Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Form - 16 Mar, 2023.one

Overview

General Information

Sample Name:Form - 16 Mar, 2023.one
Analysis ID:828882
MD5:fdb11bd1fb6eba5cb985a4bd5edda765
SHA1:ad09e5d26784b4c56232ce74725d38c1e34647ea
SHA256:8dbe6329f5086cd8ea55002897ca64d8a938ebb57c8a91d08f6cd927c3586f4a
Infos:

Detection

Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Malicious OneNote
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Sigma detected: Run temp file via regsvr32
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Document exploit detected (process start blacklist hit)
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Stores files to the Windows start menu directory
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to call native functions
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Connects to several IPs in different countries
Creates a start menu entry (Start Menu\Programs\Startup)
Registers a DLL
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • ONENOTE.EXE (PID: 4088 cmdline: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE" "C:\Users\user\Desktop\Form - 16 Mar, 2023.one MD5: 8D7E99CB358318E1F38803C9E6B67867)
    • wscript.exe (PID: 5868 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf" MD5: 7075DD7B9BE8807FCA93ACD86F724884)
      • regsvr32.exe (PID: 976 cmdline: C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\radE00D6.tmp.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
        • regsvr32.exe (PID: 4692 cmdline: "C:\Users\user\AppData\Local\Temp\radE00D6.tmp.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
          • regsvr32.exe (PID: 1496 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\DWxyui\KGQLMqgYfV.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • ONENOTEM.EXE (PID: 5936 cmdline: /tsr MD5: DBCFA6F25577339B877D2305CAD3DEC3)
  • ONENOTEM.EXE (PID: 4768 cmdline: "C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE" /tsr MD5: DBCFA6F25577339B877D2305CAD3DEC3)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
EmotetWhile Emotet historically was a banking malware organized in a botnet, nowadays Emotet is mostly seen as infrastructure as a service for content delivery. For example, since mid 2018 it is used by Trickbot for installs, which may also lead to ransomware attacks using Ryuk, a combination observed several times against high-profile targets.It is always stealing information from victims but what the criminal gang behind it did, was to open up another business channel by selling their infrastructure delivering additional malicious software. From malware analysts it has been classified into epochs depending on command and control, payloads, and delivery solutions which change over time.Emotet had been taken down by authorities in January 2021, though it appears to have sprung back to life in November 2021.
  • GOLD CABIN
  • MUMMY SPIDER
  • Mealybug
https://malpedia.caad.fkie.fraunhofer.de/details/win.emotet
{"C2 list": ["91.121.146.47:8080", "66.228.32.31:7080", "182.162.143.56:443", "187.63.160.88:80", "167.172.199.165:8080", "164.90.222.65:443", "104.168.155.143:8080", "163.44.196.120:8080", "160.16.142.56:8080", "159.89.202.34:443", "159.65.88.10:8080", "186.194.240.217:443", "149.56.131.28:8080", "72.15.201.15:8080", "1.234.2.232:8080", "82.223.21.224:8080", "206.189.28.199:8080", "169.57.156.166:8080", "107.170.39.149:8080", "103.43.75.120:443", "91.207.28.33:8080", "213.239.212.5:443", "45.235.8.30:8080", "119.59.103.152:8080", "164.68.99.3:8080", "95.217.221.146:8080", "153.126.146.25:7080", "197.242.150.244:8080", "202.129.205.3:8080", "103.132.242.26:8080", "139.59.126.41:443", "110.232.117.186:8080", "183.111.227.137:8080", "5.135.159.50:443", "201.94.166.162:443", "103.75.201.2:443", "79.137.35.198:8080", "172.105.226.75:8080", "94.23.45.86:4143", "115.68.227.76:8080", "153.92.5.27:8080", "167.172.253.162:8080", "188.44.20.25:443", "147.139.166.154:8080", "129.232.188.93:443", "173.212.193.249:8080", "185.4.135.165:8080", "45.176.232.124:443"], "Public Key": ["RUNTMSAAAABAX3S2xNjcDD0fBno33Ln5t71eii+mofIPoXkNFOX1MeiwCh48iz97kB0mJjGGZXwardnDXKxI8GCHGNl0PFj5MXrQigAaAI4=", "RUNLMSAAAADzozW1Di4r9DVWzQpMKT588RDdy7BPILP6AiDOTLYMHkSWvrQO5slbmr1OvZ2Pz+AQWzRMggQmAtO6rPH7nyx2dnqRigAnAIA="]}
SourceRuleDescriptionAuthorStrings
Form - 16 Mar, 2023.oneJoeSecurity_MalOneNoteYara detected Malicious OneNoteJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\Desktop\Form - 16 Mar, 2023.oneJoeSecurity_MalOneNoteYara detected Malicious OneNoteJoe Security
      SourceRuleDescriptionAuthorStrings
      00000008.00000002.617908467.0000000001220000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000008.00000002.617622368.0000000001128000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Emotet_3Yara detected EmotetJoe Security
          00000007.00000002.435040931.0000000000C30000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            00000007.00000002.435079769.0000000000C81000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              00000008.00000002.617991497.0000000002A51000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                SourceRuleDescriptionAuthorStrings
                7.2.regsvr32.exe.c30000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  8.2.regsvr32.exe.1220000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    8.2.regsvr32.exe.1220000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      7.2.regsvr32.exe.c30000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security

                        Malware Analysis System Evasion

                        barindex
                        Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\radE00D6.tmp.dll, CommandLine: C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\radE00D6.tmp.dll, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\regsvr32.exe, NewProcessName: C:\Windows\SysWOW64\regsvr32.exe, OriginalFileName: C:\Windows\SysWOW64\regsvr32.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf", ParentImage: C:\Windows\SysWOW64\wscript.exe, ParentProcessId: 5868, ParentProcessName: wscript.exe, ProcessCommandLine: C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\radE00D6.tmp.dll, ProcessId: 976, ProcessName: regsvr32.exe
                        Timestamp:192.168.2.466.228.32.314970070802404330 03/17/23-16:45:57.481213
                        SID:2404330
                        Source Port:49700
                        Destination Port:7080
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.4164.90.222.65497074432404308 03/17/23-16:46:23.322113
                        SID:2404308
                        Source Port:49707
                        Destination Port:443
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.4167.172.199.1654970680802404308 03/17/23-16:46:17.940894
                        SID:2404308
                        Source Port:49706
                        Destination Port:8080
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.4104.168.155.1434970880802404302 03/17/23-16:46:27.711698
                        SID:2404302
                        Source Port:49708
                        Destination Port:8080
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.4182.162.143.56497014432404312 03/17/23-16:46:04.229854
                        SID:2404312
                        Source Port:49701
                        Destination Port:443
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.491.121.146.474969880802404344 03/17/23-16:45:48.322318
                        SID:2404344
                        Source Port:49698
                        Destination Port:8080
                        Protocol:TCP
                        Classtype:A Network Trojan was detected

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: Form - 16 Mar, 2023.oneReversingLabs: Detection: 38%
                        Source: Form - 16 Mar, 2023.oneVirustotal: Detection: 17%Perma Link
                        Source: https://91.121.146.47:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/yAvira URL Cloud: Label: malware
                        Source: https://www.gomespontes.com.br/logs/pd/Avira URL Cloud: Label: malware
                        Source: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wMAvira URL Cloud: Label: malware
                        Source: http://softwareulike.com/cWIYxWMPkK/Avira URL Cloud: Label: malware
                        Source: http://ozmeydan.com/cekici/9/Avira URL Cloud: Label: malware
                        Source: https://104.168.155.143:8080/iAvira URL Cloud: Label: malware
                        Source: https://167.172.199.165:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/#Avira URL Cloud: Label: malware
                        Source: https://104.168.155.143:8080/gAvira URL Cloud: Label: malware
                        Source: https://163.44.196.120:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/Avira URL Cloud: Label: malware
                        Source: https://bbvoyage.com:443/useragreement/ElKHvb4QIQqSrh6Hqm/Avira URL Cloud: Label: malware
                        Source: https://penshorn.org/admin/Ses8712iGR8du/tMAvira URL Cloud: Label: malware
                        Source: https://penshorn.org/admin/Ses8712iGR8du/Avira URL Cloud: Label: malware
                        Source: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/uMAvira URL Cloud: Label: malware
                        Source: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/RAvira URL Cloud: Label: malware
                        Source: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/Avira URL Cloud: Label: malware
                        Source: https://164.90.222.65/0/Avira URL Cloud: Label: malware
                        Source: https://91.121.146.47:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/dllAvira URL Cloud: Label: malware
                        Source: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/Avira URL Cloud: Label: malware
                        Source: https://167.172.199.165:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/Avira URL Cloud: Label: malware
                        Source: http://softwareulike.com/cWIYxWMPkK/yMAvira URL Cloud: Label: malware
                        Source: https://91.121.146.47:8080/Avira URL Cloud: Label: malware
                        Source: https://66.228.32.31:7080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/Avira URL Cloud: Label: malware
                        Source: https://164.90.222.65/kjgfzohhcvsym/ggkrpukmvfsdmfdi/Avira URL Cloud: Label: malware
                        Source: https://163.44.196.120:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/f4)Avira URL Cloud: Label: malware
                        Source: https://91.121.146.47:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/Avira URL Cloud: Label: malware
                        Source: https://www.gomespontes.com.br/logs/pd/vMAvira URL Cloud: Label: malware
                        Source: https://163.44.196.120:8080/aAvira URL Cloud: Label: malware
                        Source: https://163.44.196.120:8080/m/LowAvira URL Cloud: Label: malware
                        Source: https://163.44.196.120:8080/cAvira URL Cloud: Label: malware
                        Source: http://ozmeydan.com/cekici/9/xMAvira URL Cloud: Label: malware
                        Source: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/OAvira URL Cloud: Label: malware
                        Source: https://163.44.196.120:8080/hAvira URL Cloud: Label: malware
                        Source: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/Avira URL Cloud: Label: malware
                        Source: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/zMAvira URL Cloud: Label: malware
                        Source: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/35047Avira URL Cloud: Label: malware
                        Source: https://104.168.155.143:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/Avira URL Cloud: Label: malware
                        Source: https://penshorn.org:443/admin/Ses8712iGR8du/Avira URL Cloud: Label: malware
                        Source: https://www.gomespontes.com.br/logs/pd/ublicAvira URL Cloud: Label: malware
                        Source: bbvoyage.comVirustotal: Detection: 8%Perma Link
                        Source: penshorn.orgVirustotal: Detection: 10%Perma Link
                        Source: http://ozmeydan.com/cekici/9/Virustotal: Detection: 21%Perma Link
                        Source: http://softwareulike.com/cWIYxWMPkK/Virustotal: Detection: 21%Perma Link
                        Source: C:\Users\user\AppData\Local\Temp\radE00D6.tmp.dllReversingLabs: Detection: 58%
                        Source: C:\Windows\System32\DWxyui\KGQLMqgYfV.dll (copy)ReversingLabs: Detection: 58%
                        Source: 00000008.00000002.617622368.0000000001128000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Emotet {"C2 list": ["91.121.146.47:8080", "66.228.32.31:7080", "182.162.143.56:443", "187.63.160.88:80", "167.172.199.165:8080", "164.90.222.65:443", "104.168.155.143:8080", "163.44.196.120:8080", "160.16.142.56:8080", "159.89.202.34:443", "159.65.88.10:8080", "186.194.240.217:443", "149.56.131.28:8080", "72.15.201.15:8080", "1.234.2.232:8080", "82.223.21.224:8080", "206.189.28.199:8080", "169.57.156.166:8080", "107.170.39.149:8080", "103.43.75.120:443", "91.207.28.33:8080", "213.239.212.5:443", "45.235.8.30:8080", "119.59.103.152:8080", "164.68.99.3:8080", "95.217.221.146:8080", "153.126.146.25:7080", "197.242.150.244:8080", "202.129.205.3:8080", "103.132.242.26:8080", "139.59.126.41:443", "110.232.117.186:8080", "183.111.227.137:8080", "5.135.159.50:443", "201.94.166.162:443", "103.75.201.2:443", "79.137.35.198:8080", "172.105.226.75:8080", "94.23.45.86:4143", "115.68.227.76:8080", "153.92.5.27:8080", "167.172.253.162:8080", "188.44.20.25:443", "147.139.166.154:8080", "129.232.188.93:443", "173.212.193.249:8080", "185.4.135.165:8080", "45.176.232.124:443"], "Public Key": ["RUNTMSAAAABAX3S2xNjcDD0fBno33Ln5t71eii+mofIPoXkNFOX1MeiwCh48iz97kB0mJjGGZXwardnDXKxI8GCHGNl0PFj5MXrQigAaAI4=", "RUNLMSAAAADzozW1Di4r9DVWzQpMKT588RDdy7BPILP6AiDOTLYMHkSWvrQO5slbmr1OvZ2Pz+AQWzRMggQmAtO6rPH7nyx2dnqRigAnAIA="]}
                        Source: unknownHTTPS traffic detected: 31.31.196.172:443 -> 192.168.2.4:49697 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 164.90.222.65:443 -> 192.168.2.4:49707 version: TLS 1.2
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180008D28 FindFirstFileExW,

                        Software Vulnerabilities

                        barindex
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess created: C:\Windows\SysWOW64\wscript.exe

                        Networking

                        barindex
                        Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 164.90.222.65 443
                        Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 31.31.196.172 443
                        Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 203.26.41.131 443
                        Source: C:\Windows\SysWOW64\wscript.exeDomain query: penshorn.org
                        Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 66.228.32.31 7080
                        Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 187.63.160.88 80
                        Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 104.168.155.143 8080
                        Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 91.121.146.47 8080
                        Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 182.162.143.56 443
                        Source: C:\Windows\SysWOW64\wscript.exeDomain query: bbvoyage.com
                        Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 167.172.199.165 8080
                        Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 163.44.196.120 8080
                        Source: TrafficSnort IDS: 2404308 ET CNC Feodo Tracker Reported CnC Server TCP group 5 192.168.2.4:49707 -> 164.90.222.65:443
                        Source: TrafficSnort IDS: 2404344 ET CNC Feodo Tracker Reported CnC Server TCP group 23 192.168.2.4:49698 -> 91.121.146.47:8080
                        Source: TrafficSnort IDS: 2404330 ET CNC Feodo Tracker Reported CnC Server TCP group 16 192.168.2.4:49700 -> 66.228.32.31:7080
                        Source: TrafficSnort IDS: 2404312 ET CNC Feodo Tracker Reported CnC Server TCP group 7 192.168.2.4:49701 -> 182.162.143.56:443
                        Source: TrafficSnort IDS: 2404308 ET CNC Feodo Tracker Reported CnC Server TCP group 5 192.168.2.4:49706 -> 167.172.199.165:8080
                        Source: TrafficSnort IDS: 2404302 ET CNC Feodo Tracker Reported CnC Server TCP group 2 192.168.2.4:49708 -> 104.168.155.143:8080
                        Source: Malware configuration extractorIPs: 91.121.146.47:8080
                        Source: Malware configuration extractorIPs: 66.228.32.31:7080
                        Source: Malware configuration extractorIPs: 182.162.143.56:443
                        Source: Malware configuration extractorIPs: 187.63.160.88:80
                        Source: Malware configuration extractorIPs: 167.172.199.165:8080
                        Source: Malware configuration extractorIPs: 164.90.222.65:443
                        Source: Malware configuration extractorIPs: 104.168.155.143:8080
                        Source: Malware configuration extractorIPs: 163.44.196.120:8080
                        Source: Malware configuration extractorIPs: 160.16.142.56:8080
                        Source: Malware configuration extractorIPs: 159.89.202.34:443
                        Source: Malware configuration extractorIPs: 159.65.88.10:8080
                        Source: Malware configuration extractorIPs: 186.194.240.217:443
                        Source: Malware configuration extractorIPs: 149.56.131.28:8080
                        Source: Malware configuration extractorIPs: 72.15.201.15:8080
                        Source: Malware configuration extractorIPs: 1.234.2.232:8080
                        Source: Malware configuration extractorIPs: 82.223.21.224:8080
                        Source: Malware configuration extractorIPs: 206.189.28.199:8080
                        Source: Malware configuration extractorIPs: 169.57.156.166:8080
                        Source: Malware configuration extractorIPs: 107.170.39.149:8080
                        Source: Malware configuration extractorIPs: 103.43.75.120:443
                        Source: Malware configuration extractorIPs: 91.207.28.33:8080
                        Source: Malware configuration extractorIPs: 213.239.212.5:443
                        Source: Malware configuration extractorIPs: 45.235.8.30:8080
                        Source: Malware configuration extractorIPs: 119.59.103.152:8080
                        Source: Malware configuration extractorIPs: 164.68.99.3:8080
                        Source: Malware configuration extractorIPs: 95.217.221.146:8080
                        Source: Malware configuration extractorIPs: 153.126.146.25:7080
                        Source: Malware configuration extractorIPs: 197.242.150.244:8080
                        Source: Malware configuration extractorIPs: 202.129.205.3:8080
                        Source: Malware configuration extractorIPs: 103.132.242.26:8080
                        Source: Malware configuration extractorIPs: 139.59.126.41:443
                        Source: Malware configuration extractorIPs: 110.232.117.186:8080
                        Source: Malware configuration extractorIPs: 183.111.227.137:8080
                        Source: Malware configuration extractorIPs: 5.135.159.50:443
                        Source: Malware configuration extractorIPs: 201.94.166.162:443
                        Source: Malware configuration extractorIPs: 103.75.201.2:443
                        Source: Malware configuration extractorIPs: 79.137.35.198:8080
                        Source: Malware configuration extractorIPs: 172.105.226.75:8080
                        Source: Malware configuration extractorIPs: 94.23.45.86:4143
                        Source: Malware configuration extractorIPs: 115.68.227.76:8080
                        Source: Malware configuration extractorIPs: 153.92.5.27:8080
                        Source: Malware configuration extractorIPs: 167.172.253.162:8080
                        Source: Malware configuration extractorIPs: 188.44.20.25:443
                        Source: Malware configuration extractorIPs: 147.139.166.154:8080
                        Source: Malware configuration extractorIPs: 129.232.188.93:443
                        Source: Malware configuration extractorIPs: 173.212.193.249:8080
                        Source: Malware configuration extractorIPs: 185.4.135.165:8080
                        Source: Malware configuration extractorIPs: 45.176.232.124:443
                        Source: Joe Sandbox ViewASN Name: RACKCORP-APRackCorpAU RACKCORP-APRackCorpAU
                        Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
                        Source: global trafficHTTP traffic detected: POST /kjgfzohhcvsym/ggkrpukmvfsdmfdi/ HTTP/1.1Connection: Keep-AliveContent-Length: 0Host: 164.90.222.65
                        Source: Joe Sandbox ViewIP Address: 110.232.117.186 110.232.117.186
                        Source: global trafficHTTP traffic detected: GET /useragreement/ElKHvb4QIQqSrh6Hqm/ HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: bbvoyage.com
                        Source: global trafficTCP traffic: 192.168.2.4:49698 -> 91.121.146.47:8080
                        Source: global trafficTCP traffic: 192.168.2.4:49700 -> 66.228.32.31:7080
                        Source: global trafficTCP traffic: 192.168.2.4:49706 -> 167.172.199.165:8080
                        Source: global trafficTCP traffic: 192.168.2.4:49708 -> 104.168.155.143:8080
                        Source: global trafficTCP traffic: 192.168.2.4:49709 -> 163.44.196.120:8080
                        Source: unknownNetwork traffic detected: IP country count 18
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                        Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                        Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                        Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                        Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                        Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                        Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                        Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                        Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                        Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                        Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                        Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                        Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                        Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                        Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                        Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                        Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                        Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                        Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                        Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                        Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                        Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                        Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                        Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                        Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                        Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                        Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                        Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                        Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                        Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.168.155.143
                        Source: wscript.exe, 00000001.00000002.454746184.0000000005004000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.586761426.00000000011C0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.617706041.00000000011B1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.519602421.00000000011B1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.521824072.00000000011B1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.586322272.00000000011C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                        Source: regsvr32.exe, 00000008.00000003.521824072.00000000011FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/Low
                        Source: regsvr32.exe, 00000008.00000003.522318920.000000000117C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.586322272.000000000117C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.617706041.000000000118C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.586721940.000000000118B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.519602421.000000000117C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.586700754.0000000001186000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                        Source: regsvr32.exe, 00000008.00000003.586322272.00000000011C0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.519602421.000000000117C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                        Source: regsvr32.exe, 00000008.00000003.514049481.000000000322E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?face02ee8e0f8
                        Source: wscript.exe, wscript.exe, 00000001.00000003.438065273.0000000004A4C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.446215312.0000000004D5D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449163374.0000000004D50000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.445464334.0000000004D13000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454128964.0000000000569000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441367000.0000000004C39000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.437009350.0000000000519000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453635476.0000000004F6A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450239085.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439815100.0000000004AF2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449599586.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439285276.0000000004B00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441612434.0000000004BFF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450137005.0000000004F0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.447642991.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449126562.0000000004D1B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454449863.0000000004EB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.440428219.0000000004AE9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449909753.0000000004EE5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.442046071.0000000004CCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ozmeydan.com/cekici/9/
                        Source: wscript.exe, 00000001.00000003.450944827.0000000004704000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ozmeydan.com/cekici/9/xM
                        Source: wscript.exe, wscript.exe, 00000001.00000003.438065273.0000000004A4C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.446215312.0000000004D5D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449163374.0000000004D50000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.445464334.0000000004D13000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454128964.0000000000569000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441367000.0000000004C39000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.437009350.0000000000519000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453635476.0000000004F6A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450239085.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439815100.0000000004AF2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449599586.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439285276.0000000004B00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441612434.0000000004BFF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450137005.0000000004F0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.447642991.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449126562.0000000004D1B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454449863.0000000004EB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.440428219.0000000004AE9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449909753.0000000004EE5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.442046071.0000000004CCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://softwareulike.com/cWIYxWMPkK/
                        Source: wscript.exe, 00000001.00000003.450944827.0000000004704000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://softwareulike.com/cWIYxWMPkK/yM
                        Source: wscript.exe, wscript.exe, 00000001.00000003.438065273.0000000004A4C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.446215312.0000000004D5D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449163374.0000000004D50000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.445464334.0000000004D13000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454128964.0000000000569000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441367000.0000000004C39000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.437009350.0000000000519000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453635476.0000000004F6A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450239085.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439815100.0000000004AF2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449599586.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439285276.0000000004B00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441612434.0000000004BFF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450137005.0000000004F0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.447642991.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449126562.0000000004D1B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454449863.0000000004EB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.440428219.0000000004AE9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449909753.0000000004EE5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.442046071.0000000004CCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/
                        Source: wscript.exe, 00000001.00000002.454494243.0000000004F0C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450088401.0000000004F0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/O
                        Source: wscript.exe, 00000001.00000003.450944827.0000000004704000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/zM
                        Source: regsvr32.exe, 00000008.00000002.617706041.00000000011A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.44.196.120:8080/
                        Source: regsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://104.168.155.143:8080/
                        Source: regsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://104.168.155.143:8080/g
                        Source: regsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://104.168.155.143:8080/i
                        Source: regsvr32.exe, 00000008.00000002.618264606.00000000033E7000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.617706041.00000000011B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://104.168.155.143:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/
                        Source: regsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://163.44.196.120:8080/a
                        Source: regsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://163.44.196.120:8080/c
                        Source: regsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://163.44.196.120:8080/h
                        Source: regsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://163.44.196.120:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/
                        Source: regsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://163.44.196.120:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/f4)
                        Source: regsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://163.44.196.120:8080/m/Low
                        Source: regsvr32.exe, 00000008.00000003.586522117.00000000011FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://164.90.222.65/
                        Source: regsvr32.exe, 00000008.00000003.586522117.00000000011FD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://164.90.222.65/0/
                        Source: regsvr32.exe, 00000008.00000003.586522117.00000000011FD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.586322272.00000000011C0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://164.90.222.65/kjgfzohhcvsym/ggkrpukmvfsdmfdi/
                        Source: regsvr32.exe, 00000008.00000002.618264606.00000000033E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://167.172.199.165:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/
                        Source: regsvr32.exe, 00000008.00000003.586761426.00000000011C0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.586322272.00000000011C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://167.172.199.165:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/#
                        Source: regsvr32.exe, 00000008.00000003.586522117.00000000011FD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://182.162.143.56/
                        Source: regsvr32.exe, 00000008.00000003.586522117.00000000011FD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://66.228.32.31:7080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/
                        Source: regsvr32.exe, 00000008.00000002.617622368.0000000001128000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://91.121.146.47:8080/
                        Source: regsvr32.exe, 00000008.00000002.617622368.0000000001128000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://91.121.146.47:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/
                        Source: regsvr32.exe, 00000008.00000002.617622368.0000000001128000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://91.121.146.47:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/dll
                        Source: regsvr32.exe, 00000008.00000003.519602421.00000000011A1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.521824072.00000000011A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://91.121.146.47:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/y
                        Source: wscript.exe, 00000001.00000003.450771495.0000000004FD5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454658429.0000000004FD5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.435803388.0000000004FD5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453651451.0000000004FD5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbvoyage.com/
                        Source: wscript.exe, 00000001.00000003.450771495.0000000004FCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454658429.0000000004FCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453651451.0000000004FCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.435803388.0000000004FCB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbvoyage.com/G
                        Source: wscript.exe, wscript.exe, 00000001.00000003.438065273.0000000004A4C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.446215312.0000000004D5D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449163374.0000000004D50000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.445464334.0000000004D13000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454128964.0000000000569000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441367000.0000000004C39000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.437009350.0000000000519000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453635476.0000000004F6A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453064773.00000000046E4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450239085.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453556691.0000000004EEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439815100.0000000004AF2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449599586.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439285276.0000000004B00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441612434.0000000004BFF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450137005.0000000004F0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.447642991.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449126562.0000000004D1B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454449863.0000000004EB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.440428219.0000000004AE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/
                        Source: wscript.exe, 00000001.00000003.453556691.0000000004EEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449909753.0000000004EE5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454479107.0000000004EEC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/35047
                        Source: wscript.exe, 00000001.00000003.435803388.0000000004FBF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453651451.0000000004FC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450771495.0000000004FC1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450608257.0000000004FBF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/R
                        Source: wscript.exe, 00000001.00000003.450944827.0000000004704000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/uM
                        Source: wscript.exe, 00000001.00000002.454520022.0000000004F26000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450137005.0000000004F0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450304011.0000000004F1E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450088401.0000000004F0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450195483.0000000004F17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbvoyage.com:443/useragreement/ElKHvb4QIQqSrh6Hqm/
                        Source: wscript.exe, 00000001.00000003.450137005.0000000004F0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.447642991.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449126562.0000000004D1B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454449863.0000000004EB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.440428219.0000000004AE9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449909753.0000000004EE5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.442046071.0000000004CCE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439492822.0000000004A87000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.443736381.0000000004CE3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.442437886.0000000004C63000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449180398.0000000004E02000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453830092.0000000004E31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450405503.0000000004F5A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449627322.0000000004E67000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.443042100.0000000004C48000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.440428219.0000000004B1D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450304011.0000000004F1E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.443957796.0000000004D29000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439492822.0000000004ACD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.436776143.0000000000528000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439343018.0000000004AEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://penshorn.org/admin/Ses8712iGR8du/
                        Source: wscript.exe, 00000001.00000003.450944827.0000000004704000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://penshorn.org/admin/Ses8712iGR8du/tM
                        Source: wscript.exe, 00000001.00000002.454520022.0000000004F26000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450137005.0000000004F0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450304011.0000000004F1E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450088401.0000000004F0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450195483.0000000004F17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://penshorn.org:443/admin/Ses8712iGR8du/
                        Source: wscript.exe, 00000001.00000003.449909753.0000000004EE5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.442046071.0000000004CCE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439492822.0000000004A87000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.443736381.0000000004CE3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.442437886.0000000004C63000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449180398.0000000004E02000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453830092.0000000004E31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450405503.0000000004F5A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449627322.0000000004E67000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.443042100.0000000004C48000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.440428219.0000000004B1D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.443957796.0000000004D29000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439492822.0000000004ACD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.436776143.0000000000528000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439343018.0000000004AEF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.445771349.0000000004CDB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.443403718.0000000004CF8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450004431.0000000004EB8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449367507.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453580767.0000000004EB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439492822.0000000004A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/
                        Source: wscript.exe, 00000001.00000003.450944827.0000000004704000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wM
                        Source: wscript.exe, wscript.exe, 00000001.00000003.438065273.0000000004A4C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.446215312.0000000004D5D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449163374.0000000004D50000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.445464334.0000000004D13000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454128964.0000000000569000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441367000.0000000004C39000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.437009350.0000000000519000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453635476.0000000004F6A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450239085.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439815100.0000000004AF2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449599586.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439285276.0000000004B00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441612434.0000000004BFF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450137005.0000000004F0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.447642991.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449126562.0000000004D1B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454449863.0000000004EB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.440428219.0000000004AE9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449909753.0000000004EE5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.442046071.0000000004CCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gomespontes.com.br/logs/pd/
                        Source: wscript.exe, 00000001.00000003.442046071.0000000004CCE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.443957796.0000000004D29000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.443403718.0000000004CF8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441384057.0000000004C7E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.445299386.0000000004D30000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.445693425.0000000004D38000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449126562.0000000004D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441209926.0000000004C4F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.440989480.0000000004C2E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441692919.0000000004CA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gomespontes.com.br/logs/pd/ublic
                        Source: wscript.exe, 00000001.00000003.450944827.0000000004704000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gomespontes.com.br/logs/pd/vM
                        Source: unknownHTTP traffic detected: POST /kjgfzohhcvsym/ggkrpukmvfsdmfdi/ HTTP/1.1Connection: Keep-AliveContent-Length: 0Host: 164.90.222.65
                        Source: unknownDNS traffic detected: queries for: penshorn.org
                        Source: global trafficHTTP traffic detected: GET /useragreement/ElKHvb4QIQqSrh6Hqm/ HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: bbvoyage.com
                        Source: unknownHTTPS traffic detected: 31.31.196.172:443 -> 192.168.2.4:49697 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 164.90.222.65:443 -> 192.168.2.4:49707 version: TLS 1.2

                        E-Banking Fraud

                        barindex
                        Source: Yara matchFile source: 00000008.00000002.617622368.0000000001128000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 7.2.regsvr32.exe.c30000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.regsvr32.exe.1220000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.regsvr32.exe.1220000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.2.regsvr32.exe.c30000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000008.00000002.617908467.0000000001220000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.435040931.0000000000C30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.435079769.0000000000C81000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.617991497.0000000002A51000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\DWxyui\Jump to behavior
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180006818
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000B878
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180007110
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180008D28
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180014555
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C20000
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9709C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9A000
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8CC14
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C87D6C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8263C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C88BC8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C98FC8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C880CC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C908CC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8F8C4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C95CC4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C818DC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C814D4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C93CD4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C920E0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C890F8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C848FC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C83CF4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C95880
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C84C84
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9CC84
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8AC94
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C898AC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8DCB8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00CA94BC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9A8B0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9C44C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C87840
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9C058
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00CA5450
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9B460
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C82C78
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8C078
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8B07C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C96C70
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8D474
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C89408
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C87C08
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C81000
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00CA181C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8B83C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C91030
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9EC30
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C915C8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9D5F0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9BDA0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C895BC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9610C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00CA8500
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C97518
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00CA9910
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9AD28
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C94D20
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C91924
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C86138
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C87530
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9B130
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8D6CC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9EAC0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C996D4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C892F0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C88A8C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00CA4E8C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8BE90
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C94A90
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8AAB8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C84EB8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C83ABC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9A6BC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9A244
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8B258
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8F65C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8A660
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C90A70
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C83274
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C98E08
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C83E0C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9020C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C95A00
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00CA8A00
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8461C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C84214
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8BA2C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C98A2C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C90E2C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9662C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C997CC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C93FD0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C82FD4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C833D4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00CA27EC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8A7F0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C95384
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C81B94
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8DBA0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8FFB8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C98BB8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C88FB0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C84758
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8975C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9E750
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C88378
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8F77C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9D770
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9CF70
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C94F18
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9E310
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8EF14
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C93B14
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8D33C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_010F0000
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A70618
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A56E42
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A773A4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A563F4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A58BC8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A68FC8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A63FD0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A59B79
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A608CC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5640A
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5CC14
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A57D6C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A72AB0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A67EBE
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A53ABC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6A6BC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5AAB8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A54EB8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A72E84
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A58A8C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A74E8C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5BE90
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A64A90
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A592F0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A736FC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6EAC0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5D6CC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A696D4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5BA2C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A68A2C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A60E2C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6662C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5263C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A65A00
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A78A00
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A53E0C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6020C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A68E08
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A54214
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5461C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5A660
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A53274
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A60A70
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6A244
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A76E48
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5F65C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5B258
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5DBA0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A747A8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A58FB0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5FFB8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A68BB8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A65384
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A51B94
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6779A
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A727EC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5A7F0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6FFFC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A697CC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A52FD4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A533D4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5D33C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5EF14
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A63B14
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6E310
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A78310
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A75B1C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A64F18
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A78B68
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6D770
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6CF70
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5F77C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A58378
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6E750
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5975C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A54758
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A598AC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A744A8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6A8B0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A794BC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5DCB8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A54C84
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6CC84
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A65880
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A7488C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5AC94
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A71494
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6709C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A620E0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A53CF4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A548FC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A590F8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5F8C4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A65CC4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A580CC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A514D4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A63CD4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A71CD4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A518DC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A61030
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6EC30
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5B83C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A51000
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6A000
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A57C08
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A59408
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A57410
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A7181C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6B460
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A75868
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5D474
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A66C70
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5B07C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A52C78
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A5C078
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A57840
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6C44C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A75450
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6C058
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6BDA0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A595BC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6D5F0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A615C8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A61924
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A64D20
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6AD28
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6B130
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A56138
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A78500
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A72100
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6610C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A79910
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A67518
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A74D64
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180010C10 LdrFindResource_U,LdrAccessResource,NtAllocateVirtualMemory,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180010AC0 ExitProcess,RtlQueueApcWow64Thread,NtTestAlert,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180010DB0 ZwOpenSymbolicLinkObject,ZwOpenSymbolicLinkObject,
                        Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
                        Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                        Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\radE00D6.tmp.dll 2F39C2879989DDD7F9ECF52B6232598E5595F8BF367846FF188C9DFBF1251253
                        Source: Form - 16 Mar, 2023.oneReversingLabs: Detection: 38%
                        Source: Form - 16 Mar, 2023.oneVirustotal: Detection: 17%
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
                        Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE" "C:\Users\user\Desktop\Form - 16 Mar, 2023.one
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess created: C:\Windows\SysWOW64\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf"
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE /tsr
                        Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE "C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE" /tsr
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\radE00D6.tmp.dll
                        Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Users\user\AppData\Local\Temp\radE00D6.tmp.dll"
                        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\DWxyui\KGQLMqgYfV.dll"
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess created: C:\Windows\SysWOW64\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf"
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE /tsr
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\radE00D6.tmp.dll
                        Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Users\user\AppData\Local\Temp\radE00D6.tmp.dll"
                        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\DWxyui\KGQLMqgYfV.dll"
                        Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{06290BD0-48AA-11D2-8432-006008C3FBFC}\InprocServer32
                        Source: Send to OneNote.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEFile created: C:\Users\user\Documents\{A4CBEEA3-1FA3-4D28-9AC9-AD17C69AE228}Jump to behavior
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEFile created: C:\Users\user\AppData\Local\Temp\{D6E66DB4-BAF8-49D5-97F2-F88802A632EE} - OProcSessId.datJump to behavior
                        Source: classification engineClassification label: mal100.troj.expl.evad.winONE@12/692@2/50
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEFile read: C:\Program Files (x86)\desktop.iniJump to behavior
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C88BC8 Process32NextW,Process32FirstW,CreateToolhelp32Snapshot,FindCloseChangeNotification,
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXEMutant created: \Sessions\1\BaseNamedObjects\OneNoteM:AppShared
                        Source: C:\Windows\SysWOW64\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180005C69 push rdi; ret
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800056DD push rdi; ret
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C86CDE push esi; iretd
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C980D7 push ebp; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8A0FC push ebp; iretd
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C86C9F pushad ; ret
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8A1D2 push ebp; iretd
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C97987 push ebp; iretd
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C97D4E push ebp; iretd
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C89D51 push ebp; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C98157 push ebp; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C97D25 push 4D8BFFFFh; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C97D3C push ebp; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C89E8B push eax; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C97EAF push 458BCC5Ah; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C8A26E push ebp; ret
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00C9C731 push esi; iretd
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A67EAF push 458BCC5Ah; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A6C731 push esi; iretd
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A56C9F pushad ; ret
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A56CDE push esi; iretd
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A67D25 push 4D8BFFFFh; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A76D34 push edi; ret
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A67D3C push ebp; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_02A67D4E push ebp; iretd
                        Source: radE00D6.tmp.dll.1.drStatic PE information: section name: _RDATA
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\radE00D6.tmp.dll
                        Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\DWxyui\KGQLMqgYfV.dll (copy)
                        Source: C:\Windows\SysWOW64\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\radE00D6.tmp.dll
                        Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\DWxyui\KGQLMqgYfV.dll (copy)
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Send to OneNote.lnkJump to behavior
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Send to OneNote.lnkJump to behavior

