File name:

NoRiskClient-Windows-setup.exe

Full analysis: https://app.any.run/tasks/97aa39b0-694c-4113-a167-b059fef8895e
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 02, 2026, 10:25:10
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
auto-reg
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

9875FDFA1030EEBAC07DD1442CC0ABE1

SHA1:

B2D79C58A705000418C0B8A7FE9B96E5AF191ADA

SHA256:

85DADA86C16857F72FD029B1CFC6B3F176944AD6DE2BCDA39DC0D80DC9D16EBA

SSDEEP:

98304:HJ86RDYART2RpZq/QIVJCFr/+uofuua5eCYxGnVChJUW7IQBo+qjRk98vbARqAxO:HWZcRlxqiVdx2BwkVD4vmHsRrpo

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • MicrosoftEdgeUpdate.exe (PID: 8036)
    • Potential DLL hijacking behavior detected

      • msedgewebview2.exe (PID: 6404)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • NoRiskClient-Windows-setup.exe (PID: 7908)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • NoRiskClient-Windows-setup.exe (PID: 7908)
    • Executable content was dropped or overwritten

      • NoRiskClient-Windows-setup.exe (PID: 7908)
      • MicrosoftEdgeWebview2Setup.exe (PID: 8012)
      • MicrosoftEdgeUpdate.exe (PID: 8036)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 7808)
      • setup.exe (PID: 7816)
    • Starts a Microsoft application from unusual location

      • MicrosoftEdgeWebview2Setup.exe (PID: 8012)
      • MicrosoftEdgeUpdate.exe (PID: 8036)
    • Process drops legitimate windows executable

      • NoRiskClient-Windows-setup.exe (PID: 7908)
      • MicrosoftEdgeWebview2Setup.exe (PID: 8012)
      • MicrosoftEdgeUpdate.exe (PID: 8036)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 7808)
      • setup.exe (PID: 7816)
    • Searches for installed software

      • NoRiskClient-Windows-setup.exe (PID: 7908)
      • setup.exe (PID: 7816)
    • Starts itself from another location

      • MicrosoftEdgeUpdate.exe (PID: 8036)
    • Creates/Modifies COM task schedule object

      • MicrosoftEdgeUpdate.exe (PID: 8060)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8084)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8112)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8140)
    • Reads security settings of Internet Explorer

      • MicrosoftEdgeUpdate.exe (PID: 8036)
      • MicrosoftEdgeUpdate.exe (PID: 2688)
      • msedgewebview2.exe (PID: 8152)
      • noriskclient-launcher-v3.exe (PID: 5888)
    • There is functionality for taking screenshot (YARA)

      • NoRiskClient-Windows-setup.exe (PID: 7908)
    • Application launched itself

      • setup.exe (PID: 7816)
      • MicrosoftEdgeUpdate.exe (PID: 2688)
      • msedgewebview2.exe (PID: 8152)
  • INFO

    • Checks supported languages

      • NoRiskClient-Windows-setup.exe (PID: 7908)
      • MicrosoftEdgeWebview2Setup.exe (PID: 8012)
      • MicrosoftEdgeUpdate.exe (PID: 8060)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8084)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8140)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8112)
      • MicrosoftEdgeUpdate.exe (PID: 7400)
      • MicrosoftEdgeUpdate.exe (PID: 8036)
      • MicrosoftEdgeUpdate.exe (PID: 7520)
      • MicrosoftEdgeUpdate.exe (PID: 2688)
      • MicrosoftEdgeUpdateCore.exe (PID: 7340)
      • MicrosoftEdgeUpdate.exe (PID: 6932)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 7808)
      • setup.exe (PID: 7816)
      • setup.exe (PID: 7772)
      • MicrosoftEdgeUpdate.exe (PID: 1068)
      • noriskclient-launcher-v3.exe (PID: 5888)
      • msedgewebview2.exe (PID: 8076)
      • msedgewebview2.exe (PID: 8152)
      • msedgewebview2.exe (PID: 6404)
      • msedgewebview2.exe (PID: 7308)
      • msedgewebview2.exe (PID: 1000)
      • msedgewebview2.exe (PID: 7508)
      • msedgewebview2.exe (PID: 948)
      • identity_helper.exe (PID: 2096)
    • The sample compiled with english language support

