IOC Report
#U821e#U8e48 #U4e66#U7b80 .mp3

loading gif

Files

File Path
Type
Category
Malicious
#U821e#U8e48 #U4e66#U7b80 .mp3
Audio file with ID3 version 2.3.0, contains: MPEG ADTS, layer III, v1, 128 kbps, 44.1 kHz, JntStereo
initial sample
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\MediaPlayer.db
SQLite 3.x database, last written using SQLite version 3033000, writer version 2, read version 2, file counter 1, database pages 1, cookie 0, schema 0, unknown 0 encoding, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\MediaPlayer.db-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\MediaPlayer.db-shm
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\MediaPlayer.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\Settings\settings.dat
MS Windows registry file, NT/2000 or above
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\Settings\settings.dat.LOG1
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files\WindowsApps\Microsoft.ZuneMusic_11.2305.4.0_x64__8wekyb3d8bbwe\Microsoft.Media.Player.exe
"C:\Program Files\WindowsApps\Microsoft.ZuneMusic_11.2305.4.0_x64__8wekyb3d8bbwe\Microsoft.Media.Player.exe" -ServerName:Microsoft.ZuneMusic.AppXr954g6gg1tvs748d5g67zt981dvpmnr6.mca
malicious

URLs

Name
IP
Malicious
https://musicmatch-ssl.xboxlive.com/en-US/albums/suggest
unknown
https://musicmatch-ssl.xboxlive.com/en-US/tracks/match
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{65a61f76-d534-2372-26bf-c54b1119a6f1}\LocalState
Music.LastQueryTime
\REGISTRY\A\{65a61f76-d534-2372-26bf-c54b1119a6f1}\LocalState
Video.LastQueryTime
\REGISTRY\A\{65a61f76-d534-2372-26bf-c54b1119a6f1}\LocalState
Video.LibraryDefinition
\REGISTRY\A\{65a61f76-d534-2372-26bf-c54b1119a6f1}\LocalState
Music.LibraryDefinition
\REGISTRY\A\{65a61f76-d534-2372-26bf-c54b1119a6f1}\LocalState
UniqueDeviceId
\REGISTRY\A\{65a61f76-d534-2372-26bf-c54b1119a6f1}\LocalState
LastAppReportComputationDate
\REGISTRY\A\{65a61f76-d534-2372-26bf-c54b1119a6f1}\LocalState
LocalImageCacheCleanupLastElapsedDate
\REGISTRY\A\{65a61f76-d534-2372-26bf-c54b1119a6f1}\LocalState
Music.LastQueryTime
\REGISTRY\A\{65a61f76-d534-2372-26bf-c54b1119a6f1}\LocalState
Video.LastQueryTime