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\DWxyui\KGQLMqgYfV.dll:Zone.Identifier read attributes | delete
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\wscript.exe TID: 4308Thread sleep time: -30000s >= -30000s
                        Source: C:\Windows\SysWOW64\wscript.exe TID: 3312Thread sleep time: -30000s >= -30000s
                        Source: C:\Windows\System32\regsvr32.exe TID: 2468Thread sleep time: -180000s >= -30000s
                        Source: C:\Windows\System32\regsvr32.exeAPI coverage: 8.0 %
                        Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-Timer
                        Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformation
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180008D28 FindFirstFileExW,
                        Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                        Source: wscript.exe, 00000001.00000002.454449863.0000000004EB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450771495.0000000004FD5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453580767.0000000004EB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454658429.0000000004FD5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449938520.0000000004EB1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449747783.0000000004EA9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.435803388.0000000004FD5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453651451.0000000004FD5000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.617706041.00000000011B1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.586322272.000000000116D000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.519602421.00000000011B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180001C48 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000A878 GetProcessHeap,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180010C10 LdrFindResource_U,LdrAccessResource,NtAllocateVirtualMemory,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180001C48 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800082EC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800017DC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 164.90.222.65 443
                        Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 31.31.196.172 443
                        Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 203.26.41.131 443
                        Source: C:\Windows\SysWOW64\wscript.exeDomain query: penshorn.org
                        Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 66.228.32.31 7080
                        Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 187.63.160.88 80
                        Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 104.168.155.143 8080
                        Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 91.121.146.47 8080
                        Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 182.162.143.56 443
                        Source: C:\Windows\SysWOW64\wscript.exeDomain query: bbvoyage.com
                        Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 167.172.199.165 8080
                        Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 163.44.196.120 8080
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\radE00D6.tmp.dll
                        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800070A0 cpuid
                        Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180001D98 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: Form - 16 Mar, 2023.one, type: SAMPLE
                        Source: Yara matchFile source: C:\Users\user\Desktop\Form - 16 Mar, 2023.one, type: DROPPED
                        Source: Yara matchFile source: 00000008.00000002.617622368.0000000001128000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 7.2.regsvr32.exe.c30000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.regsvr32.exe.1220000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.regsvr32.exe.1220000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.2.regsvr32.exe.c30000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000008.00000002.617908467.0000000001220000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.435040931.0000000000C30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.435079769.0000000000C81000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.617991497.0000000002A51000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: Form - 16 Mar, 2023.one, type: SAMPLE
                        Source: Yara matchFile source: C:\Users\user\Desktop\Form - 16 Mar, 2023.one, type: DROPPED
                        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                        Valid Accounts1
                        Scripting
                        2
                        Registry Run Keys / Startup Folder
                        111
                        Process Injection
                        21
                        Masquerading
                        OS Credential Dumping1
                        System Time Discovery
                        Remote Services1
                        Archive Collected Data
                        Exfiltration Over Other Network Medium11
                        Encrypted Channel
                        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                        Default Accounts1
                        Exploitation for Client Execution
                        1
                        DLL Side-Loading
                        2
                        Registry Run Keys / Startup Folder
                        1
                        Virtualization/Sandbox Evasion
                        LSASS Memory121
                        Security Software Discovery
                        Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                        Non-Standard Port
                        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                        Domain AccountsAt (Linux)Logon Script (Windows)1
                        DLL Side-Loading
                        111
                        Process Injection
                        Security Account Manager1
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                        Ingress Tool Transfer
                        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                        Scripting
                        NTDS2
                        Process Discovery
                        Distributed Component Object ModelInput CaptureScheduled Transfer3
                        Non-Application Layer Protocol
                        SIM Card SwapCarrier Billing Fraud
                        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                        Hidden Files and Directories
                        LSA Secrets1
                        Remote System Discovery
                        SSHKeyloggingData Transfer Size Limits114
                        Application Layer Protocol
                        Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                        Replication Through Removable MediaLaunchdRc.commonRc.common1
                        Obfuscated Files or Information
                        Cached Domain Credentials2
                        File and Directory Discovery
                        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                        External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                        Regsvr32
                        DCSync25
                        System Information Discovery
                        Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                        DLL Side-Loading
                        Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 828882 Sample: Form - 16 Mar, 2023.one Startdate: 17/03/2023 Architecture: WINDOWS Score: 100 40 129.232.188.93 xneeloZA South Africa 2->40 42 45.235.8.30 WIKINETTELECOMUNICACOESBR Brazil 2->42 44 38 other IPs or domains 2->44 58 Snort IDS alert for network traffic 2->58 60 Multi AV Scanner detection for domain / URL 2->60 62 Antivirus detection for URL or domain 2->62 64 7 other signatures 2->64 10 ONENOTE.EXE 50 501 2->10         started        13 ONENOTEM.EXE 2->13         started        signatures3 process4 file5 38 C:\Users\user\...\Form - 16 Mar, 2023.one, data 10->38 dropped 15 wscript.exe 2 10->15         started        20 ONENOTEM.EXE 1 10->20         started        process6 dnsIp7 52 penshorn.org 203.26.41.131, 443, 49696 DREAMSCAPE-AS-APDreamscapeNetworksLimitedAU Australia 15->52 54 bbvoyage.com 31.31.196.172, 443, 49697 AS-REGRU Russian Federation 15->54 32 C:\Users\user\AppData\...\radE00D6.tmp.dll, PE32+ 15->32 dropped 34 C:\Users\user\AppData\Local\Temp\click.wsf, ASCII 15->34 dropped 56 System process connects to network (likely due to code injection or exploit) 15->56 22 regsvr32.exe 15->22         started        file8 signatures9 process10 process11 24 regsvr32.exe 2 22->24         started        file12 36 C:\Windows\System32\...\KGQLMqgYfV.dll (copy), PE32+ 24->36 dropped 66 Hides that the sample has been downloaded from the Internet (zone.identifier) 24->66 28 regsvr32.exe 24->28         started        signatures13 process14 dnsIp15 46 91.121.146.47, 49698, 8080 OVHFR France 28->46 48 66.228.32.31, 49700, 7080 LINODE-APLinodeLLCUS United States 28->48 50 6 other IPs or domains 28->50 68 System process connects to network (likely due to code injection or exploit) 28->68 signatures16