      • NoRiskClient-Windows-setup.exe (PID: 7908)
      • MicrosoftEdgeWebview2Setup.exe (PID: 8012)
      • MicrosoftEdgeUpdate.exe (PID: 8036)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 7808)
      • setup.exe (PID: 7816)
    • Reads the computer name

      • NoRiskClient-Windows-setup.exe (PID: 7908)
      • MicrosoftEdgeUpdate.exe (PID: 8036)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8084)
      • MicrosoftEdgeUpdate.exe (PID: 8060)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8112)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8140)
      • MicrosoftEdgeUpdate.exe (PID: 7400)
      • MicrosoftEdgeUpdate.exe (PID: 7520)
      • MicrosoftEdgeUpdate.exe (PID: 2688)
      • MicrosoftEdgeUpdate.exe (PID: 6932)
      • MicrosoftEdgeUpdateCore.exe (PID: 7340)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 7808)
      • setup.exe (PID: 7816)
      • MicrosoftEdgeUpdate.exe (PID: 1068)
      • noriskclient-launcher-v3.exe (PID: 5888)
      • msedgewebview2.exe (PID: 8152)
      • msedgewebview2.exe (PID: 6404)
      • msedgewebview2.exe (PID: 7308)
      • identity_helper.exe (PID: 2096)
    • Checks proxy server information

      • NoRiskClient-Windows-setup.exe (PID: 7908)
      • MicrosoftEdgeUpdate.exe (PID: 2688)
      • MicrosoftEdgeUpdate.exe (PID: 7400)
      • slui.exe (PID: 6400)
      • MicrosoftEdgeUpdate.exe (PID: 1068)
      • msedgewebview2.exe (PID: 8152)
      • noriskclient-launcher-v3.exe (PID: 5888)
    • Create files in a temporary directory

      • NoRiskClient-Windows-setup.exe (PID: 7908)
      • MicrosoftEdgeWebview2Setup.exe (PID: 8012)
      • msedgewebview2.exe (PID: 8152)
    • Creates files or folders in the user directory

      • MicrosoftEdgeUpdate.exe (PID: 8036)
      • MicrosoftEdgeUpdate.exe (PID: 2688)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 7808)
      • setup.exe (PID: 7772)
      • setup.exe (PID: 7816)
      • NoRiskClient-Windows-setup.exe (PID: 7908)
      • noriskclient-launcher-v3.exe (PID: 5888)
      • msedgewebview2.exe (PID: 8152)
      • msedgewebview2.exe (PID: 8076)
      • msedgewebview2.exe (PID: 7308)
    • Launching a file from a Registry key

      • MicrosoftEdgeUpdate.exe (PID: 8036)
    • Reads Environment values

      • MicrosoftEdgeUpdate.exe (PID: 7400)
      • MicrosoftEdgeUpdate.exe (PID: 1068)
      • msedgewebview2.exe (PID: 8152)
      • identity_helper.exe (PID: 2096)
    • Process checks computer location settings

      • MicrosoftEdgeUpdate.exe (PID: 8036)
      • setup.exe (PID: 7816)
      • msedgewebview2.exe (PID: 8152)
      • msedgewebview2.exe (PID: 7508)
      • msedgewebview2.exe (PID: 948)
    • Manual execution by a user

      • MicrosoftEdgeUpdateCore.exe (PID: 7340)
      • noriskclient-launcher-v3.exe (PID: 5888)
    • Reads the machine GUID from the registry

      • MicrosoftEdgeUpdate.exe (PID: 2688)
      • msedgewebview2.exe (PID: 8152)
    • Creates a software uninstall entry

      • setup.exe (PID: 7816)
      • NoRiskClient-Windows-setup.exe (PID: 7908)
    • Application launched itself

