Is "Direct Paper Importer" on Chrome Web Store Safe to Install?

[email protected] · chrome · v1.1.2

When you are opening a PDF paper by the PDF viewer, you can import the paper to Mendeley Library directly. Notes: ・If you use this extension, you have to register your Mendeley's account. ・It only works when you open a PDF file by PDF.js viewer or chrome's default pdf viewer. Other viewers are not confirmed. References: ・pdf viewer (PDF.js) https://chrome.google.com/webstore/detail/pdf-viewer/oemmndcbldboiebfnladdacbdfmadadm?hl=ja ・Mendeley https://www.mendeley.com/ Update: Jul. 18th, 2021: fixed authorization bugs.

Risk Assessment

Analyzed
62.23
out of 100
MEDIUM

177 security findings detected across all analyzers

Severity Breakdown

0
Critical
23
High
154
Medium
0
Low
0
Info

Finding Categories

23
Malware
9
Network
143
IoC Indicators

YARA Rules Matched

7 rules(23 hits)
postinstall crypto operations postinstall network communication postinstall obfuscation NoUseWeakRandom postinstall system command postinstall file manipulation postinstall file download

About This Extension

When you are opening a PDF paper by the PDF viewer, you can import the paper to Mendeley Library directly. Notes: ・If you use this extension, you have to register your Mendeley's account. ・It only works when you open a PDF file by PDF.js viewer or chrome's default pdf viewer. Other viewers are not confirmed. References: ・pdf viewer (PDF.js) https://chrome.google.com/webstore/detail/pdf-viewer/oemmndcbldboiebfnladdacbdfmadadm?hl=ja ・Mendeley https://www.mendeley.com/ Update: Jul. 18th, 2021: fixed authorization bugs.

Detailed Findings

33 total

YARA Rule Matches

7 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
13
IP Addresses
12
Domains
121
Strings
143

All Indicators · 143

Domain
detected Domain: nextstate.call

XIOC detected Domain: nextstate.call

extracted_from_files

IP
detected IP: e::bef

XIOC detected IP: e::bef

extracted_from_files

IP
detected IP: ::af

XIOC detected IP: ::af

extracted_from_files

URL
detected URL: https://popper.js.org)

XIOC detected URL: https://popper.js.org)

extracted_from_files

URL
detected URL: https://clients2.google.com/service/update2/crx

XIOC detected URL: https://clients2.google.com/service/update2/crx

extracted_from_files

URL
detected URL: https://www.mendeley.com/

XIOC detected URL: https://www.mendeley.com/

extracted_from_files

URL
detected URL: https://api.mendeley.com/documents

XIOC detected URL: https://api.mendeley.com/documents

extracted_from_files

URL
detected URL: https://api.mendeley.com/folders/

XIOC detected URL: https://api.mendeley.com/folders/

extracted_from_files

URL
detected URL: https://getbootstrap.com/)

XIOC detected URL: https://getbootstrap.com/)

extracted_from_files

URL
detected URL: https://github.com/twbs/bootstrap/blob/main/LICENSE)

XIOC detected URL: https://github.com/twbs/bootstrap/blob/main/LICENSE)

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg'

XIOC detected URL: http://www.w3.org/2000/svg'

extracted_from_files

URL
detected URL: https://github.com/twbs/bootstrap/graphs/contributors)

XIOC detected URL: https://github.com/twbs/bootstrap/graphs/contributors)

extracted_from_files

Domain
detected Domain: popper.min.js.map

XIOC detected Domain: popper.min.js.map

extracted_from_files

Domain
detected Domain: www.mendeley.com

XIOC detected Domain: www.mendeley.com

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

URL
detected URL: https://npidohmmbejkcfpcheggofmfdbnlhngg.chromiumapp.org

XIOC detected URL: https://npidohmmbejkcfpcheggofmfdbnlhngg.chromiumapp.org

extracted_from_files

URL
detected URL: https://api.mendeley.com/folders

XIOC detected URL: https://api.mendeley.com/folders

extracted_from_files

URL
detected URL: https://api.mendeley.com/oauth/token

XIOC detected URL: https://api.mendeley.com/oauth/token

extracted_from_files

URL
detected URL: https://api.mendeley.com/oauth/authorize?client_id='