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        Form - 16 Mar, 2023.one38%ReversingLabsWin32.Trojan.OneNote
                        Form - 16 Mar, 2023.one17%VirustotalBrowse
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Local\Temp\radE00D6.tmp.dll58%ReversingLabsWin64.Trojan.Emotet
                        C:\Windows\System32\DWxyui\KGQLMqgYfV.dll (copy)58%ReversingLabsWin64.Trojan.Emotet
                        SourceDetectionScannerLabelLinkDownload
                        7.2.regsvr32.exe.c30000.0.unpack100%AviraHEUR/AGEN.1215476Download File
                        8.2.regsvr32.exe.1220000.0.unpack100%AviraHEUR/AGEN.1215476Download File
                        SourceDetectionScannerLabelLink
                        bbvoyage.com9%VirustotalBrowse
                        penshorn.org11%VirustotalBrowse
                        SourceDetectionScannerLabelLink
                        https://182.162.143.56/0%URL Reputationsafe
                        https://164.90.222.65/0%URL Reputationsafe
                        https://91.121.146.47:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/y100%Avira URL Cloudmalware
                        https://104.168.155.143:8080/0%URL Reputationsafe
                        http://ozmeydan.com/cekici/9/22%VirustotalBrowse
                        http://softwareulike.com/cWIYxWMPkK/22%VirustotalBrowse
                        https://www.gomespontes.com.br/logs/pd/100%Avira URL Cloudmalware
                        https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wM100%Avira URL Cloudmalware
                        http://softwareulike.com/cWIYxWMPkK/100%Avira URL Cloudmalware
                        http://ozmeydan.com/cekici/9/100%Avira URL Cloudmalware
                        https://104.168.155.143:8080/i100%Avira URL Cloudmalware
                        https://167.172.199.165:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/#100%Avira URL Cloudmalware
                        https://104.168.155.143:8080/g100%Avira URL Cloudmalware
                        https://163.44.196.120:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/100%Avira URL Cloudmalware
                        https://bbvoyage.com:443/useragreement/ElKHvb4QIQqSrh6Hqm/100%Avira URL Cloudmalware
                        https://penshorn.org/admin/Ses8712iGR8du/tM100%Avira URL Cloudmalware
                        https://penshorn.org/admin/Ses8712iGR8du/100%Avira URL Cloudmalware
                        https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/uM100%Avira URL Cloudmalware
                        https://bbvoyage.com/G0%Avira URL Cloudsafe
                        https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/R100%Avira URL Cloudmalware
                        http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/100%Avira URL Cloudmalware
                        https://164.90.222.65/0/100%Avira URL Cloudmalware
                        https://91.121.146.47:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/dll100%Avira URL Cloudmalware
                        https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/100%Avira URL Cloudmalware
                        https://167.172.199.165:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/100%Avira URL Cloudmalware
                        http://softwareulike.com/cWIYxWMPkK/yM100%Avira URL Cloudmalware
                        https://91.121.146.47:8080/100%Avira URL Cloudmalware
                        https://66.228.32.31:7080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/100%Avira URL Cloudmalware
                        https://164.90.222.65/kjgfzohhcvsym/ggkrpukmvfsdmfdi/100%Avira URL Cloudmalware
                        https://163.44.196.120:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/f4)100%Avira URL Cloudmalware
                        https://91.121.146.47:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/100%Avira URL Cloudmalware
                        https://bbvoyage.com/0%Avira URL Cloudsafe
                        https://www.gomespontes.com.br/logs/pd/vM100%Avira URL Cloudmalware
                        https://163.44.196.120:8080/a100%Avira URL Cloudmalware
                        https://163.44.196.120:8080/m/Low100%Avira URL Cloudmalware
                        https://163.44.196.120:8080/c100%Avira URL Cloudmalware
                        http://ozmeydan.com/cekici/9/xM100%Avira URL Cloudmalware
                        http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/O100%Avira URL Cloudmalware
                        https://163.44.196.120:8080/h100%Avira URL Cloudmalware
                        https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/100%Avira URL Cloudmalware
                        http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/zM100%Avira URL Cloudmalware
                        https://103.44.196.120:8080/0%Avira URL Cloudsafe
                        https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/35047100%Avira URL Cloudmalware
                        https://104.168.155.143:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/100%Avira URL Cloudmalware
                        https://penshorn.org:443/admin/Ses8712iGR8du/100%Avira URL Cloudmalware
                        https://www.gomespontes.com.br/logs/pd/ublic100%Avira URL Cloudmalware
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        bbvoyage.com
                        31.31.196.172
                        truetrueunknown
                        penshorn.org
                        203.26.41.131
                        truetrueunknown
                        NameMaliciousAntivirus DetectionReputation
                        https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/true
                        • Avira URL Cloud: malware
                        unknown
                        https://164.90.222.65/kjgfzohhcvsym/ggkrpukmvfsdmfdi/true
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://ozmeydan.com/cekici/9/wscript.exe, wscript.exe, 00000001.00000003.438065273.0000000004A4C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.446215312.0000000004D5D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449163374.0000000004D50000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.445464334.0000000004D13000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454128964.0000000000569000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441367000.0000000004C39000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.437009350.0000000000519000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453635476.0000000004F6A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450239085.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439815100.0000000004AF2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449599586.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439285276.0000000004B00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441612434.0000000004BFF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450137005.0000000004F0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.447642991.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449126562.0000000004D1B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454449863.0000000004EB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.440428219.0000000004AE9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449909753.0000000004EE5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.442046071.0000000004CCE000.00000004.00000020.00020000.00000000.sdmpfalse
                        • 22%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        https://104.168.155.143:8080/iregsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://softwareulike.com/cWIYxWMPkK/wscript.exe, wscript.exe, 00000001.00000003.438065273.0000000004A4C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.446215312.0000000004D5D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449163374.0000000004D50000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.445464334.0000000004D13000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454128964.0000000000569000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441367000.0000000004C39000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.437009350.0000000000519000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453635476.0000000004F6A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450239085.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439815100.0000000004AF2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449599586.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439285276.0000000004B00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441612434.0000000004BFF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450137005.0000000004F0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.447642991.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449126562.0000000004D1B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454449863.0000000004EB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.440428219.0000000004AE9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449909753.0000000004EE5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.442046071.0000000004CCE000.00000004.00000020.00020000.00000000.sdmpfalse
                        • 22%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        https://91.121.146.47:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/yregsvr32.exe, 00000008.00000003.519602421.00000000011A1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.521824072.00000000011A1000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wMwscript.exe, 00000001.00000003.450944827.0000000004704000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://www.gomespontes.com.br/logs/pd/wscript.exe, wscript.exe, 00000001.00000003.438065273.0000000004A4C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.446215312.0000000004D5D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449163374.0000000004D50000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.445464334.0000000004D13000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454128964.0000000000569000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441367000.0000000004C39000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.437009350.0000000000519000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453635476.0000000004F6A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450239085.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439815100.0000000004AF2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449599586.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439285276.0000000004B00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441612434.0000000004BFF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450137005.0000000004F0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.447642991.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449126562.0000000004D1B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454449863.0000000004EB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.440428219.0000000004AE9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449909753.0000000004EE5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.442046071.0000000004CCE000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://167.172.199.165:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/#regsvr32.exe, 00000008.00000003.586761426.00000000011C0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.586322272.00000000011C0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://104.168.155.143:8080/gregsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://penshorn.org/admin/Ses8712iGR8du/tMwscript.exe, 00000001.00000003.450944827.0000000004704000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://182.162.143.56/regsvr32.exe, 00000008.00000003.586522117.00000000011FD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://164.90.222.65/regsvr32.exe, 00000008.00000003.586522117.00000000011FD000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://163.44.196.120:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/regsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://bbvoyage.com:443/useragreement/ElKHvb4QIQqSrh6Hqm/wscript.exe, 00000001.00000002.454520022.0000000004F26000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450137005.0000000004F0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450304011.0000000004F1E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450088401.0000000004F0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450195483.0000000004F17000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/uMwscript.exe, 00000001.00000003.450944827.0000000004704000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://penshorn.org/admin/Ses8712iGR8du/wscript.exe, 00000001.00000003.450137005.0000000004F0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.447642991.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449126562.0000000004D1B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454449863.0000000004EB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.440428219.0000000004AE9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449909753.0000000004EE5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.442046071.0000000004CCE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439492822.0000000004A87000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.443736381.0000000004CE3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.442437886.0000000004C63000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449180398.0000000004E02000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453830092.0000000004E31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450405503.0000000004F5A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449627322.0000000004E67000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.443042100.0000000004C48000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.440428219.0000000004B1D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450304011.0000000004F1E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.443957796.0000000004D29000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439492822.0000000004ACD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.436776143.0000000000528000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439343018.0000000004AEF000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://bbvoyage.com/Gwscript.exe, 00000001.00000003.450771495.0000000004FCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454658429.0000000004FCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453651451.0000000004FCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.435803388.0000000004FCB000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: safe
                        unknown
                        https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/Rwscript.exe, 00000001.00000003.435803388.0000000004FBF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453651451.0000000004FC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450771495.0000000004FC1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450608257.0000000004FBF000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/wscript.exe, wscript.exe, 00000001.00000003.438065273.0000000004A4C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.446215312.0000000004D5D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449163374.0000000004D50000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.445464334.0000000004D13000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454128964.0000000000569000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441367000.0000000004C39000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.437009350.0000000000519000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453635476.0000000004F6A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450239085.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439815100.0000000004AF2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449599586.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439285276.0000000004B00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441612434.0000000004BFF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450137005.0000000004F0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.447642991.0000000004DCB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449126562.0000000004D1B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454449863.0000000004EB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.440428219.0000000004AE9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449909753.0000000004EE5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.442046071.0000000004CCE000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://164.90.222.65/0/regsvr32.exe, 00000008.00000003.586522117.00000000011FD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://91.121.146.47:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/dllregsvr32.exe, 00000008.00000002.617622368.0000000001128000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://167.172.199.165:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/regsvr32.exe, 00000008.00000002.618264606.00000000033E7000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://softwareulike.com/cWIYxWMPkK/yMwscript.exe, 00000001.00000003.450944827.0000000004704000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://91.121.146.47:8080/regsvr32.exe, 00000008.00000002.617622368.0000000001128000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://66.228.32.31:7080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/regsvr32.exe, 00000008.00000003.586522117.00000000011FD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://163.44.196.120:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/f4)regsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://91.121.146.47:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/regsvr32.exe, 00000008.00000002.617622368.0000000001128000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://bbvoyage.com/wscript.exe, 00000001.00000003.450771495.0000000004FD5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454658429.0000000004FD5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.435803388.0000000004FD5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453651451.0000000004FD5000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: safe
                        unknown
                        https://www.gomespontes.com.br/logs/pd/vMwscript.exe, 00000001.00000003.450944827.0000000004704000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://163.44.196.120:8080/aregsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://163.44.196.120:8080/m/Lowregsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://163.44.196.120:8080/cregsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://ozmeydan.com/cekici/9/xMwscript.exe, 00000001.00000003.450944827.0000000004704000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/Owscript.exe, 00000001.00000002.454494243.0000000004F0C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450088401.0000000004F0A000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://104.168.155.143:8080/regsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://163.44.196.120:8080/hregsvr32.exe, 00000008.00000002.617706041.00000000011FD000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wscript.exe, 00000001.00000003.449909753.0000000004EE5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.442046071.0000000004CCE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439492822.0000000004A87000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.443736381.0000000004CE3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.442437886.0000000004C63000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449180398.0000000004E02000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453830092.0000000004E31000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450405503.0000000004F5A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449627322.0000000004E67000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.443042100.0000000004C48000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.440428219.0000000004B1D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.443957796.0000000004D29000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439492822.0000000004ACD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.436776143.0000000000528000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439343018.0000000004AEF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.445771349.0000000004CDB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.443403718.0000000004CF8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450004431.0000000004EB8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449367507.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.453580767.0000000004EB3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.439492822.0000000004A98000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/zMwscript.exe, 00000001.00000003.450944827.0000000004704000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://103.44.196.120:8080/regsvr32.exe, 00000008.00000002.617706041.00000000011A3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/35047wscript.exe, 00000001.00000003.453556691.0000000004EEC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449909753.0000000004EE5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.454479107.0000000004EEC000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://104.168.155.143:8080/kjgfzohhcvsym/ggkrpukmvfsdmfdi/regsvr32.exe, 00000008.00000002.618264606.00000000033E7000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.617706041.00000000011B1000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://penshorn.org:443/admin/Ses8712iGR8du/wscript.exe, 00000001.00000002.454520022.0000000004F26000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450137005.0000000004F0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450304011.0000000004F1E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450088401.0000000004F0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.450195483.0000000004F17000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://www.gomespontes.com.br/logs/pd/ublicwscript.exe, 00000001.00000003.442046071.0000000004CCE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.443957796.0000000004D29000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.443403718.0000000004CF8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441384057.0000000004C7E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.445299386.0000000004D30000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.445693425.0000000004D38000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.449126562.0000000004D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441209926.0000000004C4F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.440989480.0000000004C2E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.441692919.0000000004CA6000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        110.232.117.186
                        unknownAustralia
                        56038RACKCORP-APRackCorpAUtrue
                        103.132.242.26
                        unknownIndia
                        45117INPL-IN-APIshansNetworkINtrue
                        104.168.155.143
                        unknownUnited States
                        54290HOSTWINDSUStrue
                        79.137.35.198
                        unknownFrance
                        16276OVHFRtrue
                        115.68.227.76
                        unknownKorea Republic of
                        38700SMILESERV-AS-KRSMILESERVKRtrue
                        163.44.196.120
                        unknownSingapore
                        135161GMO-Z-COM-THGMO-ZcomNetDesignHoldingsCoLtdSGtrue
                        206.189.28.199
                        unknownUnited States
                        14061DIGITALOCEAN-ASNUStrue
                        31.31.196.172
                        bbvoyage.comRussian Federation
                        197695AS-REGRUtrue
                        203.26.41.131
                        penshorn.orgAustralia
                        38719DREAMSCAPE-AS-APDreamscapeNetworksLimitedAUtrue
                        107.170.39.149
                        unknownUnited States
                        14061DIGITALOCEAN-ASNUStrue
                        66.228.32.31
                        unknownUnited States
                        63949LINODE-APLinodeLLCUStrue
                        197.242.150.244
                        unknownSouth Africa
                        37611AfrihostZAtrue
                        185.4.135.165
                        unknownGreece
                        199246TOPHOSTGRtrue
                        183.111.227.137
                        unknownKorea Republic of
                        4766KIXS-AS-KRKoreaTelecomKRtrue
                        45.176.232.124
                        unknownColombia
                        267869CABLEYTELECOMUNICACIONESDECOLOMBIASASCABLETELCOCtrue
                        169.57.156.166
                        unknownUnited States
                        36351SOFTLAYERUStrue
                        164.68.99.3
                        unknownGermany
                        51167CONTABODEtrue
                        139.59.126.41
                        unknownSingapore
                        14061DIGITALOCEAN-ASNUStrue
                        167.172.253.162
                        unknownUnited States
                        14061DIGITALOCEAN-ASNUStrue
                        167.172.199.165
                        unknownUnited States
                        14061DIGITALOCEAN-ASNUStrue
                        202.129.205.3
                        unknownThailand
                        45328NIPA-AS-THNIPATECHNOLOGYCOLTDTHtrue
                        147.139.166.154
                        unknownUnited States
                        45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCtrue
                        153.92.5.27
                        unknownGermany
                        47583AS-HOSTINGERLTtrue
                        159.65.88.10
                        unknownUnited States
                        14061DIGITALOCEAN-ASNUStrue
                        172.105.226.75
                        unknownUnited States
                        63949LINODE-APLinodeLLCUStrue
                        164.90.222.65
                        unknownUnited States
                        14061DIGITALOCEAN-ASNUStrue
                        213.239.212.5
                        unknownGermany
                        24940HETZNER-ASDEtrue
                        5.135.159.50
                        unknownFrance
                        16276OVHFRtrue
                        186.194.240.217
                        unknownBrazil
                        262733NetceteraTelecomunicacoesLtdaBRtrue
                        119.59.103.152
                        unknownThailand
                        56067METRABYTE-TH453LadplacoutJorakhaebuaTHtrue
                        159.89.202.34
                        unknownUnited States
                        14061DIGITALOCEAN-ASNUStrue
                        91.121.146.47
                        unknownFrance
                        16276OVHFRtrue
                        160.16.142.56
                        unknownJapan9370SAKURA-BSAKURAInternetIncJPtrue
                        201.94.166.162
                        unknownBrazil
                        28573CLAROSABRtrue
                        91.207.28.33
                        unknownKyrgyzstan
                        39819PROHOSTKGtrue
                        103.75.201.2
                        unknownThailand
                        133496CDNPLUSCOLTD-AS-APCDNPLUSCOLTDTHtrue
                        103.43.75.120
                        unknownJapan20473AS-CHOOPAUStrue
                        188.44.20.25
                        unknownMacedonia
                        57374GIV-ASMKtrue
                        45.235.8.30
                        unknownBrazil
                        267405WIKINETTELECOMUNICACOESBRtrue
                        153.126.146.25
                        unknownJapan7684SAKURA-ASAKURAInternetIncJPtrue
                        72.15.201.15
                        unknownUnited States
                        13649ASN-VINSUStrue
                        187.63.160.88
                        unknownBrazil
                        28169BITCOMPROVEDORDESERVICOSDEINTERNETLTDABRtrue
                        82.223.21.224
                        unknownSpain
                        8560ONEANDONE-ASBrauerstrasse48DEtrue
                        173.212.193.249
                        unknownGermany
                        51167CONTABODEtrue
                        95.217.221.146
                        unknownGermany
                        24940HETZNER-ASDEtrue
                        149.56.131.28
                        unknownCanada
                        16276OVHFRtrue
                        182.162.143.56
                        unknownKorea Republic of
                        3786LGDACOMLGDACOMCorporationKRtrue
                        1.234.2.232
                        unknownKorea Republic of
                        9318SKB-ASSKBroadbandCoLtdKRtrue
                        129.232.188.93
                        unknownSouth Africa
                        37153xneeloZAtrue
                        94.23.45.86
                        unknownFrance
                        16276OVHFRtrue
                        Joe Sandbox Version:37.0.0 Beryl
                        Analysis ID:828882
                        Start date and time:2023-03-17 16:43:17 +01:00
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 9m 33s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:12
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample file name:Form - 16 Mar, 2023.one
                        Detection:MAL
                        Classification:mal100.troj.expl.evad.winONE@12/692@2/50
                        EGA Information:
                        • Successful, ratio: 100%
                        HDC Information:
                        • Successful, ratio: 50.2% (good quality ratio 42.4%)
                        • Quality average: 60.5%
                        • Quality standard deviation: 35.6%
                        HCA Information:
                        • Successful, ratio: 89%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Found application associated with file extension: .one
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
                        • TCP Packets have been reduced to 100
                        • Created / dropped Files have been reduced to 100
                        • Excluded IPs from analysis (whitelisted): 52.109.88.191, 20.126.111.161, 20.223.225.174, 209.197.3.8
                        • Excluded domains from analysis (whitelisted): prod-w.nexus.live.com.akadns.net, config.officeapps.live.com, prod.configsvc1.live.com.akadns.net, nexus.officeapps.live.com, ctldl.windowsupdate.com, officeclient.microsoft.com, cds.d2s7q6s2.hwcdn.net, wu-bg-shim.trafficmanager.net, europe.configsvc1.live.com.akadns.net
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                        • Report size getting too big, too many NtCreateFile calls found.
                        • Report size getting too big, too many NtOpenFile calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                        • Report size getting too big, too many NtReadFile calls found.
                        • Report size getting too big, too many NtSetInformationFile calls found.
                        • Report size getting too big, too many NtWriteFile calls found.
                        TimeTypeDescription
                        16:44:51AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Send to OneNote.lnk
                        16:45:20API Interceptor2x Sleep call for process: wscript.exe modified
                        16:45:52API Interceptor8x Sleep call for process: regsvr32.exe modified
                        No context
                        No context
                        No context
                        No context
                        No context
                        Process:C:\Windows\System32\regsvr32.exe
                        File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 62582 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                        Category:dropped
                        Size (bytes):62582
                        Entropy (8bit):7.996063107774368
                        Encrypted:true
                        SSDEEP:1536:Jk3XPi43VgGp0gB2itudTSRAn/TWTdWftu:CHa43V5p022iZ4CgA
                        MD5:E71C8443AE0BC2E282C73FAEAD0A6DD3
                        SHA1:0C110C1B01E68EDFACAEAE64781A37B1995FA94B
                        SHA-256:95B0A5ACC5BF70D3ABDFD091D0C9F9063AA4FDE65BD34DBF16786082E1992E72
                        SHA-512:B38458C7FA2825AFB72794F374827403D5946B1132E136A0CE075DFD351277CF7D957C88DC8A1E4ADC3BCAE1FA8010DAE3831E268E910D517691DE24326391A6
                        Malicious:false
                        Preview:MSCF....v.......,...................I.................BVrl .authroot.stl....oJ5..CK..8U....a..3.1.P. J.".t..2F2e.dHH......$E.KB.2D..-SJE....^..'..y.}..,{m.....\...]4.G.......h....148...e.gr.....48:.L...g.....Xef.x:..t...J...6-....kW6Z>....&......ye.U.Q&z:.vZ..._....a...]..T.E.....B.h.,...[....V.O.3..EW.x.?.Q..$.@.W..=.B.f..8a.Y.JK..g./%p..C.4CD.s..Jd.u..@.g=...a.. .h%..'.xjy7.E..\.....A..':.4TdW?Ko3$.Hg.z.d~....../q..C.....`...A[ W(.........9...GZ.;....l&?........F...p?... .p.....{S.L4..v.+...7.T?.....p..`..&..9.......f...0+.L.....1.2b)..vX5L'.~....2vz.,E.Ni.{#...o..w.?.#.3..h.v<.S%.].tD@!Le.w.q.7.8....QW.FT.....hE.........Y............./.%Q...k...*.Y.n..v.A..../...>B..5\..-Ko.......O<.b.K.{.O.b...._.7...4.;%9N..K.X>......kg-9..r.c.g.G|.*[.-...HT...",?.q...ad....7RE.......!f..#../....?.-.^.K.c^...+{.g......]<..$.=.O....ii7.wJ+S..Z..d.....>..J*...T..Q7..`.r,<$....\d:K`..T.n....N.....C..j.;.1SX..j....1...R....+....Yg....]....3..9..S..D..`.
                        Process:C:\Windows\System32\regsvr32.exe
                        File Type:data
                        Category:modified
                        Size (bytes):328
                        Entropy (8bit):3.1274376123142225
                        Encrypted:false
                        SSDEEP:6:kKwry/7UN+SkQlPlEGYRMY9z+4KlDA3RUecZUt:ACvkPlE99SNxAhUext
                        MD5:0B7439ADAAE95E39C63EA908B028DF12
                        SHA1:1111DDEAA809432990D858EF2BE48F9B173D63B8
                        SHA-256:4564A41381FAF72080564397DAB2AC8024714211E8DC03FAF958E017C335570E
                        SHA-512:5E9654C59EFAB27C0BC9A3371480CCD80355B6056B207D9BDD421FDF69A66E4B0A8D81519126947846C29BF3EE075E862C45F6FA141C23286FEC0216E3538459
                        Malicious:false
                        Preview:p...... ........4j..X..(....................................................... ..........).K......&...........v...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.d.2.f.9.2.9.a.7.4.b.d.9.1.:.0."...
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):154907
                        Entropy (8bit):5.352021939336454
                        Encrypted:false
                        SSDEEP:1536:Z+C76gfYBIB9guw6LQ9DQl+zQxik4F77nXmvidlXRpE6Lhz67:IcQ9DQl+zrXgb
                        MD5:A6F7EFD58FEC4F8DB94CF004C4E8D79C
                        SHA1:7B67839C7125D7B5DB5A38AAA83858F8214A3F5B
                        SHA-256:ECBCD9BB5D855E0CA8AC392992269B0266F0D6A30E72C1C7FA434E41155871EB
                        SHA-512:7DA06FA44734437443835E3889C96191C569ACF4ED9E6D483A121A0390B6011C437C4B9DAC8E68D08A99E672DA2ABA15400D8390BA7CC14D8E080F32302F4D75
                        Malicious:false
                        Preview:<?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2023-03-17T15:44:11">.. Build: 16.0.16310.30525-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://rr.office.microsoft.com/research/query.asmx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId" o:authentication="1">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. <o:ticket o:policy="MBI_SSL_SHORT" o:idprovider="1" o:target="[MAX.AuthHost]" o:headerValue="Passport1.4 from-PP='{}&amp;p='" />.. <o:ticket o:idprovider="3" o:headerValue="Bearer {}" o:resourceId="[MAX.ResourceId]" o:authorityUrl="[ADALAuthorityU
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 165 x 131, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):3679
                        Entropy (8bit):7.931319059366604
                        Encrypted:false
                        SSDEEP:96:tT+LtoQ9jsUBsnwlDGThUe8ww2iJiGEjdKKnnE+Gh:V+Ltt5GwlDQhUe8ww2iJi7MKnnE+K
                        MD5:995CEACAD563F849C4142B6A6F29F081
                        SHA1:44CB3B867CD2917541B7D5AAED2F14F10FEBB0FD
                        SHA-256:3691FB8C60EA1B827092F05FBB1807E34726016C6FF56698D7B81C44D519D22A
                        SHA-512:3C8EFEB966B075D06D8344483352BF92C9292F9970C9377BE254EB355EFAF017916737AECCDC704B84D532B7229F9908951A6F2CC3FAD810791CAB224401AD3D
                        Malicious:false
                        Preview:.PNG........IHDR.............c.L.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^....W...Gh...k.Hm..J.m....,X...Eh..%.n.....PHvy$%...[...R..l...(/..-..yl..Z.h..H!.../.|.y|w...7d3s.s.=.{.s.g.6W.^..)..@..{..'O.LL.......c.^.6xS&O.,...J.(|?...............,.$......@.zk....,.$.........)..7]O...mH7..0..|..&j..t..F...T...AZ7z.....$H...AZ7z.....$H...AZ7z.....$H...AZ7z.....$H....W.6.....0...FTcc.Wi....Q)...<.*.....{...#G....Y.f....KKK..,,,4.....{S.`...+O.[..+.\H...(.<..Qy*..ET.PM...c....~(.g..**...ol.K......Sc8..q.F.KM"<...:t.O.>b..$*t..].........2..y.h."!f.08hT..m.(..C.7n.......@....SVUU).F.).X\\....[j.U....$x$d..e...<.W......=;0L78t+..Gw..-....]......C7......K.w..._..g......A.&M.$^.#.!....e.\.P........;vD..@...Za.@*D..f...! .2w...4#.J..c....K}....F.u.I.b.V2.k...5..`....*........M..!.,.;.E..BZ....K..[7....5....,...........K...7+.6..o....\,`...z..5x...\46x.b......Y....s.^.x=.e.4s.W..t,.iu.G^.....(74....`.....:......]..&..j+t9..3..}..
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 127 x 138, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):2232
                        Entropy (8bit):7.837610270261933
                        Encrypted:false
                        SSDEEP:48:dFQY2WmQbe+TukEC2KgYPsWOuWFk792oP/sWtGOK9Lc+rD0NTHj:3L+wKkEOgx3PG92Eqt9LczFD
                        MD5:EDB5ED43CC6038500A54B90BEC493628
                        SHA1:A8CD63F3914E4347F4C5552FB922C6C03917F45F
                        SHA-256:9F3312E33EB78C6952B5A5D881BBD18751FCFAC41D648C6F053CE781342A504F
                        SHA-512:4EBCEFD69A4C249AA3B0F00A954C4E463DA22FC9CA0B61A0DC46079B438138C509B22188D966FFF6599A3A604858BC4CC8FE6E0685A764E8E0477AB7A237DB32
                        Malicious:false
                        Preview:.PNG........IHDR.....................sRGB.........gAMA......a.....pHYs..........o.d...MIDATx^..hVU..}..s:..6..9g.MM3...j...*........A..!.A.....R.Ai%YH..(M.".h.cf*.B.......:...{w.{.......y.s>.{.{.=.........#.y..r.K...K.0}......Y..b..[N.=....j.=........!......./.6....B.8....p....5P)....@......=}............^.~..@.o`n<.q.....Yw]..mg\V*...y.W.T.>...\n...s.iG.~L]..d.<.8..j<.<1..4...CZ0...}...........oDDh.....]3}#"B..O........0}B.F.L......5.f.FD..L....5.7""4`..p.........'.kt.....>!\.k.oDDh.....]3}#"B..O........0}B.F.L......5.f.FD..I..x........Z^...>B$1.N"}4.....1:&F8..*.X.yL(..s.3......~2.EL%.w.Uc.zJ...B..S..b.7o|%..7..'.....N.|..Vi...q..uO,`/....\W{..y...&iI..|X&T.........-........Z..o.~u..U....cF.M....O4}......~......:T..W.._s...t..Dlb.$Pr././.._4.b......R.T$t..$.>hB. +.{......m.w .Q...05..C.}...}.....?..h.....Y .8.6^t....}.y.%......l=$..[.~..]..h..N.......*....SB.|....8..H......_...G...|......;6YQ|WO.o.}]..'.$..oE.y...i'9.[cmS..@m@.Q
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):1604
