....v....w..D......!.a4...."8.U.|.0m.(..zR>..=.+.L.....e....Yd2.-Z.7..D"..pX.I.....e5qYa._&..3..J..++
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 651 x 254, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):19235
                    Entropy (8bit):7.944867159042578
                    Encrypted:false
                    SSDEEP:384:h4iuxL3Yck5lpMcTyHOypEod/G38lJxqSp5BCU:h4/xjYc2lmcOuuEoJM8fse5BCU
                    MD5:AE32E846559D576FD263BD69FEDBEC28
                    SHA1:D481DF71C858BAECFE33418002D368F2DCF68D4A
                    SHA-256:6E21222B0EADAB8D3CFB0C7D14941D196165D6709271AF317D099F12403CD352
                    SHA-512:9AA4A6DD01D3B745D674721765F2BFCCAB584CA0603F222EDBE9A88190A2A57438041E7A3706CC0656A6ABB79AA18118319F210EFFE3DD917E7B94A6294BD346
                    Malicious:false
                    Preview:.PNG........IHDR.....................sRGB.........gAMA......a.....pHYs..........o.d..J.IDATx^...X.W....D..A......bW.A..[..5.F..D...7.ob71.....b.."...("...(...{/...e......}.....;...S.X...H...@d...... &.....b..... F.....b..... F.....b..... F.....b..... F.....b..... F.....b..... F.....b..O.KVfVfjFzJzVF.}i{.R..l..q..`I....e.'./.'.G.z.*!&>)61.UjVzf..4>Q~...U..=......s.\..WE...2...t..`F....M....'..?.......>BO(m.V.P....Gy.../........B.6.......=|z7.Z.|hQ..u..j............&..Z.bo?.u...S7.G>......]I..7.i...3....<.y.l]....SI>...L.2..<.....[.'=M.Tsprp...T....cE'*..P........eefQ.NKN.x....:-#5#....q/..xq.YzJ:.T.*u.j..S.C=...|.....2..(YF........|...*.7t...{.jz....W..Y..{...nlfj...L.6.[.hS.=.....(!C.......?5..+...[..a.:U.K..C.......w......+..r@.z.7..j..qB..B.....X}..=.fk...>^5[....n.z....wn....Z4.._iWG.^..z6./]t......dhM.9s...Gbo?...U.V..tj.......*&)Io.{q.G...A...l...i7...&....d.E]....#.W.x,.T...&Mz4+].4.$n..F..x...<.ppr.............y.,i./..
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 59 x 61, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):2210
                    Entropy (8bit):7.86853667196985
                    Encrypted:false
                    SSDEEP:48:naUvGemgl0W5KMDRLEbGAnaHC7ew/fkDSCcE5FTaHWc:aerVlDRIewkXlrTa2c
                    MD5:73E38124F94AD20A2F1571FBBE11AEEC
                    SHA1:87FB8056DC7A0A3B70D51426771C4CCE2099CFE5
                    SHA-256:A700B63B30CBBE5230CC5E977D651E178EA87E73EAB18C8D5FFB1362149ADDF7
                    SHA-512:320FCE64DD6F975384BEC9267348CD5CD24A55B13BB09FEF1238C2216AD8ECABDCCC15601A079CE092ACFA4954829FFEB06FBB0631F6AE26E3A39E43C102048B
                    Malicious:false
                    Preview:.PNG........IHDR...;...=.............sRGB.........gAMA......a.....pHYs..........o.d...7IDAThC.yL.w...r..r....... ...Eq.nnN..i..[.e...-.d.M.dn...x.xmQAT.Q.RN9..EA.k..P`..=}..m.&~............oy....k...}}x..[....g59.}]...~i.SY......."....7Ow../......2...3f)n{..R..R......U?......O.{....c..pT.\.t....5.07.. .....07...7.o..,+.,.V.c...&..%.3I.....:v..\....6.....??..[.N...........nz..Z.B.........v.prs.q1V1|..=':..`.bz..%s.cf.3..RyMNUeV..J.k.}D[~xo..d..c...sO.y\....B...c.07......Rp..J.......{b.......;u...s....N.gko.M...;6...6..c.X5.S..o..\....^).....(......y.72.^....s%...[.q!&Z....C-..+o.....I.....,Y.{......g.1.0..I}.....<.....T..}....t.!x&)..[.7....4.5..{....n.<...#I...:.....r.wW~..zr..9k.^.]KR.*W.J.n.")....%0...)...Fbb5`4'.X..E.../.t.&,t(...@9....\$..........].P..jdU......H;.$.'%}.l7........y..$.....Z..4.Cm.u#&.%N..1..+..8....y...U.(.T.....}.I..5r}...!..K....>f..3.C.G..X1.(<.Gb..b(....0Qv0F.......n.z.s.Y......\.,.h%1...QU..%.}B|CW......sO..\.=..&3...,.
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 127 x 138, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):2232
                    Entropy (8bit):7.837610270261933
                    Encrypted:false
                    SSDEEP:48:dFQY2WmQbe+TukEC2KgYPsWOuWFk792oP/sWtGOK9Lc+rD0NTHj:3L+wKkEOgx3PG92Eqt9LczFD
                    MD5:EDB5ED43CC6038500A54B90BEC493628
                    SHA1:A8CD63F3914E4347F4C5552FB922C6C03917F45F
                    SHA-256:9F3312E33EB78C6952B5A5D881BBD18751FCFAC41D648C6F053CE781342A504F
                    SHA-512:4EBCEFD69A4C249AA3B0F00A954C4E463DA22FC9CA0B61A0DC46079B438138C509B22188D966FFF6599A3A604858BC4CC8FE6E0685A764E8E0477AB7A237DB32
                    Malicious:false
                    Preview:.PNG........IHDR.....................sRGB.........gAMA......a.....pHYs..........o.d...MIDATx^..hVU..}..s:..6..9g.MM3...j...*........A..!.A.....R.Ai%YH..(M.".h.cf*.B.......:...{w.{.......y.s>.{.{.=.........#.y..r.K...K.0}......Y..b..[N.=....j.=........!......./.6....B.8....p....5P)....@......=}............^.~..@.o`n<.q.....Yw]..mg\V*...y.W.T.>...\n...s.iG.~L]..d.<.8..j<.<1..4...CZ0...}...........oDDh.....]3}#"B..O........0}B.F.L......5.f.FD..L....5.7""4`..p.........'.kt.....>!\.k.oDDh.....]3}#"B..O........0}B.F.L......5.f.FD..I..x........Z^...>B$1.N"}4.....1:&F8..*.X.yL(..s.3......~2.EL%.w.Uc.zJ...B..S..b.7o|%..7..'.....N.|..Vi...q..uO,`/....\W{..y...&iI..|X&T.........-........Z..o.~u..U....cF.M....O4}......~......:T..W.._s...t..Dlb.$Pr././.._4.b......R.T$t..$.>hB. +.{......m.w .Q...05..C.}...}.....?..h.....Y .8.6^t....}.y.%......l=$..[.~..]..h..N.......*....SB.|....8..H......_...G...|......;6YQ|WO.o.}]..'.$..oE.y...i'9.[cmS..@m@.Q
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 742 x 104, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):13030
                    Entropy (8bit):7.948664903731204
                    Encrypted:false
                    SSDEEP:384:/06ULmwT2RqfILhmLy4tNpYGL0mvBQhTMHX4PCIVYm:s6USI2RqfGhmDrpYM0ofHX4aIVYm
