IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 20 11:27:46 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 20 11:27:45 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:00:51 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 20 11:27:45 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 20 11:27:46 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 20 11:27:45 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
JSON data
downloaded
Chrome Cache Entry: 101
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 102
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 103
ASCII text
downloaded
Chrome Cache Entry: 104
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 105
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 106
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components 3
dropped
Chrome Cache Entry: 107
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 108
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 109
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 110
JSON data
dropped
Chrome Cache Entry: 111
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 112
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 113
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 114
JSON data
downloaded
Chrome Cache Entry: 115
JSON data
dropped
Chrome Cache Entry: 116
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 117
JSON data
downloaded
Chrome Cache Entry: 118
JSON data
dropped
Chrome Cache Entry: 119
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 120
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components 3
downloaded
Chrome Cache Entry: 121
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 122
ASCII text
dropped
Chrome Cache Entry: 123
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 124
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 125
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 126
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 127
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 128
JSON data
dropped
Chrome Cache Entry: 129
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 130
JSON data
downloaded
Chrome Cache Entry: 131
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 90
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 91
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 92
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 93
JSON data
dropped
Chrome Cache Entry: 94
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 95
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 96
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 97
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 98
JSON data
dropped
Chrome Cache Entry: 99
ASCII text, with very long lines (65410)
downloaded
There are 39 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=1908,i,16866088290354366866,11762703884386129565,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1976,i,15534154704042037435,5378647065527263683,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://github.com/Youssef1313
unknown
https://cook-rain.sbs/KxT
unknown
https://cook-rain.sbs:443/apical
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
peepburry828.sbs
http://polymer.github.io/AUTHORS.txt
unknown
https://cook-rain.sbs/api0Z
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://cook-rain.sbs//
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://learn-video.azurefd.net/vod/player
unknown
p10tgrace.sbs
https://twitter.com/intent/tweet?original_referer=$
unknown
https://cook-rain.sbs/apigsBX1
unknown
https://github.com/gewarren
unknown
http://185.215.113.16/off/def.exepleWebKit/537.36
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://cook-rain.sbs/T
unknown
processhol.sbs
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://cook-rain.sbs/apigLX/
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
https://cook-rain.sbs/api
188.114.96.3
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://cook-rain.sbs/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.45
http://ocsp.rootca1.amazontrust.com0:
unknown
https://cook-rain.sbs/y
unknown
https://schema.org
unknown
p3ar11fter.sbs
http://polymer.github.io/LICENSE.txt
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15d7e4b694824b33323940336fbf0bead57d89764383fe44
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
http://go.microsoft.co(
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
http://185.215.113.16/
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
http://crl.micro
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://cook-rain.sbs/&
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&cta
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
There are 73 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cook-rain.sbs
188.114.96.3
s-part-0017.t-0009.t-msedge.net
13.107.246.45
s-part-0015.t-0009.t-msedge.net
13.107.246.43
www.google.com
142.250.185.164
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.8
unknown
unknown
malicious
13.107.246.43
s-part-0015.t-0009.t-msedge.net
United States
142.250.186.36
unknown
United States
13.107.246.45
s-part-0017.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
239.255.255.250
unknown
Reserved
142.250.185.164
www.google.com
United States
188.114.96.3
cook-rain.sbs
European Union

Memdumps

Base Address
Regiontype
Protect
Malicious
FA1000
unkown
page execute and read and write
malicious
5E32000
trusted library allocation
page read and write
1295000
unkown
page execute and read and write
5DB9000
trusted library allocation
page read and write
5E3C000
trusted library allocation
page read and write
5DD5000
trusted library allocation
page read and write
BE5000
heap
page read and write
5CE6000
trusted library allocation
page read and write
322F000
stack
page read and write
2B40000
direct allocation
page read and write
BE6000
heap
page read and write
53B0000
remote allocation
page read and write
5863000
trusted library allocation
page read and write
5CE6000
trusted library allocation
page read and write
4EB0000
direct allocation
page execute and read and write
5D8B000
trusted library allocation
page read and write
5845000
trusted library allocation
page read and write
586B000
trusted library allocation
page read and write
58B3000
trusted library allocation
page read and write
5879000
trusted library allocation
page read and write
C03000
heap
page read and write
5CED000
trusted library allocation
page read and write
2B40000
direct allocation
page read and write
82D0000
direct allocation
page execute and read and write
5873000
trusted library allocation
page read and write
58AB000
trusted library allocation
page read and write
5DB8000
trusted library allocation
page read and write
587B000
trusted library allocation
page read and write
48B1000
heap
page read and write
402E000
stack
page read and write
5E3E000
trusted library allocation
page read and write
B1A000
heap
page read and write
5E30000
trusted library allocation
page read and write
4EE0000
direct allocation
page execute and read and write
C00000
heap
page read and write
502D000
stack
page read and write
5873000
trusted library allocation
page read and write
5849000
trusted library allocation
page read and write
4CF0000
heap
page read and write
5ECC000
trusted library allocation
page read and write
5899000
trusted library allocation
page read and write
5CEE000
trusted library allocation
page read and write
5864000
trusted library allocation
page read and write
5CEC000
trusted library allocation
page read and write
5968000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
BD6000
heap
page read and write
3B2E000
stack
page read and write
5879000
trusted library allocation
page read and write
8110000
direct allocation
page read and write
5863000
trusted library allocation
page read and write
30EF000
stack
page read and write
58B3000
trusted library allocation
page read and write
5CE7000
trusted library allocation
page read and write
6ABE000
stack
page read and write
C06000
heap
page read and write
58E4000
trusted library allocation
page read and write
8110000
direct allocation
page read and write
4D74000
direct allocation
page read and write
35EF000
stack
page read and write
A44000
heap
page read and write
BF7000
heap
page read and write
3C6E000
stack
page read and write
70FE000
stack
page read and write
65BE000
stack
page read and write
8140000
heap
page read and write
34AF000
stack
page read and write
BFF000
heap
page read and write
BF0000
heap
page read and write
5863000
trusted library allocation
page read and write
88BC000
stack
page read and write
5E19000
trusted library allocation
page read and write
5884000
trusted library allocation
page read and write
5CE5000
trusted library allocation
page read and write
2B40000
direct allocation
page read and write
3EAF000
stack
page read and write
5DD6000
trusted library allocation
page read and write
5884000
trusted library allocation
page read and write
BE1000
heap
page read and write
5853000
trusted library allocation
page read and write
BEB000
heap
page read and write
58B4000
trusted library allocation
page read and write
B78000
heap
page read and write
5E22000
trusted library allocation
page read and write
5E1B000
trusted library allocation
page read and write
A40000
heap
page read and write
5D86000
trusted library allocation
page read and write
58D7000
trusted library allocation
page read and write
5CE8000
trusted library allocation
page read and write
BFF000
heap
page read and write
C0D000
heap
page read and write
526E000
stack
page read and write
5877000
trusted library allocation
page read and write
5879000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
7C3E000
stack
page read and write
BCA000
heap
page read and write
5DD7000
trusted library allocation
page read and write
5D81000
trusted library allocation
page read and write
BFD000
heap
page read and write
5CE5000
trusted library allocation
page read and write
C0D000
heap
page read and write
5862000
trusted library allocation
page read and write
FA0000
unkown
page read and write
5CE0000
trusted library allocation
page read and write
587C000
trusted library allocation
page read and write
5CE6000
trusted library allocation
page read and write
58D7000
trusted library allocation
page read and write
5AE2000
trusted library allocation
page read and write
5E7F000
trusted library allocation
page read and write
5D8D000
trusted library allocation
page read and write
5E1F000
trusted library allocation
page read and write
5851000
trusted library allocation
page read and write
5F2B000
trusted library allocation
page read and write
6089000
stack
page read and write
48B1000
heap
page read and write
5E30000
trusted library allocation
page read and write
5942000
trusted library allocation
page read and write
59BE000
stack
page read and write
FE5000
unkown
page execute and read and write
D0E000
stack
page read and write
1458000
unkown
page execute and read and write
BFD000
heap
page read and write
58E0000
trusted library allocation
page read and write
58CA000
trusted library allocation
page read and write
C06000
heap
page read and write
587A000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
5DFB000
trusted library allocation
page read and write
5DAF000
trusted library allocation
page read and write
C0A000
heap
page read and write
5848000
trusted library allocation
page read and write
5CEF000
trusted library allocation
page read and write
C06000
heap
page read and write
5CE2000
trusted library allocation
page read and write
BEF000
heap
page read and write
5CE4000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
5899000
trusted library allocation
page read and write
5E1E000
trusted library allocation
page read and write
A44000
heap
page read and write
5CF0000
trusted library allocation
page read and write
5866000
trusted library allocation
page read and write
7D7E000
stack
page read and write
697E000
stack
page read and write
5884000
trusted library allocation
page read and write
5F7C000
trusted library allocation
page read and write
5877000
trusted library allocation
page read and write
BED000
heap
page read and write
33AE000
stack
page read and write
5CE4000
trusted library allocation
page read and write
5CE7000
trusted library allocation
page read and write
2FEE000
stack
page read and write
586A000
trusted library allocation
page read and write
A44000
heap
page read and write
873F000
stack
page read and write
5E1A000
trusted library allocation
page read and write
BEA000
heap
page read and write
58F5000
trusted library allocation
page read and write
BEB000
heap
page read and write
B76000
heap
page read and write
5DE2000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
8110000
direct allocation
page read and write
2B40000
direct allocation
page read and write
5FB000
stack
page read and write
B48000
heap
page read and write
34EE000
stack
page read and write
588D000
trusted library allocation
page read and write
6326000
trusted library allocation
page execute and read and write
BE1000
heap
page read and write
58B9000
trusted library allocation
page read and write
5CE4000
trusted library allocation
page read and write
83C0000
trusted library allocation
page read and write
48B0000
heap
page read and write
BE4000
heap
page read and write
5CEE000
trusted library allocation
page read and write
5DBA000
trusted library allocation
page read and write
C06000
heap
page read and write
BFF000
heap
page read and write
5942000
trusted library allocation
page read and write
5863000
trusted library allocation
page read and write
5F7B000
trusted library allocation
page read and write
5850000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
58A0000
trusted library allocation
page read and write
5E32000
trusted library allocation
page read and write
BE5000
heap
page read and write
5866000
trusted library allocation
page read and write
5873000
trusted library allocation
page read and write
BFD000
heap
page read and write
5E2E000
trusted library allocation
page read and write
5841000
trusted library allocation
page read and write
7EBE000
stack
page read and write
5863000
trusted library allocation
page read and write
5897000
trusted library allocation
page read and write
BF0000
heap
page read and write
5EAD000
trusted library allocation
page read and write
584F000
trusted library allocation
page read and write
5DF3000
trusted library allocation
page read and write
BD1000
heap
page read and write
5893000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
53B0000
remote allocation
page read and write
5F1C000
trusted library allocation
page read and write
5F8E000
trusted library allocation
page read and write
8110000
direct allocation
page read and write
950000
heap
page read and write
58A3000
trusted library allocation
page read and write
5CE4000
trusted library allocation
page read and write
49B0000
trusted library allocation
page read and write
5846000
trusted library allocation
page read and write
5D93000
trusted library allocation
page read and write
59C0000
direct allocation
page read and write
58A3000
trusted library allocation
page read and write
5878000
trusted library allocation
page read and write
BD6000
heap
page read and write
587C000
trusted library allocation
page read and write
5944000
trusted library allocation
page read and write
5850000
trusted library allocation
page read and write
4E90000
direct allocation
page execute and read and write
584A000
trusted library allocation
page read and write
5D8F000
trusted library allocation
page read and write
3AEF000
stack
page read and write
56CE000
stack
page read and write
A44000
heap
page read and write
6338000
trusted library allocation
page execute and read and write
5871000
trusted library allocation
page read and write
5841000
trusted library allocation
page read and write
863E000
stack
page read and write
5841000
trusted library allocation
page read and write
BF6000
heap
page read and write
5CE3000
trusted library allocation
page read and write
BE2000
heap
page read and write
647C000
stack
page read and write
12AF000
unkown
page execute and read and write
5F15000
trusted library allocation
page read and write
6220000
trusted library allocation
page execute and read and write
76FF000
stack
page read and write
362E000
stack
page read and write
BEA000
heap
page read and write
5862000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
2B40000
direct allocation
page read and write
2B40000
direct allocation
page read and write
5850000
