File name:

NoRiskClient-Windows-setup.exe

Full analysis: https://app.any.run/tasks/97aa39b0-694c-4113-a167-b059fef8895e
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 02, 2026, 10:25:10
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
auto-reg
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

9875FDFA1030EEBAC07DD1442CC0ABE1

SHA1:

B2D79C58A705000418C0B8A7FE9B96E5AF191ADA

SHA256:

85DADA86C16857F72FD029B1CFC6B3F176944AD6DE2BCDA39DC0D80DC9D16EBA

SSDEEP:

98304:HJ86RDYART2RpZq/QIVJCFr/+uofuua5eCYxGnVChJUW7IQBo+qjRk98vbARqAxO:HWZcRlxqiVdx2BwkVD4vmHsRrpo

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • MicrosoftEdgeUpdate.exe (PID: 8036)
    • Potential DLL hijacking behavior detected

      • msedgewebview2.exe (PID: 6404)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • NoRiskClient-Windows-setup.exe (PID: 7908)
    • Searches for installed software

      • NoRiskClient-Windows-setup.exe (PID: 7908)
      • setup.exe (PID: 7816)
    • Executable content was dropped or overwritten

      • NoRiskClient-Windows-setup.exe (PID: 7908)
      • MicrosoftEdgeWebview2Setup.exe (PID: 8012)
      • MicrosoftEdgeUpdate.exe (PID: 8036)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 7808)
      • setup.exe (PID: 7816)
    • Process drops legitimate windows executable

      • NoRiskClient-Windows-setup.exe (PID: 7908)
      • MicrosoftEdgeWebview2Setup.exe (PID: 8012)
      • MicrosoftEdgeUpdate.exe (PID: 8036)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 7808)
      • setup.exe (PID: 7816)
    • Starts a Microsoft application from unusual location

      • MicrosoftEdgeWebview2Setup.exe (PID: 8012)
      • MicrosoftEdgeUpdate.exe (PID: 8036)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • NoRiskClient-Windows-setup.exe (PID: 7908)
    • Starts itself from another location

      • MicrosoftEdgeUpdate.exe (PID: 8036)
    • Creates/Modifies COM task schedule object

      • MicrosoftEdgeUpdate.exe (PID: 8060)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8140)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8084)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8112)
    • Reads security settings of Internet Explorer

      • MicrosoftEdgeUpdate.exe (PID: 8036)
      • MicrosoftEdgeUpdate.exe (PID: 2688)
      • msedgewebview2.exe (PID: 8152)
      • noriskclient-launcher-v3.exe (PID: 5888)
    • There is functionality for taking screenshot (YARA)

      • NoRiskClient-Windows-setup.exe (PID: 7908)
    • Application launched itself

      • setup.exe (PID: 7816)
      • MicrosoftEdgeUpdate.exe (PID: 2688)
      • msedgewebview2.exe (PID: 8152)
  • INFO

    • The sample compiled with english language support

      • NoRiskClient-Windows-setup.exe (PID: 7908)
      • MicrosoftEdgeWebview2Setup.exe (PID: 8012)
      • MicrosoftEdgeUpdate.exe (PID: 8036)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 7808)
      • setup.exe (PID: 7816)
    • Checks supported languages

      • NoRiskClient-Windows-setup.exe (PID: 7908)
      • MicrosoftEdgeWebview2Setup.exe (PID: 8012)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8140)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8084)
      • MicrosoftEdgeUpdate.exe (PID: 8060)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8112)
      • MicrosoftEdgeUpdate.exe (PID: 7400)
      • MicrosoftEdgeUpdate.exe (PID: 2688)
      • MicrosoftEdgeUpdate.exe (PID: 8036)
      • MicrosoftEdgeUpdateCore.exe (PID: 7340)
      • MicrosoftEdgeUpdate.exe (PID: 6932)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 7808)
      • setup.exe (PID: 7816)
      • setup.exe (PID: 7772)
      • MicrosoftEdgeUpdate.exe (PID: 1068)
      • noriskclient-launcher-v3.exe (PID: 5888)
      • msedgewebview2.exe (PID: 8152)
      • msedgewebview2.exe (PID: 8076)
      • msedgewebview2.exe (PID: 6404)
      • msedgewebview2.exe (PID: 7308)
      • MicrosoftEdgeUpdate.exe (PID: 7520)
      • msedgewebview2.exe (PID: 1000)
      • identity_helper.exe (PID: 2096)
      • msedgewebview2.exe (PID: 7508)
      • msedgewebview2.exe (PID: 948)
    • Reads the computer name

