Is "Image Downloader Pro" on Firefox Add-ons Safe to Install?

Blife · firefox · v1.3.0

If you've ever tried to download all the images on a website, you'll have probably realized how boring and time-consuming this task can be. Luckily you can now use Image Downloader Pro, an MV3 extension that has been especially designed to download all the photos on in the website you're currently viewing.It supports common web image formats, including JPG/GIF/PNG/SVG/WEBP/BMP/ICO/TIFF. Image Downloader Pro features a complete configuration menu that enables you to set filters, so that you only download images between certain size or dimensions, or even only selected formats and layouts. After installing this powerful Image Downloader Pro, you will find it is the most perfect image download tool on the add-ons.You won't find a better tool to simplify the process than our extension. Help us to improve our product and leave a comment or request. Also don't forget to share it with your friends. Download this extension now and see for yourself!

Risk Assessment

Analyzed
56.22
out of 100
MEDIUM

189 security findings detected across all analyzers

Firefox extension requesting 8 permissions

Severity Breakdown

0
Critical
38
High
151
Medium
0
Low
0
Info

Finding Categories

38
Malware Signatures
3
Network
148
IoC Indicators

YARA Rules Matched

10 rules(38 hits)
postinstall file download postinstall file manipulation postinstall network communication postinstall obfuscation postinstall system command postinstall crypto operations DebuggerStatementsShouldNotBeUsed postinstall environment access NoUseWeakRandom SQLInjection

Requested Permissions

8 permissions
https://*/*
Dangerous
http://*/*
Dangerous
downloads

Manage, modify, and monitor downloads

High
webRequest

Intercept, modify, and block all network requests

High
activeTab
Medium
storage
Low
scripting
Low
declarativeNetRequest
Low

About This Extension

If you've ever tried to download all the images on a website, you'll have probably realized how boring and time-consuming this task can be. Luckily you can now use Image Downloader Pro, an MV3 extension that has been especially designed to download all the photos on in the website you're currently <a href="https://prod.outgoing.prod.webservices.mozgcp.net/v1/c7f431d75df671d590a509c171c48808e913359053a1646a0231b64dc953d7d4/http%3A//viewing.It" rel="nofollow">viewing.It</a> supports common web image formats, including JPG/GIF/PNG/SVG/WEBP/BMP/ICO/TIFF. Image Downloader Pro features a complete configuration menu that enables you to set filters, so that you only download images between certain size or dimensions, or even only selected formats and layouts. After installing this powerful Image Downloader Pro, you will find it is the most perfect image download tool on the add-ons.You won't find a better tool to simplify the process than our extension. Help us to improve our product and leave a comment or request. Also don't forget to share it with your friends. Download this extension now and see for yourself!

Detailed Findings

41 total

YARA Rule Matches

10 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
9
IP Addresses
3
Domains
135
Strings
148

All Indicators · 148

Domain
detected Domain: this.show

XIOC detected Domain: this.show

extracted_from_files

Domain
detected Domain: t061193fea58a289612266b4ecdfda702.7e84656331addfb7e22d9f21a68dc56b.addons.mozilla.org

XIOC detected Domain: t061193fea58a289612266b4ecdfda702.7e84656331addfb7e22d9f21a68dc56b.addons.mozilla.org

extracted_from_files

URL
detected URL: http://www.w3.org/1999/xlink

XIOC detected URL: http://www.w3.org/1999/xlink

extracted_from_files

URL
detected URL: https://microsoftedge.microsoft.com/addons/detail/'

XIOC detected URL: https://microsoftedge.microsoft.com/addons/detail/'

extracted_from_files

URL
detected URL: https://addons.mozilla.org/firefox/addon/'

XIOC detected URL: https://addons.mozilla.org/firefox/addon/'

extracted_from_files

URL
detected URL: https://chrome.google.com/webstore/detail/'

