IOC Report
https://notification.tubecup.net

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\507a0018-3932-4a5b-96fe-a2731e0efb73.tmp
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\623c0a57-e86b-4af5-824e-b13ceb688251.tmp
SysEx File -
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\62962f38-3963-4574-8e86-8fa8440fa427.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\11fe1911-1472-47dd-b2d0-31a95f42e1c9.tmp
UTF-8 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\3dece99f-67b2-4523-84b2-468d1cfd9f9f.tmp
UTF-8 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\407bcaab-67a5-4633-a4be-35303a86ae13.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_metadata\computed_hashes.json
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\000003.log
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network Persistent State (copy)
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Preferences (copy)
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences (copy)
UTF-8 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\99255961-5023-45b4-aad6-a9522b785506.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Network Persistent State (copy)
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000004.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\ee75b3f8-7244-4e76-947f-8e0981c2e23c.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\fdb91b86-1e59-4320-8d3b-c2d83c206505.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State (copy)
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Module Info Cache (copy)
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\a08cea71-11a9-40b2-9686-340d5ba1bb46.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\dbdf84dd-1477-4cb6-853e-952dfd66405d.tmp
ASCII text, with very long lines, with no line terminators
modified
C:\Users\user\AppData\Local\Temp\3037993f-73af-4a17-a47e-bfbf69be8c5a.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\de3730a1-34ab-4b86-905a-f74adb7c8364.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\bg\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\ca\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\cs\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\da\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\de\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\el\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\en\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\en_GB\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\es\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\es_419\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\et\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\fi\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\fil\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\fr\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\hi\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\hr\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\hu\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\id\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\it\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\ja\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\ko\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\lt\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\lv\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\nb\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\nl\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\pl\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\pt_BR\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\pt_PT\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\ro\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\ru\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\sk\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\sl\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\sr\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\sv\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\th\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\tr\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\uk\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\vi\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\zh_CN\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_locales\zh_TW\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\_metadata\verified_contents.json
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\craw_background.js
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\craw_window.js
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\css\craw_window.css
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\html\craw_window.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\images\flapper.gif