      • NoRiskClient-Windows-setup.exe (PID: 7908)
      • MicrosoftEdgeUpdate.exe (PID: 8036)
      • MicrosoftEdgeUpdate.exe (PID: 8060)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8084)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8112)
      • MicrosoftEdgeUpdate.exe (PID: 7400)
      • MicrosoftEdgeUpdateComRegisterShell64.exe (PID: 8140)
      • MicrosoftEdgeUpdate.exe (PID: 2688)
      • MicrosoftEdgeUpdate.exe (PID: 6932)
      • MicrosoftEdgeUpdateCore.exe (PID: 7340)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 7808)
      • setup.exe (PID: 7816)
      • MicrosoftEdgeUpdate.exe (PID: 1068)
      • noriskclient-launcher-v3.exe (PID: 5888)
      • msedgewebview2.exe (PID: 8152)
      • msedgewebview2.exe (PID: 6404)
      • msedgewebview2.exe (PID: 7308)
      • identity_helper.exe (PID: 2096)
      • MicrosoftEdgeUpdate.exe (PID: 7520)
    • Create files in a temporary directory

      • NoRiskClient-Windows-setup.exe (PID: 7908)
      • MicrosoftEdgeWebview2Setup.exe (PID: 8012)
      • msedgewebview2.exe (PID: 8152)
    • Checks proxy server information

      • NoRiskClient-Windows-setup.exe (PID: 7908)
      • MicrosoftEdgeUpdate.exe (PID: 2688)
      • slui.exe (PID: 6400)
      • MicrosoftEdgeUpdate.exe (PID: 1068)
      • MicrosoftEdgeUpdate.exe (PID: 7400)
      • msedgewebview2.exe (PID: 8152)
      • noriskclient-launcher-v3.exe (PID: 5888)
    • Creates files or folders in the user directory

      • MicrosoftEdgeUpdate.exe (PID: 8036)
      • MicrosoftEdgeUpdate.exe (PID: 2688)
      • MicrosoftEdge_X64_143.0.3650.96.exe (PID: 7808)
      • setup.exe (PID: 7816)
      • setup.exe (PID: 7772)
      • NoRiskClient-Windows-setup.exe (PID: 7908)
      • noriskclient-launcher-v3.exe (PID: 5888)
      • msedgewebview2.exe (PID: 8152)
      • msedgewebview2.exe (PID: 8076)
      • msedgewebview2.exe (PID: 7308)
    • Launching a file from a Registry key

      • MicrosoftEdgeUpdate.exe (PID: 8036)
    • Reads Environment values

      • MicrosoftEdgeUpdate.exe (PID: 7400)
      • MicrosoftEdgeUpdate.exe (PID: 1068)
      • msedgewebview2.exe (PID: 8152)
      • identity_helper.exe (PID: 2096)
    • Process checks computer location settings

      • MicrosoftEdgeUpdate.exe (PID: 8036)
      • setup.exe (PID: 7816)
      • msedgewebview2.exe (PID: 8152)
      • msedgewebview2.exe (PID: 7508)
      • msedgewebview2.exe (PID: 948)
    • Manual execution by a user

      • MicrosoftEdgeUpdateCore.exe (PID: 7340)
      • noriskclient-launcher-v3.exe (PID: 5888)
    • Reads the machine GUID from the registry