trusted library allocation
page read and write
5E4C000
trusted library allocation
page read and write
BEB000
heap
page read and write
48B1000
heap
page read and write
58B3000
trusted library allocation
page read and write
551F000
stack
page read and write
A44000
heap
page read and write
5878000
trusted library allocation
page read and write
589C000
trusted library allocation
page read and write
2B67000
heap
page read and write
5DD8000
trusted library allocation
page read and write
7AFE000
stack
page read and write
5863000
trusted library allocation
page read and write
8110000
direct allocation
page read and write
5D84000
trusted library allocation
page read and write
A44000
heap
page read and write
5864000
trusted library allocation
page read and write
5CE3000
trusted library allocation
page read and write
C08000
heap
page read and write
2C6E000
stack
page read and write
5DEA000
trusted library allocation
page read and write
5858000
trusted library allocation
page read and write
2FAF000
stack
page read and write
2B40000
direct allocation
page read and write
71FF000
stack
page read and write
FA1000
unkown
page execute and write copy
4EB0000
direct allocation
page execute and read and write
3FEF000
stack
page read and write
2AFF000
stack
page read and write
C08000
heap
page read and write
5EED000
trusted library allocation
page read and write
8110000
direct allocation
page read and write
6BFE000
stack
page read and write
5CE6000
trusted library allocation
page read and write
3DAE000
stack
page read and write
C0C000
heap
page read and write
BFF000
heap
page read and write
BE7000
heap
page read and write
594B000
trusted library allocation
page read and write
48B1000
heap
page read and write
A44000
heap
page read and write
48B1000
heap
page read and write
5E69000
trusted library allocation
page read and write
5CE4000
trusted library allocation
page read and write
5873000
trusted library allocation
page read and write
BEA000
heap
page read and write
5876000
trusted library allocation
page read and write
8110000
direct allocation
page read and write
58E0000
trusted library allocation
page read and write
589D000
trusted library allocation
page read and write
326E000
stack
page read and write
C0C000
heap
page read and write
5860000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
5884000
trusted library allocation
page read and write
588C000
trusted library allocation
page read and write
5894000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
BE1000
heap
page read and write
5850000
trusted library allocation
page read and write
5DA3000
trusted library allocation
page read and write
5F4D000
trusted library allocation
page read and write
5F1E000
trusted library allocation
page read and write
5845000
trusted library allocation
page read and write
4FED000
stack
page read and write
A44000
heap
page read and write
BD0000
heap
page read and write
BF6000
heap
page read and write
5CE7000
trusted library allocation
page read and write
9BEE000
stack
page read and write
A30000
heap
page read and write
5866000
trusted library allocation
page read and write
BFD000
heap
page read and write
2B40000
direct allocation
page read and write
BE2000
heap
page read and write
BE7000
heap
page read and write
4EF9000
trusted library allocation
page read and write
C0B000
heap
page read and write
5CE3000
trusted library allocation
page read and write
5944000
trusted library allocation
page read and write
126D000
unkown
page execute and read and write
5F6F000
trusted library allocation
page read and write
58B1000
trusted library allocation
page read and write
BBC000
heap
page read and write
5850000
trusted library allocation
page read and write
5DBB000
trusted library allocation
page read and write
BE1000
heap
page read and write
312E000
stack
page read and write
5863000
trusted library allocation
page read and write
516E000
stack
page read and write
589C000
trusted library allocation
page read and write
5856000
trusted library allocation
page read and write
643F000
stack
page read and write
589B000
trusted library allocation
page read and write
5CE6000
trusted library allocation
page read and write
5848000
trusted library allocation
page read and write
5884000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
5CEE000
trusted library allocation
page read and write
3C2F000
stack
page read and write
5CE8000
trusted library allocation
page read and write
48B1000
heap
page read and write
5863000
trusted library allocation
page read and write
8110000
direct allocation
page read and write
5ECE000
trusted library allocation
page read and write
4EB0000
direct allocation
page execute and read and write
B1E000
heap
page read and write
5A72000
trusted library allocation
page read and write
66BF000
stack
page read and write
5884000
trusted library allocation
page read and write
58C4000
trusted library allocation
page read and write
58A3000
trusted library allocation
page read and write
8170000
direct allocation
page read and write
5883000
trusted library allocation
page read and write
B78000
heap
page read and write
773E000
stack
page read and write
BE2000
heap
page read and write
5E3F000
trusted library allocation
page read and write
583F000
stack
page read and write
BE2000
heap
page read and write
5942000
trusted library allocation
page read and write
797F000
stack
page read and write
5929000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
BF5000
heap
page read and write
5E08000
trusted library allocation
page read and write
6E7E000
