Hunting For Non-Traditional Initial Access Vectors: Onenote Notebooks And Malicious Shortcuts