      • MicrosoftEdgeUpdate.exe (PID: 2688)
      • msedgewebview2.exe (PID: 8152)
    • Creates a software uninstall entry

      • setup.exe (PID: 7816)
      • NoRiskClient-Windows-setup.exe (PID: 7908)
    • Reads CPU info

      • msedgewebview2.exe (PID: 8152)
    • Application launched itself

      • msedge.exe (PID: 5828)
      • msedge.exe (PID: 5520)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:25 21:56:47+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 141824
UninitializedDataSize: 2048
EntryPoint: 0x3640
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.6.15.0
ProductVersionNumber: 0.6.15.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: NoRisk Launcher
FileVersion: 0.6.15
LegalCopyright: -
ProductName: NoRisk Launcher
ProductVersion: 0.6.15
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
178
Monitored processes
44
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start noriskclient-windows-setup.exe microsoftedgewebview2setup.exe microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdate.exe microsoftedgeupdatecore.exe no specs microsoftedgeupdate.exe no specs updater.exe no specs updater.exe no specs slui.exe microsoftedge_x64_143.0.3650.96.exe setup.exe setup.exe no specs microsoftedgeupdate.exe noriskclient-launcher-v3.exe msedgewebview2.exe msedgewebview2.exe no specs msedgewebview2.exe no specs msedgewebview2.exe msedgewebview2.exe no specs msedgewebview2.exe no specs msedgewebview2.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
948"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\143.0.3650.96\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\admin\AppData\Local\gg.norisk.NoRiskClientLauncherV3\EBWebView" --webview-exe-name=noriskclient-launcher-v3.exe --webview-exe-version=0.0.1 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --dma-cps-flags=0 --force-high-res-timeticks=disabled --autoplay-policy=no-user-gesture-required --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--expose-gc --device-scale-factor=1 --num-raster-threads=3 --enable-main-frame-before-activation --renderer-client-id=6 --skip-read-main-dll --metrics-shmem-handle=4300,i,14797320103795376555,3256123948568603764,2097152 --field-trial-handle=1888,i,7042800150580890192,1340137808403837732,262144 --enable-features=RemoveRedirectionBitmap --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --trace-process-track-uuid=3190708991934122588 --mojo-platform-channel-handle=3968 /prefetch:1C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\143.0.3650.96\msedgewebview2.exemsedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge WebView2
Exit code:
0
Version:
143.0.3650.96
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\143.0.3650.96\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\143.0.3650.96\msedge_elf.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\shcore.dll
1000"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\143.0.3650.96\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\admin\AppData\Local\gg.norisk.NoRiskClientLauncherV3\EBWebView" --webview-exe-name=noriskclient-launcher-v3.exe --webview-exe-version=0.0.1 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --force-high-res-timeticks=disabled --startup-read-main-dll --metrics-shmem-handle=2444,i,6036991032680478910,12375211336339947625,524288 --field-trial-handle=1888,i,7042800150580890192,1340137808403837732,262144 --enable-features=RemoveRedirectionBitmap --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --trace-process-track-uuid=3190708990060038890 --mojo-platform-channel-handle=2464 /prefetch:8C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\143.0.3650.96\msedgewebview2.exemsedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge WebView2
Version:
143.0.3650.96
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\143.0.3650.96\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\143.0.3650.96\msedge_elf.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\shcore.dll
1068"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMDQ5OTA2NzQyMyIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjEwNDk5MDY3NDIzIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzU3IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMTc2OTg0NTk3NCIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgdXBkYXRlX2NoZWNrX3RpbWVfbXM9IjEwNjMiIGRvd25sb2FkX3RpbWVfbXM9IjkxODc1IiBkb3dubG9hZGVkPSIxODcwMDQ1MTIiIHRvdGFsPSIxODcwMDQ1MTIiIHBhY2thZ2VfY2FjaGVfcmVzdWx0PSIwIiBpbnN0YWxsX3RpbWVfbXM9IjMzNDUzIi8-PC9hcHA-PC9yZXF1ZXN0PgC:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
MicrosoftEdgeUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.215.9
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\microsoftedgeupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ole32.dll
2096"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.92\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=6116,i,2202970345627937748,14291018090109064818,262144 --variations-seed-version --mojo-platform-channel-handle=5864 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.92\identity_helper.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
PWA Identity Proxy Host
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\identity_helper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
2568"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.92\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=6116,i,2202970345627937748,14291018090109064818,262144 --variations-seed-version --mojo-platform-channel-handle=5864 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.92\identity_helper.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
PWA Identity Proxy Host
Exit code:
3221226029
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\identity_helper.exe
c:\windows\system32\ntdll.dll
2688"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" -EmbeddingC:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.215.9
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\microsoftedgeupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ole32.dll
2712"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=2228,i,2202970345627937748,14291018090109064818,262144 --variations-seed-version --mojo-platform-channel-handle=2500 /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2996"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2092,i,2202970345627937748,14291018090109064818,262144 --variations-seed-version --mojo-platform-channel-handle=2224 /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3056"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=6748,i,2202970345627937748,14291018090109064818,262144 --variations-seed-version --mojo-platform-channel-handle=6644 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3188"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=5420,i,2202970345627937748,14291018090109064818,262144 --variations-seed-version --mojo-platform-channel-handle=5388 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
18 048
Read events
14 255
Write events
3 726
Delete events
67