Memdumps

Base Address
Regiontype
Protect
Malicious
2A9511DD000
heap
page read and write
2A92C400000
heap
page read and write
2A9505C1000
heap
page read and write
2A92C5F6000
heap
page read and write
2A944FE0000
trusted library allocation
page read and write
2A94EB4A000
heap
page read and write
B62CBFE000
stack
page read and write
2A92C42C000
heap
page read and write
2A95073A000
heap
page read and write
2A9511DD000
heap
page read and write
2A947F45000
heap
page read and write
2A94FB76000
heap
page read and write
2A950C38000
heap
page read and write
2A950C35000
heap
page read and write
2A950F8E000
heap
page read and write
2A94C495000
heap
page read and write
2A94F4D0000
trusted library allocation
page read and write
B62ACFF000
stack
page read and write
2A94C4F8000
heap
page read and write
2A94F650000
heap
page read and write
2A947F58000
heap
page read and write
2A92C50B000
heap
page read and write
2A94C4DE000
heap
page read and write
B62A9F9000
stack
page read and write
B62C4FD000
stack
page read and write
2A947F4D000
heap
page read and write
2A950534000
heap
page read and write
2A94C553000
heap
page read and write
2A95043C000
heap
page read and write
2A94FACF000
heap
page read and write
2A95076E000
heap
page read and write
2A92C428000
heap
page read and write
2A94C483000
heap
page read and write
2A94FF46000
heap
page read and write
2A94F4E0000
trusted library allocation
page read and write
2A950C06000
heap
page read and write
B62AFFA000
stack
page read and write
2A92C4EC000
heap
page read and write
2A94C58E000
heap
page read and write
2A950C20000
heap
page read and write
2A947F53000
heap
page read and write
2A92C454000
heap
page read and write
2A94EAB9000
heap
page read and write
B62ADFE000
stack
page read and write
B62B0FB000
stack
page read and write
B62A6FA000
stack
page read and write
2A94F9C0000
trusted library allocation
page read and write
2A951100000
heap
page read and write
2A94EA00000
heap
page read and write
2A950600000
heap
page read and write
2A94F639000
heap
page read and write
2A950513000
heap
page read and write
2A94FD70000
trusted library allocation
page read and write
2A94FC60000
trusted library allocation
page read and write
2A950743000
heap
page read and write
2A94C557000
heap
page read and write
2A950D4E000
heap
page read and write
2A950413000
heap
page read and write
2A94FF00000
heap
page read and write
2A92C3C0000
heap
page read and write
2A94EBC1000
heap
page read and write
2A94FC40000
trusted library allocation
page read and write
2A94F60C000
heap
page read and write
2A95067B000
heap
page read and write
2A94FC80000
heap
page read and write
2A947DB0000
trusted library allocation
page read and write
2A950CB8000
heap
page read and write
2A950C0E000
heap
page read and write
B62C6FE000
stack
page read and write
2A950D00000
heap
page read and write
B62C1FE000
stack
page read and write
2A94F850000
trusted library allocation
page read and write
2A950523000
heap
page read and write
2A94C5A8000
heap
page read and write
2A94C4A7000
heap
page read and write
2A94FFCE000
heap
page read and write
2A94C54A000
heap
page read and write
2A94F4C0000
trusted library allocation
page read and write
2A94F5F0000
trusted library allocation
page read and write
B62A3FF000
stack
page read and write
2A94F800000
trusted library allocation
page read and write
2A9505A0000
heap
page read and write
2A92C55E000
heap
page read and write
B62C8FD000
stack
page read and write
2A9505E2000
heap
page read and write
2A92CB84000
trusted library allocation
page read and write
2A950481000
heap
page read and write
2A95045F000
heap
page read and write
2A94FB53000
heap
page read and write
2A950C16000
heap
page read and write
2A94C4CE000
heap
page read and write
2A947410000
trusted library allocation
page read and write
2A947F42000
heap
page read and write
2A94FD60000
trusted library allocation
page read and write
2A951200000
heap
page read and write
2A92C7F8000
trusted library allocation
page read and write
B62A2FB000
stack
page read and write
2A945010000
heap
page read and write
2A950FC0000
heap
page read and write
2A94FBEC000
heap
page read and write
2A94EBCD000
heap
page read and write
2A94F4B0000
unkown
page read and write
2A92C4B6000
heap
page read and write
2A92C57A000
heap
page read and write
2A94F9B0000
trusted library allocation
page read and write
2A94EA13000
heap
page read and write
2A94EA6E000
heap
page read and write
2A92C467000
heap
page read and write
B62BCFA000
stack
page read and write
2A950D23000
heap
page read and write
2A94C499000
heap
page read and write
2A950498000
heap
page read and write
2A950E30000
heap
page read and write
2A94F615000
heap
page read and write
2A94EBA9000
heap
page read and write
2A92C721000
trusted library allocation
page read and write
2A92C426000
heap
page read and write
B62C7FD000
stack
page read and write
2A92CFE6000
trusted library allocation
page read and write
2A94EA26000
heap
page read and write
2A94F603000
heap
page read and write
2A947F51000
heap
page read and write
2A94F980000
trusted library allocation
page read and write
2A950D02000
heap
page read and write
B62BBFB000
stack
page read and write
2A9505FF000
heap
page read and write
2A9506AD000
heap
page read and write
2A94F890000
trusted library allocation
