Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Chrome Cache Entry: 50
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1920x440, components
3
|
dropped
|
||
Chrome Cache Entry: 51
|
Web Open Font Format (Version 2), TrueType, length 40128, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 52
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1920x4223, components
3
|
downloaded
|
||
Chrome Cache Entry: 53
|
PNG image data, 17 x 24, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 54
|
ASCII text, with very long lines (65299)
|
dropped
|
||
Chrome Cache Entry: 55
|
ASCII text, with very long lines (1572)
|
downloaded
|
||
Chrome Cache Entry: 56
|
PNG image data, 17 x 24, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 57
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1920x440, components
3
|
downloaded
|
||
Chrome Cache Entry: 58
|
ASCII text, with very long lines (65299)
|
downloaded
|
||
Chrome Cache Entry: 59
|
HTML document, Unicode text, UTF-8 text, with very long lines (379)
|
downloaded
|
||
Chrome Cache Entry: 60
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1920x4223, components
3
|
dropped
|
||
Chrome Cache Entry: 61
|
Unicode text, UTF-8 text, with very long lines (65306)
|
downloaded
|
There are 3 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2268 --field-trial-handle=2180,i,16522985737112906898,573014343695110025,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://support-terrzor.github.io/"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://support-terrzor.github.io/
|
|||
https://support-terrzor.github.io/#
|
|||
https://support-terrzor.github.io/
|
|||
https://i.ibb.co/w775vxJ/banner.jpg
|
91.134.9.159
|
||
https://cdn.jsdelivr.net/npm/
|
unknown
|
||
https://i.ibb.co/P4LYvWX/fabicon.png
|
91.134.9.159
|
||
https://github.com/twbs/bootstrap/graphs/contributors)
|
unknown
|
||
https://cdn.jsdelivr.net/npm/bootstrap
|
unknown
|
||
https://getbootstrap.com/)
|
unknown
|
||
https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/js/bootstrap.bundle.min.js
|
151.101.129.229
|
||
https://github.com/twbs/bootstrap/blob/main/LICENSE)
|
unknown
|
||
https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/css/bootstrap.min.css
|
151.101.129.229
|
||
https://i.ibb.co/jyM2wv9/footer.jpg
|
91.134.9.159
|
There are 2 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
support-terrzor.github.io
|
185.199.108.153
|
||
jsdelivr.map.fastly.net
|
151.101.129.229
|
||
www.google.com
|
142.250.186.68
|
||
i.ibb.co
|
91.134.9.159
|
||
cdn.jsdelivr.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.199.108.153
|
support-terrzor.github.io
|
Netherlands
|
||
142.250.186.68
|
www.google.com
|
United States
|
||
151.101.129.229
|
jsdelivr.map.fastly.net
|
United States
|
||
192.168.2.6
|
unknown
|
unknown
|
||
192.168.2.5
|
unknown
|
unknown
|
||
91.134.9.160
|
unknown
|
France
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
91.134.9.159
|
i.ibb.co
|
France
|
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://support-terrzor.github.io/
|
||
https://support-terrzor.github.io/#
|