                    MD5:17E9FF9F735102231846936F0E2BAF1A
                    SHA1:9EC1AE8A3AD55C48C02427D842D6E38DA85B5145
                    SHA-256:DD1CA8DA90893E0B63ABFDD9E60CF2BF844B311964E9D9DDB855C21FCA156EBB
                    SHA-512:71E690D6C87B09659296E6E6DDC8E3F91035DD80C5CE875FA557763E8138900C27FB492885291CEE203D65BCEE8C20C9C39E0590A5FD32B8A00BEB3E3F6D6E8F
                    Malicious:false
                    Preview:.PNG........IHDR.......h.....2......sRGB.........gAMA......a.....pHYs..........o.d..2{IDATx^.wp\.....sN$...$.).Q.")R2ei,kl.%....r..vm.x<...\...u.U.g.ry=..uX.cK.dI..I1G..$.".Fg.q...N.nt...3.w.w..~.v.O.....K.....A@.....A ..H.n.D;A@.....A@......e.y ..... ...1..P..xH.. ..... ..e.9 ..... ...1..P..xH.. ..... ..e.9 ..... ...1.@.$9..S....A@..4....^C..F..VR\\TT.........aHII1......VS..g........... .*....z..|Ek.......<R../55+33;;;+..Y..WC..#...P..... ...s#0::......522...,.v..D......_.....9.2N.L.'..F$.....e..!..... ...N...`1....G.....'&,f..f.X....!.lp......I_........J..z.R,YbYd&.... ......~"b\...b.Z.SS.....c....&..Yl-............... ..[...BY......... ... 1..Z..6NN............._.zw....MKK.Z..vMMnnn.4.v....,q..e... .D%....Q......._..p*M......22..e...k.}.....qU....S.a...~....P..}v.. ...1..2...F.GCC#...].=..C..n#...K+..MOO..........."....d^2=.{....U.p.h%.%n...D.....XB..b..'''....?h.b.B\v..^Q^.UC............Q...I.....U.VD...P..{.2"A@...b..V...........jF.x.
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 563 x 211, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):14458
                    Entropy (8bit):7.944094738048628
                    Encrypted:false
                    SSDEEP:384:uuT43eqJy2jEeSZE0onrAFAOpn5ytFfNrfIkBQTYz8ynth2EB:EugQeS+nrAFZ8tJNrfRQM4ynH2EB
                    MD5:7CEB71F78A193F8C9F7FFDA5F81AEBD8
                    SHA1:EEC1597705EFF1A527C246B86A71878185BA6B1B
                    SHA-256:77911FF7AEAB8FCCAF36DE6E1183FFE1A6C27F77B5714EE780976CE5189E8FD0
                    SHA-512:1D1AB19B64E1E2ABCA61AE78B3B50310B0A6CF19D2ECFCB4499D8D0BF68600B4D95BC0945EF9FF9B1D016ED61EAC518DCCA1A426F460317C07AD51E2E047948C
                    Malicious:false
                    Preview:.PNG........IHDR...3............>....sRGB.........gAMA......a.....pHYs..........o.d..8.IDATx^.}.p\W.ZRKjI.}..[..M.l.N..[..O..B&....?5...@.5.5EQ...T...d*U..*.C6....8..}.Wy.e........k]s..z..^...T....s...}:.{..n..1.."@....P......."@....p @f.s@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....5 ...f.;.0..7141...L.....M.3.L....{M.T...I.C...@E{.w.Y...q.....c3..gf.3..'j...I...{M..@..4555==-...!..f.....d...>i.%&&&%.u....f..[......O`.......G..E6I.< ..3.k...',....Y...<..........u...{9.......S^^.q.<..^....2.bb.E`r...ey........ ..3........Dg@L..a'.x&''.O.Y..!e.c%$..(P__.d.....Sj..S...BLu.[g..mK.SwVe.."@.T.@P.y.........=....40..L...$d..J....cccw...^.RBKKK...heJiS3.0I.X<..}..*O..........QR..q.5GTA..ht.(^.Hno..n.......wvv:..K?.\.JQ/i..h0)G..1Y....K.>FT...8..d&..,+-.T.b.........f.."3.V 6.:...E 1...?.Q.6....A1Smm..K...V}...:.uA'.$.v.cy..<.`.Z322.r.LI.....>......&........"..."......@.Ccccee.[..z{..fL5..{...
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 123 x 103, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):1657
                    Entropy (8bit):7.80882577056055
                    Encrypted:false
                    SSDEEP:24:q3kLWZefR0kKbfLnNhzzt+acvt2x6pBs/j+7QJU0QbDQ883ASaoUV4hNgq1rsyhy:q322nN+X11GDsg8831Uyhi/vf
                    MD5:D5F7A65469623327F799B516ACBFFD2F
                    SHA1:76C6333C14AF3A7EA091819953E6E12DC289A12C
                    SHA-256:F476FAE1C6D79069239C471D182631AB343749C22B1A6990250465C7EC3738FE
                    SHA-512:351B9E455E97E6247E64E4BC1B59C9524E70AE0D09D3B6FB96937378A70536483B00426EE69C3590DD415A8265D21FD031B524B90E4E86814EC9AD704E57793E
                    Malicious:false
                    Preview:.PNG........IHDR...{...g.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^...h.U..p.T..(.eBR....2.....':.4kec^....0.&.....ugS.8u:i.P.F..f3...D....6.%...xaI.}...y..9...s.w.s..{..y.5<<<...(0Q.............t_..q/.[@.....-.e.....=..J.L.......c.4H......u?.XF.KJ..zb..0..f}..'J.,[&..S.6...w..9..._......<.........?j....H........>....~..}.n.8.WW..B?...?.b.;.....<....~...b...m....&1.=.Pq....w....a_3.k7'...\....d..z.O..w...s...Lh.x..........Q;40.i..`.8V._.@...rd.....kF.@<@..e......e....=mHB;....E./.\h.^....q..>.....%v:.O.:...&q...:.'e..9...h.iG'.L<@......([..|'.n.x...c....._O...[)......S*..Q...d......A....4..t....E..v..}..7...t.b....,/*|.H.]...8.. .@.(.;"..Kt.....].+.[LwJ..B]i.b.k.@..Js......J......6..J._LwS<@..J.YLwV<@G.4w.L..G...]..zu.z.h....;...W.IH..+...c...F....qI....Xul..]...N...wv\.M$..D...+...=.....?U....T..^<6../T*.{q.q..:....y..XL..l..z.d....G..b..g.G..b......SM.{q.q$MUL..R..........^\P..g...e.....L/yqM../.b.f..........J.<
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 163 x 131, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):4847
                    Entropy (8bit):7.950192613458318
                    Encrypted:false
                    SSDEEP:96:JnieMJz5Tz/gKVp93jQvcv16kjOzbapFJBkjcMNBqmQzOG8qx1QKnse8T:JieMJzph13Evcv16RfapFLxMNBo8qxan
                    MD5:A1A1017A6A7928761CEB56D1D950E123
                    SHA1:28272E9C7F816A1CE8F2033FC00F489005332365
                    SHA-256:72F066CD34EA71D0E1B28FB60D663B0372C5254E1A8239C94A164EEF9389DB88
                    SHA-512:10F4557F102230126BC86CD4B49C93365C38D5CBEAC51F4691B90D861098866A2BDEFEBA507731D4FA14367FEE430453BD716157F9074EF643F2B949B09E1530
                    Malicious:false
                    Preview:.PNG........IHDR.............n.<.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].\TU..}...E.0.T....L~....af..Z.....O..4..>Ms..Js_....5.E.d...Y....?\z.3..}.l..|?~...{.....s.z..Y.............E.X.6...c..u...y..W.j....."}...l.i.`.!-!-......MKH.E.bi.d...b.X.)...X4 .vJ6-...;..+/.->Qyi.t...%.T..k;.U..y.C$[;..Gm.......v..*2..2..eee..."!..)...yy...III./..u........2....M.:''...W.....o..t...._.6m.... .`,k.T.v."..q.......s~~........O....ed.[W0X..HB.V.i.....<=..E^^......MyY..vpp...........^6.....aQQQaaa........]^^nkg../_.d`.%......L&k..B......?C....W.VVV6660t.J+K.:..%q.....e.cp....Kz..%.qZsAR\T.!......>55.R.u.W\\.L....T...K..rE.U.K.-9......y.y.......K....>...HWTT.e....+..B.......%%%......^...|...M'.%.f!/..=p...{O..../...@...DP..hw8....7o>..A.mgg......7-']~.s.OE.E.|=.......'%!y.......\.....MSn.i.........!...U.$0S .......Z.P.}[.%X[.;{....N.....\......6O.....'.N}.}s.m...E..V..f..r...4..~.......H..F.}....4,.R.=.......xT..4......./...,z
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):1604
                    Entropy (8bit):7.814570704154439
                    Encrypted:false
                    SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                    MD5:3F1535054D4F9626F0EB10CEE47F076E
                    SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                    SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                    SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                    Malicious:false
                    Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 165 x 131, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):3879
                    Entropy (8bit):7.9281351307465044
                    Encrypted:false
                    SSDEEP:96:k1hccap27HGVhY2Kn+A3RS+HG3dXrjmg26vh:k1hccewIhYxRmR5
                    MD5:C451B2A146BDD7EF33AB3EA27268796D
                    SHA1:C040BA2F31342CBCBF597C96D4D6EDB83D473B77
                    SHA-256:4C264B2A6E88712234DAA8E3A8D630CBF4EEB338554CB0B794D8031F8943EE65
                    SHA-512:55915A304B261BC6F38F5CFE0389D5195F85FE2C1DA325019C3AA391E8B1773091E078A35BD57F8CEE0BA035956382AE33790EF462053FCE711EEA9665B7F917
                    Malicious:false
                    Preview:.PNG........IHDR.............c.L.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].p.U..g..Bp!...\.!.`pA.+....H.U..."Z..*U.. ..P.D.-.$..,,..$.g.......CB.l......I.g.pc..Lf..~.=.~]S.....w.9..w..'...!L..A ..^.t...v..s4&&&%%..6..`..:.G.D@.7.qS...K....[..,...o...p..2.%..B.Y....|;..gy+.[..,...o...p..2.%..B.Y....|;..gy+.[..,...og...}.W..z\?...y..;_t....=..e\.....6.M|[...B._....[_.\^Pf.....f.....\l..../6....<S.4./..m.......l....B'.n...O...yc...........X...P...k....t..9tf.g>....e..Sy'.L+**.]{..a...,7...p..+......K..y.9p...I{..i58....v..5.`Op.....{.......8.._.S.........p..).........;.....y...2...b.[>gP....C..G.H...........Osp...)..9x!...W.,..^....$r.p.sOJ.l..=.x.9s&:..........h.`..W"V..|.l{..72.....zv@.#.<.........../....F|...c...4.W....:uj@1...~.X............^si....Z..I~.Q.<.....NAOq...+i`.)...$L..gV.6#.....F$..hD.g.L-\..H._.u..]4......h...T.BK\\.Z222....7))..h...1??...~.-i=...X...~h....y[.............p.....x....c...{....Uh.7n.....
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):1604
                    Entropy (8bit):7.814570704154439
                    Encrypted:false
                    SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                    MD5:3F1535054D4F9626F0EB10CEE47F076E
                    SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                    SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                    SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                    Malicious:false
                    Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 165 x 131, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):3679
                    Entropy (8bit):7.931319059366604
                    Encrypted:false
                    SSDEEP:96:tT+LtoQ9jsUBsnwlDGThUe8ww2iJiGEjdKKnnE+Gh:V+Ltt5GwlDQhUe8ww2iJi7MKnnE+K
                    MD5:995CEACAD563F849C4142B6A6F29F081
                    SHA1:44CB3B867CD2917541B7D5AAED2F14F10FEBB0FD
                    SHA-256:3691FB8C60EA1B827092F05FBB1807E34726016C6FF56698D7B81C44D519D22A
                    SHA-512:3C8EFEB966B075D06D8344483352BF92C9292F9970C9377BE254EB355EFAF017916737AECCDC704B84D532B7229F9908951A6F2CC3FAD810791CAB224401AD3D
                    Malicious:false
                    Preview:.PNG........IHDR.............c.L.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^....W...Gh...k.Hm..J.m....,X...Eh..%.n.....PHvy$%...[...R..l...(/..-..yl..Z.h..H!.../.|.y|w...7d3s.s.=.{.s.g.6W.^..)..@..{..'O.LL.......c.^.6xS&O.,...J.(|?...............,.$......@.zk....,.$.........)..7]O...mH7..0..|..&j..t..F...T...AZ7z.....$H...AZ7z.....$H...AZ7z.....$H...AZ7z.....$H....W.6.....0...FTcc.Wi....Q)...<.*.....{...#G....Y.f....KKK..,,,4.....{S.`...+O.[..+.\H...(.<..Qy*..ET.PM...c....~(.g..**...ol.K......Sc8..q.F.KM"<...:t.O.>b..$*t..].........2..y.h."!f.08hT..m.(..C.7n.......@....SVUU).F.).X\\....[j.U....$x$d..e...<.W......=;0L78t+..Gw..-....]......C7......K.w..._..g......A.&M.$^.#.!....e.\.P........;vD..@...Za.@*D..f...! .2w...4#.J..c....K}....F.u.I.b.V2.k...5..`....*........M..!.,.;.E..BZ....K..[7....5....,...........K...7+.6..o....\,`...z..5x...\46x.b......Y....s.^.x=.e.4s.W..t,.iu.G^.....(74....`.....:......]..&..j+t9..3..}..