GIF image data, version 89a, 30 x 30
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\images\icon_128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\images\icon_16.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\images\topbar_floating_button.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\images\topbar_floating_button_close.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\images\topbar_floating_button_hover.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\images\topbar_floating_button_maximize.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\images\topbar_floating_button_pressed.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\CRX_INSTALL\manifest.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir4472_779440682\de3730a1-34ab-4b86-905a-f74adb7c8364.tmp
Google Chrome extension, version 3
dropped
There are 75 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --enable-automation "https://notification.tubecup.net
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1568,17749910962665310052,17596067963702736396,131072 --lang=en-GB --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1932 /prefetch:8

URLs

Name
IP
Malicious
https://notification.tubecup.net
https://dns.google
unknown
https://github.com/google/closure-library/wiki/goog.module:-an-ES6-module-like-alternative-to-goog.p
unknown
https://www.google.com/intl/en-US/chrome/blank.html
unknown
https://ogs.google.com
unknown
https://notification.tubecup.net/
138.201.237.88
https://www.google.com/images/cleardot.gif
unknown
https://play.google.com
unknown
https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard
142.250.203.109
https://payments.google.com/payments/v4/js/integrator.js
unknown
https://sandbox.google.com/payments/v4/js/integrator.js
unknown
https://www.google.com/images/x2.gif
unknown
https://notification.tubecup.net/
https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=85.0.4183.121&lang=en-GB&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1&x=id%3Dpkedcjkdefgpdelpbcmbmeomcjbeemfm%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1
216.58.215.238
https://accounts.google.com/MergeSession
unknown
https://www.google.com
unknown
https://www.google.com/images/dot2.gif
unknown
https://accounts.google.com
unknown
https://notification.tubecup.net/favicon.ico
138.201.237.88
https://clients2.googleusercontent.com
unknown
https://apis.google.com
unknown
https://www.google.com/accounts/OAuthLogin?issueuberauth=1
unknown
https://www.google.com/
unknown
https://www-googleapis-staging.sandbox.google.com
unknown
https://clients2.google.com
unknown
https://clients2.google.com/service/update2/crx
unknown
There are 15 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
accounts.google.com
142.250.203.109
notification.tubecup.net
138.201.237.88
clients.l.google.com
216.58.215.238
clients2.google.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown
239.255.255.250
unknown
Reserved
216.58.215.238
clients.l.google.com
United States
138.201.237.88
notification.tubecup.net
Germany
127.0.0.1
unknown
unknown
142.250.203.109
accounts.google.com
United States
192.168.2.5
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
S-1-5-21-3853321935-2125563209-4053062332-1002
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
gdaefkejpgkiemlaofpalmlakkmbjdnl
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
gfdkimpbcpahaombhbimeihdjnejgicl
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
kmendfapggjehodndflmmgagdbamhnfd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
mfehgcgbbipciphmccgaenjidiccnmng
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
neajdppkdcdipfabeoofebfddakdcjhd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
pkedcjkdefgpdelpbcmbmeomcjbeemfm
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
gfdkimpbcpahaombhbimeihdjnejgicl
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
dr
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
module_blacklist_cache_md5_digest
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.last_account_id
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.account_id
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.last_username
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
lastrun
There are 32 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
70C7A7D000
stack
page read and write
18B8AF13000
heap
page read and write
64220FF000
stack
page read and write
18B8FCC0000
trusted library allocation
page read and write
227AF224000
heap
page read and write
1712EC02000
trusted library allocation
page read and write
1001FE000
stack
page read and write
18B8A6FD000
heap
page read and write
227AF313000
heap
page read and write
