IOC Report
SoundTune.exe

loading gif

Files

File Path
Type
Category
Malicious
SoundTune.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\hdoumnepq
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nmqufdalfa
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\yxh
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\eb40e7d2
PNG image data, 4480 x 508, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\ebb9eca0
data
dropped
C:\Users\user\AppData\Local\Temp\f3455394
PNG image data, 4480 x 508, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\f4062f52
data
dropped
C:\Users\user\AppData\Local\Temp\f5e8013d
PNG image data, 4480 x 508, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\f751201f
PNG image data, 4480 x 508, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\f7e11b31
data
dropped
C:\Windows\Tasks\uiQuick.job
data
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SoundTune.exe
"C:\Users\user\Desktop\SoundTune.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Roaming\updatefa\SoundTune.exe
C:\Users\user\AppData\Roaming\updatefa\SoundTune.exe
malicious
C:\Users\user\AppData\Roaming\updatefa\SoundTune.exe
C:\Users\user\AppData\Roaming\updatefa\SoundTune.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Roaming\updatefa\SoundTune.exe
"C:\Users\user\AppData\Roaming\updatefa\SoundTune.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
responsibilitybridge.com/8BvxwQdec3/index.php
malicious
http://www.vmware.com/0/
unknown
https://bitsum.com0/
unknown
http://www.vmware.com/0
unknown
http://www.symauth.com/cps0(
unknown
http://www.symauth.com/rpa00
unknown
https://docs.wxwidgets.org/latest/plat_msw_install.html#msw_manifest
unknown
https://docs.wxwidgets.org/latest/classwx_system_options.html
unknown
http://www.info-zip.org/
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
541B000
trusted library allocation
page read and write
malicious
4A99000
trusted library allocation
page read and write
malicious
5A20000
direct allocation
page read and write
malicious
47A9000
trusted library allocation
page read and write
malicious
52E1000
trusted library allocation
page read and write
malicious
5900000
direct allocation
page read and write
malicious
25B712CB000
heap
page read and write
malicious
4CA2000
trusted library allocation
page read and write
malicious
278AB600000
heap
page read and write
malicious
54A0000
direct allocation
page read and write
malicious
2C41000
unkown
page execute read
malicious
22584B90000
heap
page read and write
malicious
2591000
unkown
page read and write
malicious
2591000
unkown
page execute read
malicious
4919000
trusted library allocation
page read and write
malicious
278AE3D1000
heap
page read and write
malicious
2A37F99F000
heap
page read and write
malicious
7FF77AB2C000
unkown
page read and write
34C1000
heap
page read and write
22581CB4000
heap
page read and write
3120000
heap
page read and write
278A9BC2000
heap
page read and write
9AC3CFF000
stack
page read and write
30EE000
unkown
page read and write
7FF6FE68C000
unkown
page readonly
7FF6FE61C000
unkown
page read and write
7FF6FE642000
unkown
page read and write
2FE4000
heap
page read and write
2FE4000
heap
page read and write
25E0000
unkown
page readonly
4F21000
unkown
page read and write
7FF6FE664000
unkown
page read and write
4F21000
unkown
page read and write
684000
heap
page read and write
3124000
heap
page read and write
680000
heap
page read and write
5BB0000
heap
page read and write
25B6E2C0000
heap
page read and write
225846A0000
heap
page read and write
2CD0000
heap
page read and write
684000
heap
page read and write
7FF77AB46000
unkown
page read and write
2FE4000
heap
page read and write
2FE0000
heap
page read and write
4F21000
unkown
page read and write
54E9000
direct allocation
page read and write
22581D40000
heap
page read and write
4F21000
unkown
page read and write
49AD000
direct allocation
page read and write
278A82AC000
heap
page read and write
7FF6FE642000
unkown
page read and write
59F0000
unkown
page read and write
278A9BC9000
heap
page read and write
710000
heap
page read and write
25B6E388000
heap
page read and write
2B20000
heap
page read and write
3354000
heap
page read and write
4C9D000
direct allocation
page read and write
25F1000
unkown
page write copy
684000
heap
page read and write
2A300386000
trusted library allocation
page read and write
278A83A6000
heap
page read and write
457D000
heap
page read and write
7FF77AB33000
unkown
page write copy
25F2000
unkown
page read and write
2A37CB9B000
heap
page read and write
4A15000
heap
page read and write
4F21000
unkown
page read and write
