IOC Report
audio.mp3

loading gif

Files

File Path
Type
Category
Malicious
audio.mp3
MPEG ADTS, layer III, v2, 24 kbps, 16 kHz, Monaural
initial sample
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\MediaPlayer.db
SQLite 3.x database, last written using SQLite version 3033000, writer version 2, read version 2, file counter 1, database pages 1, cookie 0, schema 0, unknown 0 encoding, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\MediaPlayer.db-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\MediaPlayer.db-shm
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\MediaPlayer.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\Settings\settings.dat
MS Windows registry file, NT/2000 or above
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\Settings\settings.dat.LOG1
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files\WindowsApps\Microsoft.ZuneMusic_11.2402.6.0_x64__8wekyb3d8bbwe\Microsoft.Media.Player.exe
"C:\Program Files\WindowsApps\Microsoft.ZuneMusic_11.2402.6.0_x64__8wekyb3d8bbwe\Microsoft.Media.Player.exe" -ServerName:Microsoft.ZuneMusic.AppXr954g6gg1tvs748d5g67zt981dvpmnr6.mca
malicious

URLs

Name
IP
Malicious
https://github.com/dotnet/corefx/tree/53eb6703edaf54d3b3f8eb2911325824b010049bD
unknown
https://musicmatch-ssl.xboxlive.com/en-US/albums/suggest
unknown
https://musicmatch-ssl.xboxlive.com/en-US/tracks/match
unknown
https://github.com/dotnet/corefx/tree/53eb6703edaf54d3b3f8eb2911325824b010049b
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{b121a362-33bc-1c03-4969-2695d6bdf546}\LocalState
Music.LastQueryTime
\REGISTRY\A\{b121a362-33bc-1c03-4969-2695d6bdf546}\LocalState
Video.LastQueryTime
\REGISTRY\A\{b121a362-33bc-1c03-4969-2695d6bdf546}\LocalState
Video.LibraryDefinition
\REGISTRY\A\{b121a362-33bc-1c03-4969-2695d6bdf546}\LocalState
Music.LibraryDefinition
\REGISTRY\A\{b121a362-33bc-1c03-4969-2695d6bdf546}\LocalState
UniqueDeviceId
\REGISTRY\A\{b121a362-33bc-1c03-4969-2695d6bdf546}\LocalState
LocalImageCacheCleanupLastElapsedDate
\REGISTRY\A\{b121a362-33bc-1c03-4969-2695d6bdf546}\LocalState
LastAppReportComputationDate
\REGISTRY\A\{b121a362-33bc-1c03-4969-2695d6bdf546}\LocalState
Music.LastQueryTime
\REGISTRY\A\{b121a362-33bc-1c03-4969-2695d6bdf546}\LocalState
Video.LastQueryTime

Memdumps

Base Address
Regiontype
Protect
Malicious
2CCF8100000
heap
page read and write
2CCEB320000
trusted library allocation
page read and write
2CCF6490000
trusted library allocation
page read and write
2CCF72B7000
heap
page read and write
2CCEBEC9000
heap
page read and write
2CCF6379000
heap
page read and write
2CCF71FF000
heap
page read and write
2CCF7115000
heap
page read and write
2CCF72B7000
heap
page read and write
7FFE2059F000
unkown
page read and write
DB542FF000
stack
page read and write
2CCF55C0000
trusted library allocation
page read and write
2CCEBF66000
heap
page read and write
2CCF5691000
heap
page read and write
2CCD309B000
heap
page read and write
2CCF6420000
trusted library allocation
page read and write
2CCF7903000
heap
page read and write
2CCF5664000
heap
page read and write
2CCF6800000
heap
page read and write
2CCF7377000
heap
page read and write
2CCEBD25000
heap
page read and write
2CCF7958000
heap
page read and write
2CCF57A4000
heap
page read and write
2CCF8223000
heap
page read and write
2CCF8202000
heap
page read and write
2CCF720E000
heap
page read and write
2CCF7073000
heap
page read and write
2CCF55A0000
trusted library allocation
page read and write
2CCF6F20000
trusted library allocation
page read and write
2CCF6450000
trusted library allocation
page read and write
2CCEBD00000
heap
page read and write
2CCF72D8000
heap
page read and write
2CCEBBF0000
trusted library allocation
page read and write
2CCF70F6000
heap
page read and write
2CCF6F70000
trusted library allocation
page read and write
2CCF7B02000
heap
page read and write
2CCF682B000
