Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MBQ24253060297767042_202303161424.one

Overview

General Information

Sample Name:MBQ24253060297767042_202303161424.one
Analysis ID:828521
MD5:1d9806cb6533d194ba4dba6be4a66f3d
SHA1:ddf5f22b691796f9fd1c448dd28e26a90a2f81c2
SHA256:f9602998afc5c510a4102622cad24c15a91066f0bc26e6c9cd4e4de15f90afc5
Tags:one
Infos:

Detection

Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Malicious OneNote
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Sigma detected: Run temp file via regsvr32
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Document exploit detected (process start blacklist hit)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Stores files to the Windows start menu directory
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to call native functions
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Connects to several IPs in different countries
Creates a start menu entry (Start Menu\Programs\Startup)
Registers a DLL
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • ONENOTE.EXE (PID: 5892 cmdline: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE" "C:\Users\user\Desktop\MBQ24253060297767042_202303161424.one MD5: 8D7E99CB358318E1F38803C9E6B67867)
    • wscript.exe (PID: 1380 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf" MD5: 7075DD7B9BE8807FCA93ACD86F724884)
      • regsvr32.exe (PID: 2852 cmdline: C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad1BF4D.tmp.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
        • regsvr32.exe (PID: 632 cmdline: "C:\Users\user\AppData\Local\Temp\rad1BF4D.tmp.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
          • regsvr32.exe (PID: 5956 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\VnSBMYHcLeIGSHRn\oFKJqrLBMvZWulQO.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • ONENOTEM.EXE (PID: 3712 cmdline: /tsr MD5: DBCFA6F25577339B877D2305CAD3DEC3)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
EmotetWhile Emotet historically was a banking malware organized in a botnet, nowadays Emotet is mostly seen as infrastructure as a service for content delivery. For example, since mid 2018 it is used by Trickbot for installs, which may also lead to ransomware attacks using Ryuk, a combination observed several times against high-profile targets.It is always stealing information from victims but what the criminal gang behind it did, was to open up another business channel by selling their infrastructure delivering additional malicious software. From malware analysts it has been classified into epochs depending on command and control, payloads, and delivery solutions which change over time.Emotet had been taken down by authorities in January 2021, though it appears to have sprung back to life in November 2021.
  • GOLD CABIN
  • MUMMY SPIDER
  • Mealybug
https://malpedia.caad.fkie.fraunhofer.de/details/win.emotet
{"C2 list": ["91.121.146.47:8080", "66.228.32.31:7080", "182.162.143.56:443", "187.63.160.88:80", "167.172.199.165:8080", "164.90.222.65:443", "104.168.155.143:8080", "163.44.196.120:8080", "160.16.142.56:8080", "159.89.202.34:443", "159.65.88.10:8080", "186.194.240.217:443", "149.56.131.28:8080", "72.15.201.15:8080", "1.234.2.232:8080", "82.223.21.224:8080", "206.189.28.199:8080", "169.57.156.166:8080", "107.170.39.149:8080", "103.43.75.120:443", "91.207.28.33:8080", "213.239.212.5:443", "45.235.8.30:8080", "119.59.103.152:8080", "164.68.99.3:8080", "95.217.221.146:8080", "153.126.146.25:7080", "197.242.150.244:8080", "202.129.205.3:8080", "103.132.242.26:8080", "139.59.126.41:443", "110.232.117.186:8080", "183.111.227.137:8080", "5.135.159.50:443", "201.94.166.162:443", "103.75.201.2:443", "79.137.35.198:8080", "172.105.226.75:8080", "94.23.45.86:4143", "115.68.227.76:8080", "153.92.5.27:8080", "167.172.253.162:8080", "188.44.20.25:443", "147.139.166.154:8080", "129.232.188.93:443", "173.212.193.249:8080", "185.4.135.165:8080", "45.176.232.124:443"], "Public Key": ["RUNTMSAAAABAX3S2xNjcDD0fBno33Ln5t71eii+mofIPoXkNFOX1MeiwCh48iz97kB0mJjGGZXwardnDXKxI8GCHGNl0PFj5yNXYvQAVAJA=", "RUNLMSAAAADzozW1Di4r9DVWzQpMKT588RDdy7BPILP6AiDOTLYMHkSWvrQO5slbmr1OvZ2Pz+AQWzRMggQmAtO6rPH7nyx2X9ZjvQAqAJA="]}
SourceRuleDescriptionAuthorStrings
MBQ24253060297767042_202303161424.oneJoeSecurity_MalOneNoteYara detected Malicious OneNoteJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\Microsoft\OneNote\16.0\Backup\Open Sections\~MBQ24253060297767042_202303161424.one.onebackupconstructionJoeSecurity_MalOneNoteYara detected Malicious OneNoteJoe Security
      C:\Users\user\Desktop\MBQ24253060297767042_202303161424.oneJoeSecurity_MalOneNoteYara detected Malicious OneNoteJoe Security
        SourceRuleDescriptionAuthorStrings
        00000001.00000003.394299845.0000000004D8B000.00000004.00000020.00020000.00000000.sdmpwebshell_asp_obfuscatedASP webshell obfuscatedArnim Rupp
        • 0x111ca:$tagasp_classid1: 72C24DD5-D70A-438B-8A42-98424B88AFB8
        • 0x112ea:$tagasp_classid1: 72C24DD5-D70A-438B-8A42-98424B88AFB8
        • 0x7f42:$jsp4: public
        • 0xffb2:$jsp4: public
        • 0x105f2:$jsp4: public
        • 0x11d02:$jsp4: public
        • 0x12342:$jsp4: public
        • 0x12bca:$jsp4: public
        • 0x1320a:$jsp4: public
        • 0x7bfc:$asp_payload11: wscript.shell
        • 0xfc6c:$asp_payload11: wscript.shell
        • 0x119bc:$asp_payload11: wscript.shell
        • 0x12884:$asp_payload11: wscript.shell
        • 0x77e4:$asp_multi_payload_one1: createobject
        • 0x78d2:$asp_multi_payload_one1: createobject
        • 0x794a:$asp_multi_payload_one1: createobject
        • 0x79a4:$asp_multi_payload_one1: createobject
        • 0x7be0:$asp_multi_payload_one1: createobject
        • 0x8346:$asp_multi_payload_one1: createobject
        • 0xf854:$asp_multi_payload_one1: createobject
        • 0xf942:$asp_multi_payload_one1: createobject
        00000001.00000003.394299845.0000000004D8B000.00000004.00000020.00020000.00000000.sdmpWEBSHELL_asp_genericGeneric ASP webshell which uses any eval/exec function indirectly on user input or writes a fileArnim Rupp
        • 0x7aae:$asp_gen_obf1: "+"
        • 0x7ade:$asp_gen_obf1: "+"
        • 0xfb1e:$asp_gen_obf1: "+"
        • 0xfb4e:$asp_gen_obf1: "+"
        • 0x1186e:$asp_gen_obf1: "+"
        • 0x1189e:$asp_gen_obf1: "+"
        • 0x12736:$asp_gen_obf1: "+"
        • 0x12766:$asp_gen_obf1: "+"
        • 0x111ca:$tagasp_classid1: 72C24DD5-D70A-438B-8A42-98424B88AFB8
        • 0x112ea:$tagasp_classid1: 72C24DD5-D70A-438B-8A42-98424B88AFB8
        • 0x7f42:$jsp4: public
        • 0xffb2:$jsp4: public
        • 0x105f2:$jsp4: public
        • 0x11d02:$jsp4: public
        • 0x12342:$jsp4: public
        • 0x12bca:$jsp4: public
        • 0x1320a:$jsp4: public
        • 0x78c2:$asp_input1: request
        • 0x80f0:$asp_input1: request
        • 0x8132:$asp_input1: request
        • 0x8248:$asp_input1: request
        00000001.00000003.381144197.0000000005004000.00000004.00000020.00020000.00000000.sdmpWEBSHELL_asp_genericGeneric ASP webshell which uses any eval/exec function indirectly on user input or writes a fileArnim Rupp
        • 0xe8e:$asp_gen_obf1: "+"
        • 0xebe:$asp_gen_obf1: "+"
        • 0xbb23:$tagasp_short1: <%!
        • 0x1e32:$tagasp_classid5: 0D43FE01-F093-11CF-8940-00A0C9054228
        • 0x28a:$jsp4: public
        • 0x8ca:$jsp4: public
        • 0x1322:$jsp4: public
        • 0x1962:$jsp4: public
        • 0x438:$asp_input1: request
        • 0x47a:$asp_input1: request
        • 0x590:$asp_input1: request
        • 0xca2:$asp_input1: request
        • 0x14d0:$asp_input1: request
        • 0x1512:$asp_input1: request
        • 0x1628:$asp_input1: request
        • 0xfdc:$asp_payload11: wscript.shell
        • 0x68e:$asp_multi_payload_one1: createobject
        • 0x9c6:$asp_multi_payload_one1: createobject
        • 0xbc4:$asp_multi_payload_one1: createobject
        • 0xcb2:$asp_multi_payload_one1: createobject
        • 0xd2a:$asp_multi_payload_one1: createobject
        00000001.00000002.407746797.0000000004F31000.00000004.00000020.00020000.00000000.sdmpWEBSHELL_asp_genericGeneric ASP webshell which uses any eval/exec function indirectly on user input or writes a fileArnim Rupp
        • 0x6:$asp_gen_obf1: "+"
        • 0x148a:$tagasp_classid5: 0D43FE01-F093-11CF-8940-00A0C9054228
        • 0x46a:$jsp4: public
        • 0xaaa:$jsp4: public
        • 0x618:$asp_input1: request
        • 0x65a:$asp_input1: request
        • 0x770:$asp_input1: request
        • 0x124:$asp_payload11: wscript.shell
        • 0x108:$asp_multi_payload_one1: createobject
        • 0x86e:$asp_multi_payload_one1: createobject
        • 0xba6:$asp_multi_payload_one1: createobject
        • 0xb4c:$asp_multi_payload_one3: .run
        • 0x108:$asp_multi_payload_four1: createobject
        • 0x86e:$asp_multi_payload_four1: createobject
        • 0xba6:$asp_multi_payload_four1: createobject
        • 0x760:$asp_always_write1: .write
        • 0xc9e:$asp_always_write1: .write
        • 0x7f4:$asp_write_way_one2: savetofile
        • 0xc30:$asp_write_way_one3: createtextfile
        • 0x108:$asp_cr_write1: createobject(
        • 0x86e:$asp_cr_write1: createobject(
        00000004.00000002.877278108.0000000000800000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          Click to see the 11 entries
          SourceRuleDescriptionAuthorStrings
          4.2.regsvr32.exe.800000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            4.2.regsvr32.exe.800000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              3.2.regsvr32.exe.c10000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                3.2.regsvr32.exe.c10000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security

                  Malware Analysis System Evasion

                  barindex
                  Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad1BF4D.tmp.dll, CommandLine: C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad1BF4D.tmp.dll, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\regsvr32.exe, NewProcessName: C:\Windows\SysWOW64\regsvr32.exe, OriginalFileName: C:\Windows\SysWOW64\regsvr32.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf", ParentImage: C:\Windows\SysWOW64\wscript.exe, ParentProcessId: 1380, ParentProcessName: wscript.exe, ProcessCommandLine: C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad1BF4D.tmp.dll, ProcessId: 2852, ProcessName: regsvr32.exe
                  Timestamp:192.168.2.5213.239.212.5497334432404320 03/17/23-09:44:22.078153
                  SID:2404320
                  Source Port:49733
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.566.228.32.314970170802404330 03/17/23-09:41:26.773980
                  SID:2404330
                  Source Port:49701
                  Destination Port:7080
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.5182.162.143.56497024432404312 03/17/23-09:41:32.334081
                  SID:2404312
                  Source Port:49702
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.545.235.8.304973780802404324 03/17/23-09:44:27.590555
                  SID:2404324
                  Source Port:49737
                  Destination Port:8080
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.5167.172.199.1654970480802404308 03/17/23-09:41:44.601805
                  SID:2404308
                  Source Port:49704
                  Destination Port:8080
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.5104.168.155.1434970980802404302 03/17/23-09:41:57.778281
                  SID:2404302
                  Source Port:49709
                  Destination Port:8080
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.591.121.146.474969980802404344 03/17/23-09:41:20.616441
                  SID:2404344
                  Source Port:49699
                  Destination Port:8080
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.5206.189.28.1994972580802404318 03/17/23-09:43:27.823348
                  SID:2404318
                  Source Port:49725
                  Destination Port:8080
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.5119.59.103.1524973880802404304 03/17/23-09:44:34.817919
                  SID:2404304
                  Source Port:49738
                  Destination Port:8080
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: MBQ24253060297767042_202303161424.oneReversingLabs: Detection: 33%
                  Source: MBQ24253060297767042_202303161424.oneVirustotal: Detection: 44%Perma Link
                  Source: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/=C:Avira URL Cloud: Label: malware
                  Source: https://45.235.8.30:8080/pgcnjflniex/Avira URL Cloud: Label: malware
                  Source: https://91.121.146.47:8080/pgcnjflniex/Avira URL Cloud: Label: malware
                  Source: https://45.235.8.30:8080/2sDAvira URL Cloud: Label: malware
                  Source: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/?8Avira URL Cloud: Label: malware
                  Source: https://119.59.103.152:8080/niex/Avira URL Cloud: Label: malware
                  Source: https://119.59.103.152:8080/niex/LAvira URL Cloud: Label: malware
                  Source: https://bbvoyage.com/useragreement/Avira URL Cloud: Label: malware
                  Source: http://softwareulike.com/cWIYxWMPkK/Avira URL Cloud: Label: malware
                  Source: https://91.121.146.47:8080/Avira URL Cloud: Label: malware
                  Source: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/W:Avira URL Cloud: Label: malware
                  Source: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/Avira URL Cloud: Label: malware
                  Source: https://45.235.8.30:8080/Avira URL Cloud: Label: malware
                  Source: https://www.gomespontes.com.br/logs/pd/vMAvira URL Cloud: Label: malware
                  Source: https://119.59.103.152:8080/pgcnjflniex/0u5Avira URL Cloud: Label: malware
                  Source: http://ozmeydan.com/cekici/9/RAvira URL Cloud: Label: malware
                  Source: http://ozmeydan.com/cekici/9/Avira URL Cloud: Label: malware
                  Source: https://45.235.8.30:8080/6sXAvira URL Cloud: Label: malware
                  Source: https://www.gomespontes.com.br/logs/pd/EC24Avira URL Cloud: Label: malware
                  Source: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wMAvira URL Cloud: Label: malware
                  Source: https://penshorn.org/admin/Ses8712iGR8du/tMAvira URL Cloud: Label: malware
                  Source: https://www.gomespontes.com.br/logs/pd/Avira URL Cloud: Label: malware
                  Source: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/uMAvira URL Cloud: Label: malware
                  Source: https://penshorn.org/admin/Ses8712iGR8du/24Avira URL Cloud: Label: malware
                  Source: https://penshorn.org/admin/Ses8712iGR8du/Avira URL Cloud: Label: malware
                  Source: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/Avira URL Cloud: Label: malware
                  Source: https://penshorn.org:443/admin/Ses8712iGR8du/sAvira URL Cloud: Label: malware
                  Source: https://119.59.103.152:8080/Avira URL Cloud: Label: malware
                  Source: http://softwareulike.com/cWIYxWMPkK/yMAvira URL Cloud: Label: malware
                  Source: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dllp8Avira URL Cloud: Label: malware
                  Source: https://107.170.39.149:8080/pgcnjflniex/OAvira URL Cloud: Label: malware
                  Source: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dlli(Avira URL Cloud: Label: malware
                  Source: https://119.59.103.152:8080/pgcnjflniex/Avira URL Cloud: Label: malware
                  Source: https://182.162.143.56/pgcnjflniex/Avira URL Cloud: Label: malware
                  Source: http://ozmeydan.com/cekici/9/xMAvira URL Cloud: Label: malware
                  Source: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/Avira URL Cloud: Label: malware
                  Source: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/zMAvira URL Cloud: Label: malware
                  Source: https://penshorn.org/admin/Ses8712iGR8du/lAvira URL Cloud: Label: malware
                  Source: https://45.235.8.30:8080/pgcnjflniex/~Avira URL Cloud: Label: malware
                  Source: penshorn.orgVirustotal: Detection: 10%Perma Link
                  Source: http://softwareulike.com/cWIYxWMPkK/Virustotal: Detection: 16%Perma Link
                  Source: C:\Users\user\AppData\Local\Temp\rad1BF4D.tmp.dllReversingLabs: Detection: 58%
                  Source: C:\Windows\System32\VnSBMYHcLeIGSHRn\oFKJqrLBMvZWulQO.dll (copy)ReversingLabs: Detection: 58%
                  Source: 00000004.00000002.877453456.00000000008A8000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Emotet {"C2 list": ["91.121.146.47:8080", "66.228.32.31:7080", "182.162.143.56:443", "187.63.160.88:80", "167.172.199.165:8080", "164.90.222.65:443", "104.168.155.143:8080", "163.44.196.120:8080", "160.16.142.56:8080", "159.89.202.34:443", "159.65.88.10:8080", "186.194.240.217:443", "149.56.131.28:8080", "72.15.201.15:8080", "1.234.2.232:8080", "82.223.21.224:8080", "206.189.28.199:8080", "169.57.156.166:8080", "107.170.39.149:8080", "103.43.75.120:443", "91.207.28.33:8080", "213.239.212.5:443", "45.235.8.30:8080", "119.59.103.152:8080", "164.68.99.3:8080", "95.217.221.146:8080", "153.126.146.25:7080", "197.242.150.244:8080", "202.129.205.3:8080", "103.132.242.26:8080", "139.59.126.41:443", "110.232.117.186:8080", "183.111.227.137:8080", "5.135.159.50:443", "201.94.166.162:443", "103.75.201.2:443", "79.137.35.198:8080", "172.105.226.75:8080", "94.23.45.86:4143", "115.68.227.76:8080", "153.92.5.27:8080", "167.172.253.162:8080", "188.44.20.25:443", "147.139.166.154:8080", "129.232.188.93:443", "173.212.193.249:8080", "185.4.135.165:8080", "45.176.232.124:443"], "Public Key": ["RUNTMSAAAABAX3S2xNjcDD0fBno33Ln5t71eii+mofIPoXkNFOX1MeiwCh48iz97kB0mJjGGZXwardnDXKxI8GCHGNl0PFj5yNXYvQAVAJA=", "RUNLMSAAAADzozW1Di4r9DVWzQpMKT588RDdy7BPILP6AiDOTLYMHkSWvrQO5slbmr1OvZ2Pz+AQWzRMggQmAtO6rPH7nyx2X9ZjvQAqAJA="]}
                  Source: unknownHTTPS traffic detected: 203.26.41.131:443 -> 192.168.2.5:49696 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 182.162.143.56:443 -> 192.168.2.5:49702 version: TLS 1.2
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180008D28 FindFirstFileExW,

                  Software Vulnerabilities

                  barindex
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess created: C:\Windows\SysWOW64\wscript.exe

                  Networking

                  barindex
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 159.65.88.10 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 164.90.222.65 443
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 213.239.212.5 443
                  Source: C:\Windows\SysWOW64\wscript.exeDomain query: penshorn.org
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 186.194.240.217 443
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 104.168.155.143 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 119.59.103.152 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 159.89.202.34 443
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 160.16.142.56 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 91.121.146.47 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 91.207.28.33 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 103.43.75.120 443
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 45.235.8.30 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 72.15.201.15 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 163.44.196.120 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 206.189.28.199 8080
                  Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 203.26.41.131 443
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 107.170.39.149 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 187.63.160.88 80
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 66.228.32.31 7080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 82.223.21.224 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 149.56.131.28 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 169.57.156.166 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 182.162.143.56 443
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 1.234.2.232 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 167.172.199.165 8080
                  Source: TrafficSnort IDS: 2404312 ET CNC Feodo Tracker Reported CnC Server TCP group 7 192.168.2.5:49702 -> 182.162.143.56:443
                  Source: TrafficSnort IDS: 2404344 ET CNC Feodo Tracker Reported CnC Server TCP group 23 192.168.2.5:49699 -> 91.121.146.47:8080
                  Source: TrafficSnort IDS: 2404330 ET CNC Feodo Tracker Reported CnC Server TCP group 16 192.168.2.5:49701 -> 66.228.32.31:7080
                  Source: TrafficSnort IDS: 2404308 ET CNC Feodo Tracker Reported CnC Server TCP group 5 192.168.2.5:49704 -> 167.172.199.165:8080
                  Source: TrafficSnort IDS: 2404302 ET CNC Feodo Tracker Reported CnC Server TCP group 2 192.168.2.5:49709 -> 104.168.155.143:8080
                  Source: TrafficSnort IDS: 2404318 ET CNC Feodo Tracker Reported CnC Server TCP group 10 192.168.2.5:49725 -> 206.189.28.199:8080
                  Source: TrafficSnort IDS: 2404320 ET CNC Feodo Tracker Reported CnC Server TCP group 11 192.168.2.5:49733 -> 213.239.212.5:443
                  Source: TrafficSnort IDS: 2404324 ET CNC Feodo Tracker Reported CnC Server TCP group 13 192.168.2.5:49737 -> 45.235.8.30:8080
                  Source: TrafficSnort IDS: 2404304 ET CNC Feodo Tracker Reported CnC Server TCP group 3 192.168.2.5:49738 -> 119.59.103.152:8080
                  Source: Malware configuration extractorIPs: 91.121.146.47:8080
                  Source: Malware configuration extractorIPs: 66.228.32.31:7080
                  Source: Malware configuration extractorIPs: 182.162.143.56:443
                  Source: Malware configuration extractorIPs: 187.63.160.88:80
                  Source: Malware configuration extractorIPs: 167.172.199.165:8080
                  Source: Malware configuration extractorIPs: 164.90.222.65:443
                  Source: Malware configuration extractorIPs: 104.168.155.143:8080
                  Source: Malware configuration extractorIPs: 163.44.196.120:8080
                  Source: Malware configuration extractorIPs: 160.16.142.56:8080
                  Source: Malware configuration extractorIPs: 159.89.202.34:443
                  Source: Malware configuration extractorIPs: 159.65.88.10:8080
                  Source: Malware configuration extractorIPs: 186.194.240.217:443
                  Source: Malware configuration extractorIPs: 149.56.131.28:8080
                  Source: Malware configuration extractorIPs: 72.15.201.15:8080
                  Source: Malware configuration extractorIPs: 1.234.2.232:8080
                  Source: Malware configuration extractorIPs: 82.223.21.224:8080
                  Source: Malware configuration extractorIPs: 206.189.28.199:8080
                  Source: Malware configuration extractorIPs: 169.57.156.166:8080
                  Source: Malware configuration extractorIPs: 107.170.39.149:8080
                  Source: Malware configuration extractorIPs: 103.43.75.120:443
                  Source: Malware configuration extractorIPs: 91.207.28.33:8080
                  Source: Malware configuration extractorIPs: 213.239.212.5:443
                  Source: Malware configuration extractorIPs: 45.235.8.30:8080
                  Source: Malware configuration extractorIPs: 119.59.103.152:8080
                  Source: Malware configuration extractorIPs: 164.68.99.3:8080
                  Source: Malware configuration extractorIPs: 95.217.221.146:8080
                  Source: Malware configuration extractorIPs: 153.126.146.25:7080
                  Source: Malware configuration extractorIPs: 197.242.150.244:8080
                  Source: Malware configuration extractorIPs: 202.129.205.3:8080
                  Source: Malware configuration extractorIPs: 103.132.242.26:8080
                  Source: Malware configuration extractorIPs: 139.59.126.41:443
                  Source: Malware configuration extractorIPs: 110.232.117.186:8080
                  Source: Malware configuration extractorIPs: 183.111.227.137:8080
                  Source: Malware configuration extractorIPs: 5.135.159.50:443
                  Source: Malware configuration extractorIPs: 201.94.166.162:443
                  Source: Malware configuration extractorIPs: 103.75.201.2:443
                  Source: Malware configuration extractorIPs: 79.137.35.198:8080
                  Source: Malware configuration extractorIPs: 172.105.226.75:8080
                  Source: Malware configuration extractorIPs: 94.23.45.86:4143
                  Source: Malware configuration extractorIPs: 115.68.227.76:8080
                  Source: Malware configuration extractorIPs: 153.92.5.27:8080
                  Source: Malware configuration extractorIPs: 167.172.253.162:8080
                  Source: Malware configuration extractorIPs: 188.44.20.25:443
                  Source: Malware configuration extractorIPs: 147.139.166.154:8080
                  Source: Malware configuration extractorIPs: 129.232.188.93:443
                  Source: Malware configuration extractorIPs: 173.212.193.249:8080
                  Source: Malware configuration extractorIPs: 185.4.135.165:8080
                  Source: Malware configuration extractorIPs: 45.176.232.124:443
                  Source: Joe Sandbox ViewASN Name: RACKCORP-APRackCorpAU RACKCORP-APRackCorpAU
                  Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
                  Source: global trafficHTTP traffic detected: POST /pgcnjflniex/ HTTP/1.1Connection: Keep-AliveContent-Length: 0Host: 182.162.143.56
                  Source: Joe Sandbox ViewIP Address: 110.232.117.186 110.232.117.186
                  Source: global trafficHTTP traffic detected: GET /admin/Ses8712iGR8du/ HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: penshorn.org
                  Source: global trafficTCP traffic: 192.168.2.5:49699 -> 91.121.146.47:8080
                  Source: global trafficTCP traffic: 192.168.2.5:49701 -> 66.228.32.31:7080
                  Source: global trafficTCP traffic: 192.168.2.5:49704 -> 167.172.199.165:8080
                  Source: global trafficTCP traffic: 192.168.2.5:49709 -> 104.168.155.143:8080
                  Source: global trafficTCP traffic: 192.168.2.5:49710 -> 163.44.196.120:8080
                  Source: global trafficTCP traffic: 192.168.2.5:49711 -> 160.16.142.56:8080
                  Source: global trafficTCP traffic: 192.168.2.5:49716 -> 159.65.88.10:8080
                  Source: global trafficTCP traffic: 192.168.2.5:49721 -> 149.56.131.28:8080
                  Source: global trafficTCP traffic: 192.168.2.5:49722 -> 72.15.201.15:8080
                  Source: global trafficTCP traffic: 192.168.2.5:49723 -> 1.234.2.232:8080
                  Source: global trafficTCP traffic: 192.168.2.5:49724 -> 82.223.21.224:8080
                  Source: global trafficTCP traffic: 192.168.2.5:49725 -> 206.189.28.199:8080
                  Source: global trafficTCP traffic: 192.168.2.5:49726 -> 169.57.156.166:8080
                  Source: global trafficTCP traffic: 192.168.2.5:49727 -> 107.170.39.149:8080
                  Source: global trafficTCP traffic: 192.168.2.5:49732 -> 91.207.28.33:8080
                  Source: global trafficTCP traffic: 192.168.2.5:49737 -> 45.235.8.30:8080
                  Source: global trafficTCP traffic: 192.168.2.5:49738 -> 119.59.103.152:8080
                  Source: unknownNetwork traffic detected: IP country count 17
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 17 Mar 2023 08:40:50 GMTContent-Type: text/htmlContent-Length: 146Connection: close
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                  Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                  Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                  Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                  Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                  Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                  Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                  Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                  Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                  Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                  Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                  Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                  Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                  Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                  Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                  Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                  Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                  Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                  Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                  Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                  Source: wscript.exe, 00000001.00000003.381144197.0000000005045000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.403113131.0000000005045000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407992498.0000000005045000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400684790.0000000005045000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.590971884.0000000000941000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.877673221.0000000000941000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.459462394.0000000000933000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                  Source: regsvr32.exe, 00000004.00000003.459078044.0000000000903000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.877508611.0000000000903000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.590971884.0000000000903000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                  Source: regsvr32.exe, 00000004.00000003.590971884.0000000000977000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.590971884.0000000000941000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.877673221.0000000000977000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.877673221.0000000000941000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.459462394.0000000000977000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.459462394.0000000000933000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                  Source: wscript.exe, 00000001.00000002.407885293.0000000004FC8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400321473.0000000004FC8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399292240.0000000004FC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ozmeydan.com/cekici
                  Source: wscript.exe, wscript.exe, 00000001.00000002.407746797.0000000004F31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382705775.0000000004AD3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.392145404.0000000004CF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400050526.0000000004FF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399054141.0000000004F58000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.381540345.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394299845.0000000004D8B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.405807933.0000000004E95000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407560123.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.386752425.0000000004C3A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382390576.0000000004AF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398659405.0000000004D9D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380896201.0000000000784000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394328229.0000000004D00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380948454.00000000007DD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.385789223.0000000004C00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.384174654.0000000004B78000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.391149554.0000000004C5F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.383218696.0000000004AF6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398099459.0000000004F16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ozmeydan.com/cekici/9/
                  Source: wscript.exe, 00000001.00000002.407192937.0000000000717000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ozmeydan.com/cekici/9/R
                  Source: wscript.exe, 00000001.00000003.401212702.0000000004834000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ozmeydan.com/cekici/9/xM
                  Source: wscript.exe, 00000001.00000002.407885293.0000000004FC8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400321473.0000000004FC8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399292240.0000000004FC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://softwareulike.com/cWIY
                  Source: wscript.exe, wscript.exe, 00000001.00000002.407746797.0000000004F31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407635326.0000000004D28000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382705775.0000000004AD3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.392145404.0000000004CF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400050526.0000000004FF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399054141.0000000004F58000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.381540345.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394299845.0000000004D8B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.405807933.0000000004E95000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407560123.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.386752425.0000000004C3A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382390576.0000000004AF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398659405.0000000004D9D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380896201.0000000000784000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394328229.0000000004D00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380948454.00000000007DD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.385789223.0000000004C00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.384174654.0000000004B78000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.391149554.0000000004C5F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.383218696.0000000004AF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://softwareulike.com/cWIYxWMPkK/
                  Source: wscript.exe, 00000001.00000003.401212702.0000000004834000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://softwareulike.com/cWIYxWMPkK/yM
                  Source: wscript.exe, 00000001.00000002.407885293.0000000004FC8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400321473.0000000004FC8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399292240.0000000004FC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wrappixels.com/wp-
                  Source: wscript.exe, wscript.exe, 00000001.00000002.407746797.0000000004F31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382705775.0000000004AD3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.392145404.0000000004CF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400050526.0000000004FF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399054141.0000000004F58000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.381540345.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394299845.0000000004D8B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.405807933.0000000004E95000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407560123.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.386752425.0000000004C3A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382390576.0000000004AF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398659405.0000000004D9D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380896201.0000000000784000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394328229.0000000004D00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380948454.00000000007DD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.385789223.0000000004C00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.384174654.0000000004B78000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.391149554.0000000004C5F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.383218696.0000000004AF6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398099459.0000000004F16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/
                  Source: wscript.exe, 00000001.00000003.398334158.000000000080A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407297168.000000000080C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.402555275.000000000080C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/?8
                  Source: wscript.exe, 00000001.00000003.382593003.0000000000807000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382357407.00000000007F7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382612591.000000000080A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382005517.00000000007F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/W:
                  Source: wscript.exe, 00000001.00000003.401212702.0000000004834000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/zM
                  Source: regsvr32.exe, 00000004.00000002.877644863.0000000000928000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.591189993.0000000000927000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.590971884.000000000091F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.44.196.120:8080/
                  Source: regsvr32.exe, 00000004.00000002.877453456.00000000008A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://107.170.39.149:8080/pgcnjflniex/O
                  Source: regsvr32.exe, 00000004.00000002.877991499.0000000002AD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.59.103.152:8080/
                  Source: regsvr32.exe, 00000004.00000002.877991499.0000000002AD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.59.103.152:8080/niex/
                  Source: regsvr32.exe, 00000004.00000002.877991499.0000000002AD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.59.103.152:8080/niex/L
                  Source: regsvr32.exe, 00000004.00000002.877673221.0000000000941000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.59.103.152:8080/pgcnjflniex/
                  Source: regsvr32.exe, 00000004.00000002.877508611.0000000000903000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.59.103.152:8080/pgcnjflniex/0u5
                  Source: regsvr32.exe, 00000004.00000003.590971884.0000000000941000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.590971884.0000000000903000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://160.16.142.56:8080/
                  Source: regsvr32.exe, 00000004.00000003.590971884.0000000000977000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.590971884.0000000000903000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://160.16.142.56:8080/pgcnjflniex/
                  Source: regsvr32.exe, 00000004.00000003.590971884.0000000000977000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://160.16.142.56:8080/pgcnjflniex/~
                  Source: regsvr32.exe, 00000004.00000002.878003835.0000000002AE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://219.59.103.152:8080/
                  Source: regsvr32.exe, 00000004.00000002.877673221.0000000000941000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.235.8.30:8080/
                  Source: regsvr32.exe, 00000004.00000002.877673221.0000000000941000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.235.8.30:8080/2sD
                  Source: regsvr32.exe, 00000004.00000002.877673221.0000000000941000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.235.8.30:8080/6sX
                  Source: regsvr32.exe, 00000004.00000002.877508611.0000000000903000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.235.8.30:8080/pgcnjflniex/
                  Source: regsvr32.exe, 00000004.00000002.877673221.0000000000977000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.235.8.30:8080/pgcnjflniex/~
                  Source: regsvr32.exe, 00000004.00000002.878003835.0000000002AE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://82.235.8.30:8080/
                  Source: regsvr32.exe, 00000004.00000002.877453456.00000000008A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://91.121.146.47:8080/
                  Source: regsvr32.exe, 00000004.00000003.459297908.000000000091F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.877453456.00000000008A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://91.121.146.47:8080/pgcnjflniex/
                  Source: wscript.exe, 00000001.00000003.400050526.0000000004FF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399150135.0000000004FEF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400395370.0000000005002000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbvoyage.co
                  Source: wscript.exe, 00000001.00000002.407885293.0000000004FC8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400321473.0000000004FC8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399292240.0000000004FC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbvoyage.com/useragreement/
                  Source: wscript.exe, wscript.exe, 00000001.00000002.407746797.0000000004F31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382705775.0000000004AD3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.392145404.0000000004CF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400050526.0000000004FF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399054141.0000000004F58000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.381540345.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394299845.0000000004D8B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.405807933.0000000004E95000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407560123.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.386752425.0000000004C3A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382390576.0000000004AF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398659405.0000000004D9D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380896201.0000000000784000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394328229.0000000004D00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380948454.00000000007DD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.385789223.0000000004C00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.384174654.0000000004B78000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.391149554.0000000004C5F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.383218696.0000000004AF6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398099459.0000000004F16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/
                  Source: wscript.exe, 00000001.00000003.399054141.0000000004F58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dlli(
                  Source: wscript.exe, 00000001.00000003.398345159.0000000004F58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dllp8
                  Source: wscript.exe, 00000001.00000003.401212702.0000000004834000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/uM
                  Source: wscript.exe, 00000001.00000003.381144197.0000000005045000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.403113131.0000000005045000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407992498.0000000005045000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400684790.0000000005045000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://penshorn.org/
                  Source: wscript.exe, 00000001.00000003.381144197.0000000005014000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.404094649.0000000005014000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400959492.0000000005014000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407958037.0000000005014000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://penshorn.org/a
                  Source: wscript.exe, 00000001.00000003.383748175.0000000004B72000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.391120091.0000000004C93000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.402006279.0000000004815000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.383512553.000000000079A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398345159.0000000004F58000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.397037410.0000000004DFB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382612591.0000000000802000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382107614.0000000004AC8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400050526.0000000004FDC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.379862185.00000000007A7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382357407.00000000007F7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394565399.0000000004D29000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407885293.0000000004FC8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382612591.00000000007F2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.392356021.0000000004C9B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.403013064.0000000000780000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.396245926.0000000004DB8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.401465690.0000000000A24000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394552054.0000000004DC0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407568172.0000000004B20000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380826779.000000000078E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://penshorn.org/admin/Ses8712iGR8du/
                  Source: wscript.exe, 00000001.00000003.382593003.0000000000807000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382357407.00000000007F7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398334158.000000000080A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407297168.000000000080C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382612591.000000000080A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382005517.00000000007F2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.402555275.000000000080C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://penshorn.org/admin/Ses8712iGR8du/24
                  Source: wscript.exe, 00000001.00000003.401037297.0000000004BD9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.384096889.0000000004BCD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.385308264.0000000004BD1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.383683287.0000000004BA1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.385789223.0000000004BD9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://penshorn.org/admin/Ses8712iGR8du/l
                  Source: wscript.exe, 00000001.00000003.401212702.0000000004834000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://penshorn.org/admin/Ses8712iGR8du/tM
                  Source: wscript.exe, 00000001.00000003.400050526.0000000004FF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399150135.0000000004FEF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.378986397.0000000004FE5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407928297.0000000004FF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://penshorn.org:443/admin/Ses8712iGR8du/s
                  Source: wscript.exe, 00000001.00000002.407928297.0000000004FF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1j
                  Source: wscript.exe, wscript.exe, 00000001.00000002.407746797.0000000004F31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382705775.0000000004AD3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.392145404.0000000004CF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400050526.0000000004FF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399054141.0000000004F58000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.381540345.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394299845.0000000004D8B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.405807933.0000000004E95000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407560123.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.386752425.0000000004C3A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382390576.0000000004AF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398659405.0000000004D9D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380896201.0000000000784000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394328229.0000000004D00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380948454.00000000007DD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.385789223.0000000004C00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.384174654.0000000004B78000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.391149554.0000000004C5F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.383218696.0000000004AF6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.402972724.0000000004FA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/
                  Source: wscript.exe, 00000001.00000003.398099459.0000000004F16000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398345159.0000000004F3A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398184946.0000000004F21000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398273657.0000000004F33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/=C:
                  Source: wscript.exe, 00000001.00000003.401212702.0000000004834000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wM
                  Source: wscript.exe, wscript.exe, 00000001.00000002.407746797.0000000004F31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382705775.0000000004AD3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.392145404.0000000004CF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400050526.0000000004FF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399054141.0000000004F58000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.381540345.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394299845.0000000004D8B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.405807933.0000000004E95000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407560123.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.386752425.0000000004C3A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382390576.0000000004AF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398659405.0000000004D9D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380896201.0000000000784000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394328229.0000000004D00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380948454.00000000007DD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.385789223.0000000004C00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.384174654.0000000004B78000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.391149554.0000000004C5F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.383218696.0000000004AF6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398099459.0000000004F16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gomespontes.com.br/logs/pd/
                  Source: wscript.exe, 00000001.00000003.382593003.0000000000807000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382357407.00000000007F7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398334158.000000000080A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407297168.000000000080C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382612591.000000000080A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382005517.00000000007F2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.402555275.000000000080C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gomespontes.com.br/logs/pd/EC24
                  Source: wscript.exe, 00000001.00000003.401212702.0000000004834000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gomespontes.com.br/logs/pd/vM
                  Source: unknownHTTP traffic detected: POST /pgcnjflniex/ HTTP/1.1Connection: Keep-AliveContent-Length: 0Host: 182.162.143.56
                  Source: unknownDNS traffic detected: queries for: penshorn.org
                  Source: global trafficHTTP traffic detected: GET /admin/Ses8712iGR8du/ HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: penshorn.org
                  Source: unknownHTTPS traffic detected: 203.26.41.131:443 -> 192.168.2.5:49696 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 182.162.143.56:443 -> 192.168.2.5:49702 version: TLS 1.2