XIOC detected URL: https://api.mendeley.com/oauth/authorize?client_id='

extracted_from_files

Domain
detected Domain: t.data

XIOC detected Domain: t.data

extracted_from_files

Domain
detected Domain: e.data

XIOC detected Domain: e.data

extracted_from_files

Domain
detected Domain: n.name

XIOC detected Domain: n.name

extracted_from_files

Domain
detected Domain: o.style

XIOC detected Domain: o.style

extracted_from_files

Domain
detected Domain: t.elements.popper.style

XIOC detected Domain: t.elements.popper.style

extracted_from_files

Domain
detected Domain: t.elements.arrow.style

XIOC detected Domain: t.elements.arrow.style

extracted_from_files

Domain
detected Domain: r.style

XIOC detected Domain: r.style

extracted_from_files

Domain
detected Domain: t.host

XIOC detected Domain: t.host

extracted_from_files

Domain
detected Domain: t.top

XIOC detected Domain: t.top

extracted_from_files

Domain
detected Domain: n.top

XIOC detected Domain: n.top

extracted_from_files

Domain
detected Domain: n.bottom-n.top

XIOC detected Domain: n.bottom-n.top

extracted_from_files

Domain
detected Domain: a.top-f.top

XIOC detected Domain: a.top-f.top

extracted_from_files

Domain
detected Domain: r.top

XIOC detected Domain: r.top

extracted_from_files

Domain
detected Domain: n.data

XIOC detected Domain: n.data

extracted_from_files

Domain
detected Domain: doreset.call

XIOC detected Domain: doreset.call

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: msg.name

XIOC detected Domain: msg.name

extracted_from_files

Domain
detected Domain: clients2.google.com

XIOC detected Domain: clients2.google.com

extracted_from_files

Domain
detected Domain: e.host

XIOC detected Domain: e.host

extracted_from_files

Domain
detected Domain: e.name

XIOC detected Domain: e.name

extracted_from_files

Domain
detected Domain: o.name

XIOC detected Domain: o.name

extracted_from_files

Domain
detected Domain: modecreator.call

XIOC detected Domain: modecreator.call

extracted_from_files

IP
detected Domain: serializablecipher.encrypt.call

XIOC detected Domain: serializablecipher.encrypt.call

extracted_from_files

IP
detected Domain: serializablecipher.decrypt.call

XIOC detected Domain: serializablecipher.decrypt.call

extracted_from_files

Domain
detected Domain: generatekeystreamandencrypt.call

XIOC detected Domain: generatekeystreamandencrypt.call

extracted_from_files

Domain
detected Domain: exchangelr.call

XIOC detected Domain: exchangelr.call

extracted_from_files

Domain
detected Domain: exchangerl.call

XIOC detected Domain: exchangerl.call

extracted_from_files

Domain
detected Domain: generatekeystreamword.call

XIOC detected Domain: generatekeystreamword.call

extracted_from_files

Domain
detected Domain: cryptojs.md

XIOC detected Domain: cryptojs.md

extracted_from_files

Domain
detected Domain: c.md

XIOC detected Domain: c.md

extracted_from_files

Domain
detected Domain: superinit.call

XIOC detected Domain: superinit.call

extracted_from_files

Domain
detected Domain: www.openssl.org

XIOC detected Domain: www.openssl.org

extracted_from_files

Domain
detected Domain: dofinalize.call

XIOC detected Domain: dofinalize.call

extracted_from_files

Domain
detected Domain: xorblock.call

XIOC detected Domain: xorblock.call

extracted_from_files

IP
detected Domain: cipher.reset.call

XIOC detected Domain: cipher.reset.call

extracted_from_files

Domain
detected Domain: click.bs.tab.data

XIOC detected Domain: click.bs.tab.data

extracted_from_files

Domain
detected Domain: bootstrap.min.js.map

XIOC detected Domain: bootstrap.min.js.map

extracted_from_files

Domain
detected Domain: gmail.com

XIOC detected Domain: gmail.com

extracted_from_files

Domain
detected Domain: base.clone.call

XIOC detected Domain: base.clone.call

extracted_from_files

Domain
detected Domain: bufferedblockalgorithm.reset.call

XIOC detected Domain: bufferedblockalgorithm.reset.call

extracted_from_files

Domain
detected Domain: algo.md

XIOC detected Domain: algo.md

extracted_from_files

Domain
detected Domain: hasher.clone.call

XIOC detected Domain: hasher.clone.call

extracted_from_files

Domain
detected Domain: config.target

XIOC detected Domain: config.target

extracted_from_files

Domain
detected Domain: t.target.id

XIOC detected Domain: t.target.id

extracted_from_files

Domain
detected Domain: load.bs.scrollspy.data