stack
page read and write
584A000
trusted library allocation
page read and write
5CE5000
trusted library allocation
page read and write
4EC0000
direct allocation
page execute and read and write
BBC000
heap
page read and write
5863000
trusted library allocation
page read and write
5CE7000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
8170000
direct allocation
page read and write
C06000
heap
page read and write
53B0000
remote allocation
page read and write
5863000
trusted library allocation
page read and write
7E7F000
stack
page read and write
5D82000
trusted library allocation
page read and write
594F000
trusted library allocation
page read and write
A44000
heap
page read and write
58B9000
trusted library allocation
page read and write
6BBF000
stack
page read and write
5F90000
trusted library allocation
page read and write
BE7000
heap
page read and write
C02000
heap
page read and write
5E18000
trusted library allocation
page read and write
4D30000
direct allocation
page read and write
5DA9000
trusted library allocation
page read and write
5873000
trusted library allocation
page read and write
586D000
trusted library allocation
page read and write
58B3000
trusted library allocation
page read and write
48B1000
heap
page read and write
5851000
trusted library allocation
page read and write
5D84000
trusted library allocation
page read and write
4E80000
direct allocation
page execute and read and write
6CFF000
stack
page read and write
58BD000
trusted library allocation
page read and write
585C000
trusted library allocation
page read and write
5862000
trusted library allocation
page read and write
58B3000
trusted library allocation
page read and write
AFE000
stack
page read and write
5841000
trusted library allocation
page read and write
565C000
stack
page read and write
58FB000
trusted library allocation
page read and write
8110000
trusted library allocation
page read and write
B62000
heap
page read and write
A44000
heap
page read and write
5CE6000
trusted library allocation
page read and write
BF5000
heap
page read and write
6354000
trusted library allocation
page read and write
C0B000
heap
page read and write
6096000
trusted library allocation
page read and write
5DFD000
trusted library allocation
page read and write
5E07000
trusted library allocation
page read and write
5CEA000
trusted library allocation
page read and write
BFF000
heap
page read and write
5889000
trusted library allocation
page read and write
52AE000
stack
page read and write
BFF000
heap
page read and write
5CEA000
trusted library allocation
page read and write
5898000
trusted library allocation
page read and write
5DAD000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
5858000
trusted library allocation
page read and write
5848000
trusted library allocation
page read and write
5CE8000
trusted library allocation
page read and write
5CE4000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
5DE8000
trusted library allocation
page read and write
5DD7000
trusted library allocation
page read and write
5850000
trusted library allocation
page read and write
5850000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
82B0000
heap
page read and write
5730000
heap
page read and write
5852000
trusted library allocation
page read and write
588B000
trusted library allocation
page read and write
588D000
trusted library allocation
page read and write
5CED000
trusted library allocation
page read and write
6D3E000
stack
page read and write
5CEA000
trusted library allocation
page read and write
5889000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
586C000
trusted library allocation
page read and write
BEF000
heap
page read and write
462F000
stack
page read and write
BED000
heap
page read and write
58B1000
trusted library allocation
page read and write
5980000
trusted library allocation
page read and write
5884000
trusted library allocation
page read and write
5893000
trusted library allocation
page read and write
59E1000
trusted library allocation
page read and write
5849000
trusted library allocation
page read and write
5E09000
trusted library allocation
page read and write
5E81000
trusted library allocation
page read and write
59A0000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
58DC000
trusted library allocation
page read and write
5DE3000
trusted library allocation
page read and write
5861000
trusted library allocation
page read and write
5DA5000
trusted library allocation
page read and write
5884000
trusted library allocation
page read and write
BF5000
heap
page read and write
FA0000
unkown
page readonly
4D30000
direct allocation
page read and write
4D30000
direct allocation
page read and write
1459000
unkown
page execute and write copy
58B1000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
587B000
trusted library allocation
page read and write
5878000
trusted library allocation
page read and write
5861000
trusted library allocation
page read and write
5897000
trusted library allocation
page read and write
38AE000
stack
page read and write
5CE5000
trusted library allocation
page read and write
7D3F000
stack
page read and write
412F000
stack
page read and write
5894000
trusted library allocation
page read and write
A44000
heap
page read and write
5873000
trusted library allocation
page read and write
BE4000
heap
page read and write
58EA000
trusted library allocation
page read and write
BE6000
heap
page read and write
2B40000
direct allocation
page read and write
5841000
trusted library allocation
page read and write
