Is "Battle Tank Games" on Firefox Add-ons Safe to Install?
The process of playing Battle Tanks is simple and fascinating. A player in Battle Tank controls his tank with arrows, destroying enemy tanks that gradually appears on the playing field. The enemy's goal is to destroy the player's base in the form of an eagle, which is hidden behind a brick wall. The player's goal is to destroy the opponents and move to the next level. You need to destroy 20 units of enemy tanks of different types on each level. The game will be over if the enemy manages to destroy the base or deprive the player of lives. There are the following obstacles in the Battle Tank game: reducing the visibility and control of the tank, blocking the movement, destroyed by a shot of the tank. Bonuses randomly appear on the battlefield of the game Battle Tank, after the impact of enemy tanks. There are different types of bonuses in the game. For example, the bonus "scapula" temporarily creates a brick wall of a concrete stuff. The bonus "helmet" makes the tank invulnerable. The bonus "clock" for a while freezes the enemies, the bonus "grenade" undermines the enemy tanks located on the playing field. Also, there is a chance to meet a bonus that gives the player an extra life.
Risk Assessment
Analyzed204 security findings detected across all analyzers
Severity Breakdown
Finding Categories
YARA Rules Matched
8 rules(35 hits)About This Extension
Detailed Findings
35 totalYARA Rule Matches
8 rulesIndicators of Compromise
Network indicators, suspicious strings, and potential IoCs extracted during analysis
All Indicators · 169
detected Domain: o.global XIOC detected Domain: o.global
extracted_from_files
detected Domain: tabb4c328fa1d73604352c95515f8bf91.364d7dfe5a649121767617f2db4557f7.addons.mozilla.org XIOC detected Domain: tabb4c328fa1d73604352c95515f8bf91.364d7dfe5a649121767617f2db4557f7.addons.mozilla.org
extracted_from_files
detected MD5 Hash: 526331E3B05B11E1A5C8E5D7C2EE8D46 XIOC detected MD5 Hash: 526331E3B05B11E1A5C8E5D7C2EE8D46
extracted_from_files
detected MD5 Hash: 526331E2B05B11E1A5C8E5D7C2EE8D46 XIOC detected MD5 Hash: 526331E2B05B11E1A5C8E5D7C2EE8D46
extracted_from_files
detected MD5 Hash: 526331E7B05B11E1A5C8E5D7C2EE8D46 XIOC detected MD5 Hash: 526331E7B05B11E1A5C8E5D7C2EE8D46
extracted_from_files
detected MD5 Hash: 526331E6B05B11E1A5C8E5D7C2EE8D46 XIOC detected MD5 Hash: 526331E6B05B11E1A5C8E5D7C2EE8D46
extracted_from_files
detected MD5 Hash: 525DB391B05B11E1A5C8E5D7C2EE8D46 XIOC detected MD5 Hash: 525DB391B05B11E1A5C8E5D7C2EE8D46
extracted_from_files
detected MD5 Hash: 525DB390B05B11E1A5C8E5D7C2EE8D46 XIOC detected MD5 Hash: 525DB390B05B11E1A5C8E5D7C2EE8D46
extracted_from_files
detected URL: http://ns.adobe.com/tiff/1.0/ XIOC detected URL: http://ns.adobe.com/tiff/1.0/
extracted_from_files
detected URL: http://mrdoob.com/ XIOC detected URL: http://mrdoob.com/
extracted_from_files
detected URL: http://promo-newtab.club/?cid=ntpromo_tanchiki&ext=' XIOC detected URL: http://promo-newtab.club/?cid=ntpromo_tanchiki&ext='
extracted_from_files
detected URL: http://promo-newtab.club/?source_type=uninstall&cid=ntpromo_tanchiki&ext=' XIOC detected URL: http://promo-newtab.club/?source_type=uninstall&cid=ntpromo_tanchiki&ext='
extracted_from_files
detected MD5 Hash: 364d7dfe5a649121767617f2db4557f7 XIOC detected MD5 Hash: 364d7dfe5a649121767617f2db4557f7
extracted_from_files
detected MD5 Hash: 525DB395B05B11E1A5C8E5D7C2EE8D46 XIOC detected MD5 Hash: 525DB395B05B11E1A5C8E5D7C2EE8D46
extracted_from_files
detected MD5 Hash: 525DB394B05B11E1A5C8E5D7C2EE8D46 XIOC detected MD5 Hash: 525DB394B05B11E1A5C8E5D7C2EE8D46
extracted_from_files
detected URL: http://www.w3.org/TR/html4/loose.dtd XIOC detected URL: http://www.w3.org/TR/html4/loose.dtd
extracted_from_files
detected URL: http://addons.mozilla.org/ca/crl.pem0N XIOC detected URL: http://addons.mozilla.org/ca/crl.pem0N
extracted_from_files
detected URL: http://www.high-logic.com/ XIOC detected URL: http://www.high-logic.com/
extracted_from_files
detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns# XIOC detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns#
extracted_from_files
detected URL: http://ns.adobe.com/xap/1.0/mm/ XIOC detected URL: http://ns.adobe.com/xap/1.0/mm/
extracted_from_files
detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceRef# XIOC detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceRef#
extracted_from_files
detected URL: http://ns.adobe.com/xap/1.0/ XIOC detected URL: http://ns.adobe.com/xap/1.0/
extracted_from_files
detected Domain: powertankpoints.show XIOC detected Domain: powertankpoints.show
extracted_from_files
detected Domain: armortankpoints.show XIOC detected Domain: armortankpoints.show
extracted_from_files
detected Domain: tankstatenormal.call XIOC detected Domain: tankstatenormal.call
extracted_from_files
detected Domain: tankstatenormal.prototype.update.call XIOC detected Domain: tankstatenormal.prototype.update.call
extracted_from_files
detected Domain: tankstatenormal.prototype.draw.call XIOC detected Domain: tankstatenormal.prototype.draw.call
extracted_from_files
detected Domain: promo-newtab.club XIOC detected Domain: promo-newtab.club
extracted_from_files
detected Domain: info.name XIOC detected Domain: info.name
extracted_from_files
detected Domain: poweruphandler.event.star XIOC detected Domain: poweruphandler.event.star
extracted_from_files
detected Domain: powerup.type.star XIOC detected Domain: powerup.type.star
extracted_from_files
detected Domain: point.call XIOC detected Domain: point.call
extracted_from_files
detected Domain: stagemessage.prototype.show XIOC detected Domain: stagemessage.prototype.show
extracted_from_files
detected Domain: stagestatisticspoints.prototype.show XIOC detected Domain: stagestatisticspoints.prototype.show
extracted_from_files
detected Domain: basictankpoints.show XIOC detected Domain: basictankpoints.show
extracted_from_files
detected Domain: fasttankpoints.show XIOC detected Domain: fasttankpoints.show
extracted_from_files
detected Domain: level.show XIOC detected Domain: level.show
extracted_from_files
detected Domain: rect.call XIOC detected Domain: rect.call
extracted_from_files
detected Domain: keyboard.key.select XIOC detected Domain: keyboard.key.select
extracted_from_files
detected Domain: gamefield.prototype.update.call XIOC detected Domain: gamefield.prototype.update.call
extracted_from_files
detected Domain: gamefield.prototype.draw.call XIOC detected Domain: gamefield.prototype.draw.call
extracted_from_files
detected Domain: level.prototype.show XIOC detected Domain: level.prototype.show
extracted_from_files
detected Domain: stage.map XIOC detected Domain: stage.map
extracted_from_files
detected Domain: c.call XIOC detected Domain: c.call
extracted_from_files
detected Domain: keyboard.key.space XIOC detected Domain: keyboard.key.space
extracted_from_files
detected Domain: sprite.build XIOC detected Domain: sprite.build
extracted_from_files
detected Domain: spritecontroller.prototype.keyreleased.call XIOC detected Domain: spritecontroller.prototype.keyreleased.call
extracted_from_files
detected Domain: tank.type.fast XIOC detected Domain: tank.type.fast
extracted_from_files
detected Domain: stats.domelement.style.top XIOC detected Domain: stats.domelement.style.top
extracted_from_files
detected Domain: stagemessage.show XIOC detected Domain: stagemessage.show
extracted_from_files
detected Domain: mainmenuitem.call XIOC detected Domain: mainmenuitem.call
extracted_from_files
detected Domain: sprite.prototype.tonormalspeed.call XIOC detected Domain: sprite.prototype.tonormalspeed.call
extracted_from_files
detected Domain: cursor.prototype.build XIOC detected Domain: cursor.prototype.build
extracted_from_files
detected Domain: sprite.prototype.move.call XIOC detected Domain: sprite.prototype.move.call
extracted_from_files
detected Domain: spritecontroller.call XIOC detected Domain: spritecontroller.call
extracted_from_files
detected Domain: spritecontroller.prototype.notify.call XIOC detected Domain: spritecontroller.prototype.notify.call
extracted_from_files
detected Domain: event.cursor.build XIOC detected Domain: event.cursor.build
extracted_from_files
detected Domain: wall.call XIOC detected Domain: wall.call
extracted_from_files
detected Domain: cursor.event.build XIOC detected Domain: cursor.event.build
extracted_from_files
detected Domain: this.build XIOC detected Domain: this.build
extracted_from_files
detected Domain: builder.prototype.build XIOC detected Domain: builder.prototype.build
extracted_from_files
detected Domain: bullet.speed.fast XIOC detected Domain: bullet.speed.fast
extracted_from_files