18B8A600000
heap
page read and write
8DAE17B000
stack
page read and write
642267A000
stack
page read and write
18B8A68C000
heap
page read and write
18B8ADB0000
trusted library section
page readonly
21D31802000
heap
page read and write
1712D002000
heap
page read and write
23AB6E13000
heap
page read and write
22E52E29000
heap
page read and write
1712D040000
heap
page read and write
22E52E5C000
heap
page read and write
23AB7932000
heap
page read and write
64221FF000
stack
page read and write
1712CF50000
heap
page read and write
15208B13000
heap
page read and write
23AB6EC2000
heap
page read and write
70C7C7D000
stack
page read and write
10017D000
stack
page read and write
23AB6E00000
heap
page read and write
1005FF000
stack
page read and write
642287F000
stack
page read and write
15208A5E000
heap
page read and write
22E52E68000
heap
page read and write
22E52E76000
heap
page read and write
18B8FE1E000
heap
page read and write
1712D059000
heap
page read and write
1CB22613000
heap
page read and write
18B8FF02000
heap
page read and write
F36B17E000
stack
page read and write
22E52E42000
heap
page read and write
22E52E64000
heap
page read and write
22E52E6E000
heap
page read and write
1712EB70000
remote allocation
page read and write
1CB22656000
heap
page read and write
70C817D000
stack
page read and write
76009BE000
stack
page read and write
18B8FE3B000
heap
page read and write
227AF23D000
heap
page read and write
F36AE7E000
stack
page read and write
7600E7E000
stack
page read and write
18B8FBC4000
trusted library allocation
page read and write
1712D062000
heap
page read and write
22E52E3A000
heap
page read and write
642227F000
stack
page read and write
18B8FD00000
remote allocation
page read and write
23AB6F02000
heap
page read and write
642237C000
stack
page read and write
18B8FE5C000
heap
page read and write
22E52E5A000
heap
page read and write
23AB6CF0000
heap
page read and write
7600DFE000
stack
page read and write
15208A13000
heap
page read and write
21D320A0000
remote allocation
page read and write
22E52E7C000
heap
page read and write
22E53602000
trusted library allocation
page read and write
15208A5F000
heap
page read and write
15208A29000
heap
page read and write
22E52E67000
heap
page read and write
1CB22628000
heap
page read and write
B959CFC000
stack
page read and write
22E52E5F000
heap
page read and write
23AB6ECB000
heap
page read and write
1CB22665000
heap
page read and write
1712D08A000
heap
page read and write
B959DFE000
stack
page read and write
642257F000
stack
page read and write
18B8AF00000
heap
page read and write
18B8A658000
heap
page read and write
22E52C50000
heap
page read and write
22E52E7B000
heap
page read and write
1712EA80000
trusted library allocation
page read and write
22E52E56000
heap
page read and write
18B8A5F0000
trusted library allocation
page read and write
F36B27E000
stack
page read and write
B95932B000
stack
page read and write
227AF287000
heap
page read and write
1712D079000
heap
page read and write
18B8FA90000
trusted library allocation
page read and write
8DAE37E000
stack
page read and write
21D31800000
heap
page read and write
70C7F7F000
stack
page read and write
23AB7900000
heap
page read and write
18B8FE10000
heap
page read and write
22E52C40000
heap
page read and write
4DA44FF000
stack
page read and write
8DAE27B000
stack
page read and write
227AF213000
heap
page read and write
64224FD000
stack
page read and write
23AB6D90000
trusted library allocation
page read and write
1CB22700000
heap
page read and write
18B8FEF1000
heap
page read and write
1007FF000
stack
page read and write
B959BFB000
stack
page read and write
4DA3EFE000
stack
page read and write
1712D083000
heap
page read and write
1CB23002000
trusted library allocation
page read and write
B95977C000
stack
page read and write
70C847F000
stack
page read and write
21D31840000
heap
page read and write
18B8A5D1000
trusted library allocation
page read and write
70C77BB000
stack
page read and write
22E52F02000
heap
page read and write
6421AFE000
stack
page read and write
1CB22713000
heap
page read and write
1CB22678000
heap
page read and write
1712EAF0000
trusted library allocation
page read and write
10007C000
stack
page read and write
18B8FCD0000
trusted library allocation
page read and write
21D32202000
trusted library allocation
page read and write
18B8A613000
heap
page read and write
6421F7F000
stack
page read and write
18B8A6BB000
heap
page read and write
18B8A510000
trusted library section
page read and write
18B8FBA0000
trusted library allocation
page read and write
18B8A6A1000
heap
page read and write
18B8FD00000
remote allocation
page read and write
18B8FD00000
trusted library allocation
page read and write
23AB6E43000
heap