2CD0000
heap
page read and write
2A37FED0000
heap
page read and write
278A9BC3000
heap
page read and write
278AE900000
trusted library allocation
page read and write
7FF77AB9C000
unkown
page readonly
5A0000
heap
page read and write
22581E50000
heap
page read and write
278A82DD000
heap
page read and write
542F000
stack
page read and write
5061000
heap
page read and write
25B6E330000
heap
page read and write
4F21000
unkown
page read and write
46F5000
heap
page read and write
7FF6FE61C000
unkown
page read and write
4818000
heap
page read and write
70E000
stack
page read and write
7FF6FDE41000
unkown
page execute read
278AE900000
trusted library allocation
page read and write
DBC458F000
stack
page read and write
684000
heap
page read and write
9AC3EFD000
stack
page read and write
2A37CBA6000
heap
page read and write
251C000
stack
page read and write
48F2000
heap
page read and write
3124000
heap
page read and write
4F21000
unkown
page read and write
25B6FEC0000
heap
page read and write
278AB740000
heap
page read and write
2A37C990000
heap
page read and write
561D000
direct allocation
page read and write
684000
heap
page read and write
22585432000
trusted library allocation
page read and write
5619000
direct allocation
page read and write
278A9BC2000
heap
page read and write
2FBE000
stack
page read and write
2FE4000
heap
page read and write
4F21000
unkown
page read and write
2CAD000
unkown
page write copy
3124000
heap
page read and write
7FF6FE664000
unkown
page read and write
25B71B72000
trusted library allocation
page read and write
3124000
heap
page read and write
7FF6FDE41000
unkown
page execute read
4B19000
direct allocation
page read and write
278AD563000
heap
page read and write
2CF0000
heap
page read and write
2A37CA90000
heap
page read and write
2800000
heap
page read and write
25B6E3DA000
heap
page read and write
684000
heap
page read and write
22585736000
unkown
page read and write
278A82DD000
heap
page read and write
278A82D4000
heap
page read and write
7FF6FE68C000
unkown
page readonly
2A37F845000
heap
page read and write
2FF0000
direct allocation
page read and write
280C000
heap
page read and write
278A9BE7000
heap
page read and write
25B6E354000
heap
page read and write
32FF000
unkown
page read and write
225847BD000
heap
page read and write
22585446000
trusted library allocation
page read and write
3124000
heap
page read and write
4EAD000
direct allocation
page read and write
22584935000
heap
page read and write
7FF6FE68C000
unkown
page readonly
4F21000
unkown
page read and write
53A000
stack
page read and write
2FE4000
heap
page read and write
278AB700000
heap
page read and write
278A82D7000
heap
page read and write
7FF6FE3D9000
unkown
page readonly
684000
heap
page read and write
25B6E474000
heap
page read and write
2B24000
heap
page read and write
2B08000
heap
page read and write
25B71B86000
trusted library allocation
page read and write
58A1000
unkown
page read and write
225850C0000
trusted library allocation
page read and write
4F21000
unkown
page read and write
4560000
heap
page read and write
2FE4000
heap
page read and write
7FF6FDE40000
unkown
page readonly
684000
heap
page read and write
22581C40000
heap
page read and write
4F3E000
heap
page read and write
4C99000
direct allocation
page read and write
7FF6FDE40000
unkown
page readonly
2AB0000
heap
page read and write
278A80A0000
heap
page read and write
3124000
heap
page read and write
2A37CA70000
heap
page read and write
2C00000
heap
page read and write
25B6E337000
heap
page read and write
4F21000
unkown
page read and write
4F21000
unkown
page read and write
50AE000
stack
page read and write
684000
heap
page read and write
25B70B90000
heap
page read and write
7FF6FE623000
unkown
page write copy
2A37CBF0000
heap
page read and write
4F21000
unkown
page read and write
7FF77A350000
unkown
page readonly
4F21000
unkown
page read and write
225846B7000
heap
page read and write
9AC3FFE000
stack
page read and write
278AEC7B000
unkown
page read and write
25F2000
unkown
page write copy
684000
heap
page read and write
5298000
trusted library allocation
page read and write
25B6E430000
heap
page read and write
4F21000
unkown
page read and write
278AB904000
heap
page read and write
25F7000
unkown
page write copy
2D18000
heap
page read and write
22583B6A000
heap
page read and write
684000
heap
page read and write
2F70000
heap
page read and write
3124000
heap
page read and write
25B71E00000
unkown
page read and write
3124000
heap
page read and write
48BAFFE000
stack
page read and write
81C25FE000
stack
page read and write
7FF6FE623000
unkown
page write copy
2D00000