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 00000004.00000002.877453456.00000000008A8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 4.2.regsvr32.exe.800000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.regsvr32.exe.800000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.regsvr32.exe.c10000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.regsvr32.exe.c10000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.877278108.0000000000800000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.877359540.0000000000831000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.377625141.0000000000C10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.377660736.0000000000C41000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: 00000001.00000003.394299845.0000000004D8B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: webshell_asp_obfuscated date = 2021/01/12, author = Arnim Rupp, description = ASP webshell obfuscated, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
                  Source: 00000001.00000003.394299845.0000000004D8B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: WEBSHELL_asp_generic date = 2021-03-07, author = Arnim Rupp, description = Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, score = a8c63c418609c1c291b3e731ca85ded4b3e0fba83f3489c21a3199173b176a75, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
                  Source: 00000001.00000003.381144197.0000000005004000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: WEBSHELL_asp_generic date = 2021-03-07, author = Arnim Rupp, description = Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, score = a8c63c418609c1c291b3e731ca85ded4b3e0fba83f3489c21a3199173b176a75, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
                  Source: 00000001.00000002.407746797.0000000004F31000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: WEBSHELL_asp_generic date = 2021-03-07, author = Arnim Rupp, description = Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, score = a8c63c418609c1c291b3e731ca85ded4b3e0fba83f3489c21a3199173b176a75, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
                  Source: 00000001.00000003.394449095.0000000004D92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: webshell_asp_obfuscated date = 2021/01/12, author = Arnim Rupp, description = ASP webshell obfuscated, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
                  Source: 00000001.00000003.394449095.0000000004D92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: WEBSHELL_asp_generic date = 2021-03-07, author = Arnim Rupp, description = Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, score = a8c63c418609c1c291b3e731ca85ded4b3e0fba83f3489c21a3199173b176a75, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
                  Source: 00000001.00000003.396223995.0000000004D92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: webshell_asp_obfuscated date = 2021/01/12, author = Arnim Rupp, description = ASP webshell obfuscated, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
                  Source: 00000001.00000003.396223995.0000000004D92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: WEBSHELL_asp_generic date = 2021-03-07, author = Arnim Rupp, description = Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, score = a8c63c418609c1c291b3e731ca85ded4b3e0fba83f3489c21a3199173b176a75, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
                  Source: 00000001.00000002.407635326.0000000004D99000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: webshell_asp_obfuscated date = 2021/01/12, author = Arnim Rupp, description = ASP webshell obfuscated, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
                  Source: 00000001.00000002.407635326.0000000004D99000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: WEBSHELL_asp_generic date = 2021-03-07, author = Arnim Rupp, description = Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, score = a8c63c418609c1c291b3e731ca85ded4b3e0fba83f3489c21a3199173b176a75, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
                  Source: 00000001.00000003.398345159.0000000004F28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: WEBSHELL_asp_generic date = 2021-03-07, author = Arnim Rupp, description = Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, score = a8c63c418609c1c291b3e731ca85ded4b3e0fba83f3489c21a3199173b176a75, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
                  Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\VnSBMYHcLeIGSHRn\Jump to behavior
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180006818
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000B878
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180007110
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180008D28
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180014555
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C00000
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5709C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5A000
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4CC14
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C47D6C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4263C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C48BC8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C58FC8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4F8C4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C55CC4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C480CC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C508CC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C414D4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C53CD4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C418DC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C520E0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C43CF4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C448FC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C490F8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C44C84
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5CC84
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C55880
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4AC94
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C498AC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5A8B0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C694BC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4DCB8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C47840
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5C44C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C65450
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5C058
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5B460
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4D474
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C56C70
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4B07C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C42C78
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4C078
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C41000
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C49408
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C47C08
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C6181C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C51030
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5EC30
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4B83C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C515C8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5D5F0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5BDA0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C495BC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C68500
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5610C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C69910
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C57518
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C51924
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C54D20
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5AD28
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C47530
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5B130
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C46138
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5EAC0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4D6CC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C596D4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C492F0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C48A8C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C64E8C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4BE90
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C54A90
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C43ABC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5A6BC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4AAB8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C44EB8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5A244
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4F65C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4B258
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4A660
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C43274
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C50A70
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C55A00
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C68A00
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C43E0C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5020C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C58E08
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C44214
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4461C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4BA2C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C58A2C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C50E2C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5662C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C597CC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C42FD4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C433D4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C53FD0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C627EC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4A7F0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C55384
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C41B94
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4DBA0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C48FB0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4FFB8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C58BB8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5E750
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4975C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C44758
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5D770
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5CF70
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4F77C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C48378
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4EF14
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C53B14
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5E310
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C54F18
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4D33C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_005F0000
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008408CC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083640A
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083CC14
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00837D6C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008476A8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00850618
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00836E42
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008573A4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00838BC8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00848FC8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00843FD0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008363F4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00839B79
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084CC84
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00845880
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00834C84
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0085488C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00851494
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083AC94
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084709C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008544A8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008398AC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084A8B0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008594BC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083DCB8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00845CC4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083F8C4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008380CC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00843CD4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00851CD4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008314D4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008318DC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008420E0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00833CF4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008390F8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008348FC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00831000
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084A000
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00839408
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00837C08
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00837410
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0085181C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00841030
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084EC30
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083B83C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00837840
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084C44C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00855450
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084C058
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084B460
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00855868
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00846C70
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083D474
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00832C78
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083C078
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083B07C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084BDA0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008395BC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008415C8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084D5F0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00858500
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00852100
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084610C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00859910
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00847518
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00841924
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00844D20
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084AD28
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084B130
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00836138
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00854D64
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00852E84
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00854E8C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00838A8C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083BE90
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00844A90
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00852AB0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084A6BC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083AAB8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00834EB8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00833ABC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084EAC0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083D6CC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008496D4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008392F0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008536FC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00845A00
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00858A00
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084020C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00848E08
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00833E0C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00834214
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083461C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00848A2C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00840E2C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084662C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083BA2C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083263C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084A244
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00856E48
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083B258
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083F65C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083A660
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00840A70
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00833274
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00845384
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00831B94
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083DBA0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008547A8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00838FB0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083FFB8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00848BB8
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008497CC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00832FD4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008333D4
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_008527EC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083A7F0
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084FFFC
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00843B14
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084E310
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00858310
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083EF14
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00855B1C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00844F18
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083D33C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084E750
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00834758
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083975C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00858B68
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084D770
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084CF70
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00838378
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0083F77C
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180010C10 LdrFindResource_U,LdrAccessResource,NtAllocateVirtualMemory,
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180010AC0 ExitProcess,RtlQueueApcWow64Thread,NtTestAlert,
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180010DB0 ZwOpenSymbolicLinkObject,ZwOpenSymbolicLinkObject,
                  Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                  Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\rad1BF4D.tmp.dll 2F39C2879989DDD7F9ECF52B6232598E5595F8BF367846FF188C9DFBF1251253
                  Source: MBQ24253060297767042_202303161424.oneReversingLabs: Detection: 33%
                  Source: MBQ24253060297767042_202303161424.oneVirustotal: Detection: 44%
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
                  Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE" "C:\Users\user\Desktop\MBQ24253060297767042_202303161424.one
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess created: C:\Windows\SysWOW64\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf"
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad1BF4D.tmp.dll
                  Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Users\user\AppData\Local\Temp\rad1BF4D.tmp.dll"
                  Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\VnSBMYHcLeIGSHRn\oFKJqrLBMvZWulQO.dll"
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE /tsr
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess created: C:\Windows\SysWOW64\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf"
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE /tsr
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad1BF4D.tmp.dll
                  Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Users\user\AppData\Local\Temp\rad1BF4D.tmp.dll"
                  Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\VnSBMYHcLeIGSHRn\oFKJqrLBMvZWulQO.dll"
                  Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{06290BD0-48AA-11D2-8432-006008C3FBFC}\InprocServer32
                  Source: Send to OneNote.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEFile created: C:\Users\user\Documents\{BB4F99E3-A1B4-4008-900C-C48790A371B3}Jump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEFile created: C:\Users\user\AppData\Local\Temp\{F542F0F2-E8CC-4E20-BF5A-546277ED62ED} - OProcSessId.datJump to behavior
                  Source: classification engineClassification label: mal100.troj.expl.evad.winONE@11/720@1/49
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEFile read: C:\Program Files (x86)\desktop.iniJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C48BC8 Process32FirstW,CreateToolhelp32Snapshot,FindCloseChangeNotification,
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXEMutant created: \Sessions\1\BaseNamedObjects\OneNoteM:AppShared
                  Source: C:\Windows\SysWOW64\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180005C69 push rdi; ret
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800056DD push rdi; ret
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C580D7 push ebp; retf
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C46CDE push esi; iretd
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4A0FC push ebp; iretd
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C46C9F pushad ; ret
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4A1D2 push ebp; iretd
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C57987 push ebp; iretd
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C57D4E push ebp; iretd
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C58157 push ebp; retf
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C49D51 push ebp; retf
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C57D25 push 4D8BFFFFh; retf
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C57D3C push ebp; retf
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C49E8B push eax; retf
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C57EAF push 458BCC5Ah; retf
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C4A26E push ebp; ret
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C5C731 push esi; iretd
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00836C9F pushad ; ret
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00836CDE push esi; iretd
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00856D34 push edi; ret
                  Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0084C731 push esi; iretd
                  Source: rad1BF4D.tmp.dll.1.drStatic PE information: section name: _RDATA
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad1BF4D.tmp.dll
                  Source: C:\Windows\SysWOW64\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\rad1BF4D.tmp.dll
                  Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\VnSBMYHcLeIGSHRn\oFKJqrLBMvZWulQO.dll (copy)
                  Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\VnSBMYHcLeIGSHRn\oFKJqrLBMvZWulQO.dll (copy)
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Send to OneNote.lnkJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Send to OneNote.lnkJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\VnSBMYHcLeIGSHRn\oFKJqrLBMvZWulQO.dll:Zone.Identifier read attributes | delete
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\wscript.exe TID: 1244Thread sleep time: -30000s >= -30000s
                  Source: C:\Windows\System32\regsvr32.exe TID: 6072Thread sleep time: -690000s >= -30000s
                  Source: C:\Windows\System32\regsvr32.exeAPI coverage: 8.0 %
                  Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-Timer
                  Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformation
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180008D28 FindFirstFileExW,
                  Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                  Source: wscript.exe, 00000001.00000003.400684790.000000000502D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407992498.000000000502D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.381144197.000000000502D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.403113131.000000000502D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-USnb
                  Source: regsvr32.exe, 00000004.00000003.590971884.0000000000933000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.591189993.0000000000933000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.459462394.0000000000933000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.877644863.0000000000932000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWl/<
                  Source: wscript.exe, 00000001.00000003.381144197.0000000005045000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.403113131.0000000005045000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.381144197.0000000005004000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407943531.0000000005005000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407992498.0000000005045000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.378986397.0000000004FE5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400684790.0000000005045000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.404094649.0000000005005000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400050526.0000000005005000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.590971884.0000000000933000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.459078044.00000000008EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180001C48 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000A878 GetProcessHeap,
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180010C10 LdrFindResource_U,LdrAccessResource,NtAllocateVirtualMemory,
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180001C48 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800082EC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800017DC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 159.65.88.10 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 164.90.222.65 443
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 213.239.212.5 443
                  Source: C:\Windows\SysWOW64\wscript.exeDomain query: penshorn.org
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 186.194.240.217 443
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 104.168.155.143 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 119.59.103.152 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 159.89.202.34 443
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 160.16.142.56 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 91.121.146.47 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 91.207.28.33 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 103.43.75.120 443
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 45.235.8.30 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 72.15.201.15 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 163.44.196.120 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 206.189.28.199 8080
                  Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 203.26.41.131 443
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 107.170.39.149 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 187.63.160.88 80
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 66.228.32.31 7080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 82.223.21.224 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 149.56.131.28 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 169.57.156.166 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 182.162.143.56 443
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 1.234.2.232 8080
                  Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 167.172.199.165 8080
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad1BF4D.tmp.dll
                  Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800070A0 cpuid
                  Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                  Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180001D98 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: MBQ24253060297767042_202303161424.one, type: SAMPLE
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\OneNote\16.0\Backup\Open Sections\~MBQ24253060297767042_202303161424.one.onebackupconstruction, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\Desktop\MBQ24253060297767042_202303161424.one, type: DROPPED
                  Source: Yara matchFile source: 00000004.00000002.877453456.00000000008A8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 4.2.regsvr32.exe.800000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.regsvr32.exe.800000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.regsvr32.exe.c10000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.regsvr32.exe.c10000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.877278108.0000000000800000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.877359540.0000000000831000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.377625141.0000000000C10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.377660736.0000000000C41000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: MBQ24253060297767042_202303161424.one, type: SAMPLE
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\OneNote\16.0\Backup\Open Sections\~MBQ24253060297767042_202303161424.one.onebackupconstruction, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\Desktop\MBQ24253060297767042_202303161424.one, type: DROPPED
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts1
                  Scripting
                  2
                  Registry Run Keys / Startup Folder
                  111
                  Process Injection
                  21
                  Masquerading
                  OS Credential Dumping1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  Exfiltration Over Other Network Medium11
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default Accounts1
                  Exploitation for Client Execution
                  1
                  DLL Side-Loading
                  2
                  Registry Run Keys / Startup Folder
                  1
                  Virtualization/Sandbox Evasion
                  LSASS Memory121
                  Security Software Discovery
                  Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                  Non-Standard Port
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)1
                  DLL Side-Loading
                  111
                  Process Injection
                  Security Account Manager1
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
                  Ingress Tool Transfer
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                  Scripting
                  NTDS2
                  Process Discovery
                  Distributed Component Object ModelInput CaptureScheduled Transfer4
                  Non-Application Layer Protocol
                  SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                  Hidden Files and Directories
                  LSA Secrets1
                  Remote System Discovery
                  SSHKeyloggingData Transfer Size Limits115
                  Application Layer Protocol
                  Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common1
                  Obfuscated Files or Information
                  Cached Domain Credentials2
                  File and Directory Discovery
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                  Regsvr32
                  DCSync25
                  System Information Discovery
                  Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                  DLL Side-Loading
                  Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 828521 Sample: MBQ24253060297767042_202303... Startdate: 17/03/2023 Architecture: WINDOWS Score: 100 42 129.232.188.93 xneeloZA South Africa 2->42 44 185.4.135.165 TOPHOSTGR Greece 2->44 46 22 other IPs or domains 2->46 56 Snort IDS alert for network traffic 2->56 58 Multi AV Scanner detection for domain / URL 2->58 60 Antivirus detection for URL or domain 2->60 62 7 other signatures 2->62 10 ONENOTE.EXE 52 501 2->10         started        signatures3 process4 file5 32 C:\...\MBQ24253060297767042_202303161424.one, data 10->32 dropped 34 ~MBQ24253060297767...ebackupconstruction, data 10->34 dropped 36 MBQ242530602977670...17-2023).one (copy), data 10->36 dropped 13 wscript.exe 2 10->13         started        18 ONENOTEM.EXE 1 10->18         started        process6 dnsIp7 54 penshorn.org 203.26.41.131, 443, 49696 DREAMSCAPE-AS-APDreamscapeNetworksLimitedAU Australia 13->54 38 C:\Users\user\AppData\...\rad1BF4D.tmp.dll, PE32+ 13->38 dropped 40 C:\Users\user\AppData\Local\Temp\click.wsf, ASCII 13->40 dropped 68 System process connects to network (likely due to code injection or exploit) 13->68 20 regsvr32.exe 13->20         started        file8 signatures9 process10 process11 22 regsvr32.exe 2 20->22         started        file12 30 C:\Windows\...\oFKJqrLBMvZWulQO.dll (copy), PE32+ 22->30 dropped 64 Hides that the sample has been downloaded from the Internet (zone.identifier) 22->64 26 regsvr32.exe 22->26         started        signatures13 process14 dnsIp15 48 45.235.8.30, 49737, 8080 WIKINETTELECOMUNICACOESBR Brazil 26->48 50 169.57.156.166, 8080 SOFTLAYERUS United States 26->50 52 22 other IPs or domains 26->52 66 System process connects to network (likely due to code injection or exploit) 26->66 signatures16