page read and write
642277C000
stack
page read and write
18B8FA80000
trusted library allocation
page read and write
18B8FA00000
trusted library allocation
page read and write
F36AEFE000
stack
page read and write
B95967E000
stack
page read and write
152087F0000
heap
page read and write
22E52E46000
heap
page read and write
18B8AE15000
heap
page read and write
227AF140000
heap
page read and write
18B8ADF0000
trusted library section
page readonly
22E52E62000
heap
page read and write
70C807F000
stack
page read and write
227AF200000
heap
page read and write
18B8A3A0000
heap
page read and write
1006FE000
stack
page read and write
22E52E40000
heap
page read and write
1004FD000
stack
page read and write
1712D000000
heap
page read and write
18B8AE00000
heap
page read and write
22E52E3C000
heap
page read and write
22E52E78000
heap
page read and write
7600F7E000
stack
page read and write
22E52E6C000
heap
page read and write
18B8B101000
trusted library allocation
page read and write
22E52E75000
heap
page read and write
15208B02000
heap
page read and write
6421B7E000
stack
page read and write
1009FD000
stack
page read and write
18B8FE48000
heap
page read and write
6421D7D000
stack
page read and write
18B8A621000
heap
page read and write
4DA3E7B000
stack
page read and write
4DA43FF000
stack
page read and write
B959B7C000
stack
page read and write
1712D102000
heap
page read and write
18B8A702000
heap
page read and write
64223FE000
stack
page read and write
22E52E00000
heap
page read and write
18B8FF04000
heap
page read and write
8DADF7E000
stack
page read and write
18B8A390000
heap
page read and write
22E52E4D000
heap
page read and write
23AB6D60000
heap
page read and write
18B8FEF7000
heap
page read and write
15208A60000
heap
page read and write
1712D113000
heap
page read and write
18B8FD00000
remote allocation
page read and write
15208A7D000
heap
page read and write
22E52CB0000
heap
page read and write
227AF265000
heap
page read and write
1712D048000
heap
page read and write
18B8AF18000
heap
page read and write
15208B08000
heap
page read and write
22E52E31000
heap
page read and write
4DA407B000
stack
page read and write
22E52E65000
heap
page read and write
15208A02000
heap
page read and write
22E52E57000
heap
page read and write
18B8FEA2000
heap
page read and write
18B8A673000
heap
page read and write
1008FC000
stack
page read and write
15208960000
trusted library allocation
page read and write
15208A54000
heap
page read and write
18B8FEA4000
heap
page read and write
21D31760000
heap
page read and write
15208A62000
heap
page read and write
22E52E85000
heap
page read and write
760093B000
stack
page read and write
18B8AF59000
heap
page read and write
70C837F000
stack
page read and write
1CB22530000
heap
page read and write
18B8A63D000
heap
page read and write
227AF22A000
heap
page read and write
18B8AE02000
heap
page read and write
70C867E000
stack
page read and write
18B8A725000
heap
page read and write
22E52E6A000
heap
page read and write
B959A7C000
stack
page read and write
23AB6EBA000
heap
page read and write
227AF266000
heap
page read and write
18B8AF18000
heap
page read and write
1CB22702000
heap
page read and write
18B8ADD0000
trusted library section
page readonly
227AF202000
heap
page read and write
18B8FCF0000
trusted library allocation
page read and write
18B8A678000
heap
page read and write
23AB7802000
heap
page read and write
18B8A500000
trusted library allocation
page read and write
1712D02A000
heap
page read and write
23AB6F13000
heap
page read and write
1712D118000
heap
page read and write
B959EFE000
stack
page read and write
18B8A66E000
heap
page read and write
21D317D0000
heap
page read and write
15208A5C000
heap
page read and write
1712D058000
heap
page read and write
18B8FE2B000
heap
page read and write
227AF250000
heap
page read and write
18B8FCE0000
trusted library allocation
page read and write
22E52E73000
heap
page read and write
18B8AF02000
heap
page read and write
18B8FEF9000
heap
page read and write
760107D000
stack
page read and write
1CB22590000
heap
page read and write
76012FE000
stack
page read and write
18B8FEEA000
heap
page read and write
23AB6E88000
heap
page read and write
15208860000
heap
page read and write
15209202000
trusted library allocation
page read and write
F36AB9C000
stack
page read and write
8DADE7B000
stack
page read and write
6421C77000
stack
page read and write
8DAE47F000
stack
page read and write
21D31813000
heap
page read and write
227AFC02000
trusted library allocation
page read and write
23AB6E6D000
heap
page read and write
18B8FBA8000
trusted library allocation
page read and write
21D320A0000
remote allocation
page read and write
15208800000
heap
page read and write
21D31902000
heap
page read and write