XIOC detected Domain: load.bs.scrollspy.data

extracted_from_files

Domain
detected Domain: hide.bs.tab

XIOC detected Domain: hide.bs.tab

extracted_from_files

Domain
detected Domain: show.bs.tab

XIOC detected Domain: show.bs.tab

extracted_from_files

Domain
detected Domain: hidden.bs.tab

XIOC detected Domain: hidden.bs.tab

extracted_from_files

Domain
detected Domain: shown.bs.tab

XIOC detected Domain: shown.bs.tab

extracted_from_files

Domain
detected Domain: config.placement.call

XIOC detected Domain: config.placement.call

extracted_from_files

Domain
detected Domain: config.title.call

XIOC detected Domain: config.title.call

extracted_from_files

Domain
detected Domain: this.constructor.event.click

XIOC detected Domain: this.constructor.event.click

extracted_from_files

Domain
detected Domain: e.show

XIOC detected Domain: e.show

extracted_from_files

Domain
detected Domain: e.map

XIOC detected Domain: e.map

extracted_from_files

Domain
detected Domain: e.call

XIOC detected Domain: e.call

extracted_from_files

Domain
detected Domain: click.bs.modal.data

XIOC detected Domain: click.bs.modal.data

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: click.bs.offcanvas.data

XIOC detected Domain: click.bs.offcanvas.data

extracted_from_files

Domain
detected Domain: load.bs.offcanvas.data

XIOC detected Domain: load.bs.offcanvas.data

extracted_from_files

Domain
detected Domain: activetrigger.click

XIOC detected Domain: activetrigger.click

extracted_from_files

Domain
detected Domain: this.constructor.event.show

XIOC detected Domain: this.constructor.event.show

extracted_from_files

Domain
detected Domain: this.constructor.name

XIOC detected Domain: this.constructor.name

extracted_from_files

Domain
detected Domain: i.next

XIOC detected Domain: i.next

extracted_from_files

Domain
detected Domain: t.target

XIOC detected Domain: t.target

extracted_from_files

Domain
detected Domain: keydown.bs.dropdown.data

XIOC detected Domain: keydown.bs.dropdown.data

extracted_from_files

Domain
detected Domain: click.bs.dropdown.data

XIOC detected Domain: click.bs.dropdown.data

extracted_from_files

Domain
detected Domain: keyup.bs.dropdown.data

XIOC detected Domain: keyup.bs.dropdown.data

extracted_from_files

Domain
detected Domain: t.style

XIOC detected Domain: t.style

extracted_from_files

Domain
detected Domain: backdrop.show

XIOC detected Domain: backdrop.show

extracted_from_files

Domain
detected Domain: click.bs.carousel.data

XIOC detected Domain: click.bs.carousel.data

extracted_from_files

Domain
detected Domain: load.bs.carousel.data

XIOC detected Domain: load.bs.carousel.data

extracted_from_files

Domain
detected Domain: element.id

XIOC detected Domain: element.id

extracted_from_files

Domain
detected Domain: this.show

XIOC detected Domain: this.show

extracted_from_files

Domain
detected Domain: element.style

XIOC detected Domain: element.style

extracted_from_files

Domain
detected Domain: click.bs.collapse.data

XIOC detected Domain: click.bs.collapse.data

extracted_from_files

Domain
detected Domain: popper.js.org

XIOC detected Domain: popper.js.org

extracted_from_files

Domain
detected Domain: click.bs.alert.data

XIOC detected Domain: click.bs.alert.data

extracted_from_files

Domain
detected Domain: click.bs.button.data

XIOC detected Domain: click.bs.button.data

extracted_from_files

Domain
detected Domain: e.top

XIOC detected Domain: e.top

extracted_from_files

Domain
detected Domain: this.next

XIOC detected Domain: this.next

extracted_from_files

Domain
detected Domain: b.one

XIOC detected Domain: b.one

extracted_from_files

Domain
detected Domain: this.to

XIOC detected Domain: this.to

extracted_from_files

Domain
detected Domain: s.to

XIOC detected Domain: s.to

extracted_from_files

Domain
detected Domain: tostring.call

XIOC detected Domain: tostring.call

extracted_from_files

Domain
detected Domain: t.name

XIOC detected Domain: t.name

extracted_from_files

Domain
detected Domain: t.call

XIOC detected Domain: t.call

extracted_from_files

Domain
detected Domain: b.off

XIOC detected Domain: b.off

extracted_from_files

Domain
detected Domain: this.constructor.data

XIOC detected Domain: this.constructor.data

extracted_from_files

Domain
detected Domain: this.data

XIOC detected Domain: this.data

extracted_from_files

Domain
detected Domain: modal.show

XIOC detected Domain: modal.show