heap
page read and write
278A9D10000
heap
page read and write
22583600000
heap
page read and write
2C40000
heap
page read and write
278A81A0000
heap
page read and write
344A000
heap
page read and write
2A37CBBE000
heap
page read and write
278A9BCA000
heap
page read and write
7FF77AB52000
unkown
page read and write
684000
heap
page read and write
684000
heap
page read and write
684000
heap
page read and write
7FF6FE61C000
unkown
page read and write
25B70CA0000
heap
page read and write
278ACD60000
trusted library allocation
page read and write
7FF77A8E9000
unkown
page readonly
278A8180000
heap
page read and write
348F000
stack
page read and write
4F21000
unkown
page read and write
5770000
unkown
page read and write
278A9BD4000
heap
page read and write
2A37CCEA000
heap
page read and write
43C000
stack
page read and write
3124000
heap
page read and write
2FE4000
heap
page read and write
2A300372000
trusted library allocation
page read and write
2F90000
heap
page read and write
2FE4000
heap
page read and write
684000
heap
page read and write
7FF6FE61C000
unkown
page write copy
2910000
heap
page read and write
7FF6FE61C000
unkown
page write copy
25B71E98000
unkown
page read and write
25B70DE0000
heap
page read and write
7FF6FE3D9000
unkown
page readonly
4F21000
unkown
page read and write
29D0000
heap
page read and write
25B71171000
heap
page read and write
278ADEEE000
heap
page read and write
7FF6FDE41000
unkown
page execute read
4F21000
unkown
page read and write
225847E1000
heap
page read and write
4A1E000
direct allocation
page read and write
25B70EEE000
heap
page read and write
22585426000
trusted library allocation
page read and write
4F21000
unkown
page read and write
2FE4000
heap
page read and write
25B7021D000
heap
page read and write
225836EB000
heap
page read and write
2D10000
heap
page read and write
225854C7000
unkown
page read and write
48BAB1F000
stack
page read and write
29CC000
stack
page read and write
7FF6FDE41000
unkown
page execute read
4F21000
unkown
page read and write
4F21000
unkown
page read and write
3124000
heap
page read and write
3130000
heap
page read and write
278A9BC9000
heap
page read and write
2FE4000
heap
page read and write
4F21000
unkown
page read and write
507D000
heap
page read and write
2A37CB48000
heap
page read and write
34B4000
heap
page read and write
301B000
heap
page read and write
29C0000
trusted library allocation
page read and write
25B71BF7000
trusted library allocation
page read and write
25B71C00000
unkown
page read and write
225856C0000
unkown
page read and write
2A300000000
trusted library allocation
page read and write
3124000
heap
page read and write
29FE000
unkown
page read and write
2F6D000
unkown
page read and write
2830000
heap
page read and write
9AC39C9000
stack
page read and write
2A37F4C5000
heap
page read and write
2C0B000
heap
page read and write
278AEA86000
trusted library allocation
page read and write
3380000
heap
page read and write
2C90000
unkown
page readonly
2940000
heap
page read and write
7FF77A350000
unkown
page readonly
3350000
heap
page read and write
7FF6FE636000
unkown
page read and write
4F21000
unkown
page read and write
684000
heap
page read and write
4F1E000
direct allocation
page read and write
3024000
heap
page read and write
22585970000
heap
page read and write
278A8220000
heap
page read and write
684000
heap
page read and write
2A37CD45000
heap
page read and write
2258452F000
unkown
page read and write
22581D60000
heap
page read and write
3361000
heap
page read and write
2FDE000
unkown
page read and write
53D2000
trusted library allocation
page read and write
25F7000
unkown
page readonly
2E3B000
stack
page read and write
7FF6FE3D9000
unkown
page readonly
DBC4AFD000
stack
page read and write
DBC459C000
stack
page read and write
2A37CC1E000
heap
page read and write
3124000
heap
page read and write
278A82DB000
heap
page read and write
278A8330000
heap
page read and write
3124000
heap
page read and write
51AF000
stack
page read and write
278AE277000
heap
page read and write
278AEA72000
trusted library allocation
page read and write
2CA2000
unkown
page write copy
4F21000
unkown
page read and write
532E000
stack
page read and write
4F21000
unkown
page read and write
4F21000
unkown
page read and write
2E50000
heap
page read and write
2FE4000
heap
page read and write
81C211C000
stack
page read and write
4F21000
unkown
page read and write
7FF6FE61C000
unkown
page write copy
7FF6FE636000
unkown
page read and write
4F21000
unkown
page read and write
DBC48FF000
stack
page read and write
2F3A000
stack
page read and write
4F21000
unkown
page read and write