21D31770000
heap
page read and write
1712CFF0000
trusted library allocation
page read and write
18B8A400000
heap
page read and write
22E52E63000
heap
page read and write
18B8FBA0000
trusted library allocation
page read and write
1000FD000
stack
page read and write
18B8FEE5000
heap
page read and write
70C7D7C000
stack
page read and write
70C7AFE000
stack
page read and write
18B8FC70000
trusted library allocation
page read and write
1712D100000
heap
page read and write
22E52E13000
heap
page read and write
1712D059000
heap
page read and write
7600C7E000
stack
page read and write
1CB2267A000
heap
page read and write
227AF130000
heap
page read and write
18B8A713000
heap
page read and write
1712EB70000
remote allocation
page read and write
18B8FEC4000
heap
page read and write
18B8FCB0000
trusted library allocation
page read and write
1712EB70000
remote allocation
page read and write
4DA42F7000
stack
page read and write
100BFC000
stack
page read and write
1712D049000
heap
page read and write
22E52E41000
heap
page read and write
1712CFC0000
heap
page read and write
18B8FEC1000
heap
page read and write
6421A7B000
stack
page read and write
15208A88000
heap
page read and write
1CB2263C000
heap
page read and write
18B8B5E0000
trusted library allocation
page read and write
15208A3C000
heap
page read and write
18B8FBAE000
trusted library allocation
page read and write
227AF1A0000
heap
page read and write
18B8A5F3000
trusted library allocation
page read and write
23AB6E2A000
heap
page read and write
22E52E60000
heap
page read and write
21D31829000
heap
page read and write
22E52E7A000
heap
page read and write
18B8AF59000
heap
page read and write
227AF26C000
heap
page read and write
227AF302000
heap
page read and write
22E52E59000
heap
page read and write
227AF277000
heap
page read and write
18B8FA10000
trusted library allocation
page read and write
6421E7A000
stack
page read and write
15208A00000
heap
page read and write
F36B07E000
stack
page read and write
18B8A676000
heap
page read and write
76011FD000
stack
page read and write
227AF276000
heap
page read and write
227AF270000
heap
page read and write
15208A5B000
heap
page read and write
18B8ADE0000
trusted library section
page readonly
227AF1D0000
trusted library allocation
page read and write
4DA3F7E000
stack
page read and write
22E52E55000
heap
page read and write
18B8ADC0000
trusted library section
page readonly
22E52E58000
heap
page read and write
18B8A68E000
heap
page read and write
F36B37E000
stack
page read and write
18B8FBC0000
trusted library allocation
page read and write
B9599FF000
stack
page read and write
100AFF000
stack
page read and write
227AF277000
heap
page read and write
7600CFE000
stack
page read and write
18B8A624000
heap
page read and write
70C877E000
stack
page read and write
22E52DB0000
trusted library allocation
page read and write
642217E000
stack
page read and write
1CB22520000
heap
page read and write
642207B000
stack
page read and write
18B8BA00000
trusted library allocation
page read and write
B9593AD000
stack
page read and write
76010FE000
stack
page read and write
18B8FBD0000
trusted library allocation
page read and write
15208B00000
heap
page read and write
1CB225C0000
trusted library allocation
page read and write
1CB22600000
heap
page read and write
70C7E7F000
stack
page read and write
70C857F000
stack
page read and write
21D32070000
trusted library allocation
page read and write
21D320A0000
remote allocation
page read and write
1CB22602000
heap
page read and write
70C7BFB000
stack
page read and write
22E52E61000
heap
page read and write
18B8A692000
heap
page read and write
18B8FE00000
heap
page read and write
15208A5A000
heap
page read and write
227AF281000
heap
page read and write
23AB6D00000
heap
page read and write
B9598FF000
stack
page read and write
18B8FBE0000
trusted library allocation
page read and write
8DADEFE000
stack
page read and write
22E52E74000
heap
page read and write
70C827F000
stack
page read and write
4DA41FE000
stack
page read and write
18B8FBC1000
trusted library allocation
page read and write
21D3185C000
heap
page read and write
4DA417B000
stack
page read and write
B959FFE000
stack
page read and write
22E52E7F000
heap
page read and write
1712CF60000
heap
page read and write
18B8FE5E000
heap
page read and write
18B8FBD0000
trusted library allocation
page read and write
1712D049000
heap
page read and write
18B8FE89000
heap
page read and write
1712D013000
heap
page read and write
1712EAB0000
trusted library allocation
page read and write
18B8ADA0000
trusted library section
page readonly
18B8FBE4000
trusted library allocation
page read and write
There are 348 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://notification.tubecup.net/