XIOC detected URL: https://chrome.google.com/webstore/detail/'

extracted_from_files

URL
detected URL: http://jqueryui.com

XIOC detected URL: http://jqueryui.com

extracted_from_files

URL
detected URL: http://jqueryui.com/themeroller/?scope=&folderName=base&cornerRadiusShadow=8px&offsetLeftShadow=0px&offsetTopShadow=0px&thicknessShadow=5px&opacityShadow=30&bgImgOpacityShadow=0&bgTextureShadow=flat&bgColorShadow=666666&opacityOverlay=30&bgImgOpacityOverlay=0&bgTextureOverlay=flat&bgColorOverlay=aaaaaa&iconColorError=cc0000&fcError=5f3f3f&borderColorError=f1a899&bgTextureError=flat&bgColorError=fddfdf&iconColorHighlight=777620&fcHighlight=777620&borderColorHighlight=dad55e&bgTextureHighlight=flat&bgColorHighlight=fffa90&iconColorActive=ffffff&fcActive=ffffff&borderColorActive=003eff&bgTextureActive=flat&bgColorActive=007fff&iconColorHover=555555&fcHover=2b2b2b&borderColorHover=cccccc&bgTextureHover=flat&bgColorHover=ededed&iconColorDefault=777777&fcDefault=454545&borderColorDefault=c5c5c5&bgTextureDefault=flat&bgColorDefault=f6f6f6&iconColorContent=444444&fcContent=333333&borderColorContent=dddddd&bgTextureContent=flat&bgColorContent=ffffff&iconColorHeader=444444&fcHeader=333333&borderColorHeader=dddddd&bgTextureHeader=flat&bgColorHeader=e9e9e9&cornerRadius=3px&fwDefault=normal&fsDefault=1em&ffDefault=Arial%2CHelvetica%2Csans-serif

XIOC detected URL: http://jqueryui.com/themeroller/?scope=&folderName=base&cornerRadiusShadow=8px&offsetLeftShadow=0px&offsetTopShadow=0px&thicknessShadow=5px&opacityShadow=30&bgImgOpacityShadow=0&bgTextureShadow=flat&bgColorShadow=666666&opacityOverlay=30&bgImgOpacityOverlay=0&bgTextureOverlay=flat&bgColorOverlay=aaaaaa&iconColorError=cc0000&fcError=5f3f3f&borderColorError=f1a899&bgTextureError=flat&bgColorError=fddfdf&iconColorHighlight=777620&fcHighlight=777620&borderColorHighlight=dad55e&bgTextureHighlight=flat&bgColorHighlight=fffa90&iconColorActive=ffffff&fcActive=ffffff&borderColorActive=003eff&bgTextureActive=flat&bgColorActive=007fff&iconColorHover=555555&fcHover=2b2b2b&borderColorHover=cccccc&bgTextureHover=flat&bgColorHover=ededed&iconColorDefault=777777&fcDefault=454545&borderColorDefault=c5c5c5&bgTextureDefault=flat&bgColorDefault=f6f6f6&iconColorContent=444444&fcContent=333333&borderColorContent=dddddd&bgTextureContent=flat&bgColorContent=ffffff&iconColorHeader=444444&fcHeader=333333&borderColorHeader=dddddd&bgTextureHeader=flat&bgColorHeader=e9e9e9&cornerRadius=3px&fwDefault=normal&fsDefault=1em&ffDefault=Arial%2CHelvetica%2Csans-serif

extracted_from_files

Hash
detected MD5 Hash: 7e84656331addfb7e22d9f21a68dc56b

XIOC detected MD5 Hash: 7e84656331addfb7e22d9f21a68dc56b

extracted_from_files

Domain
detected Domain: mousedownevent.target

XIOC detected Domain: mousedownevent.target

extracted_from_files

Domain
detected Domain: t.y-this.elementoffset.top

XIOC detected Domain: t.y-this.elementoffset.top

extracted_from_files

Domain
detected Domain: clickoffset.top

XIOC detected Domain: clickoffset.top

extracted_from_files

Domain
detected Domain: t.ui.keycode.page

XIOC detected Domain: t.ui.keycode.page

extracted_from_files

URL
detected URL: http://addons.mozilla.org/ca/crl.pem0N

XIOC detected URL: http://addons.mozilla.org/ca/crl.pem0N

extracted_from_files

URL
detected URL: https://github.com/mitchas/Keyframes.app/tree/master/Keyframes.app%20(Extension)/js

XIOC detected URL: https://github.com/mitchas/Keyframes.app/tree/master/Keyframes.app%20(Extension)/js

