IOC Report
https://clc.li/bsLRU

loading gif

Files

File Path
Type
Category
Malicious
Chrome Cache Entry: 64
ASCII text, with very long lines (3034)
downloaded
Chrome Cache Entry: 65
PNG image data, 400 x 373, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 66
ASCII text, with very long lines (65326)
downloaded
Chrome Cache Entry: 67
ASCII text, with very long lines (52784)
downloaded
Chrome Cache Entry: 68
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 50x50, components 3
dropped
Chrome Cache Entry: 69
Unicode text, UTF-8 text, with very long lines (63162), with no line terminators
downloaded
Chrome Cache Entry: 70
HTML document, ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 71
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 50x50, components 3
downloaded
Chrome Cache Entry: 72
Web Open Font Format (Version 2), TrueType, length 327824, version 772.1280
downloaded
Chrome Cache Entry: 73
PNG image data, 50 x 50, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 74
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 50x50, components 3
dropped
Chrome Cache Entry: 75
PNG image data, 500 x 83, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 76
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
Chrome Cache Entry: 77
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 78
HTML document, ASCII text, with very long lines (1238)
downloaded
Chrome Cache Entry: 79
ASCII text
downloaded
Chrome Cache Entry: 80
ASCII text
downloaded
Chrome Cache Entry: 81
PNG image data, 400 x 373, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 82
PNG image data, 50 x 50, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 83
ASCII text
downloaded
Chrome Cache Entry: 84
PNG image data, 500 x 83, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 85
ASCII text, with very long lines (8016)
downloaded
Chrome Cache Entry: 86
ASCII text
downloaded
Chrome Cache Entry: 87
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 88
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 89
ASCII text, with very long lines (7321)
downloaded
Chrome Cache Entry: 90
ASCII text, with very long lines (2212)
downloaded
Chrome Cache Entry: 91
ASCII text, with very long lines (65451)
downloaded
Chrome Cache Entry: 92
ASCII text, with very long lines (11692)
downloaded
Chrome Cache Entry: 93
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 50x50, components 3
downloaded
Chrome Cache Entry: 94
ASCII text, with very long lines (62961)
downloaded
There are 22 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 --field-trial-handle=2216,i,6873913864203263267,792881258309955960,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://clc.li/bsLRU"

URLs

Name
IP
Malicious
https://clc.li/bsLRU
malicious
https://clc.li/bsLRU
172.67.128.112
malicious
https://tensewire.net/3a36ef2959e87b2ca27c8f04b726a343?_ax=w
104.21.47.80
https://tensewire.net/assets/images/flags/flag-us.png
104.21.47.80
https://event.trk-adulvion.com/register/event_log/v9e118mez8
104.21.80.104
https://tensewire.net/assets/js/gbvar.js?v=60
104.21.47.80
https://tensewire.net/assets/js/functions.js?v=454576b4f6c63244067eabf05b8f71b6
104.21.47.80
https://tensewire.net/assets/images/ci1.jpg
104.21.47.80
https://trk-amropode.com//scripts/pg/v9e118mez8
104.21.22.140
https://stats.g.doubleclick.net/g/collect
unknown
https://tensewire.net/service-worker.js
104.21.47.80
https://tensewire.net/3a36ef2959e87b2ca27c8f04b726a343
https://github.com/twbs/bootstrap/blob/main/LICENSE)
unknown
https://tensewire.net/assets/js/dublin/dist/common-hybrid.js?v=454576b4f6c63244067eabf05b8f71b6
104.21.47.80
https://adservice.google.com/pagead/regclk
unknown
https://getbootstrap.com/)
unknown
https://tensewire.net/?s1=350359&s2=1174009843&s3=7090&s4=1&s10=4550
104.21.47.80
https://tensewire.net/assets/vendors/jquery-3.4.1.min.js
104.21.47.80
https://marginmasks.com/0/0/0/d44549cb847e1e460ab518fbf82bb4e2/akdim
31.24.251.250
https://cct.google/taggy/agent.js
unknown
https://tensewire.net/assets/js/intl_functions.js?v=454576b4f6c63244067eabf05b8f71b6
104.21.47.80
https://www.google.com
unknown
https://www.youtube.com/iframe_api
unknown
https://tensewire.net/
104.21.47.80
https://tensewire.net/assets/images/ci21.jpg
104.21.47.80
https://github.com/twbs/bootstrap/graphs/contributors)
unknown
https://tensewire.net/inc/msg.v3.js?662a9f54742ee
104.21.47.80
https://tensewire.net/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
104.21.47.80
https://td.doubleclick.net
unknown
https://tensewire.net/assets/vendors/bootstrap-4.5.3/css/bootstrap.min.css
104.21.47.80
https://tensewire.net/uploads/archive/product/697/images/messmaster.png
104.21.47.80
https://www.merchant-center-analytics.goog
unknown
https://tensewire.net/favicon.ico
104.21.47.80
https://tensewire.net/assets/vendors/bootstrap-4.5.3/js/bootstrap.min.js
104.21.47.80
https://tensewire.net/assets/css/dublin/dist/common-hybrid.css?v=454576b4f6c63244067eabf05b8f71b6
104.21.47.80
https://stats.g.doubleclick.net/g/collect?v=2&
unknown
https://tensewire.net/assets/vendors/fontawesome_pro/css/all.min.css
104.21.47.80
https://tensewire.net/uploads/archive/company/55/images/kohls-logo-purple.png
104.21.47.80
https://trk-amropode.com//scripts/sw/v9e118mez8
104.21.22.140
https://unisonroad.com
unknown
https://trk-adulvion.com/scripts/push/v9e118mez8
104.21.80.104
https://tensewire.net/assets/vendors/fontawesome_pro/webfonts/fa-solid-900.woff2
104.21.47.80
There are 31 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
tensewire.net
104.21.47.80
trk-amropode.com
104.21.22.140
www.google.com
142.250.9.99
trk-adulvion.com
104.21.80.104
event.trk-adulvion.com
104.21.80.104
marginmasks.com
31.24.251.250
clc.li
172.67.128.112
fp2e7a.wpc.phicdn.net
192.229.211.108

IPs

IP
Domain
Country
Malicious
31.24.251.250
marginmasks.com
France
172.67.128.112
clc.li
United States
192.168.2.4
unknown
unknown
239.255.255.250
unknown
Reserved
104.21.47.80
tensewire.net
United States
142.250.9.99
www.google.com
United States
104.21.80.104
trk-adulvion.com
United States
104.21.22.140
trk-amropode.com
United States

DOM / HTML

URL
Malicious
https://tensewire.net/3a36ef2959e87b2ca27c8f04b726a343
https://tensewire.net/3a36ef2959e87b2ca27c8f04b726a343
https://tensewire.net/3a36ef2959e87b2ca27c8f04b726a343
https://tensewire.net/3a36ef2959e87b2ca27c8f04b726a343
https://tensewire.net/3a36ef2959e87b2ca27c8f04b726a343