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  MBQ24253060297767042_202303161424.one33%ReversingLabsWin32.Trojan.OneNote
                  MBQ24253060297767042_202303161424.one44%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\rad1BF4D.tmp.dll58%ReversingLabsWin64.Trojan.Emotet
                  C:\Windows\System32\VnSBMYHcLeIGSHRn\oFKJqrLBMvZWulQO.dll (copy)58%ReversingLabsWin64.Trojan.Emotet
                  SourceDetectionScannerLabelLinkDownload
                  3.2.regsvr32.exe.c10000.0.unpack100%AviraHEUR/AGEN.1215476Download File
                  4.2.regsvr32.exe.800000.0.unpack100%AviraHEUR/AGEN.1215476Download File
                  SourceDetectionScannerLabelLink
                  penshorn.org11%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/=C:100%Avira URL Cloudmalware
                  https://45.235.8.30:8080/pgcnjflniex/100%Avira URL Cloudmalware
                  https://91.121.146.47:8080/pgcnjflniex/100%Avira URL Cloudmalware
                  https://45.235.8.30:8080/2sD100%Avira URL Cloudmalware
                  http://softwareulike.com/cWIYxWMPkK/16%VirustotalBrowse
                  http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/?8100%Avira URL Cloudmalware
                  https://119.59.103.152:8080/niex/100%Avira URL Cloudmalware
                  https://119.59.103.152:8080/niex/L100%Avira URL Cloudmalware
                  https://bbvoyage.co0%Avira URL Cloudsafe
                  https://bbvoyage.com/useragreement/100%Avira URL Cloudmalware
                  http://softwareulike.com/cWIYxWMPkK/100%Avira URL Cloudmalware
                  https://219.59.103.152:8080/0%Avira URL Cloudsafe
                  https://91.121.146.47:8080/100%Avira URL Cloudmalware
                  http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/W:100%Avira URL Cloudmalware
                  https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/100%Avira URL Cloudmalware
                  https://45.235.8.30:8080/100%Avira URL Cloudmalware
                  https://www.gomespontes.com.br/logs/pd/vM100%Avira URL Cloudmalware
                  http://wrappixels.com/wp-0%Avira URL Cloudsafe
                  https://119.59.103.152:8080/pgcnjflniex/0u5100%Avira URL Cloudmalware
                  https://160.16.142.56:8080/pgcnjflniex/~0%Avira URL Cloudsafe
                  https://103.44.196.120:8080/0%Avira URL Cloudsafe
                  http://ozmeydan.com/cekici/9/R100%Avira URL Cloudmalware
                  http://ozmeydan.com/cekici/9/100%Avira URL Cloudmalware
                  https://45.235.8.30:8080/6sX100%Avira URL Cloudmalware
                  https://penshorn.org/a0%Avira URL Cloudsafe
                  https://www.gomespontes.com.br/logs/pd/EC24100%Avira URL Cloudmalware
                  https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wM100%Avira URL Cloudmalware
                  https://penshorn.org/0%Avira URL Cloudsafe
                  https://penshorn.org/admin/Ses8712iGR8du/tM100%Avira URL Cloudmalware
                  https://www.gomespontes.com.br/logs/pd/100%Avira URL Cloudmalware
                  http://softwareulike.com/cWIY0%Avira URL Cloudsafe
                  https://portalevolucao.com/GerarBoleto/fLIOoFbFs1j0%Avira URL Cloudsafe
                  https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/uM100%Avira URL Cloudmalware
                  https://82.235.8.30:8080/0%Avira URL Cloudsafe
                  https://penshorn.org/admin/Ses8712iGR8du/24100%Avira URL Cloudmalware
                  https://penshorn.org/admin/Ses8712iGR8du/100%Avira URL Cloudmalware
                  http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/100%Avira URL Cloudmalware
                  https://penshorn.org:443/admin/Ses8712iGR8du/s100%Avira URL Cloudmalware
                  https://119.59.103.152:8080/100%Avira URL Cloudmalware
                  http://softwareulike.com/cWIYxWMPkK/yM100%Avira URL Cloudmalware
                  https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dllp8100%Avira URL Cloudmalware
                  https://107.170.39.149:8080/pgcnjflniex/O100%Avira URL Cloudmalware
                  https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dlli(100%Avira URL Cloudmalware
                  https://119.59.103.152:8080/pgcnjflniex/100%Avira URL Cloudmalware
                  https://160.16.142.56:8080/pgcnjflniex/0%Avira URL Cloudsafe
                  https://182.162.143.56/pgcnjflniex/100%Avira URL Cloudmalware
                  http://ozmeydan.com/cekici/9/xM100%Avira URL Cloudmalware
                  https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/100%Avira URL Cloudmalware
                  http://ozmeydan.com/cekici0%Avira URL Cloudsafe
                  http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/zM100%Avira URL Cloudmalware
                  https://penshorn.org/admin/Ses8712iGR8du/l100%Avira URL Cloudmalware
                  https://160.16.142.56:8080/0%Avira URL Cloudsafe
                  https://45.235.8.30:8080/pgcnjflniex/~100%Avira URL Cloudmalware
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  penshorn.org
                  203.26.41.131
                  truetrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  https://penshorn.org/admin/Ses8712iGR8du/true
                  • Avira URL Cloud: malware
                  unknown
                  https://182.162.143.56/pgcnjflniex/true
                  • Avira URL Cloud: malware
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/=C:wscript.exe, 00000001.00000003.398099459.0000000004F16000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398345159.0000000004F3A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398184946.0000000004F21000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398273657.0000000004F33000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: malware
                  unknown
                  http://softwareulike.com/cWIYxWMPkK/wscript.exe, wscript.exe, 00000001.00000002.407746797.0000000004F31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407635326.0000000004D28000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382705775.0000000004AD3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.392145404.0000000004CF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400050526.0000000004FF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399054141.0000000004F58000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.381540345.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394299845.0000000004D8B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.405807933.0000000004E95000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407560123.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.386752425.0000000004C3A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382390576.0000000004AF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398659405.0000000004D9D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380896201.0000000000784000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394328229.0000000004D00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380948454.00000000007DD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.385789223.0000000004C00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.384174654.0000000004B78000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.391149554.0000000004C5F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.383218696.0000000004AF6000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 16%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  https://45.235.8.30:8080/2sDregsvr32.exe, 00000004.00000002.877673221.0000000000941000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: malware
                  unknown
                  https://45.235.8.30:8080/pgcnjflniex/regsvr32.exe, 00000004.00000002.877508611.0000000000903000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: malware
                  unknown
                  https://91.121.146.47:8080/pgcnjflniex/regsvr32.exe, 00000004.00000003.459297908.000000000091F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.877453456.00000000008A8000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: malware
                  unknown
                  https://bbvoyage.cowscript.exe, 00000001.00000003.400050526.0000000004FF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399150135.0000000004FEF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400395370.0000000005002000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://bbvoyage.com/useragreement/wscript.exe, 00000001.00000002.407885293.0000000004FC8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400321473.0000000004FC8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399292240.0000000004FC8000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/?8wscript.exe, 00000001.00000003.398334158.000000000080A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407297168.000000000080C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.402555275.000000000080C000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://119.59.103.152:8080/niex/regsvr32.exe, 00000004.00000002.877991499.0000000002AD0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://119.59.103.152:8080/niex/Lregsvr32.exe, 00000004.00000002.877991499.0000000002AD0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://219.59.103.152:8080/regsvr32.exe, 00000004.00000002.878003835.0000000002AE0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/wscript.exe, wscript.exe, 00000001.00000002.407746797.0000000004F31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382705775.0000000004AD3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.392145404.0000000004CF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400050526.0000000004FF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399054141.0000000004F58000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.381540345.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394299845.0000000004D8B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.405807933.0000000004E95000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407560123.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.386752425.0000000004C3A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382390576.0000000004AF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398659405.0000000004D9D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380896201.0000000000784000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394328229.0000000004D00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380948454.00000000007DD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.385789223.0000000004C00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.384174654.0000000004B78000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.391149554.0000000004C5F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.383218696.0000000004AF6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398099459.0000000004F16000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://91.121.146.47:8080/regsvr32.exe, 00000004.00000002.877453456.00000000008A8000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/W:wscript.exe, 00000001.00000003.382593003.0000000000807000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382357407.00000000007F7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382612591.000000000080A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382005517.00000000007F2000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://45.235.8.30:8080/regsvr32.exe, 00000004.00000002.877673221.0000000000941000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://www.gomespontes.com.br/logs/pd/vMwscript.exe, 00000001.00000003.401212702.0000000004834000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://wrappixels.com/wp-wscript.exe, 00000001.00000002.407885293.0000000004FC8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400321473.0000000004FC8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399292240.0000000004FC8000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://119.59.103.152:8080/pgcnjflniex/0u5regsvr32.exe, 00000004.00000002.877508611.0000000000903000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://160.16.142.56:8080/pgcnjflniex/~regsvr32.exe, 00000004.00000003.590971884.0000000000977000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://ozmeydan.com/cekici/9/Rwscript.exe, 00000001.00000002.407192937.0000000000717000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://103.44.196.120:8080/regsvr32.exe, 00000004.00000002.877644863.0000000000928000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.591189993.0000000000927000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.590971884.000000000091F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://45.235.8.30:8080/6sXregsvr32.exe, 00000004.00000002.877673221.0000000000941000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://penshorn.org/awscript.exe, 00000001.00000003.381144197.0000000005014000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.404094649.0000000005014000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400959492.0000000005014000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407958037.0000000005014000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: safe
                  unknown
                  http://ozmeydan.com/cekici/9/wscript.exe, wscript.exe, 00000001.00000002.407746797.0000000004F31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382705775.0000000004AD3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.392145404.0000000004CF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400050526.0000000004FF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399054141.0000000004F58000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.381540345.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394299845.0000000004D8B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.405807933.0000000004E95000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407560123.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.386752425.0000000004C3A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382390576.0000000004AF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398659405.0000000004D9D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380896201.0000000000784000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394328229.0000000004D00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380948454.00000000007DD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.385789223.0000000004C00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.384174654.0000000004B78000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.391149554.0000000004C5F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.383218696.0000000004AF6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398099459.0000000004F16000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://www.gomespontes.com.br/logs/pd/EC24wscript.exe, 00000001.00000003.382593003.0000000000807000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382357407.00000000007F7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398334158.000000000080A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407297168.000000000080C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382612591.000000000080A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382005517.00000000007F2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.402555275.000000000080C000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://penshorn.org/wscript.exe, 00000001.00000003.381144197.0000000005045000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.403113131.0000000005045000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407992498.0000000005045000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400684790.0000000005045000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: safe
                  unknown
                  https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wMwscript.exe, 00000001.00000003.401212702.0000000004834000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://www.gomespontes.com.br/logs/pd/wscript.exe, wscript.exe, 00000001.00000002.407746797.0000000004F31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382705775.0000000004AD3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.392145404.0000000004CF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400050526.0000000004FF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399054141.0000000004F58000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.381540345.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394299845.0000000004D8B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.405807933.0000000004E95000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407560123.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.386752425.0000000004C3A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382390576.0000000004AF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398659405.0000000004D9D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380896201.0000000000784000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394328229.0000000004D00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380948454.00000000007DD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.385789223.0000000004C00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.384174654.0000000004B78000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.391149554.0000000004C5F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.383218696.0000000004AF6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398099459.0000000004F16000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://penshorn.org/admin/Ses8712iGR8du/tMwscript.exe, 00000001.00000003.401212702.0000000004834000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: malware
                  unknown
                  https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jwscript.exe, 00000001.00000002.407928297.0000000004FF7000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://softwareulike.com/cWIYwscript.exe, 00000001.00000002.407885293.0000000004FC8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400321473.0000000004FC8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399292240.0000000004FC8000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/uMwscript.exe, 00000001.00000003.401212702.0000000004834000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://82.235.8.30:8080/regsvr32.exe, 00000004.00000002.878003835.0000000002AE0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://penshorn.org/admin/Ses8712iGR8du/24wscript.exe, 00000001.00000003.382593003.0000000000807000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382357407.00000000007F7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398334158.000000000080A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407297168.000000000080C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382612591.000000000080A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382005517.00000000007F2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.402555275.000000000080C000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: malware
                  unknown
                  http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/wscript.exe, wscript.exe, 00000001.00000002.407746797.0000000004F31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382705775.0000000004AD3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.392145404.0000000004CF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400050526.0000000004FF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399054141.0000000004F58000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.381540345.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394299845.0000000004D8B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.405807933.0000000004E95000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407560123.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.386752425.0000000004C3A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382390576.0000000004AF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398659405.0000000004D9D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380896201.0000000000784000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394328229.0000000004D00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380948454.00000000007DD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.385789223.0000000004C00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.384174654.0000000004B78000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.391149554.0000000004C5F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.383218696.0000000004AF6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398099459.0000000004F16000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://penshorn.org:443/admin/Ses8712iGR8du/swscript.exe, 00000001.00000003.400050526.0000000004FF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399150135.0000000004FEF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.378986397.0000000004FE5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407928297.0000000004FF7000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: malware
                  unknown
                  https://119.59.103.152:8080/regsvr32.exe, 00000004.00000002.877991499.0000000002AD0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://softwareulike.com/cWIYxWMPkK/yMwscript.exe, 00000001.00000003.401212702.0000000004834000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dllp8wscript.exe, 00000001.00000003.398345159.0000000004F58000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://107.170.39.149:8080/pgcnjflniex/Oregsvr32.exe, 00000004.00000002.877453456.00000000008A8000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dlli(wscript.exe, 00000001.00000003.399054141.0000000004F58000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://119.59.103.152:8080/pgcnjflniex/regsvr32.exe, 00000004.00000002.877673221.0000000000941000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://160.16.142.56:8080/pgcnjflniex/regsvr32.exe, 00000004.00000003.590971884.0000000000977000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.590971884.0000000000903000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://ozmeydan.com/cekici/9/xMwscript.exe, 00000001.00000003.401212702.0000000004834000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://ozmeydan.com/cekiciwscript.exe, 00000001.00000002.407885293.0000000004FC8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400321473.0000000004FC8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399292240.0000000004FC8000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wscript.exe, wscript.exe, 00000001.00000002.407746797.0000000004F31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382705775.0000000004AD3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.392145404.0000000004CF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.400050526.0000000004FF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.399054141.0000000004F58000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.381540345.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394299845.0000000004D8B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.405807933.0000000004E95000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.407560123.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.386752425.0000000004C3A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.382390576.0000000004AF3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.398659405.0000000004D9D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380896201.0000000000784000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.394328229.0000000004D00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.380948454.00000000007DD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.385789223.0000000004C00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.384174654.0000000004B78000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.391149554.0000000004C5F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.383218696.0000000004AF6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.402972724.0000000004FA2000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/zMwscript.exe, 00000001.00000003.401212702.0000000004834000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://penshorn.org/admin/Ses8712iGR8du/lwscript.exe, 00000001.00000003.401037297.0000000004BD9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.384096889.0000000004BCD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.385308264.0000000004BD1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.383683287.0000000004BA1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.385789223.0000000004BD9000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: malware
                  unknown
                  https://160.16.142.56:8080/regsvr32.exe, 00000004.00000003.590971884.0000000000941000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000003.590971884.0000000000903000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://45.235.8.30:8080/pgcnjflniex/~regsvr32.exe, 00000004.00000002.877673221.0000000000977000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: malware
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  110.232.117.186
                  unknownAustralia
                  56038RACKCORP-APRackCorpAUtrue
                  103.132.242.26
                  unknownIndia
                  45117INPL-IN-APIshansNetworkINtrue
                  104.168.155.143
                  unknownUnited States
                  54290HOSTWINDSUStrue
                  79.137.35.198
                  unknownFrance
                  16276OVHFRtrue
                  115.68.227.76
                  unknownKorea Republic of
                  38700SMILESERV-AS-KRSMILESERVKRtrue
                  163.44.196.120
                  unknownSingapore
                  135161GMO-Z-COM-THGMO-ZcomNetDesignHoldingsCoLtdSGtrue
                  206.189.28.199
                  unknownUnited States
                  14061DIGITALOCEAN-ASNUStrue
                  203.26.41.131
                  penshorn.orgAustralia
                  38719DREAMSCAPE-AS-APDreamscapeNetworksLimitedAUtrue
                  107.170.39.149
                  unknownUnited States
                  14061DIGITALOCEAN-ASNUStrue
                  66.228.32.31
                  unknownUnited States
                  63949LINODE-APLinodeLLCUStrue
                  197.242.150.244
                  unknownSouth Africa
                  37611AfrihostZAtrue
                  185.4.135.165
                  unknownGreece
                  199246TOPHOSTGRtrue
                  183.111.227.137
                  unknownKorea Republic of
                  4766KIXS-AS-KRKoreaTelecomKRtrue
                  45.176.232.124
                  unknownColombia
                  267869CABLEYTELECOMUNICACIONESDECOLOMBIASASCABLETELCOCtrue
                  169.57.156.166
                  unknownUnited States
                  36351SOFTLAYERUStrue
                  164.68.99.3
                  unknownGermany
                  51167CONTABODEtrue
                  139.59.126.41
                  unknownSingapore
                  14061DIGITALOCEAN-ASNUStrue
                  167.172.253.162
                  unknownUnited States
                  14061DIGITALOCEAN-ASNUStrue
                  167.172.199.165
                  unknownUnited States
                  14061DIGITALOCEAN-ASNUStrue
                  202.129.205.3
                  unknownThailand
                  45328NIPA-AS-THNIPATECHNOLOGYCOLTDTHtrue
                  147.139.166.154
                  unknownUnited States
                  45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCtrue
                  153.92.5.27
                  unknownGermany
                  47583AS-HOSTINGERLTtrue
                  159.65.88.10
                  unknownUnited States
                  14061DIGITALOCEAN-ASNUStrue
                  172.105.226.75
                  unknownUnited States
                  63949LINODE-APLinodeLLCUStrue
                  164.90.222.65
                  unknownUnited States
                  14061DIGITALOCEAN-ASNUStrue
                  213.239.212.5
                  unknownGermany
                  24940HETZNER-ASDEtrue
                  5.135.159.50
                  unknownFrance
                  16276OVHFRtrue
                  186.194.240.217
                  unknownBrazil
                  262733NetceteraTelecomunicacoesLtdaBRtrue
                  119.59.103.152
                  unknownThailand
                  56067METRABYTE-TH453LadplacoutJorakhaebuaTHtrue
                  159.89.202.34
                  unknownUnited States
                  14061DIGITALOCEAN-ASNUStrue
                  91.121.146.47
                  unknownFrance
                  16276OVHFRtrue
                  160.16.142.56
                  unknownJapan9370SAKURA-BSAKURAInternetIncJPtrue
                  201.94.166.162
                  unknownBrazil
                  28573CLAROSABRtrue
                  91.207.28.33
                  unknownKyrgyzstan
                  39819PROHOSTKGtrue
                  103.75.201.2
                  unknownThailand
                  133496CDNPLUSCOLTD-AS-APCDNPLUSCOLTDTHtrue
                  103.43.75.120
                  unknownJapan20473AS-CHOOPAUStrue
                  188.44.20.25
                  unknownMacedonia
                  57374GIV-ASMKtrue
                  45.235.8.30
                  unknownBrazil
                  267405WIKINETTELECOMUNICACOESBRtrue
                  153.126.146.25
                  unknownJapan7684SAKURA-ASAKURAInternetIncJPtrue
                  72.15.201.15
                  unknownUnited States
                  13649ASN-VINSUStrue
                  187.63.160.88
                  unknownBrazil
                  28169BITCOMPROVEDORDESERVICOSDEINTERNETLTDABRtrue
                  82.223.21.224
                  unknownSpain
                  8560ONEANDONE-ASBrauerstrasse48DEtrue
                  173.212.193.249
                  unknownGermany
                  51167CONTABODEtrue
                  95.217.221.146
                  unknownGermany
                  24940HETZNER-ASDEtrue
                  149.56.131.28
                  unknownCanada
                  16276OVHFRtrue
                  182.162.143.56
                  unknownKorea Republic of
                  3786LGDACOMLGDACOMCorporationKRtrue
                  1.234.2.232
                  unknownKorea Republic of
                  9318SKB-ASSKBroadbandCoLtdKRtrue
                  129.232.188.93
                  unknownSouth Africa
                  37153xneeloZAtrue
                  94.23.45.86
                  unknownFrance
                  16276OVHFRtrue
                  Joe Sandbox Version:37.0.0 Beryl
                  Analysis ID:828521
                  Start date and time:2023-03-17 09:39:12 +01:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 11m 33s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:10
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample file name:MBQ24253060297767042_202303161424.one
                  Detection:MAL
                  Classification:mal100.troj.expl.evad.winONE@11/720@1/49
                  EGA Information:
                  • Successful, ratio: 100%
                  HDC Information:
                  • Successful, ratio: 50.2% (good quality ratio 42.4%)
                  • Quality average: 60.5%
                  • Quality standard deviation: 35.6%
                  HCA Information:
                  • Successful, ratio: 89%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .one
                  • Override analysis time to 240s for rundll32
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, rundll32.exe, WMIADAP.exe, conhost.exe
                  • TCP Packets have been reduced to 100
                  • Created / dropped Files have been reduced to 100
                  • Excluded IPs from analysis (whitelisted): 52.109.32.24, 20.126.106.131, 20.224.201.79, 8.248.147.254, 67.26.139.254, 8.248.149.254, 8.248.113.254, 8.248.139.254, 93.184.221.240
                  • Excluded domains from analysis (whitelisted): fg.download.windowsupdate.com.c.footprint.net, prod-w.nexus.live.com.akadns.net, prod.configsvc1.live.com.akadns.net, wu.ec.azureedge.net, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, wu.azureedge.net, config.officeapps.live.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, nexus.officeapps.live.com, officeclient.microsoft.com, europe.configsvc1.live.com.akadns.net
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtCreateFile calls found.
                  • Report size getting too big, too many NtOpenFile calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                  • Report size getting too big, too many NtReadFile calls found.
                  • Report size getting too big, too many NtSetInformationFile calls found.
                  • Report size getting too big, too many NtWriteFile calls found.
                  TimeTypeDescription
                  09:40:50AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Send to OneNote.lnk
                  09:40:55API Interceptor2x Sleep call for process: wscript.exe modified
                  09:41:22API Interceptor24x Sleep call for process: regsvr32.exe modified
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Windows\System32\regsvr32.exe
                  File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 62582 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                  Category:dropped
                  Size (bytes):62582
                  Entropy (8bit):7.996063107774368
                  Encrypted:true
                  SSDEEP:1536:Jk3XPi43VgGp0gB2itudTSRAn/TWTdWftu:CHa43V5p022iZ4CgA
                  MD5:E71C8443AE0BC2E282C73FAEAD0A6DD3
                  SHA1:0C110C1B01E68EDFACAEAE64781A37B1995FA94B
                  SHA-256:95B0A5ACC5BF70D3ABDFD091D0C9F9063AA4FDE65BD34DBF16786082E1992E72
                  SHA-512:B38458C7FA2825AFB72794F374827403D5946B1132E136A0CE075DFD351277CF7D957C88DC8A1E4ADC3BCAE1FA8010DAE3831E268E910D517691DE24326391A6
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview:MSCF....v.......,...................I.................BVrl .authroot.stl....oJ5..CK..8U....a..3.1.P. J.".t..2F2e.dHH......$E.KB.2D..-SJE....^..'..y.}..,{m.....\...]4.G.......h....148...e.gr.....48:.L...g.....Xef.x:..t...J...6-....kW6Z>....&......ye.U.Q&z:.vZ..._....a...]..T.E.....B.h.,...[....V.O.3..EW.x.?.Q..$.@.W..=.B.f..8a.Y.JK..g./%p..C.4CD.s..Jd.u..@.g=...a.. .h%..'.xjy7.E..\.....A..':.4TdW?Ko3$.Hg.z.d~....../q..C.....`...A[ W(.........9...GZ.;....l&?........F...p?... .p.....{S.L4..v.+...7.T?.....p..`..&..9.......f...0+.L.....1.2b)..vX5L'.~....2vz.,E.Ni.{#...o..w.?.#.3..h.v<.S%.].tD@!Le.w.q.7.8....QW.FT.....hE.........Y............./.%Q...k...*.Y.n..v.A..../...>B..5\..-Ko.......O<.b.K.{.O.b...._.7...4.;%9N..K.X>......kg-9..r.c.g.G|.*[.-...HT...",?.q...ad....7RE.......!f..#../....?.-.^.K.c^...+{.g......]<..$.=.O....ii7.wJ+S..Z..d.....>..J*...T..Q7..`.r,<$....\d:K`..T.n....N.....C..j.;.1SX..j....1...R....+....Yg....]....3..9..S..D..`.
                  Process:C:\Windows\System32\regsvr32.exe
                  File Type:data
                  Category:modified
                  Size (bytes):328
                  Entropy (8bit):3.1335351732898324
                  Encrypted:false
                  SSDEEP:6:kKRmf4ry/7UN+SkQlPlEGYRMY9z+4KlDA3RUecZUt:EfwCvkPlE99SNxAhUext
                  MD5:39954BA4F667D486014357E6F8A6E14D
                  SHA1:532F8B5AE9A56119608634D0E1BEA23B63D09555
                  SHA-256:6C2E3B71631985E4A952443EC40302E817D01A8BE0D814F84A67A52F27D787DC
                  SHA-512:6E76A7EDBA41336F1E9EDFF4EBF5F241D203F31001D178D646ACD32C1CB21865B49B99A9AE7186F0324A4C02615D8B37692F5902154A73ED21B38DC5233BF451
                  Malicious:false
                  Preview:p...... ...........M.X..(....................................................... ..........).K......&...........v...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.d.2.f.9.2.9.a.7.4.b.d.9.1.:.0."...
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):154907
                  Entropy (8bit):5.352021810015309
                  Encrypted:false
                  SSDEEP:1536:i+C76gfYBIB9guw6LQ9DQl+zQxik4F77nXmvidlXRpE6Lhz67:XcQ9DQl+zrXgb
                  MD5:3297CC2609AB07B15ECDAEBE67E02A34
                  SHA1:FBA3736A1EE24F789E25E47B8C1AF79E208FA547
                  SHA-256:CC2DBE51BDFC373A8B8250C9EACE44DD9FF590849C37571F718D3E30D6F06CF0
                  SHA-512:D0AF1F9E1D256548082F1F5C124586B2E247705F6F9A57AA693E53F7A65B2D2A1ABF430D73C63444426CE3063BCC3359C2B38670EFD8F3D89141B9E4F31C346C
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2023-03-17T08:40:12">.. Build: 16.0.16310.30525-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://rr.office.microsoft.com/research/query.asmx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId" o:authentication="1">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. <o:ticket o:policy="MBI_SSL_SHORT" o:idprovider="1" o:target="[MAX.AuthHost]" o:headerValue="Passport1.4 from-PP='{}&amp;p='" />.. <o:ticket o:idprovider="3" o:headerValue="Bearer {}" o:resourceId="[MAX.ResourceId]" o:authorityUrl="[ADALAuthorityU
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):360056
                  Entropy (8bit):7.518580404611753
                  Encrypted:false
                  SSDEEP:6144:ebXWd5d1QI6vUih4AIqECkIwF5HUvFOAjNPyFj8XTcrOQMpuNBSbXq:bd5d1AvUiWqrkIwF5wOuqF2TcOQMBba
                  MD5:E2B4910AC83D8AF4F697CB924D9F5477
                  SHA1:BE70FBE6BD15749E7B6CA9DFD0FE8849D89DC0E9
                  SHA-256:FC830C7918DFA8A5FC3CC79D29B095DA6229D6053E466B57B522CA960D4DEFA8
                  SHA-512:F6938D6312E20354AF7677CC252C0EF59E88E84993A12032DA70E5EE2F71CCAB8FFD950BA6F7BB67F9A538EDC5C063676A51C8CD6B12E38AD2056DD0DD72B6C3
                  Malicious:false
                  Preview:.R\{..M..Sx.)..-...~.@.<%.)..e................?.....I.......*...*...*...*...................a....................................................z..................h...........................x~......0..........ZN.LA.|..&;.Dk...........].K.....S..............................7...7...7...7..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:data