heap
page read and write
DB544FD000
stack
page read and write
2CCF8365000
heap
page read and write
2CCF7854000
heap
page read and write
2CCD2F50000
heap
page read and write
2CCF70FA000
heap
page read and write
2CCF7157000
heap
page read and write
2CCEBBE0000
trusted library allocation
page read and write
DB52CFB000
stack
page read and write
2CCF6270000
heap
page read and write
2CCF5637000
heap
page read and write
2CCF7366000
heap
page read and write
2CCF71CF000
heap
page read and write
2CCF7076000
heap
page read and write
DB53CF8000
stack
page read and write
2CCEBD5F000
heap
page read and write
2CCF7A02000
heap
page read and write
2CCEBD12000
heap
page read and write
2CCF6F30000
trusted library allocation
page read and write
2CCD307E000
heap
page read and write
2CCF8344000
heap
page read and write
2CCF69F0000
heap
page read and write
2CCF7800000
heap
page read and write
2CCF57AA000
heap
page read and write
2CCF6913000
heap
page read and write
2CCD315B000
heap
page read and write
2CCF72E3000
heap
page read and write
2CCF733D000
heap
page read and write
2CCF7399000
heap
page read and write
7FFE20590000
unkown
page readonly
2CCEBD17000
heap
page read and write
2CCF60C0000
trusted library allocation
page read and write
2CCEE410000
trusted library allocation
page read and write
2CCEBF51000
heap
page read and write
2CCF82A3000
heap
page read and write
2CCF561F000
heap
page read and write
7FFDF9CB0000
unkown
page readonly
2CCEBD1B000
heap
page read and write
2CCF7361000
heap
page read and write
2CCF7D02000
heap
page read and write
2CCF60A0000
trusted library allocation
page read and write
2CCD30AC000
heap
page read and write
2CCEB350000
trusted library allocation
page read and write
2CCF710B000
heap
page read and write
2CCF6FD0000
trusted library allocation
page read and write
2CCD3124000
heap
page read and write
2CCF668C000
heap
page read and write
2CCF7F02000
heap
page read and write
2CCF70D4000
heap
page read and write
2CCF8292000
heap
page read and write
2CCF735A000
heap
page read and write
2CCF727F000
heap
page read and write
2CCF6430000
trusted library allocation
page read and write
2CCF8386000
heap
page read and write
2CCF6900000
heap
page read and write
2CCF65D0000
heap
page read and write
2CCF716D000
heap
page read and write
2CCF824F000
heap
page read and write
2CCF82DD000
heap
page read and write
2CCF7D00000
heap
page read and write
2CCEBED0000
heap
page read and write
2CCF680A000
heap
page read and write
2CCF8224000
heap
page read and write
2CCD31D3000
heap
page read and write
2CCF7BFC000
heap
page read and write
2CCF6955000
heap
page read and write
2CCF8323000
heap
page read and write
2CCF6F10000
trusted library allocation
page read and write
2CCF78D7000
heap
page read and write
2CCF57E7000
heap
page read and write
2CCF833D000
heap
page read and write
2CCF5748000
heap
page read and write
2CCF705F000
heap
page read and write
2CCF7DD9000
heap
page read and write
2CCF70F2000
heap
page read and write
2CCF6F50000
trusted library allocation
page read and write
2CCF78AA000
heap
page read and write
2CCF6858000
heap
page read and write
2CCEC010000
heap
page read and write
2CCF61D0000
trusted library allocation
page read and write
2CCF70F6000
heap
page read and write
2CCE3321000
trusted library allocation
page read and write
2CCF6F40000
trusted library allocation
page read and write
DB537FE000
stack
page read and write
DB534F3000
stack
page read and write
2CCF72DE000
heap
page read and write
2CCF72CD000
heap
page read and write
2CCD3189000
heap
page read and write
2CCF7200000
heap
page read and write
7FFE20591000
unkown
page execute read
2CCD36DF000
trusted library allocation
page read and write
2CCEBD37000
heap
page read and write
2CCF72DA000
heap
page read and write
2CCF8081000
heap
page read and write
2CCEC110000
heap
page read and write
2CCF72A6000
heap
page read and write
2CCD315F000
heap