                        Entropy (8bit):7.814570704154439
                        Encrypted:false
                        SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                        MD5:3F1535054D4F9626F0EB10CEE47F076E
                        SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                        SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                        SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                        Malicious:false
                        Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 749 x 126, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):13084
                        Entropy (8bit):7.940058639272698
                        Encrypted:false
                        SSDEEP:384:o4KSpFN6Ud4c3p2Il1yavNr5spYVJzimlfZ:wGN6Udv4IKavLBJz/r
                        MD5:0693DABBBC411538D209F32E22F622F6
                        SHA1:FB7E675406FA123CDB7E058D336742D6A2E8DC8E
                        SHA-256:2DFB2E7A1A3AA43C673D2EE540D3C366CEB12105EB5441F98992FC06F4284013
                        SHA-512:F07732660EC62DAE58EB02E2E9476007EA92BF826F642BCA547097136AEA01D29FF69D9B0CD0F5D65A5E15AA66CA4AA4804AA171A3504AAB198631C643C90C16
                        Malicious:false
                        Preview:.PNG........IHDR.......~.............sRGB.........gAMA......a.....pHYs..........o.d..2.IDATx^.w....'m.9c.6"...&.`.N.(.TN.Ne.N.R.eKr..T.*[...?T..:I.D.S>I$A...I......y.9...f......3...Gh.....}_.o....n..A@.....A@...L...2... ..... .x...#. ..... .....1f]9.[.....A@......3 ..... ...fE@x.YWN.....A@......1...... .....Y..J.Y.N.....s"................./..rc.scuyyyu...\s....t.oi..j..lv.....Gr.#9%%%9%--....d.T...r...DH...6.....%U..A@.0.....rAD ........2.5.......L.R..=W...gZ.`o..-?.T.Cy.:...y.9..y.EE...v......1..R.....1.".... `"...ss.......i.!.hY...Fj*....%.-.Gw...HJJr8..6...#.......!(.?P.(.....8(u........*..OOO..........dgg....Q..=..c.y....A`S.@.......3.CC..GFfg. .I.I.COrJFFFNNV^nn^^.z..%..(...^.b$........a..y.LMO-.,ylV+.k...T>Jg..*//-+-......M=..x.....E.... `~..N.Kww.......z...%%.e.%.yy.i...P.)'.,A.5.d.0.Cc35==66>2::33..>..;..Ii.i.gv...DSd....l#...l..............................)**,**...V..1 .F.'7....)..SSs..7..F...C.p....(*,......(RG..B...l!.2. ....|r1
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):1604
                        Entropy (8bit):7.814570704154439
                        Encrypted:false
                        SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                        MD5:3F1535054D4F9626F0EB10CEE47F076E
                        SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                        SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                        SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                        Malicious:false
                        Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 163 x 131, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):4847
                        Entropy (8bit):7.950192613458318
                        Encrypted:false
                        SSDEEP:96:JnieMJz5Tz/gKVp93jQvcv16kjOzbapFJBkjcMNBqmQzOG8qx1QKnse8T:JieMJzph13Evcv16RfapFLxMNBo8qxan
                        MD5:A1A1017A6A7928761CEB56D1D950E123
                        SHA1:28272E9C7F816A1CE8F2033FC00F489005332365
                        SHA-256:72F066CD34EA71D0E1B28FB60D663B0372C5254E1A8239C94A164EEF9389DB88
                        SHA-512:10F4557F102230126BC86CD4B49C93365C38D5CBEAC51F4691B90D861098866A2BDEFEBA507731D4FA14367FEE430453BD716157F9074EF643F2B949B09E1530
                        Malicious:false
                        Preview:.PNG........IHDR.............n.<.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].\TU..}...E.0.T....L~....af..Z.....O..4..>Ms..Js_....5.E.d...Y....?\z.3..}.l..|?~...{.....s.z..Y.............E.X.6...c..u...y..W.j....."}...l.i.`.!-!-......MKH.E.bi.d...b.X.)...X4 .vJ6-...;..+/.->Qyi.t...%.T..k;.U..y.C$[;..Gm.......v..*2..2..eee..."!..)...yy...III./..u........2....M.:''...W.....o..t...._.6m.... .`,k.T.v."..q.......s~~........O....ed.[W0X..HB.V.i.....<=..E^^......MyY..vpp...........^6.....aQQQaaa........]^^nkg../_.d`.%......L&k..B......?C....W.VVV6660t.J+K.:..%q.....e.cp....Kz..%.qZsAR\T.!......>55.R.u.W\\.L....T...K..rE.U.K.-9......y.y.......K....>...HWTT.e....+..B.......%%%......^...|...M'.%.f!/..=p...{O..../...@...DP..hw8....7o>..A.mgg......7-']~.s.OE.E.|=.......'%!y.......\.....MSn.i.........!...U.$0S .......Z.P.}[.%X[.;{....N.....\......6O.....'.N}.}s.m...E..V..f..r...4..~.......H..F.}....4,.R.=.......xT..4......./...,z
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):1604
                        Entropy (8bit):7.814570704154439
                        Encrypted:false
                        SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                        MD5:3F1535054D4F9626F0EB10CEE47F076E
                        SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                        SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                        SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                        Malicious:false
                        Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 123 x 103, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):1657
                        Entropy (8bit):7.80882577056055
                        Encrypted:false
                        SSDEEP:24:q3kLWZefR0kKbfLnNhzzt+acvt2x6pBs/j+7QJU0QbDQ883ASaoUV4hNgq1rsyhy:q322nN+X11GDsg8831Uyhi/vf
                        MD5:D5F7A65469623327F799B516ACBFFD2F
                        SHA1:76C6333C14AF3A7EA091819953E6E12DC289A12C
                        SHA-256:F476FAE1C6D79069239C471D182631AB343749C22B1A6990250465C7EC3738FE
                        SHA-512:351B9E455E97E6247E64E4BC1B59C9524E70AE0D09D3B6FB96937378A70536483B00426EE69C3590DD415A8265D21FD031B524B90E4E86814EC9AD704E57793E
                        Malicious:false
                        Preview:.PNG........IHDR...{...g.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^...h.U..p.T..(.eBR....2.....':.4kec^....0.&.....ugS.8u:i.P.F..f3...D....6.%...xaI.}...y..9...s.w.s..{..y.5<<<...(0Q.............t_..q/.[@.....-.e.....=..J.L.......c.4H......u?.XF.KJ..zb..0..f}..'J.,[&..S.6...w..9..._......<.........?j....H........>....~..}.n.8.WW..B?...?.b.;.....<....~...b...m....&1.=.Pq....w....a_3.k7'...\....d..z.O..w...s...Lh.x..........Q;40.i..`.8V._.@...rd.....kF.@<@..e......e....=mHB;....E./.\h.^....q..>.....%v:.O.:...&q...:.'e..9...h.iG'.L<@......([..|'.n.x...c....._O...[)......S*..Q...d......A....4..t....E..v..}..7...t.b....,/*|.H.]...8.. .@.(.;"..Kt.....].+.[LwJ..B]i.b.k.@..Js......J......6..J._LwS<@..J.YLwV<@G.4w.L..G...]..zu.z.h....;...W.IH..+...c...F....qI....Xul..]...N...wv\.M$..D...+...=.....?U....T..^<6../T*.{q.q..:....y..XL..l..z.d....G..b..g.G..b......SM.{q.q$MUL..R..........^\P..g...e.....L/yqM../.b.f..........J.<
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 59 x 61, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):2210
                        Entropy (8bit):7.86853667196985
                        Encrypted:false
                        SSDEEP:48:naUvGemgl0W5KMDRLEbGAnaHC7ew/fkDSCcE5FTaHWc:aerVlDRIewkXlrTa2c
                        MD5:73E38124F94AD20A2F1571FBBE11AEEC
                        SHA1:87FB8056DC7A0A3B70D51426771C4CCE2099CFE5
                        SHA-256:A700B63B30CBBE5230CC5E977D651E178EA87E73EAB18C8D5FFB1362149ADDF7
                        SHA-512:320FCE64DD6F975384BEC9267348CD5CD24A55B13BB09FEF1238C2216AD8ECABDCCC15601A079CE092ACFA4954829FFEB06FBB0631F6AE26E3A39E43C102048B
                        Malicious:false
                        Preview:.PNG........IHDR...;...=.............sRGB.........gAMA......a.....pHYs..........o.d...7IDAThC.yL.w...r..r....... ...Eq.nnN..i..[.e...-.d.M.dn...x.xmQAT.Q.RN9..EA.k..P`..=}..m.&~............oy....k...}}x..[....g59.}]...~i.SY......."....7Ow../......2...3f)n{..R..R......U?......O.{....c..pT.\.t....5.07.. .....07...7.o..,+.,.V.c...&..%.3I.....:v..\....6.....??..[.N...........nz..Z.B.........v.prs.q1V1|..=':..`.bz..%s.cf.3..RyMNUeV..J.k.}D[~xo..d..c...sO.y\....B...c.07......Rp..J.......{b.......;u...s....N.gko.M...;6...6..c.X5.S..o..\....^).....(......y.72.^....s%...[.q!&Z....C-..+o.....I.....,Y.{......g.1.0..I}.....<.....T..}....t.!x&)..[.7....4.5..{....n.<...#I...:.....r.wW~..zr..9k.^.]KR.*W.J.n.")....%0...)...Fbb5`4'.X..E.../.t.&,t(...@9....\$..........].P..jdU......H;.$.'%}.l7........y..$.....Z..4.Cm.u#&.%N..1..+..8....y...U.(.T.....}.I..5r}...!..K....>f..3.C.G..X1.(<.Gb..b(....0Qv0F.......n.z.s.Y......\.,.h%1...QU..%.}B|CW......sO..\.=..&3...,.
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 563 x 211, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):14458
                        Entropy (8bit):7.944094738048628
                        Encrypted:false
                        SSDEEP:384:uuT43eqJy2jEeSZE0onrAFAOpn5ytFfNrfIkBQTYz8ynth2EB:EugQeS+nrAFZ8tJNrfRQM4ynH2EB
                        MD5:7CEB71F78A193F8C9F7FFDA5F81AEBD8
                        SHA1:EEC1597705EFF1A527C246B86A71878185BA6B1B
                        SHA-256:77911FF7AEAB8FCCAF36DE6E1183FFE1A6C27F77B5714EE780976CE5189E8FD0
                        SHA-512:1D1AB19B64E1E2ABCA61AE78B3B50310B0A6CF19D2ECFCB4499D8D0BF68600B4D95BC0945EF9FF9B1D016ED61EAC518DCCA1A426F460317C07AD51E2E047948C
                        Malicious:false
                        Preview:.PNG........IHDR...3............>....sRGB.........gAMA......a.....pHYs..........o.d..8.IDATx^.}.p\W.ZRKjI.}..[..M.l.N..[..O..B&....?5...@.5.5EQ...T...d*U..*.C6....8..}.Wy.e........k]s..z..^...T....s...}:.{..n..1.."@....P......."@....p @f.s@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....5 ...f.;.0..7141...L.....M.3.L....{M.T...I.C...@E{.w.Y...q.....c3..gf.3..'j...I...{M..@..4555==-...!..f.....d...>i.%&&&%.u....f..[......O`.......G..E6I.< ..3.k...',....Y...<..........u...{9.......S^^.q.<..^....2.bb.E`r...ey........ ..3........Dg@L..a'.x&''.O.Y..!e.c%$..(P__.d.....Sj..S...BLu.[g..mK.SwVe.."@.T.@P.y.........=....40..L...$d..J....cccw...^.RBKKK...heJiS3.0I.X<..}..*O..........QR..q.5GTA..ht.(^.Hno..n.......wvv:..K?.\.JQ/i..h0)G..1Y....K.>FT...8..d&..,+-.T.b.........f.."3.V 6.:...E 1...?.Q.6....A1Smm..K...V}...:.uA'.$.v.cy..<.`.Z322.r.LI.....>......&........"..."......@.Ccccee.[..z{..fL5..{...
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 742 x 104, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):13030
                        Entropy (8bit):7.948664903731204
                        Encrypted:false
                        SSDEEP:384:/06ULmwT2RqfILhmLy4tNpYGL0mvBQhTMHX4PCIVYm:s6USI2RqfGhmDrpYM0ofHX4aIVYm
                        MD5:17E9FF9F735102231846936F0E2BAF1A
                        SHA1:9EC1AE8A3AD55C48C02427D842D6E38DA85B5145
                        SHA-256:DD1CA8DA90893E0B63ABFDD9E60CF2BF844B311964E9D9DDB855C21FCA156EBB
                        SHA-512:71E690D6C87B09659296E6E6DDC8E3F91035DD80C5CE875FA557763E8138900C27FB492885291CEE203D65BCEE8C20C9C39E0590A5FD32B8A00BEB3E3F6D6E8F
                        Malicious:false
                        Preview:.PNG........IHDR.......h.....2......sRGB.........gAMA......a.....pHYs..........o.d..2{IDATx^.wp\.....sN$...$.).Q.")R2ei,kl.%....r..vm.x<...\...u.U.g.ry=..uX.cK.dI..I1G..$.".Fg.q...N.nt...3.w.w..~.v.O.....K.....A@.....A ..H.n.D;A@.....A@......e.y ..... ...1..P..xH.. ..... ..e.9 ..... ...1..P..xH.. ..... ..e.9 ..... ...1.@.$9..S....A@..4....^C..F..VR\\TT.........aHII1......VS..g........... .*....z..|Ek.......<R../55+33;;;+..Y..WC..#...P..... ...s#0::......522...,.v..D......_.....9.2N.L.'..F$.....e..!..... ...N...`1....G.....'&,f..f.X....!.lp......I_........J..z.R,YbYd&.... ......~"b\...b.Z.SS.....c....&..Yl-............... ..[...BY......... ... 1..Z..6NN............._.zw....MKK.Z..vMMnnn.4.v....,q..e... .D%....Q......._..p*M......22..e...k.}.....qU....S.a...~....P..}v.. ...1..2...F.GCC#...].=..C..n#...K+..MOO..........."....d^2=.{....U.p.h%.%n...D.....XB..b..'''....?h.b.B\v..^Q^.UC............Q...I.....U.VD...P..{.2"A@...b..V...........jF.x.
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 165 x 131, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):3879
                        Entropy (8bit):7.9281351307465044
                        Encrypted:false
                        SSDEEP:96:k1hccap27HGVhY2Kn+A3RS+HG3dXrjmg26vh:k1hccewIhYxRmR5
                        MD5:C451B2A146BDD7EF33AB3EA27268796D
                        SHA1:C040BA2F31342CBCBF597C96D4D6EDB83D473B77
                        SHA-256:4C264B2A6E88712234DAA8E3A8D630CBF4EEB338554CB0B794D8031F8943EE65
                        SHA-512:55915A304B261BC6F38F5CFE0389D5195F85FE2C1DA325019C3AA391E8B1773091E078A35BD57F8CEE0BA035956382AE33790EF462053FCE711EEA9665B7F917
                        Malicious:false
                        Preview:.PNG........IHDR.............c.L.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].p.U..g..Bp!...\.!.`pA.+....H.U..."Z..*U.. ..P.D.-.$..,,..$.g.......CB.l......I.g.pc..Lf..~.=.~]S.....w.9..w..'...!L..A ..^.t...v..s4&&&%%..6..`..:.G.D@.7.qS...K....[..,...o...p..2.%..B.Y....|;..gy+.[..,...o...p..2.%..B.Y....|;..gy+.[..,...og...}.W..z\?...y..;_t....=..e\.....6.M|[...B._....[_.\^Pf.....f.....\l..../6....<S.4./..m.......l....B'.n...O...yc...........X...P...k....t..9tf.g>....e..Sy'.L+**.]{..a...,7...p..+......K..y.9p...I{..i58....v..5.`Op.....{.......8.._.S.........p..).........;.....y...2...b.[>gP....C..G.H...........Osp...)..9x!...W.,..^....$r.p.sOJ.l..=.x.9s&:..........h.`..W"V..|.l{..72.....zv@.#.<.........../....F|...c...4.W....:uj@1...~.X............^si....Z..I~.Q.<.....NAOq...+i`.)...$L..gV.6#.....F$..hD.g.L-\..H._.u..]4......h...T.BK\\.Z222....7))..h...1??...~.-i=...X...~h....y[.............p.....x....c...{....Uh.7n.....
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 651 x 254, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):19235
                        Entropy (8bit):7.944867159042578
                        Encrypted:false
                        SSDEEP:384:h4iuxL3Yck5lpMcTyHOypEod/G38lJxqSp5BCU:h4/xjYc2lmcOuuEoJM8fse5BCU
                        MD5:AE32E846559D576FD263BD69FEDBEC28
                        SHA1:D481DF71C858BAECFE33418002D368F2DCF68D4A
                        SHA-256:6E21222B0EADAB8D3CFB0C7D14941D196165D6709271AF317D099F12403CD352
                        SHA-512:9AA4A6DD01D3B745D674721765F2BFCCAB584CA0603F222EDBE9A88190A2A57438041E7A3706CC0656A6ABB79AA18118319F210EFFE3DD917E7B94A6294BD346
                        Malicious:false
                        Preview:.PNG........IHDR.....................sRGB.........gAMA......a.....pHYs..........o.d..J.IDATx^...X.W....D..A......bW.A..[..5.F..D...7.ob71.....b.."...("...(...{/...e......}.....;...S.X...H...@d...... &.....b..... F.....b..... F.....b..... F.....b..... F.....b..... F.....b..... F.....b..O.KVfVfjFzJzVF.}i{.R..l..q..`I....e.'./.'.G.z.*!&>)61.UjVzf..4>Q~...U..=......s.\..WE...2...t..`F....M....'..?.......>BO(m.V.P....Gy.../........B.6.......=|z7.Z.|hQ..u..j............&..Z.bo?.u...S7.G>......]I..7.i...3....<.y.l]....SI>...L.2..<.....[.'=M.Tsprp...T....cE'*..P........eefQ.NKN.x....:-#5#....q/..xq.YzJ:.T.*u.j..S.C=...|.....2..(YF........|...*.7t...{.jz....W..Y..{...nlfj...L.6.[.hS.=.....(!C.......?5..+...[..a.:U.K..C.......w......+..r@.z.7..j..qB..B.....X}..=.fk...>^5[....n.z....wn....Z4.._iWG.^..z6./]t......dhM.9s...Gbo?...U.V..tj.......*&)Io.{q.G...A...l...i7...&....d.E]....#.W.x,.T...&Mz4+].4.$n..F..x...<.ppr.............y.,i./..
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 220 x 170, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):7374
                        Entropy (8bit):7.955141875077912
                        Encrypted:false
                        SSDEEP:192:IfGsPejaVZWzIZKpnFFt0HK5+2Y/SLopWR:IusPe278IZKpnzt0q5+qVR
                        MD5:70DAF02EC717AB54452FA4C707BCAC74
                        SHA1:30F46FAC5E96470848C5A948162CC12455A05154
                        SHA-256:58469BA93EA36498FF9864EB54713A001C52106DE97804506D82EE24B816712B
                        SHA-512:E599FDC22A32CFEDBB23EECEAE0B278EAB9A90959FE6ACB40E2B201E45A7C19261AAF529E7A0D9CAF2A9A4C64C7831343F3BC20810513990AD5D38A32741564F
                        Malicious:false
                        Preview:.PNG........IHDR.............IC......sRGB.........gAMA......a.....pHYs..........o.d...cIDATx^..S[Y..I...B..`...N....t.q..j...+LU.....O..sF.!.I...w@..H.Q.w. ...s..{B.....2......i..q..z{.}^..............J.fQ.....r.\WWw.T....amt.t;...6\N.........z.n...].u.z..Q...?^........;;;;:NO.}.c....<-...........({.^....t.k...F..[m..:........R2...%.y.l^OOONN8)....\y....}...}}.}.Hy6.^.a.....\...!S....K..|>......s.........l..P...LFWW.l..RK..b.h.h .3.F..|.|..~..........e.aa.........0H...<.Y.a`..xA!...7.X....xd=........h?o5........Ay....?6...........*..tb.9.*j...S`](.,P...9.2j..?...z3wD.[......L3.Ng2G|.......&..0ZK1u8.H.2...Z../..P(....BA..aL|..a.Y:.....J...5^x..'.\..&S...L..U..;....<{..."..@x ....J.N...;....WIht.<..B......!HM...&z&..6u..hF..G.D..B..........A.....n...GG...,.,.Q....X,`"....r.........3d.{o.(/...3.H...x:sX....h.8... ....r <..DB. ...y.N...o....5.......L&w....v....w..D......!.a4...."8.U.|.0m.(..zR>..=.+.L.....e....Yd2.-Z.7..D"..pX.I.....e5qYa._&..3..J..++
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):1604
                        Entropy (8bit):7.814570704154439
                        Encrypted:false
                        SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                        MD5:3F1535054D4F9626F0EB10CEE47F076E
                        SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                        SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                        SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                        Malicious:false
                        Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 167 x 131, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):5386
                        Entropy (8bit):7.943706538857394
                        Encrypted:false
                        SSDEEP:96:x4F84/zVJWedudPZZRdbvczHe2ftFJ0y8Ea5b2AELJj:x4FTnodRZ7c7LrabEaMAGp
                        MD5:DB48555480A383CD1D4DD00E2BCFCF29
                        SHA1:8060B6FE12175289F0A71F45B894030A0D9F1AB5
                        SHA-256:807723D8F90A5BD41269A7A62817547026A117D666D5BEF454EB699C97CA3FA2
                        SHA-512:2614C04686299CEE8D56577A1E836A26076D42E041C627177FDB295629F6A80190910947FA794A094C55A45C3D70725EEF29097118E523A38B50C9263C771A41
                        Malicious:false
                        Preview:.PNG........IHDR.............gI......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..xTU..M..B...P........)vQpQ.ED.""......,."....*bC..VT.. M!...@z....1...Wf.w..o29...=.v.TUU..^..@....S..<..;h...5.9r....x..7N{...=........'...N...u...9..5+YW.;..N\..u...9..5.....O....,.K..'.../.....1..T....>.f..9.xo...u.xo...u.xo...u.xo...u.xo...u.xo...u.xo...u.xo........'L...g.UVVz.[.n)...Yqq...Y.f.)//_.l.W_}.,........S^Z^Y..++.*..pF.....?...I.&...O,.k.d...~..w;Q........7}1y......e_............=y._U....{..}.w.O..~.z.{........W\q.."........^.h........}p.+.>m...d...4...`a~Z^....me......:N]..1...g..y.f.......l..g.).......e[........Z..RB.KrJ.....#...{..eff..v.[[<.n..?{.....SN9%...V.yE...s2..........e@Wz..I...B.r..<.-.=/t{.v.|..J....,.@.A.v...s`/.....6f....L?.z[T7..)S0.;c....\s..z-C.....v..}Y..{..j..xF.....'.#_..C....k|3..8...N...5......f....3......f)-.p..%.D.v.v.].f.......33<<......[bbbt.]w...:.r.....z....q..=....m.uhD..,..zXg
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 230 x 68, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):4181
                        Entropy (8bit):7.950380155401321
                        Encrypted:false
                        SSDEEP:96:L6ousL3eslFAmjb89xK6YiSTwtw5dTA1W9lQ:GoFiUFAMbsxJYieZ5dGklQ
                        MD5:BC6C08F8C2C6D1EEE95ABFC40C3C3669
                        SHA1:44DE7375375880ACC24938D7E92A837E85C35321
                        SHA-256:6E54B502C46E1AFA57E28B8ACCCE24F102399F31407827A91E4CD7A42FCBC746
                        SHA-512:2AF4A9B87FA4F362926CD77F272CECBE3ED4F0E110FB8F30F661DF7C61B77B9FD8E7716EEF9177B1038B68C792CA4F844F729DAA48B2E38B9945EC9CB44BB720
                        Malicious:false
                        Preview:.PNG........IHDR.......D.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.yp.....E-.......-v...VY.a.d....R.euF.).KH@.*B..u@YdQ....!&.tjg.!.,a'.L..@H...{'\~yy.....w2z...s.=..;..s.......]..j..b5d.j.X...2D......r.\.#..f...Bl.....5dC....r...............:m.....s..j.f..jK....y.^....'8.....<......g.....=.%..2.p..}<.....G.....Ix.m.4dm..B.......0?..+_.*..c..n.......?....wa..l...p....E.Ly.}...*...C.D.vy).....@.>\...3;.`].q..m../.d.B.../......~.p.U..'...sP\....YH.7.../....R!...O...'.....s....<|.f)....i.{.I..l.a.n...?~.{...h...s.e..-..Q..R..@<;.y.G.+n.....Y.Y'.V.}.o._..?...,.>}..\w....`+.}.{.p"d.RO=&.v..H].....k...X.c..z.{........}.n....s:c...i7N...|....*\..O.*....)w..[>..E..}y....q..u.!.z.D.[`Uf.Y...>z\..x.B.h" \.}...`...|._.....G...hY.../..6>..Z...8^..k.E.5d#..a."....P.CR....OL..U...qY.{.C.<~I=V..x.J..*k.Y....z.;?..^...3.4|i...[DL,..z].._..a.....(s./...W~..q*.\#@[R.N...@.."..=....\q...<.......p...+J..\#...(.,....OQ...$L...G...
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):14553
                        Entropy (8bit):7.951135681293377
                        Encrypted:false
                        SSDEEP:384:EF7aDrPYJ1n3kaEf61xD+KvdokCixTQm7QA96dNT:EF7a/PMeaEf61lT6kCiFQCQq6zT
                        MD5:3E9F7D399DF9CAD3669B7A5445EF7074
                        SHA1:2FBC965DC03EF9203581F595E0D7AB1734726ED7
                        SHA-256:76C80E31F37248C3C787F7972A7B22038390F9D81E72E650071A6F36D36AF27A
                        SHA-512:326F8F9CBF829BF80AAA96062A57255A36EE04DE310634327AA075D14129CFA8E36E48AB2A00B10F9BDC1D94F1AC7A9E41D0D063361920A0332EC124BDF4C3EE
                        Malicious:false
                        Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..8nIDATx^..xT...!=!$..%t..H.tP:.HQP@E,...QQ.^.....* E.(" ]:.K..R......p..n.9{...sv.}.....7.....o..z...,|.......M +.....w........O...>.SJ.O...<...{. .x..g..I..H.......V .. .}.PO..H+$@.$@=.=@.$@.......VH..H.z.{..H...!@=.#...............C.z..GZ!.. ..)... .....T...B.$@..S..$@.$....>.i..H......H..H@...S}8......POy......>....p... ...... .. .}.PO..H+$@.$@=.=@.$@.......VH..H..zz?.......$@.$`i......c;.n..i...0..........<......S....w..c.....y..F4.p..3~..|.]....s.6[..H...N@.=M..|`...3./...I.....'..|..K...r|...nX...'.. .G...ib|...MY8|......9x..Ur'.. ._ .....5..H..d..L.$@..I..o.;kM.$.?........K/.wn......Y....E..%K*.=.......Y.3.!k....[V..WG/?i..H..." T.,z...6h.[..-%9....WMY...z.vH..H@/.BOe....g-P.@.......lH.O...SJ}5.|....?.^..5^}..$.. .....S.@...*<.gJT/......_.R.C.....rj..Cg'\K........K....~Y....l@..)..l.k.s..Yr.....Z]jG..q.+..G...;lNJj.}..T1&&.. .....?...|....W<{...g.&'Ca
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 454 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):8184
                        Entropy (8bit):7.807848176906598
                        Encrypted:false
                        SSDEEP:192:ExqMHYnnEnntvA4Mesu3SXHycmfIEFQp1r/:E0MGEn29esuiXHt0FQp1
                        MD5:5B386BF9A20766956A84F67F913F23D7
                        SHA1:6E72E51F5B4FA64E52D2B80B41409B3DB927A3C7
                        SHA-256:DDF6A1D5B29BD69C65A148B1247FDE8389CC56865E4398E4CBDCBD68A6555043
                        SHA-512:99B4109439D9A688D7747C6847E0FF7399CDA01A89C3181789F913E757A82EE4727F95E506F4B01930EFC7C6E229B94BB89E385B56BC009AB5CFE332585660C5
                        Malicious:false
                        Preview:.PNG........IHDR.............s>.Q....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^...]...!.......!.YTP.A......-..r..$.E.J.I;....T.M.UE[..Q..x....wKB=.m...4.%..|:...9...\{..o.3..g.o~..~s...k...X.r....... ..@Gggg.?.... P_.]]]..*Iu....C...h..$...:... ..... .\.......@R..... ..$.k....@0.Hj0.8... ..r.@....F.I...G.....T...@.... ..P........5...@ ..$5.J.A...@R.. ....#...C.#.@..H*... ..`...`(q...@.I..... ......%. ... .\.......@R..... ..$.k....@0.Hj0.8... ..r.@....F.I...G.....T...@.... ..P........5...@ ..$5.J.A...@R.. ....#...C.#.@..H*... ..`...`(q...@.I..... ......%. ... .\.......@R..... ..$.k....@0.Hj0.8... ..r.@....F.I...G.....T...@.... ..P........5...@ ..$5.J.A..............W_...1c.l..6..`...@ ..I.S..I.I'...5.\..;....'1. ...........c..k.u.Qs..}..g#b.j.@..Y..QR...n.!...-......h..Z.......Xw.U.~q... ..@.%.'............. P..E.T.b.:j.(F..p.... .C.}3.'.|..z..w.a.....\{.:.4[.lY..~...x..'/....g....J..9.K_...'...:..;)......SO=u..E... Py.qf..}O7.o....u?:....6~~..9...?7.
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 213 x 85, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):1924
                        Entropy (8bit):7.836744258175623
                        Encrypted:false
                        SSDEEP:24:rloPN36BoJ9JK5lncTww67QKf5wX5YgM5s6cahePwnR6+eA9zQU13ALcVz7wTQ8U:rYN31JH6lcbjMW5Ytmyqwp9H7wY
                        MD5:B1FDE66F75507567B5F0C6C07B01A3A1
                        SHA1:80B8E6A923E853232F66C874367E90B5C9CAD7AE
                        SHA-256:B9C82D2F31BBE409D159EE3C9129CBAAC7C6F6C81637AB9B6DAB3C11AA74B7F1
                        SHA-512:FC8C6038D3C2F5765D7524E969574ACD10AF6FCCFD45FE7C6DD4A8C2669B13EE3FB1A8833E94A046AB7037018170B5B87B1A2742E0E10557C413AD634BDF343E
                        Malicious:false
                        Preview:.PNG........IHDR.......U.....Q.6.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].O.W....G.lT^M*..J.....".4*....j..H..R^.".m..5....&..j..B..`.`..>...X......]z.[&.>..ef..gB.d...s~.=...3....m..(E...~.[....... .. .E3..7.4.......}..H._.D.,j.)..q\.....7..#.ag.o|.?.......;C|.#.../v.H.......o~.{G......H.|..;..v...G.._...p1d2..&......QS4<..i.".X.....1(..GR.R#.}.!.E<..:LLM......s..:"......Fa...b.....\.T..~OD... ..:j.~..p=Y...Y......?.Y.A...0!6_p.dKctjvZ....\.........V..1)..:.....;7:...(.[...7.....u..'ra.....S.]..........7.#,[..<.l.....[.........90d[.2a.R.........E.CJ..C..S..*._...$^...Q..:>hx.k7.`jN:.W.X..N..p..K..."...q....a.Uy.......[d.:vmkk./cW.>.K..C..?\d...'.@s_.?&.....V .?F..;k.....%+....+.3bk......f....T....S.(2.=...?gQ...K.._,.#....?.1W.......m2.....Z...-..:..?.#J......KS.P|&[<..........Dd.....\.....W$z].k..-..8...>..Q`Yz.}w&..._......?.)_[T...:wy...O8.Om......l.....\....]..."f...........q.o.V>~s...-....N{.n....w..O|.D...
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):11886
                        Entropy (8bit):7.946442244439929
                        Encrypted:false
                        SSDEEP:192:sqNuEpzsnKxkfLaZCdMh+cLApmRausyZwYMAisQKShDBlhr34ckckcZ:JNu6DMLaZsMhtLAIa0wYMAvI5V4DDQ
                        MD5:875CFB3B5C3619253223731E8C9879E5
                        SHA1:6372F4F5BEB6EEAE3EDBE5B62EE73039B40AD01E
                        SHA-256:CC69BAE5D2C8F56B28BA4E3C6A11F57C4E8CCCE69943ACFBE7E63B4FC90EE5F2
                        SHA-512:47F45A3275B8454F8000F4567153DD7D4AF3012005D8E34CB18AED6AD69083BEC753E607F275FBF3EFCCB7BA00310A04ADFBD5FA5B73E6BBE47CE73901C35CA8
                        Malicious:false
                        Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..x.U..I...JB..;H..."..(U.EE\\..._v]W..b...Az..{G:J..B.$...H.IHB.o2xE..3gf..w..2....w..s|.....C.$@.$.....t.!........8......RR....<...6..P||....$@.$@...PO..$@.$ ...T.GZ!.. ..)c..H........H+$@.$@=e.........S1.i..H....... ...C.z*.#........1@.$@.b.PO.p... ....2.H..H@......B.$@..S.......!@=..VH..H.z.. .. .1...b8......PO..$@.$ ...T.GZ!.. ..)c..H........H+$@.$@=e.........S1.i..H....... ...C.'++kH.G.=Z!.U...73o^.IH..O|jrj.D.......I.M.........Kph.............R.x.......RU8_".......j.......B"O.z.|.9.."..L....Y.d.Rej.-Y.dhX....:.xH.z.!(>&..4.....O.<..T\.%a..e...*..UnR....+j...2.."..M.O>.z......T...].j....m...S.`..&..)....f..2..............+..SP..?.a...=.....3......K.zj.5.fP.......2:..?.....%....d.qxC..W.~.._....!.W..6....iJ)*.(..wg.}.]sw\.r]...r"...e_-....5_9.YN'...PO-.d.:.%..wZQ...H...JMJ.6c....|g*..,.3.....T...o..Nyc.W.....A.3.._...U%...PG.z.....&.%.v....AIm.....~.
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 171 x 50, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):2270
                        Entropy (8bit):7.845368393313232
                        Encrypted:false
                        SSDEEP:48:3Cxnazs22lovji2Ez2iqBU2C+hJWizJNzIu1coqAYClBeMsk1:3dm2Ez2iUhBzhyjAxqQ
                        MD5:6EFE6733E10E011FFDD6711B5F37C9E2
                        SHA1:C72549E824EAD899944A38C46FBC28BDCDAAD611
                        SHA-256:92B5056DAA03DF3EA85AF49FFE4F9CFE8699BDF3539576A99F02418FF49AD9CB
                        SHA-512:EC14B553A5780CD9B33D438CE13A6932DE43E346D8D2DEC8D093A6A2048675423948F8E2C604A73460980C3C68D9276B65D76C2A6BC7B24FDF10CA92FDA2583E
                        Malicious:false
                        Preview:.PNG........IHDR.......2............sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^.\kL.W...*.F......@.*.(H4."iI}..B!.iD...I-....y.I.h.....<..1.....C..(XSy.l....,-,.......3..3...;.{...{.{g.....Q..x.T/q...F.V...B..'..?{:.:...`.........+.0s.e...w....{.`. ....5...d..9S]../............$Y.>.I....i..8....;,r8r!Ee'"..!*.&E.....n...=.@..Sp.GF..c*....1QH3....?,.T.el......t?..([Q`.0....k.G.....X..C...k|p...I.q;.d..N....c.u.a.5.%.k.fS\)..H..T.~l*k.[.n...x2.1...........%...yK..a..l.[.?#..fD%.FMT. =r.jt^..fT...c.&..Lr..............\..V.ll....Br^6..U27...O..N*..K.gm.K..g.;..l..Fe...w?..Q.E......0.........7...(.e..t...x.c6..Q..n.92:%....l..4.h]Z.....w..|..!.p.~..B.y..&.......gl...\.wI......G.6.K.$...%.-.h]\8.LT.....}{a...^.i......4.0.ji...........n.pk ......7t....U9..b...I.....#...<q..(|=F.......0@^......+..........X. .>p....S..t.].f.x.0....7d..n..'..'... .M.qqn...G.t8'.=..V.PK....K...X.z.#..I.....@...Y....BH..I.....,..K....=`&Z.41$..a'o.:....i{o
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):16003
                        Entropy (8bit):7.959532793770661
                        Encrypted:false
                        SSDEEP:384:1l+zN+iNurNE/tBdEC/vkape2XHYdhOm+Bl6C4:L+zN+iNurGNEC3fpe2X8Pa+
                        MD5:3A5CD52E925A7C4A345047D8F06C3C41
                        SHA1:9C02828D83206BBD3EB58930C8C65A6CA5DBCF40
                        SHA-256:477277E8CAAAE1D3B3EAB5B3660239AEEABC433743A191727B1A71E529872AC7
                        SHA-512:8D8B6AC645ECC7C8BD374E6190819006C71AC0B5993419C42463009116214E5EC4B4235D94B4AE4CDA132E7DDA9807ADC51525824AC5F12696517FFC8890891E
                        Malicious:false
                        Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..>.IDATx^..|.....+)..H..C.K... ....x).rU..T..*E...;....*.@Z.....@...9q.g7[fgggg.............1//.."@....0..#.t..f.C..."@.....@OIR.#P...0..$...y.Pl"@....( @zJ]...." ...Si8R*D.....S..D....i...J.R!.D....R. .D..HC..T..... .D...... .D@.....p.T... ........ ... =..#.B.... =.>@........4.)."@....).."@...4.HO..H..."@.HO...."@..!@z*.GJ...."@zJ}...." ...Si8R*D.....S..D....i...J.R!.D....R. .D..HC..T..... .D...... .D@.....y.?.`.T... .f.P...$47........~E....!.D..X............].`....0..N.a...>[||...t.T.w *.. .....)'...=X?c.......+OE....<-84...=.....w.8...7.Ro&.D@!...GS.....s.......:...Gg..8..T...u...~..............<...S...../Y.......W........#. .vB...u.. .+.999YYY......wf..._.{6....=..]>Y?..;=02eb......2...;.%..\...P..R5....XMO.....6....W]...3g.5;.n{t.......F7S....r...[n.......AAX..j[.j.;.neef).2.....{ ..r..{7.-........i..S........<..pm.u.V....M.333....K..Mr.s..Ek..=t_.#.P...
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 454 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):13241
                        Entropy (8bit):7.931391290415517
                        Encrypted:false
                        SSDEEP:384:a99pmP85w/MAMszG+iHGgrw8Ld+9aEsjQR:mgP85AMs6+UtrX+9mjQR
                        MD5:01367FEEE0A83E8765E971E0D3740900
                        SHA1:CAE1FD22CE2539FA2ACC0242C615CB7EA3F866E1
                        SHA-256:18B8E53505DA3C412890F4D74AE2A6B26C4B0827E15E830F92A024D292AF20ED
                        SHA-512:8CFBDC014C42AE6417038B80424D2E9FBDDD7DFDDF579E349C3C17C9B52AF33A72463154D29539457C4ADAB2DB00CC28A67902FA8D9209E4AF00EDD46D52E5CA
                        Malicious:false
                        Preview:.PNG........IHDR.............s>.Q....sRGB.........gAMA......a.....pHYs..........o.d..3NIDATx^...U...Y.]:.T...G.5..lX...B..Xb4F,I0X.....F...("vET4H......*EX........wo9..9.|...rw..;...;o......z.....B.......v.mn..>......E."....U...4s! ..F...u?.@...! .~F@... ....p..Q.kP.#! ...(U{@...!....T.TGB@...Q......B.5.D..A.......~.*.U{.].....S.e...K.A.......7^?....D...h;...!.Eu...o.^..B@..# J...B@....(.5(....B@..= ....p..Q.kP.#! ...(U{@...!....T.TGB@...Q......B.5.D..A........T..! ...k..R].R...! .D...B@..........:..B@..R........! Ju.Ju$......j...! .\C@.....H...! J....B@....(.5(....B@..= ....p..Q.kP.#! ...(U{@...!....T.TGB@...Q......B.5.D..A........T..! ...k.D.RK.K.m.V.......(.^^^ZV^Z.7.a..........T..xsqYi....L......z....}....?..yyy.M\.b..U3W.0{...~.`}..M%.J*.w.mdv.&*..@....R..o/.^..5...x.g.>..ag....GM|t....\<s..y+6.X.? ,.R...-.W.m\..o..0g..i...h..W.Z.i...2.....o.&..@...-.B|.K..^.....u.}.M..6...,(...e.V.X........nkE....5.8....-.!.TtRxs....Q..2}.-..`....mX6i.w...
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 164 x 89, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):4190
                        Entropy (8bit):7.94161730428269
                        Encrypted:false
                        SSDEEP:96:GHfueo3dRLZKOSYDzGsEgfB9nqS0WKt/z2jOrrz7yrT7N:8A6AzZfBtqS0WKNC2vyx
                        MD5:8B3AEC1986A522951942BA72B85CCAA0
                        SHA1:7E0DC78FC65EE4C804A4B0C72AA53E2DFDF26C14
                        SHA-256:8B02CEC726DECF033B67689F369FDE1002ACFD5F8C32E0F248AC575997204F2F
                        SHA-512:8EE1A1F6F0023EB4F60760C2E23EAFD56E6D298CAB49D819CF1D62C0CCF608D4211D3767856255F7CF8FF45AD835FE5475EB92C608989C522CD48D00A050B189
                        Malicious:false
                        Preview:.PNG........IHDR.......Y.....?.......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.]ip...fu.VBBZ..V'.>........CR......?r...pU\....v*...T~.U)0..('`....."..,a..Y..$t!...D...Mkvf4.VhW;S........{...zZw...i......fj..$..7......[Z*.[.[..Zk...?.t:M..,..`.^...X,..sUK[..Rg.=$..!.3<....74...iY..i...k.,.fA..Z.n...`G.%..H.l7..7J...u.R..6....E..!....N@.....M....Q`...U2.w.WP[!fX......c ./@7Mz....^...k.)....v.Q`..z..1A..P.{...||...vY.....>.`...K...m.?CX./v.8.....]..;...6..kw......N....z.Q...f..q..xk.5....;.?.Z.c...`......4....?.....VV.u~..<_......sU4e.....g.c.G....O/..r...`.G)....#d5.O..w..{....twL1l.)#&hF..K...M[@.Dl..V2..j.3..s....3M.....v..!....V..c..B...|..e.1....7.WA0.[.\.u.).$7f.+.......8..e2K/.%.Ii..`w6w.E..[?_.?.?..I.k2.s....]..f....HM.?w..d.9..Rr....Y.c.}.s.zk..rc...a..I(9~........m...Z............I........7.K:.:Bf.......m..1.......&..,...?a...c.@.@.g%...s.#...;..c6...g.lZ....}.WX.3.8.....W....N.w...L...}....?.".......;cI.............pS
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 162 x 89, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):4081
                        Entropy (8bit):7.943373267196131
                        Encrypted:false
                        SSDEEP:96:KQJAeRumk2zXWySlEmWL9zi6wknB4qLx+ppNhQrW8Oy:Ke9S482LE6wQB6pNeqi
                        MD5:29B87BEEC5D3899824AA390530CD47FB
                        SHA1:55108E8E5692E4444F72EE5CEB91915E7A2AEFC8
                        SHA-256:F00E4F1C9B1D9ABEAAEC8E5CAB02A07FD74F00ACE15E36C6F6469DE5AB07A9FC
                        SHA-512:1A5AD45BBA8C29C32CDD3C4D1E460C30ECA305D851FAAC73DF165306BC338337525680B9906D367A0CD3852B9D2DAAA8FD0603276BA969495B4E29C7EC8A3530
                        Malicious:false
                        Preview:.PNG........IHDR.......Y.....2.h.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].LTW.f..O.a.......*.....k...M.Z.n.q.h....ht.f.M.n.6..t.h.k.h5.6][[....X..p...?..g.`..7.o..of....^.ys..{.{...s.UMMM.(.l.@.l..R?.......(0+0.......5...*.F..#.].........1.....B[>[..a..L.....x...0.5t.v..S.h!.........Y....B..&.......f#.w5u...............0...x.sC....a.4j5V..Z..n....K..>...3t..wm..3hB.BD.P..FkcJ6.....O........7...S.........6..P.]mf.+o....w..<.......Y..Z.whd.....*zf+.....#."_?....`.._... qf+.?.?"k...zgME..j..!.k.U*.....&z..N....ma.......R.{.r0.S..KP..fU....g~..=..Q.n.*.* 8T=/'9,*.KDW...GN;0(P3_....1......'.;..;|.L.a.&<*\.d......o...Y... {E.F..}.e.\..=W..#..W....c./~..b.EWXI.#.''&.........:....X...b.....+2...5..6+)we~ja:lZ.d.Ey....l.2.5r........!.!._|.A.....j2.5.o.....WOM....V......GC9..'.... ....C..,._...cS....b.1.....t.........._........a.3..K..>V.f]...~....K...-........#.o.Y.P........a.7..,#..'s...T.....b..]..3..dPPP..Y.i...c.b
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 452 x 277, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):22634
                        Entropy (8bit):7.974332204835705
                        Encrypted:false
                        SSDEEP:384:5ojjyi45m1/9gyhgFsH1ud103Pl39o0qjfsH37mNHy7QPaNbZy0:+r45m1/BWKy10tN22rmNHycobE0
                        MD5:548D234C9AB4021CA5FAB7BF22502465
                        SHA1:2F7495D250DC86EA99473CC342D164B859926021
                        SHA-256:7D549C3418CD90F42571D00936B23D242837CE2A8B19FC4C719E182ECB2624C6
                        SHA-512:261523F5EAE6FCE2829B53AAC5938B1A0021C119E00CE82EFFDBD690FE71064E0F3B313ED1AB2F67A16C488AD5B1A91F5AF98029D88A7896F271C108410D42C5
                        Malicious:false
                        Preview:.PNG........IHDR.............._......sRGB.........gAMA......a.....pHYs..........o.d..W.IDATx^..i.=YY6z@..DP.i.IAA........l.Dd0"p0.ON.~....s>.?zbH8..%$`....b7..=....25*.".L. ..u_..f...j.........Uk..^UW]...u..}.{.]t.-.(...J......e...t.....@i.k......_.(.....@...Z.6J......2.O.-P....._.u.=T..4p...e..q..5^f~....@i`....?.....@i..k.........?...u..O|bN.~?MbT%...@.LO.Or.`....$..y.{..o....~..(.;......SNi...6....w....~.{..^w......~.S...g?../|.O........7_...Oj....|......40......9....?..<.3nw...x...g...7.....(<.d...(3.K...;....\..:...'.5.....&...>...t.;....8..SO;../...._.}.{..D.jt.......jc...s..........Z...0q...@......Z]S.(..o.....Og.u.l.i.-.9..)j..~...5.l}..........G......k....Z..c.....}.c.?.\....t+u...15p.....[|......2..;..;...........w...........v.7...I.-w...K/.J...[..N.....W..U#...._.j(...//z.|..kv....];j|../m....t.9.;-0.:.4p..@K.....~.9.$qu.E....!.9|.m.+`).|......x..vak-].../.....G'....4.>B6$.......-o.q..L;*.N+....>...=.!.Y..Q...?......7..,....}
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):17289
                        Entropy (8bit):7.962998633267186
                        Encrypted:false
                        SSDEEP:384:ruwwXKZuqnOnZprU3+OXBruY4UkcY+TpI/BSqCrEoMXMEr3KbzHIDqqAmk+xob:tGcxE4PBruV3Uy5SqCAoMXzrQHoqAk+m
                        MD5:708E8EB906BC105CCA0535AE669AA651
                        SHA1:38D82DEDFE97D3001188C2E18FE13BD741FD520F
                        SHA-256:1C3D07765294566E17270D0F3B9257A3DB7905D4E7EF746AEE80CD591CE0308F
                        SHA-512:1EFC74C28190DEE2D2732390B74049A1B120F05EFB8DC6925207C6990AD20450FFAB40249899A9DBB82E8F92A61F770E120A450CAAC7F8C5F0742586CCE0EDB6
                        Malicious:false
                        Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..C.IDATx^...Uc.._"oB.Hr.m(.0......r..[1.D....R..q)%FBDiB.."w*.k.Jz.Y..l....>...9{.......g..Y.z~..k?.z.^k..+V...! ....(.....\sM.tD@...!P...HW.S....u^.....@.r.^.....B@...U.H.J....... }....".....>....! ..A@.4..EE...! }*...B@....i<8.....B@.T2 .........xp..! .....d@...!......(*B@....S....B ...O..QT........! ..@<.H......! ..O%.B@...x..9...C'|..{.>Z../~^.s<<V4..ujo..v.Z7..EwT.....@.....?.......~{...K.........C........bB@.$.....C.{....Kf'S.....T.*&....@<.....'..D`...;~v.DT]...r!..>....ru...}.....#uG.T.....>..z ...3v....P.M.....5.@<...?....F.}..c.W[.._!P...O..>.M.d<..J....E .}ZZ.+.5v.p>..N.{B....>M.Nzfb...OB@.." }.D.y...IdK<..! }.:.....f.K..bX.T9...&T.&?.VB9.[B@..@@.4..1}.4.@H..-!..}..~M.<.z..I}.G....>..S...N..@yj..n..s.d._.....(..R"....Wf\.oO.^...\h.\.`)...ni.'.].vk.1-.k.^....#.,}.{.RM...~Z.S.. .@U!.&}......h...{K..@.........W.8.N.s.Y.0)..f+...%4.......5.@j.):k.+3...I..(
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 452 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):13737
                        Entropy (8bit):7.916899917415529
                        Encrypted:false