5CED000
trusted library allocation
page read and write
5A18000
trusted library allocation
page read and write
5E4E000
trusted library allocation
page read and write
737E000
stack
page read and write
5884000
trusted library allocation
page read and write
5899000
trusted library allocation
page read and write
BE1000
heap
page read and write
5873000
trusted library allocation
page read and write
A44000
heap
page read and write
BBC000
heap
page read and write
5CEF000
trusted library allocation
page read and write
5871000
trusted library allocation
page read and write
5851000
trusted library allocation
page read and write
BBC000
heap
page read and write
7FBF000
stack
page read and write
5CE5000
trusted library allocation
page read and write
5CE2000
trusted library allocation
page read and write
C06000
heap
page read and write
586C000
trusted library allocation
page read and write
74BE000
stack
page read and write
587A000
trusted library allocation
page read and write
5858000
trusted library allocation
page read and write
5866000
trusted library allocation
page read and write
A44000
heap
page read and write
5F89000
trusted library allocation
page read and write
C06000
heap
page read and write
5CE4000
trusted library allocation
page read and write
5941000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
A44000
heap
page read and write
5869000
trusted library allocation
page read and write
5A20000
trusted library allocation
page read and write
585E000
trusted library allocation
page read and write
A44000
heap
page read and write
5E4C000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
BF0000
heap
page read and write
5F53000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
4E6F000
stack
page read and write
C0B000
heap
page read and write
5F17000
trusted library allocation
page read and write
586C000
trusted library allocation
page read and write
5850000
trusted library allocation
page read and write
8300000
direct allocation
page execute and read and write
587B000
trusted library allocation
page read and write
58A3000
trusted library allocation
page read and write
5873000
trusted library allocation
page read and write
5892000
trusted library allocation
page read and write
BF3000
heap
page read and write
C06000
heap
page read and write
5DC7000
trusted library allocation
page read and write
5F55000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
5877000
trusted library allocation
page read and write
48B1000
heap
page read and write
12B0000
unkown
page execute and write copy
C0B000
heap
page read and write
C06000
heap
page read and write
5CEE000
trusted library allocation
page read and write
BD6000
heap
page read and write
BE0000
heap
page read and write
A44000
heap
page read and write
58E8000
trusted library allocation
page read and write
B10000
heap
page read and write
48B1000
heap
page read and write
5E24000
trusted library allocation
page read and write
555D000
stack
page read and write
C08000
heap
page read and write
BF7000
heap
page read and write
2B40000
direct allocation
page read and write
5884000
trusted library allocation
page read and write
541E000
stack
page read and write
787E000
stack
page read and write
7ABF000
stack
page read and write
5878000
trusted library allocation
page read and write
C08000
heap
page read and write
5CE4000
trusted library allocation
page read and write
BE9000
heap
page read and write
70BF000
stack
page read and write
5861000
trusted library allocation
page read and write
5D91000
trusted library allocation
page read and write
BF3000
heap
page read and write
9BF0000
trusted library allocation
page read and write
5873000
trusted library allocation
page read and write
5845000
trusted library allocation
page read and write
5CF1000
trusted library allocation
page read and write
5873000
trusted library allocation
page read and write
58BE000
trusted library allocation
page read and write
476F000
stack
page read and write
5CED000
trusted library allocation
page read and write
587D000
trusted library allocation
page read and write
79BE000
stack
page read and write
5E75000
trusted library allocation
page read and write
5869000
trusted library allocation
page read and write
5893000
trusted library allocation
page read and write
5E1F000
trusted library allocation
page read and write
39EE000
stack
page read and write
48B1000
heap
page read and write
C06000
heap
page read and write
48B1000
heap
page read and write
5CE6000
trusted library allocation
page read and write
5CE4000
trusted library allocation
page read and write
A44000
heap
page read and write
6092000
trusted library allocation
page execute and read and write
5DFD000
trusted library allocation
page read and write
C06000
heap
page read and write
F8B000
stack
page read and write
BE6000
heap
page read and write
43EE000
stack
page read and write
4EBE000
stack
page read and write
58E2000
trusted library allocation
page read and write
A44000
heap
page read and write
58B3000
trusted library allocation
page read and write
372F000
stack
page read and write
5DA7000
trusted library allocation
page read and write
5863000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
2B40000
direct allocation
page read and write
5CE8000
trusted library allocation
page read and write
5CE4000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
6F7F000
stack
page read and write
53AF000
stack
page read and write
586C000
trusted library allocation
page read and write
58B4000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
