Is "The W" on Chrome Web Store Safe to Install?

[email protected] · chrome · v6.0.3

The W extension was designed for faculty and staff at Westwood High School to increase daily productivity. It is maintained by the school's Technology Learning Coach for the use and support of Westwood faculty an staff and requires no permissions to use it. It was created as a follow up to a previous extension and changed to include more items. It will not ever collect personal data as its purpose is strictly to support faculty and staff with daily planning. Version 6.0.3 Updated links. Version 6.0.2 Updated links. Version 6.0.1 Phone list updated. Added "Who to Contact". Added video directions for reserving Think Tank 144 and calendar. Changed professional leave form to PDF link. Removed pic from background. Version 6.0.0 Several updates for the 2022-23 school year. Background changed to Rowdy. Version 5.2.0 Updated 1 for 2022-23 with new bell schedule documents as well as other resources. Version 5.0.8 Updated maintenance request form. Version 5.0.7 Removed Think Tank 215 calendar. Added Teachers.io link Add picture with myHW info + QR codes. Version 5.0.6 Removed Beak Squad folder. Added Papercut link. Version 5.0.5 Added back The T Lounge (Tech Newsletter). Version 5.0.4 Added Grade Change Form Version 5.0.3 Added Beak Squad U for easy teacher access as needed. Removed BookMe calendar. Version 5.0.2 New bell schedule linked. New duty roster linked. Version 5.0.1 Corrected link to WHS #TechItOut site for "All Things Tech" Version 5.0.0 Converted to M3. Removed slideshow that was slowing down load time. Added QR code for Friday Forecast. Added access to "All Things WHS Tech". Version 4.1.6 Top graphic is now access to the NEW "Friday Forecast" Added copy link to the Personal/Professional Leave Form Changed "Book Me" calendar to "Book Angie" Google appointment calendar. Version 4.1.5 Corrected misspelled "Squad" in a link. Added access to CB Troubleshooting guide (under construction) Added PEP schedule. Added "Beak Squad Dispatch" QR and reminder at the top. Version 4.1.4 Removed Google Form for self-reporting DigCit stage. Removed T Lounge link. Added Beak Squad Dispatch. Added Beak Squad Faculty folder link. Version 4.1.3 Posted a Google Form for self-reporting DigCit stage. Version 4.1.2 Added the grade reporting schedule. Version 4.1.1 Added homeroom schedule matrix. Version 4.1.0 Added section of calendars Version 4.0.1 Added The Hub Faculty Handbook. Add Rowdy's Weekly Master List. Removed The Talon. Version 4.0.0 BIG CHANGE - Removed sign-in form. Added slideshow to feature important information. Added calendar links to reserve our Think Tanks. Added link to SC Lead Version 3.1.0 Removed YouTube Playlist. See our Google Classroom for YouTube lists. Added YouCanBook.me calendar for collaboration with TLC. Add W access to the master schedule and Version 3.0.2 Corrected broken link to The Nest. Added W access to lunch duty rosters. Added W access to the morning news show. channel. Version 3.0.1 Added the T Lounge Newsletter and the R2 Password Utility. Version 3.0 Added "Welcome Back" check-in form, changed text colors for better contrast, replaced W, renamed to "The W"

Risk Assessment

Analyzed
39.97
out of 100
LOW

191 security findings detected across all analyzers

Severity Breakdown

0
Critical
3
High
188
Medium
0
Low
0
Info

Finding Categories

3
Malware Signatures
184
IoC Indicators

YARA Rules Matched

3 rules
postinstall system command postinstall network communication postinstall crypto operations