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):1604
                    Entropy (8bit):7.814570704154439
                    Encrypted:false
                    SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                    MD5:3F1535054D4F9626F0EB10CEE47F076E
                    SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                    SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                    SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                    Malicious:false
                    Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 167 x 131, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):5386
                    Entropy (8bit):7.943706538857394
                    Encrypted:false
                    SSDEEP:96:x4F84/zVJWedudPZZRdbvczHe2ftFJ0y8Ea5b2AELJj:x4FTnodRZ7c7LrabEaMAGp
                    MD5:DB48555480A383CD1D4DD00E2BCFCF29
                    SHA1:8060B6FE12175289F0A71F45B894030A0D9F1AB5
                    SHA-256:807723D8F90A5BD41269A7A62817547026A117D666D5BEF454EB699C97CA3FA2
                    SHA-512:2614C04686299CEE8D56577A1E836A26076D42E041C627177FDB295629F6A80190910947FA794A094C55A45C3D70725EEF29097118E523A38B50C9263C771A41
                    Malicious:false
                    Preview:.PNG........IHDR.............gI......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..xTU..M..B...P........)vQpQ.ED.""......,."....*bC..VT.. M!...@z....1...Wf.w..o29...=.v.TUU..^..@....S..<..;h...5.9r....x..7N{...=........'...N...u...9..5+YW.;..N\..u...9..5.....O....,.K..'.../.....1..T....>.f..9.xo...u.xo...u.xo...u.xo...u.xo...u.xo...u.xo...u.xo........'L...g.UVVz.[.n)...Yqq...Y.f.)//_.l.W_}.,........S^Z^Y..++.*..pF.....?...I.&...O,.k.d...~..w;Q........7}1y......e_............=y._U....{..}.w.O..~.z.{........W\q.."........^.h........}p.+.>m...d...4...`a~Z^....me......:N]..1...g..y.f.......l..g.).......e[........Z..RB.KrJ.....#...{..eff..v.[[<.n..?{.....SN9%...V.yE...s2..........e@Wz..I...B.r..<.-.=/t{.v.|..J....,.@.A.v...s`/.....6f....L?.z[T7..)S0.;c....\s..z-C.....v..}Y..{..j..xF.....'.#_..C....k|3..8...N...5......f....3......f)-.p..%.D.v.v.].f.......33<<......[bbbt.]w...:.r.....z....q..=....m.uhD..,..zXg
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):1604
                    Entropy (8bit):7.814570704154439
                    Encrypted:false
                    SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                    MD5:3F1535054D4F9626F0EB10CEE47F076E
                    SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                    SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                    SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                    Malicious:false
                    Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 749 x 126, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):13084
                    Entropy (8bit):7.940058639272698
                    Encrypted:false
                    SSDEEP:384:o4KSpFN6Ud4c3p2Il1yavNr5spYVJzimlfZ:wGN6Udv4IKavLBJz/r
                    MD5:0693DABBBC411538D209F32E22F622F6
                    SHA1:FB7E675406FA123CDB7E058D336742D6A2E8DC8E
                    SHA-256:2DFB2E7A1A3AA43C673D2EE540D3C366CEB12105EB5441F98992FC06F4284013
                    SHA-512:F07732660EC62DAE58EB02E2E9476007EA92BF826F642BCA547097136AEA01D29FF69D9B0CD0F5D65A5E15AA66CA4AA4804AA171A3504AAB198631C643C90C16
                    Malicious:false
                    Preview:.PNG........IHDR.......~.............sRGB.........gAMA......a.....pHYs..........o.d..2.IDATx^.w....'m.9c.6"...&.`.N.(.TN.Ne.N.R.eKr..T.*[...?T..:I.D.S>I$A...I......y.9...f......3...Gh.....}_.o....n..A@.....A@...L...2... ..... .x...#. ..... .....1f]9.[.....A@......3 ..... ...fE@x.YWN.....A@......1...... .....Y..J.Y.N.....s"................./..rc.scuyyyu...\s....t.oi..j..lv.....Gr.#9%%%9%--....d.T...r...DH...6.....%U..A@.0.....rAD ........2.5.......L.R..=W...gZ.`o..-?.T.Cy.:...y.9..y.EE...v......1..R.....1.".... `"...ss.......i.!.hY...Fj*....%.-.Gw...HJJr8..6...#.......!(.?P.(.....8(u........*..OOO..........dgg....Q..=..c.y....A`S.@.......3.CC..GFfg. .I.I.COrJFFFNNV^nn^^.z..%..(...^.b$........a..y.LMO-.,ylV+.k...T>Jg..*//-+-......M=..x.....E.... `~..N.Kww.......z...%%.e.%.yy.i...P.)'.,A.5.d.0.Cc35==66>2::33..>..;..Ii.i.gv...DSd....l#...l..............................)**,**...V..1 .F.'7....)..SSs..7..F...C.p....(*,......(RG..B...l!.2. ....|r1
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):17289
                    Entropy (8bit):7.962998633267186
                    Encrypted:false
                    SSDEEP:384:ruwwXKZuqnOnZprU3+OXBruY4UkcY+TpI/BSqCrEoMXMEr3KbzHIDqqAmk+xob:tGcxE4PBruV3Uy5SqCAoMXzrQHoqAk+m
                    MD5:708E8EB906BC105CCA0535AE669AA651
                    SHA1:38D82DEDFE97D3001188C2E18FE13BD741FD520F
                    SHA-256:1C3D07765294566E17270D0F3B9257A3DB7905D4E7EF746AEE80CD591CE0308F
                    SHA-512:1EFC74C28190DEE2D2732390B74049A1B120F05EFB8DC6925207C6990AD20450FFAB40249899A9DBB82E8F92A61F770E120A450CAAC7F8C5F0742586CCE0EDB6
                    Malicious:false