                        SSDEEP:384:jgxmx2Fa/+76A6M6Y7rSYRv47cwbkkapeIiRmDGd+gUwOSpQ:KgyoWrJWRkkRXmad+gE8Q
                        MD5:830632032C7DDBCCDE126F4BAE935540
                        SHA1:9FEF1DA9FF1D7762B779553B5F873BE54C8D01EF
                        SHA-256:2328D09EC845433DC31808FD6B12616F1D28B9B3BA7DD969ADEB6C32D8EB049A
                        SHA-512:5C17EF9A0063499F2C34FAB2C4D968D29E20F20868921FA914E5737995AA0C166F224995109FF7ACA57B5B0F8647715DC670C4AEE385F61B5F8E6E8422C49EA8
                        Malicious:false
                        Preview:.PNG........IHDR.............w.pl....sRGB.........gAMA......a.....pHYs..........o.d..5>IDATx^....E...,"o.....&....AY$....AE..".l....+G.>AP@D..e..".".A.Y.@...K..IXB !..!..c1.On...===3=.3=.>9O..u....w.z..-].t9]B@...!.......Z...B@...^G`.Q.&S..u$d....B.Y..P.w5[]......B.m.D...! ..@...Ls.Q"....."S....B ..D.9.(.B@.....b@...!..."..@..! ....T1 ........i. J....B@d....B@...4..%B...! 2U...! .r@@d....!......*......9 2..D...B@..L..B@..........D..! .D...! ..@...Ls.Q"....."S....B ..D.9.(.B@.....b@...!..."..@..! ....T1 ........i. J....B@d....B@...4..%B...! 2U...! .r@@d....!......*......9 2..D...B@......5jT.@.{..O.;k....>.._o.+......{V...&C..(?.m.....F....gd.....?.....3u..x^L.1n^...@../.....XE....L..!...t.....L..B.).=..sn..U........@.O..$..o..L.....g.(D...(....Lo8.....,....f;o..i.f.h.9........\./..[W.9.....+....,X..+.d.....Xc..7.p.m.Yg.u:YO.V..l.t.].Z.g.U...]...5.^..._.~.WL...o.3f..s.,Y.X.7.x5...K/-..._.......{........W.(Y....?...!....W;.....iwNMW.............@+Q.5.#.
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 185 x 76, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):2332
                        Entropy (8bit):7.8822150338370776
                        Encrypted:false
                        SSDEEP:48:jB5Gg4vMs30WIn5IVeRy1bY7DqbqQBAeNjukXlN4AXat:PGYuEWV/YH7e1uA0AXat
                        MD5:91CB7F1273AA003076401081B8A22237
                        SHA1:5157144069E7D2FDAE60B397BE5851E75BDF7707
                        SHA-256:80682DD6472E8D1136BC5E20F6DE87B595562414B19EAB8E965736FE992921B0
                        SHA-512:5A8E3C0ED0DB94BFE359C63793F12F3D7B3C37F3A13A5C96634BA1DC8C9E50FB1142FE4752FD9FBFA39A682F78C54AF868AD337EAA787801FE5F66D8F55A8196
                        Malicious:false
                        Preview:.PNG........IHDR.......L.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.\.LUe......Ji("....9....-.."..5L.Y.Y.....$350.."2.lK3Cg...T..DWZ.......i.?!<..~x..z.......w.sw......9....s...w..l6.:....p"dH...F..B<...qE,R$G\!..E..".).#...."..{f.PyI.d..l;....;.=.S...O.S[.\Y^P.aj]9*Y!. ..~..#...S.s...l..h.[m....%...P..@.kG......G..X.r|%..AO.}-..G>35..c....Ac.&[W.d..+...zG........=..l...VS.d..+...tGd..k-._.....oL.:}.p.~.W$C..|...I...n...~......,.i......e..=..?{......>r~.Lw.+2..\w.)w~...c....h..u..%...PE...f..'..m.ZE.1.\....U.`X......$...P%..UH{[K..o7~.k.49..W.t.~.^_..7.,....f."q....+....;...~;.c.......Xb.\?...........0h.lV..WX!.....ljm.1c..U...[..X.)......B=.0~..W...rO..j...ehI5U:..66V5sJ.....V...]Y>...1kQH..2.........d....S....I...+..].p.....m7...Z....s.D>.K/]..?.l....2..=..~.mq..".+.....,..8. v.o.).Z......>..Xv..i...TA....M.....>[X...Y.7lJ..e7..S.....02q.O&9.......:L....N.......W....d..FqE..T..N.....R....kXv[..j......g.K.\@`.M..B}8n
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):11332
                        Entropy (8bit):7.9324721568775285
                        Encrypted:false
                        SSDEEP:192:vpXZavBpl00n1Pt7JquG9GYHDK/5cxektxMQjcie9ZZkx30eXJIb8FKRN:vpZaDyc1P1Je9G62/5clpjre9nQkeXJY
                        MD5:31579CA3352DF8FA4E3E7F48C7CDF672
                        SHA1:AA682A3C781BF8EE43B5EDC9718E64CB79135F25
                        SHA-256:B0E7824BEE2C896279457D87E61E902431BEB528D830524CC4DFAE126E89FC24
                        SHA-512:782FF9492E3ECB11C72D316DDD94D1F3E94CD908FC9452A37DA6CA30ABCFE9AB2BCCED8583A569DA68626BCEC730408AF86997E295637BF64AFF5BC768F3E309
                        Malicious:false
                        Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..+.IDATx^.{...u./-...&....6..+z..Q."b*. &M.d-e.*.. ....J..Z-T.Z$....R..F...%*`bn..<.....W.E ..w....^...;g..[w.5w.9g...3......t8t.P.?$@.$@.5...=.8qb.... ...5...a=...#.y. ...@B.....am. .. .......$@.$`.....G.B.$@..S... ...C.zj.#[!.. ..).......!@=..........}..H.........VH..H.z.>@.$@.v.PO.pd+$@.$@=e. .. .;...v8... ...................f.o_o{....~t...n.S.N..?..._..L;J.H ..,....7.}...|....7...b...|.........ObVa1. .?.X.....~.....t2..V>.b.}..0.F....%`GO7.n#~..F....K.~...FX..H.^....k.Z/.2v.W..M.<.;$...v.t..,UO.-]............D.....o.J..Y........5.%.l....{.....'O..dC$....=uks..;{x.,.N.=.."..Q]..w>.E.H........AV=...f.&. ..ip}._0.~[pf.`..9..v.W.,..2.E.$P........+...OcC.H..=..|..[..g%(h.....W...?...UDh..T$..?....|.]..)?[Wo.h.'..2P.1..!.......$.NO.5..}...c.;...~.x,|Q....B..6.@>..y..}...m...D~z....L#.0`_.`.s?|....I.....a...=N....c.._.2.._..6 .]...5....{.^>.lM..;n...k..9J..S.G..{.
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 167 x 92, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):4181
                        Entropy (8bit):7.943341403425058
                        Encrypted:false
                        SSDEEP:96:b6JWqvCl45Da8kuGzhRwZvwIutfij19MQ8EpW14LBGJVCq:b6JTCl45DalsBws1R8914V5q
                        MD5:817D5A35EDB2B0E052194D4F49FDA19C
                        SHA1:FA6CB2016C5F43B76102B63D60359139227E07EA
                        SHA-256:0A87B8418B7F8E6E117BADDA11D7CDD38B8B7320C6BA3D3E9AF93EB9ACB2CE14
                        SHA-512:E0686BDBFC589401F0EAAE2B1598199EFA285F8392742B1C928B9274088804B23DCB584B6FEF68CE6D7E54DFF9C10338104F4C0F3F80A04471F0B2E8F9935CC0
                        Malicious:false
                        Preview:.PNG........IHDR.......\......!2a....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.]iPTW..iv..D.....%DQ#A$...d..h,.T~..+...TM\cj*.)k.fj~L~$...L&...,...:.FdU..f_......._.n.m.....q.s.9.=..w.9......$..b.*..%....@A]A..%..<......l.h.+../..OSe.....]...>..C........^cCy.0nz.4<......g..?~..>.1ws.B....07W65.74T....=..v.......D....6.....tR....}]}....4z..^....7..;.."......^.....|=.#.=.32..o.<.Tn*Q....g.zN...n*...!/.........!....F..]...6...m...CX..~...+..U...E.|.........7]=rE?i(..$`e.%.`.....w._.Y...l.1...@....t.P..=.}..*...N...N.|.xS.5&.....Pe......Z.Z^XJkx.....^.....?7..._....Wsz......}G..]...\.....,[.y....}.J....'.R?a...G5..l.i.?....MH..l.DC^._.c.m.....%{;z.&.*+x;...S.....zxyH..`.._]...el^........U.T..^..p..z[.6(2x..,#;o##..}Zv|Z..............V.....0}Z....]..m.....x..).k]&e.._.W!Vry..%...I..d..}w.....^..\............m[.^.3r.......-8......j....>...Q..T..{\V\ptH.?........1..w....FHl...x.....\.`.ei.w..)`...g..V{..Z.....8..........o.._..
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 221 x 77, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):2599
                        Entropy (8bit):7.903700862190034
                        Encrypted:false
                        SSDEEP:48:PmCwDJh8w9JewaF2zQNXXj8zq1KM43sxXxjYbTgJW1MFsrJ075CawGjGj:P1Ah8UewaFcgz82Kx8xXNYb3id/yj
                        MD5:E88131C9AAC52649FF044905ACAB9B76
                        SHA1:34AE73B9165CBED0DDF33AC20E4B3E7D622C19BF
                        SHA-256:30F22340F582F9A352A7ED3048D1088F178E83CCAACAC1CCFD86852C8F9C78E3
                        SHA-512:97AFE8F3A2A3138613934AC737C390A35F6757BFC3D381EA7C7CD148F739932380DCD46D0BA6F590C274F8BFB4D4286B3C0433AA69E090102A8A9ABDD7C97EB1
                        Malicious:false
                        Preview:.PNG........IHDR.......M.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.]kl.U....B|E..>...*..Q........b[.K........m.(..... ...!%1%*-B.C~(&`[.....-.....~.w3..Kw.3wvfzn.2{..s.....{w..\....!.3..:..!..../..zD.x...O.K... ^.1*...8.G...z...D.$...........>!..V..`v.CQQQ!..-L...../3.2......ZH.?s...Iu\N..,3.?.p..N......<....E.<.=z..Iu<ll.dX...g....+.{X.p.....:..t...a...cKK.|...Yszl.N.:......KPs.):).T.5...&B...*..5j``@...(_r.V.j..m...?x.sg...t\.dz.'^.=.\.h..<.y....:.I...w..ze.m.\.qPJu.....D.|..@......W..t.+.....X....e....\H+.Ns%^r.VS.N.3:...&...._..#^....d! ..F.....xc..M...q...17.z...z&C...K9(.Ifm.35.v.>.'X,...p.:=.H...J.K.,...:~...7.t.....R..R..9..?....l../.(...0z0.M.f.)H..Y_"e......B........L...q.K......|;..L.........xI.K3.M..%........./..){....R....s...7....).q.._R.4O.a3......<..%....3#.|>..y...u...R'.P..$Klz...........,...g.....`.7..\...x>.{p\;>+.,.....e.-..Re@.N..FY_....*....]}...[..h.M.oq.S.U...c_}`......8TP....
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 232 x 50, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):1570
                        Entropy (8bit):7.780157858994452
                        Encrypted:false
                        SSDEEP:48:r+em8Tlk2APr2fEd72tTqiVJlcLzqeVzYwS:r+erTlk5S+zoyGahS
                        MD5:EF9AA5B2ADBE5DF68AC4F4D716DF7708
                        SHA1:363B93AAAB9DB2832F6CA0EE3C27C9310C344BA8
                        SHA-256:3D94FCC4821A135ABAAE6579011441B94F9C04DAD1E66BB5211B0C019A5968B9
                        SHA-512:EC9B024AEA46F7B97D14F0A7E12704D09B85F0017CC9E273CE50F2F889DFDAE81DE549CCD546BBB8F8BAAAAAB7781FEF77BF783E02CCC9605304552F7DD5903D
                        Malicious:false
                        Preview:.PNG........IHDR.......2......n.f....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.[MK.W...t!.fU..b!....*JBA......%-.F.4$.Nw].....E.$...)T......?@.O{...3w..y.=/"o.9...<.y...X....c.1P6..e.lx....0..J....e3.&\.@)............o.*>.E,;.....~..|....Z.3`K..W0S.&.L._..M.e.`..M.....i_.......\...6g..^....4..L.Y.9.$M...4..L.Y.9.$M...4..L.Y.9.$M...4..L.Y.9.$M...4..2.......q...&...........*.Qg.+.p.......a.:.X6...o2......A.....[).,.p......P......_..>......3.......z8j............>...fww.6....../....S<......^%.4........{.N$..`.!H....`........a..(.G^>~|txx....K\mF..'d.d:9J!.....j..i24.A...`O.......s.....?={....H'._..~..O......*>...ZXX.3...;C....\....%..s=...w<h.......0....~..y..._.......+.n.P.M]c...A..Er|.R...$.g...9*._.jg.....x...&+.JWM4xe..^....0...11.[.....f....r#.h.h$....[=t >...r....L.0.KL..B\..x........4J.0....vY...\dA. w...........g....};.}.....;.......x.|.....)......x....s....N.$.n..g<Z.q.a9.C.....oX..%,KNNN..i.8J..p].1....B>{......n.D|3t.-\g...Q
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 340 x 79, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):4490
                        Entropy (8bit):7.928016176674318
                        Encrypted:false
                        SSDEEP:96:WXKr7Xwf6Obg+XaGOnsjbbGSb+ydWtRvEOhDE6XqPeosv02tR45boo:3rTUgXZnsHKSb+n+8DdKlwm
                        MD5:7F161B19B937AB48D4FD2F6E5E16FDBD
                        SHA1:BDCE4F1C73E87E609A7FDF245A512CA4F73B35B9
                        SHA-256:C863C5E71D1116D69561BD0637F4FE4C4240E9CED05B8A5B056073AD13E6495D
                        SHA-512:E915B76FAAC9512D2AD11CF4E4530A19BEA1C7D8508BC218C69CB041F1EEABA3E2E03B1D56E61B032A6418829752C21B8354AF1335466D7E1528A06E6742A461
                        Malicious:false
                        Preview:.PNG........IHDR...T...O.....;.......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..p.U..'...rD.WX.... Q.. ....."$.ZHP.Z...C...........R..%G8R..... .R.C6..A.b...0...^...#..g..........z2.....nB...l..X.&._.a,...a,...a,...a,...a,._.73'N..ukeee.6mZ.n.m.G.}...n...a.9s.DGG....y...8??.o.pE1....Y.,......).ca.i.M.:5$$.........Lr...ye........6...8...z.-r....d.(.xc..U..^11...._>.QX..y..2...T...sss1..."A.?_.;w..S.F>......4.G.......D.|...@.K...............C...k...P...q....6.`QQEE................7;;;.._\q.k.|...\.z..6j>..n....Y.&G*.n.S$))).....r........}.{[Dv:,..w..A...`..........a.~.N.f.s...P...*..'7n....eK....+.n;:.W..C..9}..O..D.q..X..5i.s~en.c..F&..?.....l.]3r...W`..#..7o..R.@^..*...W..?}t...{.B.8..D...UPa..~..C...|.C].a.9..R...c.Y0..9.u...d...C.......X.U....WK.....5...'..PM.`...<. ._.z.F^^.EH.K>_.0.d..S...Yj<..~.5.?l.fZ0.@d.....*..G...K.....e...b.|e..Q.4.....('z...!G.....2..XQx\......X...2.\h..X~.e....Z....=....C.1.......w.....d.z.
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):11449
                        Entropy (8bit):7.91552812501629
                        Encrypted:false
                        SSDEEP:192:/zgGDSJ0ke0kBER0C31jm1OSZi6/ccccccc3zzRmKHDr1NFnAaLJ5rBX8iaD7:/UGe6m7XdJS86kvRBHD5/nAa95rB9aD7
                        MD5:163E6791C87E4999C343EC5E23843B15
                        SHA1:43CE3BAE19E22876483A7FD0E93DB45790373600
                        SHA-256:DEB2B126977EA150E49CDB3ACF4F5387639C7B7B5583454EDF55ADF83DFAB720
                        SHA-512:98BE1F4684F99A9FD2F313B09A113B5C310EC8BA8EB0EBF5FD69765E5B48B001D39999E3F25A7E76C7344DCF57B4F0BF2E4614FB0E0DFCCB6F02E6D1CAAF7FDD
                        Malicious:false
                        Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..,NIDATx^....E...@^.T.....H..$..(.!..3....O=Q...<.9.`@E...CE.(""..H.$..6.......]3......tW}U...w*~....W./. .. ..........m..H..H... ..........'...G...W.=#.M.$@.$p...........!@=U.VH..H.z.g..H........H+$@.$@=.3@.$@.j.PO.p... ...... .. .5...j8......PO..........o....+.Z.Pb.FH.......D.g\........._..'0.......9.>............&..PO.z..)-..........R....'@=U..I.&.g......../....SO.\.,._.@7Q.g.}V+../..Ht.I=..WZ%.{......_v.....%U.)^H(!!..q....|.H.E.DG_....o../...T.i...z.%.4K..# %.-.(...4J`i..,.P....F.D.zj..#..@.).(...o.....S..)..i.z.g...h..8.......A<d.z....<...n.]...E....(Jj4P;._.N..Q...)..8U.u.e).j.e...E|.]."..t6.[.K..5.6.....B..(.=W./....S'.......z.FY.. ...PO.".tI...F...Q....c.o.....}...r>..3c9I../.......}......I..G.|..|...~.b.e.5.OGb..o.....w....i.e...5&.,Z.H......g..KY.<.nZ.x...HHbdS.Z.\.O..1Q.K...9....Z.L....\g#.._~9###%%.O.>.Rvu..C.....S..g01..j...?-../...Q..N.:._....1.!
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 165 x 131, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):3679
                        Entropy (8bit):7.931319059366604
                        Encrypted:false
                        SSDEEP:96:tT+LtoQ9jsUBsnwlDGThUe8ww2iJiGEjdKKnnE+Gh:V+Ltt5GwlDQhUe8ww2iJi7MKnnE+K
                        MD5:995CEACAD563F849C4142B6A6F29F081
                        SHA1:44CB3B867CD2917541B7D5AAED2F14F10FEBB0FD
                        SHA-256:3691FB8C60EA1B827092F05FBB1807E34726016C6FF56698D7B81C44D519D22A
                        SHA-512:3C8EFEB966B075D06D8344483352BF92C9292F9970C9377BE254EB355EFAF017916737AECCDC704B84D532B7229F9908951A6F2CC3FAD810791CAB224401AD3D
                        Malicious:false
                        Preview:.PNG........IHDR.............c.L.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^....W...Gh...k.Hm..J.m....,X...Eh..%.n.....PHvy$%...[...R..l...(/..-..yl..Z.h..H!.../.|.y|w...7d3s.s.=.{.s.g.6W.^..)..@..{..'O.LL.......c.^.6xS&O.,...J.(|?...............,.$......@.zk....,.$.........)..7]O...mH7..0..|..&j..t..F...T...AZ7z.....$H...AZ7z.....$H...AZ7z.....$H...AZ7z.....$H....W.6.....0...FTcc.Wi....Q)...<.*.....{...#G....Y.f....KKK..,,,4.....{S.`...+O.[..+.\H...(.<..Qy*..ET.PM...c....~(.g..**...ol.K......Sc8..q.F.KM"<...:t.O.>b..$*t..].........2..y.h."!f.08hT..m.(..C.7n.......@....SVUU).F.).X\\....[j.U....$x$d..e...<.W......=;0L78t+..Gw..-....]......C7......K.w..._..g......A.&M.$^.#.!....e.\.P........;vD..@...Za.@*D..f...! .2w...4#.J..c....K}....F.u.I.b.V2.k...5..`....*........M..!.,.;.E..BZ....K..[7....5....,...........K...7+.6..o....\,`...z..5x...\46x.b......Y....s.^.x=.e.4s.W..t,.iu.G^.....(74....`.....:......]..&..j+t9..3..}..
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 127 x 138, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):2232
                        Entropy (8bit):7.837610270261933
                        Encrypted:false
                        SSDEEP:48:dFQY2WmQbe+TukEC2KgYPsWOuWFk792oP/sWtGOK9Lc+rD0NTHj:3L+wKkEOgx3PG92Eqt9LczFD
                        MD5:EDB5ED43CC6038500A54B90BEC493628
                        SHA1:A8CD63F3914E4347F4C5552FB922C6C03917F45F
                        SHA-256:9F3312E33EB78C6952B5A5D881BBD18751FCFAC41D648C6F053CE781342A504F
                        SHA-512:4EBCEFD69A4C249AA3B0F00A954C4E463DA22FC9CA0B61A0DC46079B438138C509B22188D966FFF6599A3A604858BC4CC8FE6E0685A764E8E0477AB7A237DB32
                        Malicious:false
                        Preview:.PNG........IHDR.....................sRGB.........gAMA......a.....pHYs..........o.d...MIDATx^..hVU..}..s:..6..9g.MM3...j...*........A..!.A.....R.Ai%YH..(M.".h.cf*.B.......:...{w.{.......y.s>.{.{.=.........#.y..r.K...K.0}......Y..b..[N.=....j.=........!......./.6....B.8....p....5P)....@......=}............^.~..@.o`n<.q.....Yw]..mg\V*...y.W.T.>...\n...s.iG.~L]..d.<.8..j<.<1..4...CZ0...}...........oDDh.....]3}#"B..O........0}B.F.L......5.f.FD..L....5.7""4`..p.........'.kt.....>!\.k.oDDh.....]3}#"B..O........0}B.F.L......5.f.FD..I..x........Z^...>B$1.N"}4.....1:&F8..*.X.yL(..s.3......~2.EL%.w.Uc.zJ...B..S..b.7o|%..7..'.....N.|..Vi...q..uO,`/....\W{..y...&iI..|X&T.........-........Z..o.~u..U....cF.M....O4}......~......:T..W.._s...t..Dlb.$Pr././.._4.b......R.T$t..$.>hB. +.{......m.w .Q...05..C.}...}.....?..h.....Y .8.6^t....}.y.%......l=$..[.~..]..h..N.......*....SB.|....8..H......_...G...|......;6YQ|WO.o.}]..'.$..oE.y...i'9.[cmS..@m@.Q
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):1604
                        Entropy (8bit):7.814570704154439
                        Encrypted:false
                        SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                        MD5:3F1535054D4F9626F0EB10CEE47F076E
                        SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                        SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                        SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                        Malicious:false
                        Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 749 x 126, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):13084
                        Entropy (8bit):7.940058639272698
                        Encrypted:false
                        SSDEEP:384:o4KSpFN6Ud4c3p2Il1yavNr5spYVJzimlfZ:wGN6Udv4IKavLBJz/r
                        MD5:0693DABBBC411538D209F32E22F622F6
                        SHA1:FB7E675406FA123CDB7E058D336742D6A2E8DC8E
                        SHA-256:2DFB2E7A1A3AA43C673D2EE540D3C366CEB12105EB5441F98992FC06F4284013
                        SHA-512:F07732660EC62DAE58EB02E2E9476007EA92BF826F642BCA547097136AEA01D29FF69D9B0CD0F5D65A5E15AA66CA4AA4804AA171A3504AAB198631C643C90C16
                        Malicious:false
                        Preview:.PNG........IHDR.......~.............sRGB.........gAMA......a.....pHYs..........o.d..2.IDATx^.w....'m.9c.6"...&.`.N.(.TN.Ne.N.R.eKr..T.*[...?T..:I.D.S>I$A...I......y.9...f......3...Gh.....}_.o....n..A@.....A@...L...2... ..... .x...#. ..... .....1f]9.[.....A@......3 ..... ...fE@x.YWN.....A@......1...... .....Y..J.Y.N.....s"................./..rc.scuyyyu...\s....t.oi..j..lv.....Gr.#9%%%9%--....d.T...r...DH...6.....%U..A@.0.....rAD ........2.5.......L.R..=W...gZ.`o..-?.T.Cy.:...y.9..y.EE...v......1..R.....1.".... `"...ss.......i.!.hY...Fj*....%.-.Gw...HJJr8..6...#.......!(.?P.(.....8(u........*..OOO..........dgg....Q..=..c.y....A`S.@.......3.CC..GFfg. .I.I.COrJFFFNNV^nn^^.z..%..(...^.b$........a..y.LMO-.,ylV+.k...T>Jg..*//-+-......M=..x.....E.... `~..N.Kww.......z...%%.e.%.yy.i...P.)'.,A.5.d.0.Cc35==66>2::33..>..;..Ii.i.gv...DSd....l#...l..............................)**,**...V..1 .F.'7....)..SSs..7..F...C.p....(*,......(RG..B...l!.2. ....|r1
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):1604
                        Entropy (8bit):7.814570704154439
                        Encrypted:false
                        SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                        MD5:3F1535054D4F9626F0EB10CEE47F076E
                        SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                        SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                        SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                        Malicious:false
                        Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 163 x 131, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):4847
                        Entropy (8bit):7.950192613458318
                        Encrypted:false
                        SSDEEP:96:JnieMJz5Tz/gKVp93jQvcv16kjOzbapFJBkjcMNBqmQzOG8qx1QKnse8T:JieMJzph13Evcv16RfapFLxMNBo8qxan
                        MD5:A1A1017A6A7928761CEB56D1D950E123
                        SHA1:28272E9C7F816A1CE8F2033FC00F489005332365
                        SHA-256:72F066CD34EA71D0E1B28FB60D663B0372C5254E1A8239C94A164EEF9389DB88
                        SHA-512:10F4557F102230126BC86CD4B49C93365C38D5CBEAC51F4691B90D861098866A2BDEFEBA507731D4FA14367FEE430453BD716157F9074EF643F2B949B09E1530
                        Malicious:false
                        Preview:.PNG........IHDR.............n.<.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].\TU..}...E.0.T....L~....af..Z.....O..4..>Ms..Js_....5.E.d...Y....?\z.3..}.l..|?~...{.....s.z..Y.............E.X.6...c..u...y..W.j....."}...l.i.`.!-!-......MKH.E.bi.d...b.X.)...X4 .vJ6-...;..+/.->Qyi.t...%.T..k;.U..y.C$[;..Gm.......v..*2..2..eee..."!..)...yy...III./..u........2....M.:''...W.....o..t...._.6m.... .`,k.T.v."..q.......s~~........O....ed.[W0X..HB.V.i.....<=..E^^......MyY..vpp...........^6.....aQQQaaa........]^^nkg../_.d`.%......L&k..B......?C....W.VVV6660t.J+K.:..%q.....e.cp....Kz..%.qZsAR\T.!......>55.R.u.W\\.L....T...K..rE.U.K.-9......y.y.......K....>...HWTT.e....+..B.......%%%......^...|...M'.%.f!/..=p...{O..../...@...DP..hw8....7o>..A.mgg......7-']~.s.OE.E.|=.......'%!y.......\.....MSn.i.........!...U.$0S .......Z.P.}[.%X[.;{....N.....\......6O.....'.N}.}s.m...E..V..f..r...4..~.......H..F.}....4,.R.=.......xT..4......./...,z
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):1604
                        Entropy (8bit):7.814570704154439
                        Encrypted:false
                        SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                        MD5:3F1535054D4F9626F0EB10CEE47F076E
                        SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                        SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                        SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                        Malicious:false
                        Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 123 x 103, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):1657
                        Entropy (8bit):7.80882577056055
                        Encrypted:false
                        SSDEEP:24:q3kLWZefR0kKbfLnNhzzt+acvt2x6pBs/j+7QJU0QbDQ883ASaoUV4hNgq1rsyhy:q322nN+X11GDsg8831Uyhi/vf
                        MD5:D5F7A65469623327F799B516ACBFFD2F
                        SHA1:76C6333C14AF3A7EA091819953E6E12DC289A12C
                        SHA-256:F476FAE1C6D79069239C471D182631AB343749C22B1A6990250465C7EC3738FE
                        SHA-512:351B9E455E97E6247E64E4BC1B59C9524E70AE0D09D3B6FB96937378A70536483B00426EE69C3590DD415A8265D21FD031B524B90E4E86814EC9AD704E57793E
                        Malicious:false
                        Preview:.PNG........IHDR...{...g.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^...h.U..p.T..(.eBR....2.....':.4kec^....0.&.....ugS.8u:i.P.F..f3...D....6.%...xaI.}...y..9...s.w.s..{..y.5<<<...(0Q.............t_..q/.[@.....-.e.....=..J.L.......c.4H......u?.XF.KJ..zb..0..f}..'J.,[&..S.6...w..9..._......<.........?j....H........>....~..}.n.8.WW..B?...?.b.;.....<....~...b...m....&1.=.Pq....w....a_3.k7'...\....d..z.O..w...s...Lh.x..........Q;40.i..`.8V._.@...rd.....kF.@<@..e......e....=mHB;....E./.\h.^....q..>.....%v:.O.:...&q...:.'e..9...h.iG'.L<@......([..|'.n.x...c....._O...[)......S*..Q...d......A....4..t....E..v..}..7...t.b....,/*|.H.]...8.. .@.(.;"..Kt.....].+.[LwJ..B]i.b.k.@..Js......J......6..J._LwS<@..J.YLwV<@G.4w.L..G...]..zu.z.h....;...W.IH..+...c...F....qI....Xul..]...N...wv\.M$..D...+...=.....?U....T..^<6../T*.{q.q..:....y..XL..l..z.d....G..b..g.G..b......SM.{q.q$MUL..R..........^\P..g...e.....L/yqM../.b.f..........J.<
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 59 x 61, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):2210
                        Entropy (8bit):7.86853667196985
                        Encrypted:false
                        SSDEEP:48:naUvGemgl0W5KMDRLEbGAnaHC7ew/fkDSCcE5FTaHWc:aerVlDRIewkXlrTa2c
                        MD5:73E38124F94AD20A2F1571FBBE11AEEC
                        SHA1:87FB8056DC7A0A3B70D51426771C4CCE2099CFE5
                        SHA-256:A700B63B30CBBE5230CC5E977D651E178EA87E73EAB18C8D5FFB1362149ADDF7
                        SHA-512:320FCE64DD6F975384BEC9267348CD5CD24A55B13BB09FEF1238C2216AD8ECABDCCC15601A079CE092ACFA4954829FFEB06FBB0631F6AE26E3A39E43C102048B
                        Malicious:false
                        Preview:.PNG........IHDR...;...=.............sRGB.........gAMA......a.....pHYs..........o.d...7IDAThC.yL.w...r..r....... ...Eq.nnN..i..[.e...-.d.M.dn...x.xmQAT.Q.RN9..EA.k..P`..=}..m.&~............oy....k...}}x..[....g59.}]...~i.SY......."....7Ow../......2...3f)n{..R..R......U?......O.{....c..pT.\.t....5.07.. .....07...7.o..,+.,.V.c...&..%.3I.....:v..\....6.....??..[.N...........nz..Z.B.........v.prs.q1V1|..=':..`.bz..%s.cf.3..RyMNUeV..J.k.}D[~xo..d..c...sO.y\....B...c.07......Rp..J.......{b.......;u...s....N.gko.M...;6...6..c.X5.S..o..\....^).....(......y.72.^....s%...[.q!&Z....C-..+o.....I.....,Y.{......g.1.0..I}.....<.....T..}....t.!x&)..[.7....4.5..{....n.<...#I...:.....r.wW~..zr..9k.^.]KR.*W.J.n.")....%0...)...Fbb5`4'.X..E.../.t.&,t(...@9....\$..........].P..jdU......H;.$.'%}.l7........y..$.....Z..4.Cm.u#&.%N..1..+..8....y...U.(.T.....}.I..5r}...!..K....>f..3.C.G..X1.(<.Gb..b(....0Qv0F.......n.z.s.Y......\.,.h%1...QU..%.}B|CW......sO..\.=..&3...,.
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 563 x 211, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):14458
                        Entropy (8bit):7.944094738048628
                        Encrypted:false
                        SSDEEP:384:uuT43eqJy2jEeSZE0onrAFAOpn5ytFfNrfIkBQTYz8ynth2EB:EugQeS+nrAFZ8tJNrfRQM4ynH2EB
                        MD5:7CEB71F78A193F8C9F7FFDA5F81AEBD8
                        SHA1:EEC1597705EFF1A527C246B86A71878185BA6B1B
                        SHA-256:77911FF7AEAB8FCCAF36DE6E1183FFE1A6C27F77B5714EE780976CE5189E8FD0
                        SHA-512:1D1AB19B64E1E2ABCA61AE78B3B50310B0A6CF19D2ECFCB4499D8D0BF68600B4D95BC0945EF9FF9B1D016ED61EAC518DCCA1A426F460317C07AD51E2E047948C
                        Malicious:false
                        Preview:.PNG........IHDR...3............>....sRGB.........gAMA......a.....pHYs..........o.d..8.IDATx^.}.p\W.ZRKjI.}..[..M.l.N..[..O..B&....?5...@.5.5EQ...T...d*U..*.C6....8..}.Wy.e........k]s..z..^...T....s...}:.{..n..1.."@....P......."@....p @f.s@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....5 ...f.;.0..7141...L.....M.3.L....{M.T...I.C...@E{.w.Y...q.....c3..gf.3..'j...I...{M..@..4555==-...!..f.....d...>i.%&&&%.u....f..[......O`.......G..E6I.< ..3.k...',....Y...<..........u...{9.......S^^.q.<..^....2.bb.E`r...ey........ ..3........Dg@L..a'.x&''.O.Y..!e.c%$..(P__.d.....Sj..S...BLu.[g..mK.SwVe.."@.T.@P.y.........=....40..L...$d..J....cccw...^.RBKKK...heJiS3.0I.X<..}..*O..........QR..q.5GTA..ht.(^.Hno..n.......wvv:..K?.\.JQ/i..h0)G..1Y....K.>FT...8..d&..,+-.T.b.........f.."3.V 6.:...E 1...?.Q.6....A1Smm..K...V}...:.uA'.$.v.cy..<.`.Z322.r.LI.....>......&........"..."......@.Ccccee.[..z{..fL5..{...
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 742 x 104, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):13030
                        Entropy (8bit):7.948664903731204
                        Encrypted:false
                        SSDEEP:384:/06ULmwT2RqfILhmLy4tNpYGL0mvBQhTMHX4PCIVYm:s6USI2RqfGhmDrpYM0ofHX4aIVYm
                        MD5:17E9FF9F735102231846936F0E2BAF1A
                        SHA1:9EC1AE8A3AD55C48C02427D842D6E38DA85B5145
                        SHA-256:DD1CA8DA90893E0B63ABFDD9E60CF2BF844B311964E9D9DDB855C21FCA156EBB
                        SHA-512:71E690D6C87B09659296E6E6DDC8E3F91035DD80C5CE875FA557763E8138900C27FB492885291CEE203D65BCEE8C20C9C39E0590A5FD32B8A00BEB3E3F6D6E8F
                        Malicious:false
                        Preview:.PNG........IHDR.......h.....2......sRGB.........gAMA......a.....pHYs..........o.d..2{IDATx^.wp\.....sN$...$.).Q.")R2ei,kl.%....r..vm.x<...\...u.U.g.ry=..uX.cK.dI..I1G..$.".Fg.q...N.nt...3.w.w..~.v.O.....K.....A@.....A ..H.n.D;A@.....A@......e.y ..... ...1..P..xH.. ..... ..e.9 ..... ...1..P..xH.. ..... ..e.9 ..... ...1.@.$9..S....A@..4....^C..F..VR\\TT.........aHII1......VS..g........... .*....z..|Ek.......<R../55+33;;;+..Y..WC..#...P..... ...s#0::......522...,.v..D......_.....9.2N.L.'..F$.....e..!..... ...N...`1....G.....'&,f..f.X....!.lp......I_........J..z.R,YbYd&.... ......~"b\...b.Z.SS.....c....&..Yl-............... ..[...BY......... ... 1..Z..6NN............._.zw....MKK.Z..vMMnnn.4.v....,q..e... .D%....Q......._..p*M......22..e...k.}.....qU....S.a...~....P..}v.. ...1..2...F.GCC#...].=..C..n#...K+..MOO..........."....d^2=.{....U.p.h%.%n...D.....XB..b..'''....?h.b.B\v..^Q^.UC............Q...I.....U.VD...P..{.2"A@...b..V...........jF.x.
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 165 x 131, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):3879
                        Entropy (8bit):7.9281351307465044
                        Encrypted:false
                        SSDEEP:96:k1hccap27HGVhY2Kn+A3RS+HG3dXrjmg26vh:k1hccewIhYxRmR5
                        MD5:C451B2A146BDD7EF33AB3EA27268796D
                        SHA1:C040BA2F31342CBCBF597C96D4D6EDB83D473B77
                        SHA-256:4C264B2A6E88712234DAA8E3A8D630CBF4EEB338554CB0B794D8031F8943EE65
                        SHA-512:55915A304B261BC6F38F5CFE0389D5195F85FE2C1DA325019C3AA391E8B1773091E078A35BD57F8CEE0BA035956382AE33790EF462053FCE711EEA9665B7F917
                        Malicious:false
                        Preview:.PNG........IHDR.............c.L.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].p.U..g..Bp!...\.!.`pA.+....H.U..."Z..*U.. ..P.D.-.$..,,..$.g.......CB.l......I.g.pc..Lf..~.=.~]S.....w.9..w..'...!L..A ..^.t...v..s4&&&%%..6..`..:.G.D@.7.qS...K....[..,...o...p..2.%..B.Y....|;..gy+.[..,...o...p..2.%..B.Y....|;..gy+.[..,...og...}.W..z\?...y..;_t....=..e\.....6.M|[...B._....[_.\^Pf.....f.....\l..../6....<S.4./..m.......l....B'.n...O...yc...........X...P...k....t..9tf.g>....e..Sy'.L+**.]{..a...,7...p..+......K..y.9p...I{..i58....v..5.`Op.....{.......8.._.S.........p..).........;.....y...2...b.[>gP....C..G.H...........Osp...)..9x!...W.,..^....$r.p.sOJ.l..=.x.9s&:..........h.`..W"V..|.l{..72.....zv@.#.<.........../....F|...c...4.W....:uj@1...~.X............^si....Z..I~.Q.<.....NAOq...+i`.)...$L..gV.6#.....F$..hD.g.L-\..H._.u..]4......h...T.BK\\.Z222....7))..h...1??...~.-i=...X...~h....y[.............p.....x....c...{....Uh.7n.....
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 651 x 254, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):19235
                        Entropy (8bit):7.944867159042578
                        Encrypted:false
                        SSDEEP:384:h4iuxL3Yck5lpMcTyHOypEod/G38lJxqSp5BCU:h4/xjYc2lmcOuuEoJM8fse5BCU
                        MD5:AE32E846559D576FD263BD69FEDBEC28
                        SHA1:D481DF71C858BAECFE33418002D368F2DCF68D4A
                        SHA-256:6E21222B0EADAB8D3CFB0C7D14941D196165D6709271AF317D099F12403CD352
                        SHA-512:9AA4A6DD01D3B745D674721765F2BFCCAB584CA0603F222EDBE9A88190A2A57438041E7A3706CC0656A6ABB79AA18118319F210EFFE3DD917E7B94A6294BD346
                        Malicious:false
                        Preview:.PNG........IHDR.....................sRGB.........gAMA......a.....pHYs..........o.d..J.IDATx^...X.W....D..A......bW.A..[..5.F..D...7.ob71.....b.."...("...(...{/...e......}.....;...S.X...H...@d...... &.....b..... F.....b..... F.....b..... F.....b..... F.....b..... F.....b..... F.....b..O.KVfVfjFzJzVF.}i{.R..l..q..`I....e.'./.'.G.z.*!&>)61.UjVzf..4>Q~...U..=......s.\..WE...2...t..`F....M....'..?.......>BO(m.V.P....Gy.../........B.6.......=|z7.Z.|hQ..u..j............&..Z.bo?.u...S7.G>......]I..7.i...3....<.y.l]....SI>...L.2..<.....[.'=M.Tsprp...T....cE'*..P........eefQ.NKN.x....:-#5#....q/..xq.YzJ:.T.*u.j..S.C=...|.....2..(YF........|...*.7t...{.jz....W..Y..{...nlfj...L.6.[.hS.=.....(!C.......?5..+...[..a.:U.K..C.......w......+..r@.z.7..j..qB..B.....X}..=.fk...>^5[....n.z....wn....Z4.._iWG.^..z6./]t......dhM.9s...Gbo?...U.V..tj.......*&)Io.{q.G...A...l...i7...&....d.E]....#.W.x,.T...&Mz4+].4.$n..F..x...<.ppr.............y.,i./..
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 220 x 170, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):7374
                        Entropy (8bit):7.955141875077912
                        Encrypted:false
                        SSDEEP:192:IfGsPejaVZWzIZKpnFFt0HK5+2Y/SLopWR:IusPe278IZKpnzt0q5+qVR
                        MD5:70DAF02EC717AB54452FA4C707BCAC74
                        SHA1:30F46FAC5E96470848C5A948162CC12455A05154
                        SHA-256:58469BA93EA36498FF9864EB54713A001C52106DE97804506D82EE24B816712B
                        SHA-512:E599FDC22A32CFEDBB23EECEAE0B278EAB9A90959FE6ACB40E2B201E45A7C19261AAF529E7A0D9CAF2A9A4C64C7831343F3BC20810513990AD5D38A32741564F
                        Malicious:false
                        Preview:.PNG........IHDR.............IC......sRGB.........gAMA......a.....pHYs..........o.d...cIDATx^..S[Y..I...B..`...N....t.q..j...+LU.....O..sF.!.I...w@..H.Q.w. ...s..{B.....2......i..q..z{.}^..............J.fQ.....r.\WWw.T....amt.t;...6\N.........z.n...].u.z..Q...?^........;;;;:NO.}.c....<-...........({.^....t.k...F..[m..:........R2...%.y.l^OOONN8)....\y....}...}}.}.Hy6.^.a.....\...!S....K..|>......s.........l..P...LFWW.l..RK..b.h.h .3.F..|.|..~..........e.aa.........0H...<.Y.a`..xA!...7.X....xd=........h?o5........Ay....?6...........*..tb.9.*j...S`](.,P...9.2j..?...z3wD.[......L3.Ng2G|.......&..0ZK1u8.H.2...Z../..P(....BA..aL|..a.Y:.....J...5^x..'.\..&S...L..U..;....<{..."..@x ....J.N...;....WIht.<..B......!HM...&z&..6u..hF..G.D..B..........A.....n...GG...,.,.Q....X,`"....r.........3d.{o.(/...3.H...x:sX....h.8... ....r <..DB. ...y.N...o....5.......L&w....v....w..D......!.a4...."8.U.|.0m.(..zR>..=.+.L.....e....Yd2.-Z.7..D"..pX.I.....e5qYa._&..3..J..++
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):1604
                        Entropy (8bit):7.814570704154439
                        Encrypted:false
                        SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                        MD5:3F1535054D4F9626F0EB10CEE47F076E
                        SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                        SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                        SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                        Malicious:false
                        Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 167 x 131, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):5386
                        Entropy (8bit):7.943706538857394
                        Encrypted:false
                        SSDEEP:96:x4F84/zVJWedudPZZRdbvczHe2ftFJ0y8Ea5b2AELJj:x4FTnodRZ7c7LrabEaMAGp
                        MD5:DB48555480A383CD1D4DD00E2BCFCF29
                        SHA1:8060B6FE12175289F0A71F45B894030A0D9F1AB5
                        SHA-256:807723D8F90A5BD41269A7A62817547026A117D666D5BEF454EB699C97CA3FA2
                        SHA-512:2614C04686299CEE8D56577A1E836A26076D42E041C627177FDB295629F6A80190910947FA794A094C55A45C3D70725EEF29097118E523A38B50C9263C771A41
                        Malicious:false
                        Preview:.PNG........IHDR.............gI......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..xTU..M..B...P........)vQpQ.ED.""......,."....*bC..VT.. M!...@z....1...Wf.w..o29...=.v.TUU..^..@....S..<..;h...5.9r....x..7N{...=........'...N...u...9..5+YW.;..N\..u...9..5.....O....,.K..'.../.....1..T....>.f..9.xo...u.xo...u.xo...u.xo...u.xo...u.xo...u.xo...u.xo........'L...g.UVVz.[.n)...Yqq...Y.f.)//_.l.W_}.,........S^Z^Y..++.*..pF.....?...I.&...O,.k.d...~..w;Q........7}1y......e_............=y._U....{..}.w.O..~.z.{........W\q.."........^.h........}p.+.>m...d...4...`a~Z^....me......:N]..1...g..y.f.......l..g.).......e[........Z..RB.KrJ.....#...{..eff..v.[[<.n..?{.....SN9%...V.yE...s2..........e@Wz..I...B.r..<.-.=/t{.v.|..J....,.@.A.v...s`/.....6f....L?.z[T7..)S0.;c....\s..z-C.....v..}Y..{..j..xF.....'.#_..C....k|3..8...N...5......f....3......f)-.p..%.D.v.v.].f.......33<<......[bbbt.]w...:.r.....z....q..=....m.uhD..,..zXg
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 230 x 68, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):4181
                        Entropy (8bit):7.950380155401321
                        Encrypted:false
                        SSDEEP:96:L6ousL3eslFAmjb89xK6YiSTwtw5dTA1W9lQ:GoFiUFAMbsxJYieZ5dGklQ
                        MD5:BC6C08F8C2C6D1EEE95ABFC40C3C3669
                        SHA1:44DE7375375880ACC24938D7E92A837E85C35321
                        SHA-256:6E54B502C46E1AFA57E28B8ACCCE24F102399F31407827A91E4CD7A42FCBC746
                        SHA-512:2AF4A9B87FA4F362926CD77F272CECBE3ED4F0E110FB8F30F661DF7C61B77B9FD8E7716EEF9177B1038B68C792CA4F844F729DAA48B2E38B9945EC9CB44BB720
                        Malicious:false
                        Preview:.PNG........IHDR.......D.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.yp.....E-.......-v...VY.a.d....R.euF.).KH@.*B..u@YdQ....!&.tjg.!.,a'.L..@H...{'\~yy.....w2z...s.=..;..s.......]..j..b5d.j.X...2D......r.\.#..f...Bl.....5dC....r...............:m.....s..j.f..jK....y.^....'8.....<......g.....=.%..2.p..}<.....G.....Ix.m.4dm..B.......0?..+_.*..c..n.......?....wa..l...p....E.Ly.}...*...C.D.vy).....@.>\...3;.`].q..m../.d.B.../......~.p.U..'...sP\....YH.7.../....R!...O...'.....s....<|.f)....i.{.I..l.a.n...?~.{...h...s.e..-..Q..R..@<;.y.G.+n.....Y.Y'.V.}.o._..?...,.>}..\w....`+.}.{.p"d.RO=&.v..H].....k...X.c..z.{........}.n....s:c...i7N...|....*\..O.*....)w..[>..E..}y....q..u.!.z.D.[`Uf.Y...>z\..x.B.h" \.}...`...|._.....G...hY.../..6>..Z...8^..k.E.5d#..a."....P.CR....OL..U...qY.{.C.<~I=V..x.J..*k.Y....z.;?..^...3.4|i...[DL,..z].._..a.....(s./...W~..q*.\#@[R.N...@.."..=....\q...<.......p...+J..\#...(.,....OQ...$L...G...
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):14553
                        Entropy (8bit):7.951135681293377
                        Encrypted:false
                        SSDEEP:384:EF7aDrPYJ1n3kaEf61xD+KvdokCixTQm7QA96dNT:EF7a/PMeaEf61lT6kCiFQCQq6zT
                        MD5:3E9F7D399DF9CAD3669B7A5445EF7074
                        SHA1:2FBC965DC03EF9203581F595E0D7AB1734726ED7
                        SHA-256:76C80E31F37248C3C787F7972A7B22038390F9D81E72E650071A6F36D36AF27A
                        SHA-512:326F8F9CBF829BF80AAA96062A57255A36EE04DE310634327AA075D14129CFA8E36E48AB2A00B10F9BDC1D94F1AC7A9E41D0D063361920A0332EC124BDF4C3EE
                        Malicious:false
                        Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..8nIDATx^..xT...!=!$..%t..H.tP:.HQP@E,...QQ.^.....* E.(" ]:.K..R......p..n.9{...sv.}.....7.....o..z...,|.......M +.....w........O...>.SJ.O...<...{. .x..g..I..H.......V .. .}.PO..H+$@.$@=.=@.$@.......VH..H.z.{..H...!@=.#...............C.z..GZ!.. ..)... .....T...B.$@..S..$@.$....>.i..H......H..H@...S}8......POy......>....p... ...... .. .}.PO..H+$@.$@=.=@.$@.......VH..H..zz?.......$@.$`i......c;.n..i...0..........<......S....w..c.....y..F4.p..3~..|.]....s.6[..H...N@.=M..|`...3./...I.....'..|..K...r|...nX...'.. .G...ib|...MY8|......9x..Ur'.. ._ .....5..H..d..L.$@..I..o.;kM.$.?........K/.wn......Y....E..%K*.=.......Y.3.!k....[V..WG/?i..H..." T.,z...6h.[..-%9....WMY...z.vH..H@/.BOe....g-P.@.......lH.O...SJ}5.|....?.^..5^}..$.. .....S.@...*<.gJT/......_.R.C.....rj..Cg'\K........K....~Y....l@..)..l.k.s..Yr.....Z]jG..q.+..G...;lNJj.}..T1&&.. .....?...|....W<{...g.&'Ca
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 454 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):8184
                        Entropy (8bit):7.807848176906598
                        Encrypted:false
                        SSDEEP:192:ExqMHYnnEnntvA4Mesu3SXHycmfIEFQp1r/:E0MGEn29esuiXHt0FQp1
                        MD5:5B386BF9A20766956A84F67F913F23D7
                        SHA1:6E72E51F5B4FA64E52D2B80B41409B3DB927A3C7
                        SHA-256:DDF6A1D5B29BD69C65A148B1247FDE8389CC56865E4398E4CBDCBD68A6555043
                        SHA-512:99B4109439D9A688D7747C6847E0FF7399CDA01A89C3181789F913E757A82EE4727F95E506F4B01930EFC7C6E229B94BB89E385B56BC009AB5CFE332585660C5
                        Malicious:false
                        Preview:.PNG........IHDR.............s>.Q....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^...]...!.......!.YTP.A......-..r..$.E.J.I;....T.M.UE[..Q..x....wKB=.m...4.%..|:...9...\{..o.3..g.o~..~s...k...X.r....... ..@Gggg.?.... P_.]]]..*Iu....C...h..$...:... ..... .\.......@R..... ..$.k....@0.Hj0.8... ..r.@....F.I...G.....T...@.... ..P........5...@ ..$5.J.A...@R.. ....#...C.#.@..H*... ..`...`(q...@.I..... ......%. ... .\.......@R..... ..$.k....@0.Hj0.8... ..r.@....F.I...G.....T...@.... ..P........5...@ ..$5.J.A...@R.. ....#...C.#.@..H*... ..`...`(q...@.I..... ......%. ... .\.......@R..... ..$.k....@0.Hj0.8... ..r.@....F.I...G.....T...@.... ..P........5...@ ..$5.J.A..............W_...1c.l..6..`...@ ..I.S..I.I'...5.\..;....'1. ...........c..k.u.Qs..}..g#b.j.@..Y..QR...n.!...-......h..Z.......Xw.U.~q... ..@.%.'............. P..E.T.b.:j.(F..p.... .C.}3.'.|..z..w.a.....\{.:.4[.lY..~...x..'/....g....J..9.K_...'...:..;)......SO=u..E... Py.qf..}O7.o....u?:....6~~..9...?7.
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 213 x 85, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):1924
                        Entropy (8bit):7.836744258175623
                        Encrypted:false
                        SSDEEP:24:rloPN36BoJ9JK5lncTww67QKf5wX5YgM5s6cahePwnR6+eA9zQU13ALcVz7wTQ8U:rYN31JH6lcbjMW5Ytmyqwp9H7wY
                        MD5:B1FDE66F75507567B5F0C6C07B01A3A1
                        SHA1:80B8E6A923E853232F66C874367E90B5C9CAD7AE
                        SHA-256:B9C82D2F31BBE409D159EE3C9129CBAAC7C6F6C81637AB9B6DAB3C11AA74B7F1
                        SHA-512:FC8C6038D3C2F5765D7524E969574ACD10AF6FCCFD45FE7C6DD4A8C2669B13EE3FB1A8833E94A046AB7037018170B5B87B1A2742E0E10557C413AD634BDF343E
                        Malicious:false
                        Preview:.PNG........IHDR.......U.....Q.6.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].O.W....G.lT^M*..J.....".4*....j..H..R^.".m..5....&..j..B..`.`..>...X......]z.[&.>..ef..gB.d...s~.=...3....m..(E...~.[....... .. .E3..7.4.......}..H._.D.,j.)..q\.....7..#.ag.o|.?.......;C|.#.../v.H.......o~.{G......H.|..;..v...G.._...p1d2..&......QS4<..i.".X.....1(..GR.R#.}.!.E<..:LLM......s..:"......Fa...b.....\.T..~OD... ..:j.~..p=Y...Y......?.Y.A...0!6_p.dKctjvZ....\.........V..1)..:.....;7:...(.[...7.....u..'ra.....S.]..........7.#,[..<.l.....[.........90d[.2a.R.........E.CJ..C..S..*._...$^...Q..:>hx.k7.`jN:.W.X..N..p..K..."...q....a.Uy.......[d.:vmkk./cW.>.K..C..?\d...'.@s_.?&.....V .?F..;k.....%+....+.3bk......f....T....S.(2.=...?gQ...K.._,.#....?.1W.......m2.....Z...-..:..?.#J......KS.P|&[<..........Dd.....\.....W$z].k..-..8...>..Q`Yz.}w&..._......?.)_[T...:wy...O8.Om......l.....\....]..."f...........q.o.V>~s...-....N{.n....w..O|.D...
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):11886
                        Entropy (8bit):7.946442244439929
                        Encrypted:false
                        SSDEEP:192:sqNuEpzsnKxkfLaZCdMh+cLApmRausyZwYMAisQKShDBlhr34ckckcZ:JNu6DMLaZsMhtLAIa0wYMAvI5V4DDQ
                        MD5:875CFB3B5C3619253223731E8C9879E5
                        SHA1:6372F4F5BEB6EEAE3EDBE5B62EE73039B40AD01E
                        SHA-256:CC69BAE5D2C8F56B28BA4E3C6A11F57C4E8CCCE69943ACFBE7E63B4FC90EE5F2
                        SHA-512:47F45A3275B8454F8000F4567153DD7D4AF3012005D8E34CB18AED6AD69083BEC753E607F275FBF3EFCCB7BA00310A04ADFBD5FA5B73E6BBE47CE73901C35CA8
                        Malicious:false
                        Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..x.U..I...JB..;H..."..(U.EE\\..._v]W..b...Az..{G:J..B.$...H.IHB.o2xE..3gf..w..2....w..s|.....C.$@.$.....t.!........8......RR....<...6..P||....$@.$@...PO..$@.$ ...T.GZ!.. ..)c..H........H+$@.$@=e.........S1.i..H....... ...C.z*.#........1@.$@.b.PO.p... ....2.H..H@......B.$@..S.......!@=..VH..H.z.. .. .1...b8......PO..$@.$ ...T.GZ!.. ..)c..H........H+$@.$@=e.........S1.i..H....... ...C.'++kH.G.=Z!.U...73o^.IH..O|jrj.D.......I.M.........Kph.............R.x.......RU8_".......j.......B"O.z.|.9.."..L....Y.d.Rej.-Y.dhX....:.xH.z.!(>&..4.....O.<..T\.%a..e...*..UnR....+j...2.."..M.O>.z......T...].j....m...S.`..&..)....f..2..............+..SP..?.a...=.....3......K.zj.5.fP.......2:..?.....%....d.qxC..W.~.._....!.W..6....iJ)*.(..wg.}.]sw\.r]...r"...e_-....5_9.YN'...PO-.d.:.%..wZQ...H...JMJ.6c....|g*..,.3.....T...o..Nyc.W.....A.3.._...U%...PG.z.....&.%.v....AIm.....~.
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 171 x 50, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):2270
                        Entropy (8bit):7.845368393313232
                        Encrypted:false
                        SSDEEP:48:3Cxnazs22lovji2Ez2iqBU2C+hJWizJNzIu1coqAYClBeMsk1:3dm2Ez2iUhBzhyjAxqQ
                        MD5:6EFE6733E10E011FFDD6711B5F37C9E2
                        SHA1:C72549E824EAD899944A38C46FBC28BDCDAAD611
                        SHA-256:92B5056DAA03DF3EA85AF49FFE4F9CFE8699BDF3539576A99F02418FF49AD9CB
                        SHA-512:EC14B553A5780CD9B33D438CE13A6932DE43E346D8D2DEC8D093A6A2048675423948F8E2C604A73460980C3C68D9276B65D76C2A6BC7B24FDF10CA92FDA2583E
                        Malicious:false
                        Preview:.PNG........IHDR.......2............sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^.\kL.W...*.F......@.*.(H4."iI}..B!.iD...I-....y.I.h.....<..1.....C..(XSy.l....,-,.......3..3...;.{...{.{g.....Q..x.T/q...F.V...B..'..?{:.:...`.........+.0s.e...w....{.`. ....5...d..9S]../............$Y.>.I....i..8....;,r8r!Ee'"..!*.&E.....n...=.@..Sp.GF..c*....1QH3....?,.T.el......t?..([Q`.0....k.G.....X..C...k|p...I.q;.d..N....c.u.a.5.%.k.fS\)..H..T.~l*k.[.n...x2.1...........%...yK..a..l.[.?#..fD%.FMT. =r.jt^..fT...c.&..Lr..............\..V.ll....Br^6..U27...O..N*..K.gm.K..g.;..l..Fe...w?..Q.E......0.........7...(.e..t...x.c6..Q..n.92:%....l..4.h]Z.....w..|..!.p.~..B.y..&.......gl...\.wI......G.6.K.$...%.-.h]\8.LT.....}{a...^.i......4.0.ji...........n.pk ......7t....U9..b...I.....#...<q..(|=F.......0@^......+..........X. .>p....S..t.].f.x.0....7d..n..'..'... .M.qqn...G.t8'.=..V.PK....K...X.z.#..I.....@...Y....BH..I.....,..K....=`&Z.41$..a'o.:....i{o
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):16003
                        Entropy (8bit):7.959532793770661
                        Encrypted:false
                        SSDEEP:384:1l+zN+iNurNE/tBdEC/vkape2XHYdhOm+Bl6C4:L+zN+iNurGNEC3fpe2X8Pa+
                        MD5:3A5CD52E925A7C4A345047D8F06C3C41
                        SHA1:9C02828D83206BBD3EB58930C8C65A6CA5DBCF40
                        SHA-256:477277E8CAAAE1D3B3EAB5B3660239AEEABC433743A191727B1A71E529872AC7
                        SHA-512:8D8B6AC645ECC7C8BD374E6190819006C71AC0B5993419C42463009116214E5EC4B4235D94B4AE4CDA132E7DDA9807ADC51525824AC5F12696517FFC8890891E
                        Malicious:false
                        Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..>.IDATx^..|.....+)..H..C.K... ....x).rU..T..*E...;....*.@Z.....@...9q.g7[fgggg.............1//.."@....0..#.t..f.C..."@.....@OIR.#P...0..$...y.Pl"@....( @zJ]...." ...Si8R*D.....S..D....i...J.R!.D....R. .D..HC..T..... .D...... .D@.....p.T... ........ ... =..#.B.... =.>@........4.)."@....).."@...4.HO..H..."@.HO...."@..!@z*.GJ...."@zJ}...." ...Si8R*D.....S..D....i...J.R!.D....R. .D..HC..T..... .D...... .D@.....y.?.`.T... .f.P...$47........~E....!.D..X............].`....0..N.a...>[||...t.T.w *.. .....)'...=X?c.......+OE....<-84...=.....w.8...7.Ro&.D@!...GS.....s.......:...Gg..8..T...u...~..............<...S...../Y.......W........#. .vB...u.. .+.999YYY......wf..._.{6....=..]>Y?..;=02eb......2...;.%..\...P..R5....XMO.....6....W]...3g.5;.n{t.......F7S....r...[n.......AAX..j[.j.;.neef).2.....{ ..r..{7.-........i..S........<..pm.u.V....M.333....K..Mr.s..Ek..=t_.#.P...
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 454 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):13241
                        Entropy (8bit):7.931391290415517
                        Encrypted:false
                        SSDEEP:384:a99pmP85w/MAMszG+iHGgrw8Ld+9aEsjQR:mgP85AMs6+UtrX+9mjQR
                        MD5:01367FEEE0A83E8765E971E0D3740900
                        SHA1:CAE1FD22CE2539FA2ACC0242C615CB7EA3F866E1
                        SHA-256:18B8E53505DA3C412890F4D74AE2A6B26C4B0827E15E830F92A024D292AF20ED
                        SHA-512:8CFBDC014C42AE6417038B80424D2E9FBDDD7DFDDF579E349C3C17C9B52AF33A72463154D29539457C4ADAB2DB00CC28A67902FA8D9209E4AF00EDD46D52E5CA
                        Malicious:false
                        Preview:.PNG........IHDR.............s>.Q....sRGB.........gAMA......a.....pHYs..........o.d..3NIDATx^...U...Y.]:.T...G.5..lX...B..Xb4F,I0X.....F...("vET4H......*EX........wo9..9.|...rw..;...;o......z.....B.......v.mn..>......E."....U...4s! ..F...u?.@...! .~F@... ....p..Q.kP.#! ...(U{@...!....T.TGB@...Q......B.5.D..A.......~.*.U{.].....S.e...K.A.......7^?....D...h;...!.Eu...o.^..B@..# J...B@....(.5(....B@..= ....p..Q.kP.#! ...(U{@...!....T.TGB@...Q......B.5.D..A........T..! ...k..R].R...! .D...B@..........:..B@..R........! Ju.Ju$......j...! .\C@.....H...! J....B@....(.5(....B@..= ....p..Q.kP.#! ...(U{@...!....T.TGB@...Q......B.5.D..A........T..! ...k.D.RK.K.m.V.......(.^^^ZV^Z.7.a..........T..xsqYi....L......z....}....?..yyy.M\.b..U3W.0{...~.`}..M%.J*.w.mdv.&*..@....R..o/.^..5...x.g.>..ag....GM|t....\<s..y+6.X.? ,.R...-.W.m\..o..0g..i...h..W.Z.i...2.....o.&..@...-.B|.K..^.....u.}.M..6...,(...e.V.X........nkE....5.8....-.!.TtRxs....Q..2}.-..`....mX6i.w...
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 164 x 89, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):4190
                        Entropy (8bit):7.94161730428269
                        Encrypted:false
                        SSDEEP:96:GHfueo3dRLZKOSYDzGsEgfB9nqS0WKt/z2jOrrz7yrT7N:8A6AzZfBtqS0WKNC2vyx
                        MD5:8B3AEC1986A522951942BA72B85CCAA0
                        SHA1:7E0DC78FC65EE4C804A4B0C72AA53E2DFDF26C14
                        SHA-256:8B02CEC726DECF033B67689F369FDE1002ACFD5F8C32E0F248AC575997204F2F
                        SHA-512:8EE1A1F6F0023EB4F60760C2E23EAFD56E6D298CAB49D819CF1D62C0CCF608D4211D3767856255F7CF8FF45AD835FE5475EB92C608989C522CD48D00A050B189
                        Malicious:false
                        Preview:.PNG........IHDR.......Y.....?.......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.]ip...fu.VBBZ..V'.>........CR......?r...pU\....v*...T~.U)0..('`....."..,a..Y..$t!...D...Mkvf4.VhW;S........{...zZw...i......fj..$..7......[Z*.[.[..Zk...?.t:M..,..`.^...X,..sUK[..Rg.=$..!.3<....74...iY..i...k.,.fA..Z.n...`G.%..H.l7..7J...u.R..6....E..!....N@.....M....Q`...U2.w.WP[!fX......c ./@7Mz....^...k.)....v.Q`..z..1A..P.{...||...vY.....>.`...K...m.?CX./v.8.....]..;...6..kw......N....z.Q...f..q..xk.5....;.?.Z.c...`......4....?.....VV.u~..<_......sU4e.....g.c.G....O/..r...`.G)....#d5.O..w..{....twL1l.)#&hF..K...M[@.Dl..V2..j.3..s....3M.....v..!....V..c..B...|..e.1....7.WA0.[.\.u.).$7f.+.......8..e2K/.%.Ii..`w6w.E..[?_.?.?..I.k2.s....]..f....HM.?w..d.9..Rr....Y.c.}.s.zk..rc...a..I(9~........m...Z............I........7.K:.:Bf.......m..1.......&..,...?a...c.@.@.g%...s.#...;..c6...g.lZ....}.WX.3.8.....W....N.w...L...}....?.".......;cI.............pS
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 162 x 89, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):4081
                        Entropy (8bit):7.943373267196131
                        Encrypted:false
                        SSDEEP:96:KQJAeRumk2zXWySlEmWL9zi6wknB4qLx+ppNhQrW8Oy:Ke9S482LE6wQB6pNeqi
                        MD5:29B87BEEC5D3899824AA390530CD47FB
                        SHA1:55108E8E5692E4444F72EE5CEB91915E7A2AEFC8
                        SHA-256:F00E4F1C9B1D9ABEAAEC8E5CAB02A07FD74F00ACE15E36C6F6469DE5AB07A9FC
                        SHA-512:1A5AD45BBA8C29C32CDD3C4D1E460C30ECA305D851FAAC73DF165306BC338337525680B9906D367A0CD3852B9D2DAAA8FD0603276BA969495B4E29C7EC8A3530
                        Malicious:false
                        Preview:.PNG........IHDR.......Y.....2.h.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].LTW.f..O.a.......*.....k...M.Z.n.q.h....ht.f.M.n.6..t.h.k.h5.6][[....X..p...?..g.`..7.o..of....^.ys..{.{...s.UMMM.(.l.@.l..R?.......(0+0.......5...*.F..#.].........1.....B[>[..a..L.....x...0.5t.v..S.h!.........Y....B..&.......f#.w5u...............0...x.sC....a.4j5V..Z..n....K..>...3t..wm..3hB.BD.P..FkcJ6.....O........7...S.........6..P.]mf.+o....w..<.......Y..Z.whd.....*zf+.....#."_?....`.._... qf+.?.?"k...zgME..j..!.k.U*.....&z..N....ma.......R.{.r0.S..KP..fU....g~..=..Q.n.*.* 8T=/'9,*.KDW...GN;0(P3_....1......'.;..;|.L.a.&<*\.d......o...Y... {E.F..}.e.\..=W..#..W....c./~..b.EWXI.#.''&.........:....X...b.....+2...5..6+)we~ja:lZ.d.Ey....l.2.5r........!.!._|.A.....j2.5.o.....WOM....V......GC9..'.... ....C..,._...cS....b.1.....t.........._........a.3..K..>V.f]...~....K...-........#.o.Y.P........a.7..,#..'s...T.....b..]..3..dPPP..Y.i...c.b
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 452 x 277, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):22634
                        Entropy (8bit):7.974332204835705
                        Encrypted:false
                        SSDEEP:384:5ojjyi45m1/9gyhgFsH1ud103Pl39o0qjfsH37mNHy7QPaNbZy0:+r45m1/BWKy10tN22rmNHycobE0
                        MD5:548D234C9AB4021CA5FAB7BF22502465
                        SHA1:2F7495D250DC86EA99473CC342D164B859926021
                        SHA-256:7D549C3418CD90F42571D00936B23D242837CE2A8B19FC4C719E182ECB2624C6
                        SHA-512:261523F5EAE6FCE2829B53AAC5938B1A0021C119E00CE82EFFDBD690FE71064E0F3B313ED1AB2F67A16C488AD5B1A91F5AF98029D88A7896F271C108410D42C5
                        Malicious:false
                        Preview:.PNG........IHDR.............._......sRGB.........gAMA......a.....pHYs..........o.d..W.IDATx^..i.=YY6z@..DP.i.IAA........l.Dd0"p0.ON.~....s>.?zbH8..%$`....b7..=....25*.".L. ..u_..f...j.........Uk..^UW]...u..}.{.]t.-.(...J......e...t.....@i.k......_.(.....@...Z.6J......2.O.-P....._.u.=T..4p...e..q..5^f~....@i`....?.....@i..k.........?...u..O|bN.~?MbT%...@.LO.Or.`....$..y.{..o....~..(.;......SNi...6....w....~.{..^w......~.S...g?../|.O........7_...Oj....|......40......9....?..<.3nw...x...g...7.....(<.d...(3.K...;....\..:...'.5.....&...>...t.;....8..SO;../...._.}.{..D.jt.......jc...s..........Z...0q...@......Z]S.(..o.....Og.u.l.i.-.9..)j..~...5.l}..........G......k....Z..c.....}.c.?.\....t+u...15p.....[|......2..;..;...........w...........v.7...I.-w...K/.J...[..N.....W..U#...._.j(...//z.|..kv....];j|../m....t.9.;-0.:.4p..@K.....~.9.$qu.E....!.9|.m.+`).|......x..vak-].../.....G'....4.>B6$.......-o.q..L;*.N+....>...=.!.Y..Q...?......7..,....}
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):17289
                        Entropy (8bit):7.962998633267186
                        Encrypted:false
                        SSDEEP:384:ruwwXKZuqnOnZprU3+OXBruY4UkcY+TpI/BSqCrEoMXMEr3KbzHIDqqAmk+xob:tGcxE4PBruV3Uy5SqCAoMXzrQHoqAk+m
                        MD5:708E8EB906BC105CCA0535AE669AA651
                        SHA1:38D82DEDFE97D3001188C2E18FE13BD741FD520F
                        SHA-256:1C3D07765294566E17270D0F3B9257A3DB7905D4E7EF746AEE80CD591CE0308F
                        SHA-512:1EFC74C28190DEE2D2732390B74049A1B120F05EFB8DC6925207C6990AD20450FFAB40249899A9DBB82E8F92A61F770E120A450CAAC7F8C5F0742586CCE0EDB6
                        Malicious:false
                        Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..C.IDATx^...Uc.._"oB.Hr.m(.0......r..[1.D....R..q)%FBDiB.."w*.k.Jz.Y..l....>...9{.......g..Y.z~..k?.z.^k..+V...! ....(.....\sM.tD@...!P...HW.S....u^.....@.r.^.....B@...U.H.J....... }....".....>....! ..A@.4..EE...! }*...B@....i<8.....B@.T2 .........xp..! .....d@...!......(*B@....S....B ...O..QT........! ..@<.H......! ..O%.B@...x..9...C'|..{.>Z../~^.s<<V4..ujo..v.Z7..EwT.....@.....?.......~{...K.........C........bB@.$.....C.{....Kf'S.....T.*&....@<.....'..D`...;~v.DT]...r!..>....ru...}.....#uG.T.....>..z ...3v....P.M.....5.@<...?....F.}..c.W[.._!P...O..>.M.d<..J....E .}ZZ.+.5v.p>..N.{B....>M.Nzfb...OB@.." }.D.y...IdK<..! }.:.....f.K..bX.T9...&T.&?.VB9.[B@..@@.4..1}.4.@H..-!..}..~M.<.z..I}.G....>..S...N..@yj..n..s.d._.....(..R"....Wf\.oO.^...\h.\.`)...ni.'.].vk.1-.k.^....#.,}.{.RM...~Z.S.. .@U!.&}......h...{K..@.........W.8.N.s.Y.0)..f+...%4.......5.@j.):k.+3...I..(
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 452 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):13737
                        Entropy (8bit):7.916899917415529
                        Encrypted:false
                        SSDEEP:384:jgxmx2Fa/+76A6M6Y7rSYRv47cwbkkapeIiRmDGd+gUwOSpQ:KgyoWrJWRkkRXmad+gE8Q
                        MD5:830632032C7DDBCCDE126F4BAE935540
                        SHA1:9FEF1DA9FF1D7762B779553B5F873BE54C8D01EF
                        SHA-256:2328D09EC845433DC31808FD6B12616F1D28B9B3BA7DD969ADEB6C32D8EB049A
                        SHA-512:5C17EF9A0063499F2C34FAB2C4D968D29E20F20868921FA914E5737995AA0C166F224995109FF7ACA57B5B0F8647715DC670C4AEE385F61B5F8E6E8422C49EA8
                        Malicious:false
                        Preview:.PNG........IHDR.............w.pl....sRGB.........gAMA......a.....pHYs..........o.d..5>IDATx^....E...,"o.....&....AY$....AE..".l....+G.>AP@D..e..".".A.Y.@...K..IXB !..!..c1.On...===3=.3=.>9O..u....w.z..-].t9]B@...!.......Z...B@...^G`.Q.&S..u$d....B.Y..P.w5[]......B.m.D...! ..@...Ls.Q"....."S....B ..D.9.(.B@.....b@...!..."..@..! ....T1 ........i. J....B@d....B@...4..%B...! 2U...! .r@@d....!......*......9 2..D...B@..L..B@..........D..! .D...! ..@...Ls.Q"....."S....B ..D.9.(.B@.....b@...!..."..@..! ....T1 ........i. J....B@d....B@...4..%B...! 2U...! .r@@d....!......*......9 2..D...B@......5jT.@.{..O.;k....>.._o.+......{V...&C..(?.m.....F....gd.....?.....3u..x^L.1n^...@../.....XE....L..!...t.....L..B.).=..sn..U........@.O..$..o..L.....g.(D...(....Lo8.....,....f;o..i.f.h.9........\./..[W.9.....+....,X..+.d.....Xc..7.p.m.Yg.u:YO.V..l.t.].Z.g.U...]...5.^..._.~.WL...o.3f..s.,Y.X.7.x5...K/-..._.......{........W.(Y....?...!....W;.....iwNMW.............@+Q.5.#.
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 185 x 76, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):2332
                        Entropy (8bit):7.8822150338370776
                        Encrypted:false
                        SSDEEP:48:jB5Gg4vMs30WIn5IVeRy1bY7DqbqQBAeNjukXlN4AXat:PGYuEWV/YH7e1uA0AXat
                        MD5:91CB7F1273AA003076401081B8A22237
                        SHA1:5157144069E7D2FDAE60B397BE5851E75BDF7707
                        SHA-256:80682DD6472E8D1136BC5E20F6DE87B595562414B19EAB8E965736FE992921B0
                        SHA-512:5A8E3C0ED0DB94BFE359C63793F12F3D7B3C37F3A13A5C96634BA1DC8C9E50FB1142FE4752FD9FBFA39A682F78C54AF868AD337EAA787801FE5F66D8F55A8196
                        Malicious:false
                        Preview:.PNG........IHDR.......L.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.\.LUe......Ji("....9....-.."..5L.Y.Y.....$350.."2.lK3Cg...T..DWZ.......i.?!<..~x..z.......w.sw......9....s...w..l6.:....p"dH...F..B<...qE,R$G\!..E..".).#...."..{f.PyI.d..l;....;.=.S...O.S[.\Y^P.aj]9*Y!. ..~..#...S.s...l..h.[m....%...P..@.kG......G..X.r|%..AO.}-..G>35..c....Ac.&[W.d..+...zG........=..l...VS.d..+...tGd..k-._.....oL.:}.p.~.W$C..|...I...n...~......,.i......e..=..?{......>r~.Lw.+2..\w.)w~...c....h..u..%...PE...f..'..m.ZE.1.\....U.`X......$...P%..UH{[K..o7~.k.49..W.t.~.^_..7.,....f."q....+....;...~;.c.......Xb.\?...........0h.lV..WX!.....ljm.1c..U...[..X.)......B=.0~..W...rO..j...ehI5U:..66V5sJ.....V...]Y>...1kQH..2.........d....S....I...+..].p.....m7...Z....s.D>.K/]..?.l....2..=..~.mq..".+.....,..8. v.o.).Z......>..Xv..i...TA....M.....>[X...Y.7lJ..e7..S.....02q.O&9.......:L....N.......W....d..FqE..T..N.....R....kXv[..j......g.K.\@`.M..B}8n
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):11332
                        Entropy (8bit):7.9324721568775285
                        Encrypted:false
                        SSDEEP:192:vpXZavBpl00n1Pt7JquG9GYHDK/5cxektxMQjcie9ZZkx30eXJIb8FKRN:vpZaDyc1P1Je9G62/5clpjre9nQkeXJY
                        MD5:31579CA3352DF8FA4E3E7F48C7CDF672
                        SHA1:AA682A3C781BF8EE43B5EDC9718E64CB79135F25
                        SHA-256:B0E7824BEE2C896279457D87E61E902431BEB528D830524CC4DFAE126E89FC24
                        SHA-512:782FF9492E3ECB11C72D316DDD94D1F3E94CD908FC9452A37DA6CA30ABCFE9AB2BCCED8583A569DA68626BCEC730408AF86997E295637BF64AFF5BC768F3E309
                        Malicious:false
                        Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..+.IDATx^.{...u./-...&....6..+z..Q."b*. &M.d-e.*.. ....J..Z-T.Z$....R..F...%*`bn..<.....W.E ..w....^...;g..[w.5w.9g...3......t8t.P.?$@.$@.5...=.8qb.... ...5...a=...#.y. ...@B.....am. .. .......$@.$`.....G.B.$@..S... ...C.zj.#[!.. ..).......!@=..........}..H.........VH..H.z.>@.$@.v.PO.pd+$@.$@=e. .. .;...v8... ...................f.o_o{....~t...n.S.N..?..._..L;J.H ..,....7.}...|....7...b...|.........ObVa1. .?.X.....~.....t2..V>.b.}..0.F....%`GO7.n#~..F....K.~...FX..H.^....k.Z/.2v.W..M.<.;$...v.t..,UO.-]............D.....o.J..Y........5.%.l....{.....'O..dC$....=uks..;{x.,.N.=.."..Q]..w>.E.H........AV=...f.&. ..ip}._0.~[pf.`..9..v.W.,..2.E.$P........+...OcC.H..=..|..[..g%(h.....W...?...UDh..T$..?....|.]..)?[Wo.h.'..2P.1..!.......$.NO.5..}...c.;...~.x,|Q....B..6.@>..y..}...m...D~z....L#.0`_.`.s?|....I.....a...=N....c.._.2.._..6 .]...5....{.^>.lM..;n...k..9J..S.G..{.
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 167 x 92, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):4181
                        Entropy (8bit):7.943341403425058
                        Encrypted:false
                        SSDEEP:96:b6JWqvCl45Da8kuGzhRwZvwIutfij19MQ8EpW14LBGJVCq:b6JTCl45DalsBws1R8914V5q
                        MD5:817D5A35EDB2B0E052194D4F49FDA19C
                        SHA1:FA6CB2016C5F43B76102B63D60359139227E07EA
                        SHA-256:0A87B8418B7F8E6E117BADDA11D7CDD38B8B7320C6BA3D3E9AF93EB9ACB2CE14
                        SHA-512:E0686BDBFC589401F0EAAE2B1598199EFA285F8392742B1C928B9274088804B23DCB584B6FEF68CE6D7E54DFF9C10338104F4C0F3F80A04471F0B2E8F9935CC0
                        Malicious:false
                        Preview:.PNG........IHDR.......\......!2a....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.]iPTW..iv..D.....%DQ#A$...d..h,.T~..+...TM\cj*.)k.fj~L~$...L&...,...:.FdU..f_......._.n.m.....q.s.9.=..w.9......$..b.*..%....@A]A..%..<......l.h.+../..OSe.....]...>..C........^cCy.0nz.4<......g..?~..>.1ws.B....07W65.74T....=..v.......D....6.....tR....}]}....4z..^....7..;.."......^.....|=.#.=.32..o.<.Tn*Q....g.zN...n*...!/.........!....F..]...6...m...CX..~...+..U...E.|.........7]=rE?i(..$`e.%.`.....w._.Y...l.1...@....t.P..=.}..*...N...N.|.xS.5&.....Pe......Z.Z^XJkx.....^.....?7..._....Wsz......}G..]...\.....,[.y....}.J....'.R?a...G5..l.i.?....MH..l.DC^._.c.m.....%{;z.&.*+x;...S.....zxyH..`.._]...el^........U.T..^..p..z[.6(2x..,#;o##..}Zv|Z..............V.....0}Z....]..m.....x..).k]&e.._.W!Vry..%...I..d..}w.....^..\............m[.^.3r.......-8......j....>...Q..T..{\V\ptH.?........1..w....FHl...x.....\.`.ei.w..)`...g..V{..Z.....8..........o.._..
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 221 x 77, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):2599
                        Entropy (8bit):7.903700862190034
                        Encrypted:false
                        SSDEEP:48:PmCwDJh8w9JewaF2zQNXXj8zq1KM43sxXxjYbTgJW1MFsrJ075CawGjGj:P1Ah8UewaFcgz82Kx8xXNYb3id/yj
                        MD5:E88131C9AAC52649FF044905ACAB9B76
                        SHA1:34AE73B9165CBED0DDF33AC20E4B3E7D622C19BF
                        SHA-256:30F22340F582F9A352A7ED3048D1088F178E83CCAACAC1CCFD86852C8F9C78E3
                        SHA-512:97AFE8F3A2A3138613934AC737C390A35F6757BFC3D381EA7C7CD148F739932380DCD46D0BA6F590C274F8BFB4D4286B3C0433AA69E090102A8A9ABDD7C97EB1
                        Malicious:false
                        Preview:.PNG........IHDR.......M.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.]kl.U....B|E..>...*..Q........b[.K........m.(..... ...!%1%*-B.C~(&`[.....-.....~.w3..Kw.3wvfzn.2{..s.....{w..\....!.3..:..!..../..zD.x...O.K... ^.1*...8.G...z...D.$...........>!..V..`v.CQQQ!..-L...../3.2......ZH.?s...Iu\N..,3.?.p..N......<....E.<.=z..Iu<ll.dX...g....+.{X.p.....:..t...a...cKK.|...Yszl.N.:......KPs.):).T.5...&B...*..5j``@...(_r.V.j..m...?x.sg...t\.dz.'^.=.\.h..<.y....:.I...w..ze.m.\.qPJu.....D.|..@......W..t.+.....X....e....\H+.Ns%^r.VS.N.3:...&...._..#^....d! ..F.....xc..M...q...17.z...z&C...K9(.Ifm.35.v.>.'X,...p.:=.H...J.K.,...:~...7.t.....R..R..9..?....l../.(...0z0.M.f.)H..Y_"e......B........L...q.K......|;..L.........xI.K3.M..%........./..){....R....s...7....).q.._R.4O.a3......<..%....3#.|>..y...u...R'.P..$Klz...........,...g.....`.7..\...x>.{p\;>+.,.....e.-..Re@.N..FY_....*....]}...[..h.M.oq.S.U...c_}`......8TP....
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 232 x 50, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):1570
                        Entropy (8bit):7.780157858994452
                        Encrypted:false
                        SSDEEP:48:r+em8Tlk2APr2fEd72tTqiVJlcLzqeVzYwS:r+erTlk5S+zoyGahS
                        MD5:EF9AA5B2ADBE5DF68AC4F4D716DF7708
                        SHA1:363B93AAAB9DB2832F6CA0EE3C27C9310C344BA8
                        SHA-256:3D94FCC4821A135ABAAE6579011441B94F9C04DAD1E66BB5211B0C019A5968B9
                        SHA-512:EC9B024AEA46F7B97D14F0A7E12704D09B85F0017CC9E273CE50F2F889DFDAE81DE549CCD546BBB8F8BAAAAAB7781FEF77BF783E02CCC9605304552F7DD5903D
                        Malicious:false
                        Preview:.PNG........IHDR.......2......n.f....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.[MK.W...t!.fU..b!....*JBA......%-.F.4$.Nw].....E.$...)T......?@.O{...3w..y.=/"o.9...<.y...X....c.1P6..e.lx....0..J....e3.&\.@)............o.*>.E,;.....~..|....Z.3`K..W0S.&.L._..M.e.`..M.....i_.......\...6g..^....4..L.Y.9.$M...4..L.Y.9.$M...4..L.Y.9.$M...4..L.Y.9.$M...4..2.......q...&...........*.Qg.+.p.......a.:.X6...o2......A.....[).,.p......P......_..>......3.......z8j............>...fww.6....../....S<......^%.4........{.N$..`.!H....`........a..(.G^>~|txx....K\mF..'d.d:9J!.....j..i24.A...`O.......s.....?={....H'._..~..O......*>...ZXX.3...;C....\....%..s=...w<h.......0....~..y..._.......+.n.P.M]c...A..Er|.R...$.g...9*._.jg.....x...&+.JWM4xe..^....0...11.[.....f....r#.h.h$....[=t >...r....L.0.KL..B\..x........4J.0....vY...\dA. w...........g....};.}.....;.......x.|.....)......x....s....N.$.n..g<Z.q.a9.C.....oX..%,KNNN..i.8J..p].1....B>{......n.D|3t.-\g...Q
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 340 x 79, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):4490
                        Entropy (8bit):7.928016176674318
                        Encrypted:false
                        SSDEEP:96:WXKr7Xwf6Obg+XaGOnsjbbGSb+ydWtRvEOhDE6XqPeosv02tR45boo:3rTUgXZnsHKSb+n+8DdKlwm
                        MD5:7F161B19B937AB48D4FD2F6E5E16FDBD
                        SHA1:BDCE4F1C73E87E609A7FDF245A512CA4F73B35B9
                        SHA-256:C863C5E71D1116D69561BD0637F4FE4C4240E9CED05B8A5B056073AD13E6495D
                        SHA-512:E915B76FAAC9512D2AD11CF4E4530A19BEA1C7D8508BC218C69CB041F1EEABA3E2E03B1D56E61B032A6418829752C21B8354AF1335466D7E1528A06E6742A461
                        Malicious:false
                        Preview:.PNG........IHDR...T...O.....;.......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..p.U..'...rD.WX.... Q.. ....."$.ZHP.Z...C...........R..%G8R..... .R.C6..A.b...0...^...#..g..........z2.....nB...l..X.&._.a,...a,...a,...a,...a,._.73'N..ukeee.6mZ.n.m.G.}...n...a.9s.DGG....y...8??.o.pE1....Y.,......).ca.i.M.:5$$.........Lr...ye........6...8...z.-r....d.(.xc..U..^11...._>.QX..y..2...T...sss1..."A.?_.;w..S.F>......4.G.......D.|...@.K...............C...k...P...q....6.`QQEE................7;;;.._\q.k.|...\.z..6j>..n....Y.&G*.n.S$))).....r........}.{[Dv:,..w..A...`..........a.~.N.f.s...P...*..'7n....eK....+.n;:.W..C..9}..O..D.q..X..5i.s~en.c..F&..?.....l.]3r...W`..#..7o..R.@^..*...W..?}t...{.B.8..D...UPa..~..C...|.C].a.9..R...c.Y0..9.u...d...C.......X.U....WK.....5...'..PM.`...<. ._.z.F^^.EH.K>_.0.d..S...Yj<..~.5.?l.fZ0.@d.....*..G...K.....e...b.|e..Q.4.....('z...!G.....2..XQx\......X...2.\h..X~.e....Z....=....C.1.......w.....d.z.
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):11449
                        Entropy (8bit):7.91552812501629
                        Encrypted:false
                        SSDEEP:192:/zgGDSJ0ke0kBER0C31jm1OSZi6/ccccccc3zzRmKHDr1NFnAaLJ5rBX8iaD7:/UGe6m7XdJS86kvRBHD5/nAa95rB9aD7
                        MD5:163E6791C87E4999C343EC5E23843B15
                        SHA1:43CE3BAE19E22876483A7FD0E93DB45790373600
                        SHA-256:DEB2B126977EA150E49CDB3ACF4F5387639C7B7B5583454EDF55ADF83DFAB720
                        SHA-512:98BE1F4684F99A9FD2F313B09A113B5C310EC8BA8EB0EBF5FD69765E5B48B001D39999E3F25A7E76C7344DCF57B4F0BF2E4614FB0E0DFCCB6F02E6D1CAAF7FDD
                        Malicious:false
                        Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..,NIDATx^....E...@^.T.....H..$..(.!..3....O=Q...<.9.`@E...CE.(""..H.$..6.......]3......tW}U...w*~....W./. .. ..........m..H..H... ..........'...G...W.=#.M.$@.$p...........!@=U.VH..H.z.g..H........H+$@.$@=.3@.$@.j.PO.p... ...... .. .5...j8......PO..........o....+.Z.Pb.FH.......D.g\........._..'0.......9.>............&..PO.z..)-..........R....'@=U..I.&.g......../....SO.\.,._.@7Q.g.}V+../..Ht.I=..WZ%.{......_v.....%U.)^H(!!..q....|.H.E.DG_....o../...T.i...z.%.4K..# %.-.(...4J`i..,.P....F.D.zj..#..@.).(...o.....S..)..i.z.g...h..8.......A<d.z....<...n.]...E....(Jj4P;._.N..Q...)..8U.u.e).j.e...E|.]."..t6.[.K..5.6.....B..(.=W./....S'.......z.FY.. ...PO.".tI...F...Q....c.o.....}...r>..3c9I../.......}......I..G.|..|...~.b.e.5.OGb..o.....w....i.e...5&.,Z.H......g..KY.<.nZ.x...HHbdS.Z.\.O..1Q.K...9....Z.L....\g#.._~9###%%.O.>.Rvu..C.....S..g01..j...?-../...Q..N.:._....1.!
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 220 x 170, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):7374
                        Entropy (8bit):7.955141875077912
                        Encrypted:false
                        SSDEEP:192:IfGsPejaVZWzIZKpnFFt0HK5+2Y/SLopWR:IusPe278IZKpnzt0q5+qVR
                        MD5:70DAF02EC717AB54452FA4C707BCAC74
                        SHA1:30F46FAC5E96470848C5A948162CC12455A05154
                        SHA-256:58469BA93EA36498FF9864EB54713A001C52106DE97804506D82EE24B816712B
                        SHA-512:E599FDC22A32CFEDBB23EECEAE0B278EAB9A90959FE6ACB40E2B201E45A7C19261AAF529E7A0D9CAF2A9A4C64C7831343F3BC20810513990AD5D38A32741564F
                        Malicious:false
                        Preview:.PNG........IHDR.............IC......sRGB.........gAMA......a.....pHYs..........o.d...cIDATx^..S[Y..I...B..`...N....t.q..j...+LU.....O..sF.!.I...w@..H.Q.w. ...s..{B.....2......i..q..z{.}^..............J.fQ.....r.\WWw.T....amt.t;...6\N.........z.n...].u.z..Q...?^........;;;;:NO.}.c....<-...........({.^....t.k...F..[m..:........R2...%.y.l^OOONN8)....\y....}...}}.}.Hy6.^.a.....\...!S....K..|>......s.........l..P...LFWW.l..RK..b.h.h .3.F..|.|..~..........e.aa.........0H...<.Y.a`..xA!...7.X....xd=........h?o5........Ay....?6...........*..tb.9.*j...S`](.,P...9.2j..?...z3wD.[......L3.Ng2G|.......&..0ZK1u8.H.2...Z../..P(....BA..aL|..a.Y:.....J...5^x..'.\..&S...L..U..;....<{..."..@x ....J.N...;....WIht.<..B......!HM...&z&..6u..hF..G.D..B..........A.....n...GG...,.,.Q....X,`"....r.........3d.{o.(/...3.H...x:sX....h.8... ....r <..DB. ...y.N...o....5.......L&w....v....w..D......!.a4...."8.U.|.0m.(..zR>..=.+.L.....e....Yd2.-Z.7..D"..pX.I.....e5qYa._&..3..J..++
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 651 x 254, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):19235
                        Entropy (8bit):7.944867159042578
                        Encrypted:false
                        SSDEEP:384:h4iuxL3Yck5lpMcTyHOypEod/G38lJxqSp5BCU:h4/xjYc2lmcOuuEoJM8fse5BCU
                        MD5:AE32E846559D576FD263BD69FEDBEC28
                        SHA1:D481DF71C858BAECFE33418002D368F2DCF68D4A
                        SHA-256:6E21222B0EADAB8D3CFB0C7D14941D196165D6709271AF317D099F12403CD352
                        SHA-512:9AA4A6DD01D3B745D674721765F2BFCCAB584CA0603F222EDBE9A88190A2A57438041E7A3706CC0656A6ABB79AA18118319F210EFFE3DD917E7B94A6294BD346
                        Malicious:false
                        Preview:.PNG........IHDR.....................sRGB.........gAMA......a.....pHYs..........o.d..J.IDATx^...X.W....D..A......bW.A..[..5.F..D...7.ob71.....b.."...("...(...{/...e......}.....;...S.X...H...@d...... &.....b..... F.....b..... F.....b..... F.....b..... F.....b..... F.....b..... F.....b..O.KVfVfjFzJzVF.}i{.R..l..q..`I....e.'./.'.G.z.*!&>)61.UjVzf..4>Q~...U..=......s.\..WE...2...t..`F....M....'..?.......>BO(m.V.P....Gy.../........B.6.......=|z7.Z.|hQ..u..j............&..Z.bo?.u...S7.G>......]I..7.i...3....<.y.l]....SI>...L.2..<.....[.'=M.Tsprp...T....cE'*..P........eefQ.NKN.x....:-#5#....q/..xq.YzJ:.T.*u.j..S.C=...|.....2..(YF........|...*.7t...{.jz....W..Y..{...nlfj...L.6.[.hS.=.....(!C.......?5..+...[..a.:U.K..C.......w......+..r@.z.7..j..qB..B.....X}..=.fk...>^5[....n.z....wn....Z4.._iWG.^..z6./]t......dhM.9s...Gbo?...U.V..tj.......*&)Io.{q.G...A...l...i7...&....d.E]....#.W.x,.T...&Mz4+].4.$n..F..x...<.ppr.............y.,i./..
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 59 x 61, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):2210
                        Entropy (8bit):7.86853667196985
                        Encrypted:false
                        SSDEEP:48:naUvGemgl0W5KMDRLEbGAnaHC7ew/fkDSCcE5FTaHWc:aerVlDRIewkXlrTa2c
                        MD5:73E38124F94AD20A2F1571FBBE11AEEC
                        SHA1:87FB8056DC7A0A3B70D51426771C4CCE2099CFE5
                        SHA-256:A700B63B30CBBE5230CC5E977D651E178EA87E73EAB18C8D5FFB1362149ADDF7
                        SHA-512:320FCE64DD6F975384BEC9267348CD5CD24A55B13BB09FEF1238C2216AD8ECABDCCC15601A079CE092ACFA4954829FFEB06FBB0631F6AE26E3A39E43C102048B
                        Malicious:false
                        Preview:.PNG........IHDR...;...=.............sRGB.........gAMA......a.....pHYs..........o.d...7IDAThC.yL.w...r..r....... ...Eq.nnN..i..[.e...-.d.M.dn...x.xmQAT.Q.RN9..EA.k..P`..=}..m.&~............oy....k...}}x..[....g59.}]...~i.SY......."....7Ow../......2...3f)n{..R..R......U?......O.{....c..pT.\.t....5.07.. .....07...7.o..,+.,.V.c...&..%.3I.....:v..\....6.....??..[.N...........nz..Z.B.........v.prs.q1V1|..=':..`.bz..%s.cf.3..RyMNUeV..J.k.}D[~xo..d..c...sO.y\....B...c.07......Rp..J.......{b.......;u...s....N.gko.M...;6...6..c.X5.S..o..\....^).....(......y.72.^....s%...[.q!&Z....C-..+o.....I.....,Y.{......g.1.0..I}.....<.....T..}....t.!x&)..[.7....4.5..{....n.<...#I...:.....r.wW~..zr..9k.^.]KR.*W.J.n.")....%0...)...Fbb5`4'.X..E.../.t.&,t(...@9....\$..........].P..jdU......H;.$.'%}.l7........y..$.....Z..4.Cm.u#&.%N..1..+..8....y...U.(.T.....}.I..5r}...!..K....>f..3.C.G..X1.(<.Gb..b(....0Qv0F.......n.z.s.Y......\.,.h%1...QU..%.}B|CW......sO..\.=..&3...,.
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 127 x 138, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):2232
                        Entropy (8bit):7.837610270261933
                        Encrypted:false
                        SSDEEP:48:dFQY2WmQbe+TukEC2KgYPsWOuWFk792oP/sWtGOK9Lc+rD0NTHj:3L+wKkEOgx3PG92Eqt9LczFD
                        MD5:EDB5ED43CC6038500A54B90BEC493628
                        SHA1:A8CD63F3914E4347F4C5552FB922C6C03917F45F
                        SHA-256:9F3312E33EB78C6952B5A5D881BBD18751FCFAC41D648C6F053CE781342A504F
                        SHA-512:4EBCEFD69A4C249AA3B0F00A954C4E463DA22FC9CA0B61A0DC46079B438138C509B22188D966FFF6599A3A604858BC4CC8FE6E0685A764E8E0477AB7A237DB32
                        Malicious:false
                        Preview:.PNG........IHDR.....................sRGB.........gAMA......a.....pHYs..........o.d...MIDATx^..hVU..}..s:..6..9g.MM3...j...*........A..!.A.....R.Ai%YH..(M.".h.cf*.B.......:...{w.{.......y.s>.{.{.=.........#.y..r.K...K.0}......Y..b..[N.=....j.=........!......./.6....B.8....p....5P)....@......=}............^.~..@.o`n<.q.....Yw]..mg\V*...y.W.T.>...\n...s.iG.~L]..d.<.8..j<.<1..4...CZ0...}...........oDDh.....]3}#"B..O........0}B.F.L......5.f.FD..L....5.7""4`..p.........'.kt.....>!\.k.oDDh.....]3}#"B..O........0}B.F.L......5.f.FD..I..x........Z^...>B$1.N"}4.....1:&F8..*.X.yL(..s.3......~2.EL%.w.Uc.zJ...B..S..b.7o|%..7..'.....N.|..Vi...q..uO,`/....\W{..y...&iI..|X&T.........-........Z..o.~u..U....cF.M....O4}......~......:T..W.._s...t..Dlb.$Pr././.._4.b......R.T$t..$.>hB. +.{......m.w .Q...05..C.}...}.....?..h.....Y .8.6^t....}.y.%......l=$..[.~..]..h..N.......*....SB.|....8..H......_...G...|......;6YQ|WO.o.}]..'.$..oE.y...i'9.[cmS..@m@.Q
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 742 x 104, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):13030
                        Entropy (8bit):7.948664903731204
                        Encrypted:false
                        SSDEEP:384:/06ULmwT2RqfILhmLy4tNpYGL0mvBQhTMHX4PCIVYm:s6USI2RqfGhmDrpYM0ofHX4aIVYm
                        MD5:17E9FF9F735102231846936F0E2BAF1A
                        SHA1:9EC1AE8A3AD55C48C02427D842D6E38DA85B5145
                        SHA-256:DD1CA8DA90893E0B63ABFDD9E60CF2BF844B311964E9D9DDB855C21FCA156EBB
                        SHA-512:71E690D6C87B09659296E6E6DDC8E3F91035DD80C5CE875FA557763E8138900C27FB492885291CEE203D65BCEE8C20C9C39E0590A5FD32B8A00BEB3E3F6D6E8F
                        Malicious:false
                        Preview:.PNG........IHDR.......h.....2......sRGB.........gAMA......a.....pHYs..........o.d..2{IDATx^.wp\.....sN$...$.).Q.")R2ei,kl.%....r..vm.x<...\...u.U.g.ry=..uX.cK.dI..I1G..$.".Fg.q...N.nt...3.w.w..~.v.O.....K.....A@.....A ..H.n.D;A@.....A@......e.y ..... ...1..P..xH.. ..... ..e.9 ..... ...1..P..xH.. ..... ..e.9 ..... ...1.@.$9..S....A@..4....^C..F..VR\\TT.........aHII1......VS..g........... .*....z..|Ek.......<R../55+33;;;+..Y..WC..#...P..... ...s#0::......522...,.v..D......_.....9.2N.L.'..F$.....e..!..... ...N...`1....G.....'&,f..f.X....!.lp......I_........J..z.R,YbYd&.... ......~"b\...b.Z.SS.....c....&..Yl-............... ..[...BY......... ... 1..Z..6NN............._.zw....MKK.Z..vMMnnn.4.v....,q..e... .D%....Q......._..p*M......22..e...k.}.....qU....S.a...~....P..}v.. ...1..2...F.GCC#...].=..C..n#...K+..MOO..........."....d^2=.{....U.p.h%.%n...D.....XB..b..'''....?h.b.B\v..^Q^.UC............Q...I.....U.VD...P..{.2"A@...b..V...........jF.x.
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 563 x 211, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):14458
                        Entropy (8bit):7.944094738048628
                        Encrypted:false
                        SSDEEP:384:uuT43eqJy2jEeSZE0onrAFAOpn5ytFfNrfIkBQTYz8ynth2EB:EugQeS+nrAFZ8tJNrfRQM4ynH2EB
                        MD5:7CEB71F78A193F8C9F7FFDA5F81AEBD8
                        SHA1:EEC1597705EFF1A527C246B86A71878185BA6B1B
                        SHA-256:77911FF7AEAB8FCCAF36DE6E1183FFE1A6C27F77B5714EE780976CE5189E8FD0
                        SHA-512:1D1AB19B64E1E2ABCA61AE78B3B50310B0A6CF19D2ECFCB4499D8D0BF68600B4D95BC0945EF9FF9B1D016ED61EAC518DCCA1A426F460317C07AD51E2E047948C
                        Malicious:false