466E000
stack
page read and write
5DDA000
trusted library allocation
page read and write
5884000
trusted library allocation
page read and write
586B000
trusted library allocation
page read and write
683E000
stack
page read and write
5845000
trusted library allocation
page read and write
585E000
trusted library allocation
page read and write
5862000
trusted library allocation
page read and write
5DF8000
trusted library allocation
page read and write
BF9000
heap
page read and write
5AB8000
trusted library allocation
page read and write
8110000
direct allocation
page read and write
589B000
trusted library allocation
page read and write
5884000
trusted library allocation
page read and write
48C0000
heap
page read and write
723E000
stack
page read and write
5E95000
trusted library allocation
page read and write
C06000
heap
page read and write
44EF000
stack
page read and write
58F7000
trusted library allocation
page read and write
48B1000
heap
page read and write
5884000
trusted library allocation
page read and write
5CE8000
trusted library allocation
page read and write
5863000
trusted library allocation
page read and write
BFF000
heap
page read and write
5CE6000
trusted library allocation
page read and write
48B1000
heap
page read and write
8FB000
stack
page read and write
2B40000
direct allocation
page read and write
733F000
stack
page read and write
5845000
trusted library allocation
page read and write
A4EF000
stack
page read and write
5E1D000
trusted library allocation
page read and write
58B3000
trusted library allocation
page read and write
2B3E000
stack
page read and write
58A7000
trusted library allocation
page read and write
48B1000
heap
page read and write
83C9000
trusted library allocation
page read and write
58A9000
trusted library allocation
page read and write
5CE2000
trusted library allocation
page read and write
586B000
trusted library allocation
page read and write
1185000
unkown
page execute and read and write
6A7F000
stack
page read and write
5CEC000
trusted library allocation
page read and write
5862000
trusted library allocation
page read and write
BE7000
heap
page read and write
5892000
trusted library allocation
page read and write
5865000
trusted library allocation
page read and write
A44000
heap
page read and write
5893000
trusted library allocation
page read and write
80FF000
stack
page read and write
5873000
trusted library allocation
page read and write
C0B000
heap
page read and write
48AF000
stack
page read and write
5863000
trusted library allocation
page read and write
5893000
trusted library allocation
page read and write
58D7000
trusted library allocation
page read and write
5CE2000
trusted library allocation
page read and write
2B60000
heap
page read and write
67FF000
stack
page read and write
5DD8000
trusted library allocation
page read and write
58B1000
trusted library allocation
page read and write
8110000
direct allocation
page read and write
5CE7000
trusted library allocation
page read and write
BE4000
heap
page read and write
586B000
trusted library allocation
page read and write
5CEE000
trusted library allocation
page read and write
2D6F000
stack
page read and write
5F7A000
trusted library allocation
page read and write
783F000
stack
page read and write
7BFF000
stack
page read and write
87BB000
stack
page read and write
5CE9000
trusted library allocation
page read and write
5CE3000
trusted library allocation
page read and write
5F4B000
trusted library allocation
page read and write
5943000
trusted library allocation
page read and write
75BF000
stack
page read and write
5851000
trusted library allocation
page read and write
5871000
trusted library allocation
page read and write
81AC000
stack
page read and write
2B40000
direct allocation
page read and write
589C000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
F4E000
stack
page read and write
5850000
trusted library allocation
page read and write
83C2000
trusted library allocation
page read and write
5884000
trusted library allocation
page read and write
5E1D000
trusted library allocation
page read and write
5E1C000
trusted library allocation
page read and write
5EAF000
trusted library allocation
page read and write
426F000
stack
page read and write
5897000
trusted library allocation
page read and write
5DFA000
trusted library allocation
page read and write
585E000
trusted library allocation
page read and write
5CE6000
trusted library allocation
page read and write
5E1F000
trusted library allocation
page read and write
C0C000
heap
page read and write
BFD000
heap
page read and write
5D8D000
trusted library allocation
page read and write
AAE000
stack
page read and write
5884000
trusted library allocation
page read and write
5D7F000
trusted library allocation
page read and write
4EB0000
direct allocation
page execute and read and write
5EEF000
trusted library allocation
page read and write
48B1000
heap
page read and write
5873000
trusted library allocation
page read and write
5DF5000
trusted library allocation
page read and write
5979000
stack
page read and write
5CEB000
trusted library allocation
page read and write
5929000
trusted library allocation
page read and write
5883000
trusted library allocation
page read and write
5851000
trusted library allocation
page read and write
BE9000
heap
page read and write
4D6C000
stack
page read and write
609A000
trusted library allocation
page execute and read and write
F90000
heap
page read and write
7FFE000
stack
page read and write
2EAE000
stack
page read and write