                    Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..C.IDATx^...Uc.._"oB.Hr.m(.0......r..[1.D....R..q)%FBDiB.."w*.k.Jz.Y..l....>...9{.......g..Y.z~..k?.z.^k..+V...! ....(.....\sM.tD@...!P...HW.S....u^.....@.r.^.....B@...U.H.J....... }....".....>....! ..A@.4..EE...! }*...B@....i<8.....B@.T2 .........xp..! .....d@...!......(*B@....S....B ...O..QT........! ..@<.H......! ..O%.B@...x..9...C'|..{.>Z../~^.s<<V4..ujo..v.Z7..EwT.....@.....?.......~{...K.........C........bB@.$.....C.{....Kf'S.....T.*&....@<.....'..D`...;~v.DT]...r!..>....ru...}.....#uG.T.....>..z ...3v....P.M.....5.@<...?....F.}..c.W[.._!P...O..>.M.d<..J....E .}ZZ.+.5v.p>..N.{B....>M.Nzfb...OB@.." }.D.y...IdK<..! }.:.....f.K..bX.T9...&T.&?.VB9.[B@..@@.4..1}.4.@H..-!..}..~M.<.z..I}.G....>..S...N..@yj..n..s.d._.....(..R"....Wf\.oO.^...\h.\.`)...ni.'.].vk.1-.k.^....#.,}.{.RM...~Z.S.. .@U!.&}......h...{K..@.........W.8.N.s.Y.0)..f+...%4.......5.@j.):k.+3...I..(
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 185 x 76, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):2332
                    Entropy (8bit):7.8822150338370776
                    Encrypted:false
                    SSDEEP:48:jB5Gg4vMs30WIn5IVeRy1bY7DqbqQBAeNjukXlN4AXat:PGYuEWV/YH7e1uA0AXat
                    MD5:91CB7F1273AA003076401081B8A22237
                    SHA1:5157144069E7D2FDAE60B397BE5851E75BDF7707
                    SHA-256:80682DD6472E8D1136BC5E20F6DE87B595562414B19EAB8E965736FE992921B0
                    SHA-512:5A8E3C0ED0DB94BFE359C63793F12F3D7B3C37F3A13A5C96634BA1DC8C9E50FB1142FE4752FD9FBFA39A682F78C54AF868AD337EAA787801FE5F66D8F55A8196
                    Malicious:false
                    Preview:.PNG........IHDR.......L.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.\.LUe......Ji("....9....-.."..5L.Y.Y.....$350.."2.lK3Cg...T..DWZ.......i.?!<..~x..z.......w.sw......9....s...w..l6.:....p"dH...F..B<...qE,R$G\!..E..".).#...."..{f.PyI.d..l;....;.=.S...O.S[.\Y^P.aj]9*Y!. ..~..#...S.s...l..h.[m....%...P..@.kG......G..X.r|%..AO.}-..G>35..c....Ac.&[W.d..+...zG........=..l...VS.d..+...tGd..k-._.....oL.:}.p.~.W$C..|...I...n...~......,.i......e..=..?{......>r~.Lw.+2..\w.)w~...c....h..u..%...PE...f..'..m.ZE.1.\....U.`X......$...P%..UH{[K..o7~.k.49..W.t.~.^_..7.,....f."q....+....;...~;.c.......Xb.\?...........0h.lV..WX!.....ljm.1c..U...[..X.)......B=.0~..W...rO..j...ehI5U:..66V5sJ.....V...]Y>...1kQH..2.........d....S....I...+..].p.....m7...Z....s.D>.K/]..?.l....2..=..~.mq..".+.....,..8. v.o.).Z......>..Xv..i...TA....M.....>[X...Y.7lJ..e7..S.....02q.O&9.......:L....N.......W....d..FqE..T..N.....R....kXv[..j......g.K.\@`.M..B}8n
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 452 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):13737
                    Entropy (8bit):7.916899917415529
                    Encrypted:false
                    SSDEEP:384:jgxmx2Fa/+76A6M6Y7rSYRv47cwbkkapeIiRmDGd+gUwOSpQ:KgyoWrJWRkkRXmad+gE8Q
                    MD5:830632032C7DDBCCDE126F4BAE935540
                    SHA1:9FEF1DA9FF1D7762B779553B5F873BE54C8D01EF
                    SHA-256:2328D09EC845433DC31808FD6B12616F1D28B9B3BA7DD969ADEB6C32D8EB049A
                    SHA-512:5C17EF9A0063499F2C34FAB2C4D968D29E20F20868921FA914E5737995AA0C166F224995109FF7ACA57B5B0F8647715DC670C4AEE385F61B5F8E6E8422C49EA8
                    Malicious:false
                    Preview:.PNG........IHDR.............w.pl....sRGB.........gAMA......a.....pHYs..........o.d..5>IDATx^....E...,"o.....&....AY$....AE..".l....+G.>AP@D..e..".".A.Y.@...K..IXB !..!..c1.On...===3=.3=.>9O..u....w.z..-].t9]B@...!.......Z...B@...^G`.Q.&S..u$d....B.Y..P.w5[]......B.m.D...! ..@...Ls.Q"....."S....B ..D.9.(.B@.....b@...!..."..@..! ....T1 ........i. J....B@d....B@...4..%B...! 2U...! .r@@d....!......*......9 2..D...B@..L..B@..........D..! .D...! ..@...Ls.Q"....."S....B ..D.9.(.B@.....b@...!..."..@..! ....T1 ........i. J....B@d....B@...4..%B...! 2U...! .r@@d....!......*......9 2..D...B@......5jT.@.{..O.;k....>.._o.+......{V...&C..(?.m.....F....gd.....?.....3u..x^L.1n^...@../.....XE....L..!...t.....L..B.).=..sn..U........@.O..$..o..L.....g.(D...(....Lo8.....,....f;o..i.f.h.9........\./..[W.9.....+....,X..+.d.....Xc..7.p.m.Yg.u:YO.V..l.t.].Z.g.U...]...5.^..._.~.WL...o.3f..s.,Y.X.7.x5...K/-..._.......{........W.(Y....?...!....W;.....iwNMW.............@+Q.5.#.
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 213 x 85, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):1924
                    Entropy (8bit):7.836744258175623
                    Encrypted:false
                    SSDEEP:24:rloPN36BoJ9JK5lncTww67QKf5wX5YgM5s6cahePwnR6+eA9zQU13ALcVz7wTQ8U:rYN31JH6lcbjMW5Ytmyqwp9H7wY
                    MD5:B1FDE66F75507567B5F0C6C07B01A3A1
                    SHA1:80B8E6A923E853232F66C874367E90B5C9CAD7AE
                    SHA-256:B9C82D2F31BBE409D159EE3C9129CBAAC7C6F6C81637AB9B6DAB3C11AA74B7F1
                    SHA-512:FC8C6038D3C2F5765D7524E969574ACD10AF6FCCFD45FE7C6DD4A8C2669B13EE3FB1A8833E94A046AB7037018170B5B87B1A2742E0E10557C413AD634BDF343E
                    Malicious:false
                    Preview:.PNG........IHDR.......U.....Q.6.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].O.W....G.lT^M*..J.....".4*....j..H..R^.".m..5....&..j..B..`.`..>...X......]z.[&.>..ef..gB.d...s~.=...3....m..(E...~.[....... .. .E3..7.4.......}..H._.D.,j.)..q\.....7..#.ag.o|.?.......;C|.#.../v.H.......o~.{G......H.|..;..v...G.._...p1d2..&......QS4<..i.".X.....1(..GR.R#.}.!.E<..:LLM......s..:"......Fa...b.....\.T..~OD... ..:j.~..p=Y...Y......?.Y.A...0!6_p.dKctjvZ....\.........V..1)..:.....;7:...(.[...7.....u..'ra.....S.]..........7.#,[..<.l.....[.........90d[.2a.R.........E.CJ..C..S..*._...$^...Q..:>hx.k7.`jN:.W.X..N..p..K..."...q....a.Uy.......[d.:vmkk./cW.>.K..C..?\d...'.@s_.?&.....V .?F..;k.....%+....+.3bk......f....T....S.(2.=...?gQ...K.._,.#....?.1W.......m2.....Z...-..:..?.#J......KS.P|&[<..........Dd.....\.....W$z].k..-..8...>..Q`Yz.}w&..._......?.)_[T...:wy...O8.Om......l.....\....]..."f...........q.o.V>~s...-....N{.n....w..O|.D...
