IOC Report
https://support-terrzor.github.io/

loading gif

Files

File Path
Type
Category
Malicious
Chrome Cache Entry: 50
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1920x440, components 3
dropped
Chrome Cache Entry: 51
Web Open Font Format (Version 2), TrueType, length 40128, version 1.0
downloaded
Chrome Cache Entry: 52
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1920x4223, components 3
downloaded
Chrome Cache Entry: 53
PNG image data, 17 x 24, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 54
ASCII text, with very long lines (65299)
dropped
Chrome Cache Entry: 55
ASCII text, with very long lines (1572)
downloaded
Chrome Cache Entry: 56
PNG image data, 17 x 24, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 57
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1920x440, components 3
downloaded
Chrome Cache Entry: 58
ASCII text, with very long lines (65299)
downloaded
Chrome Cache Entry: 59
HTML document, Unicode text, UTF-8 text, with very long lines (379)
downloaded
Chrome Cache Entry: 60
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1920x4223, components 3
dropped
Chrome Cache Entry: 61
Unicode text, UTF-8 text, with very long lines (65306)
downloaded
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 --field-trial-handle=2180,i,16522985737112906898,573014343695110025,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://support-terrzor.github.io/"

URLs

Name
IP
Malicious
https://support-terrzor.github.io/
malicious
https://support-terrzor.github.io/#
malicious
https://support-terrzor.github.io/
malicious
https://i.ibb.co/w775vxJ/banner.jpg
91.134.9.159
https://cdn.jsdelivr.net/npm/
unknown
https://i.ibb.co/P4LYvWX/fabicon.png
91.134.9.159
https://github.com/twbs/bootstrap/graphs/contributors)
unknown
https://cdn.jsdelivr.net/npm/bootstrap
unknown
https://getbootstrap.com/)
unknown
https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/js/bootstrap.bundle.min.js
151.101.129.229
https://github.com/twbs/bootstrap/blob/main/LICENSE)
unknown
https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/css/bootstrap.min.css
151.101.129.229
https://i.ibb.co/jyM2wv9/footer.jpg
91.134.9.159
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
support-terrzor.github.io
185.199.108.153
malicious
jsdelivr.map.fastly.net
151.101.129.229
www.google.com
142.250.186.68
i.ibb.co
91.134.9.159
cdn.jsdelivr.net
unknown

IPs

IP
Domain
Country
Malicious
185.199.108.153
support-terrzor.github.io
Netherlands
malicious
142.250.186.68
www.google.com
United States
151.101.129.229
jsdelivr.map.fastly.net
United States
192.168.2.6
unknown
unknown
192.168.2.5
unknown
unknown
91.134.9.160
unknown
France
239.255.255.250
unknown
Reserved
91.134.9.159
i.ibb.co
France

DOM / HTML

URL
Malicious
https://support-terrzor.github.io/
malicious
https://support-terrzor.github.io/#
malicious