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg

XIOC detected URL: http://www.w3.org/2000/svg

extracted_from_files

Domain
detected Domain: this.element.off

XIOC detected Domain: this.element.off

extracted_from_files

Domain
detected Domain: this.bindings.off

XIOC detected Domain: this.bindings.off

extracted_from_files

Domain
detected Domain: e.off

XIOC detected Domain: e.off

extracted_from_files

Domain
detected Domain: i.target

XIOC detected Domain: i.target

extracted_from_files

Domain
detected Domain: o.call

XIOC detected Domain: o.call

extracted_from_files

Domain
detected Domain: t.ui.ie

XIOC detected Domain: t.ui.ie

extracted_from_files

Domain
detected Domain: this.document.off

XIOC detected Domain: this.document.off

extracted_from_files

Domain
detected Domain: d.top

XIOC detected Domain: d.top

extracted_from_files

Domain
detected Domain: m.top

XIOC detected Domain: m.top

extracted_from_files

Domain
detected Domain: b.top-h.top

XIOC detected Domain: b.top-h.top

extracted_from_files

Domain
detected Domain: b.using.call

XIOC detected Domain: b.using.call

extracted_from_files

Domain
detected Domain: jqueryui.com

XIOC detected Domain: jqueryui.com

extracted_from_files

Domain
detected Domain: t.data

XIOC detected Domain: t.data

extracted_from_files

Domain
detected Domain: s.style

XIOC detected Domain: s.style

extracted_from_files

Domain
detected Domain: j.host

XIOC detected Domain: j.host

extracted_from_files

Domain
detected Domain: o.data

XIOC detected Domain: o.data

extracted_from_files

Domain
detected Domain: o.global

XIOC detected Domain: o.global

extracted_from_files

Domain
detected Domain: o.beforesend.call

XIOC detected Domain: o.beforesend.call

extracted_from_files

Domain
detected Domain: y.fail

XIOC detected Domain: y.fail

extracted_from_files

Domain
detected Domain: v.data

XIOC detected Domain: v.data

extracted_from_files

Domain
detected Domain: h.open

XIOC detected Domain: h.open

extracted_from_files

Domain
detected Domain: r.fx.off

XIOC detected Domain: r.fx.off

extracted_from_files

Domain
detected Domain: event.target

XIOC detected Domain: event.target

extracted_from_files

Domain
detected Domain: e.stop.call

XIOC detected Domain: e.stop.call

extracted_from_files

Domain
detected Domain: finish.call

XIOC detected Domain: finish.call

extracted_from_files

Domain
detected Domain: b.target

XIOC detected Domain: b.target

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: ib.host

XIOC detected Domain: ib.host

extracted_from_files

Domain
detected Domain: this.now

XIOC detected Domain: this.now

extracted_from_files

Domain
detected Domain: this.options.step.call

XIOC detected Domain: this.options.step.call

extracted_from_files

Domain
detected Domain: a.elem.style

XIOC detected Domain: a.elem.style

extracted_from_files

Domain
detected Domain: a.now

XIOC detected Domain: a.now

extracted_from_files

Domain
detected Domain: g.empty.fire

XIOC detected Domain: g.empty.fire

extracted_from_files

Domain
detected Domain: j.opts.start.call

XIOC detected Domain: j.opts.start.call

extracted_from_files

Domain
detected Domain: j.opts.fail

XIOC detected Domain: j.opts.fail

extracted_from_files

Domain
detected Domain: f.events

XIOC detected Domain: f.events

extracted_from_files

Domain
detected Domain: g.events

XIOC detected Domain: g.events

extracted_from_files

Domain
detected Domain: q.call

XIOC detected Domain: q.call

extracted_from_files

Domain
detected Domain: b.events

XIOC detected Domain: b.events

extracted_from_files

Domain
detected Domain: this.map

XIOC detected Domain: this.map

extracted_from_files

Domain
detected Domain: b.top

XIOC detected Domain: b.top

extracted_from_files

Domain
detected Domain: i.style

XIOC detected Domain: i.style

extracted_from_files

Domain
detected Domain: g.data

XIOC detected Domain: g.data

extracted_from_files

Domain
detected Domain: k.postdispatch.call

XIOC detected Domain: k.postdispatch.call

extracted_from_files

Domain
detected Domain: a.target

XIOC detected Domain: a.target

extracted_from_files

Domain
detected Domain: this.click

XIOC detected Domain: this.click

extracted_from_files

Domain
detected Domain: this.target

XIOC detected Domain: this.target