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):11886
                    Entropy (8bit):7.946442244439929
                    Encrypted:false
                    SSDEEP:192:sqNuEpzsnKxkfLaZCdMh+cLApmRausyZwYMAisQKShDBlhr34ckckcZ:JNu6DMLaZsMhtLAIa0wYMAvI5V4DDQ
                    MD5:875CFB3B5C3619253223731E8C9879E5
                    SHA1:6372F4F5BEB6EEAE3EDBE5B62EE73039B40AD01E
                    SHA-256:CC69BAE5D2C8F56B28BA4E3C6A11F57C4E8CCCE69943ACFBE7E63B4FC90EE5F2
                    SHA-512:47F45A3275B8454F8000F4567153DD7D4AF3012005D8E34CB18AED6AD69083BEC753E607F275FBF3EFCCB7BA00310A04ADFBD5FA5B73E6BBE47CE73901C35CA8
                    Malicious:false
                    Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..x.U..I...JB..;H..."..(U.EE\\..._v]W..b...Az..{G:J..B.$...H.IHB.o2xE..3gf..w..2....w..s|.....C.$@.$.....t.!........8......RR....<...6..P||....$@.$@...PO..$@.$ ...T.GZ!.. ..)c..H........H+$@.$@=e.........S1.i..H....... ...C.z*.#........1@.$@.b.PO.p... ....2.H..H@......B.$@..S.......!@=..VH..H.z.. .. .1...b8......PO..$@.$ ...T.GZ!.. ..)c..H........H+$@.$@=e.........S1.i..H....... ...C.'++kH.G.=Z!.U...73o^.IH..O|jrj.D.......I.M.........Kph.............R.x.......RU8_".......j.......B"O.z.|.9.."..L....Y.d.Rej.-Y.dhX....:.xH.z.!(>&..4.....O.<..T\.%a..e...*..UnR....+j...2.."..M.O>.z......T...].j....m...S.`..&..)....f..2..............+..SP..?.a...=.....3......K.zj.5.fP.......2:..?.....%....d.qxC..W.~.._....!.W..6....iJ)*.(..wg.}.]sw\.r]...r"...e_-....5_9.YN'...PO-.d.:.%..wZQ...H...JMJ.6c....|g*..,.3.....T...o..Nyc.W.....A.3.._...U%...PG.z.....&.%.v....AIm.....~.
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):16003
                    Entropy (8bit):7.959532793770661
                    Encrypted:false
                    SSDEEP:384:1l+zN+iNurNE/tBdEC/vkape2XHYdhOm+Bl6C4:L+zN+iNurGNEC3fpe2X8Pa+
                    MD5:3A5CD52E925A7C4A345047D8F06C3C41
                    SHA1:9C02828D83206BBD3EB58930C8C65A6CA5DBCF40
                    SHA-256:477277E8CAAAE1D3B3EAB5B3660239AEEABC433743A191727B1A71E529872AC7
                    SHA-512:8D8B6AC645ECC7C8BD374E6190819006C71AC0B5993419C42463009116214E5EC4B4235D94B4AE4CDA132E7DDA9807ADC51525824AC5F12696517FFC8890891E
                    Malicious:false
                    Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..>.IDATx^..|.....+)..H..C.K... ....x).rU..T..*E...;....*.@Z.....@...9q.g7[fgggg.............1//.."@....0..#.t..f.C..."@.....@OIR.#P...0..$...y.Pl"@....( @zJ]...." ...Si8R*D.....S..D....i...J.R!.D....R. .D..HC..T..... .D...... .D@.....p.T... ........ ... =..#.B.... =.>@........4.)."@....).."@...4.HO..H..."@.HO...."@..!@z*.GJ...."@zJ}...." ...Si8R*D.....S..D....i...J.R!.D....R. .D..HC..T..... .D...... .D@.....y.?.`.T... .f.P...$47........~E....!.D..X............].`....0..N.a...>[||...t.T.w *.. .....)'...=X?c.......+OE....<-84...=.....w.8...7.Ro&.D@!...GS.....s.......:...Gg..8..T...u...~..............<...S...../Y.......W........#. .vB...u.. .+.999YYY......wf..._.{6....=..]>Y?..;=02eb......2...;.%..\...P..R5....XMO.....6....W]...3g.5;.n{t.......F7S....r...[n.......AAX..j[.j.;.neef).2.....{ ..r..{7.-........i..S........<..pm.u.V....M.333....K..Mr.s..Ek..=t_.#.P...
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 164 x 89, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):4190
                    Entropy (8bit):7.94161730428269
                    Encrypted:false
                    SSDEEP:96:GHfueo3dRLZKOSYDzGsEgfB9nqS0WKt/z2jOrrz7yrT7N:8A6AzZfBtqS0WKNC2vyx
                    MD5:8B3AEC1986A522951942BA72B85CCAA0
                    SHA1:7E0DC78FC65EE4C804A4B0C72AA53E2DFDF26C14
                    SHA-256:8B02CEC726DECF033B67689F369FDE1002ACFD5F8C32E0F248AC575997204F2F
                    SHA-512:8EE1A1F6F0023EB4F60760C2E23EAFD56E6D298CAB49D819CF1D62C0CCF608D4211D3767856255F7CF8FF45AD835FE5475EB92C608989C522CD48D00A050B189
                    Malicious:false
                    Preview:.PNG........IHDR.......Y.....?.......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.]ip...fu.VBBZ..V'.>........CR......?r...pU\....v*...T~.U)0..('`....."..,a..Y..$t!...D...Mkvf4.VhW;S........{...zZw...i......fj..$..7......[Z*.[.[..Zk...?.t:M..,..`.^...X,..sUK[..Rg.=$..!.3<....74...iY..i...k.,.fA..Z.n...`G.%..H.l7..7J...u.R..6....E..!....N@.....M....Q`...U2.w.WP[!fX......c ./@7Mz....^...k.)....v.Q`..z..1A..P.{...||...vY.....>.`...K...m.?CX./v.8.....]..;...6..kw......N....z.Q...f..q..xk.5....;.?.Z.c...`......4....?.....VV.u~..<_......sU4e.....g.c.G....O/..r...`.G)....#d5.O..w..{....twL1l.)#&hF..K...M[@.Dl..V2..j.3..s....3M.....v..!....V..c..B...|..e.1....7.WA0.[.\.u.).$7f.+.......8..e2K/.%.Ii..`w6w.E..[?_.?.?..I.k2.s....]..f....HM.?w..d.9..Rr....Y.c.}.s.zk..rc...a..I(9~........m...Z............I........7.K:.:Bf.......m..1.......&..,...?a...c.@.@.g%...s.#...;..c6...g.lZ....}.WX.3.8.....W....N.w...L...}....?.".......;cI.............pS
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):11332
                    Entropy (8bit):7.9324721568775285
                    Encrypted:false
                    SSDEEP:192:vpXZavBpl00n1Pt7JquG9GYHDK/5cxektxMQjcie9ZZkx30eXJIb8FKRN:vpZaDyc1P1Je9G62/5clpjre9nQkeXJY
                    MD5:31579CA3352DF8FA4E3E7F48C7CDF672
                    SHA1:AA682A3C781BF8EE43B5EDC9718E64CB79135F25
                    SHA-256:B0E7824BEE2C896279457D87E61E902431BEB528D830524CC4DFAE126E89FC24
                    SHA-512:782FF9492E3ECB11C72D316DDD94D1F3E94CD908FC9452A37DA6CA30ABCFE9AB2BCCED8583A569DA68626BCEC730408AF86997E295637BF64AFF5BC768F3E309
                    Malicious:false
                    Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..+.IDATx^.{...u./-...&....6..+z..Q."b*. &M.d-e.*.. ....J..Z-T.Z$....R..F...%*`bn..<.....W.E ..w....^...;g..[w.5w.9g...3......t8t.P.?$@.$@.5...=.8qb.... ...5...a=...#.y. ...@B.....am. .. .......$@.$`.....G.B.$@..S... ...C.zj.#[!.. ..).......!@=..........}..H.........VH..H.z.>@.$@.v.PO.pd+$@.$@=e. .. .;...v8... ...................f.o_o{....~t...n.S.N..?..._..L;J.H ..,....7.}...|....7...b...|.........ObVa1. .?.X.....~.....t2..V>.b.}..0.F....%`GO7.n#~..F....K.~...FX..H.^....k.Z/.2v.W..M.<.;$...v.t..,UO.-]............D.....o.J..Y........5.%.l....{.....'O..dC$....=uks..;{x.,.N.=.."..Q]..w>.E.H........AV=...f.&. ..ip}._0.~[pf.`..9..v.W.,..2.E.$P........+...OcC.H..=..|..[..g%(h.....W...?...UDh..T$..?....|.]..)?[Wo.h.'..2P.1..!.......$.NO.5..}...c.;...~.x,|Q....B..6.@>..y..}...m...D~z....L#.0`_.`.s?|....I.....a...=N....c.._.2.._..6 .]...5....{.^>.lM..;n...k..9J..S.G..{.
