File name:

malicious.one

Full analysis: https://app.any.run/tasks/8a13d8a3-d28f-48e4-bb90-ecb2d5b72aba
Verdict: Malicious activity
Analysis date: August 05, 2025, 16:34:42
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/onenote
File info: Microsoft OneNote
MD5:

E242FE4C643508CD943C71C96677CC96

SHA1:

224B33EB97D8AEE018FAD8C79254CC256163F0D1

SHA256:

9DE9B5815F23DFBDC142408BB3DBB9D5D1B79DF8F5599B540AAA643506691EAA

SSDEEP:

768:8uiC8SOnD390Wb1/jt898OFII/L4W8Diw9Dohlm6TAO:/K0y/jt+8OFIIei6oCaAO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Detected use of alternative data streams (AltDS)

      • ONENOTE.EXE (PID: 6264)
    • Creates file in the systems drive root

      • ONENOTE.EXE (PID: 6264)
  • INFO

    • Checks supported languages

      • ONENOTEM.EXE (PID: 4580)
    • Reads the computer name

      • ONENOTEM.EXE (PID: 4580)
    • Reads Microsoft Office registry keys

      • ONENOTEM.EXE (PID: 4580)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
143
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start onenote.exe onenotem.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4580/tsrC:\Program Files\Microsoft Office\root\Office16\ONENOTEM.EXEONENOTE.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Send to OneNote Tool
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\onenotem.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\program files\common files\microsoft shared\clicktorun\c2r64.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\ole32.dll
6264"C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE" C:\Users\admin\AppData\Local\Temp\malicious.oneC:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft OneNote
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\onenote.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ole32.dll
c:\windows\system32\ucrtbase.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
7040C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
7 815
Read events
7 582
Write events
219
Delete events
14

Modification events

(PID) Process:(6264) ONENOTE.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6264) ONENOTE.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6264) ONENOTE.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(6264) ONENOTE.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(6264) ONENOTE.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\OneNote\General
Operation:writeName:DateLastAttemptedOpeningLocalNotebooksOnBoot
Value:
6258E6DB2606DC01
(PID) Process:(6264) ONENOTE.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs
Operation:writeName:LicenseSKUInfo
Value:
std::wstring|OneNoteFreeRetail
(PID) Process:(6264) ONENOTE.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\onenote.exe\ETWMonitor\{02FD33DF-F746-4A10-93A0-2BC6273BC8E4}
Operation:delete keyName:(default)
Value:
(PID) Process:(6264) ONENOTE.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\onenote.exe\ETWMonitor\{F562BB8E-422D-4B5C-B20E-90D710F7D11C}
Operation:delete keyName:(default)
Value:
(PID) Process:(6264) ONENOTE.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\onenote.exe\ETWMonitor
Operation:delete keyName:(default)
Value:
(PID) Process:(6264) ONENOTE.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\onenote.exe\ULSMonitor
Operation:delete keyName:(default)
Value:
Executable files
0
Suspicious files
7
Text files
6
Unknown types
2

Dropped files

PID
Process
Filename
Type
6264ONENOTE.EXEC:\Users\admin\AppData\Local\Microsoft\OneNote\16.0\cache\tmp\0000000B.binimage
MD5:F9ED84C97E638315A6F153F3074B3514
SHA256:7EC4314F4FF405F42284371790D3A1A3F0FC71D28937DA704613C7B5C55DF4B0
6264ONENOTE.EXEC:\Users\admin\AppData\Local\Microsoft\OneNote\16.0\cache\tmp\0000000A.binimage
MD5:9CC9D971034F83BBD6E73C7160935380
SHA256:AF7810982F00E34BEE3CDCDCF1E2DBB904D809D971F37F9452E263D8D80EB313
6264ONENOTE.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbresbinary
MD5:C4573CFD6AAFBDAF1B8DC3F93704DA40
SHA256:63EE5B1E9CF6B8C35797D0D1678065AA719AB1322A013927B32CA41396BA9699
6264ONENOTE.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\56a61aeb75d8f5be186c26607f4bb213abe7c5ec.tbresbinary
MD5:0310AE1D5048ED04B3EA4C11F86C2AD3
SHA256:699B1DC3E870D479B38A71C4C5367E4C72C6FCA104425B0C3A9CD8872AF600EC
6264ONENOTE.EXEC:\Users\admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lextext
MD5:F3B25701FE362EC84616A93A45CE9998
SHA256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
6264ONENOTE.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\5475cb191e478c39370a215b2da98a37e9dc813d.tbresbinary
MD5:2E3DECE6828FFB491589723F9AA34957
SHA256:A9646ED6C41B23B4D287174A7130941CF913A3EF3D748FB1932545030490BC35
6264ONENOTE.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QZ0G06GY60YGBMD29TYM.tempbinary
MD5:E4A1661C2C886EBB688DEC494532431C
SHA256:B76875C50EF704DBBF7F02C982445971D1BBD61AEBE2E4B28DDC58A1D66317D5
6264ONENOTE.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\F4CCC649-F6D9-4A40-80F7-427193B61EA7xml
MD5:398E74111688D8BD13C8357C9BC0E9FA
SHA256:2D005D8C561C427DFD8BA3FE7935851B72A0124AB206B974E45FD49BDD2F50F4
6264ONENOTE.EXEC:\Users\admin\AppData\Local\Microsoft\OneNote\16.0\cache\tmp\00000009.binimage
MD5:F9ED84C97E638315A6F153F3074B3514
SHA256:7EC4314F4FF405F42284371790D3A1A3F0FC71D28937DA704613C7B5C55DF4B0
6264ONENOTE.EXEC:\Users\admin\AppData\Local\Microsoft\OneNote\16.0\cache\tmp\0000000C.binimage
MD5:9CC9D971034F83BBD6E73C7160935380
SHA256:AF7810982F00E34BEE3CDCDCF1E2DBB904D809D971F37F9452E263D8D80EB313
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
27
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6356
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
23.216.77.25:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6264
ONENOTE.EXE
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
3756
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3756
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
4456
RUXIMICS.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6264
ONENOTE.EXE
52.109.76.240:443
officeclient.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6264
ONENOTE.EXE
52.123.129.14:443
ecs.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
whitelisted
6356
svchost.exe
20.190.160.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6356
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.18.110
whitelisted
officeclient.microsoft.com
  • 52.109.76.240
whitelisted
ecs.office.com
  • 52.123.129.14
  • 52.123.128.14
whitelisted
login.live.com
  • 20.190.160.2
  • 20.190.160.132
  • 40.126.32.134
  • 20.190.160.131
  • 40.126.32.140
  • 40.126.32.133
  • 20.190.160.22
  • 40.126.32.136
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.216.77.25
  • 23.216.77.36
  • 23.216.77.37
  • 23.216.77.31
  • 23.216.77.26
  • 23.216.77.35
  • 23.216.77.28
  • 23.216.77.16
  • 23.216.77.27
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
self.events.data.microsoft.com
  • 20.189.173.5
  • 20.50.201.204
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted

Threats

No threats detected
Process
Message
ONENOTE.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
ONENOTE.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
ONENOTE.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.