extracted_from_files

Domain
detected Domain: r.now

XIOC detected Domain: r.now

extracted_from_files

Domain
detected Domain: this.off

XIOC detected Domain: this.off

extracted_from_files

Domain
detected Domain: l.add.call

XIOC detected Domain: l.add.call

extracted_from_files

Domain
detected Domain: r.event.global

XIOC detected Domain: r.event.global

extracted_from_files

Domain
detected Domain: l.remove.call

XIOC detected Domain: l.remove.call

extracted_from_files

Domain
detected Domain: l.teardown.call

XIOC detected Domain: l.teardown.call

extracted_from_files

Domain
detected Domain: k.predispatch.call

XIOC detected Domain: k.predispatch.call

extracted_from_files

Domain
detected Domain: b.data

XIOC detected Domain: b.data

extracted_from_files

Domain
detected Domain: r.style

XIOC detected Domain: r.style

extracted_from_files

Domain
detected Domain: d.style

XIOC detected Domain: d.style

extracted_from_files

Domain
detected Domain: r.event.handlers.call

XIOC detected Domain: r.event.handlers.call

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

Domain
detected Domain: la.td

XIOC detected Domain: la.td

extracted_from_files

Domain
detected Domain: q.events

XIOC detected Domain: q.events

extracted_from_files

Domain
detected Domain: l.setup.call

XIOC detected Domain: l.setup.call

extracted_from_files

Domain
detected Domain: ga.select

XIOC detected Domain: ga.select

extracted_from_files

Domain
detected Domain: d.call

XIOC detected Domain: d.call

extracted_from_files

Domain
detected Domain: j.call

XIOC detected Domain: j.call

extracted_from_files

Domain
detected Domain: b.name

XIOC detected Domain: b.name

extracted_from_files

Domain
detected Domain: b.map

XIOC detected Domain: b.map

extracted_from_files

Domain
detected Domain: f.empty.fire

XIOC detected Domain: f.empty.fire

extracted_from_files

Domain
detected Domain: a.style

XIOC detected Domain: a.style

extracted_from_files

Domain
detected Domain: d.filter.id

XIOC detected Domain: d.filter.id

extracted_from_files

Domain
detected Domain: d.find.id

XIOC detected Domain: d.find.id

extracted_from_files

Domain
detected Domain: s.call

XIOC detected Domain: s.call

extracted_from_files

Domain
detected Domain: c.call

XIOC detected Domain: c.call

extracted_from_files

Domain
detected Domain: b.id

XIOC detected Domain: b.id

extracted_from_files

Domain
detected Domain: b.next

XIOC detected Domain: b.next

extracted_from_files

Domain
detected Domain: e.call

XIOC detected Domain: e.call

extracted_from_files

Domain
detected Domain: b.call

XIOC detected Domain: b.call

extracted_from_files

Domain
detected Domain: h.call

XIOC detected Domain: h.call

extracted_from_files

Domain
detected Domain: i.call

XIOC detected Domain: i.call

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: j.id

XIOC detected Domain: j.id

extracted_from_files

Domain
detected Domain: ga.support

XIOC detected Domain: ga.support

extracted_from_files

Domain
detected Domain: e.top

XIOC detected Domain: e.top

extracted_from_files

Domain
detected Domain: jquery.org

XIOC detected Domain: jquery.org

extracted_from_files

Domain
detected Domain: m.call

XIOC detected Domain: m.call

extracted_from_files

Domain
detected Domain: f.call

XIOC detected Domain: f.call

extracted_from_files

Domain
detected Domain: r.map

XIOC detected Domain: r.map

extracted_from_files

Domain
detected Domain: a.call

XIOC detected Domain: a.call

extracted_from_files

Domain
detected Domain: k.call

XIOC detected Domain: k.call

extracted_from_files

Domain
detected Domain: l.call

XIOC detected Domain: l.call

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

Domain
detected Domain: microsoftedge.microsoft.com

XIOC detected Domain: microsoftedge.microsoft.com

extracted_from_files

Domain
detected Domain: chrome.google.com

XIOC detected Domain: chrome.google.com

extracted_from_files

Domain
detected Domain: chrome.downloads.download

XIOC detected Domain: chrome.downloads.download

extracted_from_files

Domain
detected Domain: window.open

XIOC detected Domain: window.open

extracted_from_files

Domain
detected Domain: la.th

XIOC detected Domain: la.th

extracted_from_files

Domain
detected Domain: e.map