extracted_from_files

Domain
detected Domain: modal-backdrop.show

XIOC detected Domain: modal-backdrop.show

extracted_from_files

IP
detected Domain: tooltip.show

XIOC detected Domain: tooltip.show

extracted_from_files

Domain
detected Domain: offcanvas.show

XIOC detected Domain: offcanvas.show

extracted_from_files

Domain
detected Domain: bootstrap.min.css.map

XIOC detected Domain: bootstrap.min.css.map

extracted_from_files

Domain
detected Domain: element.prototype.queryselectorall.call

XIOC detected Domain: element.prototype.queryselectorall.call

extracted_from_files

Domain
detected Domain: element.prototype.queryselector.call

XIOC detected Domain: element.prototype.queryselector.call

extracted_from_files

Domain
detected Domain: btn-outline-info.dropdown-toggle.show

XIOC detected Domain: btn-outline-info.dropdown-toggle.show

extracted_from_files

Domain
detected Domain: btn-outline-warning.dropdown-toggle.show

XIOC detected Domain: btn-outline-warning.dropdown-toggle.show

extracted_from_files

Domain
detected Domain: btn-outline-danger.dropdown-toggle.show

XIOC detected Domain: btn-outline-danger.dropdown-toggle.show

extracted_from_files

Domain
detected Domain: btn-outline-light.dropdown-toggle.show

XIOC detected Domain: btn-outline-light.dropdown-toggle.show

extracted_from_files

Domain
detected Domain: btn-outline-dark.dropdown-toggle.show

XIOC detected Domain: btn-outline-dark.dropdown-toggle.show

extracted_from_files

Domain
detected Domain: dropdown-menu.show

XIOC detected Domain: dropdown-menu.show

extracted_from_files

Domain
detected Domain: nav-item.show

XIOC detected Domain: nav-item.show

extracted_from_files

Domain
detected Domain: form-control.is

XIOC detected Domain: form-control.is

extracted_from_files

Domain
detected Domain: textarea.form-control.is

XIOC detected Domain: textarea.form-control.is

extracted_from_files

Domain
detected Domain: form-select.is

XIOC detected Domain: form-select.is

extracted_from_files

Domain
detected Domain: form-check-input.is

XIOC detected Domain: form-check-input.is

extracted_from_files

Domain
detected Domain: btn-outline-primary.dropdown-toggle.show

XIOC detected Domain: btn-outline-primary.dropdown-toggle.show

extracted_from_files

Domain
detected Domain: btn-outline-secondary.dropdown-toggle.show

XIOC detected Domain: btn-outline-secondary.dropdown-toggle.show

extracted_from_files

Domain
detected Domain: btn-outline-success.dropdown-toggle.show

XIOC detected Domain: btn-outline-success.dropdown-toggle.show

extracted_from_files

Domain
detected Domain: api.mendeley.com

XIOC detected Domain: api.mendeley.com

extracted_from_files

Domain
detected Domain: npidohmmbejkcfpcheggofmfdbnlhngg.chromiumapp.org

XIOC detected Domain: npidohmmbejkcfpcheggofmfdbnlhngg.chromiumapp.org

extracted_from_files

Domain
detected Domain: port.name

XIOC detected Domain: port.name

extracted_from_files

Domain
detected Domain: info.id

XIOC detected Domain: info.id

extracted_from_files

Domain
detected Domain: getbootstrap.com

XIOC detected Domain: getbootstrap.com

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

IP
detected IP: ::bef

XIOC detected IP: ::bef

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

IP
detected IP: ::f

XIOC detected IP: ::f

extracted_from_files

IP
detected IP: e::

XIOC detected IP: e::

extracted_from_files

IP
detected IP: ed::

XIOC detected IP: ed::

extracted_from_files

IP
detected IP: e::af

XIOC detected IP: e::af

extracted_from_files

Domain
detected Domain: config.delay.show

XIOC detected Domain: config.delay.show

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Direct Paper Importer is a Chrome Web Store extension published by [email protected]. Version 1.1.2 has been analyzed by the Risky Plugins security platform, receiving a risk score of 62.23/100 (MEDIUM risk) based on 177 security findings.

Risk Assessment

This extension presents high security risk. Significant concerns were identified during analysis. It is not recommended for use in sensitive or production environments without thorough review.

Findings Breakdown

  • High: 23 finding(s)
  • Medium: 154 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Direct Paper Importer is published by [email protected] on the Chrome Web Store marketplace. The extension has approximately 1K users.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions