IOC Report
https://www.xanxys.net/totp/

loading gif

Files

File Path
Type
Category
Malicious
Chrome Cache Entry: 48
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 49
Algol 68 source, ASCII text
dropped
Chrome Cache Entry: 50
Algol 68 source, ASCII text
downloaded
Chrome Cache Entry: 51
PNG image data, 26 x 26, 8-bit colormap, interlaced
downloaded
Chrome Cache Entry: 52
HTML document, Unicode text, UTF-8 text, with very long lines (3129)
dropped
Chrome Cache Entry: 53
HTML document, ASCII text, with very long lines (3909)
downloaded
Chrome Cache Entry: 54
PNG image data, 26 x 26, 8-bit colormap, interlaced
dropped
Chrome Cache Entry: 55
HTML document, Unicode text, UTF-8 text, with very long lines (3129)
downloaded
Chrome Cache Entry: 56
ASCII text
downloaded
Chrome Cache Entry: 57
HTML document, ASCII text
downloaded

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=2084,i,12156859204289601637,7656325208021768426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.xanxys.net/totp/"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://otpauth//totp/%3A?secret=4umhud2zxfjgar6a2zzefjayzqelltzy&issuer=
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1996,i,8034923527941577543,2392212650039995992,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://www.xanxys.net/totp/
http://www.denso-wave.com/qrcode/faqpatent-e.html
unknown
https://code.google.com/p/google-authenticator/wiki/KeyUriFormat
unknown
https://www.xanxys.net/common.css
185.199.108.153
http://www.opensource.org/licenses/mit-license.php
unknown
https://www.xanxys.net/totp/base32.js
185.199.108.153
http://map.naver.com
unknown
http://www.nongnu.org/oath-toolkit/oathtool.1.html
unknown
https://www.xanxys.net/tiny_grid.png
185.199.108.153
http://tools.ietf.org/html/rfc4226
unknown
http://tools.ietf.org/html/rfc6238
unknown
https://twitter.com/githubstatus
unknown
https://www.xanxys.net/favicon.ico
185.199.108.153
http://naver.com
unknown
https://githubstatus.com
unknown
http://jeromeetienne.github.com/jquery-qrcode/
unknown
https://help.github.com/pages/
unknown
http://code.google.com/p/android/issues/detail?id=5141
unknown
https://www.xanxys.net/totp/qrcode.js
185.199.108.153
http://jindo.dev.naver.com/collie
unknown
http://www.d-project.com/
unknown
https://www.xanxys.net/totp/
There are 11 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
google.com
142.250.181.142
www.google.com
142.250.181.68
xanxys.github.io
185.199.108.153
www.xanxys.net
unknown

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States
185.199.108.153
xanxys.github.io
Netherlands
192.168.2.4
unknown
unknown

DOM / HTML

URL
Malicious
https://www.xanxys.net/totp/