About This Extension

The W extension was designed for faculty and staff at Westwood High School to increase daily productivity. It is maintained by the school's Technology Learning Coach for the use and support of Westwood faculty an staff and requires no permissions to use it. It was created as a follow up to a previous extension and changed to include more items. It will not ever collect personal data as its purpose is strictly to support faculty and staff with daily planning. Version 6.0.3 Updated links. Version 6.0.2 Updated links. Version 6.0.1 Phone list updated. Added "Who to Contact". Added video directions for reserving Think Tank 144 and calendar. Changed professional leave form to PDF link. Removed pic from background. Version 6.0.0 Several updates for the 2022-23 school year. Background changed to Rowdy. Version 5.2.0 Updated 1 for 2022-23 with new bell schedule documents as well as other resources. Version 5.0.8 Updated maintenance request form. Version 5.0.7 Removed Think Tank 215 calendar. Added Teachers.io link Add picture with myHW info + QR codes. Version 5.0.6 Removed Beak Squad folder. Added Papercut link. Version 5.0.5 Added back The T Lounge (Tech Newsletter). Version 5.0.4 Added Grade Change Form Version 5.0.3 Added Beak Squad U for easy teacher access as needed. Removed BookMe calendar. Version 5.0.2 New bell schedule linked. New duty roster linked. Version 5.0.1 Corrected link to WHS #TechItOut site for "All Things Tech" Version 5.0.0 Converted to M3. Removed slideshow that was slowing down load time. Added QR code for Friday Forecast. Added access to "All Things WHS Tech". Version 4.1.6 Top graphic is now access to the NEW "Friday Forecast" Added copy link to the Personal/Professional Leave Form Changed "Book Me" calendar to "Book Angie" Google appointment calendar. Version 4.1.5 Corrected misspelled "Squad" in a link. Added access to CB Troubleshooting guide (under construction) Added PEP schedule. Added "Beak Squad Dispatch" QR and reminder at the top. Version 4.1.4 Removed Google Form for self-reporting DigCit stage. Removed T Lounge link. Added Beak Squad Dispatch. Added Beak Squad Faculty folder link. Version 4.1.3 Posted a Google Form for self-reporting DigCit stage. Version 4.1.2 Added the grade reporting schedule. Version 4.1.1 Added homeroom schedule matrix. Version 4.1.0 Added section of calendars Version 4.0.1 Added The Hub Faculty Handbook. Add Rowdy's Weekly Master List. Removed The Talon. Version 4.0.0 BIG CHANGE - Removed sign-in form. Added slideshow to feature important information. Added calendar links to reserve our Think Tanks. Added link to SC Lead Version 3.1.0 Removed YouTube Playlist. See our Google Classroom for YouTube lists. Added YouCanBook.me calendar for collaboration with TLC. Add W access to the master schedule and Version 3.0.2 Corrected broken link to The Nest. Added W access to lunch duty rosters. Added W access to the morning news show. channel. Version 3.0.1 Added the T Lounge Newsletter and the R2 Password Utility. Version 3.0 Added "Welcome Back" check-in form, changed text colors for better contrast, replaced W, renamed to "The W"

Detailed Findings

3 total

YARA Rule Matches

3 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
52
IP Addresses
31
Domains
100
Strings
184

All Indicators · 184

URL
detected URL: https://docs.google.com/document/d/1AV6tyEi9ldLFRlnivT_u-zhlPloKA9srBub5cX8ZxK0/edit

XIOC detected URL: https://docs.google.com/document/d/1AV6tyEi9ldLFRlnivT_u-zhlPloKA9srBub5cX8ZxK0/edit

extracted_from_files

IP
detected IP: 9::

XIOC detected IP: 9::

extracted_from_files

Hash
detected MD5 Hash: F30E5486B6153760FA6CA64574E54608

XIOC detected MD5 Hash: F30E5486B6153760FA6CA64574E54608

extracted_from_files

Hash
detected MD5 Hash: 82758A3607BDEB11A379F63A257204AB

XIOC detected MD5 Hash: 82758A3607BDEB11A379F63A257204AB

extracted_from_files

Hash
detected MD5 Hash: 81758A3607BDEB11A379F63A257204AB

XIOC detected MD5 Hash: 81758A3607BDEB11A379F63A257204AB

extracted_from_files

Hash
detected MD5 Hash: 8E7D9AA3D1F1D6322EAB8104FB093B9F

XIOC detected MD5 Hash: 8E7D9AA3D1F1D6322EAB8104FB093B9F

extracted_from_files

URL
detected URL: https://sclead.org/

XIOC detected URL: https://sclead.org/

extracted_from_files

URL
detected URL: https://cert.ed.sc.gov

XIOC detected URL: https://cert.ed.sc.gov

extracted_from_files

URL
detected URL: https://docs.google.com/forms/d/e/1FAIpQLSctARQ8k7iR8o0LAjQhRVcspTE7tkTDHdzO-_OzTBYfAnYhrg/viewform?embedded=true

