IOC Report
http://telegsramc.club/

loading gif

Files

File Path
Type
Category
Malicious
Chrome Cache Entry: 53
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 817372
downloaded
Chrome Cache Entry: 54
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 37755
downloaded
Chrome Cache Entry: 55
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 8730
downloaded
Chrome Cache Entry: 56
Web Open Font Format (Version 2), TrueType, length 13980, version 1.0
downloaded
Chrome Cache Entry: 57
JPEG image data, JFIF standard 1.01, aspect ratio, density 96x96, segment length 16, baseline, precision 8, 128x128, components 3
downloaded
Chrome Cache Entry: 58
ASCII text
downloaded
Chrome Cache Entry: 59
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1587
downloaded
Chrome Cache Entry: 60
ASCII text
dropped
Chrome Cache Entry: 61
MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
Chrome Cache Entry: 62
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 37755
dropped
Chrome Cache Entry: 63
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 265985
downloaded
Chrome Cache Entry: 64
JPEG image data, JFIF standard 1.01, aspect ratio, density 96x96, segment length 16, baseline, precision 8, 128x128, components 3
dropped
Chrome Cache Entry: 65
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 17456
downloaded
Chrome Cache Entry: 66
MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 67
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 27408
downloaded
Chrome Cache Entry: 68
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 199573
downloaded
Chrome Cache Entry: 69
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 530342
downloaded
Chrome Cache Entry: 70
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 65
dropped
Chrome Cache Entry: 71
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 167871
downloaded
Chrome Cache Entry: 72
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 920
downloaded
Chrome Cache Entry: 73
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 97951
downloaded
Chrome Cache Entry: 74
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 920
dropped
Chrome Cache Entry: 75
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 530342
dropped
Chrome Cache Entry: 76
JSON data
downloaded
Chrome Cache Entry: 77
JSON data
dropped
Chrome Cache Entry: 78
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 79
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 817372
dropped
Chrome Cache Entry: 80
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 65
downloaded
Chrome Cache Entry: 81
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 167871
dropped
Chrome Cache Entry: 82
JSON data
downloaded
Chrome Cache Entry: 83
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 111307
downloaded
There are 22 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 --field-trial-handle=2352,i,16294649771882770261,11277554373231159150,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://telegsramc.club/"

URLs

Name
IP
Malicious
http://telegsramc.club/
malicious
http://telegsramc.club/polyfills.9225875df2b05e64.js
103.76.84.225
malicious
http://telegsramc.club/assets/layui-v2.6.8/layui/css/layui.css
103.76.84.225
malicious
http://telegsramc.club/main.7b574a882822896f.js
103.76.84.225
malicious
http://telegsramc.club/assets/css/bootstrap.min.css
103.76.84.225
malicious
http://telegsramc.club/assets/layui-v2.6.8/layui/css/modules/layer/default/layer.css?v=3.5.1
103.76.84.225
malicious
http://telegsramc.club/assets/layui-v2.6.8/layui/layui.js
103.76.84.225
malicious
http://telegsramc.club/assets/layui-v2.6.8/layui/css/modules/laydate/default/laydate.css?v=5.3.1
103.76.84.225
malicious
http://telegsramc.club/assets/images/logo.jpg
103.76.84.225
malicious
http://telegsramc.club/styles.e2974b719a0acf9b.css
103.76.84.225
malicious
http://telegsramc.club/assets/datas/countries/phoneCode.json
103.76.84.225
malicious
http://telegsramc.club/assets/js/jquery-3.5.1.min.js
103.76.84.225
malicious
http://telegsramc.club/assets/download/filename.js
103.76.84.225
malicious
http://telegsramc.club/
malicious
http://telegsramc.club/favicon.ico
103.76.84.225
malicious
http://telegsramc.club/runtime.d0a0d8313f8d1e00.js
103.76.84.225
malicious
http://telegsramc.club/assets/layui-v2.6.8/layui/css/modules/code.css?v=2
103.76.84.225
malicious
http://telegsramc.club/assets/css/font-awesome.min.css
103.76.84.225
malicious
https://ipinfo.io/support
unknown
https://www.cloudflare.com/cdn-cgi/trace
104.16.124.96
https://ipinfo.io/pricing
unknown
https://ipinfo.io/?token=ad76fbd92e6bbb
34.117.59.81
There are 11 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
telegsramc.club
103.76.84.225
malicious
bg.microsoft.map.fastly.net
199.232.210.172
www.cloudflare.com
104.16.124.96
ipinfo.io
34.117.59.81
www.google.com
142.250.186.100
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
103.76.84.225
telegsramc.club
China
malicious
34.117.59.81
ipinfo.io
United States
192.168.2.4
unknown
unknown
192.168.2.6
unknown
unknown
239.255.255.250
unknown
Reserved
142.250.186.100
www.google.com
United States
104.16.123.96
unknown
United States
104.16.124.96
www.cloudflare.com
United States

DOM / HTML

URL
Malicious
http://telegsramc.club/
malicious