                  Category:modified
                  Size (bytes):360056
                  Entropy (8bit):7.518580404611753
                  Encrypted:false
                  SSDEEP:6144:ebXWd5d1QI6vUih4AIqECkIwF5HUvFOAjNPyFj8XTcrOQMpuNBSbXq:bd5d1AvUiWqrkIwF5wOuqF2TcOQMBba
                  MD5:E2B4910AC83D8AF4F697CB924D9F5477
                  SHA1:BE70FBE6BD15749E7B6CA9DFD0FE8849D89DC0E9
                  SHA-256:FC830C7918DFA8A5FC3CC79D29B095DA6229D6053E466B57B522CA960D4DEFA8
                  SHA-512:F6938D6312E20354AF7677CC252C0EF59E88E84993A12032DA70E5EE2F71CCAB8FFD950BA6F7BB67F9A538EDC5C063676A51C8CD6B12E38AD2056DD0DD72B6C3
                  Malicious:false
                  Preview:.R\{..M..Sx.)..-...~.@.<%.)..e................?.....I.......*...*...*...*...................a....................................................z..................h...........................x~......0..........ZN.LA.|..&;.Dk...........].K.....S..............................7...7...7...7..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):117048
                  Entropy (8bit):6.732219524942134
                  Encrypted:false
                  SSDEEP:1536:1BmTVdaeNtuXnd7rJJmT4HVnteV4FrdMiYcx7bfCb6HPdnXQ:1BmC+tC9vSMVnte8ZP1Y6JA
                  MD5:B16C1C06F8FB4A4FCAE1683A47431FAD
                  SHA1:B0DDD6BCA1BADF7F43428A86415EF5842FE22D8F
                  SHA-256:990351BFD61EFE34C57A76024EE4E97354C4A9D14D9A98ADC714A158024943B2
                  SHA-512:19E9DA0E01B42E27F7D8B26E35AACB6C46F8680F78C6592EF1A6C3DC580EEF561C13CAADD6C8098A6FF71D20490C50A47E2FDF35FA51A6D27A280D73CD823625
                  Malicious:true
                  Preview:.R\{..M..Sx.)..[.<...E.F.0{B..................?.....I.......*...*...*...*........................................................................ ..................h...........................8.......`........L.)..3G...L. .........xQ..b.G...EB.D].............................7...7...7...7..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):117048
                  Entropy (8bit):6.732219524942134
                  Encrypted:false
                  SSDEEP:1536:1BmTVdaeNtuXnd7rJJmT4HVnteV4FrdMiYcx7bfCb6HPdnXQ:1BmC+tC9vSMVnte8ZP1Y6JA
                  MD5:B16C1C06F8FB4A4FCAE1683A47431FAD
                  SHA1:B0DDD6BCA1BADF7F43428A86415EF5842FE22D8F
                  SHA-256:990351BFD61EFE34C57A76024EE4E97354C4A9D14D9A98ADC714A158024943B2
                  SHA-512:19E9DA0E01B42E27F7D8B26E35AACB6C46F8680F78C6592EF1A6C3DC580EEF561C13CAADD6C8098A6FF71D20490C50A47E2FDF35FA51A6D27A280D73CD823625
                  Malicious:true
                  Yara Hits:
                  • Rule: JoeSecurity_MalOneNote, Description: Yara detected Malicious OneNote, Source: C:\Users\user\AppData\Local\Microsoft\OneNote\16.0\Backup\Open Sections\~MBQ24253060297767042_202303161424.one.onebackupconstruction, Author: Joe Security
                  Preview:.R\{..M..Sx.)..[.<...E.F.0{B..................?.....I.......*...*...*...*........................................................................ ..................h...........................8.......`........L.)..3G...L. .........xQ..b.G...EB.D].............................7...7...7...7..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 165 x 131, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):3679
                  Entropy (8bit):7.931319059366604
                  Encrypted:false
                  SSDEEP:96:tT+LtoQ9jsUBsnwlDGThUe8ww2iJiGEjdKKnnE+Gh:V+Ltt5GwlDQhUe8ww2iJi7MKnnE+K
                  MD5:995CEACAD563F849C4142B6A6F29F081
                  SHA1:44CB3B867CD2917541B7D5AAED2F14F10FEBB0FD
                  SHA-256:3691FB8C60EA1B827092F05FBB1807E34726016C6FF56698D7B81C44D519D22A
                  SHA-512:3C8EFEB966B075D06D8344483352BF92C9292F9970C9377BE254EB355EFAF017916737AECCDC704B84D532B7229F9908951A6F2CC3FAD810791CAB224401AD3D
                  Malicious:false
                  Preview:.PNG........IHDR.............c.L.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^....W...Gh...k.Hm..J.m....,X...Eh..%.n.....PHvy$%...[...R..l...(/..-..yl..Z.h..H!.../.|.y|w...7d3s.s.=.{.s.g.6W.^..)..@..{..'O.LL.......c.^.6xS&O.,...J.(|?...............,.$......@.zk....,.$.........)..7]O...mH7..0..|..&j..t..F...T...AZ7z.....$H...AZ7z.....$H...AZ7z.....$H...AZ7z.....$H....W.6.....0...FTcc.Wi....Q)...<.*.....{...#G....Y.f....KKK..,,,4.....{S.`...+O.[..+.\H...(.<..Qy*..ET.PM...c....~(.g..**...ol.K......Sc8..q.F.KM"<...:t.O.>b..$*t..].........2..y.h."!f.08hT..m.(..C.7n.......@....SVUU).F.).X\\....[j.U....$x$d..e...<.W......=;0L78t+..Gw..-....]......C7......K.w..._..g......A.&M.$^.#.!....e.\.P........;vD..@...Za.@*D..f...! .2w...4#.J..c....K}....F.u.I.b.V2.k...5..`....*........M..!.,.;.E..BZ....K..[7....5....,...........K...7+.6..o....\,`...z..5x...\46x.b......Y....s.^.x=.e.4s.W..t,.iu.G^.....(74....`.....:......]..&..j+t9..3..}..
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 127 x 138, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):2232
                  Entropy (8bit):7.837610270261933
                  Encrypted:false
                  SSDEEP:48:dFQY2WmQbe+TukEC2KgYPsWOuWFk792oP/sWtGOK9Lc+rD0NTHj:3L+wKkEOgx3PG92Eqt9LczFD
                  MD5:EDB5ED43CC6038500A54B90BEC493628
                  SHA1:A8CD63F3914E4347F4C5552FB922C6C03917F45F
                  SHA-256:9F3312E33EB78C6952B5A5D881BBD18751FCFAC41D648C6F053CE781342A504F
                  SHA-512:4EBCEFD69A4C249AA3B0F00A954C4E463DA22FC9CA0B61A0DC46079B438138C509B22188D966FFF6599A3A604858BC4CC8FE6E0685A764E8E0477AB7A237DB32
                  Malicious:false
                  Preview:.PNG........IHDR.....................sRGB.........gAMA......a.....pHYs..........o.d...MIDATx^..hVU..}..s:..6..9g.MM3...j...*........A..!.A.....R.Ai%YH..(M.".h.cf*.B.......:...{w.{.......y.s>.{.{.=.........#.y..r.K...K.0}......Y..b..[N.=....j.=........!......./.6....B.8....p....5P)....@......=}............^.~..@.o`n<.q.....Yw]..mg\V*...y.W.T.>...\n...s.iG.~L]..d.<.8..j<.<1..4...CZ0...}...........oDDh.....]3}#"B..O........0}B.F.L......5.f.FD..L....5.7""4`..p.........'.kt.....>!\.k.oDDh.....]3}#"B..O........0}B.F.L......5.f.FD..I..x........Z^...>B$1.N"}4.....1:&F8..*.X.yL(..s.3......~2.EL%.w.Uc.zJ...B..S..b.7o|%..7..'.....N.|..Vi...q..uO,`/....\W{..y...&iI..|X&T.........-........Z..o.~u..U....cF.M....O4}......~......:T..W.._s...t..Dlb.$Pr././.._4.b......R.T$t..$.>hB. +.{......m.w .Q...05..C.}...}.....?..h.....Y .8.6^t....}.y.%......l=$..[.~..]..h..N.......*....SB.|....8..H......_...G...|......;6YQ|WO.o.}]..'.$..oE.y...i'9.[cmS..@m@.Q
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):1604
                  Entropy (8bit):7.814570704154439
                  Encrypted:false
                  SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                  MD5:3F1535054D4F9626F0EB10CEE47F076E
                  SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                  SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                  SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                  Malicious:false
                  Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 749 x 126, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):13084
                  Entropy (8bit):7.940058639272698
                  Encrypted:false
                  SSDEEP:384:o4KSpFN6Ud4c3p2Il1yavNr5spYVJzimlfZ:wGN6Udv4IKavLBJz/r
                  MD5:0693DABBBC411538D209F32E22F622F6
                  SHA1:FB7E675406FA123CDB7E058D336742D6A2E8DC8E
                  SHA-256:2DFB2E7A1A3AA43C673D2EE540D3C366CEB12105EB5441F98992FC06F4284013
                  SHA-512:F07732660EC62DAE58EB02E2E9476007EA92BF826F642BCA547097136AEA01D29FF69D9B0CD0F5D65A5E15AA66CA4AA4804AA171A3504AAB198631C643C90C16
                  Malicious:false
                  Preview:.PNG........IHDR.......~.............sRGB.........gAMA......a.....pHYs..........o.d..2.IDATx^.w....'m.9c.6"...&.`.N.(.TN.Ne.N.R.eKr..T.*[...?T..:I.D.S>I$A...I......y.9...f......3...Gh.....}_.o....n..A@.....A@...L...2... ..... .x...#. ..... .....1f]9.[.....A@......3 ..... ...fE@x.YWN.....A@......1...... .....Y..J.Y.N.....s"................./..rc.scuyyyu...\s....t.oi..j..lv.....Gr.#9%%%9%--....d.T...r...DH...6.....%U..A@.0.....rAD ........2.5.......L.R..=W...gZ.`o..-?.T.Cy.:...y.9..y.EE...v......1..R.....1.".... `"...ss.......i.!.hY...Fj*....%.-.Gw...HJJr8..6...#.......!(.?P.(.....8(u........*..OOO..........dgg....Q..=..c.y....A`S.@.......3.CC..GFfg. .I.I.COrJFFFNNV^nn^^.z..%..(...^.b$........a..y.LMO-.,ylV+.k...T>Jg..*//-+-......M=..x.....E.... `~..N.Kww.......z...%%.e.%.yy.i...P.)'.,A.5.d.0.Cc35==66>2::33..>..;..Ii.i.gv...DSd....l#...l..............................)**,**...V..1 .F.'7....)..SSs..7..F...C.p....(*,......(RG..B...l!.2. ....|r1
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):1604
                  Entropy (8bit):7.814570704154439
                  Encrypted:false
                  SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                  MD5:3F1535054D4F9626F0EB10CEE47F076E
                  SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                  SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                  SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                  Malicious:false
                  Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 163 x 131, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):4847
                  Entropy (8bit):7.950192613458318
                  Encrypted:false
                  SSDEEP:96:JnieMJz5Tz/gKVp93jQvcv16kjOzbapFJBkjcMNBqmQzOG8qx1QKnse8T:JieMJzph13Evcv16RfapFLxMNBo8qxan
                  MD5:A1A1017A6A7928761CEB56D1D950E123
                  SHA1:28272E9C7F816A1CE8F2033FC00F489005332365
                  SHA-256:72F066CD34EA71D0E1B28FB60D663B0372C5254E1A8239C94A164EEF9389DB88
                  SHA-512:10F4557F102230126BC86CD4B49C93365C38D5CBEAC51F4691B90D861098866A2BDEFEBA507731D4FA14367FEE430453BD716157F9074EF643F2B949B09E1530
                  Malicious:false
                  Preview:.PNG........IHDR.............n.<.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].\TU..}...E.0.T....L~....af..Z.....O..4..>Ms..Js_....5.E.d...Y....?\z.3..}.l..|?~...{.....s.z..Y.............E.X.6...c..u...y..W.j....."}...l.i.`.!-!-......MKH.E.bi.d...b.X.)...X4 .vJ6-...;..+/.->Qyi.t...%.T..k;.U..y.C$[;..Gm.......v..*2..2..eee..."!..)...yy...III./..u........2....M.:''...W.....o..t...._.6m.... .`,k.T.v."..q.......s~~........O....ed.[W0X..HB.V.i.....<=..E^^......MyY..vpp...........^6.....aQQQaaa........]^^nkg../_.d`.%......L&k..B......?C....W.VVV6660t.J+K.:..%q.....e.cp....Kz..%.qZsAR\T.!......>55.R.u.W\\.L....T...K..rE.U.K.-9......y.y.......K....>...HWTT.e....+..B.......%%%......^...|...M'.%.f!/..=p...{O..../...@...DP..hw8....7o>..A.mgg......7-']~.s.OE.E.|=.......'%!y.......\.....MSn.i.........!...U.$0S .......Z.P.}[.%X[.;{....N.....\......6O.....'.N}.}s.m...E..V..f..r...4..~.......H..F.}....4,.R.=.......xT..4......./...,z
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):1604
                  Entropy (8bit):7.814570704154439
                  Encrypted:false
                  SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                  MD5:3F1535054D4F9626F0EB10CEE47F076E
                  SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                  SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                  SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                  Malicious:false
                  Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 123 x 103, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):1657
                  Entropy (8bit):7.80882577056055
                  Encrypted:false
                  SSDEEP:24:q3kLWZefR0kKbfLnNhzzt+acvt2x6pBs/j+7QJU0QbDQ883ASaoUV4hNgq1rsyhy:q322nN+X11GDsg8831Uyhi/vf
                  MD5:D5F7A65469623327F799B516ACBFFD2F
                  SHA1:76C6333C14AF3A7EA091819953E6E12DC289A12C
                  SHA-256:F476FAE1C6D79069239C471D182631AB343749C22B1A6990250465C7EC3738FE
                  SHA-512:351B9E455E97E6247E64E4BC1B59C9524E70AE0D09D3B6FB96937378A70536483B00426EE69C3590DD415A8265D21FD031B524B90E4E86814EC9AD704E57793E
                  Malicious:false
                  Preview:.PNG........IHDR...{...g.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^...h.U..p.T..(.eBR....2.....':.4kec^....0.&.....ugS.8u:i.P.F..f3...D....6.%...xaI.}...y..9...s.w.s..{..y.5<<<...(0Q.............t_..q/.[@.....-.e.....=..J.L.......c.4H......u?.XF.KJ..zb..0..f}..'J.,[&..S.6...w..9..._......<.........?j....H........>....~..}.n.8.WW..B?...?.b.;.....<....~...b...m....&1.=.Pq....w....a_3.k7'...\....d..z.O..w...s...Lh.x..........Q;40.i..`.8V._.@...rd.....kF.@<@..e......e....=mHB;....E./.\h.^....q..>.....%v:.O.:...&q...:.'e..9...h.iG'.L<@......([..|'.n.x...c....._O...[)......S*..Q...d......A....4..t....E..v..}..7...t.b....,/*|.H.]...8.. .@.(.;"..Kt.....].+.[LwJ..B]i.b.k.@..Js......J......6..J._LwS<@..J.YLwV<@G.4w.L..G...]..zu.z.h....;...W.IH..+...c...F....qI....Xul..]...N...wv\.M$..D...+...=.....?U....T..^<6../T*.{q.q..:....y..XL..l..z.d....G..b..g.G..b......SM.{q.q$MUL..R..........^\P..g...e.....L/yqM../.b.f..........J.<
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 59 x 61, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):2210
                  Entropy (8bit):7.86853667196985
                  Encrypted:false
                  SSDEEP:48:naUvGemgl0W5KMDRLEbGAnaHC7ew/fkDSCcE5FTaHWc:aerVlDRIewkXlrTa2c
                  MD5:73E38124F94AD20A2F1571FBBE11AEEC
                  SHA1:87FB8056DC7A0A3B70D51426771C4CCE2099CFE5
                  SHA-256:A700B63B30CBBE5230CC5E977D651E178EA87E73EAB18C8D5FFB1362149ADDF7
                  SHA-512:320FCE64DD6F975384BEC9267348CD5CD24A55B13BB09FEF1238C2216AD8ECABDCCC15601A079CE092ACFA4954829FFEB06FBB0631F6AE26E3A39E43C102048B
                  Malicious:false
                  Preview:.PNG........IHDR...;...=.............sRGB.........gAMA......a.....pHYs..........o.d...7IDAThC.yL.w...r..r....... ...Eq.nnN..i..[.e...-.d.M.dn...x.xmQAT.Q.RN9..EA.k..P`..=}..m.&~............oy....k...}}x..[....g59.}]...~i.SY......."....7Ow../......2...3f)n{..R..R......U?......O.{....c..pT.\.t....5.07.. .....07...7.o..,+.,.V.c...&..%.3I.....:v..\....6.....??..[.N...........nz..Z.B.........v.prs.q1V1|..=':..`.bz..%s.cf.3..RyMNUeV..J.k.}D[~xo..d..c...sO.y\....B...c.07......Rp..J.......{b.......;u...s....N.gko.M...;6...6..c.X5.S..o..\....^).....(......y.72.^....s%...[.q!&Z....C-..+o.....I.....,Y.{......g.1.0..I}.....<.....T..}....t.!x&)..[.7....4.5..{....n.<...#I...:.....r.wW~..zr..9k.^.]KR.*W.J.n.")....%0...)...Fbb5`4'.X..E.../.t.&,t(...@9....\$..........].P..jdU......H;.$.'%}.l7........y..$.....Z..4.Cm.u#&.%N..1..+..8....y...U.(.T.....}.I..5r}...!..K....>f..3.C.G..X1.(<.Gb..b(....0Qv0F.......n.z.s.Y......\.,.h%1...QU..%.}B|CW......sO..\.=..&3...,.
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 563 x 211, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):14458
                  Entropy (8bit):7.944094738048628
                  Encrypted:false
                  SSDEEP:384:uuT43eqJy2jEeSZE0onrAFAOpn5ytFfNrfIkBQTYz8ynth2EB:EugQeS+nrAFZ8tJNrfRQM4ynH2EB
                  MD5:7CEB71F78A193F8C9F7FFDA5F81AEBD8
                  SHA1:EEC1597705EFF1A527C246B86A71878185BA6B1B
                  SHA-256:77911FF7AEAB8FCCAF36DE6E1183FFE1A6C27F77B5714EE780976CE5189E8FD0
                  SHA-512:1D1AB19B64E1E2ABCA61AE78B3B50310B0A6CF19D2ECFCB4499D8D0BF68600B4D95BC0945EF9FF9B1D016ED61EAC518DCCA1A426F460317C07AD51E2E047948C
                  Malicious:false
                  Preview:.PNG........IHDR...3............>....sRGB.........gAMA......a.....pHYs..........o.d..8.IDATx^.}.p\W.ZRKjI.}..[..M.l.N..[..O..B&....?5...@.5.5EQ...T...d*U..*.C6....8..}.Wy.e........k]s..z..^...T....s...}:.{..n..1.."@....P......."@....p @f.s@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....5 ...f.;.0..7141...L.....M.3.L....{M.T...I.C...@E{.w.Y...q.....c3..gf.3..'j...I...{M..@..4555==-...!..f.....d...>i.%&&&%.u....f..[......O`.......G..E6I.< ..3.k...',....Y...<..........u...{9.......S^^.q.<..^....2.bb.E`r...ey........ ..3........Dg@L..a'.x&''.O.Y..!e.c%$..(P__.d.....Sj..S...BLu.[g..mK.SwVe.."@.T.@P.y.........=....40..L...$d..J....cccw...^.RBKKK...heJiS3.0I.X<..}..*O..........QR..q.5GTA..ht.(^.Hno..n.......wvv:..K?.\.JQ/i..h0)G..1Y....K.>FT...8..d&..,+-.T.b.........f.."3.V 6.:...E 1...?.Q.6....A1Smm..K...V}...:.uA'.$.v.cy..<.`.Z322.r.LI.....>......&........"..."......@.Ccccee.[..z{..fL5..{...
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 742 x 104, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):13030
                  Entropy (8bit):7.948664903731204
                  Encrypted:false
                  SSDEEP:384:/06ULmwT2RqfILhmLy4tNpYGL0mvBQhTMHX4PCIVYm:s6USI2RqfGhmDrpYM0ofHX4aIVYm
                  MD5:17E9FF9F735102231846936F0E2BAF1A
                  SHA1:9EC1AE8A3AD55C48C02427D842D6E38DA85B5145
                  SHA-256:DD1CA8DA90893E0B63ABFDD9E60CF2BF844B311964E9D9DDB855C21FCA156EBB
                  SHA-512:71E690D6C87B09659296E6E6DDC8E3F91035DD80C5CE875FA557763E8138900C27FB492885291CEE203D65BCEE8C20C9C39E0590A5FD32B8A00BEB3E3F6D6E8F
                  Malicious:false
                  Preview:.PNG........IHDR.......h.....2......sRGB.........gAMA......a.....pHYs..........o.d..2{IDATx^.wp\.....sN$...$.).Q.")R2ei,kl.%....r..vm.x<...\...u.U.g.ry=..uX.cK.dI..I1G..$.".Fg.q...N.nt...3.w.w..~.v.O.....K.....A@.....A ..H.n.D;A@.....A@......e.y ..... ...1..P..xH.. ..... ..e.9 ..... ...1..P..xH.. ..... ..e.9 ..... ...1.@.$9..S....A@..4....^C..F..VR\\TT.........aHII1......VS..g........... .*....z..|Ek.......<R../55+33;;;+..Y..WC..#...P..... ...s#0::......522...,.v..D......_.....9.2N.L.'..F$.....e..!..... ...N...`1....G.....'&,f..f.X....!.lp......I_........J..z.R,YbYd&.... ......~"b\...b.Z.SS.....c....&..Yl-............... ..[...BY......... ... 1..Z..6NN............._.zw....MKK.Z..vMMnnn.4.v....,q..e... .D%....Q......._..p*M......22..e...k.}.....qU....S.a...~....P..}v.. ...1..2...F.GCC#...].=..C..n#...K+..MOO..........."....d^2=.{....U.p.h%.%n...D.....XB..b..'''....?h.b.B\v..^Q^.UC............Q...I.....U.VD...P..{.2"A@...b..V...........jF.x.
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 165 x 131, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):3879
                  Entropy (8bit):7.9281351307465044
                  Encrypted:false
                  SSDEEP:96:k1hccap27HGVhY2Kn+A3RS+HG3dXrjmg26vh:k1hccewIhYxRmR5
                  MD5:C451B2A146BDD7EF33AB3EA27268796D
                  SHA1:C040BA2F31342CBCBF597C96D4D6EDB83D473B77
                  SHA-256:4C264B2A6E88712234DAA8E3A8D630CBF4EEB338554CB0B794D8031F8943EE65
                  SHA-512:55915A304B261BC6F38F5CFE0389D5195F85FE2C1DA325019C3AA391E8B1773091E078A35BD57F8CEE0BA035956382AE33790EF462053FCE711EEA9665B7F917
                  Malicious:false
                  Preview:.PNG........IHDR.............c.L.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].p.U..g..Bp!...\.!.`pA.+....H.U..."Z..*U.. ..P.D.-.$..,,..$.g.......CB.l......I.g.pc..Lf..~.=.~]S.....w.9..w..'...!L..A ..^.t...v..s4&&&%%..6..`..:.G.D@.7.qS...K....[..,...o...p..2.%..B.Y....|;..gy+.[..,...o...p..2.%..B.Y....|;..gy+.[..,...og...}.W..z\?...y..;_t....=..e\.....6.M|[...B._....[_.\^Pf.....f.....\l..../6....<S.4./..m.......l....B'.n...O...yc...........X...P...k....t..9tf.g>....e..Sy'.L+**.]{..a...,7...p..+......K..y.9p...I{..i58....v..5.`Op.....{.......8.._.S.........p..).........;.....y...2...b.[>gP....C..G.H...........Osp...)..9x!...W.,..^....$r.p.sOJ.l..=.x.9s&:..........h.`..W"V..|.l{..72.....zv@.#.<.........../....F|...c...4.W....:uj@1...~.X............^si....Z..I~.Q.<.....NAOq...+i`.)...$L..gV.6#.....F$..hD.g.L-\..H._.u..]4......h...T.BK\\.Z222....7))..h...1??...~.-i=...X...~h....y[.............p.....x....c...{....Uh.7n.....
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 651 x 254, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):19235
                  Entropy (8bit):7.944867159042578
                  Encrypted:false
                  SSDEEP:384:h4iuxL3Yck5lpMcTyHOypEod/G38lJxqSp5BCU:h4/xjYc2lmcOuuEoJM8fse5BCU
                  MD5:AE32E846559D576FD263BD69FEDBEC28
                  SHA1:D481DF71C858BAECFE33418002D368F2DCF68D4A
                  SHA-256:6E21222B0EADAB8D3CFB0C7D14941D196165D6709271AF317D099F12403CD352
                  SHA-512:9AA4A6DD01D3B745D674721765F2BFCCAB584CA0603F222EDBE9A88190A2A57438041E7A3706CC0656A6ABB79AA18118319F210EFFE3DD917E7B94A6294BD346
                  Malicious:false
                  Preview:.PNG........IHDR.....................sRGB.........gAMA......a.....pHYs..........o.d..J.IDATx^...X.W....D..A......bW.A..[..5.F..D...7.ob71.....b.."...("...(...{/...e......}.....;...S.X...H...@d...... &.....b..... F.....b..... F.....b..... F.....b..... F.....b..... F.....b..... F.....b..O.KVfVfjFzJzVF.}i{.R..l..q..`I....e.'./.'.G.z.*!&>)61.UjVzf..4>Q~...U..=......s.\..WE...2...t..`F....M....'..?.......>BO(m.V.P....Gy.../........B.6.......=|z7.Z.|hQ..u..j............&..Z.bo?.u...S7.G>......]I..7.i...3....<.y.l]....SI>...L.2..<.....[.'=M.Tsprp...T....cE'*..P........eefQ.NKN.x....:-#5#....q/..xq.YzJ:.T.*u.j..S.C=...|.....2..(YF........|...*.7t...{.jz....W..Y..{...nlfj...L.6.[.hS.=.....(!C.......?5..+...[..a.:U.K..C.......w......+..r@.z.7..j..qB..B.....X}..=.fk...>^5[....n.z....wn....Z4.._iWG.^..z6./]t......dhM.9s...Gbo?...U.V..tj.......*&)Io.{q.G...A...l...i7...&....d.E]....#.W.x,.T...&Mz4+].4.$n..F..x...<.ppr.............y.,i./..
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 220 x 170, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):7374
                  Entropy (8bit):7.955141875077912
                  Encrypted:false
                  SSDEEP:192:IfGsPejaVZWzIZKpnFFt0HK5+2Y/SLopWR:IusPe278IZKpnzt0q5+qVR
                  MD5:70DAF02EC717AB54452FA4C707BCAC74
                  SHA1:30F46FAC5E96470848C5A948162CC12455A05154
                  SHA-256:58469BA93EA36498FF9864EB54713A001C52106DE97804506D82EE24B816712B
                  SHA-512:E599FDC22A32CFEDBB23EECEAE0B278EAB9A90959FE6ACB40E2B201E45A7C19261AAF529E7A0D9CAF2A9A4C64C7831343F3BC20810513990AD5D38A32741564F
                  Malicious:false
                  Preview:.PNG........IHDR.............IC......sRGB.........gAMA......a.....pHYs..........o.d...cIDATx^..S[Y..I...B..`...N....t.q..j...+LU.....O..sF.!.I...w@..H.Q.w. ...s..{B.....2......i..q..z{.}^..............J.fQ.....r.\WWw.T....amt.t;...6\N.........z.n...].u.z..Q...?^........;;;;:NO.}.c....<-...........({.^....t.k...F..[m..:........R2...%.y.l^OOONN8)....\y....}...}}.}.Hy6.^.a.....\...!S....K..|>......s.........l..P...LFWW.l..RK..b.h.h .3.F..|.|..~..........e.aa.........0H...<.Y.a`..xA!...7.X....xd=........h?o5........Ay....?6...........*..tb.9.*j...S`](.,P...9.2j..?...z3wD.[......L3.Ng2G|.......&..0ZK1u8.H.2...Z../..P(....BA..aL|..a.Y:.....J...5^x..'.\..&S...L..U..;....<{..."..@x ....J.N...;....WIht.<..B......!HM...&z&..6u..hF..G.D..B..........A.....n...GG...,.,.Q....X,`"....r.........3d.{o.(/...3.H...x:sX....h.8... ....r <..DB. ...y.N...o....5.......L&w....v....w..D......!.a4...."8.U.|.0m.(..zR>..=.+.L.....e....Yd2.-Z.7..D"..pX.I.....e5qYa._&..3..J..++
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):1604
                  Entropy (8bit):7.814570704154439
                  Encrypted:false
                  SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                  MD5:3F1535054D4F9626F0EB10CEE47F076E
                  SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                  SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                  SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                  Malicious:false
                  Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 167 x 131, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):5386
                  Entropy (8bit):7.943706538857394
                  Encrypted:false
                  SSDEEP:96:x4F84/zVJWedudPZZRdbvczHe2ftFJ0y8Ea5b2AELJj:x4FTnodRZ7c7LrabEaMAGp
                  MD5:DB48555480A383CD1D4DD00E2BCFCF29
                  SHA1:8060B6FE12175289F0A71F45B894030A0D9F1AB5
                  SHA-256:807723D8F90A5BD41269A7A62817547026A117D666D5BEF454EB699C97CA3FA2
                  SHA-512:2614C04686299CEE8D56577A1E836A26076D42E041C627177FDB295629F6A80190910947FA794A094C55A45C3D70725EEF29097118E523A38B50C9263C771A41
                  Malicious:false
                  Preview:.PNG........IHDR.............gI......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..xTU..M..B...P........)vQpQ.ED.""......,."....*bC..VT.. M!...@z....1...Wf.w..o29...=.v.TUU..^..@....S..<..;h...5.9r....x..7N{...=........'...N...u...9..5+YW.;..N\..u...9..5.....O....,.K..'.../.....1..T....>.f..9.xo...u.xo...u.xo...u.xo...u.xo...u.xo...u.xo...u.xo........'L...g.UVVz.[.n)...Yqq...Y.f.)//_.l.W_}.,........S^Z^Y..++.*..pF.....?...I.&...O,.k.d...~..w;Q........7}1y......e_............=y._U....{..}.w.O..~.z.{........W\q.."........^.h........}p.+.>m...d...4...`a~Z^....me......:N]..1...g..y.f.......l..g.).......e[........Z..RB.KrJ.....#...{..eff..v.[[<.n..?{.....SN9%...V.yE...s2..........e@Wz..I...B.r..<.-.=/t{.v.|..J....,.@.A.v...s`/.....6f....L?.z[T7..)S0.;c....\s..z-C.....v..}Y..{..j..xF.....'.#_..C....k|3..8...N...5......f....3......f)-.p..%.D.v.v.].f.......33<<......[bbbt.]w...:.r.....z....q..=....m.uhD..,..zXg
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 230 x 68, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):4181
                  Entropy (8bit):7.950380155401321
                  Encrypted:false
                  SSDEEP:96:L6ousL3eslFAmjb89xK6YiSTwtw5dTA1W9lQ:GoFiUFAMbsxJYieZ5dGklQ
                  MD5:BC6C08F8C2C6D1EEE95ABFC40C3C3669
                  SHA1:44DE7375375880ACC24938D7E92A837E85C35321
                  SHA-256:6E54B502C46E1AFA57E28B8ACCCE24F102399F31407827A91E4CD7A42FCBC746
                  SHA-512:2AF4A9B87FA4F362926CD77F272CECBE3ED4F0E110FB8F30F661DF7C61B77B9FD8E7716EEF9177B1038B68C792CA4F844F729DAA48B2E38B9945EC9CB44BB720
                  Malicious:false
                  Preview:.PNG........IHDR.......D.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.yp.....E-.......-v...VY.a.d....R.euF.).KH@.*B..u@YdQ....!&.tjg.!.,a'.L..@H...{'\~yy.....w2z...s.=..;..s.......]..j..b5d.j.X...2D......r.\.#..f...Bl.....5dC....r...............:m.....s..j.f..jK....y.^....'8.....<......g.....=.%..2.p..}<.....G.....Ix.m.4dm..B.......0?..+_.*..c..n.......?....wa..l...p....E.Ly.}...*...C.D.vy).....@.>\...3;.`].q..m../.d.B.../......~.p.U..'...sP\....YH.7.../....R!...O...'.....s....<|.f)....i.{.I..l.a.n...?~.{...h...s.e..-..Q..R..@<;.y.G.+n.....Y.Y'.V.}.o._..?...,.>}..\w....`+.}.{.p"d.RO=&.v..H].....k...X.c..z.{........}.n....s:c...i7N...|....*\..O.*....)w..[>..E..}y....q..u.!.z.D.[`Uf.Y...>z\..x.B.h" \.}...`...|._.....G...hY.../..6>..Z...8^..k.E.5d#..a."....P.CR....OL..U...qY.{.C.<~I=V..x.J..*k.Y....z.;?..^...3.4|i...[DL,..z].._..a.....(s./...W~..q*.\#@[R.N...@.."..=....\q...<.......p...+J..\#...(.,....OQ...$L...G...
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):14553
                  Entropy (8bit):7.951135681293377
                  Encrypted:false
                  SSDEEP:384:EF7aDrPYJ1n3kaEf61xD+KvdokCixTQm7QA96dNT:EF7a/PMeaEf61lT6kCiFQCQq6zT
                  MD5:3E9F7D399DF9CAD3669B7A5445EF7074
                  SHA1:2FBC965DC03EF9203581F595E0D7AB1734726ED7
                  SHA-256:76C80E31F37248C3C787F7972A7B22038390F9D81E72E650071A6F36D36AF27A
                  SHA-512:326F8F9CBF829BF80AAA96062A57255A36EE04DE310634327AA075D14129CFA8E36E48AB2A00B10F9BDC1D94F1AC7A9E41D0D063361920A0332EC124BDF4C3EE
                  Malicious:false
                  Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..8nIDATx^..xT...!=!$..%t..H.tP:.HQP@E,...QQ.^.....* E.(" ]:.K..R......p..n.9{...sv.}.....7.....o..z...,|.......M +.....w........O...>.SJ.O...<...{. .x..g..I..H.......V .. .}.PO..H+$@.$@=.=@.$@.......VH..H.z.{..H...!@=.#...............C.z..GZ!.. ..)... .....T...B.$@..S..$@.$....>.i..H......H..H@...S}8......POy......>....p... ...... .. .}.PO..H+$@.$@=.=@.$@.......VH..H..zz?.......$@.$`i......c;.n..i...0..........<......S....w..c.....y..F4.p..3~..|.]....s.6[..H...N@.=M..|`...3./...I.....'..|..K...r|...nX...'.. .G...ib|...MY8|......9x..Ur'.. ._ .....5..H..d..L.$@..I..o.;kM.$.?........K/.wn......Y....E..%K*.=.......Y.3.!k....[V..WG/?i..H..." T.,z...6h.[..-%9....WMY...z.vH..H@/.BOe....g-P.@.......lH.O...SJ}5.|....?.^..5^}..$.. .....S.@...*<.gJT/......_.R.C.....rj..Cg'\K........K....~Y....l@..)..l.k.s..Yr.....Z]jG..q.+..G...;lNJj.}..T1&&.. .....?...|....W<{...g.&'Ca
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 454 x 278, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):8184
                  Entropy (8bit):7.807848176906598
                  Encrypted:false
                  SSDEEP:192:ExqMHYnnEnntvA4Mesu3SXHycmfIEFQp1r/:E0MGEn29esuiXHt0FQp1
                  MD5:5B386BF9A20766956A84F67F913F23D7
                  SHA1:6E72E51F5B4FA64E52D2B80B41409B3DB927A3C7
                  SHA-256:DDF6A1D5B29BD69C65A148B1247FDE8389CC56865E4398E4CBDCBD68A6555043
                  SHA-512:99B4109439D9A688D7747C6847E0FF7399CDA01A89C3181789F913E757A82EE4727F95E506F4B01930EFC7C6E229B94BB89E385B56BC009AB5CFE332585660C5
                  Malicious:false
                  Preview:.PNG........IHDR.............s>.Q....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^...]...!.......!.YTP.A......-..r..$.E.J.I;....T.M.UE[..Q..x....wKB=.m...4.%..|:...9...\{..o.3..g.o~..~s...k...X.r....... ..@Gggg.?.... P_.]]]..*Iu....C...h..$...:... ..... .\.......@R..... ..$.k....@0.Hj0.8... ..r.@....F.I...G.....T...@.... ..P........5...@ ..$5.J.A...@R.. ....#...C.#.@..H*... ..`...`(q...@.I..... ......%. ... .\.......@R..... ..$.k....@0.Hj0.8... ..r.@....F.I...G.....T...@.... ..P........5...@ ..$5.J.A...@R.. ....#...C.#.@..H*... ..`...`(q...@.I..... ......%. ... .\.......@R..... ..$.k....@0.Hj0.8... ..r.@....F.I...G.....T...@.... ..P........5...@ ..$5.J.A..............W_...1c.l..6..`...@ ..I.S..I.I'...5.\..;....'1. ...........c..k.u.Qs..}..g#b.j.@..Y..QR...n.!...-......h..Z.......Xw.U.~q... ..@.%.'............. P..E.T.b.:j.(F..p.... .C.}3.'.|..z..w.a.....\{.:.4[.lY..~...x..'/....g....J..9.K_...'...:..;)......SO=u..E... Py.qf..}O7.o....u?:....6~~..9...?7.
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 213 x 85, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):1924
                  Entropy (8bit):7.836744258175623
                  Encrypted:false
                  SSDEEP:24:rloPN36BoJ9JK5lncTww67QKf5wX5YgM5s6cahePwnR6+eA9zQU13ALcVz7wTQ8U:rYN31JH6lcbjMW5Ytmyqwp9H7wY
                  MD5:B1FDE66F75507567B5F0C6C07B01A3A1
                  SHA1:80B8E6A923E853232F66C874367E90B5C9CAD7AE
                  SHA-256:B9C82D2F31BBE409D159EE3C9129CBAAC7C6F6C81637AB9B6DAB3C11AA74B7F1
                  SHA-512:FC8C6038D3C2F5765D7524E969574ACD10AF6FCCFD45FE7C6DD4A8C2669B13EE3FB1A8833E94A046AB7037018170B5B87B1A2742E0E10557C413AD634BDF343E
                  Malicious:false
                  Preview:.PNG........IHDR.......U.....Q.6.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].O.W....G.lT^M*..J.....".4*....j..H..R^.".m..5....&..j..B..`.`..>...X......]z.[&.>..ef..gB.d...s~.=...3....m..(E...~.[....... .. .E3..7.4.......}..H._.D.,j.)..q\.....7..#.ag.o|.?.......;C|.#.../v.H.......o~.{G......H.|..;..v...G.._...p1d2..&......QS4<..i.".X.....1(..GR.R#.}.!.E<..:LLM......s..:"......Fa...b.....\.T..~OD... ..:j.~..p=Y...Y......?.Y.A...0!6_p.dKctjvZ....\.........V..1)..:.....;7:...(.[...7.....u..'ra.....S.]..........7.#,[..<.l.....[.........90d[.2a.R.........E.CJ..C..S..*._...$^...Q..:>hx.k7.`jN:.W.X..N..p..K..."...q....a.Uy.......[d.:vmkk./cW.>.K..C..?\d...'.@s_.?&.....V .?F..;k.....%+....+.3bk......f....T....S.(2.=...?gQ...K.._,.#....?.1W.......m2.....Z...-..:..?.#J......KS.P|&[<..........Dd.....\.....W$z].k..-..8...>..Q`Yz.}w&..._......?.)_[T...:wy...O8.Om......l.....\....]..."f...........q.o.V>~s...-....N{.n....w..O|.D...
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):11886
                  Entropy (8bit):7.946442244439929
                  Encrypted:false
                  SSDEEP:192:sqNuEpzsnKxkfLaZCdMh+cLApmRausyZwYMAisQKShDBlhr34ckckcZ:JNu6DMLaZsMhtLAIa0wYMAvI5V4DDQ
                  MD5:875CFB3B5C3619253223731E8C9879E5
                  SHA1:6372F4F5BEB6EEAE3EDBE5B62EE73039B40AD01E
                  SHA-256:CC69BAE5D2C8F56B28BA4E3C6A11F57C4E8CCCE69943ACFBE7E63B4FC90EE5F2
                  SHA-512:47F45A3275B8454F8000F4567153DD7D4AF3012005D8E34CB18AED6AD69083BEC753E607F275FBF3EFCCB7BA00310A04ADFBD5FA5B73E6BBE47CE73901C35CA8
                  Malicious:false
                  Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..x.U..I...JB..;H..."..(U.EE\\..._v]W..b...Az..{G:J..B.$...H.IHB.o2xE..3gf..w..2....w..s|.....C.$@.$.....t.!........8......RR....<...6..P||....$@.$@...PO..$@.$ ...T.GZ!.. ..)c..H........H+$@.$@=e.........S1.i..H....... ...C.z*.#........1@.$@.b.PO.p... ....2.H..H@......B.$@..S.......!@=..VH..H.z.. .. .1...b8......PO..$@.$ ...T.GZ!.. ..)c..H........H+$@.$@=e.........S1.i..H....... ...C.'++kH.G.=Z!.U...73o^.IH..O|jrj.D.......I.M.........Kph.............R.x.......RU8_".......j.......B"O.z.|.9.."..L....Y.d.Rej.-Y.dhX....:.xH.z.!(>&..4.....O.<..T\.%a..e...*..UnR....+j...2.."..M.O>.z......T...].j....m...S.`..&..)....f..2..............+..SP..?.a...=.....3......K.zj.5.fP.......2:..?.....%....d.qxC..W.~.._....!.W..6....iJ)*.(..wg.}.]sw\.r]...r"...e_-....5_9.YN'...PO-.d.:.%..wZQ...H...JMJ.6c....|g*..,.3.....T...o..Nyc.W.....A.3.._...U%...PG.z.....&.%.v....AIm.....~.
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 171 x 50, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):2270
                  Entropy (8bit):7.845368393313232
                  Encrypted:false
                  SSDEEP:48:3Cxnazs22lovji2Ez2iqBU2C+hJWizJNzIu1coqAYClBeMsk1:3dm2Ez2iUhBzhyjAxqQ
                  MD5:6EFE6733E10E011FFDD6711B5F37C9E2
                  SHA1:C72549E824EAD899944A38C46FBC28BDCDAAD611
                  SHA-256:92B5056DAA03DF3EA85AF49FFE4F9CFE8699BDF3539576A99F02418FF49AD9CB
                  SHA-512:EC14B553A5780CD9B33D438CE13A6932DE43E346D8D2DEC8D093A6A2048675423948F8E2C604A73460980C3C68D9276B65D76C2A6BC7B24FDF10CA92FDA2583E
                  Malicious:false
                  Preview:.PNG........IHDR.......2............sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^.\kL.W...*.F......@.*.(H4."iI}..B!.iD...I-....y.I.h.....<..1.....C..(XSy.l....,-,.......3..3...;.{...{.{g.....Q..x.T/q...F.V...B..'..?{:.:...`.........+.0s.e...w....{.`. ....5...d..9S]../............$Y.>.I....i..8....;,r8r!Ee'"..!*.&E.....n...=.@..Sp.GF..c*....1QH3....?,.T.el......t?..([Q`.0....k.G.....X..C...k|p...I.q;.d..N....c.u.a.5.%.k.fS\)..H..T.~l*k.[.n...x2.1...........%...yK..a..l.[.?#..fD%.FMT. =r.jt^..fT...c.&..Lr..............\..V.ll....Br^6..U27...O..N*..K.gm.K..g.;..l..Fe...w?..Q.E......0.........7...(.e..t...x.c6..Q..n.92:%....l..4.h]Z.....w..|..!.p.~..B.y..&.......gl...\.wI......G.6.K.$...%.-.h]\8.LT.....}{a...^.i......4.0.ji...........n.pk ......7t....U9..b...I.....#...<q..(|=F.......0@^......+..........X. .>p....S..t.].f.x.0....7d..n..'..'... .M.qqn...G.t8'.=..V.PK....K...X.z.#..I.....@...Y....BH..I.....,..K....=`&Z.41$..a'o.:....i{o
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):16003
                  Entropy (8bit):7.959532793770661
                  Encrypted:false
                  SSDEEP:384:1l+zN+iNurNE/tBdEC/vkape2XHYdhOm+Bl6C4:L+zN+iNurGNEC3fpe2X8Pa+
                  MD5:3A5CD52E925A7C4A345047D8F06C3C41
                  SHA1:9C02828D83206BBD3EB58930C8C65A6CA5DBCF40
                  SHA-256:477277E8CAAAE1D3B3EAB5B3660239AEEABC433743A191727B1A71E529872AC7
                  SHA-512:8D8B6AC645ECC7C8BD374E6190819006C71AC0B5993419C42463009116214E5EC4B4235D94B4AE4CDA132E7DDA9807ADC51525824AC5F12696517FFC8890891E
                  Malicious:false
                  Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..>.IDATx^..|.....+)..H..C.K... ....x).rU..T..*E...;....*.@Z.....@...9q.g7[fgggg.............1//.."@....0..#.t..f.C..."@.....@OIR.#P...0..$...y.Pl"@....( @zJ]...." ...Si8R*D.....S..D....i...J.R!.D....R. .D..HC..T..... .D...... .D@.....p.T... ........ ... =..#.B.... =.>@........4.)."@....).."@...4.HO..H..."@.HO...."@..!@z*.GJ...."@zJ}...." ...Si8R*D.....S..D....i...J.R!.D....R. .D..HC..T..... .D...... .D@.....y.?.`.T... .f.P...$47........~E....!.D..X............].`....0..N.a...>[||...t.T.w *.. .....)'...=X?c.......+OE....<-84...=.....w.8...7.Ro&.D@!...GS.....s.......:...Gg..8..T...u...~..............<...S...../Y.......W........#. .vB...u.. .+.999YYY......wf..._.{6....=..]>Y?..;=02eb......2...;.%..\...P..R5....XMO.....6....W]...3g.5;.n{t.......F7S....r...[n.......AAX..j[.j.;.neef).2.....{ ..r..{7.-........i..S........<..pm.u.V....M.333....K..Mr.s..Ek..=t_.#.P...
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 454 x 278, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):13241
                  Entropy (8bit):7.931391290415517
                  Encrypted:false
                  SSDEEP:384:a99pmP85w/MAMszG+iHGgrw8Ld+9aEsjQR:mgP85AMs6+UtrX+9mjQR
                  MD5:01367FEEE0A83E8765E971E0D3740900
                  SHA1:CAE1FD22CE2539FA2ACC0242C615CB7EA3F866E1
                  SHA-256:18B8E53505DA3C412890F4D74AE2A6B26C4B0827E15E830F92A024D292AF20ED
                  SHA-512:8CFBDC014C42AE6417038B80424D2E9FBDDD7DFDDF579E349C3C17C9B52AF33A72463154D29539457C4ADAB2DB00CC28A67902FA8D9209E4AF00EDD46D52E5CA
                  Malicious:false
                  Preview:.PNG........IHDR.............s>.Q....sRGB.........gAMA......a.....pHYs..........o.d..3NIDATx^...U...Y.]:.T...G.5..lX...B..Xb4F,I0X.....F...("vET4H......*EX........wo9..9.|...rw..;...;o......z.....B.......v.mn..>......E."....U...4s! ..F...u?.@...! .~F@... ....p..Q.kP.#! ...(U{@...!....T.TGB@...Q......B.5.D..A.......~.*.U{.].....S.e...K.A.......7^?....D...h;...!.Eu...o.^..B@..# J...B@....(.5(....B@..= ....p..Q.kP.#! ...(U{@...!....T.TGB@...Q......B.5.D..A........T..! ...k..R].R...! .D...B@..........:..B@..R........! Ju.Ju$......j...! .\C@.....H...! J....B@....(.5(....B@..= ....p..Q.kP.#! ...(U{@...!....T.TGB@...Q......B.5.D..A........T..! ...k.D.RK.K.m.V.......(.^^^ZV^Z.7.a..........T..xsqYi....L......z....}....?..yyy.M\.b..U3W.0{...~.`}..M%.J*.w.mdv.&*..@....R..o/.^..5...x.g.>..ag....GM|t....\<s..y+6.X.? ,.R...-.W.m\..o..0g..i...h..W.Z.i...2.....o.&..@...-.B|.K..^.....u.}.M..6...,(...e.V.X........nkE....5.8....-.!.TtRxs....Q..2}.-..`....mX6i.w...