XIOC detected URL: https://docs.google.com/forms/d/e/1FAIpQLSctARQ8k7iR8o0LAjQhRVcspTE7tkTDHdzO-_OzTBYfAnYhrg/viewform?embedded=true

extracted_from_files

URL
detected URL: http://www.iec.ch

XIOC detected URL: http://www.iec.ch

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceRef#

XIOC detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceRef#

extracted_from_files

URL
detected URL: http://ns.adobe.com/tiff/1.0/

XIOC detected URL: http://ns.adobe.com/tiff/1.0/

extracted_from_files

URL
detected URL: https://richland2.gosignmeup.com/Public/Course/Browse

XIOC detected URL: https://richland2.gosignmeup.com/Public/Course/Browse

extracted_from_files

URL
detected URL: https://mobilemind.io/

XIOC detected URL: https://mobilemind.io/

extracted_from_files

URL
detected URL: https://myhr.richland2.org/

XIOC detected URL: https://myhr.richland2.org/

extracted_from_files

URL
detected URL: https://papercut.richland2.org

XIOC detected URL: https://papercut.richland2.org

extracted_from_files

URL
detected URL: https://password.richland2.org/pwd/index.php

XIOC detected URL: https://password.richland2.org/pwd/index.php

extracted_from_files

URL
detected URL: https://svcdesk.richland2.org/User/Account/Login?ReturnUrl=%2fUser%2f

XIOC detected URL: https://svcdesk.richland2.org/User/Account/Login?ReturnUrl=%2fUser%2f

extracted_from_files

URL
detected URL: https://snow.live

XIOC detected URL: https://snow.live

extracted_from_files

URL
detected URL: https://calendar.google.com/calendar/embed?src=richland2.org_gqmd0bb2v28f04m5s5ja66t078%40group.calendar.google.com&ctz=America%2FNew_York

XIOC detected URL: https://calendar.google.com/calendar/embed?src=richland2.org_gqmd0bb2v28f04m5s5ja66t078%40group.calendar.google.com&ctz=America%2FNew_York

extracted_from_files

URL
detected URL: https://calendar.google.com/calendar/embed?src=richland2.org_usl055urdmr40p1llmin8udtgg%40group.calendar.google.com&ctz=America%2FNew_York

XIOC detected URL: https://calendar.google.com/calendar/embed?src=richland2.org_usl055urdmr40p1llmin8udtgg%40group.calendar.google.com&ctz=America%2FNew_York

extracted_from_files

URL
detected URL: https://calendar.google.com/calendar/embed?src=richland2.org_e2nhcvjitugu59ga0dp1piefcs%40group.calendar.google.com&ctz=America%2FNew_York

XIOC detected URL: https://calendar.google.com/calendar/embed?src=richland2.org_e2nhcvjitugu59ga0dp1piefcs%40group.calendar.google.com&ctz=America%2FNew_York

extracted_from_files

URL
detected URL: https://www.aesoponline.com/login2.asp

XIOC detected URL: https://www.aesoponline.com/login2.asp

extracted_from_files

URL
detected URL: https://myapps.classlink.com/home

XIOC detected URL: https://myapps.classlink.com/home

extracted_from_files

URL
detected URL: https://www.richland2.org

XIOC detected URL: https://www.richland2.org

extracted_from_files

URL
detected URL: https://enrich.richland2.org/

XIOC detected URL: https://enrich.richland2.org/

extracted_from_files

URL
detected URL: https://docs.google.com/forms/d/e/1FAIpQLSexkPWYLXvlgKJOt-IrLGzJ_9IcIaLTFQ2EsS1vVMrVvEMejw/viewform

XIOC detected URL: https://docs.google.com/forms/d/e/1FAIpQLSexkPWYLXvlgKJOt-IrLGzJ_9IcIaLTFQ2EsS1vVMrVvEMejw/viewform

extracted_from_files

URL
detected URL: https://docs.google.com/document/d/12LbgSw5aZruxDN71FiuKbd9ddhSRLLtFoXQhCohi3gU/edit?usp=sharing

XIOC detected URL: https://docs.google.com/document/d/12LbgSw5aZruxDN71FiuKbd9ddhSRLLtFoXQhCohi3gU/edit?usp=sharing

extracted_from_files

URL
detected URL: https://docs.google.com/document/d/1USHtLtR084cE2Hox1izyVKqW0wccqaRp5cR9u5xwHbc/edit

XIOC detected URL: https://docs.google.com/document/d/1USHtLtR084cE2Hox1izyVKqW0wccqaRp5cR9u5xwHbc/edit

extracted_from_files

URL
detected URL: https://docs.google.com/spreadsheets/d/1Rg57V3fKIAKBQqJVgoWRKAwmDKyzL-Ijq7KS4Ao60j8/edit#gid=1338787612

XIOC detected URL: https://docs.google.com/spreadsheets/d/1Rg57V3fKIAKBQqJVgoWRKAwmDKyzL-Ijq7KS4Ao60j8/edit#gid=1338787612

extracted_from_files

URL
detected URL: https://docs.google.com/document/u/0/d/1bcUqCLTPHLUmjAtC6hZLEHxL0bQZa1NPlIoebO5vlHg/edit

XIOC detected URL: https://docs.google.com/document/u/0/d/1bcUqCLTPHLUmjAtC6hZLEHxL0bQZa1NPlIoebO5vlHg/edit

extracted_from_files

URL
detected URL: https://www.richland2.org/WH

XIOC detected URL: https://www.richland2.org/WH

extracted_from_files

URL
detected URL: https://docs.google.com/spreadsheets/d/1I9pp_8LFmHfbfgtGCprAcwsW5pKCVRx3yV1uSrwvTPc/edit#gid=0

XIOC detected URL: https://docs.google.com/spreadsheets/d/1I9pp_8LFmHfbfgtGCprAcwsW5pKCVRx3yV1uSrwvTPc/edit#gid=0

extracted_from_files

URL
detected URL: https://forms.gle/yNnHrPaccsKmaTaPA

XIOC detected URL: https://forms.gle/yNnHrPaccsKmaTaPA

extracted_from_files

URL
detected URL: https://www.youtube.com/channel/UCAVweCckJADJ3dNjrduZW4A

XIOC detected URL: https://www.youtube.com/channel/UCAVweCckJADJ3dNjrduZW4A

extracted_from_files

URL
detected URL: https://docs.google.com/presentation/d/1LI-VfWnTfOLL5gzKB1tWKw7-Qce58vvzhjoAQT8ffHs/edit?usp=sharing

XIOC detected URL: https://docs.google.com/presentation/d/1LI-VfWnTfOLL5gzKB1tWKw7-Qce58vvzhjoAQT8ffHs/edit?usp=sharing

extracted_from_files

URL
detected URL: https://docs.google.com/document/d/1qjNlqmc10bxJ1kpXKHCBaC77xoW80br_uA2hRyeevGs/copy

XIOC detected URL: https://docs.google.com/document/d/1qjNlqmc10bxJ1kpXKHCBaC77xoW80br_uA2hRyeevGs/copy

extracted_from_files

URL
detected URL: https://docs.google.com/spreadsheets/d/167M8bBPNK3yhaBUTb5y06DLyYCVQAb16PY18f-8EDEM/edit#gid=0