XIOC detected Domain: e.map

extracted_from_files

Domain
detected Domain: n.discount

XIOC detected Domain: n.discount

extracted_from_files

Domain
detected Domain: filelength.top

XIOC detected Domain: filelength.top

extracted_from_files

Domain
detected Domain: t.host

XIOC detected Domain: t.host

extracted_from_files

Domain
detected Domain: windowalias.top

XIOC detected Domain: windowalias.top

extracted_from_files

Domain
detected Domain: translate.googleusercontent.com

XIOC detected Domain: translate.googleusercontent.com

extracted_from_files

Domain
detected Domain: cc.bingj.com

XIOC detected Domain: cc.bingj.com

extracted_from_files

Domain
detected Domain: webcache.googleusercontent.com

XIOC detected Domain: webcache.googleusercontent.com

extracted_from_files

Domain
detected Domain: t.name

XIOC detected Domain: t.name

extracted_from_files

Domain
detected Domain: e.name

XIOC detected Domain: e.name

extracted_from_files

Domain
detected Domain: t.target

XIOC detected Domain: t.target

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: object.prototype.hasownproperty.call

XIOC detected Domain: object.prototype.hasownproperty.call

extracted_from_files

Domain
detected Domain: sheetval.id

XIOC detected Domain: sheetval.id

extracted_from_files

Domain
detected Domain: n.tax

XIOC detected Domain: n.tax

extracted_from_files

Domain
detected Domain: window.top

XIOC detected Domain: window.top

extracted_from_files

Domain
detected Domain: clone.data

XIOC detected Domain: clone.data

extracted_from_files

Domain
detected Domain: chrome.runtime.id

XIOC detected Domain: chrome.runtime.id

extracted_from_files

Domain
detected Domain: sheetval.map

XIOC detected Domain: sheetval.map

extracted_from_files

Domain
detected Domain: screenarray.id

XIOC detected Domain: screenarray.id

extracted_from_files

Domain
detected Domain: pagesize.data

XIOC detected Domain: pagesize.data

extracted_from_files

Domain
detected Domain: signs.click

XIOC detected Domain: signs.click

extracted_from_files

Domain
detected Domain: u.ma

XIOC detected Domain: u.ma

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

Domain
detected Domain: imagemanager.imagetype.link

XIOC detected Domain: imagemanager.imagetype.link

extracted_from_files

Domain
detected Domain: b.slice.call

XIOC detected Domain: b.slice.call

extracted_from_files

Domain
detected Domain: keyframes.app

XIOC detected Domain: keyframes.app

extracted_from_files

Domain
detected Domain: who.style

XIOC detected Domain: who.style

extracted_from_files

Domain
detected Domain: childshadows.map

XIOC detected Domain: childshadows.map

extracted_from_files

IP
detected IP: ::bef

XIOC detected IP: ::bef

extracted_from_files

IP
detected IP: ed::bef

XIOC detected IP: ed::bef

extracted_from_files

Domain
detected Domain: signingca1.addons.mozilla.org

XIOC detected Domain: signingca1.addons.mozilla.org

extracted_from_files

Domain
detected Domain: mozilla.com

XIOC detected Domain: mozilla.com

extracted_from_files

Domain
detected Domain: addons.mozilla.org

XIOC detected Domain: addons.mozilla.org

extracted_from_files

Domain
detected Domain: content-signature.mozilla.org

XIOC detected Domain: content-signature.mozilla.org

extracted_from_files

Domain
detected Domain: e.old.call

XIOC detected Domain: e.old.call

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Image Downloader Pro is a Firefox Add-ons extension published by Blife. Version 1.3.0 has been analyzed by the Risky Plugins security platform, receiving a risk score of 56.22/100 (MEDIUM risk) based on 189 security findings.

Risk Assessment

This extension presents moderate security risk. Several findings were detected that may warrant attention. Users should carefully review the permissions and findings before installation.

Findings Breakdown

  • High: 38 finding(s)
  • Medium: 151 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Image Downloader Pro is published by Blife on the Firefox Add-ons marketplace. The extension has approximately 420 users.

Recommendation

Exercise caution with this extension. Review the detailed findings and ensure the requested permissions align with the extension's stated functionality before installation.

Frequently Asked Questions