Modification events

(PID) Process:(8036) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:delete valueName:eulaaccepted
Value:
(PID) Process:(8036) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:path
Value:
C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
(PID) Process:(8036) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:CopilotUpdatePath
Value:
C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\CopilotUpdate.exe
(PID) Process:(8036) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:UninstallCmdLine
Value:
"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /uninstall
(PID) Process:(8036) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
Operation:writeName:pv
Value:
1.3.215.9
(PID) Process:(8036) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
Operation:writeName:name
Value:
Microsoft Edge Update
(PID) Process:(8036) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
Operation:writeName:pv
Value:
1.3.215.9
(PID) Process:(8036) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Microsoft Edge Update
Value:
"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\1.3.215.9\MicrosoftEdgeUpdateCore.exe"
(PID) Process:(8036) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:edgeupdate_task_name_c
Value:
MicrosoftEdgeUpdateTaskUserS-1-5-21-1693682860-607145093-2874071422-1001Core{C88CEE91-54B8-4ED3-AD90-0D66179229EF}
(PID) Process:(8060) MicrosoftEdgeUpdate.exeKey:HKEY_CLASSES_ROOT\WOW6432Node\CLSID\{81093D63-7825-417B-BFC8-ADC63FA4E53D}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Both
Executable files
213
Suspicious files
106
Text files
311
Unknown types
0