XIOC detected URL: https://docs.google.com/spreadsheets/d/167M8bBPNK3yhaBUTb5y06DLyYCVQAb16PY18f-8EDEM/edit#gid=0

extracted_from_files

URL
detected URL: http://powerschool.richland2.org/

XIOC detected URL: http://powerschool.richland2.org/

extracted_from_files

URL
detected URL: https://docs.google.com/spreadsheets/d/1uDaJH7SILnXK7YKKEp3XD0P5xl7u2Vrp02uOvx8KgMM/edit#gid=0

XIOC detected URL: https://docs.google.com/spreadsheets/d/1uDaJH7SILnXK7YKKEp3XD0P5xl7u2Vrp02uOvx8KgMM/edit#gid=0

extracted_from_files

URL
detected URL: https://classroom.google.com/u/0/c/MzQxNjYwNDMzMzY5

XIOC detected URL: https://classroom.google.com/u/0/c/MzQxNjYwNDMzMzY5

extracted_from_files

URL
detected URL: https://bit.ly/SquadService

XIOC detected URL: https://bit.ly/SquadService

extracted_from_files

URL
detected URL: https://docs.google.com/spreadsheets/d/1Dt_4aEXldaXaX5rxKrookCNUTxsBB3QyvpBERSyM498/edit#gid=0

XIOC detected URL: https://docs.google.com/spreadsheets/d/1Dt_4aEXldaXaX5rxKrookCNUTxsBB3QyvpBERSyM498/edit#gid=0

extracted_from_files

URL
detected URL: http://clarity.brightbytes.net/

XIOC detected URL: http://clarity.brightbytes.net/

extracted_from_files

URL
detected URL: https://ecampususa.net/

XIOC detected URL: https://ecampususa.net/

extracted_from_files

URL
detected URL: https://forms.gle/A1XgHepuk6YX8ZQ98

XIOC detected URL: https://forms.gle/A1XgHepuk6YX8ZQ98

extracted_from_files

Domain
detected Domain: ywȫ.ng

XIOC detected Domain: ywȫ.ng

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/mm/

XIOC detected URL: http://ns.adobe.com/xap/1.0/mm/

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceEvent#

XIOC detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceEvent#

extracted_from_files

URL
detected URL: http://purl.org/dc/elements/1.1/

XIOC detected URL: http://purl.org/dc/elements/1.1/

extracted_from_files

URL
detected URL: http://ns.adobe.com/photoshop/1.0/

XIOC detected URL: http://ns.adobe.com/photoshop/1.0/

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/

XIOC detected URL: http://ns.adobe.com/xap/1.0/

extracted_from_files

URL
detected URL: https://www.parentsquare.com/signin

XIOC detected URL: https://www.parentsquare.com/signin

extracted_from_files

URL
detected URL: https://teachers.io

XIOC detected URL: https://teachers.io

extracted_from_files

Domain
detected Domain: 6b.bj

XIOC detected Domain: 6b.bj

extracted_from_files

Other
detected Email: m�@~�=.km

XIOC detected Email: m�@~�=.km

extracted_from_files

URL
detected URL: https://clients2.google.com/service/update2/crx

XIOC detected URL: https://clients2.google.com/service/update2/crx

extracted_from_files

URL
detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns#

XIOC detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns#

extracted_from_files

Domain
detected Domain: 40group.calendar.google.com

XIOC detected Domain: 40group.calendar.google.com

extracted_from_files

Domain
detected Domain: papercut.richland2.org

XIOC detected Domain: papercut.richland2.org

extracted_from_files

Domain
detected Domain: snow.live

XIOC detected Domain: snow.live

extracted_from_files

Domain
detected Domain: cert.ed.sc.gov

XIOC detected Domain: cert.ed.sc.gov

extracted_from_files

Domain
detected Domain: yw.us

XIOC detected Domain: yw.us

extracted_from_files

Domain
detected Domain: www.iec.ch

XIOC detected Domain: www.iec.ch

extracted_from_files

Domain
detected Domain: l.sk

XIOC detected Domain: l.sk

extracted_from_files

Domain
detected Domain: myhr.richland2.org

XIOC detected Domain: myhr.richland2.org

extracted_from_files

Domain
detected Domain: password.richland2.org

XIOC detected Domain: password.richland2.org

extracted_from_files

Domain
detected Domain: svcdesk.richland2.org

XIOC detected Domain: svcdesk.richland2.org

extracted_from_files

Domain
detected Domain: sclead.org

XIOC detected Domain: sclead.org

extracted_from_files

Domain
detected Domain: hr.new

XIOC detected Domain: hr.new

extracted_from_files

Domain
detected Domain: teachers.io

XIOC detected Domain: teachers.io

extracted_from_files

Domain
detected Domain: richland2.org

XIOC detected Domain: richland2.org

extracted_from_files

Domain
detected Domain: www.richland2.org

XIOC detected Domain: www.richland2.org

extracted_from_files

Domain
detected Domain: calendar.google.com

XIOC detected Domain: calendar.google.com

extracted_from_files

Domain
detected Domain: www.aesoponline.com

XIOC detected Domain: www.aesoponline.com

extracted_from_files

Domain
detected Domain: myapps.classlink.com

XIOC detected Domain: myapps.classlink.com

extracted_from_files

Domain
detected Domain: enrich.richland2.org

XIOC detected Domain: enrich.richland2.org

extracted_from_files

Domain
detected Domain: richland2.gosignmeup.com

XIOC detected Domain: richland2.gosignmeup.com

extracted_from_files

Domain
detected Domain: mobilemind.io

XIOC detected Domain: mobilemind.io

extracted_from_files

Domain
detected Domain: bit.ly

XIOC detected Domain: bit.ly

extracted_from_files

Domain
detected Domain: docs.google.com

XIOC detected Domain: docs.google.com

extracted_from_files

Domain
detected Domain: clarity.brightbytes.net

XIOC detected Domain: clarity.brightbytes.net

extracted_from_files

Domain
detected Domain: ecampususa.net

XIOC detected Domain: ecampususa.net

extracted_from_files

Domain
detected Domain: forms.gle

XIOC detected Domain: forms.gle

extracted_from_files

Domain
detected Domain: www.youtube.com

XIOC detected Domain: www.youtube.com

extracted_from_files

Domain
detected Domain: powerschool.richland2.org

XIOC detected Domain: powerschool.richland2.org

extracted_from_files

Domain
detected Domain: ѐ.dm

XIOC detected Domain: ѐ.dm

extracted_from_files

Domain
detected Domain: clients2.google.com

XIOC detected Domain: clients2.google.com

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

Domain
detected Domain: ns.adobe.com

XIOC detected Domain: ns.adobe.com

extracted_from_files

URL
detected URL: http://ns.adobe.com/exif/1.0/

XIOC detected URL: http://ns.adobe.com/exif/1.0/

extracted_from_files

Domain
detected Domain: www.parentsquare.com

XIOC detected Domain: www.parentsquare.com

extracted_from_files

Domain
detected Domain: classroom.google.com

XIOC detected Domain: classroom.google.com

extracted_from_files

Domain
detected Domain: n.zw

XIOC detected Domain: n.zw

extracted_from_files

Domain
detected Domain: lo.us

XIOC detected Domain: lo.us

extracted_from_files

Domain
detected Domain: o.ye

XIOC detected Domain: o.ye

extracted_from_files

Domain
detected Domain: k.az

XIOC detected Domain: k.az

extracted_from_files

Domain
detected Domain: ˋfl.co

XIOC detected Domain: ˋfl.co

extracted_from_files

Domain
detected Domain: oq.mt

XIOC detected Domain: oq.mt

extracted_from_files

Domain
detected Domain: jr.pn

XIOC detected Domain: jr.pn

extracted_from_files

Domain
detected Domain: sc.tm

XIOC detected Domain: sc.tm

extracted_from_files

Domain
detected Domain: ĉd.so

XIOC detected Domain: ĉd.so

extracted_from_files

Domain
detected Domain: 7.gl

XIOC detected Domain: 7.gl

extracted_from_files

Domain
detected Domain: ik.pk

XIOC detected Domain: ik.pk

extracted_from_files

Domain
detected Domain: 2.io

XIOC detected Domain: 2.io

extracted_from_files

Domain
detected Domain: 5.sc

XIOC detected Domain: 5.sc

extracted_from_files

Domain
detected Domain: p.rw

XIOC detected Domain: p.rw

extracted_from_files

Domain
detected Domain: x.sv

XIOC detected Domain: x.sv

extracted_from_files

Domain
detected Domain: s.io

XIOC detected Domain: s.io

extracted_from_files

Domain
detected Domain: mk.ps

XIOC detected Domain: mk.ps

extracted_from_files

Domain
detected Domain: b.mv

XIOC detected Domain: b.mv

extracted_from_files

Domain
detected Domain: g.mc

XIOC detected Domain: g.mc

extracted_from_files

Domain
detected Domain: h.jp

XIOC detected Domain: h.jp

extracted_from_files

Domain
detected Domain: t.na

XIOC detected Domain: t.na

extracted_from_files

Domain
detected Domain: wx.lc

XIOC detected Domain: wx.lc

extracted_from_files

Domain
detected Domain: w.is

XIOC detected Domain: w.is

extracted_from_files

Domain
detected Domain: 62.li

XIOC detected Domain: 62.li

extracted_from_files

Domain
detected Domain: 7.re

XIOC detected Domain: 7.re

extracted_from_files

Domain
detected Domain: 衯q.sv

XIOC detected Domain: 衯q.sv

extracted_from_files

Domain
detected Domain: ndz.no

XIOC detected Domain: ndz.no

extracted_from_files

Domain
detected Domain: k.ye

XIOC detected Domain: k.ye

extracted_from_files

Domain
detected Domain: g.nr

XIOC detected Domain: g.nr

extracted_from_files

Domain
detected Domain: i6.la

XIOC detected Domain: i6.la

extracted_from_files

Domain
detected Domain: u.ao

XIOC detected Domain: u.ao

extracted_from_files

Domain
detected Domain: ɏc.co

XIOC detected Domain: ɏc.co

extracted_from_files

IP
detected Domain: ip.to

XIOC detected Domain: ip.to

extracted_from_files

Domain
detected Domain: s.cy

XIOC detected Domain: s.cy

extracted_from_files

Domain
detected Domain: d.ba

XIOC detected Domain: d.ba

extracted_from_files

Domain
detected Domain: ӽնk.by

XIOC detected Domain: ӽնk.by

extracted_from_files

Domain
detected Domain: 3.re

XIOC detected Domain: 3.re

extracted_from_files

Domain
detected Domain: 2x.bm

XIOC detected Domain: 2x.bm

extracted_from_files

Domain
detected Domain: ão.gu

XIOC detected Domain: ão.gu

extracted_from_files

Domain
detected Domain: a-.pr

XIOC detected Domain: a-.pr

extracted_from_files

Domain
detected Domain: k.sb

XIOC detected Domain: k.sb

extracted_from_files

Domain
detected Domain: zpin.ye

XIOC detected Domain: zpin.ye

extracted_from_files

Domain
detected Domain: s.hu

XIOC detected Domain: s.hu

extracted_from_files

Domain
detected Domain: ڕe.mc

XIOC detected Domain: ڕe.mc

extracted_from_files

Domain
detected Domain: q.bo

XIOC detected Domain: q.bo

extracted_from_files

IP
detected IP: 8::

XIOC detected IP: 8::

