IOC Report
https://portal-treezor.github.io/

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Sep 28 22:02:55 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Sep 28 22:02:55 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 09:52:18 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Sep 28 22:02:55 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Sep 28 22:02:55 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Sep 28 22:02:55 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
ASCII text, with very long lines (32030)
downloaded
Chrome Cache Entry: 101
ASCII text
dropped
Chrome Cache Entry: 102
ASCII text, with very long lines (2306), with no line terminators
dropped
Chrome Cache Entry: 103
ASCII text
downloaded
Chrome Cache Entry: 104
JPEG image data, baseline, precision 8, 1600x4139, components 3
dropped
Chrome Cache Entry: 105
ASCII text
downloaded
Chrome Cache Entry: 106
PNG image data, 800 x 800, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 76
PNG image data, 800 x 800, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 77
ASCII text, with very long lines (2306), with no line terminators
downloaded
Chrome Cache Entry: 78
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 79
HTML document, ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 80
ASCII text, with very long lines (65472)
downloaded
Chrome Cache Entry: 81
HTML document, ASCII text, with very long lines (3909)
downloaded
Chrome Cache Entry: 82
ASCII text, with very long lines (65472)
dropped
Chrome Cache Entry: 83
troff or preprocessor input, ASCII text
downloaded
Chrome Cache Entry: 84
PNG image data, 656 x 138, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 85
JPEG image data, baseline, precision 8, 1600x4139, components 3
downloaded
Chrome Cache Entry: 86
ASCII text, with very long lines (65299)
downloaded
Chrome Cache Entry: 87
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 88
ASCII text, with very long lines (499)
downloaded
Chrome Cache Entry: 89
PNG image data, 260 x 260, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 90
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 91
PNG image data, 260 x 260, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 92
PNG image data, 656 x 138, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 93
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 94
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 95
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 96
ASCII text, with very long lines (65326)
downloaded
Chrome Cache Entry: 97
HTML document, Unicode text, UTF-8 text, with very long lines (562)
downloaded
Chrome Cache Entry: 98
ASCII text, with very long lines (59119)
downloaded
Chrome Cache Entry: 99
Unicode text, UTF-8 text, with very long lines (65342)
downloaded
There are 28 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1808,i,15606841744871056254,2739295741308969628,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://portal-treezor.github.io/"

URLs

Name
IP
Malicious
https://portal-treezor.github.io/
malicious
https://portal-treezor.github.io/
https://cdnjs.cloudflare.com/ajax/libs/font-awesome/5.15.4/css/all.min.css
104.17.24.14
https://github.com/twbs/bootstrap/blob/main/LICENSE)
unknown
https://cdnjs.cloudflare.com/ajax/libs/jquery/3.1.1/jquery.min.js
104.17.25.14
https://twitter.com/githubstatus
unknown
https://embed.tawk.to/_s/v4/app/66d916256f5/js/twk-promise-polyfill.js
unknown
https://embed.tawk.to/_s/v4/app/66d916256f5/js/twk-app.js
172.67.15.14
https://embed.tawk.to/_s/v4/app/66d916256f5/js/twk-main.js
172.67.15.14
https://embed.tawk.to/_s/v4/app/66d916256f5/js/twk-runtime.js
172.67.15.14
https://embed.tawk.to/_s/v4/app/66d916256f5/js/twk-iterator-polyfill.js
unknown
https://cdn.jsdelivr.net/npm/bootstrap@5.3.3/dist/js/bootstrap.bundle.min.js
151.101.1.229
https://embed.tawk.to/_s/v4/app/66d916256f5/
unknown
https://getbootstrap.com/)
unknown
https://embed.tawk.to/_s/v4/app/66d916256f5/js/twk-entries-polyfill.js
unknown
https://fontawesome.com/license/free
unknown
https://treazosr-api.azurewebsites.net/
https://embed.tawk.to/_s/v4/app/66d916256f5/js/twk-chunk-vendors.js
172.67.15.14
https://fontawesome.com
unknown
https://portal-treezor.github.io/favicon.ico
185.199.109.153
https://github.com/twbs/bootstrap/graphs/contributors)
unknown
https://cdn.prod.website-files.com/668ba99be73cc4827897252e/668ba9de142be71e5a6ed27d_trezor-start.jpg
104.18.161.117
https://embed.tawk.to/_s/v4/app/66d916256f5/js/twk-event-polyfill.js
unknown
https://embed.tawk.to/_s/v4/app/66d916256f5/js/twk-object-values-polyfill.js
unknown
https://embed.tawk.to/668d8729c3fb85929e3d5831/1i2cdfv5v
172.67.15.14
https://githubstatus.com
unknown
https://a.nel.cloudflare.com/report/v4?s=bAN52l25fKm%2BgXcesIJFMIxx7TlOOJZAFm0AXtieKa7r5ir2FzQd3V8cGtJU2DGnLTCbaM3DM5bWoVTjZ22IbSvZvz5w031OIY3%2FWGdSXR%2BRgVi4jgF2I3hIE4UAbSDyGwqgIVme
35.190.80.1
https://help.github.com/pages/
unknown
https://embed.tawk.to/_s/v4/app/66d916256f5/js/twk-vendor.js
172.67.15.14
https://embed.tawk.to/_s/v4/app/66d916256f5/js/twk-chunk-common.js
172.67.15.14
https://stackpath.bootstrapcdn.com/bootstrap/4.5.2/css/bootstrap.min.css
104.18.11.207
https://cdn.prod.website-files.com/668ba99be73cc4827897252e/668ba9de142be71e5a6ed27d_trezor-start.jp
unknown
https://embed.tawk.to/_s/v4/app/66d916256f5/js/twk-arr-find-polyfill.js
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
stackpath.bootstrapcdn.com
104.18.11.207
embed.tawk.to
172.67.15.14
jsdelivr.map.fastly.net
151.101.1.229
bg.microsoft.map.fastly.net
199.232.214.172
a.nel.cloudflare.com
35.190.80.1
portal-treezor.github.io
185.199.109.153
cdnjs.cloudflare.com
104.17.24.14
cdn.prod.website-files.com
104.18.161.117
www.google.com
142.250.186.132
fp2e7a.wpc.phicdn.net
192.229.221.95
cdn.jsdelivr.net
unknown
kit.fontawesome.com
unknown
treazosr-api.azurewebsites.net
unknown
There are 3 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.17.24.14
cdnjs.cloudflare.com
United States
151.101.1.229
jsdelivr.map.fastly.net
United States
142.250.184.196
unknown
United States
172.67.15.14
embed.tawk.to
United States
104.18.161.117
cdn.prod.website-files.com
United States
104.22.45.142
unknown
United States
185.199.109.153
portal-treezor.github.io
Netherlands
104.18.11.207
stackpath.bootstrapcdn.com
United States
192.168.2.11
unknown
unknown
239.255.255.250
unknown
Reserved
142.250.186.132
www.google.com
United States
35.190.80.1
a.nel.cloudflare.com
United States
104.17.25.14
unknown
United States
There are 3 hidden IPs, click here to show them.

DOM / HTML

URL
Malicious
https://portal-treezor.github.io/
malicious
https://treazosr-api.azurewebsites.net/