2A37CB40000
heap
page read and write
225846A6000
heap
page read and write
54ED000
direct allocation
page read and write
7FF6FDE40000
unkown
page readonly
25B6E570000
heap
page read and write
4523000
heap
page read and write
2A37CC84000
heap
page read and write
4F21000
unkown
page read and write
49F0000
direct allocation
page read and write
2A37F4B0000
heap
page read and write
25B71B66000
trusted library allocation
page read and write
25E6000
unkown
page write copy
278AE02A000
heap
page read and write
34B0000
heap
page read and write
684000
heap
page read and write
49A9000
direct allocation
page read and write
2A37CD40000
heap
page read and write
81C24FE000
stack
page read and write
4B1D000
direct allocation
page read and write
2FE4000
heap
page read and write
7FF77A351000
unkown
page execute read
25B6E51B000
heap
page read and write
684000
heap
page read and write
53C0000
direct allocation
page read and write
22581B50000
heap
page read and write
2BEA000
stack
page read and write
278A9BA4000
heap
page read and write
2A37E98C000
heap
page read and write
251C000
stack
page read and write
2A37F73A000
heap
page read and write
9AC40FE000
stack
page read and write
58A1000
unkown
page read and write
2B24000
heap
page read and write
750000
direct allocation
page read and write
278A9BD1000
heap
page read and write
2A37E630000
heap
page read and write
4F21000
unkown
page read and write
684000
heap
page read and write
225854B7000
trusted library allocation
page read and write
278A82EC000
heap
page read and write
2FC0000
direct allocation
page read and write
2A37CC40000
heap
page read and write
2FE4000
heap
page read and write
25B6E384000
heap
page read and write
2A300600000
unkown
page read and write
278A9BA7000
heap
page read and write
7FF77A8E9000
unkown
page readonly
4A50000
trusted library allocation
page read and write
22583720000
heap
page read and write
2FE4000
heap
page read and write
684000
heap
page read and write
225836AA000
heap
page read and write
9AC3DFE000
stack
page read and write
3354000
heap
page read and write
4F21000
unkown
page read and write
7FF6FE68C000
unkown
page readonly
25B71066000
heap
page read and write
25B70F2B000
heap
page read and write
4B70000
direct allocation
page read and write
7FF6FDE41000
unkown
page execute read
4D0E000
direct allocation
page read and write
3440000
heap
page read and write
278AEAF7000
trusted library allocation
page read and write
25B6E3A2000
heap
page read and write
2A3003F7000
trusted library allocation
page read and write
255D000
stack
page read and write
684000
heap
page read and write
684000
heap
page read and write
7FF6FDE40000
unkown
page readonly
7FF77A351000
unkown
page execute read
2A300697000
unkown
page read and write
2A37CBD2000
heap
page read and write
2FE4000
heap
page read and write
278A9BCF000
heap
page read and write
5771000
unkown
page read and write
4F21000
unkown
page read and write
2A37CD2B000
heap
page read and write
2A37F5C2000
heap
page read and write
2836000
heap
page read and write
278A9BD4000
heap
page read and write
4EA9000
direct allocation
page read and write
9AC41FF000
stack
page read and write
2A300586000
unkown
page read and write
2830000
heap
page read and write
4D80000
direct allocation
page read and write
25B6FE10000
heap
page read and write
2FE4000
heap
page read and write
7FF6FE3D9000
unkown
page readonly
225852C0000
trusted library allocation
page read and write
7FF6FE3D9000
unkown
page readonly
7FF77AB74000
unkown
page read and write
278A9BD1000
heap
page read and write
2B00000
heap
page read and write
2AB7000
heap
page read and write
3354000
heap
page read and write
48BAB2C000
stack
page read and write
684000
heap
page read and write
51EE000
stack
page read and write
7FF6FE68C000
unkown
page readonly
3010000
heap
page read and write
684000
heap
page read and write
2FE4000
heap
page read and write
2990000
heap
page read and write
81C210F000
stack
page read and write
4F21000
unkown
page read and write
25B70CFE000
unkown
page read and write
684000
heap
page read and write
2CA7000
unkown
page readonly
278A83BB000
heap
page read and write
58A0000
unkown
page read and write
7FF6FDE40000
unkown
page readonly
7FF6FE642000
unkown
page read and write
278A8295000
heap
page read and write
22581CF4000
heap
page read and write
46A0000
heap
page read and write
2A37F4B6000
heap
page read and write
684000
heap
page read and write
25B6E397000
heap
page read and write
DBC49FF000
stack
page read and write
5771000
unkown
page read and write
51A0000
heap
page read and write
255D000
stack
page read and write
2FE4000
heap
page read and write
3124000
heap