      • msedge.exe (PID: 5828)
      • msedge.exe (PID: 5520)
    • Reads CPU info

      • msedgewebview2.exe (PID: 8152)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:25 21:56:47+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 141824
UninitializedDataSize: 2048
EntryPoint: 0x3640
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.6.15.0
ProductVersionNumber: 0.6.15.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: NoRisk Launcher
FileVersion: 0.6.15
LegalCopyright: -
ProductName: NoRisk Launcher
ProductVersion: 0.6.15
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
178
Monitored processes
44
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start noriskclient-windows-setup.exe microsoftedgewebview2setup.exe microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdate.exe microsoftedgeupdatecore.exe no specs microsoftedgeupdate.exe no specs updater.exe no specs updater.exe no specs slui.exe microsoftedge_x64_143.0.3650.96.exe setup.exe setup.exe no specs microsoftedgeupdate.exe noriskclient-launcher-v3.exe msedgewebview2.exe msedgewebview2.exe no specs msedgewebview2.exe no specs msedgewebview2.exe msedgewebview2.exe no specs msedgewebview2.exe no specs msedgewebview2.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
948"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\143.0.3650.96\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\admin\AppData\Local\gg.norisk.NoRiskClientLauncherV3\EBWebView" --webview-exe-name=noriskclient-launcher-v3.exe --webview-exe-version=0.0.1 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --dma-cps-flags=0 --force-high-res-timeticks=disabled --autoplay-policy=no-user-gesture-required --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--expose-gc --device-scale-factor=1 --num-raster-threads=3 --enable-main-frame-before-activation --renderer-client-id=6 --skip-read-main-dll --metrics-shmem-handle=4300,i,14797320103795376555,3256123948568603764,2097152 --field-trial-handle=1888,i,7042800150580890192,1340137808403837732,262144 --enable-features=RemoveRedirectionBitmap --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --trace-process-track-uuid=3190708991934122588 --mojo-platform-channel-handle=3968 /prefetch:1C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\143.0.3650.96\msedgewebview2.exemsedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge WebView2
Exit code:
0
Version:
143.0.3650.96
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\143.0.3650.96\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\143.0.3650.96\msedge_elf.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\shcore.dll
1000"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\143.0.3650.96\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\admin\AppData\Local\gg.norisk.NoRiskClientLauncherV3\EBWebView" --webview-exe-name=noriskclient-launcher-v3.exe --webview-exe-version=0.0.1 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --force-high-res-timeticks=disabled --startup-read-main-dll --metrics-shmem-handle=2444,i,6036991032680478910,12375211336339947625,524288 --field-trial-handle=1888,i,7042800150580890192,1340137808403837732,262144 --enable-features=RemoveRedirectionBitmap --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --trace-process-track-uuid=3190708990060038890 --mojo-platform-channel-handle=2464 /prefetch:8C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\143.0.3650.96\msedgewebview2.exemsedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge WebView2
Version:
143.0.3650.96
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\143.0.3650.96\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\143.0.3650.96\msedge_elf.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\shcore.dll
1068"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMDQ5OTA2NzQyMyIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjEwNDk5MDY3NDIzIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTE0MTc2NTg4NjciIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiIGRvd25sb2FkZXI9ImJpdHMiIHVybD0iaHR0cDovL21zZWRnZS5mLnRsdS5kbC5kZWxpdmVyeS5tcC5taWNyb3NvZnQuY29tL2ZpbGVzdHJlYW1pbmdzZXJ2aWNlL2ZpbGVzL2I3YzVhMjNmLTZmYTYtNDM2My1iYWQ1LTVjY2EyMTgyODhjNT9QMT0xNzY3OTU0MzMyJmFtcDtQMj00MDQmYW1wO1AzPTImYW1wO1A0PVpJeThUa2N0bHh6eWUlMmIzZ0pObzNrU05OeEJnZGVneFZWdUxXbllsVVBDaHdOb0dBSFpsZVQ5Q1RzY2cyRG8lMmIxV0lRQ2wwQjN1Zlh3WTNuM3lXbU42QSUzZCUzZCIgc2VydmVyX2lwX2hpbnQ9IiIgY2RuX2NpZD0iLTEiIGNkbl9jY2M9IiIgY2RuX21zZWRnZV9yZWY9IiIgY2RuX2F6dXJlX3JlZl9vcmlnaW5fc2hpZWxkPSIiIGNkbl9jYWNoZT0iIiBjZG5fcDNwPSIiIGRvd25sb2FkZWQ9IjE4NzAwNDUxMiIgdG90YWw9IjE4NzAwNDUxMiIgZG93bmxvYWRfdGltZV9tcz0iODkzMjgiLz48ZXZlbnQgZXZlbnR0eXBlPSIxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMTQxNzgxNTEyNyIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjYiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjExNDM1MzE1MjAwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzU3IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMTc2OTg0NTk3NCIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgdXBkYXRlX2NoZWNrX3RpbWVfbXM9IjEwNjMiIGRvd25sb2FkX3RpbWVfbXM9IjkxODc1IiBkb3dubG9hZGVkPSIxODcwMDQ1MTIiIHRvdGFsPSIxODcwMDQ1MTIiIHBhY2thZ2VfY2FjaGVfcmVzdWx0PSIwIiBpbnN0YWxsX3RpbWVfbXM9IjMzNDUzIi8-PC9hcHA-PC9yZXF1ZXN0PgC:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
MicrosoftEdgeUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.215.9
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\microsoftedgeupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ole32.dll
2096"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.92\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=6116,i,2202970345627937748,14291018090109064818,262144 --variations-seed-version --mojo-platform-channel-handle=5864 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.92\identity_helper.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
PWA Identity Proxy Host
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\identity_helper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
2568"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.92\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=6116,i,2202970345627937748,14291018090109064818,262144 --variations-seed-version --mojo-platform-channel-handle=5864 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.92\identity_helper.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
PWA Identity Proxy Host
Exit code:
3221226029
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\identity_helper.exe
c:\windows\system32\ntdll.dll
2688"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" -EmbeddingC:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.215.9
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\microsoftedgeupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ole32.dll
2712"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=2228,i,2202970345627937748,14291018090109064818,262144 --variations-seed-version --mojo-platform-channel-handle=2500 /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2996"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2092,i,2202970345627937748,14291018090109064818,262144 --variations-seed-version --mojo-platform-channel-handle=2224 /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3056"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=6748,i,2202970345627937748,14291018090109064818,262144 --variations-seed-version --mojo-platform-channel-handle=6644 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3188"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=5420,i,2202970345627937748,14291018090109064818,262144 --variations-seed-version --mojo-platform-channel-handle=5388 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
18 048
Read events
14 255
Write events
3 726
Delete events
67

Modification events

(PID) Process:(8036) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:delete valueName:eulaaccepted
Value:
(PID) Process:(8036) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:path
Value:
C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
(PID) Process:(8036) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:CopilotUpdatePath
Value:
C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\CopilotUpdate.exe
(PID) Process:(8036) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:UninstallCmdLine
Value:
"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /uninstall
(PID) Process:(8036) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
Operation:writeName:pv
Value:
1.3.215.9
(PID) Process:(8036) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
Operation:writeName:name
Value:
Microsoft Edge Update
(PID) Process:(8036) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
Operation:writeName:pv
Value:
1.3.215.9
(PID) Process:(8036) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Microsoft Edge Update
Value:
"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\1.3.215.9\MicrosoftEdgeUpdateCore.exe"
(PID) Process:(8036) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:edgeupdate_task_name_c
Value:
MicrosoftEdgeUpdateTaskUserS-1-5-21-1693682860-607145093-2874071422-1001Core{C88CEE91-54B8-4ED3-AD90-0D66179229EF}
(PID) Process:(8060) MicrosoftEdgeUpdate.exeKey:HKEY_CLASSES_ROOT\WOW6432Node\CLSID\{81093D63-7825-417B-BFC8-ADC63FA4E53D}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Both
Executable files
213
Suspicious files
106
Text files
311
Unknown types
0