page read and write
2CCD30D5000
heap
page read and write
2CCEBD64000
heap
page read and write
2CCEBFD4000
heap
page read and write
2CCF8300000
heap
page read and write
2CCF711F000
heap
page read and write
2CCF72DF000
heap
page read and write
2CCF7DAC000
heap
page read and write
2CCD3110000
heap
page read and write
2CCEBFD5000
heap
page read and write
2CCF715A000
heap
page read and write
2CCF8400000
heap
page read and write
2CCF792D000
heap
page read and write
2CCF6F90000
trusted library allocation
page read and write
2CCF73BA000
heap
page read and write
2CCF7223000
heap
page read and write
7FFDF9CB1000
unkown
page execute read
2CCF832E000
heap
page read and write
2CCF6E80000
heap
page read and write
2CCF70E0000
heap
page read and write
2CCF7500000
trusted library allocation
page read and write
2CCF8365000
heap
page read and write
2CCF7C81000
heap
page read and write
2CCF5676000
heap
page read and write
2CCF6F40000
trusted library allocation
page read and write
2CCF7313000
heap
page read and write
2CCF6A72000
trusted library allocation
page read and write
2CCF631B000
heap
page read and write
2CCF732A000
heap
page read and write
2CCF8181000
heap
page read and write
2CCEBF71000
heap
page read and write
2CCF5624000
heap
page read and write
2CCF7534000
trusted library allocation
page read and write
2CCF560E000
heap
page read and write
2CCEBD6C000
heap
page read and write
7FFDF9E2D000
unkown
page read and write
2CCF66E2000
heap
page read and write
2CCF7370000
heap
page read and write
2CCF82E4000
heap
page read and write
2CCF7E02000
heap
page read and write
2CCF57E4000
heap
page read and write
2CCF6A40000
trusted library allocation
page read and write
2CCEBE00000
heap
page read and write
2CCD388D000
trusted library allocation
page read and write
2CCF78D5000
heap
page read and write
2CCF71FF000
heap
page read and write
2CCF71CF000
heap
page read and write
2CCD3113000
heap
page read and write
2CCF7363000
heap
page read and write
2CCD2FD0000
trusted library allocation
page read and write
2CCF566E000
heap
page read and write
2CCF72D6000
heap
page read and write
2CCD3067000
heap
page read and write
2CCF621D000
heap
page read and write
2CCF792D000
heap
page read and write
2CCF579F000
heap
page read and write
2CCD31E9000
heap
page read and write
2CCF735B000
heap
page read and write
2CCF65A0000
trusted library allocation
page read and write
2CCF8216000
heap
page read and write
2CCF6392000
heap
page read and write
2CCF6203000
heap
page read and write
2CCD3162000
heap
page read and write
2CCD3871000
trusted library allocation
page read and write
2CCF6A20000
trusted library allocation
page read and write
2CCD387A000
trusted library allocation
page read and write
2CCF6944000
heap
page read and write
2CCF667B000
heap
page read and write
2CCF7E00000
heap
page read and write
2CCEBB30000
trusted library allocation
page read and write
2CCF7F81000
heap
page read and write
2CCD3ABB000
trusted library allocation
page read and write
2CCF71CF000
heap
page read and write
2CCF6400000
trusted library allocation
page read and write
2CCF74F8000
unkown
page execute read
2CCF6226000
heap
page read and write
2CCD3885000
trusted library allocation
page read and write
2CCF71CF000
heap
page read and write
2CCF6214000
heap
page read and write
2CCF7802000
heap
page read and write
7FFE205A0000
unkown
page readonly
2CCD3135000
heap
page read and write
2CCEBF64000
heap
page read and write
2CCF8402000
heap
page read and write
2CCF6090000
unkown
page read and write
2CCD2FF0000
trusted library allocation
page read and write
2CCF8328000
heap
page read and write
2CCF7154000
heap
page read and write
2CCEBD55000
heap
page read and write
2CCEBC02000
heap
page read and write
2CCF7980000
heap
page read and write
2CCF727E000
heap
page read and write
2CCF7902000
heap
page read and write
2CCF72DE000
heap
page read and write
2CCF6633000
heap
page read and write