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 164 x 89, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):4190
                  Entropy (8bit):7.94161730428269
                  Encrypted:false
                  SSDEEP:96:GHfueo3dRLZKOSYDzGsEgfB9nqS0WKt/z2jOrrz7yrT7N:8A6AzZfBtqS0WKNC2vyx
                  MD5:8B3AEC1986A522951942BA72B85CCAA0
                  SHA1:7E0DC78FC65EE4C804A4B0C72AA53E2DFDF26C14
                  SHA-256:8B02CEC726DECF033B67689F369FDE1002ACFD5F8C32E0F248AC575997204F2F
                  SHA-512:8EE1A1F6F0023EB4F60760C2E23EAFD56E6D298CAB49D819CF1D62C0CCF608D4211D3767856255F7CF8FF45AD835FE5475EB92C608989C522CD48D00A050B189
                  Malicious:false
                  Preview:.PNG........IHDR.......Y.....?.......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.]ip...fu.VBBZ..V'.>........CR......?r...pU\....v*...T~.U)0..('`....."..,a..Y..$t!...D...Mkvf4.VhW;S........{...zZw...i......fj..$..7......[Z*.[.[..Zk...?.t:M..,..`.^...X,..sUK[..Rg.=$..!.3<....74...iY..i...k.,.fA..Z.n...`G.%..H.l7..7J...u.R..6....E..!....N@.....M....Q`...U2.w.WP[!fX......c ./@7Mz....^...k.)....v.Q`..z..1A..P.{...||...vY.....>.`...K...m.?CX./v.8.....]..;...6..kw......N....z.Q...f..q..xk.5....;.?.Z.c...`......4....?.....VV.u~..<_......sU4e.....g.c.G....O/..r...`.G)....#d5.O..w..{....twL1l.)#&hF..K...M[@.Dl..V2..j.3..s....3M.....v..!....V..c..B...|..e.1....7.WA0.[.\.u.).$7f.+.......8..e2K/.%.Ii..`w6w.E..[?_.?.?..I.k2.s....]..f....HM.?w..d.9..Rr....Y.c.}.s.zk..rc...a..I(9~........m...Z............I........7.K:.:Bf.......m..1.......&..,...?a...c.@.@.g%...s.#...;..c6...g.lZ....}.WX.3.8.....W....N.w...L...}....?.".......;cI.............pS
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 162 x 89, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):4081
                  Entropy (8bit):7.943373267196131
                  Encrypted:false
                  SSDEEP:96:KQJAeRumk2zXWySlEmWL9zi6wknB4qLx+ppNhQrW8Oy:Ke9S482LE6wQB6pNeqi
                  MD5:29B87BEEC5D3899824AA390530CD47FB
                  SHA1:55108E8E5692E4444F72EE5CEB91915E7A2AEFC8
                  SHA-256:F00E4F1C9B1D9ABEAAEC8E5CAB02A07FD74F00ACE15E36C6F6469DE5AB07A9FC
                  SHA-512:1A5AD45BBA8C29C32CDD3C4D1E460C30ECA305D851FAAC73DF165306BC338337525680B9906D367A0CD3852B9D2DAAA8FD0603276BA969495B4E29C7EC8A3530
                  Malicious:false
                  Preview:.PNG........IHDR.......Y.....2.h.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].LTW.f..O.a.......*.....k...M.Z.n.q.h....ht.f.M.n.6..t.h.k.h5.6][[....X..p...?..g.`..7.o..of....^.ys..{.{...s.UMMM.(.l.@.l..R?.......(0+0.......5...*.F..#.].........1.....B[>[..a..L.....x...0.5t.v..S.h!.........Y....B..&.......f#.w5u...............0...x.sC....a.4j5V..Z..n....K..>...3t..wm..3hB.BD.P..FkcJ6.....O........7...S.........6..P.]mf.+o....w..<.......Y..Z.whd.....*zf+.....#."_?....`.._... qf+.?.?"k...zgME..j..!.k.U*.....&z..N....ma.......R.{.r0.S..KP..fU....g~..=..Q.n.*.* 8T=/'9,*.KDW...GN;0(P3_....1......'.;..;|.L.a.&<*\.d......o...Y... {E.F..}.e.\..=W..#..W....c./~..b.EWXI.#.''&.........:....X...b.....+2...5..6+)we~ja:lZ.d.Ey....l.2.5r........!.!._|.A.....j2.5.o.....WOM....V......GC9..'.... ....C..,._...cS....b.1.....t.........._........a.3..K..>V.f]...~....K...-........#.o.Y.P........a.7..,#..'s...T.....b..]..3..dPPP..Y.i...c.b
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 452 x 277, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):22634
                  Entropy (8bit):7.974332204835705
                  Encrypted:false
                  SSDEEP:384:5ojjyi45m1/9gyhgFsH1ud103Pl39o0qjfsH37mNHy7QPaNbZy0:+r45m1/BWKy10tN22rmNHycobE0
                  MD5:548D234C9AB4021CA5FAB7BF22502465
                  SHA1:2F7495D250DC86EA99473CC342D164B859926021
                  SHA-256:7D549C3418CD90F42571D00936B23D242837CE2A8B19FC4C719E182ECB2624C6
                  SHA-512:261523F5EAE6FCE2829B53AAC5938B1A0021C119E00CE82EFFDBD690FE71064E0F3B313ED1AB2F67A16C488AD5B1A91F5AF98029D88A7896F271C108410D42C5
                  Malicious:false
                  Preview:.PNG........IHDR.............._......sRGB.........gAMA......a.....pHYs..........o.d..W.IDATx^..i.=YY6z@..DP.i.IAA........l.Dd0"p0.ON.~....s>.?zbH8..%$`....b7..=....25*.".L. ..u_..f...j.........Uk..^UW]...u..}.{.]t.-.(...J......e...t.....@i.k......_.(.....@...Z.6J......2.O.-P....._.u.=T..4p...e..q..5^f~....@i`....?.....@i..k.........?...u..O|bN.~?MbT%...@.LO.Or.`....$..y.{..o....~..(.;......SNi...6....w....~.{..^w......~.S...g?../|.O........7_...Oj....|......40......9....?..<.3nw...x...g...7.....(<.d...(3.K...;....\..:...'.5.....&...>...t.;....8..SO;../...._.}.{..D.jt.......jc...s..........Z...0q...@......Z]S.(..o.....Og.u.l.i.-.9..)j..~...5.l}..........G......k....Z..c.....}.c.?.\....t+u...15p.....[|......2..;..;...........w...........v.7...I.-w...K/.J...[..N.....W..U#...._.j(...//z.|..kv....];j|../m....t.9.;-0.:.4p..@K.....~.9.$qu.E....!.9|.m.+`).|......x..vak-].../.....G'....4.>B6$.......-o.q..L;*.N+....>...=.!.Y..Q...?......7..,....}
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):17289
                  Entropy (8bit):7.962998633267186
                  Encrypted:false
                  SSDEEP:384:ruwwXKZuqnOnZprU3+OXBruY4UkcY+TpI/BSqCrEoMXMEr3KbzHIDqqAmk+xob:tGcxE4PBruV3Uy5SqCAoMXzrQHoqAk+m
                  MD5:708E8EB906BC105CCA0535AE669AA651
                  SHA1:38D82DEDFE97D3001188C2E18FE13BD741FD520F
                  SHA-256:1C3D07765294566E17270D0F3B9257A3DB7905D4E7EF746AEE80CD591CE0308F
                  SHA-512:1EFC74C28190DEE2D2732390B74049A1B120F05EFB8DC6925207C6990AD20450FFAB40249899A9DBB82E8F92A61F770E120A450CAAC7F8C5F0742586CCE0EDB6
                  Malicious:false
                  Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..C.IDATx^...Uc.._"oB.Hr.m(.0......r..[1.D....R..q)%FBDiB.."w*.k.Jz.Y..l....>...9{.......g..Y.z~..k?.z.^k..+V...! ....(.....\sM.tD@...!P...HW.S....u^.....@.r.^.....B@...U.H.J....... }....".....>....! ..A@.4..EE...! }*...B@....i<8.....B@.T2 .........xp..! .....d@...!......(*B@....S....B ...O..QT........! ..@<.H......! ..O%.B@...x..9...C'|..{.>Z../~^.s<<V4..ujo..v.Z7..EwT.....@.....?.......~{...K.........C........bB@.$.....C.{....Kf'S.....T.*&....@<.....'..D`...;~v.DT]...r!..>....ru...}.....#uG.T.....>..z ...3v....P.M.....5.@<...?....F.}..c.W[.._!P...O..>.M.d<..J....E .}ZZ.+.5v.p>..N.{B....>M.Nzfb...OB@.." }.D.y...IdK<..! }.:.....f.K..bX.T9...&T.&?.VB9.[B@..@@.4..1}.4.@H..-!..}..~M.<.z..I}.G....>..S...N..@yj..n..s.d._.....(..R"....Wf\.oO.^...\h.\.`)...ni.'.].vk.1-.k.^....#.,}.{.RM...~Z.S.. .@U!.&}......h...{K..@.........W.8.N.s.Y.0)..f+...%4.......5.@j.):k.+3...I..(
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 452 x 278, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):13737
                  Entropy (8bit):7.916899917415529
                  Encrypted:false
                  SSDEEP:384:jgxmx2Fa/+76A6M6Y7rSYRv47cwbkkapeIiRmDGd+gUwOSpQ:KgyoWrJWRkkRXmad+gE8Q
                  MD5:830632032C7DDBCCDE126F4BAE935540
                  SHA1:9FEF1DA9FF1D7762B779553B5F873BE54C8D01EF
                  SHA-256:2328D09EC845433DC31808FD6B12616F1D28B9B3BA7DD969ADEB6C32D8EB049A
                  SHA-512:5C17EF9A0063499F2C34FAB2C4D968D29E20F20868921FA914E5737995AA0C166F224995109FF7ACA57B5B0F8647715DC670C4AEE385F61B5F8E6E8422C49EA8
                  Malicious:false
                  Preview:.PNG........IHDR.............w.pl....sRGB.........gAMA......a.....pHYs..........o.d..5>IDATx^....E...,"o.....&....AY$....AE..".l....+G.>AP@D..e..".".A.Y.@...K..IXB !..!..c1.On...===3=.3=.>9O..u....w.z..-].t9]B@...!.......Z...B@...^G`.Q.&S..u$d....B.Y..P.w5[]......B.m.D...! ..@...Ls.Q"....."S....B ..D.9.(.B@.....b@...!..."..@..! ....T1 ........i. J....B@d....B@...4..%B...! 2U...! .r@@d....!......*......9 2..D...B@..L..B@..........D..! .D...! ..@...Ls.Q"....."S....B ..D.9.(.B@.....b@...!..."..@..! ....T1 ........i. J....B@d....B@...4..%B...! 2U...! .r@@d....!......*......9 2..D...B@......5jT.@.{..O.;k....>.._o.+......{V...&C..(?.m.....F....gd.....?.....3u..x^L.1n^...@../.....XE....L..!...t.....L..B.).=..sn..U........@.O..$..o..L.....g.(D...(....Lo8.....,....f;o..i.f.h.9........\./..[W.9.....+....,X..+.d.....Xc..7.p.m.Yg.u:YO.V..l.t.].Z.g.U...]...5.^..._.~.WL...o.3f..s.,Y.X.7.x5...K/-..._.......{........W.(Y....?...!....W;.....iwNMW.............@+Q.5.#.
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 185 x 76, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):2332
                  Entropy (8bit):7.8822150338370776
                  Encrypted:false
                  SSDEEP:48:jB5Gg4vMs30WIn5IVeRy1bY7DqbqQBAeNjukXlN4AXat:PGYuEWV/YH7e1uA0AXat
                  MD5:91CB7F1273AA003076401081B8A22237
                  SHA1:5157144069E7D2FDAE60B397BE5851E75BDF7707
                  SHA-256:80682DD6472E8D1136BC5E20F6DE87B595562414B19EAB8E965736FE992921B0
                  SHA-512:5A8E3C0ED0DB94BFE359C63793F12F3D7B3C37F3A13A5C96634BA1DC8C9E50FB1142FE4752FD9FBFA39A682F78C54AF868AD337EAA787801FE5F66D8F55A8196
                  Malicious:false
                  Preview:.PNG........IHDR.......L.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.\.LUe......Ji("....9....-.."..5L.Y.Y.....$350.."2.lK3Cg...T..DWZ.......i.?!<..~x..z.......w.sw......9....s...w..l6.:....p"dH...F..B<...qE,R$G\!..E..".).#...."..{f.PyI.d..l;....;.=.S...O.S[.\Y^P.aj]9*Y!. ..~..#...S.s...l..h.[m....%...P..@.kG......G..X.r|%..AO.}-..G>35..c....Ac.&[W.d..+...zG........=..l...VS.d..+...tGd..k-._.....oL.:}.p.~.W$C..|...I...n...~......,.i......e..=..?{......>r~.Lw.+2..\w.)w~...c....h..u..%...PE...f..'..m.ZE.1.\....U.`X......$...P%..UH{[K..o7~.k.49..W.t.~.^_..7.,....f."q....+....;...~;.c.......Xb.\?...........0h.lV..WX!.....ljm.1c..U...[..X.)......B=.0~..W...rO..j...ehI5U:..66V5sJ.....V...]Y>...1kQH..2.........d....S....I...+..].p.....m7...Z....s.D>.K/]..?.l....2..=..~.mq..".+.....,..8. v.o.).Z......>..Xv..i...TA....M.....>[X...Y.7lJ..e7..S.....02q.O&9.......:L....N.......W....d..FqE..T..N.....R....kXv[..j......g.K.\@`.M..B}8n
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):11332
                  Entropy (8bit):7.9324721568775285
                  Encrypted:false
                  SSDEEP:192:vpXZavBpl00n1Pt7JquG9GYHDK/5cxektxMQjcie9ZZkx30eXJIb8FKRN:vpZaDyc1P1Je9G62/5clpjre9nQkeXJY
                  MD5:31579CA3352DF8FA4E3E7F48C7CDF672
                  SHA1:AA682A3C781BF8EE43B5EDC9718E64CB79135F25
                  SHA-256:B0E7824BEE2C896279457D87E61E902431BEB528D830524CC4DFAE126E89FC24
                  SHA-512:782FF9492E3ECB11C72D316DDD94D1F3E94CD908FC9452A37DA6CA30ABCFE9AB2BCCED8583A569DA68626BCEC730408AF86997E295637BF64AFF5BC768F3E309
                  Malicious:false
                  Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..+.IDATx^.{...u./-...&....6..+z..Q."b*. &M.d-e.*.. ....J..Z-T.Z$....R..F...%*`bn..<.....W.E ..w....^...;g..[w.5w.9g...3......t8t.P.?$@.$@.5...=.8qb.... ...5...a=...#.y. ...@B.....am. .. .......$@.$`.....G.B.$@..S... ...C.zj.#[!.. ..).......!@=..........}..H.........VH..H.z.>@.$@.v.PO.pd+$@.$@=e. .. .;...v8... ...................f.o_o{....~t...n.S.N..?..._..L;J.H ..,....7.}...|....7...b...|.........ObVa1. .?.X.....~.....t2..V>.b.}..0.F....%`GO7.n#~..F....K.~...FX..H.^....k.Z/.2v.W..M.<.;$...v.t..,UO.-]............D.....o.J..Y........5.%.l....{.....'O..dC$....=uks..;{x.,.N.=.."..Q]..w>.E.H........AV=...f.&. ..ip}._0.~[pf.`..9..v.W.,..2.E.$P........+...OcC.H..=..|..[..g%(h.....W...?...UDh..T$..?....|.]..)?[Wo.h.'..2P.1..!.......$.NO.5..}...c.;...~.x,|Q....B..6.@>..y..}...m...D~z....L#.0`_.`.s?|....I.....a...=N....c.._.2.._..6 .]...5....{.^>.lM..;n...k..9J..S.G..{.
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 167 x 92, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):4181
                  Entropy (8bit):7.943341403425058
                  Encrypted:false
                  SSDEEP:96:b6JWqvCl45Da8kuGzhRwZvwIutfij19MQ8EpW14LBGJVCq:b6JTCl45DalsBws1R8914V5q
                  MD5:817D5A35EDB2B0E052194D4F49FDA19C
                  SHA1:FA6CB2016C5F43B76102B63D60359139227E07EA
                  SHA-256:0A87B8418B7F8E6E117BADDA11D7CDD38B8B7320C6BA3D3E9AF93EB9ACB2CE14
                  SHA-512:E0686BDBFC589401F0EAAE2B1598199EFA285F8392742B1C928B9274088804B23DCB584B6FEF68CE6D7E54DFF9C10338104F4C0F3F80A04471F0B2E8F9935CC0
                  Malicious:false
                  Preview:.PNG........IHDR.......\......!2a....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.]iPTW..iv..D.....%DQ#A$...d..h,.T~..+...TM\cj*.)k.fj~L~$...L&...,...:.FdU..f_......._.n.m.....q.s.9.=..w.9......$..b.*..%....@A]A..%..<......l.h.+../..OSe.....]...>..C........^cCy.0nz.4<......g..?~..>.1ws.B....07W65.74T....=..v.......D....6.....tR....}]}....4z..^....7..;.."......^.....|=.#.=.32..o.<.Tn*Q....g.zN...n*...!/.........!....F..]...6...m...CX..~...+..U...E.|.........7]=rE?i(..$`e.%.`.....w._.Y...l.1...@....t.P..=.}..*...N...N.|.xS.5&.....Pe......Z.Z^XJkx.....^.....?7..._....Wsz......}G..]...\.....,[.y....}.J....'.R?a...G5..l.i.?....MH..l.DC^._.c.m.....%{;z.&.*+x;...S.....zxyH..`.._]...el^........U.T..^..p..z[.6(2x..,#;o##..}Zv|Z..............V.....0}Z....]..m.....x..).k]&e.._.W!Vry..%...I..d..}w.....^..\............m[.^.3r.......-8......j....>...Q..T..{\V\ptH.?........1..w....FHl...x.....\.`.ei.w..)`...g..V{..Z.....8..........o.._..
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 221 x 77, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):2599
                  Entropy (8bit):7.903700862190034
                  Encrypted:false
                  SSDEEP:48:PmCwDJh8w9JewaF2zQNXXj8zq1KM43sxXxjYbTgJW1MFsrJ075CawGjGj:P1Ah8UewaFcgz82Kx8xXNYb3id/yj
                  MD5:E88131C9AAC52649FF044905ACAB9B76
                  SHA1:34AE73B9165CBED0DDF33AC20E4B3E7D622C19BF
                  SHA-256:30F22340F582F9A352A7ED3048D1088F178E83CCAACAC1CCFD86852C8F9C78E3
                  SHA-512:97AFE8F3A2A3138613934AC737C390A35F6757BFC3D381EA7C7CD148F739932380DCD46D0BA6F590C274F8BFB4D4286B3C0433AA69E090102A8A9ABDD7C97EB1
                  Malicious:false
                  Preview:.PNG........IHDR.......M.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.]kl.U....B|E..>...*..Q........b[.K........m.(..... ...!%1%*-B.C~(&`[.....-.....~.w3..Kw.3wvfzn.2{..s.....{w..\....!.3..:..!..../..zD.x...O.K... ^.1*...8.G...z...D.$...........>!..V..`v.CQQQ!..-L...../3.2......ZH.?s...Iu\N..,3.?.p..N......<....E.<.=z..Iu<ll.dX...g....+.{X.p.....:..t...a...cKK.|...Yszl.N.:......KPs.):).T.5...&B...*..5j``@...(_r.V.j..m...?x.sg...t\.dz.'^.=.\.h..<.y....:.I...w..ze.m.\.qPJu.....D.|..@......W..t.+.....X....e....\H+.Ns%^r.VS.N.3:...&...._..#^....d! ..F.....xc..M...q...17.z...z&C...K9(.Ifm.35.v.>.'X,...p.:=.H...J.K.,...:~...7.t.....R..R..9..?....l../.(...0z0.M.f.)H..Y_"e......B........L...q.K......|;..L.........xI.K3.M..%........./..){....R....s...7....).q.._R.4O.a3......<..%....3#.|>..y...u...R'.P..$Klz...........,...g.....`.7..\...x>.{p\;>+.,.....e.-..Re@.N..FY_....*....]}...[..h.M.oq.S.U...c_}`......8TP....
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 232 x 50, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):1570
                  Entropy (8bit):7.780157858994452
                  Encrypted:false
                  SSDEEP:48:r+em8Tlk2APr2fEd72tTqiVJlcLzqeVzYwS:r+erTlk5S+zoyGahS
                  MD5:EF9AA5B2ADBE5DF68AC4F4D716DF7708
                  SHA1:363B93AAAB9DB2832F6CA0EE3C27C9310C344BA8
                  SHA-256:3D94FCC4821A135ABAAE6579011441B94F9C04DAD1E66BB5211B0C019A5968B9
                  SHA-512:EC9B024AEA46F7B97D14F0A7E12704D09B85F0017CC9E273CE50F2F889DFDAE81DE549CCD546BBB8F8BAAAAAB7781FEF77BF783E02CCC9605304552F7DD5903D
                  Malicious:false
                  Preview:.PNG........IHDR.......2......n.f....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.[MK.W...t!.fU..b!....*JBA......%-.F.4$.Nw].....E.$...)T......?@.O{...3w..y.=/"o.9...<.y...X....c.1P6..e.lx....0..J....e3.&\.@)............o.*>.E,;.....~..|....Z.3`K..W0S.&.L._..M.e.`..M.....i_.......\...6g..^....4..L.Y.9.$M...4..L.Y.9.$M...4..L.Y.9.$M...4..L.Y.9.$M...4..2.......q...&...........*.Qg.+.p.......a.:.X6...o2......A.....[).,.p......P......_..>......3.......z8j............>...fww.6....../....S<......^%.4........{.N$..`.!H....`........a..(.G^>~|txx....K\mF..'d.d:9J!.....j..i24.A...`O.......s.....?={....H'._..~..O......*>...ZXX.3...;C....\....%..s=...w<h.......0....~..y..._.......+.n.P.M]c...A..Er|.R...$.g...9*._.jg.....x...&+.JWM4xe..^....0...11.[.....f....r#.h.h$....[=t >...r....L.0.KL..B\..x........4J.0....vY...\dA. w...........g....};.}.....;.......x.|.....)......x....s....N.$.n..g<Z.q.a9.C.....oX..%,KNNN..i.8J..p].1....B>{......n.D|3t.-\g...Q
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 340 x 79, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):4490
                  Entropy (8bit):7.928016176674318
                  Encrypted:false
                  SSDEEP:96:WXKr7Xwf6Obg+XaGOnsjbbGSb+ydWtRvEOhDE6XqPeosv02tR45boo:3rTUgXZnsHKSb+n+8DdKlwm
                  MD5:7F161B19B937AB48D4FD2F6E5E16FDBD
                  SHA1:BDCE4F1C73E87E609A7FDF245A512CA4F73B35B9
                  SHA-256:C863C5E71D1116D69561BD0637F4FE4C4240E9CED05B8A5B056073AD13E6495D
                  SHA-512:E915B76FAAC9512D2AD11CF4E4530A19BEA1C7D8508BC218C69CB041F1EEABA3E2E03B1D56E61B032A6418829752C21B8354AF1335466D7E1528A06E6742A461
                  Malicious:false
                  Preview:.PNG........IHDR...T...O.....;.......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..p.U..'...rD.WX.... Q.. ....."$.ZHP.Z...C...........R..%G8R..... .R.C6..A.b...0...^...#..g..........z2.....nB...l..X.&._.a,...a,...a,...a,...a,._.73'N..ukeee.6mZ.n.m.G.}...n...a.9s.DGG....y...8??.o.pE1....Y.,......).ca.i.M.:5$$.........Lr...ye........6...8...z.-r....d.(.xc..U..^11...._>.QX..y..2...T...sss1..."A.?_.;w..S.F>......4.G.......D.|...@.K...............C...k...P...q....6.`QQEE................7;;;.._\q.k.|...\.z..6j>..n....Y.&G*.n.S$))).....r........}.{[Dv:,..w..A...`..........a.~.N.f.s...P...*..'7n....eK....+.n;:.W..C..9}..O..D.q..X..5i.s~en.c..F&..?.....l.]3r...W`..#..7o..R.@^..*...W..?}t...{.B.8..D...UPa..~..C...|.C].a.9..R...c.Y0..9.u...d...C.......X.U....WK.....5...'..PM.`...<. ._.z.F^^.EH.K>_.0.d..S...Yj<..~.5.?l.fZ0.@d.....*..G...K.....e...b.|e..Q.4.....('z...!G.....2..XQx\......X...2.\h..X~.e....Z....=....C.1.......w.....d.z.
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):11449
                  Entropy (8bit):7.91552812501629
                  Encrypted:false
                  SSDEEP:192:/zgGDSJ0ke0kBER0C31jm1OSZi6/ccccccc3zzRmKHDr1NFnAaLJ5rBX8iaD7:/UGe6m7XdJS86kvRBHD5/nAa95rB9aD7
                  MD5:163E6791C87E4999C343EC5E23843B15
                  SHA1:43CE3BAE19E22876483A7FD0E93DB45790373600
                  SHA-256:DEB2B126977EA150E49CDB3ACF4F5387639C7B7B5583454EDF55ADF83DFAB720
                  SHA-512:98BE1F4684F99A9FD2F313B09A113B5C310EC8BA8EB0EBF5FD69765E5B48B001D39999E3F25A7E76C7344DCF57B4F0BF2E4614FB0E0DFCCB6F02E6D1CAAF7FDD
                  Malicious:false
                  Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..,NIDATx^....E...@^.T.....H..$..(.!..3....O=Q...<.9.`@E...CE.(""..H.$..6.......]3......tW}U...w*~....W./. .. ..........m..H..H... ..........'...G...W.=#.M.$@.$p...........!@=U.VH..H.z.g..H........H+$@.$@=.3@.$@.j.PO.p... ...... .. .5...j8......PO..........o....+.Z.Pb.FH.......D.g\........._..'0.......9.>............&..PO.z..)-..........R....'@=U..I.&.g......../....SO.\.,._.@7Q.g.}V+../..Ht.I=..WZ%.{......_v.....%U.)^H(!!..q....|.H.E.DG_....o../...T.i...z.%.4K..# %.-.(...4J`i..,.P....F.D.zj..#..@.).(...o.....S..)..i.z.g...h..8.......A<d.z....<...n.]...E....(Jj4P;._.N..Q...)..8U.u.e).j.e...E|.]."..t6.[.K..5.6.....B..(.=W./....S'.......z.FY.. ...PO.".tI...F...Q....c.o.....}...r>..3c9I../.......}......I..G.|..|...~.b.e.5.OGb..o.....w....i.e...5&.,Z.H......g..KY.<.nZ.x...HHbdS.Z.\.O..1Q.K...9....Z.L....\g#.._~9###%%.O.>.Rvu..C.....S..g01..j...?-../...Q..N.:._....1.!
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 165 x 131, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):3679
                  Entropy (8bit):7.931319059366604
                  Encrypted:false
                  SSDEEP:96:tT+LtoQ9jsUBsnwlDGThUe8ww2iJiGEjdKKnnE+Gh:V+Ltt5GwlDQhUe8ww2iJi7MKnnE+K
                  MD5:995CEACAD563F849C4142B6A6F29F081
                  SHA1:44CB3B867CD2917541B7D5AAED2F14F10FEBB0FD
                  SHA-256:3691FB8C60EA1B827092F05FBB1807E34726016C6FF56698D7B81C44D519D22A
                  SHA-512:3C8EFEB966B075D06D8344483352BF92C9292F9970C9377BE254EB355EFAF017916737AECCDC704B84D532B7229F9908951A6F2CC3FAD810791CAB224401AD3D
                  Malicious:false
                  Preview:.PNG........IHDR.............c.L.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^....W...Gh...k.Hm..J.m....,X...Eh..%.n.....PHvy$%...[...R..l...(/..-..yl..Z.h..H!.../.|.y|w...7d3s.s.=.{.s.g.6W.^..)..@..{..'O.LL.......c.^.6xS&O.,...J.(|?...............,.$......@.zk....,.$.........)..7]O...mH7..0..|..&j..t..F...T...AZ7z.....$H...AZ7z.....$H...AZ7z.....$H...AZ7z.....$H....W.6.....0...FTcc.Wi....Q)...<.*.....{...#G....Y.f....KKK..,,,4.....{S.`...+O.[..+.\H...(.<..Qy*..ET.PM...c....~(.g..**...ol.K......Sc8..q.F.KM"<...:t.O.>b..$*t..].........2..y.h."!f.08hT..m.(..C.7n.......@....SVUU).F.).X\\....[j.U....$x$d..e...<.W......=;0L78t+..Gw..-....]......C7......K.w..._..g......A.&M.$^.#.!....e.\.P........;vD..@...Za.@*D..f...! .2w...4#.J..c....K}....F.u.I.b.V2.k...5..`....*........M..!.,.;.E..BZ....K..[7....5....,...........K...7+.6..o....\,`...z..5x...\46x.b......Y....s.^.x=.e.4s.W..t,.iu.G^.....(74....`.....:......]..&..j+t9..3..}..
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 127 x 138, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):2232
                  Entropy (8bit):7.837610270261933
                  Encrypted:false
                  SSDEEP:48:dFQY2WmQbe+TukEC2KgYPsWOuWFk792oP/sWtGOK9Lc+rD0NTHj:3L+wKkEOgx3PG92Eqt9LczFD
                  MD5:EDB5ED43CC6038500A54B90BEC493628
                  SHA1:A8CD63F3914E4347F4C5552FB922C6C03917F45F
                  SHA-256:9F3312E33EB78C6952B5A5D881BBD18751FCFAC41D648C6F053CE781342A504F
                  SHA-512:4EBCEFD69A4C249AA3B0F00A954C4E463DA22FC9CA0B61A0DC46079B438138C509B22188D966FFF6599A3A604858BC4CC8FE6E0685A764E8E0477AB7A237DB32
                  Malicious:false
                  Preview:.PNG........IHDR.....................sRGB.........gAMA......a.....pHYs..........o.d...MIDATx^..hVU..}..s:..6..9g.MM3...j...*........A..!.A.....R.Ai%YH..(M.".h.cf*.B.......:...{w.{.......y.s>.{.{.=.........#.y..r.K...K.0}......Y..b..[N.=....j.=........!......./.6....B.8....p....5P)....@......=}............^.~..@.o`n<.q.....Yw]..mg\V*...y.W.T.>...\n...s.iG.~L]..d.<.8..j<.<1..4...CZ0...}...........oDDh.....]3}#"B..O........0}B.F.L......5.f.FD..L....5.7""4`..p.........'.kt.....>!\.k.oDDh.....]3}#"B..O........0}B.F.L......5.f.FD..I..x........Z^...>B$1.N"}4.....1:&F8..*.X.yL(..s.3......~2.EL%.w.Uc.zJ...B..S..b.7o|%..7..'.....N.|..Vi...q..uO,`/....\W{..y...&iI..|X&T.........-........Z..o.~u..U....cF.M....O4}......~......:T..W.._s...t..Dlb.$Pr././.._4.b......R.T$t..$.>hB. +.{......m.w .Q...05..C.}...}.....?..h.....Y .8.6^t....}.y.%......l=$..[.~..]..h..N.......*....SB.|....8..H......_...G...|......;6YQ|WO.o.}]..'.$..oE.y...i'9.[cmS..@m@.Q
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):1604
                  Entropy (8bit):7.814570704154439
                  Encrypted:false
                  SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                  MD5:3F1535054D4F9626F0EB10CEE47F076E
                  SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                  SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                  SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                  Malicious:false
                  Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 749 x 126, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):13084
                  Entropy (8bit):7.940058639272698
                  Encrypted:false
                  SSDEEP:384:o4KSpFN6Ud4c3p2Il1yavNr5spYVJzimlfZ:wGN6Udv4IKavLBJz/r
                  MD5:0693DABBBC411538D209F32E22F622F6
                  SHA1:FB7E675406FA123CDB7E058D336742D6A2E8DC8E
                  SHA-256:2DFB2E7A1A3AA43C673D2EE540D3C366CEB12105EB5441F98992FC06F4284013
                  SHA-512:F07732660EC62DAE58EB02E2E9476007EA92BF826F642BCA547097136AEA01D29FF69D9B0CD0F5D65A5E15AA66CA4AA4804AA171A3504AAB198631C643C90C16
                  Malicious:false
                  Preview:.PNG........IHDR.......~.............sRGB.........gAMA......a.....pHYs..........o.d..2.IDATx^.w....'m.9c.6"...&.`.N.(.TN.Ne.N.R.eKr..T.*[...?T..:I.D.S>I$A...I......y.9...f......3...Gh.....}_.o....n..A@.....A@...L...2... ..... .x...#. ..... .....1f]9.[.....A@......3 ..... ...fE@x.YWN.....A@......1...... .....Y..J.Y.N.....s"................./..rc.scuyyyu...\s....t.oi..j..lv.....Gr.#9%%%9%--....d.T...r...DH...6.....%U..A@.0.....rAD ........2.5.......L.R..=W...gZ.`o..-?.T.Cy.:...y.9..y.EE...v......1..R.....1.".... `"...ss.......i.!.hY...Fj*....%.-.Gw...HJJr8..6...#.......!(.?P.(.....8(u........*..OOO..........dgg....Q..=..c.y....A`S.@.......3.CC..GFfg. .I.I.COrJFFFNNV^nn^^.z..%..(...^.b$........a..y.LMO-.,ylV+.k...T>Jg..*//-+-......M=..x.....E.... `~..N.Kww.......z...%%.e.%.yy.i...P.)'.,A.5.d.0.Cc35==66>2::33..>..;..Ii.i.gv...DSd....l#...l..............................)**,**...V..1 .F.'7....)..SSs..7..F...C.p....(*,......(RG..B...l!.2. ....|r1
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):1604
                  Entropy (8bit):7.814570704154439
                  Encrypted:false
                  SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                  MD5:3F1535054D4F9626F0EB10CEE47F076E
                  SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                  SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                  SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                  Malicious:false
                  Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 163 x 131, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):4847
                  Entropy (8bit):7.950192613458318
                  Encrypted:false
                  SSDEEP:96:JnieMJz5Tz/gKVp93jQvcv16kjOzbapFJBkjcMNBqmQzOG8qx1QKnse8T:JieMJzph13Evcv16RfapFLxMNBo8qxan
                  MD5:A1A1017A6A7928761CEB56D1D950E123
                  SHA1:28272E9C7F816A1CE8F2033FC00F489005332365
                  SHA-256:72F066CD34EA71D0E1B28FB60D663B0372C5254E1A8239C94A164EEF9389DB88
                  SHA-512:10F4557F102230126BC86CD4B49C93365C38D5CBEAC51F4691B90D861098866A2BDEFEBA507731D4FA14367FEE430453BD716157F9074EF643F2B949B09E1530
                  Malicious:false
                  Preview:.PNG........IHDR.............n.<.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].\TU..}...E.0.T....L~....af..Z.....O..4..>Ms..Js_....5.E.d...Y....?\z.3..}.l..|?~...{.....s.z..Y.............E.X.6...c..u...y..W.j....."}...l.i.`.!-!-......MKH.E.bi.d...b.X.)...X4 .vJ6-...;..+/.->Qyi.t...%.T..k;.U..y.C$[;..Gm.......v..*2..2..eee..."!..)...yy...III./..u........2....M.:''...W.....o..t...._.6m.... .`,k.T.v."..q.......s~~........O....ed.[W0X..HB.V.i.....<=..E^^......MyY..vpp...........^6.....aQQQaaa........]^^nkg../_.d`.%......L&k..B......?C....W.VVV6660t.J+K.:..%q.....e.cp....Kz..%.qZsAR\T.!......>55.R.u.W\\.L....T...K..rE.U.K.-9......y.y.......K....>...HWTT.e....+..B.......%%%......^...|...M'.%.f!/..=p...{O..../...@...DP..hw8....7o>..A.mgg......7-']~.s.OE.E.|=.......'%!y.......\.....MSn.i.........!...U.$0S .......Z.P.}[.%X[.;{....N.....\......6O.....'.N}.}s.m...E..V..f..r...4..~.......H..F.}....4,.R.=.......xT..4......./...,z
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):1604
                  Entropy (8bit):7.814570704154439
                  Encrypted:false
                  SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                  MD5:3F1535054D4F9626F0EB10CEE47F076E
                  SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                  SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                  SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                  Malicious:false
                  Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 123 x 103, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):1657
                  Entropy (8bit):7.80882577056055
                  Encrypted:false
                  SSDEEP:24:q3kLWZefR0kKbfLnNhzzt+acvt2x6pBs/j+7QJU0QbDQ883ASaoUV4hNgq1rsyhy:q322nN+X11GDsg8831Uyhi/vf
                  MD5:D5F7A65469623327F799B516ACBFFD2F
                  SHA1:76C6333C14AF3A7EA091819953E6E12DC289A12C
                  SHA-256:F476FAE1C6D79069239C471D182631AB343749C22B1A6990250465C7EC3738FE
                  SHA-512:351B9E455E97E6247E64E4BC1B59C9524E70AE0D09D3B6FB96937378A70536483B00426EE69C3590DD415A8265D21FD031B524B90E4E86814EC9AD704E57793E
                  Malicious:false
                  Preview:.PNG........IHDR...{...g.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^...h.U..p.T..(.eBR....2.....':.4kec^....0.&.....ugS.8u:i.P.F..f3...D....6.%...xaI.}...y..9...s.w.s..{..y.5<<<...(0Q.............t_..q/.[@.....-.e.....=..J.L.......c.4H......u?.XF.KJ..zb..0..f}..'J.,[&..S.6...w..9..._......<.........?j....H........>....~..}.n.8.WW..B?...?.b.;.....<....~...b...m....&1.=.Pq....w....a_3.k7'...\....d..z.O..w...s...Lh.x..........Q;40.i..`.8V._.@...rd.....kF.@<@..e......e....=mHB;....E./.\h.^....q..>.....%v:.O.:...&q...:.'e..9...h.iG'.L<@......([..|'.n.x...c....._O...[)......S*..Q...d......A....4..t....E..v..}..7...t.b....,/*|.H.]...8.. .@.(.;"..Kt.....].+.[LwJ..B]i.b.k.@..Js......J......6..J._LwS<@..J.YLwV<@G.4w.L..G...]..zu.z.h....;...W.IH..+...c...F....qI....Xul..]...N...wv\.M$..D...+...=.....?U....T..^<6../T*.{q.q..:....y..XL..l..z.d....G..b..g.G..b......SM.{q.q$MUL..R..........^\P..g...e.....L/yqM../.b.f..........J.<
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 59 x 61, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):2210
                  Entropy (8bit):7.86853667196985
                  Encrypted:false
                  SSDEEP:48:naUvGemgl0W5KMDRLEbGAnaHC7ew/fkDSCcE5FTaHWc:aerVlDRIewkXlrTa2c
                  MD5:73E38124F94AD20A2F1571FBBE11AEEC
                  SHA1:87FB8056DC7A0A3B70D51426771C4CCE2099CFE5
                  SHA-256:A700B63B30CBBE5230CC5E977D651E178EA87E73EAB18C8D5FFB1362149ADDF7
                  SHA-512:320FCE64DD6F975384BEC9267348CD5CD24A55B13BB09FEF1238C2216AD8ECABDCCC15601A079CE092ACFA4954829FFEB06FBB0631F6AE26E3A39E43C102048B
                  Malicious:false
                  Preview:.PNG........IHDR...;...=.............sRGB.........gAMA......a.....pHYs..........o.d...7IDAThC.yL.w...r..r....... ...Eq.nnN..i..[.e...-.d.M.dn...x.xmQAT.Q.RN9..EA.k..P`..=}..m.&~............oy....k...}}x..[....g59.}]...~i.SY......."....7Ow../......2...3f)n{..R..R......U?......O.{....c..pT.\.t....5.07.. .....07...7.o..,+.,.V.c...&..%.3I.....:v..\....6.....??..[.N...........nz..Z.B.........v.prs.q1V1|..=':..`.bz..%s.cf.3..RyMNUeV..J.k.}D[~xo..d..c...sO.y\....B...c.07......Rp..J.......{b.......;u...s....N.gko.M...;6...6..c.X5.S..o..\....^).....(......y.72.^....s%...[.q!&Z....C-..+o.....I.....,Y.{......g.1.0..I}.....<.....T..}....t.!x&)..[.7....4.5..{....n.<...#I...:.....r.wW~..zr..9k.^.]KR.*W.J.n.")....%0...)...Fbb5`4'.X..E.../.t.&,t(...@9....\$..........].P..jdU......H;.$.'%}.l7........y..$.....Z..4.Cm.u#&.%N..1..+..8....y...U.(.T.....}.I..5r}...!..K....>f..3.C.G..X1.(<.Gb..b(....0Qv0F.......n.z.s.Y......\.,.h%1...QU..%.}B|CW......sO..\.=..&3...,.
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 563 x 211, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):14458
                  Entropy (8bit):7.944094738048628
                  Encrypted:false
                  SSDEEP:384:uuT43eqJy2jEeSZE0onrAFAOpn5ytFfNrfIkBQTYz8ynth2EB:EugQeS+nrAFZ8tJNrfRQM4ynH2EB
                  MD5:7CEB71F78A193F8C9F7FFDA5F81AEBD8
                  SHA1:EEC1597705EFF1A527C246B86A71878185BA6B1B
                  SHA-256:77911FF7AEAB8FCCAF36DE6E1183FFE1A6C27F77B5714EE780976CE5189E8FD0
                  SHA-512:1D1AB19B64E1E2ABCA61AE78B3B50310B0A6CF19D2ECFCB4499D8D0BF68600B4D95BC0945EF9FF9B1D016ED61EAC518DCCA1A426F460317C07AD51E2E047948C
                  Malicious:false
                  Preview:.PNG........IHDR...3............>....sRGB.........gAMA......a.....pHYs..........o.d..8.IDATx^.}.p\W.ZRKjI.}..[..M.l.N..[..O..B&....?5...@.5.5EQ...T...d*U..*.C6....8..}.Wy.e........k]s..z..^...T....s...}:.{..n..1.."@....P......."@....p @f.s@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....5 ...f.;.0..7141...L.....M.3.L....{M.T...I.C...@E{.w.Y...q.....c3..gf.3..'j...I...{M..@..4555==-...!..f.....d...>i.%&&&%.u....f..[......O`.......G..E6I.< ..3.k...',....Y...<..........u...{9.......S^^.q.<..^....2.bb.E`r...ey........ ..3........Dg@L..a'.x&''.O.Y..!e.c%$..(P__.d.....Sj..S...BLu.[g..mK.SwVe.."@.T.@P.y.........=....40..L...$d..J....cccw...^.RBKKK...heJiS3.0I.X<..}..*O..........QR..q.5GTA..ht.(^.Hno..n.......wvv:..K?.\.JQ/i..h0)G..1Y....K.>FT...8..d&..,+-.T.b.........f.."3.V 6.:...E 1...?.Q.6....A1Smm..K...V}...:.uA'.$.v.cy..<.`.Z322.r.LI.....>......&........"..."......@.Ccccee.[..z{..fL5..{...
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 742 x 104, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):13030
                  Entropy (8bit):7.948664903731204
                  Encrypted:false
                  SSDEEP:384:/06ULmwT2RqfILhmLy4tNpYGL0mvBQhTMHX4PCIVYm:s6USI2RqfGhmDrpYM0ofHX4aIVYm
                  MD5:17E9FF9F735102231846936F0E2BAF1A
                  SHA1:9EC1AE8A3AD55C48C02427D842D6E38DA85B5145
                  SHA-256:DD1CA8DA90893E0B63ABFDD9E60CF2BF844B311964E9D9DDB855C21FCA156EBB
                  SHA-512:71E690D6C87B09659296E6E6DDC8E3F91035DD80C5CE875FA557763E8138900C27FB492885291CEE203D65BCEE8C20C9C39E0590A5FD32B8A00BEB3E3F6D6E8F
                  Malicious:false
                  Preview:.PNG........IHDR.......h.....2......sRGB.........gAMA......a.....pHYs..........o.d..2{IDATx^.wp\.....sN$...$.).Q.")R2ei,kl.%....r..vm.x<...\...u.U.g.ry=..uX.cK.dI..I1G..$.".Fg.q...N.nt...3.w.w..~.v.O.....K.....A@.....A ..H.n.D;A@.....A@......e.y ..... ...1..P..xH.. ..... ..e.9 ..... ...1..P..xH.. ..... ..e.9 ..... ...1.@.$9..S....A@..4....^C..F..VR\\TT.........aHII1......VS..g........... .*....z..|Ek.......<R../55+33;;;+..Y..WC..#...P..... ...s#0::......522...,.v..D......_.....9.2N.L.'..F$.....e..!..... ...N...`1....G.....'&,f..f.X....!.lp......I_........J..z.R,YbYd&.... ......~"b\...b.Z.SS.....c....&..Yl-............... ..[...BY......... ... 1..Z..6NN............._.zw....MKK.Z..vMMnnn.4.v....,q..e... .D%....Q......._..p*M......22..e...k.}.....qU....S.a...~....P..}v.. ...1..2...F.GCC#...].=..C..n#...K+..MOO..........."....d^2=.{....U.p.h%.%n...D.....XB..b..'''....?h.b.B\v..^Q^.UC............Q...I.....U.VD...P..{.2"A@...b..V...........jF.x.
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 165 x 131, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):3879
                  Entropy (8bit):7.9281351307465044
                  Encrypted:false
                  SSDEEP:96:k1hccap27HGVhY2Kn+A3RS+HG3dXrjmg26vh:k1hccewIhYxRmR5
                  MD5:C451B2A146BDD7EF33AB3EA27268796D
                  SHA1:C040BA2F31342CBCBF597C96D4D6EDB83D473B77
                  SHA-256:4C264B2A6E88712234DAA8E3A8D630CBF4EEB338554CB0B794D8031F8943EE65
                  SHA-512:55915A304B261BC6F38F5CFE0389D5195F85FE2C1DA325019C3AA391E8B1773091E078A35BD57F8CEE0BA035956382AE33790EF462053FCE711EEA9665B7F917
                  Malicious:false
                  Preview:.PNG........IHDR.............c.L.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].p.U..g..Bp!...\.!.`pA.+....H.U..."Z..*U.. ..P.D.-.$..,,..$.g.......CB.l......I.g.pc..Lf..~.=.~]S.....w.9..w..'...!L..A ..^.t...v..s4&&&%%..6..`..:.G.D@.7.qS...K....[..,...o...p..2.%..B.Y....|;..gy+.[..,...o...p..2.%..B.Y....|;..gy+.[..,...og...}.W..z\?...y..;_t....=..e\.....6.M|[...B._....[_.\^Pf.....f.....\l..../6....<S.4./..m.......l....B'.n...O...yc...........X...P...k....t..9tf.g>....e..Sy'.L+**.]{..a...,7...p..+......K..y.9p...I{..i58....v..5.`Op.....{.......8.._.S.........p..).........;.....y...2...b.[>gP....C..G.H...........Osp...)..9x!...W.,..^....$r.p.sOJ.l..=.x.9s&:..........h.`..W"V..|.l{..72.....zv@.#.<.........../....F|...c...4.W....:uj@1...~.X............^si....Z..I~.Q.<.....NAOq...+i`.)...$L..gV.6#.....F$..hD.g.L-\..H._.u..]4......h...T.BK\\.Z222....7))..h...1??...~.-i=...X...~h....y[.............p.....x....c...{....Uh.7n.....
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 651 x 254, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):19235
                  Entropy (8bit):7.944867159042578
                  Encrypted:false
                  SSDEEP:384:h4iuxL3Yck5lpMcTyHOypEod/G38lJxqSp5BCU:h4/xjYc2lmcOuuEoJM8fse5BCU
                  MD5:AE32E846559D576FD263BD69FEDBEC28
                  SHA1:D481DF71C858BAECFE33418002D368F2DCF68D4A
                  SHA-256:6E21222B0EADAB8D3CFB0C7D14941D196165D6709271AF317D099F12403CD352
                  SHA-512:9AA4A6DD01D3B745D674721765F2BFCCAB584CA0603F222EDBE9A88190A2A57438041E7A3706CC0656A6ABB79AA18118319F210EFFE3DD917E7B94A6294BD346
                  Malicious:false
                  Preview:.PNG........IHDR.....................sRGB.........gAMA......a.....pHYs..........o.d..J.IDATx^...X.W....D..A......bW.A..[..5.F..D...7.ob71.....b.."...("...(...{/...e......}.....;...S.X...H...@d...... &.....b..... F.....b..... F.....b..... F.....b..... F.....b..... F.....b..... F.....b..O.KVfVfjFzJzVF.}i{.R..l..q..`I....e.'./.'.G.z.*!&>)61.UjVzf..4>Q~...U..=......s.\..WE...2...t..`F....M....'..?.......>BO(m.V.P....Gy.../........B.6.......=|z7.Z.|hQ..u..j............&..Z.bo?.u...S7.G>......]I..7.i...3....<.y.l]....SI>...L.2..<.....[.'=M.Tsprp...T....cE'*..P........eefQ.NKN.x....:-#5#....q/..xq.YzJ:.T.*u.j..S.C=...|.....2..(YF........|...*.7t...{.jz....W..Y..{...nlfj...L.6.[.hS.=.....(!C.......?5..+...[..a.:U.K..C.......w......+..r@.z.7..j..qB..B.....X}..=.fk...>^5[....n.z....wn....Z4.._iWG.^..z6./]t......dhM.9s...Gbo?...U.V..tj.......*&)Io.{q.G...A...l...i7...&....d.E]....#.W.x,.T...&Mz4+].4.$n..F..x...<.ppr.............y.,i./..
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 220 x 170, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):7374
                  Entropy (8bit):7.955141875077912
                  Encrypted:false
                  SSDEEP:192:IfGsPejaVZWzIZKpnFFt0HK5+2Y/SLopWR:IusPe278IZKpnzt0q5+qVR