Dropped files

PID
Process
Filename
Type
7908NoRiskClient-Windows-setup.exeC:\Users\admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exeexecutable
MD5:B768BDD72BFD424DF5F3E810EFD5BE0F
SHA256:6A2F2492EA642E3965CE2421E257DA53FF18C5DEE08DF33C84C061AE47A8A302
7908NoRiskClient-Windows-setup.exeC:\Users\admin\AppData\Local\Temp\nsdE623.tmp\System.dllexecutable
MD5:CFF85C549D536F651D4FB8387F1976F2
SHA256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
8012MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF999.tmp\MicrosoftEdgeUpdate.exeexecutable
MD5:B299AA9A27C330A9B44E45BD1595DBEA
SHA256:955B5950FD92E5C5EEC395B022566C9A2594CA3126D894408E2E29BA25D8B0DD
7908NoRiskClient-Windows-setup.exeC:\Users\admin\AppData\Local\Temp\nsdE623.tmp\nsDialogs.dllexecutable
MD5:6C3F8C94D0727894D706940A8A980543
SHA256:56B96ADD1978B1ABBA286F7F8982B0EFBE007D4A48B3DED6A4D408E01D753FE2
8012MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF999.tmp\psmachine.dllexecutable
MD5:B18DEEE0C7653F4C3D5005D8A43C706A
SHA256:E79682C2CE8257AEB5472E0BC0D78001210107F62EECDF61114628BBB075D875
7908NoRiskClient-Windows-setup.exeC:\Users\admin\AppData\Local\Temp\nsdE623.tmp\modern-wizard.bmpimage
MD5:CBE40FD2B1EC96DAEDC65DA172D90022
SHA256:3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2
8012MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF999.tmp\psmachine_64.dllexecutable
MD5:C9B875147D2B28F1F505989BA0D0395C
SHA256:20F738D5E0821FB7075990071A5D486A0A6FFA5DF12A4D61FC0FF6A0C9B9A764
8012MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF999.tmp\NOTICE.TXTtext
MD5:6DD5BF0743F2366A0BDD37E302783BCD
SHA256:91D3FC490565DED7621FF5198960E501B6DB857D5DD45AF2FE7C3ECD141145F5
8012MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF999.tmp\psuser_arm64.dllexecutable
MD5:28C265CF11D6AA96ED9C601844FA10A5
SHA256:8DE772429B829DF895FDA18866F4EFF213FE5D620B7B2914A26BEED77FB3A20F
8012MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF999.tmp\psmachine_arm64.dllexecutable
MD5:B24065F689072FFA65EC476615E7C13E
SHA256:F53CAB4454F710E7D3B8B7C1B4A2AE3A37E05FAF73407A362D5B07A6B75EDFB1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
85
TCP/UDP connections
103
DNS requests
58
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3412
svchost.exe
PUT
172.211.123.250:443
172.211.123.250:443
unknown
unknown
PUT
192.168.100.4:49742
192.168.100.4:49742
unknown
unknown
6768
MoUsoCoreWorker.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6244
svchost.exe
GET
200
20.73.194.208:443
https://settings-win.data.microsoft.com/settings/v3.0/WSD/UpdateHealthTools?os=Windows&osVer=10.0.19041.1.amd64fre.vb_release.191206-&sku=48&deviceClass=Windows.Desktop&locale=en-US&deviceId=s:BAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&sampleId=s:95271487&appVer=10.0.19041.3626&FlightRing=Retail&TelemetryLevel=1&HidOverGattReg=C%3A%5CWINDOWS%5CSystem32%5CDriverStore%5CFileRepository%5Chidbthle.inf_amd64_9610b4821fdf82a5%5CMicrosoft.Bluetooth.Profiles.HidOverGatt.dll&AppVer=&ProcessorIdentifier=AMD64%20Family%2023%20Model%201%20Stepping%202&OEMModel=DELL&UpdateOfferedDays=4294967295&ProcessorManufacturer=AuthenticAMD&InstallDate=1661339444&OEMModelBaseBoard=&BranchReadinessLevel=CB&OEMSubModel=J5CR&IsCloudDomainJoined=0&DeferFeatureUpdatePeriodInDays=30&IsDeviceRetailDemo=0&FlightingBranchName=&OSUILocale=en-US&DeviceFamily=Windows.Desktop&WuClientVer=10.0.19041.3996&UninstallActive=1&IsFlightingEnabled=0&OSSkuId=48&ProcessorClockSpeed=3094&TotalPhysicalRAM=6144&SecureBootCapable=0&App=SedimentPack&ProcessorCores=6&CurrentBranch=vb_release&InstallLanguage=en-US&DeferQualityUpdatePeriodInDays=0&OEMName_Uncleaned=DELL&TPMVersion=0&PrimaryDiskTotalCapacity=262144&InstallationType=Client&AttrDataVer=186&ProcessorModel=AMD%20Ryzen%205%203500%206-Core%20Processor&IsEdgeWithChromiumInstalled=1&OSVersion=10.0.19045.4046&IsMDMEnrolled=0&ActivationChannel=Retail&FirmwareVersion=A.40&TrendInstalledKey=1&OSArchitecture=AMD64&DefaultUserRegion=244&UpdateManagementGroup=2
unknown
text
1.43 Kb
whitelisted
2688
MicrosoftEdgeUpdate.exe
POST
200
20.165.94.46:443
https://msedge.api.cdp.microsoft.com/api/v2/contents/Browser/namespaces/Default/names?action=batchupdates
unknown
text
103 b
whitelisted
4576
svchost.exe
HEAD
200
199.232.214.172:80
http://msedge.f.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/b7c5a23f-6fa6-4363-bad5-5cca218288c5?P1=1767954332&P2=404&P3=2&P4=ZIy8Tkctlxzye%2b3gJNo3kSNNxBgdegxVVuLWnYlUPChwNoGAHZleT9CTscg2Do%2b1WIQCl0B3ufXwY3n3yWmN6A%3d%3d
unknown
whitelisted
6508
SIHClient.exe
GET
200
52.165.164.15:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
unknown
whitelisted
6508
SIHClient.exe
GET
200
74.179.77.204:443
https://slscr.update.microsoft.com/sls/ping
unknown
whitelisted
6508
SIHClient.exe
GET
304
74.179.77.204:443
https://slscr.update.microsoft.com/SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
23.216.77.28:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
6768
MoUsoCoreWorker.exe
23.216.77.28:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
6244
svchost.exe
23.216.77.28:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
6768
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
6244
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
google.com
  • 142.250.184.206
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
  • 2.16.164.49
  • 2.16.164.120
whitelisted
www.microsoft.com
  • 88.221.169.152
  • 23.59.18.102
whitelisted
login.live.com
  • 40.126.31.3
  • 40.126.31.2
  • 20.190.159.128
  • 20.190.159.71
  • 20.190.159.64
  • 20.190.159.68
  • 20.190.159.75
  • 40.126.31.0
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
go.microsoft.com
  • 88.221.169.205
whitelisted
msedge.sf.dl.delivery.mp.microsoft.com
  • 23.213.161.11
  • 23.213.161.28
whitelisted
config.edge.skype.com
  • 150.171.22.17
whitelisted

Threats

PID
Process
Class
Message
7908
NoRiskClient-Windows-setup.exe
Misc activity
ET INFO Packed Executable Download
4576
svchost.exe
Misc activity
ET INFO Packed Executable Download
Potential Corporate Privacy Violation
ET INFO User-Agent (Launcher)
Potential Corporate Privacy Violation
ET INFO User-Agent (Launcher)
Potential Corporate Privacy Violation
ET INFO User-Agent (Launcher)
Potential Corporate Privacy Violation
ET INFO User-Agent (Launcher)
Process
Message
msedgewebview2.exe
RecursiveDirectoryCreate( C:\Users\admin\AppData\Local\gg.norisk.NoRiskClientLauncherV3 directory exists )