                    Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    File Type:PNG image data, 340 x 79, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):4490
                    Entropy (8bit):7.928016176674318
                    Encrypted:false
                    SSDEEP:96:WXKr7Xwf6Obg+XaGOnsjbbGSb+ydWtRvEOhDE6XqPeosv02tR45boo:3rTUgXZnsHKSb+n+8DdKlwm
                    MD5:7F161B19B937AB48D4FD2F6E5E16FDBD
                    SHA1:BDCE4F1C73E87E609A7FDF245A512CA4F73B35B9
                    SHA-256:C863C5E71D1116D69561BD0637F4FE4C4240E9CED05B8A5B056073AD13E6495D
                    SHA-512:E915B76FAAC9512D2AD11CF4E4530A19BEA1C7D8508BC218C69CB041F1EEABA3E2E03B1D56E61B032A6418829752C21B8354AF1335466D7E1528A06E6742A461
                    Malicious:false
                    Preview:.PNG........IHDR...T...O.....;.......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..p.U..'...rD.WX.... Q.. ....."$.ZHP.Z...C...........R..%G8R..... .R.C6..A.b...0...^...#..g..........z2.....nB...l..X.&._.a,...a,...a,...a,...a,._.73'N..ukeee.6mZ.n.m.G.}...n...a.9s.DGG....y...8??.o.pE1....Y.,......).ca.i.M.:5$$.........Lr...ye........6...8...z.-r....d.(.xc..U..^11...._>.QX..y..2...T...sss1..."A.?_.;w..S.F>......4.G.......D.|...@.K...............C...k...P...q....6.`QQEE................7;;;.._\q.k.|...\.z..6j>..n....Y.&G*.n.S$))).....r........}.{[Dv:,..w..A...`..........a.~.N.f.s...P...*..'7n....eK....+.n;:.W..C..9}..O..D.q..X..5i.s~en.c..F&..?.....l.]3r...W`..#..7o..R.@^..*...W..?}t...{.B.8..D...UPa..~..C...|.C].a.9..R...c.Y0..9.u...d...C.......X.U....WK.....5...'..PM.`...<. ._.z.F^^.EH.K>_.0.d..S...Yj<..~.5.?l.fZ0.@d.....*..G...K.....e...b.|e..Q.4.....('z...!G.....2..XQx\......X...2.\h..X~.e....Z....=....C.1.......w.....d.z.
                    File type:data
                    Entropy (8bit):6.730626007304085
                    TrID:
                    • Microsoft OneNote note (16024/2) 100.00%
                    File name:Omics_Journal.one
                    File size:120428
                    MD5:5e5f9e4e0a1fa534737476dacbe48348
                    SHA1:3554b122b5796893b8cd05b2dce61733a2ec5f81
                    SHA256:2b8a0bac5cb3d9991acf3b66fdbb60cf0fcfe7fc4bc783ad011315bed88c1221
                    SHA512:3d63b8632bb01e67f68cbbfe18a8178badfcbe5f4ebb9aae923b7b55f4fa4e2b6e86f91a53d616cbd50fb6055f44a9bc0d492fc7453d079101ab78460b0fa156
                    SSDEEP:1536:RDBoTVdaeNtuXndCrJJmT4HVnteV4FrdMiYcx7bfCb6HPdnXd:1BoC+tCYvSMVnte8ZP1Y6JN
                    TLSH:57C33BF1A8025C0AE123C976B1FB661399D051ED42283B2BF87D507DD978A20D6DD8EF
                    File Content Preview:.R\{...M..Sx.).......i.E......&.................?......I........*...*...*...*..................................................._fh.*..E.......n..w.....................h...........................8....... ....... ..}...M..t:."S.9.............TL.E..!......