page read and write
B62AEFE000
stack
page read and write
2A950E30000
heap
page read and write
2A95068C000
heap
page read and write
2A94FB00000
heap
page read and write
2A95128B000
heap
page read and write
B62B7FE000
stack
page read and write
2A94EBFE000
heap
page read and write
2A9504F7000
heap
page read and write
2A950C12000
heap
page read and write
2A950C61000
heap
page read and write
2A944F40000
trusted library allocation
page read and write
2A94F250000
trusted library allocation
page read and write
2A92D03C000
trusted library allocation
page read and write
2A9507FD000
heap
page read and write
2A94FDD0000
trusted library allocation
page read and write
B62B9FD000
stack
page read and write
2A94FD90000
trusted library allocation
page read and write
2A94EAEE000
heap
page read and write
2A92C4E2000
heap
page read and write
2A94FBCF000
heap
page read and write
2A94C4E7000
heap
page read and write
2A94C4ED000
heap
page read and write
2A94C540000
heap
page read and write
2A950700000
heap
page read and write
2A94F880000
trusted library allocation
page read and write
B62A5FF000
stack
page read and write
B62BAFC000
stack
page read and write
2A94FF13000
heap
page read and write
2A92C5D4000
heap
page read and write
2A92C523000
heap
page read and write
2A94F7DA000
heap
page read and write
2A94F830000
trusted library allocation
page read and write
2A92C47F000
heap
page read and write
2A95050A000
heap
page read and write
2A947D80000
trusted library allocation
page read and write
2A947FC1000
heap
page read and write
2A950400000
heap
page read and write
2A944720000
trusted library allocation
page read and write
2A94F647000
heap
page read and write
2A92D046000
trusted library allocation
page read and write
2A94C51C000
heap
page read and write
2A94FA45000
heap
page read and write
2A94C551000
heap
page read and write
2A947F19000
heap
page read and write
2A947F00000
heap
page read and write
2A9505D3000
heap
page read and write
B62CAFD000
stack
page read and write
2A92CB54000
trusted library allocation
page read and write
2A94C566000
heap
page read and write
2A950C96000
heap
page read and write
2A94EBDD000
heap
page read and write
2A950A10000
trusted library allocation
page read and write
2A94F8C0000
trusted library allocation
page read and write
2A92C5C1000
heap
page read and write
2A94C566000
heap
page read and write
2A95076E000
heap
page read and write
2A94EBC7000
heap
page read and write
2A95065E000
heap
page read and write
2A94EBB9000
heap
page read and write
2A94EBC3000
heap
page read and write
2A94FA83000
heap
page read and write
2A944F60000
trusted library allocation
page read and write
2A9505FB000
heap
page read and write
2A94EBF7000
heap
page read and write
2A92C4C4000
heap
page read and write
2A94FA69000
heap
page read and write
2A94F61E000
heap
page read and write
2A950C1E000
heap
page read and write
2A944A90000
trusted library allocation
page read and write
2A947F31000
heap
page read and write
2A94C575000
heap
page read and write
2A944750000
trusted library allocation
page read and write
2A94F630000
heap
page read and write
2A950C24000
heap
page read and write
2A950C45000
heap
page read and write
2A9505A0000
heap
page read and write
2A94F240000
trusted library allocation
page read and write
2A950656000
heap
page read and write
2A94EA02000
heap
page read and write
2A92C49C000
heap
page read and write
2A947F1C000
heap
page read and write
B62C5FD000
stack
page read and write
2A94C51B000
heap
page read and write
2A94C557000
heap
page read and write
2A95051B000
heap
page read and write
2A94C513000
heap
page read and write
2A95054C000
heap
page read and write
2A950800000
trusted library allocation
page read and write
2A94FAF7000
heap
page read and write
2A950C68000
heap
page read and write
2A950C75000
heap
page read and write
2A94C546000
heap
page read and write
2A94EA03000
heap
page read and write
2A92C510000
heap
page read and write
2A94C589000
heap
page read and write
2A94C537000
heap
page read and write
2A92D04C000
trusted library allocation
page read and write
2A950D02000
heap
page read and write
B62B4FB000
stack
page read and write
2A92C5C6000
heap
page read and write
2A947F0C000
heap
page read and write
2A9507FB000
heap
page read and write
2A950A80000
heap
page read and write
B62B8FC000
stack
page read and write
2A92C561000
heap
page read and write
2A94FE02000
heap
page read and write
2A950C67000
heap
page read and write
2A951000000
heap
page read and write
2A94C400000
heap
page read and write
2A95128B000
heap
page read and write
2A92C4C1000
heap
page read and write
2A92C413000
heap
page read and write
2A9506D3000
heap
page read and write
2A94FDF5000
unkown
page execute read
2A950F9F000
heap
page read and write
2A94F870000
trusted library allocation
page read and write
2A94C572000
heap
page read and write
2A9504EB000
heap
page read and write
2A94FA13000
heap
page read and write
2A9505A0000
heap
page read and write
2A94F6DA000
heap
page read and write
2A92C5E5000
heap
page read and write
2A950D6F000
heap
page read and write
B62BFFD000
stack
page read and write
2A94FC00000
heap
page read and write
2A950CD7000
heap
page read and write
2A94C520000
heap
page read and write
2A94C4ED000
heap
page read and write
2A9506E8000
heap