Dropped files

PID
Process
Filename
Type
8012MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF999.tmp\MicrosoftEdgeUpdateComRegisterShell64.exeexecutable
MD5:52CA138709812DA4E9A02DC32C7FD6C9
SHA256:1EBCF13BB699961F59C33FAFD5088F70F1935AFC417469B3F3348E67C90FE8C6
8012MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF999.tmp\psmachine.dllexecutable
MD5:B18DEEE0C7653F4C3D5005D8A43C706A
SHA256:E79682C2CE8257AEB5472E0BC0D78001210107F62EECDF61114628BBB075D875
8012MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF999.tmp\psuser_64.dllexecutable
MD5:83F73382CB688378814AAA4376B8D2D5
SHA256:E456FA17DA8C539DD448457EF7A6D8D7C3E86E8F37C36A7E71D9ECC77090F9A6
8012MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF999.tmp\MicrosoftEdgeUpdateBroker.exeexecutable
MD5:CCCD43E0947E3FD0F84346A1E2AE0F7D
SHA256:F4E2834C39B120D511B7536DCB491947403BC024EDF4D787C2E599EB035EBD10
8012MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF999.tmp\psmachine_64.dllexecutable
MD5:C9B875147D2B28F1F505989BA0D0395C
SHA256:20F738D5E0821FB7075990071A5D486A0A6FFA5DF12A4D61FC0FF6A0C9B9A764
8012MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF999.tmp\msedgeupdate.dllexecutable
MD5:4FB7A9D21D9172EBE74213734F6A0CB9
SHA256:F3B294746B21AE8F8E114DCE1A8709F6F43290663A397F9B045A2CB22703A9E0
8012MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF999.tmp\psuser.dllexecutable
MD5:ED2697123275105298696BB829897CD7
SHA256:A8FD615A347A9B891B96004E0EC5BDD20D60B3AA77A381B3234D404289CDA331
8012MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF999.tmp\NOTICE.TXTtext
MD5:6DD5BF0743F2366A0BDD37E302783BCD
SHA256:91D3FC490565DED7621FF5198960E501B6DB857D5DD45AF2FE7C3ECD141145F5
8012MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF999.tmp\psmachine_arm64.dllexecutable
MD5:B24065F689072FFA65EC476615E7C13E
SHA256:F53CAB4454F710E7D3B8B7C1B4A2AE3A37E05FAF73407A362D5B07A6B75EDFB1
8012MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF999.tmp\MicrosoftEdgeComRegisterShellARM64.exeexecutable
MD5:662841061053E99FDCBABC228D8ADA40
SHA256:49882FC5F3AA87F2D70B1A95D888EFD40880DC81E4BAAA1B40A3523BCBA68D3F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
85
TCP/UDP connections
103
DNS requests
58
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3412
svchost.exe
PUT
172.211.123.250:443
172.211.123.250:443
unknown
unknown
PUT
192.168.100.4:49742
192.168.100.4:49742
unknown
unknown
6768
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6244
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2760
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7908
NoRiskClient-Windows-setup.exe
GET
301
88.221.169.205:80
http://go.microsoft.com/fwlink/p/?LinkId=2124703
unknown
whitelisted
6508
SIHClient.exe
GET
200
52.165.164.15:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
unknown
whitelisted
6508
SIHClient.exe
GET
200
74.179.77.204:443
https://slscr.update.microsoft.com/sls/ping
unknown
whitelisted
6508
SIHClient.exe
GET
304
74.179.77.204:443
https://slscr.update.microsoft.com/SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
23.216.77.28:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
6768
MoUsoCoreWorker.exe
23.216.77.28:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
6244
svchost.exe
23.216.77.28:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
6768
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
6244
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
google.com
  • 142.250.184.206
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
  • 2.16.164.49
  • 2.16.164.120
whitelisted
www.microsoft.com
  • 88.221.169.152
  • 23.59.18.102
whitelisted
login.live.com
  • 40.126.31.3
  • 40.126.31.2
  • 20.190.159.128
  • 20.190.159.71
  • 20.190.159.64
  • 20.190.159.68
  • 20.190.159.75
  • 40.126.31.0
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
go.microsoft.com
  • 88.221.169.205
whitelisted
msedge.sf.dl.delivery.mp.microsoft.com
  • 23.213.161.11
  • 23.213.161.28
whitelisted
config.edge.skype.com
  • 150.171.22.17
whitelisted

Threats

PID
Process
Class
Message
7908
NoRiskClient-Windows-setup.exe
Misc activity
ET INFO Packed Executable Download
4576
svchost.exe
Misc activity
ET INFO Packed Executable Download
Potential Corporate Privacy Violation
ET INFO User-Agent (Launcher)
Potential Corporate Privacy Violation
ET INFO User-Agent (Launcher)
Potential Corporate Privacy Violation
ET INFO User-Agent (Launcher)
Potential Corporate Privacy Violation
ET INFO User-Agent (Launcher)
Process
Message
msedgewebview2.exe
RecursiveDirectoryCreate( C:\Users\admin\AppData\Local\gg.norisk.NoRiskClientLauncherV3 directory exists )