2CCD3172000
heap
page read and write
2CCD31F4000
heap
page read and write
2CCF6869000
heap
page read and write
2CCF8302000
heap
page read and write
2CCF73DC000
heap
page read and write
2CCF703A000
heap
page read and write
2CCF8243000
heap
page read and write
2CCF6560000
trusted library allocation
page read and write
2CCF6674000
heap
page read and write
2CCF7134000
heap
page read and write
2CCF74FD000
unkown
page execute read
2CCF6200000
heap
page read and write
2CCF8102000
heap
page read and write
2CCF7266000
heap
page read and write
2CCEBEBF000
heap
page read and write
7FFDF9DC8000
unkown
page readonly
2CCF73B2000
heap
page read and write
2CCF8260000
heap
page read and write
2CCEBDD4000
heap
page read and write
2CCD317B000
heap
page read and write
2CCF7B00000
heap
page read and write
2CCF61F0000
trusted library allocation
page read and write
2CCF7175000
heap
page read and write
2CCF6600000
heap
page read and write
2CCF7134000
heap
page read and write
2CCF7346000
heap
page read and write
2CCF71D4000
heap
page read and write
2CCF736A000
heap
page read and write
2CCF7113000
heap
page read and write
2CCF72BF000
heap
page read and write
2CCD3093000
heap
page read and write
2CCF7980000
heap
page read and write
2CCF8000000
heap
page read and write
2CCF710A000
heap
page read and write
2CCF7223000
heap
page read and write
2CCEBD4C000
heap
page read and write
2CCF8200000
heap
page read and write
2CCF5743000
heap
page read and write
2CCF71CF000
heap
page read and write
2CCEBFE9000
heap
page read and write
2CCEBFBF000
heap
page read and write
2CCF71CF000
heap
page read and write
2CCF68F1000
heap
page read and write
2CCEBF99000
heap
page read and write
DB52FFE000
stack
page read and write
2CCF7DD7000
heap
page read and write
2CCF5623000
heap
page read and write
2CCF7970000
heap
page read and write
2CCF57BA000
heap
page read and write
2CCF574E000
heap
page read and write
2CCD2EE0000
heap
page read and write
DB531FD000
stack
page read and write
2CCD31AF000
heap
page read and write
2CCF725A000
heap
page read and write
2CCF8202000
heap
page read and write
2CCF732C000
heap
page read and write
2CCF68CD000
heap
page read and write
2CCF6A30000
trusted library allocation
page read and write
2CCF6245000
heap
page read and write
2CCF5717000
heap
page read and write
2CCF63F1000
heap
page read and write
2CCD3000000
heap
page read and write
2CCD30CA000
heap
page read and write
2CCF7F00000
heap
page read and write
2CCF6460000
trusted library allocation
page read and write
2CCEBE23000
heap
page read and write
2CCF8002000
heap
page read and write
2CCF73CB000
heap
page read and write
2CCF5E10000
trusted library allocation
page read and write
2CCF78D7000
heap
page read and write
2CCF7331000
heap
page read and write
2CCF6F60000
trusted library allocation
page read and write
2CCF79AB000
heap
page read and write
2CCF66BF000
heap
page read and write
2CCF7958000
heap
page read and write
2CCF6410000
trusted library allocation
page read and write
2CCF7388000
heap
page read and write
2CCF623C000
heap
page read and write
7FFDF9E30000
unkown
page readonly
2CCEBE2D000
heap
page read and write
2CCF6848000
heap
page read and write
2CCF7510000
trusted library allocation
page read and write
2CCF7366000
heap
page read and write
2CCF7900000
heap
page read and write
2CCF68D8000
heap
page read and write
2CCD31E4000
heap
page read and write
2CCF72CE000
heap
page read and write
2CCF6F80000
trusted library allocation
page read and write
2CCEBF0A000
heap
page read and write
2CCF73ED000
heap
page read and write
2CCD3011000
heap
page read and write
2CCF622F000
heap
page read and write
2CCF7000000
heap
page read and write
2CCEBD66000
heap
page read and write
2CCD30E6000
heap
page read and write
2CCF6321000
heap
page read and write
2CCD3AC1000
trusted library allocation
page read and write
2CCF56F7000
heap
page read and write
2CCEC000000
heap