                        Preview:.PNG........IHDR...3............>....sRGB.........gAMA......a.....pHYs..........o.d..8.IDATx^.}.p\W.ZRKjI.}..[..M.l.N..[..O..B&....?5...@.5.5EQ...T...d*U..*.C6....8..}.Wy.e........k]s..z..^...T....s...}:.{..n..1.."@....P......."@....p @f.s@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....6D...."@f.3@.... ..B....5 ...f.;.0..7141...L.....M.3.L....{M.T...I.C...@E{.w.Y...q.....c3..gf.3..'j...I...{M..@..4555==-...!..f.....d...>i.%&&&%.u....f..[......O`.......G..E6I.< ..3.k...',....Y...<..........u...{9.......S^^.q.<..^....2.bb.E`r...ey........ ..3........Dg@L..a'.x&''.O.Y..!e.c%$..(P__.d.....Sj..S...BLu.[g..mK.SwVe.."@.T.@P.y.........=....40..L...$d..J....cccw...^.RBKKK...heJiS3.0I.X<..}..*O..........QR..q.5GTA..ht.(^.Hno..n.......wvv:..K?.\.JQ/i..h0)G..1Y....K.>FT...8..d&..,+-.T.b.........f.."3.V 6.:...E 1...?.Q.6....A1Smm..K...V}...:.uA'.$.v.cy..<.`.Z322.r.LI.....>......&........"..."......@.Ccccee.[..z{..fL5..{...
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 123 x 103, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):1657
                        Entropy (8bit):7.80882577056055
                        Encrypted:false
                        SSDEEP:24:q3kLWZefR0kKbfLnNhzzt+acvt2x6pBs/j+7QJU0QbDQ883ASaoUV4hNgq1rsyhy:q322nN+X11GDsg8831Uyhi/vf
                        MD5:D5F7A65469623327F799B516ACBFFD2F
                        SHA1:76C6333C14AF3A7EA091819953E6E12DC289A12C
                        SHA-256:F476FAE1C6D79069239C471D182631AB343749C22B1A6990250465C7EC3738FE
                        SHA-512:351B9E455E97E6247E64E4BC1B59C9524E70AE0D09D3B6FB96937378A70536483B00426EE69C3590DD415A8265D21FD031B524B90E4E86814EC9AD704E57793E
                        Malicious:false
                        Preview:.PNG........IHDR...{...g.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^...h.U..p.T..(.eBR....2.....':.4kec^....0.&.....ugS.8u:i.P.F..f3...D....6.%...xaI.}...y..9...s.w.s..{..y.5<<<...(0Q.............t_..q/.[@.....-.e.....=..J.L.......c.4H......u?.XF.KJ..zb..0..f}..'J.,[&..S.6...w..9..._......<.........?j....H........>....~..}.n.8.WW..B?...?.b.;.....<....~...b...m....&1.=.Pq....w....a_3.k7'...\....d..z.O..w...s...Lh.x..........Q;40.i..`.8V._.@...rd.....kF.@<@..e......e....=mHB;....E./.\h.^....q..>.....%v:.O.:...&q...:.'e..9...h.iG'.L<@......([..|'.n.x...c....._O...[)......S*..Q...d......A....4..t....E..v..}..7...t.b....,/*|.H.]...8.. .@.(.;"..Kt.....].+.[LwJ..B]i.b.k.@..Js......J......6..J._LwS<@..J.YLwV<@G.4w.L..G...]..zu.z.h....;...W.IH..+...c...F....qI....Xul..]...N...wv\.M$..D...+...=.....?U....T..^<6../T*.{q.q..:....y..XL..l..z.d....G..b..g.G..b......SM.{q.q$MUL..R..........^\P..g...e.....L/yqM../.b.f..........J.<
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 163 x 131, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):4847
                        Entropy (8bit):7.950192613458318
                        Encrypted:false
                        SSDEEP:96:JnieMJz5Tz/gKVp93jQvcv16kjOzbapFJBkjcMNBqmQzOG8qx1QKnse8T:JieMJzph13Evcv16RfapFLxMNBo8qxan
                        MD5:A1A1017A6A7928761CEB56D1D950E123
                        SHA1:28272E9C7F816A1CE8F2033FC00F489005332365
                        SHA-256:72F066CD34EA71D0E1B28FB60D663B0372C5254E1A8239C94A164EEF9389DB88
                        SHA-512:10F4557F102230126BC86CD4B49C93365C38D5CBEAC51F4691B90D861098866A2BDEFEBA507731D4FA14367FEE430453BD716157F9074EF643F2B949B09E1530
                        Malicious:false
                        Preview:.PNG........IHDR.............n.<.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].\TU..}...E.0.T....L~....af..Z.....O..4..>Ms..Js_....5.E.d...Y....?\z.3..}.l..|?~...{.....s.z..Y.............E.X.6...c..u...y..W.j....."}...l.i.`.!-!-......MKH.E.bi.d...b.X.)...X4 .vJ6-...;..+/.->Qyi.t...%.T..k;.U..y.C$[;..Gm.......v..*2..2..eee..."!..)...yy...III./..u........2....M.:''...W.....o..t...._.6m.... .`,k.T.v."..q.......s~~........O....ed.[W0X..HB.V.i.....<=..E^^......MyY..vpp...........^6.....aQQQaaa........]^^nkg../_.d`.%......L&k..B......?C....W.VVV6660t.J+K.:..%q.....e.cp....Kz..%.qZsAR\T.!......>55.R.u.W\\.L....T...K..rE.U.K.-9......y.y.......K....>...HWTT.e....+..B.......%%%......^...|...M'.%.f!/..=p...{O..../...@...DP..hw8....7o>..A.mgg......7-']~.s.OE.E.|=.......'%!y.......\.....MSn.i.........!...U.$0S .......Z.P.}[.%X[.;{....N.....\......6O.....'.N}.}s.m...E..V..f..r...4..~.......H..F.}....4,.R.=.......xT..4......./...,z
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):1604
                        Entropy (8bit):7.814570704154439
                        Encrypted:false
                        SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                        MD5:3F1535054D4F9626F0EB10CEE47F076E
                        SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                        SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                        SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                        Malicious:false
                        Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 165 x 131, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):3879
                        Entropy (8bit):7.9281351307465044
                        Encrypted:false
                        SSDEEP:96:k1hccap27HGVhY2Kn+A3RS+HG3dXrjmg26vh:k1hccewIhYxRmR5
                        MD5:C451B2A146BDD7EF33AB3EA27268796D
                        SHA1:C040BA2F31342CBCBF597C96D4D6EDB83D473B77
                        SHA-256:4C264B2A6E88712234DAA8E3A8D630CBF4EEB338554CB0B794D8031F8943EE65
                        SHA-512:55915A304B261BC6F38F5CFE0389D5195F85FE2C1DA325019C3AA391E8B1773091E078A35BD57F8CEE0BA035956382AE33790EF462053FCE711EEA9665B7F917
                        Malicious:false
                        Preview:.PNG........IHDR.............c.L.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].p.U..g..Bp!...\.!.`pA.+....H.U..."Z..*U.. ..P.D.-.$..,,..$.g.......CB.l......I.g.pc..Lf..~.=.~]S.....w.9..w..'...!L..A ..^.t...v..s4&&&%%..6..`..:.G.D@.7.qS...K....[..,...o...p..2.%..B.Y....|;..gy+.[..,...o...p..2.%..B.Y....|;..gy+.[..,...og...}.W..z\?...y..;_t....=..e\.....6.M|[...B._....[_.\^Pf.....f.....\l..../6....<S.4./..m.......l....B'.n...O...yc...........X...P...k....t..9tf.g>....e..Sy'.L+**.]{..a...,7...p..+......K..y.9p...I{..i58....v..5.`Op.....{.......8.._.S.........p..).........;.....y...2...b.[>gP....C..G.H...........Osp...)..9x!...W.,..^....$r.p.sOJ.l..=.x.9s&:..........h.`..W"V..|.l{..72.....zv@.#.<.........../....F|...c...4.W....:uj@1...~.X............^si....Z..I~.Q.<.....NAOq...+i`.)...$L..gV.6#.....F$..hD.g.L-\..H._.u..]4......h...T.BK\\.Z222....7))..h...1??...~.-i=...X...~h....y[.............p.....x....c...{....Uh.7n.....
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):1604
                        Entropy (8bit):7.814570704154439
                        Encrypted:false
                        SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                        MD5:3F1535054D4F9626F0EB10CEE47F076E
                        SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                        SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                        SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                        Malicious:false
                        Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 165 x 131, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):3679
                        Entropy (8bit):7.931319059366604
                        Encrypted:false
                        SSDEEP:96:tT+LtoQ9jsUBsnwlDGThUe8ww2iJiGEjdKKnnE+Gh:V+Ltt5GwlDQhUe8ww2iJi7MKnnE+K
                        MD5:995CEACAD563F849C4142B6A6F29F081
                        SHA1:44CB3B867CD2917541B7D5AAED2F14F10FEBB0FD
                        SHA-256:3691FB8C60EA1B827092F05FBB1807E34726016C6FF56698D7B81C44D519D22A
                        SHA-512:3C8EFEB966B075D06D8344483352BF92C9292F9970C9377BE254EB355EFAF017916737AECCDC704B84D532B7229F9908951A6F2CC3FAD810791CAB224401AD3D
                        Malicious:false
                        Preview:.PNG........IHDR.............c.L.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^....W...Gh...k.Hm..J.m....,X...Eh..%.n.....PHvy$%...[...R..l...(/..-..yl..Z.h..H!.../.|.y|w...7d3s.s.=.{.s.g.6W.^..)..@..{..'O.LL.......c.^.6xS&O.,...J.(|?...............,.$......@.zk....,.$.........)..7]O...mH7..0..|..&j..t..F...T...AZ7z.....$H...AZ7z.....$H...AZ7z.....$H...AZ7z.....$H....W.6.....0...FTcc.Wi....Q)...<.*.....{...#G....Y.f....KKK..,,,4.....{S.`...+O.[..+.\H...(.<..Qy*..ET.PM...c....~(.g..**...ol.K......Sc8..q.F.KM"<...:t.O.>b..$*t..].........2..y.h."!f.08hT..m.(..C.7n.......@....SVUU).F.).X\\....[j.U....$x$d..e...<.W......=;0L78t+..Gw..-....]......C7......K.w..._..g......A.&M.$^.#.!....e.\.P........;vD..@...Za.@*D..f...! .2w...4#.J..c....K}....F.u.I.b.V2.k...5..`....*........M..!.,.;.E..BZ....K..[7....5....,...........K...7+.6..o....\,`...z..5x...\46x.b......Y....s.^.x=.e.4s.W..t,.iu.G^.....(74....`.....:......]..&..j+t9..3..}..
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):1604
                        Entropy (8bit):7.814570704154439
                        Encrypted:false
                        SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                        MD5:3F1535054D4F9626F0EB10CEE47F076E
                        SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                        SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                        SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                        Malicious:false
                        Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 167 x 131, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):5386
                        Entropy (8bit):7.943706538857394
                        Encrypted:false
                        SSDEEP:96:x4F84/zVJWedudPZZRdbvczHe2ftFJ0y8Ea5b2AELJj:x4FTnodRZ7c7LrabEaMAGp
                        MD5:DB48555480A383CD1D4DD00E2BCFCF29
                        SHA1:8060B6FE12175289F0A71F45B894030A0D9F1AB5
                        SHA-256:807723D8F90A5BD41269A7A62817547026A117D666D5BEF454EB699C97CA3FA2
                        SHA-512:2614C04686299CEE8D56577A1E836A26076D42E041C627177FDB295629F6A80190910947FA794A094C55A45C3D70725EEF29097118E523A38B50C9263C771A41
                        Malicious:false
                        Preview:.PNG........IHDR.............gI......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..xTU..M..B...P........)vQpQ.ED.""......,."....*bC..VT.. M!...@z....1...Wf.w..o29...=.v.TUU..^..@....S..<..;h...5.9r....x..7N{...=........'...N...u...9..5+YW.;..N\..u...9..5.....O....,.K..'.../.....1..T....>.f..9.xo...u.xo...u.xo...u.xo...u.xo...u.xo...u.xo...u.xo........'L...g.UVVz.[.n)...Yqq...Y.f.)//_.l.W_}.,........S^Z^Y..++.*..pF.....?...I.&...O,.k.d...~..w;Q........7}1y......e_............=y._U....{..}.w.O..~.z.{........W\q.."........^.h........}p.+.>m...d...4...`a~Z^....me......:N]..1...g..y.f.......l..g.).......e[........Z..RB.KrJ.....#...{..eff..v.[[<.n..?{.....SN9%...V.yE...s2..........e@Wz..I...B.r..<.-.=/t{.v.|..J....,.@.A.v...s`/.....6f....L?.z[T7..)S0.;c....\s..z-C.....v..}Y..{..j..xF.....'.#_..C....k|3..8...N...5......f....3......f)-.p..%.D.v.v.].f.......33<<......[bbbt.]w...:.r.....z....q..=....m.uhD..,..zXg
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 46 x 49, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):1604
                        Entropy (8bit):7.814570704154439
                        Encrypted:false
                        SSDEEP:48:4gv2YZ4gWLpU9JcjREmXfFEV7NNkfKOgV60g0Z:KZgWLpSJcj+mPFGNkfngp
                        MD5:3F1535054D4F9626F0EB10CEE47F076E
                        SHA1:92EF4F27A33F7704952ECDBA4FA69C68FC32FD4B
                        SHA-256:4AB29996D02D93CAD184DD05F7A027D00425B90F5657F1E51CC4C37297A0035A
                        SHA-512:2E0EC758B2C28C8DB9F7B5EDBBE8130F049E66842F2F5CC1C013CF23F7C4443CD211BA297250471CDB4F91F1E3251C1E3F7E2151C576FD1A1AE6A36C3776C6E0
                        Malicious:false
                        Preview:.PNG........IHDR.......1.....*[......sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.iLTW... .23..,..6 ........kK.5...5..IMh..Tl......V.v.PZ.-F...".k.pCQ......#.../s>f..3s....<...=^'/.~.;.a....{>.g.....*o..6k..k....E....O....aQ.j....X&vG......{u-....$...CX.....xhZ...Q...Z.........O...I..Id.h.....q..q.........Y..J7O7.R...~o...[....;.'n...u.g..>X....o.]}...>...._..u......5...2].......EodZ.R.i....=ryxh...C!..6$!..)..W,^...Q.y...Ay[...M'o...;..hh'....}.%...."..h.5.?=.y.x..2/gK...4.2P.(#S.F.G.o...!Mk...w/._1`.5....[U7.0..Z..w^..&/...G...Y...g..;...JF.t..,.~.'.X...uYd.E...+R....:2cHG9..YC..X..Eg.).r..+%%.t..6/...@....3....|.O|.0.:.l.;........_.....E.J"..:)..#R"..q....~r..-..%.4....b..Q....al..6......{.y...I1.Xs.}..y.;...u.\......sm.C..@ 2.AG.K..5..}.k ..~........4..<..PH|.).Z.[H.G.iH.7UR.`..B.f......<.5n7.*WR.c....I1.......<y.%...-..."Y@.*...)).(...I...y.z6...J2.s...c...z.G..Kj..^R...M..k>.PA.1>.s<.G...8.r.....dL..uF.(...q.P.j@...CPSc..^
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 749 x 126, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):13084
                        Entropy (8bit):7.940058639272698
                        Encrypted:false
                        SSDEEP:384:o4KSpFN6Ud4c3p2Il1yavNr5spYVJzimlfZ:wGN6Udv4IKavLBJz/r
                        MD5:0693DABBBC411538D209F32E22F622F6
                        SHA1:FB7E675406FA123CDB7E058D336742D6A2E8DC8E
                        SHA-256:2DFB2E7A1A3AA43C673D2EE540D3C366CEB12105EB5441F98992FC06F4284013
                        SHA-512:F07732660EC62DAE58EB02E2E9476007EA92BF826F642BCA547097136AEA01D29FF69D9B0CD0F5D65A5E15AA66CA4AA4804AA171A3504AAB198631C643C90C16
                        Malicious:false
                        Preview:.PNG........IHDR.......~.............sRGB.........gAMA......a.....pHYs..........o.d..2.IDATx^.w....'m.9c.6"...&.`.N.(.TN.Ne.N.R.eKr..T.*[...?T..:I.D.S>I$A...I......y.9...f......3...Gh.....}_.o....n..A@.....A@...L...2... ..... .x...#. ..... .....1f]9.[.....A@......3 ..... ...fE@x.YWN.....A@......1...... .....Y..J.Y.N.....s"................./..rc.scuyyyu...\s....t.oi..j..lv.....Gr.#9%%%9%--....d.T...r...DH...6.....%U..A@.0.....rAD ........2.5.......L.R..=W...gZ.`o..-?.T.Cy.:...y.9..y.EE...v......1..R.....1.".... `"...ss.......i.!.hY...Fj*....%.-.Gw...HJJr8..6...#.......!(.?P.(.....8(u........*..OOO..........dgg....Q..=..c.y....A`S.@.......3.CC..GFfg. .I.I.COrJFFFNNV^nn^^.z..%..(...^.b$........a..y.LMO-.,ylV+.k...T>Jg..*//-+-......M=..x.....E.... `~..N.Kww.......z...%%.e.%.yy.i...P.)'.,A.5.d.0.Cc35==66>2::33..>..;..Ii.i.gv...DSd....l#...l..............................)**,**...V..1 .F.'7....)..SSs..7..F...C.p....(*,......(RG..B...l!.2. ....|r1
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):17289
                        Entropy (8bit):7.962998633267186
                        Encrypted:false
                        SSDEEP:384:ruwwXKZuqnOnZprU3+OXBruY4UkcY+TpI/BSqCrEoMXMEr3KbzHIDqqAmk+xob:tGcxE4PBruV3Uy5SqCAoMXzrQHoqAk+m
                        MD5:708E8EB906BC105CCA0535AE669AA651
                        SHA1:38D82DEDFE97D3001188C2E18FE13BD741FD520F
                        SHA-256:1C3D07765294566E17270D0F3B9257A3DB7905D4E7EF746AEE80CD591CE0308F
                        SHA-512:1EFC74C28190DEE2D2732390B74049A1B120F05EFB8DC6925207C6990AD20450FFAB40249899A9DBB82E8F92A61F770E120A450CAAC7F8C5F0742586CCE0EDB6
                        Malicious:false
                        Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..C.IDATx^...Uc.._"oB.Hr.m(.0......r..[1.D....R..q)%FBDiB.."w*.k.Jz.Y..l....>...9{.......g..Y.z~..k?.z.^k..+V...! ....(.....\sM.tD@...!P...HW.S....u^.....@.r.^.....B@...U.H.J....... }....".....>....! ..A@.4..EE...! }*...B@....i<8.....B@.T2 .........xp..! .....d@...!......(*B@....S....B ...O..QT........! ..@<.H......! ..O%.B@...x..9...C'|..{.>Z../~^.s<<V4..ujo..v.Z7..EwT.....@.....?.......~{...K.........C........bB@.$.....C.{....Kf'S.....T.*&....@<.....'..D`...;~v.DT]...r!..>....ru...}.....#uG.T.....>..z ...3v....P.M.....5.@<...?....F.}..c.W[.._!P...O..>.M.d<..J....E .}ZZ.+.5v.p>..N.{B....>M.Nzfb...OB@.." }.D.y...IdK<..! }.:.....f.K..bX.T9...&T.&?.VB9.[B@..@@.4..1}.4.@H..-!..}..~M.<.z..I}.G....>..S...N..@yj..n..s.d._.....(..R"....Wf\.oO.^...\h.\.`)...ni.'.].vk.1-.k.^....#.,}.{.RM...~Z.S.. .@U!.&}......h...{K..@.........W.8.N.s.Y.0)..f+...%4.......5.@j.):k.+3...I..(
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 185 x 76, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):2332
                        Entropy (8bit):7.8822150338370776
                        Encrypted:false
                        SSDEEP:48:jB5Gg4vMs30WIn5IVeRy1bY7DqbqQBAeNjukXlN4AXat:PGYuEWV/YH7e1uA0AXat
                        MD5:91CB7F1273AA003076401081B8A22237
                        SHA1:5157144069E7D2FDAE60B397BE5851E75BDF7707
                        SHA-256:80682DD6472E8D1136BC5E20F6DE87B595562414B19EAB8E965736FE992921B0
                        SHA-512:5A8E3C0ED0DB94BFE359C63793F12F3D7B3C37F3A13A5C96634BA1DC8C9E50FB1142FE4752FD9FBFA39A682F78C54AF868AD337EAA787801FE5F66D8F55A8196
                        Malicious:false
                        Preview:.PNG........IHDR.......L.............sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.\.LUe......Ji("....9....-.."..5L.Y.Y.....$350.."2.lK3Cg...T..DWZ.......i.?!<..~x..z.......w.sw......9....s...w..l6.:....p"dH...F..B<...qE,R$G\!..E..".).#...."..{f.PyI.d..l;....;.=.S...O.S[.\Y^P.aj]9*Y!. ..~..#...S.s...l..h.[m....%...P..@.kG......G..X.r|%..AO.}-..G>35..c....Ac.&[W.d..+...zG........=..l...VS.d..+...tGd..k-._.....oL.:}.p.~.W$C..|...I...n...~......,.i......e..=..?{......>r~.Lw.+2..\w.)w~...c....h..u..%...PE...f..'..m.ZE.1.\....U.`X......$...P%..UH{[K..o7~.k.49..W.t.~.^_..7.,....f."q....+....;...~;.c.......Xb.\?...........0h.lV..WX!.....ljm.1c..U...[..X.)......B=.0~..W...rO..j...ehI5U:..66V5sJ.....V...]Y>...1kQH..2.........d....S....I...+..].p.....m7...Z....s.D>.K/]..?.l....2..=..~.mq..".+.....,..8. v.o.).Z......>..Xv..i...TA....M.....>[X...Y.7lJ..e7..S.....02q.O&9.......:L....N.......W....d..FqE..T..N.....R....kXv[..j......g.K.\@`.M..B}8n
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 452 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):13737
                        Entropy (8bit):7.916899917415529
                        Encrypted:false
                        SSDEEP:384:jgxmx2Fa/+76A6M6Y7rSYRv47cwbkkapeIiRmDGd+gUwOSpQ:KgyoWrJWRkkRXmad+gE8Q
                        MD5:830632032C7DDBCCDE126F4BAE935540
                        SHA1:9FEF1DA9FF1D7762B779553B5F873BE54C8D01EF
                        SHA-256:2328D09EC845433DC31808FD6B12616F1D28B9B3BA7DD969ADEB6C32D8EB049A
                        SHA-512:5C17EF9A0063499F2C34FAB2C4D968D29E20F20868921FA914E5737995AA0C166F224995109FF7ACA57B5B0F8647715DC670C4AEE385F61B5F8E6E8422C49EA8
                        Malicious:false
                        Preview:.PNG........IHDR.............w.pl....sRGB.........gAMA......a.....pHYs..........o.d..5>IDATx^....E...,"o.....&....AY$....AE..".l....+G.>AP@D..e..".".A.Y.@...K..IXB !..!..c1.On...===3=.3=.>9O..u....w.z..-].t9]B@...!.......Z...B@...^G`.Q.&S..u$d....B.Y..P.w5[]......B.m.D...! ..@...Ls.Q"....."S....B ..D.9.(.B@.....b@...!..."..@..! ....T1 ........i. J....B@d....B@...4..%B...! 2U...! .r@@d....!......*......9 2..D...B@..L..B@..........D..! .D...! ..@...Ls.Q"....."S....B ..D.9.(.B@.....b@...!..."..@..! ....T1 ........i. J....B@d....B@...4..%B...! 2U...! .r@@d....!......*......9 2..D...B@......5jT.@.{..O.;k....>.._o.+......{V...&C..(?.m.....F....gd.....?.....3u..x^L.1n^...@../.....XE....L..!...t.....L..B.).=..sn..U........@.O..$..o..L.....g.(D...(....Lo8.....,....f;o..i.f.h.9........\./..[W.9.....+....,X..+.d.....Xc..7.p.m.Yg.u:YO.V..l.t.].Z.g.U...]...5.^..._.~.WL...o.3f..s.,Y.X.7.x5...K/-..._.......{........W.(Y....?...!....W;.....iwNMW.............@+Q.5.#.
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 213 x 85, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):1924
                        Entropy (8bit):7.836744258175623
                        Encrypted:false
                        SSDEEP:24:rloPN36BoJ9JK5lncTww67QKf5wX5YgM5s6cahePwnR6+eA9zQU13ALcVz7wTQ8U:rYN31JH6lcbjMW5Ytmyqwp9H7wY
                        MD5:B1FDE66F75507567B5F0C6C07B01A3A1
                        SHA1:80B8E6A923E853232F66C874367E90B5C9CAD7AE
                        SHA-256:B9C82D2F31BBE409D159EE3C9129CBAAC7C6F6C81637AB9B6DAB3C11AA74B7F1
                        SHA-512:FC8C6038D3C2F5765D7524E969574ACD10AF6FCCFD45FE7C6DD4A8C2669B13EE3FB1A8833E94A046AB7037018170B5B87B1A2742E0E10557C413AD634BDF343E
                        Malicious:false
                        Preview:.PNG........IHDR.......U.....Q.6.....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.].O.W....G.lT^M*..J.....".4*....j..H..R^.".m..5....&..j..B..`.`..>...X......]z.[&.>..ef..gB.d...s~.=...3....m..(E...~.[....... .. .E3..7.4.......}..H._.D.,j.)..q\.....7..#.ag.o|.?.......;C|.#.../v.H.......o~.{G......H.|..;..v...G.._...p1d2..&......QS4<..i.".X.....1(..GR.R#.}.!.E<..:LLM......s..:"......Fa...b.....\.T..~OD... ..:j.~..p=Y...Y......?.Y.A...0!6_p.dKctjvZ....\.........V..1)..:.....;7:...(.[...7.....u..'ra.....S.]..........7.#,[..<.l.....[.........90d[.2a.R.........E.CJ..C..S..*._...$^...Q..:>hx.k7.`jN:.W.X..N..p..K..."...q....a.Uy.......[d.:vmkk./cW.>.K..C..?\d...'.@s_.?&.....V .?F..;k.....%+....+.3bk......f....T....S.(2.=...?gQ...K.._,.#....?.1W.......m2.....Z...-..:..?.#J......KS.P|&[<..........Dd.....\.....W$z].k..-..8...>..Q`Yz.}w&..._......?.)_[T...:wy...O8.Om......l.....\....]..."f...........q.o.V>~s...-....N{.n....w..O|.D...
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):11886
                        Entropy (8bit):7.946442244439929
                        Encrypted:false
                        SSDEEP:192:sqNuEpzsnKxkfLaZCdMh+cLApmRausyZwYMAisQKShDBlhr34ckckcZ:JNu6DMLaZsMhtLAIa0wYMAvI5V4DDQ
                        MD5:875CFB3B5C3619253223731E8C9879E5
                        SHA1:6372F4F5BEB6EEAE3EDBE5B62EE73039B40AD01E
                        SHA-256:CC69BAE5D2C8F56B28BA4E3C6A11F57C4E8CCCE69943ACFBE7E63B4FC90EE5F2
                        SHA-512:47F45A3275B8454F8000F4567153DD7D4AF3012005D8E34CB18AED6AD69083BEC753E607F275FBF3EFCCB7BA00310A04ADFBD5FA5B73E6BBE47CE73901C35CA8
                        Malicious:false
                        Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..x.U..I...JB..;H..."..(U.EE\\..._v]W..b...Az..{G:J..B.$...H.IHB.o2xE..3gf..w..2....w..s|.....C.$@.$.....t.!........8......RR....<...6..P||....$@.$@...PO..$@.$ ...T.GZ!.. ..)c..H........H+$@.$@=e.........S1.i..H....... ...C.z*.#........1@.$@.b.PO.p... ....2.H..H@......B.$@..S.......!@=..VH..H.z.. .. .1...b8......PO..$@.$ ...T.GZ!.. ..)c..H........H+$@.$@=e.........S1.i..H....... ...C.'++kH.G.=Z!.U...73o^.IH..O|jrj.D.......I.M.........Kph.............R.x.......RU8_".......j.......B"O.z.|.9.."..L....Y.d.Rej.-Y.dhX....:.xH.z.!(>&..4.....O.<..T\.%a..e...*..UnR....+j...2.."..M.O>.z......T...].j....m...S.`..&..)....f..2..............+..SP..?.a...=.....3......K.zj.5.fP.......2:..?.....%....d.qxC..W.~.._....!.W..6....iJ)*.(..wg.}.]sw\.r]...r"...e_-....5_9.YN'...PO-.d.:.%..wZQ...H...JMJ.6c....|g*..,.3.....T...o..Nyc.W.....A.3.._...U%...PG.z.....&.%.v....AIm.....~.
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):16003
                        Entropy (8bit):7.959532793770661
                        Encrypted:false
                        SSDEEP:384:1l+zN+iNurNE/tBdEC/vkape2XHYdhOm+Bl6C4:L+zN+iNurGNEC3fpe2X8Pa+
                        MD5:3A5CD52E925A7C4A345047D8F06C3C41
                        SHA1:9C02828D83206BBD3EB58930C8C65A6CA5DBCF40
                        SHA-256:477277E8CAAAE1D3B3EAB5B3660239AEEABC433743A191727B1A71E529872AC7
                        SHA-512:8D8B6AC645ECC7C8BD374E6190819006C71AC0B5993419C42463009116214E5EC4B4235D94B4AE4CDA132E7DDA9807ADC51525824AC5F12696517FFC8890891E
                        Malicious:false
                        Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..>.IDATx^..|.....+)..H..C.K... ....x).rU..T..*E...;....*.@Z.....@...9q.g7[fgggg.............1//.."@....0..#.t..f.C..."@.....@OIR.#P...0..$...y.Pl"@....( @zJ]...." ...Si8R*D.....S..D....i...J.R!.D....R. .D..HC..T..... .D...... .D@.....p.T... ........ ... =..#.B.... =.>@........4.)."@....).."@...4.HO..H..."@.HO...."@..!@z*.GJ...."@zJ}...." ...Si8R*D.....S..D....i...J.R!.D....R. .D..HC..T..... .D...... .D@.....y.?.`.T... .f.P...$47........~E....!.D..X............].`....0..N.a...>[||...t.T.w *.. .....)'...=X?c.......+OE....<-84...=.....w.8...7.Ro&.D@!...GS.....s.......:...Gg..8..T...u...~..............<...S...../Y.......W........#. .vB...u.. .+.999YYY......wf..._.{6....=..]>Y?..;=02eb......2...;.%..\...P..R5....XMO.....6....W]...3g.5;.n{t.......F7S....r...[n.......AAX..j[.j.;.neef).2.....{ ..r..{7.-........i..S........<..pm.u.V....M.333....K..Mr.s..Ek..=t_.#.P...
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 164 x 89, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):4190
                        Entropy (8bit):7.94161730428269
                        Encrypted:false
                        SSDEEP:96:GHfueo3dRLZKOSYDzGsEgfB9nqS0WKt/z2jOrrz7yrT7N:8A6AzZfBtqS0WKNC2vyx
                        MD5:8B3AEC1986A522951942BA72B85CCAA0
                        SHA1:7E0DC78FC65EE4C804A4B0C72AA53E2DFDF26C14
                        SHA-256:8B02CEC726DECF033B67689F369FDE1002ACFD5F8C32E0F248AC575997204F2F
                        SHA-512:8EE1A1F6F0023EB4F60760C2E23EAFD56E6D298CAB49D819CF1D62C0CCF608D4211D3767856255F7CF8FF45AD835FE5475EB92C608989C522CD48D00A050B189
                        Malicious:false
                        Preview:.PNG........IHDR.......Y.....?.......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.]ip...fu.VBBZ..V'.>........CR......?r...pU\....v*...T~.U)0..('`....."..,a..Y..$t!...D...Mkvf4.VhW;S........{...zZw...i......fj..$..7......[Z*.[.[..Zk...?.t:M..,..`.^...X,..sUK[..Rg.=$..!.3<....74...iY..i...k.,.fA..Z.n...`G.%..H.l7..7J...u.R..6....E..!....N@.....M....Q`...U2.w.WP[!fX......c ./@7Mz....^...k.)....v.Q`..z..1A..P.{...||...vY.....>.`...K...m.?CX./v.8.....]..;...6..kw......N....z.Q...f..q..xk.5....;.?.Z.c...`......4....?.....VV.u~..<_......sU4e.....g.c.G....O/..r...`.G)....#d5.O..w..{....twL1l.)#&hF..K...M[@.Dl..V2..j.3..s....3M.....v..!....V..c..B...|..e.1....7.WA0.[.\.u.).$7f.+.......8..e2K/.%.Ii..`w6w.E..[?_.?.?..I.k2.s....]..f....HM.?w..d.9..Rr....Y.c.}.s.zk..rc...a..I(9~........m...Z............I........7.K:.:Bf.......m..1.......&..,...?a...c.@.@.g%...s.#...;..c6...g.lZ....}.WX.3.8.....W....N.w...L...}....?.".......;cI.............pS
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 453 x 278, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):11332
                        Entropy (8bit):7.9324721568775285
                        Encrypted:false
                        SSDEEP:192:vpXZavBpl00n1Pt7JquG9GYHDK/5cxektxMQjcie9ZZkx30eXJIb8FKRN:vpZaDyc1P1Je9G62/5clpjre9nQkeXJY
                        MD5:31579CA3352DF8FA4E3E7F48C7CDF672
                        SHA1:AA682A3C781BF8EE43B5EDC9718E64CB79135F25
                        SHA-256:B0E7824BEE2C896279457D87E61E902431BEB528D830524CC4DFAE126E89FC24
                        SHA-512:782FF9492E3ECB11C72D316DDD94D1F3E94CD908FC9452A37DA6CA30ABCFE9AB2BCCED8583A569DA68626BCEC730408AF86997E295637BF64AFF5BC768F3E309
                        Malicious:false
                        Preview:.PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d..+.IDATx^.{...u./-...&....6..+z..Q."b*. &M.d-e.*.. ....J..Z-T.Z$....R..F...%*`bn..<.....W.E ..w....^...;g..[w.5w.9g...3......t8t.P.?$@.$@.5...=.8qb.... ...5...a=...#.y. ...@B.....am. .. .......$@.$`.....G.B.$@..S... ...C.zj.#[!.. ..).......!@=..........}..H.........VH..H.z.>@.$@.v.PO.pd+$@.$@=e. .. .;...v8... ...................f.o_o{....~t...n.S.N..?..._..L;J.H ..,....7.}...|....7...b...|.........ObVa1. .?.X.....~.....t2..V>.b.}..0.F....%`GO7.n#~..F....K.~...FX..H.^....k.Z/.2v.W..M.<.;$...v.t..,UO.-]............D.....o.J..Y........5.%.l....{.....'O..dC$....=uks..;{x.,.N.=.."..Q]..w>.E.H........AV=...f.&. ..ip}._0.~[pf.`..9..v.W.,..2.E.$P........+...OcC.H..=..|..[..g%(h.....W...?...UDh..T$..?....|.]..)?[Wo.h.'..2P.1..!.......$.NO.5..}...c.;...~.x,|Q....B..6.@>..y..}...m...D~z....L#.0`_.`.s?|....I.....a...=N....c.._.2.._..6 .]...5....{.^>.lM..;n...k..9J..S.G..{.
                        Process:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        File Type:PNG image data, 340 x 79, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):4490
                        Entropy (8bit):7.928016176674318
                        Encrypted:false
                        SSDEEP:96:WXKr7Xwf6Obg+XaGOnsjbbGSb+ydWtRvEOhDE6XqPeosv02tR45boo:3rTUgXZnsHKSb+n+8DdKlwm
                        MD5:7F161B19B937AB48D4FD2F6E5E16FDBD
                        SHA1:BDCE4F1C73E87E609A7FDF245A512CA4F73B35B9
                        SHA-256:C863C5E71D1116D69561BD0637F4FE4C4240E9CED05B8A5B056073AD13E6495D
                        SHA-512:E915B76FAAC9512D2AD11CF4E4530A19BEA1C7D8508BC218C69CB041F1EEABA3E2E03B1D56E61B032A6418829752C21B8354AF1335466D7E1528A06E6742A461
                        Malicious:false
                        Preview:.PNG........IHDR...T...O.....;.......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..p.U..'...rD.WX.... Q.. ....."$.ZHP.Z...C...........R..%G8R..... .R.C6..A.b...0...^...#..g..........z2.....nB...l..X.&._.a,...a,...a,...a,...a,._.73'N..ukeee.6mZ.n.m.G.}...n...a.9s.DGG....y...8??.o.pE1....Y.,......).ca.i.M.:5$$.........Lr...ye........6...8...z.-r....d.(.xc..U..^11...._>.QX..y..2...T...sss1..."A.?_.;w..S.F>......4.G.......D.|...@.K...............C...k...P...q....6.`QQEE................7;;;.._\q.k.|...\.z..6j>..n....Y.&G*.n.S$))).....r........}.{[Dv:,..w..A...`..........a.~.N.f.s...P...*..'7n....eK....+.n;:.W..C..9}..O..D.q..X..5i.s~en.c..F&..?.....l.]3r...W`..#..7o..R.@^..*...W..?}t...{.B.8..D...UPa..~..C...|.C].a.9..R...c.Y0..9.u...d...C.......X.U....WK.....5...'..PM.`...<. ._.z.F^^.EH.K>_.0.d..S...Yj<..~.5.?l.fZ0.@d.....*..G...K.....e...b.|e..Q.4.....('z...!G.....2..XQx\......X...2.\h..X~.e....Z....=....C.1.......w.....d.z.
                        File type:data
                        Entropy (8bit):6.730747997421387
                        TrID:
                        • Microsoft OneNote note (16024/2) 100.00%
                        File name:Form - 16 Mar, 2023.one
                        File size:120428
                        MD5:fdb11bd1fb6eba5cb985a4bd5edda765
                        SHA1:ad09e5d26784b4c56232ce74725d38c1e34647ea
                        SHA256:8dbe6329f5086cd8ea55002897ca64d8a938ebb57c8a91d08f6cd927c3586f4a
                        SHA512:eaf22339f90a9a54d99693c8ee9bb5c0a996f0141f8bcb1936cd7a5d901c61a1072644427ff44a61ba46561113c924a82f9ab9ec096d1ec9be736512a122733d
                        SSDEEP:1536:RDBoTVdaeNtuXndCrJJmT4HVnteV4FrdMiYcx7bfCb6HPdnXX:1BoC+tCYvSMVnte8ZP1Y6JH
                        TLSH:F6C33BF1A8025C0AE123C976B1FB661399D051ED42283B2BF87D507DD978A20D5DD8EF
                        File Content Preview:.R\{...M..Sx.).......i.E......&.................?......I........*...*...*...*..................................................._fh.*..E.......n..w.....................h...........................8....... ....... ..}...M..t:."S.9.............TL.E..!......
                        Icon Hash:d4dce0626664606c
                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                        192.168.2.466.228.32.314970070802404330 03/17/23-16:45:57.481213TCP2404330ET CNC Feodo Tracker Reported CnC Server TCP group 16497007080192.168.2.466.228.32.31
                        192.168.2.4164.90.222.65497074432404308 03/17/23-16:46:23.322113TCP2404308ET CNC Feodo Tracker Reported CnC Server TCP group 549707443192.168.2.4164.90.222.65
                        192.168.2.4167.172.199.1654970680802404308 03/17/23-16:46:17.940894TCP2404308ET CNC Feodo Tracker Reported CnC Server TCP group 5497068080192.168.2.4167.172.199.165
                        192.168.2.4104.168.155.1434970880802404302 03/17/23-16:46:27.711698TCP2404302ET CNC Feodo Tracker Reported CnC Server TCP group 2497088080192.168.2.4104.168.155.143
                        192.168.2.4182.162.143.56497014432404312 03/17/23-16:46:04.229854TCP2404312ET CNC Feodo Tracker Reported CnC Server TCP group 749701443192.168.2.4182.162.143.56
                        192.168.2.491.121.146.474969880802404344 03/17/23-16:45:48.322318TCP2404344ET CNC Feodo Tracker Reported CnC Server TCP group 23496988080192.168.2.491.121.146.47
                        TimestampSource PortDest PortSource IPDest IP
                        Mar 17, 2023 16:44:36.915174961 CET49696443192.168.2.4203.26.41.131
                        Mar 17, 2023 16:44:36.915246964 CET44349696203.26.41.131192.168.2.4
                        Mar 17, 2023 16:44:36.915354013 CET49696443192.168.2.4203.26.41.131
                        Mar 17, 2023 16:44:36.918745041 CET49696443192.168.2.4203.26.41.131
                        Mar 17, 2023 16:44:36.918783903 CET44349696203.26.41.131192.168.2.4
                        Mar 17, 2023 16:45:08.509952068 CET49696443192.168.2.4203.26.41.131
                        Mar 17, 2023 16:45:08.620536089 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:08.620596886 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:08.620691061 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:08.621372938 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:08.621392012 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:08.765981913 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:08.766369104 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:08.775221109 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:08.775259018 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:08.775733948 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:08.860647917 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:08.990123987 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:08.990169048 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.144403934 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.144468069 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.144488096 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.144537926 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.144562960 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.144586086 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.144675016 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.144701004 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.144767046 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.144767046 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.145137072 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.145200014 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.145242929 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.145252943 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.145276070 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.145301104 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.205825090 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.205914021 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.206078053 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.206114054 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.206151962 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.206186056 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.206362009 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.206432104 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.206474066 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.206490040 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.206553936 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.206584930 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.206799030 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.206854105 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.206897020 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.206912994 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.206939936 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.206960917 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.268136978 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.268201113 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.268399954 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.268448114 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.268491030 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.268520117 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.268574953 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.268690109 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.268754005 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.268825054 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.268850088 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.268870115 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.269124985 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.269188881 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.269229889 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.269258022 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.269301891 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.269695044 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.269738913 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.269815922 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.269840956 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.269856930 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.270301104 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.270356894 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.270431042 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.270456076 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.270476103 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.315396070 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.326381922 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.326453924 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.326704979 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.326731920 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.326812983 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.329727888 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.329816103 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.329895020 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.329917908 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.330030918 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.330132008 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.330205917 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.330245018 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.330269098 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.330341101 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.330369949 CET49697443192.168.2.431.31.196.172
                        Mar 17, 2023 16:45:09.330538988 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.330601931 CET4434969731.31.196.172192.168.2.4
                        Mar 17, 2023 16:45:09.330682039 CET49697443192.168.2.431.31.196.172
                        TimestampSource PortDest PortSource IPDest IP
                        Mar 17, 2023 16:44:36.607157946 CET5968353192.168.2.48.8.8.8
                        Mar 17, 2023 16:44:36.906600952 CET53596838.8.8.8192.168.2.4
                        Mar 17, 2023 16:45:08.546230078 CET6416753192.168.2.48.8.8.8
                        Mar 17, 2023 16:45:08.616631985 CET53641678.8.8.8192.168.2.4
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Mar 17, 2023 16:44:36.607157946 CET192.168.2.48.8.8.80xf2a7Standard query (0)penshorn.orgA (IP address)IN (0x0001)false
                        Mar 17, 2023 16:45:08.546230078 CET192.168.2.48.8.8.80x46a1Standard query (0)bbvoyage.comA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Mar 17, 2023 16:44:36.906600952 CET8.8.8.8192.168.2.40xf2a7No error (0)penshorn.org203.26.41.131A (IP address)IN (0x0001)false
                        Mar 17, 2023 16:45:08.616631985 CET8.8.8.8192.168.2.40x46a1No error (0)bbvoyage.com31.31.196.172A (IP address)IN (0x0001)false
                        • bbvoyage.com
                        • 164.90.222.65