page read and write
2258563F000
unkown
page read and write
684000
heap
page read and write
278AEA66000
trusted library allocation
page read and write
6CD000
unkown
page read and write
2A37CBA3000
heap
page read and write
58D0000
heap
page read and write
4F21000
unkown
page read and write
2FE4000
heap
page read and write
25B70CB5000
unkown
page read and write
3124000
heap
page read and write
278A9B60000
heap
page read and write
2C3D000
stack
page read and write
278A83B0000
heap
page read and write
4F21000
unkown
page read and write
4F21000
unkown
page read and write
25B6E1E0000
heap
page read and write
2FE4000
heap
page read and write
25B6E575000
heap
page read and write
7FF6FDE41000
unkown
page execute read
4760000
trusted library allocation
page read and write
3140000
heap
page read and write
2A30040E000
unkown
page read and write
278A822C000
heap
page read and write
4F21000
unkown
page read and write
7FF6FE623000
unkown
page write copy
3124000
heap
page read and write
34B4000
heap
page read and write
4F21000
unkown
page read and write
25B70DEF000
heap
page read and write
25B70CA5000
heap
page read and write
22581C4B000
heap
page read and write
5480000
unkown
page read and write
22583644000
heap
page read and write
7FF77AB9C000
unkown
page readonly
684000
heap
page read and write
684000
heap
page read and write
2AFF000
stack
page read and write
25B71A00000
trusted library allocation
page read and write
22581E55000
heap
page read and write
3124000
heap
page read and write
54F0000
direct allocation
page read and write
48BAEFE000
stack
page read and write
4C59000
trusted library allocation
page read and write
2A37F309000
unkown
page read and write
278A9BC2000
heap
page read and write
4880000
direct allocation
page read and write
278AB7D7000
heap
page read and write
684000
heap
page read and write
4400000
heap
page read and write
4C30000
unkown
page read and write
332E000
stack
page read and write
7FF6FE636000
unkown
page read and write
2A37F5F2000
heap
page read and write
3124000
heap
page read and write
278A9D13000
heap
page read and write
278A827B000
heap
page read and write
5430000
unkown
page read and write
333E000
stack
page read and write
7FF77AB2C000
unkown
page write copy
22584A36000
heap
page read and write
684000
heap
page read and write
2A300200000
trusted library allocation
page read and write
4F21000
unkown
page read and write
278A83B5000
heap
page read and write
2A37CBF2000
heap
page read and write
7FF6FDE40000
unkown
page readonly
225844E6000
unkown
page read and write
81C26FD000
stack
page read and write
278AEB03000
unkown
page read and write
2AEB000
stack
page read and write
58C0000
unkown
page read and write
684000
heap
page read and write
25B71800000
trusted library allocation
page read and write
4F21000
unkown
page read and write
34B4000
heap
page read and write
684000
heap
page read and write
3124000
heap
page read and write
7FF6FE68C000
unkown
page readonly
278A9BCF000
heap
page read and write
2FE0000
heap
page read and write
48BB0FD000
stack
page read and write
568E000
direct allocation
page read and write
278ABA7C000
heap
page read and write
25B71D78000
unkown
page read and write
2FE4000
heap
page read and write
25E7000
unkown
page read and write
4F21000
unkown
page read and write
4F21000
unkown
page read and write
3124000
heap
page read and write
278A8287000
heap
page read and write
278A9BBF000
heap
page read and write
2FE4000
heap
page read and write
3137000
heap
page read and write
2C50000
heap
page read and write
555E000
direct allocation
page read and write
22581C9F000
heap
page read and write
25B6E4DA000
heap
page read and write
338A000
heap
page read and write
684000
heap
page read and write
25FD000
unkown
page write copy
278A8226000
heap
page read and write
4F21000
unkown
page read and write
4F21000
unkown
page read and write
30F0000
heap
page read and write
7FF6FE3D9000
unkown
page readonly
684000
heap
page read and write
2A300366000
trusted library allocation
page read and write
48D0000
trusted library allocation
page read and write
2A37CBBC000
heap
page read and write
22581C46000
heap
page read and write
25B6E2E0000
heap
page read and write
3124000
heap
page read and write
2C58000
heap
page read and write
4F20000
unkown
page read and write
3124000
heap
page read and write
52EF000
stack
page read and write
9AC42FE000
stack
page read and write
2A37F352000
unkown
page read and write
4B8E000
direct allocation
page read and write
4F21000
unkown
page read and write
278A83A0000
heap
page read and write
7FF6FE664000
unkown
page read and write
There are 553 hidden memdumps, click here to show them.