5E6B000
trusted library allocation
page read and write
48B1000
heap
page read and write
8150000
trusted library allocation
page read and write
586B000
trusted library allocation
page read and write
5869000
trusted library allocation
page read and write
5E34000
trusted library allocation
page read and write
4EA0000
direct allocation
page execute and read and write
5889000
trusted library allocation
page read and write
5854000
trusted library allocation
page read and write
58BA000
trusted library allocation
page read and write
5CE6000
trusted library allocation
page read and write
5CEF000
trusted library allocation
page read and write
5733000
heap
page read and write
5863000
trusted library allocation
page read and write
12A0000
unkown
page execute and read and write
512D000
stack
page read and write
5884000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
5E0A000
trusted library allocation
page read and write
5DB9000
trusted library allocation
page read and write
8110000
direct allocation
page read and write
C06000
heap
page read and write
747F000
stack
page read and write
6090000
trusted library allocation
page read and write
48B1000
heap
page read and write
5862000
trusted library allocation
page read and write
3D6F000
stack
page read and write
C06000
heap
page read and write
C0D000
heap
page read and write
5845000
trusted library allocation
page read and write
5874000
trusted library allocation
page read and write
6336000
trusted library allocation
page execute and read and write
5CEC000
trusted library allocation
page read and write
4EB0000
direct allocation
page execute and read and write
A44000
heap
page read and write
2B40000
direct allocation
page read and write
5884000
trusted library allocation
page read and write
5F2D000
trusted library allocation
page read and write
5DD5000
trusted library allocation
page read and write
66FE000
stack
page read and write
693F000
stack
page read and write
586B000
trusted library allocation
page read and write
5E93000
trusted library allocation
page read and write
43AF000
stack
page read and write
4ED0000
direct allocation
page execute and read and write
47AE000
stack
page read and write
5CE6000
trusted library allocation
page read and write
336F000
stack
page read and write
5845000
trusted library allocation
page read and write
4EB0000
direct allocation
page execute and read and write
2E6F000
stack
page read and write
BFF000
heap
page read and write
5DE5000
trusted library allocation
page read and write
58C3000
trusted library allocation
page read and write
B78000
heap
page read and write
6FBE000
stack
page read and write
58AB000
trusted library allocation
page read and write
58B4000
trusted library allocation
page read and write
C06000
heap
page read and write
5DA0000
trusted library allocation
page read and write
5DA2000
trusted library allocation
page read and write
48B1000
heap
page read and write
5CE5000
trusted library allocation
page read and write
5DB7000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
5863000
trusted library allocation
page read and write
58AD000
trusted library allocation
page read and write
386F000
stack
page read and write
BEE000
heap
page read and write
5DFF000
trusted library allocation
page read and write
5CE7000
trusted library allocation
page read and write
8110000
direct allocation
page read and write
BEE000
heap
page read and write
BF3000
heap
page read and write
8110000
direct allocation
page read and write
48B1000
heap
page read and write
C0D000
heap
page read and write
C06000
heap
page read and write
C06000
heap
page read and write
58D8000
trusted library allocation
page read and write
48B1000
heap
page read and write
12AF000
unkown
page execute and write copy
5E1D000
trusted library allocation
page read and write
42AE000
stack
page read and write
452E000
stack
page read and write
FF8000
unkown
page execute and read and write
BE4000
heap
page read and write
5CE8000
trusted library allocation
page read and write
5F71000
trusted library allocation
page read and write
657F000
stack
page read and write
5DC5000
trusted library allocation
page read and write
5859000
trusted library allocation
page read and write
5CE2000
trusted library allocation
page read and write
5949000
trusted library allocation
page read and write
5DA4000
trusted library allocation
page read and write
C0B000
heap
page read and write
39AF000
stack
page read and write
5DC2000
trusted library allocation
page read and write
376E000
stack
page read and write
8170000
direct allocation
page read and write
5A28000
trusted library allocation
page read and write
5841000
trusted library allocation
page read and write
82AE000
stack
page read and write
C0A000
heap
page read and write
5845000
trusted library allocation
page read and write
5846000
trusted library allocation
page read and write
6E3F000
stack
page read and write
584F000
trusted library allocation
page read and write
8110000
direct allocation
page read and write
5943000
trusted library allocation
page read and write
5869000
trusted library allocation
page read and write
5DA2000
trusted library allocation
page read and write
9B30000
trusted library allocation
page read and write
75FE000
stack
page read and write
5CE6000
trusted library allocation
page read and write
3EEE000
stack
page read and write
5897000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
416E000
stack
page read and write
C06000
heap
page read and write
There are 847 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0