extracted_from_files

Domain
detected Domain: st.yt

XIOC detected Domain: st.yt

extracted_from_files

Domain
detected Domain: e.nc

XIOC detected Domain: e.nc

extracted_from_files

Domain
detected Domain: jp.gb

XIOC detected Domain: jp.gb

extracted_from_files

Domain
detected Domain: x.uy

XIOC detected Domain: x.uy

extracted_from_files

Domain
detected Domain: ӈ.ky

XIOC detected Domain: ӈ.ky

extracted_from_files

Domain
detected Domain: k.tl

XIOC detected Domain: k.tl

extracted_from_files

Domain
detected Domain: 8.ac

XIOC detected Domain: 8.ac

extracted_from_files

Domain
detected Domain: m.kn

XIOC detected Domain: m.kn

extracted_from_files

Domain
detected Domain: a.ss

XIOC detected Domain: a.ss

extracted_from_files

Domain
detected Domain: f.kz

XIOC detected Domain: f.kz

extracted_from_files

Domain
detected Domain: z.mw

XIOC detected Domain: z.mw

extracted_from_files

Domain
detected Domain: l.lt

XIOC detected Domain: l.lt

extracted_from_files

Domain
detected Domain: t.ma

XIOC detected Domain: t.ma

extracted_from_files

Domain
detected Domain: i.mk

XIOC detected Domain: i.mk

extracted_from_files

Domain
detected Domain: 郉.mw

XIOC detected Domain: 郉.mw

extracted_from_files

Domain
detected Domain: z.ag

XIOC detected Domain: z.ag

extracted_from_files

Domain
detected Domain: p.uy

XIOC detected Domain: p.uy

extracted_from_files

IP
detected IP: ::af

XIOC detected IP: ::af

extracted_from_files

IP
detected IP: ::e

XIOC detected IP: ::e

extracted_from_files

IP
detected IP: 3::

XIOC detected IP: 3::

extracted_from_files

IP
detected IP: ::6

XIOC detected IP: ::6

extracted_from_files

IP
detected IP: 1::

XIOC detected IP: 1::

extracted_from_files

IP
detected IP: 70::

XIOC detected IP: 70::

extracted_from_files

Domain
detected Domain: q.zm

XIOC detected Domain: q.zm

extracted_from_files

IP
detected IP: 6::

XIOC detected IP: 6::

extracted_from_files

IP
detected IP: ::5

XIOC detected IP: ::5

extracted_from_files

IP
detected IP: 0::

XIOC detected IP: 0::

extracted_from_files

IP
detected IP: ::8

XIOC detected IP: ::8

extracted_from_files

IP
detected IP: 4::

XIOC detected IP: 4::

extracted_from_files

IP
detected IP: ::c

XIOC detected IP: ::c

extracted_from_files

IP
detected IP: ::db

XIOC detected IP: ::db

extracted_from_files

IP
detected IP: ::9

XIOC detected IP: ::9

extracted_from_files

IP
detected IP: ::7

XIOC detected IP: ::7

extracted_from_files

IP
detected IP: ::b

XIOC detected IP: ::b

extracted_from_files

IP
detected IP: ::d

XIOC detected IP: ::d

extracted_from_files

IP
detected IP: b::c

XIOC detected IP: b::c

extracted_from_files

IP
detected IP: ::5f

XIOC detected IP: ::5f

extracted_from_files

IP
detected IP: 5::

XIOC detected IP: 5::

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

IP
detected IP: ::08

XIOC detected IP: ::08

extracted_from_files

IP
detected IP: ::f

XIOC detected IP: ::f

extracted_from_files

IP
detected IP: 2::

XIOC detected IP: 2::

extracted_from_files

IP
detected IP: b::5

XIOC detected IP: b::5

extracted_from_files

IP
detected IP: a::

XIOC detected IP: a::

extracted_from_files

URL
detected Domain: purl.org

XIOC detected Domain: purl.org

extracted_from_files

Security Analysis Summary

Security Analysis Overview

The W is a Chrome Web Store extension published by [email protected]. Version 6.0.3 has been analyzed by the Risky Plugins security platform, receiving a risk score of 39.97/100 (LOW risk) based on 191 security findings.

Risk Assessment

This extension presents low security risk. Some minor findings were detected, but nothing that would prevent typical usage. Reviewing the detailed findings below is recommended before use in sensitive environments.

Findings Breakdown

  • High: 3 finding(s)
  • Medium: 188 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

The W is published by [email protected] on the Chrome Web Store marketplace. The extension has approximately 76 users.

Recommendation

Exercise caution with this extension. Review the detailed findings and ensure the requested permissions align with the extension's stated functionality before installation.

Frequently Asked Questions