                    Icon Hash:d4dce0626664606c
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    192.168.2.7167.172.199.1654970780802404308 03/17/23-09:08:51.438448TCP2404308ET CNC Feodo Tracker Reported CnC Server TCP group 5497078080192.168.2.7167.172.199.165
                    192.168.2.791.121.146.474970280802404344 03/17/23-09:08:27.247110TCP2404344ET CNC Feodo Tracker Reported CnC Server TCP group 23497028080192.168.2.791.121.146.47
                    192.168.2.766.228.32.314970470802404330 03/17/23-09:08:34.494335TCP2404330ET CNC Feodo Tracker Reported CnC Server TCP group 16497047080192.168.2.766.228.32.31
                    192.168.2.7104.168.155.1434971280802404302 03/17/23-09:09:04.438083TCP2404302ET CNC Feodo Tracker Reported CnC Server TCP group 2497128080192.168.2.7104.168.155.143
                    192.168.2.7182.162.143.56497054432404312 03/17/23-09:08:39.692071TCP2404312ET CNC Feodo Tracker Reported CnC Server TCP group 749705443192.168.2.7182.162.143.56
                    TimestampSource PortDest PortSource IPDest IP
                    Mar 17, 2023 09:07:42.580981016 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:42.581039906 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:42.581163883 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:42.584794998 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:42.584822893 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:43.209117889 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:43.209255934 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:43.214291096 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:43.214320898 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:43.214950085 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:43.266951084 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:43.456065893 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:43.456104040 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:43.808630943 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:43.808671951 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:43.808684111 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:43.808722973 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:43.808877945 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:43.808898926 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:43.808934927 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:43.860788107 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.107357979 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.107383966 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.107450008 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.107511044 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.107640028 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.107654095 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.107657909 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.107657909 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.107722998 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.107765913 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.107803106 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.107804060 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.107804060 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.108129978 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.108221054 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.108241081 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.157702923 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.408874035 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.408895969 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.409054041 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.409060955 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.409115076 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.409128904 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.409137964 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.409177065 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.409198999 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.409212112 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.409284115 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.409354925 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.409364939 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.409446955 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.409518957 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.409528017 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.409909964 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.410017967 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.410037994 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.410175085 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.410290003 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.410305023 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.454622984 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.454737902 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.501542091 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.710546017 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.710572958 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.710685968 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.710717916 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.710793972 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.710797071 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.710797071 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.710813999 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.710846901 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.710856915 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.710860968 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.710880995 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.710910082 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.710988045 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.711183071 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.711277962 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.711287975 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.711318970 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.711349964 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.711360931 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.711433887 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.711452961 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.711637974 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.711724997 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.711743116 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.711781025 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.711852074 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.711869955 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.712105989 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.712194920 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.712220907 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.712282896 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.712357044 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.712373018 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.712507963 CET44349700203.26.41.131192.168.2.7
                    Mar 17, 2023 09:07:44.712598085 CET49700443192.168.2.7203.26.41.131
                    Mar 17, 2023 09:07:44.712615967 CET44349700203.26.41.131192.168.2.7
                    TimestampSource PortDest PortSource IPDest IP
                    Mar 17, 2023 09:07:42.263680935 CET5033053192.168.2.78.8.8.8
                    Mar 17, 2023 09:07:42.563668013 CET53503308.8.8.8192.168.2.7
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Mar 17, 2023 09:07:42.263680935 CET192.168.2.78.8.8.80x49ecStandard query (0)penshorn.orgA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Mar 17, 2023 09:07:32.669253111 CET8.8.8.8192.168.2.70x13bdNo error (0)au.c-0001.c-msedge.netc-0001.c-msedge.netCNAME (Canonical name)IN (0x0001)false
                    Mar 17, 2023 09:07:32.669253111 CET8.8.8.8192.168.2.70x13bdNo error (0)c-0001.c-msedge.net13.107.4.50A (IP address)IN (0x0001)false
                    Mar 17, 2023 09:07:42.563668013 CET8.8.8.8192.168.2.70x49ecNo error (0)penshorn.org203.26.41.131A (IP address)IN (0x0001)false
                    • penshorn.org
                    • 182.162.143.56

                    Click to jump to process

                    Target ID:0
                    Start time:09:07:13
                    Start date:17/03/2023
                    Path:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                    Wow64 process (32bit):true
                    Commandline:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE" "C:\Users\user\Desktop\Omics_Journal.one
                    Imagebase:0xe80000
                    File size:1676072 bytes
                    MD5 hash:8D7E99CB358318E1F38803C9E6B67867
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate

                    Target ID:10
                    Start time:09:07:39
                    Start date:17/03/2023
                    Path:C:\Windows\SysWOW64\wscript.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf"
                    Imagebase:0x800000
                    File size:147456 bytes
                    MD5 hash:7075DD7B9BE8807FCA93ACD86F724884
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: WEBSHELL_asp_generic, Description: Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, Source: 0000000A.00000003.352934278.00000000052A3000.00000004.00000020.00020000.00000000.sdmp, Author: Arnim Rupp
                    • Rule: webshell_asp_obfuscated, Description: ASP webshell obfuscated, Source: 0000000A.00000002.359372345.00000000050EB000.00000004.00000020.00020000.00000000.sdmp, Author: Arnim Rupp
                    • Rule: WEBSHELL_asp_generic, Description: Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, Source: 0000000A.00000002.359372345.00000000050EB000.00000004.00000020.00020000.00000000.sdmp, Author: Arnim Rupp
                    • Rule: WEBSHELL_asp_generic, Description: Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, Source: 0000000A.00000003.352578097.0000000005274000.00000004.00000020.00020000.00000000.sdmp, Author: Arnim Rupp
                    • Rule: webshell_asp_obfuscated, Description: ASP webshell obfuscated, Source: 0000000A.00000003.335995742.00000000050EA000.00000004.00000020.00020000.00000000.sdmp, Author: Arnim Rupp
                    • Rule: WEBSHELL_asp_generic, Description: Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, Source: 0000000A.00000003.335995742.00000000050EA000.00000004.00000020.00020000.00000000.sdmp, Author: Arnim Rupp
                    • Rule: WEBSHELL_asp_generic, Description: Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, Source: 0000000A.00000002.359559386.000000000527C000.00000004.00000020.00020000.00000000.sdmp, Author: Arnim Rupp
                    Reputation:high

                    Target ID:11
                    Start time:09:07:45
                    Start date:17/03/2023
                    Path:C:\Windows\SysWOW64\regsvr32.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\radDBEC2.tmp.dll
                    Imagebase:0xc70000
                    File size:20992 bytes
                    MD5 hash:426E7499F6A7346F0410DEAD0805586B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Target ID:12
                    Start time:09:07:45
                    Start date:17/03/2023
                    Path:C:\Windows\System32\regsvr32.exe
                    Wow64 process (32bit):false
                    Commandline: "C:\Users\user\AppData\Local\Temp\radDBEC2.tmp.dll"
                    Imagebase:0x7ff6b1c90000
                    File size:24064 bytes
                    MD5 hash:D78B75FC68247E8A63ACBA846182740E
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000C.00000002.333419245.00000000009D1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000C.00000002.333370577.00000000009A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:high

                    Target ID:13
                    Start time:09:07:50
                    Start date:17/03/2023
                    Path:C:\Windows\System32\regsvr32.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\BPVAiawSvOgA\ayfcXidefIAOQYvB.dll"
                    Imagebase:0x7ff6b1c90000
                    File size:24064 bytes
                    MD5 hash:D78B75FC68247E8A63ACBA846182740E
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.576245215.0000000000DE0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Emotet_3, Description: Yara detected Emotet, Source: 0000000D.00000002.575109480.0000000000CE8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.576339106.0000000000E21000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:high

                    Target ID:14
                    Start time:09:07:54
                    Start date:17/03/2023
                    Path:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE
                    Wow64 process (32bit):true
                    Commandline:/tsr
                    Imagebase:0xac0000
                    File size:157872 bytes
                    MD5 hash:DBCFA6F25577339B877D2305CAD3DEC3
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate

                    Target ID:15
                    Start time:09:08:06
                    Start date:17/03/2023
                    Path:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE
                    Wow64 process (32bit):true
                    Commandline:"C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE" /tsr
                    Imagebase:0xac0000
                    File size:157872 bytes
                    MD5 hash:DBCFA6F25577339B877D2305CAD3DEC3
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language

                    No disassembly