                  MD5:70DAF02EC717AB54452FA4C707BCAC74
                  SHA1:30F46FAC5E96470848C5A948162CC12455A05154
                  SHA-256:58469BA93EA36498FF9864EB54713A001C52106DE97804506D82EE24B816712B
                  SHA-512:E599FDC22A32CFEDBB23EECEAE0B278EAB9A90959FE6ACB40E2B201E45A7C19261AAF529E7A0D9CAF2A9A4C64C7831343F3BC20810513990AD5D38A32741564F
                  Malicious:false
                  Preview:.PNG........IHDR.............IC......sRGB.........gAMA......a.....pHYs..........o.d...cIDATx^..S[Y..I...B..`...N....t.q..j...+LU.....O..sF.!.I...w@..H.Q.w. ...s..{B.....2......i..q..z{.}^..............J.fQ.....r.\WWw.T....amt.t;...6\N.........z.n...].u.z..Q...?^........;;;;:NO.}.c....<-...........({.^....t.k...F..[m..:........R2...%.y.l^OOONN8)....\y....}...}}.}.Hy6.^.a.....\...!S....K..|>......s.........l..P...LFWW.l..RK..b.h.h .3.F..|.|..~..........e.aa.........0H...<.Y.a`..xA!...7.X....xd=........h?o5........Ay....?6...........*..tb.9.*j...S`](.,P...9.2j..?...z3wD.[......L3.Ng2G|.......&..0ZK1u8.H.2...Z../..P(....BA..aL|..a.Y:.....J...5^x..'.\..&S...L..U..;....<{..."..@x ....J.N...;....WIht.<..B......!HM...&z&..6u..hF..G.D..B..........A.....n...GG...,.,.Q....X,`"....r.........3d.{o.(/...3.H...x:sX....h.8... ....r <..DB. ...y.N...o....5.......L&w....v....w..D......!.a4...."8.U.|.0m.(..zR>..=.+.L.....e....Yd2.-Z.7..D"..pX.I.....e5qYa._&..3..J..++
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):1604
                  Entropy (8bit):7.814570704154439
                  Encrypted:false
                  SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                  MD5:3F1535054D4F9626F0EB10CEE47F076E
                  SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                  SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                  SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                  Malicious:false
                  Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 167 x 131, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):5386
                  Entropy (8bit):7.943706538857394
                  Encrypted:false
                  SSDEEP:96:x4F84/zVJWedudPZZRdbvczHe2ftFJ0y8Ea5b2AELJj:x4FTnodRZ7c7LrabEaMAGp
                  MD5:DB48555480A383CD1D4DD00E2BCFCF29
                  SHA1:8060B6FE12175289F0A71F45B894030A0D9F1AB5
                  SHA-256:807723D8F90A5BD41269A7A62817547026A117D666D5BEF454EB699C97CA3FA2
                  SHA-512:2614C04686299CEE8D56577A1E836A26076D42E041C627177FDB295629F6A80190910947FA794A094C55A45C3D70725EEF29097118E523A38B50C9263C771A41
                  Malicious:false
                  Preview:.PNG........IHDR.............gI......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..xTU..M..B...P........)vQpQ.ED.""......,."....*bC..VT.. M!...@z....1...Wf.w..o29...=.v.TUU..^..@....S..<..;h...5.9r....x..7N{...=........'...N...u...9..5+YW.;..N\..u...9..5.....O....,.K..'.../.....1..T....>.f..9.xo...u.xo...u.xo...u.xo...u.xo...u.xo...u.xo...u.xo........'L...g.UVVz.[.n)...Yqq...Y.f.)//_.l.W_}.,........S^Z^Y..++.*..pF.....?...I.&...O,.k.d...~..w;Q........7}1y......e_............=y._U....{..}.w.O..~.z.{........W\q.."........^.h........}p.+.>m...d...4...`a~Z^....me......:N]..1...g..y.f.......l..g.).......e[........Z..RB.KrJ.....#...{..eff..v.[[<.n..?{.....SN9%...V.yE...s2..........e@Wz..I...B.r..<.-.=/t{.v.|..J....,.@.A.v...s`/.....6f....L?.z[T7..)S0.;c....\s..z-C.....v..}Y..{..j..xF.....'.#_..C....k|3..8...N...5......f....3......f)-.p..%.D.v.v.].f.......33<<......[bbbt.]w...:.r.....z....q..=....m.uhD..,..zXg
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 230 x 68, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):4181
                  Entropy (8bit):7.950380155401321
                  Encrypted:false
                  SSDEEP:96:L6ousL3eslFAmjb89xK6YiSTwtw5dTA1W9lQ:GoFiUFAMbsxJYieZ5dGklQ
                  MD5:BC6C08F8C2C6D1EEE95ABFC40C3C3669
                  SHA1:44DE7375375880ACC24938D7E92A837E85C35321
                  SHA-256:6E54B502C46E1AFA57E28B8ACCCE24F102399F31407827A91E4CD7A42FCBC746
                  SHA-512:2AF4A9B87FA4F362926CD77F272CECBE3ED4F0E110FB8F30F661DF7C61B77B9FD8E7716EEF9177B1038B68C792CA4F844F729DAA48B2E38B9945EC9CB44BB720
                  Malicious:false
                  Preview:.PNG........IHDR.......D.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.yp.....E-.......-v...VY.a.d....R.euF.).KH@.*B..u@YdQ....!&.tjg.!.,a'.L..@H...{'\~yy.....w2z...s.=..;..s.......]..j..b5d.j.X...2D......r.\.#..f...Bl.....5dC....r...............:m.....s..j.f..jK....y.^....'8.....<......g.....=.%..2.p..}<.....G.....Ix.m.4dm..B.......0?..+_.*..c..n.......?....wa..l...p....E.Ly.}...*...C.D.vy).....@.>\...3;.`].q..m../.d.B.../......~.p.U..'...sP\....YH.7.../....R!...O...'.....s....<|.f)....i.{.I..l.a.n...?~.{...h...s.e..-..Q..R..@<;.y.G.+n.....Y.Y'.V.}.o._..?...,.>}..\w....`+.}.{.p"d.RO=&.v..H].....k...X.c..z.{........}.n....s:c...i7N...|....*\..O.*....)w..[>..E..}y....q..u.!.z.D.[`Uf.Y...>z\..x.B.h" \.}...`...|._.....G...hY.../..6>..Z...8^..k.E.5d#..a."....P.CR....OL..U...qY.{.C.<~I=V..x.J..*k.Y....z.;?..^...3.4|i...[DL,..z].._..a.....(s./...W~..q*.\#@[R.N...@.."..=....\q...<.......p...+J..\#...(.,....OQ...$L...G...
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):14553
                  Entropy (8bit):7.951135681293377
                  Encrypted:false
                  SSDEEP:384:EF7aDrPYJ1n3kaEf61xD+KvdokCixTQm7QA96dNT:EF7a/PMeaEf61lT6kCiFQCQq6zT
                  MD5:3E9F7D399DF9CAD3669B7A5445EF7074
                  SHA1:2FBC965DC03EF9203581F595E0D7AB1734726ED7
                  SHA-256:76C80E31F37248C3C787F7972A7B22038390F9D81E72E650071A6F36D36AF27A
                  SHA-512:326F8F9CBF829BF80AAA96062A57255A36EE04DE310634327AA075D14129CFA8E36E48AB2A00B10F9BDC1D94F1AC7A9E41D0D063361920A0332EC124BDF4C3EE
                  Malicious:false
                  Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..8nIDATx^..xT...!=!$..%t..H.tP:.HQP@E,...QQ.^.....* E.(" ]:.K..R......p..n.9{...sv.}.....7.....o..z...,|.......M +.....w........O...>.SJ.O...<...{. .x..g..I..H.......V .. .}.PO..H+$@.$@=.=@.$@.......VH..H.z.{..H...!@=.#...............C.z..GZ!.. ..)... .....T...B.$@..S..$@.$....>.i..H......H..H@...S}8......POy......>....p... ...... .. .}.PO..H+$@.$@=.=@.$@.......VH..H..zz?.......$@.$`i......c;.n..i...0..........<......S....w..c.....y..F4.p..3~..|.]....s.6[..H...N@.=M..|`...3./...I.....'..|..K...r|...nX...'.. .G...ib|...MY8|......9x..Ur'.. ._ .....5..H..d..L.$@..I..o.;kM.$.?........K/.wn......Y....E..%K*.=.......Y.3.!k....[V..WG/?i..H..." T.,z...6h.[..-%9....WMY...z.vH..H@/.BOe....g-P.@.......lH.O...SJ}5.|....?.^..5^}..$.. .....S.@...*<.gJT/......_.R.C.....rj..Cg'\K........K....~Y....l@..)..l.k.s..Yr.....Z]jG..q.+..G...;lNJj.}..T1&&.. .....?...|....W<{...g.&'Ca
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 454 x 278, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):8184
                  Entropy (8bit):7.807848176906598
                  Encrypted:false
                  SSDEEP:192:ExqMHYnnEnntvA4Mesu3SXHycmfIEFQp1r/:E0MGEn29esuiXHt0FQp1
                  MD5:5B386BF9A20766956A84F67F913F23D7
                  SHA1:6E72E51F5B4FA64E52D2B80B41409B3DB927A3C7
                  SHA-256:DDF6A1D5B29BD69C65A148B1247FDE8389CC56865E4398E4CBDCBD68A6555043
                  SHA-512:99B4109439D9A688D7747C6847E0FF7399CDA01A89C3181789F913E757A82EE4727F95E506F4B01930EFC7C6E229B94BB89E385B56BC009AB5CFE332585660C5
                  Malicious:false
                  Preview:.PNG........IHDR.............s>.Q....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^...]...!.......!.YTP.A......-..r..$.E.J.I;....T.M.UE[..Q..x....wKB=.m...4.%..|:...9...\{..o.3..g.o~..~s...k...X.r....... ..@Gggg.?.... P_.]]]..*Iu....C...h..$...:... ..... .\.......@R..... ..$.k....@0.Hj0.8... ..r.@....F.I...G.....T...@.... ..P........5...@ ..$5.J.A...@R.. ....#...C.#.@..H*... ..`...`(q...@.I..... ......%. ... .\.......@R..... ..$.k....@0.Hj0.8... ..r.@....F.I...G.....T...@.... ..P........5...@ ..$5.J.A...@R.. ....#...C.#.@..H*... ..`...`(q...@.I..... ......%. ... .\.......@R..... ..$.k....@0.Hj0.8... ..r.@....F.I...G.....T...@.... ..P........5...@ ..$5.J.A..............W_...1c.l..6..`...@ ..I.S..I.I'...5.\..;....'1. ...........c..k.u.Qs..}..g#b.j.@..Y..QR...n.!...-......h..Z.......Xw.U.~q... ..@.%.'............. P..E.T.b.:j.(F..p.... .C.}3.'.|..z..w.a.....\{.:.4[.lY..~...x..'/....g....J..9.K_...'...:..;)......SO=u..E... Py.qf..}O7.o....u?:....6~~..9...?7.
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 213 x 85, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):1924
                  Entropy (8bit):7.836744258175623
                  Encrypted:false
                  SSDEEP:24:rloPN36BoJ9JK5lncTww67QKf5wX5YgM5s6cahePwnR6+eA9zQU13ALcVz7wTQ8U:rYN31JH6lcbjMW5Ytmyqwp9H7wY
                  MD5:B1FDE66F75507567B5F0C6C07B01A3A1
                  SHA1:80B8E6A923E853232F66C874367E90B5C9CAD7AE
                  SHA-256:B9C82D2F31BBE409D159EE3C9129CBAAC7C6F6C81637AB9B6DAB3C11AA74B7F1
                  SHA-512:FC8C6038D3C2F5765D7524E969574ACD10AF6FCCFD45FE7C6DD4A8C2669B13EE3FB1A8833E94A046AB7037018170B5B87B1A2742E0E10557C413AD634BDF343E
                  Malicious:false
                  Preview:.PNG........IHDR.......U.....Q.6.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].O.W....G.lT^M*..J.....".4*....j..H..R^.".m..5....&..j..B..`.`..>...X......]z.[&.>..ef..gB.d...s~.=...3....m..(E...~.[....... .. .E3..7.4.......}..H._.D.,j.)..q\.....7..#.ag.o|.?.......;C|.#.../v.H.......o~.{G......H.|..;..v...G.._...p1d2..&......QS4<..i.".X.....1(..GR.R#.}.!.E<..:LLM......s..:"......Fa...b.....\.T..~OD... ..:j.~..p=Y...Y......?.Y.A...0!6_p.dKctjvZ....\.........V..1)..:.....;7:...(.[...7.....u..'ra.....S.]..........7.#,[..<.l.....[.........90d[.2a.R.........E.CJ..C..S..*._...$^...Q..:>hx.k7.`jN:.W.X..N..p..K..."...q....a.Uy.......[d.:vmkk./cW.>.K..C..?\d...'.@s_.?&.....V .?F..;k.....%+....+.3bk......f....T....S.(2.=...?gQ...K.._,.#....?.1W.......m2.....Z...-..:..?.#J......KS.P|&[<..........Dd.....\.....W$z].k..-..8...>..Q`Yz.}w&..._......?.)_[T...:wy...O8.Om......l.....\....]..."f...........q.o.V>~s...-....N{.n....w..O|.D...
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):11886
                  Entropy (8bit):7.946442244439929
                  Encrypted:false
                  SSDEEP:192:sqNuEpzsnKxkfLaZCdMh+cLApmRausyZwYMAisQKShDBlhr34ckckcZ:JNu6DMLaZsMhtLAIa0wYMAvI5V4DDQ
                  MD5:875CFB3B5C3619253223731E8C9879E5
                  SHA1:6372F4F5BEB6EEAE3EDBE5B62EE73039B40AD01E
                  SHA-256:CC69BAE5D2C8F56B28BA4E3C6A11F57C4E8CCCE69943ACFBE7E63B4FC90EE5F2
                  SHA-512:47F45A3275B8454F8000F4567153DD7D4AF3012005D8E34CB18AED6AD69083BEC753E607F275FBF3EFCCB7BA00310A04ADFBD5FA5B73E6BBE47CE73901C35CA8
                  Malicious:false
                  Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..x.U..I...JB..;H..."..(U.EE\\..._v]W..b...Az..{G:J..B.$...H.IHB.o2xE..3gf..w..2....w..s|.....C.$@.$.....t.!........8......RR....<...6..P||....$@.$@...PO..$@.$ ...T.GZ!.. ..)c..H........H+$@.$@=e.........S1.i..H....... ...C.z*.#........1@.$@.b.PO.p... ....2.H..H@......B.$@..S.......!@=..VH..H.z.. .. .1...b8......PO..$@.$ ...T.GZ!.. ..)c..H........H+$@.$@=e.........S1.i..H....... ...C.'++kH.G.=Z!.U...73o^.IH..O|jrj.D.......I.M.........Kph.............R.x.......RU8_".......j.......B"O.z.|.9.."..L....Y.d.Rej.-Y.dhX....:.xH.z.!(>&..4.....O.<..T\.%a..e...*..UnR....+j...2.."..M.O>.z......T...].j....m...S.`..&..)....f..2..............+..SP..?.a...=.....3......K.zj.5.fP.......2:..?.....%....d.qxC..W.~.._....!.W..6....iJ)*.(..wg.}.]sw\.r]...r"...e_-....5_9.YN'...PO-.d.:.%..wZQ...H...JMJ.6c....|g*..,.3.....T...o..Nyc.W.....A.3.._...U%...PG.z.....&.%.v....AIm.....~.
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 171 x 50, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):2270
                  Entropy (8bit):7.845368393313232
                  Encrypted:false
                  SSDEEP:48:3Cxnazs22lovji2Ez2iqBU2C+hJWizJNzIu1coqAYClBeMsk1:3dm2Ez2iUhBzhyjAxqQ
                  MD5:6EFE6733E10E011FFDD6711B5F37C9E2
                  SHA1:C72549E824EAD899944A38C46FBC28BDCDAAD611
                  SHA-256:92B5056DAA03DF3EA85AF49FFE4F9CFE8699BDF3539576A99F02418FF49AD9CB
                  SHA-512:EC14B553A5780CD9B33D438CE13A6932DE43E346D8D2DEC8D093A6A2048675423948F8E2C604A73460980C3C68D9276B65D76C2A6BC7B24FDF10CA92FDA2583E
                  Malicious:false
                  Preview:.PNG........IHDR.......2............sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^.\kL.W...*.F......@.*.(H4."iI}..B!.iD...I-....y.I.h.....<..1.....C..(XSy.l....,-,.......3..3...;.{...{.{g.....Q..x.T/q...F.V...B..'..?{:.:...`.........+.0s.e...w....{.`. ....5...d..9S]../............$Y.>.I....i..8....;,r8r!Ee'"..!*.&E.....n...=.@..Sp.GF..c*....1QH3....?,.T.el......t?..([Q`.0....k.G.....X..C...k|p...I.q;.d..N....c.u.a.5.%.k.fS\)..H..T.~l*k.[.n...x2.1...........%...yK..a..l.[.?#..fD%.FMT. =r.jt^..fT...c.&..Lr..............\..V.ll....Br^6..U27...O..N*..K.gm.K..g.;..l..Fe...w?..Q.E......0.........7...(.e..t...x.c6..Q..n.92:%....l..4.h]Z.....w..|..!.p.~..B.y..&.......gl...\.wI......G.6.K.$...%.-.h]\8.LT.....}{a...^.i......4.0.ji...........n.pk ......7t....U9..b...I.....#...<q..(|=F.......0@^......+..........X. .>p....S..t.].f.x.0....7d..n..'..'... .M.qqn...G.t8'.=..V.PK....K...X.z.#..I.....@...Y....BH..I.....,..K....=`&Z.41$..a'o.:....i{o
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):16003
                  Entropy (8bit):7.959532793770661
                  Encrypted:false
                  SSDEEP:384:1l+zN+iNurNE/tBdEC/vkape2XHYdhOm+Bl6C4:L+zN+iNurGNEC3fpe2X8Pa+
                  MD5:3A5CD52E925A7C4A345047D8F06C3C41
                  SHA1:9C02828D83206BBD3EB58930C8C65A6CA5DBCF40
                  SHA-256:477277E8CAAAE1D3B3EAB5B3660239AEEABC433743A191727B1A71E529872AC7
                  SHA-512:8D8B6AC645ECC7C8BD374E6190819006C71AC0B5993419C42463009116214E5EC4B4235D94B4AE4CDA132E7DDA9807ADC51525824AC5F12696517FFC8890891E
                  Malicious:false
                  Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..>.IDATx^..|.....+)..H..C.K... ....x).rU..T..*E...;....*.@Z.....@...9q.g7[fgggg.............1//.."@....0..#.t..f.C..."@.....@OIR.#P...0..$...y.Pl"@....( @zJ]...." ...Si8R*D.....S..D....i...J.R!.D....R. .D..HC..T..... .D...... .D@.....p.T... ........ ... =..#.B.... =.>@........4.)."@....).."@...4.HO..H..."@.HO...."@..!@z*.GJ...."@zJ}...." ...Si8R*D.....S..D....i...J.R!.D....R. .D..HC..T..... .D...... .D@.....y.?.`.T... .f.P...$47........~E....!.D..X............].`....0..N.a...>[||...t.T.w *.. .....)'...=X?c.......+OE....<-84...=.....w.8...7.Ro&.D@!...GS.....s.......:...Gg..8..T...u...~..............<...S...../Y.......W........#. .vB...u.. .+.999YYY......wf..._.{6....=..]>Y?..;=02eb......2...;.%..\...P..R5....XMO.....6....W]...3g.5;.n{t.......F7S....r...[n.......AAX..j[.j.;.neef).2.....{ ..r..{7.-........i..S........<..pm.u.V....M.333....K..Mr.s..Ek..=t_.#.P...
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 454 x 278, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):13241
                  Entropy (8bit):7.931391290415517
                  Encrypted:false
                  SSDEEP:384:a99pmP85w/MAMszG+iHGgrw8Ld+9aEsjQR:mgP85AMs6+UtrX+9mjQR
                  MD5:01367FEEE0A83E8765E971E0D3740900
                  SHA1:CAE1FD22CE2539FA2ACC0242C615CB7EA3F866E1
                  SHA-256:18B8E53505DA3C412890F4D74AE2A6B26C4B0827E15E830F92A024D292AF20ED
                  SHA-512:8CFBDC014C42AE6417038B80424D2E9FBDDD7DFDDF579E349C3C17C9B52AF33A72463154D29539457C4ADAB2DB00CC28A67902FA8D9209E4AF00EDD46D52E5CA
                  Malicious:false
                  Preview:.PNG........IHDR.............s>.Q....sRGB.........gAMA......a.....pHYs..........o.d..3NIDATx^...U...Y.]:.T...G.5..lX...B..Xb4F,I0X.....F...("vET4H......*EX........wo9..9.|...rw..;...;o......z.....B.......v.mn..>......E."....U...4s! ..F...u?.@...! .~F@... ....p..Q.kP.#! ...(U{@...!....T.TGB@...Q......B.5.D..A.......~.*.U{.].....S.e...K.A.......7^?....D...h;...!.Eu...o.^..B@..# J...B@....(.5(....B@..= ....p..Q.kP.#! ...(U{@...!....T.TGB@...Q......B.5.D..A........T..! ...k..R].R...! .D...B@..........:..B@..R........! Ju.Ju$......j...! .\C@.....H...! J....B@....(.5(....B@..= ....p..Q.kP.#! ...(U{@...!....T.TGB@...Q......B.5.D..A........T..! ...k.D.RK.K.m.V.......(.^^^ZV^Z.7.a..........T..xsqYi....L......z....}....?..yyy.M\.b..U3W.0{...~.`}..M%.J*.w.mdv.&*..@....R..o/.^..5...x.g.>..ag....GM|t....\<s..y+6.X.? ,.R...-.W.m\..o..0g..i...h..W.Z.i...2.....o.&..@...-.B|.K..^.....u.}.M..6...,(...e.V.X........nkE....5.8....-.!.TtRxs....Q..2}.-..`....mX6i.w...
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 164 x 89, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):4190
                  Entropy (8bit):7.94161730428269
                  Encrypted:false
                  SSDEEP:96:GHfueo3dRLZKOSYDzGsEgfB9nqS0WKt/z2jOrrz7yrT7N:8A6AzZfBtqS0WKNC2vyx
                  MD5:8B3AEC1986A522951942BA72B85CCAA0
                  SHA1:7E0DC78FC65EE4C804A4B0C72AA53E2DFDF26C14
                  SHA-256:8B02CEC726DECF033B67689F369FDE1002ACFD5F8C32E0F248AC575997204F2F
                  SHA-512:8EE1A1F6F0023EB4F60760C2E23EAFD56E6D298CAB49D819CF1D62C0CCF608D4211D3767856255F7CF8FF45AD835FE5475EB92C608989C522CD48D00A050B189
                  Malicious:false
                  Preview:.PNG........IHDR.......Y.....?.......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.]ip...fu.VBBZ..V'.>........CR......?r...pU\....v*...T~.U)0..('`....."..,a..Y..$t!...D...Mkvf4.VhW;S........{...zZw...i......fj..$..7......[Z*.[.[..Zk...?.t:M..,..`.^...X,..sUK[..Rg.=$..!.3<....74...iY..i...k.,.fA..Z.n...`G.%..H.l7..7J...u.R..6....E..!....N@.....M....Q`...U2.w.WP[!fX......c ./@7Mz....^...k.)....v.Q`..z..1A..P.{...||...vY.....>.`...K...m.?CX./v.8.....]..;...6..kw......N....z.Q...f..q..xk.5....;.?.Z.c...`......4....?.....VV.u~..<_......sU4e.....g.c.G....O/..r...`.G)....#d5.O..w..{....twL1l.)#&hF..K...M[@.Dl..V2..j.3..s....3M.....v..!....V..c..B...|..e.1....7.WA0.[.\.u.).$7f.+.......8..e2K/.%.Ii..`w6w.E..[?_.?.?..I.k2.s....]..f....HM.?w..d.9..Rr....Y.c.}.s.zk..rc...a..I(9~........m...Z............I........7.K:.:Bf.......m..1.......&..,...?a...c.@.@.g%...s.#...;..c6...g.lZ....}.WX.3.8.....W....N.w...L...}....?.".......;cI.............pS
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 162 x 89, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):4081
                  Entropy (8bit):7.943373267196131
                  Encrypted:false
                  SSDEEP:96:KQJAeRumk2zXWySlEmWL9zi6wknB4qLx+ppNhQrW8Oy:Ke9S482LE6wQB6pNeqi
                  MD5:29B87BEEC5D3899824AA390530CD47FB
                  SHA1:55108E8E5692E4444F72EE5CEB91915E7A2AEFC8
                  SHA-256:F00E4F1C9B1D9ABEAAEC8E5CAB02A07FD74F00ACE15E36C6F6469DE5AB07A9FC
                  SHA-512:1A5AD45BBA8C29C32CDD3C4D1E460C30ECA305D851FAAC73DF165306BC338337525680B9906D367A0CD3852B9D2DAAA8FD0603276BA969495B4E29C7EC8A3530
                  Malicious:false
                  Preview:.PNG........IHDR.......Y.....2.h.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].LTW.f..O.a.......*.....k...M.Z.n.q.h....ht.f.M.n.6..t.h.k.h5.6][[....X..p...?..g.`..7.o..of....^.ys..{.{...s.UMMM.(.l.@.l..R?.......(0+0.......5...*.F..#.].........1.....B[>[..a..L.....x...0.5t.v..S.h!.........Y....B..&.......f#.w5u...............0...x.sC....a.4j5V..Z..n....K..>...3t..wm..3hB.BD.P..FkcJ6.....O........7...S.........6..P.]mf.+o....w..<.......Y..Z.whd.....*zf+.....#."_?....`.._... qf+.?.?"k...zgME..j..!.k.U*.....&z..N....ma.......R.{.r0.S..KP..fU....g~..=..Q.n.*.* 8T=/'9,*.KDW...GN;0(P3_....1......'.;..;|.L.a.&<*\.d......o...Y... {E.F..}.e.\..=W..#..W....c./~..b.EWXI.#.''&.........:....X...b.....+2...5..6+)we~ja:lZ.d.Ey....l.2.5r........!.!._|.A.....j2.5.o.....WOM....V......GC9..'.... ....C..,._...cS....b.1.....t.........._........a.3..K..>V.f]...~....K...-........#.o.Y.P........a.7..,#..'s...T.....b..]..3..dPPP..Y.i...c.b
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 452 x 277, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):22634
                  Entropy (8bit):7.974332204835705
                  Encrypted:false
                  SSDEEP:384:5ojjyi45m1/9gyhgFsH1ud103Pl39o0qjfsH37mNHy7QPaNbZy0:+r45m1/BWKy10tN22rmNHycobE0
                  MD5:548D234C9AB4021CA5FAB7BF22502465
                  SHA1:2F7495D250DC86EA99473CC342D164B859926021
                  SHA-256:7D549C3418CD90F42571D00936B23D242837CE2A8B19FC4C719E182ECB2624C6
                  SHA-512:261523F5EAE6FCE2829B53AAC5938B1A0021C119E00CE82EFFDBD690FE71064E0F3B313ED1AB2F67A16C488AD5B1A91F5AF98029D88A7896F271C108410D42C5
                  Malicious:false
                  Preview:.PNG........IHDR.............._......sRGB.........gAMA......a.....pHYs..........o.d..W.IDATx^..i.=YY6z@..DP.i.IAA........l.Dd0"p0.ON.~....s>.?zbH8..%$`....b7..=....25*.".L. ..u_..f...j.........Uk..^UW]...u..}.{.]t.-.(...J......e...t.....@i.k......_.(.....@...Z.6J......2.O.-P....._.u.=T..4p...e..q..5^f~....@i`....?.....@i..k.........?...u..O|bN.~?MbT%...@.LO.Or.`....$..y.{..o....~..(.;......SNi...6....w....~.{..^w......~.S...g?../|.O........7_...Oj....|......40......9....?..<.3nw...x...g...7.....(<.d...(3.K...;....\..:...'.5.....&...>...t.;....8..SO;../...._.}.{..D.jt.......jc...s..........Z...0q...@......Z]S.(..o.....Og.u.l.i.-.9..)j..~...5.l}..........G......k....Z..c.....}.c.?.\....t+u...15p.....[|......2..;..;...........w...........v.7...I.-w...K/.J...[..N.....W..U#...._.j(...//z.|..kv....];j|../m....t.9.;-0.:.4p..@K.....~.9.$qu.E....!.9|.m.+`).|......x..vak-].../.....G'....4.>B6$.......-o.q..L;*.N+....>...=.!.Y..Q...?......7..,....}
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):17289
                  Entropy (8bit):7.962998633267186
                  Encrypted:false
                  SSDEEP:384:ruwwXKZuqnOnZprU3+OXBruY4UkcY+TpI/BSqCrEoMXMEr3KbzHIDqqAmk+xob:tGcxE4PBruV3Uy5SqCAoMXzrQHoqAk+m
                  MD5:708E8EB906BC105CCA0535AE669AA651
                  SHA1:38D82DEDFE97D3001188C2E18FE13BD741FD520F
                  SHA-256:1C3D07765294566E17270D0F3B9257A3DB7905D4E7EF746AEE80CD591CE0308F
                  SHA-512:1EFC74C28190DEE2D2732390B74049A1B120F05EFB8DC6925207C6990AD20450FFAB40249899A9DBB82E8F92A61F770E120A450CAAC7F8C5F0742586CCE0EDB6
                  Malicious:false
                  Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..C.IDATx^...Uc.._"oB.Hr.m(.0......r..[1.D....R..q)%FBDiB.."w*.k.Jz.Y..l....>...9{.......g..Y.z~..k?.z.^k..+V...! ....(.....\sM.tD@...!P...HW.S....u^.....@.r.^.....B@...U.H.J....... }....".....>....! ..A@.4..EE...! }*...B@....i<8.....B@.T2 .........xp..! .....d@...!......(*B@....S....B ...O..QT........! ..@<.H......! ..O%.B@...x..9...C'|..{.>Z../~^.s<<V4..ujo..v.Z7..EwT.....@.....?.......~{...K.........C........bB@.$.....C.{....Kf'S.....T.*&....@<.....'..D`...;~v.DT]...r!..>....ru...}.....#uG.T.....>..z ...3v....P.M.....5.@<...?....F.}..c.W[.._!P...O..>.M.d<..J....E .}ZZ.+.5v.p>..N.{B....>M.Nzfb...OB@.." }.D.y...IdK<..! }.:.....f.K..bX.T9...&T.&?.VB9.[B@..@@.4..1}.4.@H..-!..}..~M.<.z..I}.G....>..S...N..@yj..n..s.d._.....(..R"....Wf\.oO.^...\h.\.`)...ni.'.].vk.1-.k.^....#.,}.{.RM...~Z.S.. .@U!.&}......h...{K..@.........W.8.N.s.Y.0)..f+...%4.......5.@j.):k.+3...I..(
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 452 x 278, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):13737
                  Entropy (8bit):7.916899917415529
                  Encrypted:false
                  SSDEEP:384:jgxmx2Fa/+76A6M6Y7rSYRv47cwbkkapeIiRmDGd+gUwOSpQ:KgyoWrJWRkkRXmad+gE8Q
                  MD5:830632032C7DDBCCDE126F4BAE935540
                  SHA1:9FEF1DA9FF1D7762B779553B5F873BE54C8D01EF
                  SHA-256:2328D09EC845433DC31808FD6B12616F1D28B9B3BA7DD969ADEB6C32D8EB049A
                  SHA-512:5C17EF9A0063499F2C34FAB2C4D968D29E20F20868921FA914E5737995AA0C166F224995109FF7ACA57B5B0F8647715DC670C4AEE385F61B5F8E6E8422C49EA8
                  Malicious:false
                  Preview:.PNG........IHDR.............w.pl....sRGB.........gAMA......a.....pHYs..........o.d..5>IDATx^....E...,"o.....&....AY$....AE..".l....+G.>AP@D..e..".".A.Y.@...K..IXB !..!..c1.On...===3=.3=.>9O..u....w.z..-].t9]B@...!.......Z...B@...^G`.Q.&S..u$d....B.Y..P.w5[]......B.m.D...! ..@...Ls.Q"....."S....B ..D.9.(.B@.....b@...!..."..@..! ....T1 ........i. J....B@d....B@...4..%B...! 2U...! .r@@d....!......*......9 2..D...B@..L..B@..........D..! .D...! ..@...Ls.Q"....."S....B ..D.9.(.B@.....b@...!..."..@..! ....T1 ........i. J....B@d....B@...4..%B...! 2U...! .r@@d....!......*......9 2..D...B@......5jT.@.{..O.;k....>.._o.+......{V...&C..(?.m.....F....gd.....?.....3u..x^L.1n^...@../.....XE....L..!...t.....L..B.).=..sn..U........@.O..$..o..L.....g.(D...(....Lo8.....,....f;o..i.f.h.9........\./..[W.9.....+....,X..+.d.....Xc..7.p.m.Yg.u:YO.V..l.t.].Z.g.U...]...5.^..._.~.WL...o.3f..s.,Y.X.7.x5...K/-..._.......{........W.(Y....?...!....W;.....iwNMW.............@+Q.5.#.
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 185 x 76, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):2332
                  Entropy (8bit):7.8822150338370776
                  Encrypted:false
                  SSDEEP:48:jB5Gg4vMs30WIn5IVeRy1bY7DqbqQBAeNjukXlN4AXat:PGYuEWV/YH7e1uA0AXat
                  MD5:91CB7F1273AA003076401081B8A22237
                  SHA1:5157144069E7D2FDAE60B397BE5851E75BDF7707
                  SHA-256:80682DD6472E8D1136BC5E20F6DE87B595562414B19EAB8E965736FE992921B0
                  SHA-512:5A8E3C0ED0DB94BFE359C63793F12F3D7B3C37F3A13A5C96634BA1DC8C9E50FB1142FE4752FD9FBFA39A682F78C54AF868AD337EAA787801FE5F66D8F55A8196
                  Malicious:false
                  Preview:.PNG........IHDR.......L.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.\.LUe......Ji("....9....-.."..5L.Y.Y.....$350.."2.lK3Cg...T..DWZ.......i.?!<..~x..z.......w.sw......9....s...w..l6.:....p"dH...F..B<...qE,R$G\!..E..".).#...."..{f.PyI.d..l;....;.=.S...O.S[.\Y^P.aj]9*Y!. ..~..#...S.s...l..h.[m....%...P..@.kG......G..X.r|%..AO.}-..G>35..c....Ac.&[W.d..+...zG........=..l...VS.d..+...tGd..k-._.....oL.:}.p.~.W$C..|...I...n...~......,.i......e..=..?{......>r~.Lw.+2..\w.)w~...c....h..u..%...PE...f..'..m.ZE.1.\....U.`X......$...P%..UH{[K..o7~.k.49..W.t.~.^_..7.,....f."q....+....;...~;.c.......Xb.\?...........0h.lV..WX!.....ljm.1c..U...[..X.)......B=.0~..W...rO..j...ehI5U:..66V5sJ.....V...]Y>...1kQH..2.........d....S....I...+..].p.....m7...Z....s.D>.K/]..?.l....2..=..~.mq..".+.....,..8. v.o.).Z......>..Xv..i...TA....M.....>[X...Y.7lJ..e7..S.....02q.O&9.......:L....N.......W....d..FqE..T..N.....R....kXv[..j......g.K.\@`.M..B}8n
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):11332
                  Entropy (8bit):7.9324721568775285
                  Encrypted:false
                  SSDEEP:192:vpXZavBpl00n1Pt7JquG9GYHDK/5cxektxMQjcie9ZZkx30eXJIb8FKRN:vpZaDyc1P1Je9G62/5clpjre9nQkeXJY
                  MD5:31579CA3352DF8FA4E3E7F48C7CDF672
                  SHA1:AA682A3C781BF8EE43B5EDC9718E64CB79135F25
                  SHA-256:B0E7824BEE2C896279457D87E61E902431BEB528D830524CC4DFAE126E89FC24
                  SHA-512:782FF9492E3ECB11C72D316DDD94D1F3E94CD908FC9452A37DA6CA30ABCFE9AB2BCCED8583A569DA68626BCEC730408AF86997E295637BF64AFF5BC768F3E309
                  Malicious:false
                  Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..+.IDATx^.{...u./-...&....6..+z..Q."b*. &M.d-e.*.. ....J..Z-T.Z$....R..F...%*`bn..<.....W.E ..w....^...;g..[w.5w.9g...3......t8t.P.?$@.$@.5...=.8qb.... ...5...a=...#.y. ...@B.....am. .. .......$@.$`.....G.B.$@..S... ...C.zj.#[!.. ..).......!@=..........}..H.........VH..H.z.>@.$@.v.PO.pd+$@.$@=e. .. .;...v8... ...................f.o_o{....~t...n.S.N..?..._..L;J.H ..,....7.}...|....7...b...|.........ObVa1. .?.X.....~.....t2..V>.b.}..0.F....%`GO7.n#~..F....K.~...FX..H.^....k.Z/.2v.W..M.<.;$...v.t..,UO.-]............D.....o.J..Y........5.%.l....{.....'O..dC$....=uks..;{x.,.N.=.."..Q]..w>.E.H........AV=...f.&. ..ip}._0.~[pf.`..9..v.W.,..2.E.$P........+...OcC.H..=..|..[..g%(h.....W...?...UDh..T$..?....|.]..)?[Wo.h.'..2P.1..!.......$.NO.5..}...c.;...~.x,|Q....B..6.@>..y..}...m...D~z....L#.0`_.`.s?|....I.....a...=N....c.._.2.._..6 .]...5....{.^>.lM..;n...k..9J..S.G..{.
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 167 x 92, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):4181
                  Entropy (8bit):7.943341403425058
                  Encrypted:false
                  SSDEEP:96:b6JWqvCl45Da8kuGzhRwZvwIutfij19MQ8EpW14LBGJVCq:b6JTCl45DalsBws1R8914V5q
                  MD5:817D5A35EDB2B0E052194D4F49FDA19C
                  SHA1:FA6CB2016C5F43B76102B63D60359139227E07EA
                  SHA-256:0A87B8418B7F8E6E117BADDA11D7CDD38B8B7320C6BA3D3E9AF93EB9ACB2CE14
                  SHA-512:E0686BDBFC589401F0EAAE2B1598199EFA285F8392742B1C928B9274088804B23DCB584B6FEF68CE6D7E54DFF9C10338104F4C0F3F80A04471F0B2E8F9935CC0
                  Malicious:false
                  Preview:.PNG........IHDR.......\......!2a....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.]iPTW..iv..D.....%DQ#A$...d..h,.T~..+...TM\cj*.)k.fj~L~$...L&...,...:.FdU..f_......._.n.m.....q.s.9.=..w.9......$..b.*..%....@A]A..%..<......l.h.+../..OSe.....]...>..C........^cCy.0nz.4<......g..?~..>.1ws.B....07W65.74T....=..v.......D....6.....tR....}]}....4z..^....7..;.."......^.....|=.#.=.32..o.<.Tn*Q....g.zN...n*...!/.........!....F..]...6...m...CX..~...+..U...E.|.........7]=rE?i(..$`e.%.`.....w._.Y...l.1...@....t.P..=.}..*...N...N.|.xS.5&.....Pe......Z.Z^XJkx.....^.....?7..._....Wsz......}G..]...\.....,[.y....}.J....'.R?a...G5..l.i.?....MH..l.DC^._.c.m.....%{;z.&.*+x;...S.....zxyH..`.._]...el^........U.T..^..p..z[.6(2x..,#;o##..}Zv|Z..............V.....0}Z....]..m.....x..).k]&e.._.W!Vry..%...I..d..}w.....^..\............m[.^.3r.......-8......j....>...Q..T..{\V\ptH.?........1..w....FHl...x.....\.`.ei.w..)`...g..V{..Z.....8..........o.._..
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 221 x 77, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):2599
                  Entropy (8bit):7.903700862190034
                  Encrypted:false
                  SSDEEP:48:PmCwDJh8w9JewaF2zQNXXj8zq1KM43sxXxjYbTgJW1MFsrJ075CawGjGj:P1Ah8UewaFcgz82Kx8xXNYb3id/yj
                  MD5:E88131C9AAC52649FF044905ACAB9B76
                  SHA1:34AE73B9165CBED0DDF33AC20E4B3E7D622C19BF
                  SHA-256:30F22340F582F9A352A7ED3048D1088F178E83CCAACAC1CCFD86852C8F9C78E3
                  SHA-512:97AFE8F3A2A3138613934AC737C390A35F6757BFC3D381EA7C7CD148F739932380DCD46D0BA6F590C274F8BFB4D4286B3C0433AA69E090102A8A9ABDD7C97EB1
                  Malicious:false
                  Preview:.PNG........IHDR.......M.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.]kl.U....B|E..>...*..Q........b[.K........m.(..... ...!%1%*-B.C~(&`[.....-.....~.w3..Kw.3wvfzn.2{..s.....{w..\....!.3..:..!..../..zD.x...O.K... ^.1*...8.G...z...D.$...........>!..V..`v.CQQQ!..-L...../3.2......ZH.?s...Iu\N..,3.?.p..N......<....E.<.=z..Iu<ll.dX...g....+.{X.p.....:..t...a...cKK.|...Yszl.N.:......KPs.):).T.5...&B...*..5j``@...(_r.V.j..m...?x.sg...t\.dz.'^.=.\.h..<.y....:.I...w..ze.m.\.qPJu.....D.|..@......W..t.+.....X....e....\H+.Ns%^r.VS.N.3:...&...._..#^....d! ..F.....xc..M...q...17.z...z&C...K9(.Ifm.35.v.>.'X,...p.:=.H...J.K.,...:~...7.t.....R..R..9..?....l../.(...0z0.M.f.)H..Y_"e......B........L...q.K......|;..L.........xI.K3.M..%........./..){....R....s...7....).q.._R.4O.a3......<..%....3#.|>..y...u...R'.P..$Klz...........,...g.....`.7..\...x>.{p\;>+.,.....e.-..Re@.N..FY_....*....]}...[..h.M.oq.S.U...c_}`......8TP....
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 232 x 50, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):1570
                  Entropy (8bit):7.780157858994452
                  Encrypted:false
                  SSDEEP:48:r+em8Tlk2APr2fEd72tTqiVJlcLzqeVzYwS:r+erTlk5S+zoyGahS
                  MD5:EF9AA5B2ADBE5DF68AC4F4D716DF7708
                  SHA1:363B93AAAB9DB2832F6CA0EE3C27C9310C344BA8
                  SHA-256:3D94FCC4821A135ABAAE6579011441B94F9C04DAD1E66BB5211B0C019A5968B9
                  SHA-512:EC9B024AEA46F7B97D14F0A7E12704D09B85F0017CC9E273CE50F2F889DFDAE81DE549CCD546BBB8F8BAAAAAB7781FEF77BF783E02CCC9605304552F7DD5903D
                  Malicious:false
                  Preview:.PNG........IHDR.......2......n.f....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.[MK.W...t!.fU..b!....*JBA......%-.F.4$.Nw].....E.$...)T......?@.O{...3w..y.=/"o.9...<.y...X....c.1P6..e.lx....0..J....e3.&\.@)............o.*>.E,;.....~..|....Z.3`K..W0S.&.L._..M.e.`..M.....i_.......\...6g..^....4..L.Y.9.$M...4..L.Y.9.$M...4..L.Y.9.$M...4..L.Y.9.$M...4..2.......q...&...........*.Qg.+.p.......a.:.X6...o2......A.....[).,.p......P......_..>......3.......z8j............>...fww.6....../....S<......^%.4........{.N$..`.!H....`........a..(.G^>~|txx....K\mF..'d.d:9J!.....j..i24.A...`O.......s.....?={....H'._..~..O......*>...ZXX.3...;C....\....%..s=...w<h.......0....~..y..._.......+.n.P.M]c...A..Er|.R...$.g...9*._.jg.....x...&+.JWM4xe..^....0...11.[.....f....r#.h.h$....[=t >...r....L.0.KL..B\..x........4J.0....vY...\dA. w...........g....};.}.....;.......x.|.....)......x....s....N.$.n..g<Z.q.a9.C.....oX..%,KNNN..i.8J..p].1....B>{......n.D|3t.-\g...Q
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 340 x 79, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):4490
                  Entropy (8bit):7.928016176674318
                  Encrypted:false
                  SSDEEP:96:WXKr7Xwf6Obg+XaGOnsjbbGSb+ydWtRvEOhDE6XqPeosv02tR45boo:3rTUgXZnsHKSb+n+8DdKlwm
                  MD5:7F161B19B937AB48D4FD2F6E5E16FDBD
                  SHA1:BDCE4F1C73E87E609A7FDF245A512CA4F73B35B9
                  SHA-256:C863C5E71D1116D69561BD0637F4FE4C4240E9CED05B8A5B056073AD13E6495D
                  SHA-512:E915B76FAAC9512D2AD11CF4E4530A19BEA1C7D8508BC218C69CB041F1EEABA3E2E03B1D56E61B032A6418829752C21B8354AF1335466D7E1528A06E6742A461
                  Malicious:false
                  Preview:.PNG........IHDR...T...O.....;.......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..p.U..'...rD.WX.... Q.. ....."$.ZHP.Z...C...........R..%G8R..... .R.C6..A.b...0...^...#..g..........z2.....nB...l..X.&._.a,...a,...a,...a,...a,._.73'N..ukeee.6mZ.n.m.G.}...n...a.9s.DGG....y...8??.o.pE1....Y.,......).ca.i.M.:5$$.........Lr...ye........6...8...z.-r....d.(.xc..U..^11...._>.QX..y..2...T...sss1..."A.?_.;w..S.F>......4.G.......D.|...@.K...............C...k...P...q....6.`QQEE................7;;;.._\q.k.|...\.z..6j>..n....Y.&G*.n.S$))).....r........}.{[Dv:,..w..A...`..........a.~.N.f.s...P...*..'7n....eK....+.n;:.W..C..9}..O..D.q..X..5i.s~en.c..F&..?.....l.]3r...W`..#..7o..R.@^..*...W..?}t...{.B.8..D...UPa..~..C...|.C].a.9..R...c.Y0..9.u...d...C.......X.U....WK.....5...'..PM.`...<. ._.z.F^^.EH.K>_.0.d..S...Yj<..~.5.?l.fZ0.@d.....*..G...K.....e...b.|e..Q.4.....('z...!G.....2..XQx\......X...2.\h..X~.e....Z....=....C.1.......w.....d.z.
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):11449
                  Entropy (8bit):7.91552812501629
                  Encrypted:false
                  SSDEEP:192:/zgGDSJ0ke0kBER0C31jm1OSZi6/ccccccc3zzRmKHDr1NFnAaLJ5rBX8iaD7:/UGe6m7XdJS86kvRBHD5/nAa95rB9aD7
                  MD5:163E6791C87E4999C343EC5E23843B15
                  SHA1:43CE3BAE19E22876483A7FD0E93DB45790373600
                  SHA-256:DEB2B126977EA150E49CDB3ACF4F5387639C7B7B5583454EDF55ADF83DFAB720
                  SHA-512:98BE1F4684F99A9FD2F313B09A113B5C310EC8BA8EB0EBF5FD69765E5B48B001D39999E3F25A7E76C7344DCF57B4F0BF2E4614FB0E0DFCCB6F02E6D1CAAF7FDD
                  Malicious:false
                  Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..,NIDATx^....E...@^.T.....H..$..(.!..3....O=Q...<.9.`@E...CE.(""..H.$..6.......]3......tW}U...w*~....W./. .. ..........m..H..H... ..........'...G...W.=#.M.$@.$p...........!@=U.VH..H.z.g..H........H+$@.$@=.3@.$@.j.PO.p... ...... .. .5...j8......PO..........o....+.Z.Pb.FH.......D.g\........._..'0.......9.>............&..PO.z..)-..........R....'@=U..I.&.g......../....SO.\.,._.@7Q.g.}V+../..Ht.I=..WZ%.{......_v.....%U.)^H(!!..q....|.H.E.DG_....o../...T.i...z.%.4K..# %.-.(...4J`i..,.P....F.D.zj..#..@.).(...o.....S..)..i.z.g...h..8.......A<d.z....<...n.]...E....(Jj4P;._.N..Q...)..8U.u.e).j.e...E|.]."..t6.[.K..5.6.....B..(.=W./....S'.......z.FY.. ...PO.".tI...F...Q....c.o.....}...r>..3c9I../.......}......I..G.|..|...~.b.e.5.OGb..o.....w....i.e...5&.,Z.H......g..KY.<.nZ.x...HHbdS.Z.\.O..1Q.K...9....Z.L....\g#.._~9###%%.O.>.Rvu..C.....S..g01..j...?-../...Q..N.:._....1.!
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 220 x 170, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):7374
                  Entropy (8bit):7.955141875077912
                  Encrypted:false
                  SSDEEP:192:IfGsPejaVZWzIZKpnFFt0HK5+2Y/SLopWR:IusPe278IZKpnzt0q5+qVR
                  MD5:70DAF02EC717AB54452FA4C707BCAC74
                  SHA1:30F46FAC5E96470848C5A948162CC12455A05154
                  SHA-256:58469BA93EA36498FF9864EB54713A001C52106DE97804506D82EE24B816712B
                  SHA-512:E599FDC22A32CFEDBB23EECEAE0B278EAB9A90959FE6ACB40E2B201E45A7C19261AAF529E7A0D9CAF2A9A4C64C7831343F3BC20810513990AD5D38A32741564F
                  Malicious:false
                  Preview:.PNG........IHDR.............IC......sRGB.........gAMA......a.....pHYs..........o.d...cIDATx^..S[Y..I...B..`...N....t.q..j...+LU.....O..sF.!.I...w@..H.Q.w. ...s..{B.....2......i..q..z{.}^..............J.fQ.....r.\WWw.T....amt.t;...6\N.........z.n...].u.z..Q...?^........;;;;:NO.}.c....<-...........({.^....t.k...F..[m..:........R2...%.y.l^OOONN8)....\y....}...}}.}.Hy6.^.a.....\...!S....K..|>......s.........l..P...LFWW.l..RK..b.h.h .3.F..|.|..~..........e.aa.........0H...<.Y.a`..xA!...7.X....xd=........h?o5........Ay....?6...........*..tb.9.*j...S`](.,P...9.2j..?...z3wD.[......L3.Ng2G|.......&..0ZK1u8.H.2...Z../..P(....BA..aL|..a.Y:.....J...5^x..'.\..&S...L..U..;....<{..."..@x ....J.N...;....WIht.<..B......!HM...&z&..6u..hF..G.D..B..........A.....n...GG...,.,.Q....X,`"....r.........3d.{o.(/...3.H...x:sX....h.8... ....r <..DB. ...y.N...o....5.......L&w....v....w..D......!.a4...."8.U.|.0m.(..zR>..=.+.L.....e....Yd2.-Z.7..D"..pX.I.....e5qYa._&..3..J..++
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 651 x 254, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):19235
                  Entropy (8bit):7.944867159042578
                  Encrypted:false