page read and write
2CCF6FF0000
heap
page read and write
2CCD3148000
heap
page read and write
2CCF57C0000
heap
page read and write
DB52DFD000
stack
page read and write
2CCF62E6000
heap
page read and write
2CCF6371000
heap
page read and write
2CCF57EA000
heap
page read and write
2CCF709F000
heap
page read and write
2CCF72D6000
heap
page read and write
2CCF60B0000
trusted library allocation
page read and write
2CCF7C02000
heap
page read and write
2CCF7181000
heap
page read and write
2CCF6A00000
trusted library allocation
page read and write
2CCF7A81000
heap
page read and write
2CCF70FA000
heap
page read and write
2CCD3020000
heap
page read and write
2CCF8203000
heap
page read and write
2CCEBD1F000
heap
page read and write
2CCEBD58000
heap
page read and write
2CCF625C000
heap
page read and write
2CCEBF02000
heap
page read and write
2CCF57C2000
heap
page read and write
7FFDF9E43000
unkown
page readonly
2CCF56A7000
heap
page read and write
2CCF5632000
heap
page read and write
2CCD31C5000
heap
page read and write
2CCEBB40000
heap
page read and write
2CCF7129000
heap
page read and write
2CCF72DA000
heap
page read and write
2CCF61E0000
trusted library allocation
page read and write
DB52EFF000
stack
page read and write
2CCF70F0000
heap
page read and write
2CCF5600000
heap
page read and write
2CCD30D2000
heap
page read and write
2CCF6FB0000
trusted library allocation
page read and write
2CCF7958000
heap
page read and write
2CCF7313000
heap
page read and write
2CCF7E81000
heap
page read and write
2CCF7335000
heap
page read and write
2CCF6E60000
heap
page read and write
2CCD31C0000
heap
page read and write
2CCD3026000
heap
page read and write
2CCD33F8000
trusted library allocation
page read and write
2CCF73CB000
heap
page read and write
2CCF710A000
heap
page read and write
2CCEBF91000
heap
page read and write
2CCF710F000
heap
page read and write
2CCF7BFC000
heap
page read and write
2CCF7300000
heap
page read and write
2CCF8281000
heap
page read and write
2CCD3054000
heap
page read and write
2CCF7813000
heap
page read and write
2CCF716D000
heap
page read and write
2CCD2F90000
heap
page read and write
7FFE2059A000
unkown
page readonly
2CCF5F60000
trusted library allocation
page read and write
2CCD310B000
heap
page read and write
2CCF78AA000
heap
page read and write
2CCF7958000
heap
page read and write
DB536FF000
stack
page read and write
2CCF73A8000
heap
page read and write
2CCF6234000
heap
page read and write
2CCF5754000
heap
page read and write
2CCF736D000
heap
page read and write
2CCD3013000
heap
page read and write
2CCF7A00000
heap
page read and write
2CCF7181000
heap
page read and write
2CCD3022000
heap
page read and write
2CCF6A10000
trusted library allocation
page read and write
2CCF6080000
trusted library allocation
page read and write
2CCF6360000
heap
page read and write
2CCF7025000
heap
page read and write
2CCEBF77000
heap
page read and write
2CCF8365000
heap
page read and write
2CCF710F000
heap
page read and write
2CCEBE34000
heap
page read and write
2CCF7958000
heap
page read and write
2CCEBF92000
heap
page read and write
2CCEBFDD000
heap
page read and write
2CCF8249000
heap
page read and write
2CCF72BB000
heap
page read and write
2CCF7322000
heap
page read and write
2CCF6440000
trusted library allocation
page read and write
2CCF6702000
heap
page read and write
2CCEBEFC000
heap
page read and write
2CCF6590000
trusted library allocation
page read and write
2CCD3321000
trusted library allocation
page read and write
2CCF8365000
heap
page read and write
2CCF83A7000
heap
page read and write
2CCF7C00000
heap
page read and write
DB541FE000
stack
page read and write
2CCEBB80000
trusted library allocation
page read and write
2CCF7333000
heap
page read and write
2CCF7248000
heap
page read and write
2CCF6550000
trusted library allocation
page read and write
There are 411 hidden memdumps, click here to show them.