page read and write
2A92C534000
heap
page read and write
2A94F820000
trusted library allocation
page read and write
2A92C4EA000
heap
page read and write
2A947F08000
heap
page read and write
2A950C00000
heap
page read and write
2A94FD80000
trusted library allocation
page read and write
2A947FF0000
heap
page read and write
2A94F840000
trusted library allocation
page read and write
2A92C588000
heap
page read and write
2A94C566000
heap
page read and write
2A94EBA5000
heap
page read and write
2A950D4E000
heap
page read and write
2A950D02000
heap
page read and write
B62C9FD000
stack
page read and write
2A950C44000
heap
page read and write
2A94FDFA000
unkown
page execute read
2A950F6C000
heap
page read and write
2A94C533000
heap
page read and write
2A9504E2000
heap
page read and write
2A94EA43000
heap
page read and write
2A94F713000
heap
page read and write
2A94EB52000
heap
page read and write
2A94EBE9000
heap
page read and write
2A94FDA0000
trusted library allocation
page read and write
2A95078F000
heap
page read and write
B62AAF3000
stack
page read and write
B62A8FF000
stack
page read and write
2A950500000
heap
page read and write
2A950A20000
trusted library allocation
page read and write
2A94FA8F000
heap
page read and write
2A950F7D000
heap
page read and write
2A92C571000
heap
page read and write
2A950470000
heap
page read and write
B62B2F9000
stack
page read and write
2A92C5B0000
heap
page read and write
2A950C0C000
heap
page read and write
2A95052F000
heap
page read and write
2A94FA24000
heap
page read and write
2A94FAA0000
heap
page read and write
B62BDFB000
stack
page read and write
2A94C489000
heap
page read and write
2A92C4CF000
heap
page read and write
2A94FDC0000
trusted library allocation
page read and write
2A94C51C000
heap
page read and write
2A94C524000
heap
page read and write
B62A4FE000
stack
page read and write
2A94EA16000
heap
page read and write
2A94FD50000
trusted library allocation
page read and write
2A94EB3F000
heap
page read and write
2A950659000
heap
page read and write
2A9505EA000
heap
page read and write
2A92C310000
heap
page read and write
2A92D048000
trusted library allocation
page read and write
2A94FF57000
heap
page read and write
2A94F644000
heap
page read and write
2A92CCE5000
trusted library allocation
page read and write
2A92C55A000
heap
page read and write
2A947D70000
trusted library allocation
page read and write
2A94FC30000
trusted library allocation
page read and write
2A94FC50000
trusted library allocation
page read and write
2A950702000
heap
page read and write
2A94F77F000
heap
page read and write
2A94FD30000
trusted library allocation
page read and write
2A94EB13000
heap
page read and write
B62B6FE000
stack
page read and write
2A950022000
trusted library allocation
page read and write
2A94C4EF000
heap
page read and write
2A94C57B000
heap
page read and write
2A950E07000
heap
page read and write
2A95054F000
heap
page read and write
2A94C4AB000
heap
page read and write
2A94EA2D000
heap
page read and write
B62C3FE000
stack
page read and write
2A947E02000
heap
page read and write
2A94C5C0000
heap
page read and write
2A950F00000
heap
page read and write
2A94F764000
heap
page read and write
2A947F12000
heap
page read and write
2A94FA94000
heap
page read and write
2A950DFF000
heap
page read and write
2A95076E000
heap
page read and write
2A9506AA000
heap
page read and write
2A950E00000
heap
page read and write
2A950A50000
trusted library allocation
page read and write
2A950637000
heap
page read and write
2A94C504000
heap
page read and write
B62B3FC000
stack
page read and write
2A92C547000
heap
page read and write
2A94FA88000
heap
page read and write
2A94F810000
trusted library allocation
page read and write
2A94F600000
heap
page read and write
2A92CF12000
trusted library allocation
page read and write
2A950702000
heap
page read and write
2A950D4E000
heap
page read and write
2A94EA37000
heap
page read and write
2A94C4B3000
heap
page read and write
2A94F672000
heap
page read and write
2A94FD40000
trusted library allocation
page read and write
2A94F860000
trusted library allocation
page read and write
2A94EBEE000
heap
page read and write
2A950702000
heap
page read and write
2A92C5EA000
heap
page read and write
2A92C380000
heap
page read and write
2A94C572000
heap
page read and write
2A92CB2C000
trusted library allocation
page read and write
2A9506C2000
heap
page read and write
2A94FCA0000
heap
page read and write
2A950F5B000
heap
page read and write
2A9504DA000
heap
page read and write
2A94C5C8000
heap
page read and write
2A94C5AF000
heap
page read and write
B62A7FD000
stack
page read and write
2A92D03E000
trusted library allocation
page read and write
2A94C544000
heap
page read and write
2A94FBCB000
heap
page read and write
2A950636000
heap
page read and write
2A94F9F0000
trusted library allocation
page read and write
2A92CCEE000
trusted library allocation
page read and write
2A92CED0000
trusted library allocation
page read and write
2A92C513000
heap
page read and write
2A94C4CC000
heap
page read and write
2A94F623000
heap
page read and write
2A94FA00000
heap
page read and write
2A94C58B000
heap
page read and write
2A944F70000
heap
page read and write
There are 372 hidden memdumps, click here to show them.