                  SSDEEP:384:h4iuxL3Yck5lpMcTyHOypEod/G38lJxqSp5BCU:h4/xjYc2lmcOuuEoJM8fse5BCU
                  MD5:AE32E846559D576FD263BD69FEDBEC28
                  SHA1:D481DF71C858BAECFE33418002D368F2DCF68D4A
                  SHA-256:6E21222B0EADAB8D3CFB0C7D14941D196165D6709271AF317D099F12403CD352
                  SHA-512:9AA4A6DD01D3B745D674721765F2BFCCAB584CA0603F222EDBE9A88190A2A57438041E7A3706CC0656A6ABB79AA18118319F210EFFE3DD917E7B94A6294BD346
                  Malicious:false
                  Preview:.PNG........IHDR.....................sRGB.........gAMA......a.....pHYs..........o.d..J.IDATx^...X.W....D..A......bW.A..[..5.F..D...7.ob71.....b.."...("...(...{/...e......}.....;...S.X...H...@d...... &.....b..... F.....b..... F.....b..... F.....b..... F.....b..... F.....b..... F.....b..O.KVfVfjFzJzVF.}i{.R..l..q..`I....e.'./.'.G.z.*!&>)61.UjVzf..4>Q~...U..=......s.\..WE...2...t..`F....M....'..?.......>BO(m.V.P....Gy.../........B.6.......=|z7.Z.|hQ..u..j............&..Z.bo?.u...S7.G>......]I..7.i...3....<.y.l]....SI>...L.2..<.....[.'=M.Tsprp...T....cE'*..P........eefQ.NKN.x....:-#5#....q/..xq.YzJ:.T.*u.j..S.C=...|.....2..(YF........|...*.7t...{.jz....W..Y..{...nlfj...L.6.[.hS.=.....(!C.......?5..+...[..a.:U.K..C.......w......+..r@.z.7..j..qB..B.....X}..=.fk...>^5[....n.z....wn....Z4.._iWG.^..z6./]t......dhM.9s...Gbo?...U.V..tj.......*&)Io.{q.G...A...l...i7...&....d.E]....#.W.x,.T...&Mz4+].4.$n..F..x...<.ppr.............y.,i./..
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 59 x 61, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):2210
                  Entropy (8bit):7.86853667196985
                  Encrypted:false
                  SSDEEP:48:naUvGemgl0W5KMDRLEbGAnaHC7ew/fkDSCcE5FTaHWc:aerVlDRIewkXlrTa2c
                  MD5:73E38124F94AD20A2F1571FBBE11AEEC
                  SHA1:87FB8056DC7A0A3B70D51426771C4CCE2099CFE5
                  SHA-256:A700B63B30CBBE5230CC5E977D651E178EA87E73EAB18C8D5FFB1362149ADDF7
                  SHA-512:320FCE64DD6F975384BEC9267348CD5CD24A55B13BB09FEF1238C2216AD8ECABDCCC15601A079CE092ACFA4954829FFEB06FBB0631F6AE26E3A39E43C102048B
                  Malicious:false
                  Preview:.PNG........IHDR...;...=.............sRGB.........gAMA......a.....pHYs..........o.d...7IDAThC.yL.w...r..r....... ...Eq.nnN..i..[.e...-.d.M.dn...x.xmQAT.Q.RN9..EA.k..P`..=}..m.&~............oy....k...}}x..[....g59.}]...~i.SY......."....7Ow../......2...3f)n{..R..R......U?......O.{....c..pT.\.t....5.07.. .....07...7.o..,+.,.V.c...&..%.3I.....:v..\....6.....??..[.N...........nz..Z.B.........v.prs.q1V1|..=':..`.bz..%s.cf.3..RyMNUeV..J.k.}D[~xo..d..c...sO.y\....B...c.07......Rp..J.......{b.......;u...s....N.gko.M...;6...6..c.X5.S..o..\....^).....(......y.72.^....s%...[.q!&Z....C-..+o.....I.....,Y.{......g.1.0..I}.....<.....T..}....t.!x&)..[.7....4.5..{....n.<...#I...:.....r.wW~..zr..9k.^.]KR.*W.J.n.")....%0...)...Fbb5`4'.X..E.../.t.&,t(...@9....\$..........].P..jdU......H;.$.'%}.l7........y..$.....Z..4.Cm.u#&.%N..1..+..8....y...U.(.T.....}.I..5r}...!..K....>f..3.C.G..X1.(<.Gb..b(....0Qv0F.......n.z.s.Y......\.,.h%1...QU..%.}B|CW......sO..\.=..&3...,.
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 127 x 138, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):2232
                  Entropy (8bit):7.837610270261933
                  Encrypted:false
                  SSDEEP:48:dFQY2WmQbe+TukEC2KgYPsWOuWFk792oP/sWtGOK9Lc+rD0NTHj:3L+wKkEOgx3PG92Eqt9LczFD
                  MD5:EDB5ED43CC6038500A54B90BEC493628
                  SHA1:A8CD63F3914E4347F4C5552FB922C6C03917F45F
                  SHA-256:9F3312E33EB78C6952B5A5D881BBD18751FCFAC41D648C6F053CE781342A504F
                  SHA-512:4EBCEFD69A4C249AA3B0F00A954C4E463DA22FC9CA0B61A0DC46079B438138C509B22188D966FFF6599A3A604858BC4CC8FE6E0685A764E8E0477AB7A237DB32
                  Malicious:false
                  Preview:.PNG........IHDR.....................sRGB.........gAMA......a.....pHYs..........o.d...MIDATx^..hVU..}..s:..6..9g.MM3...j...*........A..!.A.....R.Ai%YH..(M.".h.cf*.B.......:...{w.{.......y.s>.{.{.=.........#.y..r.K...K.0}......Y..b..[N.=....j.=........!......./.6....B.8....p....5P)....@......=}............^.~..@.o`n<.q.....Yw]..mg\V*...y.W.T.>...\n...s.iG.~L]..d.<.8..j<.<1..4...CZ0...}...........oDDh.....]3}#"B..O........0}B.F.L......5.f.FD..L....5.7""4`..p.........'.kt.....>!\.k.oDDh.....]3}#"B..O........0}B.F.L......5.f.FD..I..x........Z^...>B$1.N"}4.....1:&F8..*.X.yL(..s.3......~2.EL%.w.Uc.zJ...B..S..b.7o|%..7..'.....N.|..Vi...q..uO,`/....\W{..y...&iI..|X&T.........-........Z..o.~u..U....cF.M....O4}......~......:T..W.._s...t..Dlb.$Pr././.._4.b......R.T$t..$.>hB. +.{......m.w .Q...05..C.}...}.....?..h.....Y .8.6^t....}.y.%......l=$..[.~..]..h..N.......*....SB.|....8..H......_...G...|......;6YQ|WO.o.}]..'.$..oE.y...i'9.[cmS..@m@.Q
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 742 x 104, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):13030
                  Entropy (8bit):7.948664903731204
                  Encrypted:false
                  SSDEEP:384:/06ULmwT2RqfILhmLy4tNpYGL0mvBQhTMHX4PCIVYm:s6USI2RqfGhmDrpYM0ofHX4aIVYm
                  MD5:17E9FF9F735102231846936F0E2BAF1A
                  SHA1:9EC1AE8A3AD55C48C02427D842D6E38DA85B5145
                  SHA-256:DD1CA8DA90893E0B63ABFDD9E60CF2BF844B311964E9D9DDB855C21FCA156EBB
                  SHA-512:71E690D6C87B09659296E6E6DDC8E3F91035DD80C5CE875FA557763E8138900C27FB492885291CEE203D65BCEE8C20C9C39E0590A5FD32B8A00BEB3E3F6D6E8F
                  Malicious:false
                  Preview:.PNG........IHDR.......h.....2......sRGB.........gAMA......a.....pHYs..........o.d..2{IDATx^.wp\.....sN$...$.).Q.")R2ei,kl.%....r..vm.x<...\...u.U.g.ry=..uX.cK.dI..I1G..$.".Fg.q...N.nt...3.w.w..~.v.O.....K.....A@.....A ..H.n.D;A@.....A@......e.y ..... ...1..P..xH.. ..... ..e.9 ..... ...1..P..xH.. ..... ..e.9 ..... ...1.@.$9..S....A@..4....^C..F..VR\\TT.........aHII1......VS..g........... .*....z..|Ek.......<R../55+33;;;+..Y..WC..#...P..... ...s#0::......522...,.v..D......_.....9.2N.L.'..F$.....e..!..... ...N...`1....G.....'&,f..f.X....!.lp......I_........J..z.R,YbYd&.... ......~"b\...b.Z.SS.....c....&..Yl-............... ..[...BY......... ... 1..Z..6NN............._.zw....MKK.Z..vMMnnn.4.v....,q..e... .D%....Q......._..p*M......22..e...k.}.....qU....S.a...~....P..}v.. ...1..2...F.GCC#...].=..C..n#...K+..MOO..........."....d^2=.{....U.p.h%.%n...D.....XB..b..'''....?h.b.B\v..^Q^.UC............Q...I.....U.VD...P..{.2"A@...b..V...........jF.x.
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 563 x 211, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):14458
                  Entropy (8bit):7.944094738048628
                  Encrypted:false
                  SSDEEP:384:uuT43eqJy2jEeSZE0onrAFAOpn5ytFfNrfIkBQTYz8ynth2EB:EugQeS+nrAFZ8tJNrfRQM4ynH2EB
                  MD5:7CEB71F78A193F8C9F7FFDA5F81AEBD8
                  SHA1:EEC1597705EFF1A527C246B86A71878185BA6B1B
                  SHA-256:77911FF7AEAB8FCCAF36DE6E1183FFE1A6C27F77B5714EE780976CE5189E8FD0
                  SHA-512:1D1AB19B64E1E2ABCA61AE78B3B50310B0A6CF19D2ECFCB4499D8D0BF68600B4D95BC0945EF9FF9B1D016ED61EAC518DCCA1A426F460317C07AD51E2E047948C
                  Malicious:false
                  Preview:.PNG........IHDR...3............>....sRGB.........gAMA......a.....pHYs..........o.d..8.IDATx^.}.p\W.ZRKjI.}..[..M.l.N..[..O..B&....?5...@.5.5EQ...T...d*U..*.C6....8..}.Wy.e........k]s..z..^...T....s...}:.{..n..1.."@....P......."@....p @f.s@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....5 ...f.;.0..7141...L.....M.3.L....{M.T...I.C...@E{.w.Y...q.....c3..gf.3..'j...I...{M..@..4555==-...!..f.....d...>i.%&&&%.u....f..[......O`.......G..E6I.< ..3.k...',....Y...<..........u...{9.......S^^.q.<..^....2.bb.E`r...ey........ ..3........Dg@L..a'.x&''.O.Y..!e.c%$..(P__.d.....Sj..S...BLu.[g..mK.SwVe.."@.T.@P.y.........=....40..L...$d..J....cccw...^.RBKKK...heJiS3.0I.X<..}..*O..........QR..q.5GTA..ht.(^.Hno..n.......wvv:..K?.\.JQ/i..h0)G..1Y....K.>FT...8..d&..,+-.T.b.........f.."3.V 6.:...E 1...?.Q.6....A1Smm..K...V}...:.uA'.$.v.cy..<.`.Z322.r.LI.....>......&........"..."......@.Ccccee.[..z{..fL5..{...
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 123 x 103, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):1657
                  Entropy (8bit):7.80882577056055
                  Encrypted:false
                  SSDEEP:24:q3kLWZefR0kKbfLnNhzzt+acvt2x6pBs/j+7QJU0QbDQ883ASaoUV4hNgq1rsyhy:q322nN+X11GDsg8831Uyhi/vf
                  MD5:D5F7A65469623327F799B516ACBFFD2F
                  SHA1:76C6333C14AF3A7EA091819953E6E12DC289A12C
                  SHA-256:F476FAE1C6D79069239C471D182631AB343749C22B1A6990250465C7EC3738FE
                  SHA-512:351B9E455E97E6247E64E4BC1B59C9524E70AE0D09D3B6FB96937378A70536483B00426EE69C3590DD415A8265D21FD031B524B90E4E86814EC9AD704E57793E
                  Malicious:false
                  Preview:.PNG........IHDR...{...g.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^...h.U..p.T..(.eBR....2.....':.4kec^....0.&.....ugS.8u:i.P.F..f3...D....6.%...xaI.}...y..9...s.w.s..{..y.5<<<...(0Q.............t_..q/.[@.....-.e.....=..J.L.......c.4H......u?.XF.KJ..zb..0..f}..'J.,[&..S.6...w..9..._......<.........?j....H........>....~..}.n.8.WW..B?...?.b.;.....<....~...b...m....&1.=.Pq....w....a_3.k7'...\....d..z.O..w...s...Lh.x..........Q;40.i..`.8V._.@...rd.....kF.@<@..e......e....=mHB;....E./.\h.^....q..>.....%v:.O.:...&q...:.'e..9...h.iG'.L<@......([..|'.n.x...c....._O...[)......S*..Q...d......A....4..t....E..v..}..7...t.b....,/*|.H.]...8.. .@.(.;"..Kt.....].+.[LwJ..B]i.b.k.@..Js......J......6..J._LwS<@..J.YLwV<@G.4w.L..G...]..zu.z.h....;...W.IH..+...c...F....qI....Xul..]...N...wv\.M$..D...+...=.....?U....T..^<6../T*.{q.q..:....y..XL..l..z.d....G..b..g.G..b......SM.{q.q$MUL..R..........^\P..g...e.....L/yqM../.b.f..........J.<
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 163 x 131, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):4847
                  Entropy (8bit):7.950192613458318
                  Encrypted:false
                  SSDEEP:96:JnieMJz5Tz/gKVp93jQvcv16kjOzbapFJBkjcMNBqmQzOG8qx1QKnse8T:JieMJzph13Evcv16RfapFLxMNBo8qxan
                  MD5:A1A1017A6A7928761CEB56D1D950E123
                  SHA1:28272E9C7F816A1CE8F2033FC00F489005332365
                  SHA-256:72F066CD34EA71D0E1B28FB60D663B0372C5254E1A8239C94A164EEF9389DB88
                  SHA-512:10F4557F102230126BC86CD4B49C93365C38D5CBEAC51F4691B90D861098866A2BDEFEBA507731D4FA14367FEE430453BD716157F9074EF643F2B949B09E1530
                  Malicious:false
                  Preview:.PNG........IHDR.............n.<.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].\TU..}...E.0.T....L~....af..Z.....O..4..>Ms..Js_....5.E.d...Y....?\z.3..}.l..|?~...{.....s.z..Y.............E.X.6...c..u...y..W.j....."}...l.i.`.!-!-......MKH.E.bi.d...b.X.)...X4 .vJ6-...;..+/.->Qyi.t...%.T..k;.U..y.C$[;..Gm.......v..*2..2..eee..."!..)...yy...III./..u........2....M.:''...W.....o..t...._.6m.... .`,k.T.v."..q.......s~~........O....ed.[W0X..HB.V.i.....<=..E^^......MyY..vpp...........^6.....aQQQaaa........]^^nkg../_.d`.%......L&k..B......?C....W.VVV6660t.J+K.:..%q.....e.cp....Kz..%.qZsAR\T.!......>55.R.u.W\\.L....T...K..rE.U.K.-9......y.y.......K....>...HWTT.e....+..B.......%%%......^...|...M'.%.f!/..=p...{O..../...@...DP..hw8....7o>..A.mgg......7-']~.s.OE.E.|=.......'%!y.......\.....MSn.i.........!...U.$0S .......Z.P.}[.%X[.;{....N.....\......6O.....'.N}.}s.m...E..V..f..r...4..~.......H..F.}....4,.R.=.......xT..4......./...,z
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):1604
                  Entropy (8bit):7.814570704154439
                  Encrypted:false
                  SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                  MD5:3F1535054D4F9626F0EB10CEE47F076E
                  SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                  SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                  SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                  Malicious:false
                  Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 165 x 131, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):3879
                  Entropy (8bit):7.9281351307465044
                  Encrypted:false
                  SSDEEP:96:k1hccap27HGVhY2Kn+A3RS+HG3dXrjmg26vh:k1hccewIhYxRmR5
                  MD5:C451B2A146BDD7EF33AB3EA27268796D
                  SHA1:C040BA2F31342CBCBF597C96D4D6EDB83D473B77
                  SHA-256:4C264B2A6E88712234DAA8E3A8D630CBF4EEB338554CB0B794D8031F8943EE65
                  SHA-512:55915A304B261BC6F38F5CFE0389D5195F85FE2C1DA325019C3AA391E8B1773091E078A35BD57F8CEE0BA035956382AE33790EF462053FCE711EEA9665B7F917
                  Malicious:false
                  Preview:.PNG........IHDR.............c.L.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].p.U..g..Bp!...\.!.`pA.+....H.U..."Z..*U.. ..P.D.-.$..,,..$.g.......CB.l......I.g.pc..Lf..~.=.~]S.....w.9..w..'...!L..A ..^.t...v..s4&&&%%..6..`..:.G.D@.7.qS...K....[..,...o...p..2.%..B.Y....|;..gy+.[..,...o...p..2.%..B.Y....|;..gy+.[..,...og...}.W..z\?...y..;_t....=..e\.....6.M|[...B._....[_.\^Pf.....f.....\l..../6....<S.4./..m.......l....B'.n...O...yc...........X...P...k....t..9tf.g>....e..Sy'.L+**.]{..a...,7...p..+......K..y.9p...I{..i58....v..5.`Op.....{.......8.._.S.........p..).........;.....y...2...b.[>gP....C..G.H...........Osp...)..9x!...W.,..^....$r.p.sOJ.l..=.x.9s&:..........h.`..W"V..|.l{..72.....zv@.#.<.........../....F|...c...4.W....:uj@1...~.X............^si....Z..I~.Q.<.....NAOq...+i`.)...$L..gV.6#.....F$..hD.g.L-\..H._.u..]4......h...T.BK\\.Z222....7))..h...1??...~.-i=...X...~h....y[.............p.....x....c...{....Uh.7n.....
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):1604
                  Entropy (8bit):7.814570704154439
                  Encrypted:false
                  SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                  MD5:3F1535054D4F9626F0EB10CEE47F076E
                  SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                  SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                  SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                  Malicious:false
                  Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 165 x 131, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):3679
                  Entropy (8bit):7.931319059366604
                  Encrypted:false
                  SSDEEP:96:tT+LtoQ9jsUBsnwlDGThUe8ww2iJiGEjdKKnnE+Gh:V+Ltt5GwlDQhUe8ww2iJi7MKnnE+K
                  MD5:995CEACAD563F849C4142B6A6F29F081
                  SHA1:44CB3B867CD2917541B7D5AAED2F14F10FEBB0FD
                  SHA-256:3691FB8C60EA1B827092F05FBB1807E34726016C6FF56698D7B81C44D519D22A
                  SHA-512:3C8EFEB966B075D06D8344483352BF92C9292F9970C9377BE254EB355EFAF017916737AECCDC704B84D532B7229F9908951A6F2CC3FAD810791CAB224401AD3D
                  Malicious:false
                  Preview:.PNG........IHDR.............c.L.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^....W...Gh...k.Hm..J.m....,X...Eh..%.n.....PHvy$%...[...R..l...(/..-..yl..Z.h..H!.../.|.y|w...7d3s.s.=.{.s.g.6W.^..)..@..{..'O.LL.......c.^.6xS&O.,...J.(|?...............,.$......@.zk....,.$.........)..7]O...mH7..0..|..&j..t..F...T...AZ7z.....$H...AZ7z.....$H...AZ7z.....$H...AZ7z.....$H....W.6.....0...FTcc.Wi....Q)...<.*.....{...#G....Y.f....KKK..,,,4.....{S.`...+O.[..+.\H...(.<..Qy*..ET.PM...c....~(.g..**...ol.K......Sc8..q.F.KM"<...:t.O.>b..$*t..].........2..y.h."!f.08hT..m.(..C.7n.......@....SVUU).F.).X\\....[j.U....$x$d..e...<.W......=;0L78t+..Gw..-....]......C7......K.w..._..g......A.&M.$^.#.!....e.\.P........;vD..@...Za.@*D..f...! .2w...4#.J..c....K}....F.u.I.b.V2.k...5..`....*........M..!.,.;.E..BZ....K..[7....5....,...........K...7+.6..o....\,`...z..5x...\46x.b......Y....s.^.x=.e.4s.W..t,.iu.G^.....(74....`.....:......]..&..j+t9..3..}..
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):1604
                  Entropy (8bit):7.814570704154439
                  Encrypted:false
                  SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                  MD5:3F1535054D4F9626F0EB10CEE47F076E
                  SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                  SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                  SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                  Malicious:false
                  Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 167 x 131, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):5386
                  Entropy (8bit):7.943706538857394
                  Encrypted:false
                  SSDEEP:96:x4F84/zVJWedudPZZRdbvczHe2ftFJ0y8Ea5b2AELJj:x4FTnodRZ7c7LrabEaMAGp
                  MD5:DB48555480A383CD1D4DD00E2BCFCF29
                  SHA1:8060B6FE12175289F0A71F45B894030A0D9F1AB5
                  SHA-256:807723D8F90A5BD41269A7A62817547026A117D666D5BEF454EB699C97CA3FA2
                  SHA-512:2614C04686299CEE8D56577A1E836A26076D42E041C627177FDB295629F6A80190910947FA794A094C55A45C3D70725EEF29097118E523A38B50C9263C771A41
                  Malicious:false
                  Preview:.PNG........IHDR.............gI......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..xTU..M..B...P........)vQpQ.ED.""......,."....*bC..VT.. M!...@z....1...Wf.w..o29...=.v.TUU..^..@....S..<..;h...5.9r....x..7N{...=........'...N...u...9..5+YW.;..N\..u...9..5.....O....,.K..'.../.....1..T....>.f..9.xo...u.xo...u.xo...u.xo...u.xo...u.xo...u.xo...u.xo........'L...g.UVVz.[.n)...Yqq...Y.f.)//_.l.W_}.,........S^Z^Y..++.*..pF.....?...I.&...O,.k.d...~..w;Q........7}1y......e_............=y._U....{..}.w.O..~.z.{........W\q.."........^.h........}p.+.>m...d...4...`a~Z^....me......:N]..1...g..y.f.......l..g.).......e[........Z..RB.KrJ.....#...{..eff..v.[[<.n..?{.....SN9%...V.yE...s2..........e@Wz..I...B.r..<.-.=/t{.v.|..J....,.@.A.v...s`/.....6f....L?.z[T7..)S0.;c....\s..z-C.....v..}Y..{..j..xF.....'.#_..C....k|3..8...N...5......f....3......f)-.p..%.D.v.v.].f.......33<<......[bbbt.]w...:.r.....z....q..=....m.uhD..,..zXg
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):1604
                  Entropy (8bit):7.814570704154439
                  Encrypted:false
                  SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                  MD5:3F1535054D4F9626F0EB10CEE47F076E
                  SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                  SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                  SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                  Malicious:false
                  Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 749 x 126, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):13084
                  Entropy (8bit):7.940058639272698
                  Encrypted:false
                  SSDEEP:384:o4KSpFN6Ud4c3p2Il1yavNr5spYVJzimlfZ:wGN6Udv4IKavLBJz/r
                  MD5:0693DABBBC411538D209F32E22F622F6
                  SHA1:FB7E675406FA123CDB7E058D336742D6A2E8DC8E
                  SHA-256:2DFB2E7A1A3AA43C673D2EE540D3C366CEB12105EB5441F98992FC06F4284013
                  SHA-512:F07732660EC62DAE58EB02E2E9476007EA92BF826F642BCA547097136AEA01D29FF69D9B0CD0F5D65A5E15AA66CA4AA4804AA171A3504AAB198631C643C90C16
                  Malicious:false
                  Preview:.PNG........IHDR.......~.............sRGB.........gAMA......a.....pHYs..........o.d..2.IDATx^.w....'m.9c.6"...&.`.N.(.TN.Ne.N.R.eKr..T.*[...?T..:I.D.S>I$A...I......y.9...f......3...Gh.....}_.o....n..A@.....A@...L...2... ..... .x...#. ..... .....1f]9.[.....A@......3 ..... ...fE@x.YWN.....A@......1...... .....Y..J.Y.N.....s"................./..rc.scuyyyu...\s....t.oi..j..lv.....Gr.#9%%%9%--....d.T...r...DH...6.....%U..A@.0.....rAD ........2.5.......L.R..=W...gZ.`o..-?.T.Cy.:...y.9..y.EE...v......1..R.....1.".... `"...ss.......i.!.hY...Fj*....%.-.Gw...HJJr8..6...#.......!(.?P.(.....8(u........*..OOO..........dgg....Q..=..c.y....A`S.@.......3.CC..GFfg. .I.I.COrJFFFNNV^nn^^.z..%..(...^.b$........a..y.LMO-.,ylV+.k...T>Jg..*//-+-......M=..x.....E.... `~..N.Kww.......z...%%.e.%.yy.i...P.)'.,A.5.d.0.Cc35==66>2::33..>..;..Ii.i.gv...DSd....l#...l..............................)**,**...V..1 .F.'7....)..SSs..7..F...C.p....(*,......(RG..B...l!.2. ....|r1
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):17289
                  Entropy (8bit):7.962998633267186
                  Encrypted:false
                  SSDEEP:384:ruwwXKZuqnOnZprU3+OXBruY4UkcY+TpI/BSqCrEoMXMEr3KbzHIDqqAmk+xob:tGcxE4PBruV3Uy5SqCAoMXzrQHoqAk+m
                  MD5:708E8EB906BC105CCA0535AE669AA651
                  SHA1:38D82DEDFE97D3001188C2E18FE13BD741FD520F
                  SHA-256:1C3D07765294566E17270D0F3B9257A3DB7905D4E7EF746AEE80CD591CE0308F
                  SHA-512:1EFC74C28190DEE2D2732390B74049A1B120F05EFB8DC6925207C6990AD20450FFAB40249899A9DBB82E8F92A61F770E120A450CAAC7F8C5F0742586CCE0EDB6
                  Malicious:false
                  Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..C.IDATx^...Uc.._"oB.Hr.m(.0......r..[1.D....R..q)%FBDiB.."w*.k.Jz.Y..l....>...9{.......g..Y.z~..k?.z.^k..+V...! ....(.....\sM.tD@...!P...HW.S....u^.....@.r.^.....B@...U.H.J....... }....".....>....! ..A@.4..EE...! }*...B@....i<8.....B@.T2 .........xp..! .....d@...!......(*B@....S....B ...O..QT........! ..@<.H......! ..O%.B@...x..9...C'|..{.>Z../~^.s<<V4..ujo..v.Z7..EwT.....@.....?.......~{...K.........C........bB@.$.....C.{....Kf'S.....T.*&....@<.....'..D`...;~v.DT]...r!..>....ru...}.....#uG.T.....>..z ...3v....P.M.....5.@<...?....F.}..c.W[.._!P...O..>.M.d<..J....E .}ZZ.+.5v.p>..N.{B....>M.Nzfb...OB@.." }.D.y...IdK<..! }.:.....f.K..bX.T9...&T.&?.VB9.[B@..@@.4..1}.4.@H..-!..}..~M.<.z..I}.G....>..S...N..@yj..n..s.d._.....(..R"....Wf\.oO.^...\h.\.`)...ni.'.].vk.1-.k.^....#.,}.{.RM...~Z.S.. .@U!.&}......h...{K..@.........W.8.N.s.Y.0)..f+...%4.......5.@j.):k.+3...I..(
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 185 x 76, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):2332
                  Entropy (8bit):7.8822150338370776
                  Encrypted:false
                  SSDEEP:48:jB5Gg4vMs30WIn5IVeRy1bY7DqbqQBAeNjukXlN4AXat:PGYuEWV/YH7e1uA0AXat
                  MD5:91CB7F1273AA003076401081B8A22237
                  SHA1:5157144069E7D2FDAE60B397BE5851E75BDF7707
                  SHA-256:80682DD6472E8D1136BC5E20F6DE87B595562414B19EAB8E965736FE992921B0
                  SHA-512:5A8E3C0ED0DB94BFE359C63793F12F3D7B3C37F3A13A5C96634BA1DC8C9E50FB1142FE4752FD9FBFA39A682F78C54AF868AD337EAA787801FE5F66D8F55A8196
                  Malicious:false
                  Preview:.PNG........IHDR.......L.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.\.LUe......Ji("....9....-.."..5L.Y.Y.....$350.."2.lK3Cg...T..DWZ.......i.?!<..~x..z.......w.sw......9....s...w..l6.:....p"dH...F..B<...qE,R$G\!..E..".).#...."..{f.PyI.d..l;....;.=.S...O.S[.\Y^P.aj]9*Y!. ..~..#...S.s...l..h.[m....%...P..@.kG......G..X.r|%..AO.}-..G>35..c....Ac.&[W.d..+...zG........=..l...VS.d..+...tGd..k-._.....oL.:}.p.~.W$C..|...I...n...~......,.i......e..=..?{......>r~.Lw.+2..\w.)w~...c....h..u..%...PE...f..'..m.ZE.1.\....U.`X......$...P%..UH{[K..o7~.k.49..W.t.~.^_..7.,....f."q....+....;...~;.c.......Xb.\?...........0h.lV..WX!.....ljm.1c..U...[..X.)......B=.0~..W...rO..j...ehI5U:..66V5sJ.....V...]Y>...1kQH..2.........d....S....I...+..].p.....m7...Z....s.D>.K/]..?.l....2..=..~.mq..".+.....,..8. v.o.).Z......>..Xv..i...TA....M.....>[X...Y.7lJ..e7..S.....02q.O&9.......:L....N.......W....d..FqE..T..N.....R....kXv[..j......g.K.\@`.M..B}8n
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 452 x 278, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):13737
                  Entropy (8bit):7.916899917415529
                  Encrypted:false
                  SSDEEP:384:jgxmx2Fa/+76A6M6Y7rSYRv47cwbkkapeIiRmDGd+gUwOSpQ:KgyoWrJWRkkRXmad+gE8Q
                  MD5:830632032C7DDBCCDE126F4BAE935540
                  SHA1:9FEF1DA9FF1D7762B779553B5F873BE54C8D01EF
                  SHA-256:2328D09EC845433DC31808FD6B12616F1D28B9B3BA7DD969ADEB6C32D8EB049A
                  SHA-512:5C17EF9A0063499F2C34FAB2C4D968D29E20F20868921FA914E5737995AA0C166F224995109FF7ACA57B5B0F8647715DC670C4AEE385F61B5F8E6E8422C49EA8
                  Malicious:false
                  Preview:.PNG........IHDR.............w.pl....sRGB.........gAMA......a.....pHYs..........o.d..5>IDATx^....E...,"o.....&....AY$....AE..".l....+G.>AP@D..e..".".A.Y.@...K..IXB !..!..c1.On...===3=.3=.>9O..u....w.z..-].t9]B@...!.......Z...B@...^G`.Q.&S..u$d....B.Y..P.w5[]......B.m.D...! ..@...Ls.Q"....."S....B ..D.9.(.B@.....b@...!..."..@..! ....T1 ........i. J....B@d....B@...4..%B...! 2U...! .r@@d....!......*......9 2..D...B@..L..B@..........D..! .D...! ..@...Ls.Q"....."S....B ..D.9.(.B@.....b@...!..."..@..! ....T1 ........i. J....B@d....B@...4..%B...! 2U...! .r@@d....!......*......9 2..D...B@......5jT.@.{..O.;k....>.._o.+......{V...&C..(?.m.....F....gd.....?.....3u..x^L.1n^...@../.....XE....L..!...t.....L..B.).=..sn..U........@.O..$..o..L.....g.(D...(....Lo8.....,....f;o..i.f.h.9........\./..[W.9.....+....,X..+.d.....Xc..7.p.m.Yg.u:YO.V..l.t.].Z.g.U...]...5.^..._.~.WL...o.3f..s.,Y.X.7.x5...K/-..._.......{........W.(Y....?...!....W;.....iwNMW.............@+Q.5.#.
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 213 x 85, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):1924
                  Entropy (8bit):7.836744258175623
                  Encrypted:false
                  SSDEEP:24:rloPN36BoJ9JK5lncTww67QKf5wX5YgM5s6cahePwnR6+eA9zQU13ALcVz7wTQ8U:rYN31JH6lcbjMW5Ytmyqwp9H7wY
                  MD5:B1FDE66F75507567B5F0C6C07B01A3A1
                  SHA1:80B8E6A923E853232F66C874367E90B5C9CAD7AE
                  SHA-256:B9C82D2F31BBE409D159EE3C9129CBAAC7C6F6C81637AB9B6DAB3C11AA74B7F1
                  SHA-512:FC8C6038D3C2F5765D7524E969574ACD10AF6FCCFD45FE7C6DD4A8C2669B13EE3FB1A8833E94A046AB7037018170B5B87B1A2742E0E10557C413AD634BDF343E
                  Malicious:false
                  Preview:.PNG........IHDR.......U.....Q.6.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].O.W....G.lT^M*..J.....".4*....j..H..R^.".m..5....&..j..B..`.`..>...X......]z.[&.>..ef..gB.d...s~.=...3....m..(E...~.[....... .. .E3..7.4.......}..H._.D.,j.)..q\.....7..#.ag.o|.?.......;C|.#.../v.H.......o~.{G......H.|..;..v...G.._...p1d2..&......QS4<..i.".X.....1(..GR.R#.}.!.E<..:LLM......s..:"......Fa...b.....\.T..~OD... ..:j.~..p=Y...Y......?.Y.A...0!6_p.dKctjvZ....\.........V..1)..:.....;7:...(.[...7.....u..'ra.....S.]..........7.#,[..<.l.....[.........90d[.2a.R.........E.CJ..C..S..*._...$^...Q..:>hx.k7.`jN:.W.X..N..p..K..."...q....a.Uy.......[d.:vmkk./cW.>.K..C..?\d...'.@s_.?&.....V .?F..;k.....%+....+.3bk......f....T....S.(2.=...?gQ...K.._,.#....?.1W.......m2.....Z...-..:..?.#J......KS.P|&[<..........Dd.....\.....W$z].k..-..8...>..Q`Yz.}w&..._......?.)_[T...:wy...O8.Om......l.....\....]..."f...........q.o.V>~s...-....N{.n....w..O|.D...
                  Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):11886
                  Entropy (8bit):7.946442244439929
                  Encrypted:false
                  SSDEEP:192:sqNuEpzsnKxkfLaZCdMh+cLApmRausyZwYMAisQKShDBlhr34ckckcZ:JNu6DMLaZsMhtLAIa0wYMAvI5V4DDQ
                  MD5:875CFB3B5C3619253223731E8C9879E5
                  SHA1:6372F4F5BEB6EEAE3EDBE5B62EE73039B40AD01E
                  SHA-256:CC69BAE5D2C8F56B28BA4E3C6A11F57C4E8CCCE69943ACFBE7E63B4FC90EE5F2
                  SHA-512:47F45A3275B8454F8000F4567153DD7D4AF3012005D8E34CB18AED6AD69083BEC753E607F275FBF3EFCCB7BA00310A04ADFBD5FA5B73E6BBE47CE73901C35CA8
                  Malicious:false
                  Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..x.U..I...JB..;H..."..(U.EE\\..._v]W..b...Az..{G:J..B.$...H.IHB.o2xE..3gf..w..2....w..s|.....C.$@.$.....t.!........8......RR....<...6..P||....$@.$@...PO..$@.$ ...T.GZ!.. ..)c..H........H+$@.$@=e.........S1.i..H....... ...C.z*.#........1@.$@.b.PO.p... ....2.H..H@......B.$@..S.......!@=..VH..H.z.. .. .1...b8......PO..$@.$ ...T.GZ!.. ..)c..H........H+$@.$@=e.........S1.i..H....... ...C.'++kH.G.=Z!.U...73o^.IH..O|jrj.D.......I.M.........Kph.............R.x.......RU8_".......j.......B"O.z.|.9.."..L....Y.d.Rej.-Y.dhX....:.xH.z.!(>&..4.....O.<..T\.%a..e...*..UnR....+j...2.."..M.O>.z......T...].j....m...S.`..&..)....f..2..............+..SP..?.a...=.....3......K.zj.5.fP.......2:..?.....%....d.qxC..W.~.._....!.W..6....iJ)*.(..wg.}.]sw\.r]...r"...e_-....5_9.YN'...PO-.d.:.%..wZQ...H...JMJ.6c....|g*..,.3.....T...o..Nyc.W.....A.3.._...U%...PG.z.....&.%.v....AIm.....~.
                  File type:data
                  Entropy (8bit):6.730577134510928
                  TrID:
                  • Microsoft OneNote note (16024/2) 100.00%
                  File name:MBQ24253060297767042_202303161424.one
                  File size:120428
                  MD5:1d9806cb6533d194ba4dba6be4a66f3d
                  SHA1:ddf5f22b691796f9fd1c448dd28e26a90a2f81c2
                  SHA256:f9602998afc5c510a4102622cad24c15a91066f0bc26e6c9cd4e4de15f90afc5
                  SHA512:e59b02d3596940d76f2ba332f0be9f1495294df14fe4f1ccffa39bc163e768fbc7104c82a08a8739d25c7ece48837a6b21f273d86b405727f20be10087535157
                  SSDEEP:1536:RDBoTVdaeNtuXndCrJJmT4HVnteV4FrdMiYcx7bfCb6HPdnXA:1BoC+tCYvSMVnte8ZP1Y6JQ
                  TLSH:45C32BF1A8025C0AE123C976B1FB661399D051ED42283B2BF87D507DD978A20D5DD8EF
                  File Content Preview:.R\{...M..Sx.).......i.E......&.................?......I........*...*...*...*..................................................._fh.*..E.......n..w.....................h...........................8....... ....... ..}...M..t:."S.9.............TL.E..!......
                  Icon Hash:d4dce0626664606c
                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  192.168.2.5213.239.212.5497334432404320 03/17/23-09:44:22.078153TCP2404320ET CNC Feodo Tracker Reported CnC Server TCP group 1149733443192.168.2.5213.239.212.5
                  192.168.2.566.228.32.314970170802404330 03/17/23-09:41:26.773980TCP2404330ET CNC Feodo Tracker Reported CnC Server TCP group 16497017080192.168.2.566.228.32.31
                  192.168.2.5182.162.143.56497024432404312 03/17/23-09:41:32.334081TCP2404312ET CNC Feodo Tracker Reported CnC Server TCP group 749702443192.168.2.5182.162.143.56
                  192.168.2.545.235.8.304973780802404324 03/17/23-09:44:27.590555TCP2404324ET CNC Feodo Tracker Reported CnC Server TCP group 13497378080192.168.2.545.235.8.30
                  192.168.2.5167.172.199.1654970480802404308 03/17/23-09:41:44.601805TCP2404308ET CNC Feodo Tracker Reported CnC Server TCP group 5497048080192.168.2.5167.172.199.165
                  192.168.2.5104.168.155.1434970980802404302 03/17/23-09:41:57.778281TCP2404302ET CNC Feodo Tracker Reported CnC Server TCP group 2497098080192.168.2.5104.168.155.143
                  192.168.2.591.121.146.474969980802404344 03/17/23-09:41:20.616441TCP2404344ET CNC Feodo Tracker Reported CnC Server TCP group 23496998080192.168.2.591.121.146.47
                  192.168.2.5206.189.28.1994972580802404318 03/17/23-09:43:27.823348TCP2404318ET CNC Feodo Tracker Reported CnC Server TCP group 10497258080192.168.2.5206.189.28.199
                  192.168.2.5119.59.103.1524973880802404304 03/17/23-09:44:34.817919TCP2404304ET CNC Feodo Tracker Reported CnC Server TCP group 3497388080192.168.2.5119.59.103.152
                  TimestampSource PortDest PortSource IPDest IP
                  Mar 17, 2023 09:40:37.788703918 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:37.788768053 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:37.788940907 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:37.792469978 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:37.792495966 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:38.411879063 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:38.412067890 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:38.414330006 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:38.414346933 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:38.414644003 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:38.465944052 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:38.621440887 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:38.621522903 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.016566038 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.016680002 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.016700029 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.016745090 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.016868114 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.016905069 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.016932964 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.059811115 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.316281080 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.316308975 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.316371918 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.316392899 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.316452026 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.316468954 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.316471100 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.316545963 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.316587925 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.316615105 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.316637039 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.316637993 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.316692114 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.316708088 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.356646061 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.617001057 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.617028952 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.617130041 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.617191076 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.617224932 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.617250919 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.617269993 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.617291927 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.617408991 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.617424011 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.617449045 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.617474079 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.617605925 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.617616892 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.617636919 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.617714882 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.617716074 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.617737055 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.617908001 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.617916107 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.617969990 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.918582916 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.918730974 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.918759108 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.918844938 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.918916941 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.918926001 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.919173956 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.919250011 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.919258118 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.919333935 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.919404030 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.919411898 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.919632912 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.919708014 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.919718027 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.919784069 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.919852018 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.919858932 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.920037031 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.920104027 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.920111895 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.920227051 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.920288086 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.920295000 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.920495987 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.920562029 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.920571089 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.920978069 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.921062946 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.921073914 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.921333075 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.921402931 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.921411037 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.921463966 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.921822071 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.921905041 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.921914101 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.921952009 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.922101021 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.922164917 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:39.922173977 CET44349696203.26.41.131192.168.2.5
                  Mar 17, 2023 09:40:39.922238111 CET49696443192.168.2.5203.26.41.131
                  Mar 17, 2023 09:40:40.222388983 CET44349696203.26.41.131192.168.2.5
                  TimestampSource PortDest PortSource IPDest IP
                  Mar 17, 2023 09:40:37.447623968 CET5029553192.168.2.58.8.8.8
                  Mar 17, 2023 09:40:37.776889086 CET53502958.8.8.8192.168.2.5
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Mar 17, 2023 09:40:37.447623968 CET192.168.2.58.8.8.80x4910Standard query (0)penshorn.orgA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Mar 17, 2023 09:40:37.776889086 CET8.8.8.8192.168.2.50x4910No error (0)penshorn.org203.26.41.131A (IP address)IN (0x0001)false
                  • penshorn.org
                  • 182.162.143.56