                        Click to jump to process

                        Target ID:0
                        Start time:16:44:10
                        Start date:17/03/2023
                        Path:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE
                        Wow64 process (32bit):true
                        Commandline:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE" "C:\Users\user\Desktop\Form - 16 Mar, 2023.one
                        Imagebase:0x1360000
                        File size:1676072 bytes
                        MD5 hash:8D7E99CB358318E1F38803C9E6B67867
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate

                        Target ID:1
                        Start time:16:44:35
                        Start date:17/03/2023
                        Path:C:\Windows\SysWOW64\wscript.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf"
                        Imagebase:0xad0000
                        File size:147456 bytes
                        MD5 hash:7075DD7B9BE8807FCA93ACD86F724884
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        Target ID:2
                        Start time:16:44:46
                        Start date:17/03/2023
                        Path:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE
                        Wow64 process (32bit):true
                        Commandline:/tsr
                        Imagebase:0xcb0000
                        File size:157872 bytes
                        MD5 hash:DBCFA6F25577339B877D2305CAD3DEC3
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate

                        Target ID:3
                        Start time:16:44:59
                        Start date:17/03/2023
                        Path:C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE
                        Wow64 process (32bit):true
                        Commandline:"C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE" /tsr
                        Imagebase:0xcb0000
                        File size:157872 bytes
                        MD5 hash:DBCFA6F25577339B877D2305CAD3DEC3
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:moderate

                        Target ID:6
                        Start time:16:45:09
                        Start date:17/03/2023
                        Path:C:\Windows\SysWOW64\regsvr32.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\radE00D6.tmp.dll
                        Imagebase:0xe30000
                        File size:20992 bytes
                        MD5 hash:426E7499F6A7346F0410DEAD0805586B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        Target ID:7
                        Start time:16:45:10
                        Start date:17/03/2023
                        Path:C:\Windows\System32\regsvr32.exe
                        Wow64 process (32bit):false
                        Commandline: "C:\Users\user\AppData\Local\Temp\radE00D6.tmp.dll"
                        Imagebase:0x7ff7e6980000
                        File size:24064 bytes
                        MD5 hash:D78B75FC68247E8A63ACBA846182740E
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.435040931.0000000000C30000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.435079769.0000000000C81000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:high

                        Target ID:8
                        Start time:16:45:12
                        Start date:17/03/2023
                        Path:C:\Windows\System32\regsvr32.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\DWxyui\KGQLMqgYfV.dll"
                        Imagebase:0x7ff7e6980000
                        File size:24064 bytes
                        MD5 hash:D78B75FC68247E8A63ACBA846182740E
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.617908467.0000000001220000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_3, Description: Yara detected Emotet, Source: 00000008.00000002.617622368.0000000001128000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.617991497.0000000002A51000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:high

                        No disassembly