                  Click to jump to process

                  Target ID:0
                  Start time:09:40:09
                  Start date:17/03/2023
                  Path:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                  Wow64 process (32bit):true
                  Commandline:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE" "C:\Users\user\Desktop\MBQ24253060297767042_202303161424.one
                  Imagebase:0x13b0000
                  File size:1676072 bytes
                  MD5 hash:8D7E99CB358318E1F38803C9E6B67867
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:moderate

                  Target ID:1
                  Start time:09:40:35
                  Start date:17/03/2023
                  Path:C:\Windows\SysWOW64\wscript.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf"
                  Imagebase:0x1020000
                  File size:147456 bytes
                  MD5 hash:7075DD7B9BE8807FCA93ACD86F724884
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: webshell_asp_obfuscated, Description: ASP webshell obfuscated, Source: 00000001.00000003.394299845.0000000004D8B000.00000004.00000020.00020000.00000000.sdmp, Author: Arnim Rupp
                  • Rule: WEBSHELL_asp_generic, Description: Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, Source: 00000001.00000003.394299845.0000000004D8B000.00000004.00000020.00020000.00000000.sdmp, Author: Arnim Rupp
                  • Rule: WEBSHELL_asp_generic, Description: Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, Source: 00000001.00000003.381144197.0000000005004000.00000004.00000020.00020000.00000000.sdmp, Author: Arnim Rupp
                  • Rule: WEBSHELL_asp_generic, Description: Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, Source: 00000001.00000002.407746797.0000000004F31000.00000004.00000020.00020000.00000000.sdmp, Author: Arnim Rupp
                  • Rule: webshell_asp_obfuscated, Description: ASP webshell obfuscated, Source: 00000001.00000003.394449095.0000000004D92000.00000004.00000020.00020000.00000000.sdmp, Author: Arnim Rupp
                  • Rule: WEBSHELL_asp_generic, Description: Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, Source: 00000001.00000003.394449095.0000000004D92000.00000004.00000020.00020000.00000000.sdmp, Author: Arnim Rupp
                  • Rule: webshell_asp_obfuscated, Description: ASP webshell obfuscated, Source: 00000001.00000003.396223995.0000000004D92000.00000004.00000020.00020000.00000000.sdmp, Author: Arnim Rupp
                  • Rule: WEBSHELL_asp_generic, Description: Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, Source: 00000001.00000003.396223995.0000000004D92000.00000004.00000020.00020000.00000000.sdmp, Author: Arnim Rupp
                  • Rule: webshell_asp_obfuscated, Description: ASP webshell obfuscated, Source: 00000001.00000002.407635326.0000000004D99000.00000004.00000020.00020000.00000000.sdmp, Author: Arnim Rupp
                  • Rule: WEBSHELL_asp_generic, Description: Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, Source: 00000001.00000002.407635326.0000000004D99000.00000004.00000020.00020000.00000000.sdmp, Author: Arnim Rupp
                  • Rule: WEBSHELL_asp_generic, Description: Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, Source: 00000001.00000003.398345159.0000000004F28000.00000004.00000020.00020000.00000000.sdmp, Author: Arnim Rupp
                  Reputation:high

                  Target ID:2
                  Start time:09:40:39
                  Start date:17/03/2023
                  Path:C:\Windows\SysWOW64\regsvr32.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad1BF4D.tmp.dll
                  Imagebase:0xd0000
                  File size:20992 bytes
                  MD5 hash:426E7499F6A7346F0410DEAD0805586B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:3
                  Start time:09:40:39
                  Start date:17/03/2023
                  Path:C:\Windows\System32\regsvr32.exe
                  Wow64 process (32bit):false
                  Commandline: "C:\Users\user\AppData\Local\Temp\rad1BF4D.tmp.dll"
                  Imagebase:0x7ff6377c0000
                  File size:24064 bytes
                  MD5 hash:D78B75FC68247E8A63ACBA846182740E
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.377625141.0000000000C10000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.377660736.0000000000C41000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:high

                  Target ID:4
                  Start time:09:40:43
                  Start date:17/03/2023
                  Path:C:\Windows\System32\regsvr32.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\VnSBMYHcLeIGSHRn\oFKJqrLBMvZWulQO.dll"
                  Imagebase:0x7ff6377c0000
                  File size:24064 bytes
                  MD5 hash:D78B75FC68247E8A63ACBA846182740E
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.877278108.0000000000800000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.877359540.0000000000831000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Emotet_3, Description: Yara detected Emotet, Source: 00000004.00000002.877453456.00000000008A8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:high

                  Target ID:5
                  Start time:09:40:49
                  Start date:17/03/2023
                  Path:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE
                  Wow64 process (32bit):true
                  Commandline:/tsr
                  Imagebase:0x13b0000
                  File size:157872 bytes
                  MD5 hash:DBCFA6F25577339B877D2305CAD3DEC3
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:moderate

                  No disassembly