detected Domain: spritecontainer.prototype.notify.call XIOC detected Domain: spritecontainer.prototype.notify.call
extracted_from_files
detected Domain: gamefield.call XIOC detected Domain: gamefield.call
extracted_from_files
detected Domain: b.using.call XIOC detected Domain: b.using.call
extracted_from_files
detected Domain: xiph.org XIOC detected Domain: xiph.org
extracted_from_files
detected Domain: дx4.gh XIOC detected Domain: дx4.gh
extracted_from_files
detected Domain: event.name XIOC detected Domain: event.name
extracted_from_files
detected Domain: sprite.call XIOC detected Domain: sprite.call
extracted_from_files
detected Domain: explosion.call XIOC detected Domain: explosion.call
extracted_from_files
detected Domain: soundmanager.play XIOC detected Domain: soundmanager.play
extracted_from_files
detected Domain: o.beforesend.call XIOC detected Domain: o.beforesend.call
extracted_from_files
detected Domain: y.fail XIOC detected Domain: y.fail
extracted_from_files
detected Domain: v.data XIOC detected Domain: v.data
extracted_from_files
detected Domain: h.open XIOC detected Domain: h.open
extracted_from_files
detected Domain: d.top XIOC detected Domain: d.top
extracted_from_files
detected Domain: m.top XIOC detected Domain: m.top
extracted_from_files
detected Domain: b.top-h.top XIOC detected Domain: b.top-h.top
extracted_from_files
detected Domain: finish.call XIOC detected Domain: finish.call
extracted_from_files
detected Domain: b.target XIOC detected Domain: b.target
extracted_from_files
detected IP: :: XIOC detected IP: ::
extracted_from_files
detected Domain: ib.host XIOC detected Domain: ib.host
extracted_from_files
detected Domain: j.host XIOC detected Domain: j.host
extracted_from_files
detected Domain: o.data XIOC detected Domain: o.data
extracted_from_files
detected Domain: this.name XIOC detected Domain: this.name
extracted_from_files
detected MD5 Hash: 98F806532FB0E111A35A9FCCF4315A4F XIOC detected MD5 Hash: 98F806532FB0E111A35A9FCCF4315A4F
extracted_from_files
detected Domain: g.empty.fire XIOC detected Domain: g.empty.fire
extracted_from_files
detected Domain: j.opts.start.call XIOC detected Domain: j.opts.start.call
extracted_from_files
detected Domain: j.opts.fail XIOC detected Domain: j.opts.fail
extracted_from_files
detected Domain: r.fx.off XIOC detected Domain: r.fx.off
extracted_from_files
detected Domain: e.old.call XIOC detected Domain: e.old.call
extracted_from_files
detected Domain: e.stop.call XIOC detected Domain: e.stop.call
extracted_from_files
detected Domain: b.events XIOC detected Domain: b.events
extracted_from_files
detected Domain: this.map XIOC detected Domain: this.map
extracted_from_files
detected Domain: b.top XIOC detected Domain: b.top
extracted_from_files
detected Domain: i.style XIOC detected Domain: i.style
extracted_from_files
detected Domain: this.now XIOC detected Domain: this.now
extracted_from_files
detected Domain: this.options.step.call XIOC detected Domain: this.options.step.call
extracted_from_files
detected Domain: a.elem.style XIOC detected Domain: a.elem.style
extracted_from_files
detected Domain: this.click XIOC detected Domain: this.click
extracted_from_files
detected Domain: this.target XIOC detected Domain: this.target
extracted_from_files
detected Domain: r.now XIOC detected Domain: r.now
extracted_from_files
detected Domain: this.off XIOC detected Domain: this.off
extracted_from_files
detected Domain: f.events XIOC detected Domain: f.events
extracted_from_files
detected Domain: g.events XIOC detected Domain: g.events
extracted_from_files
detected Domain: q.call XIOC detected Domain: q.call
extracted_from_files
detected Domain: l.teardown.call XIOC detected Domain: l.teardown.call
extracted_from_files
detected Domain: k.predispatch.call XIOC detected Domain: k.predispatch.call
extracted_from_files
detected Domain: r.event.handlers.call XIOC detected Domain: r.event.handlers.call
extracted_from_files
detected Domain: b.data XIOC detected Domain: b.data
extracted_from_files
detected Domain: g.data XIOC detected Domain: g.data
extracted_from_files
detected Domain: k.postdispatch.call XIOC detected Domain: k.postdispatch.call
extracted_from_files
detected Domain: a.target XIOC detected Domain: a.target
extracted_from_files
detected Domain: ka.th XIOC detected Domain: ka.th
extracted_from_files
detected Domain: ka.td XIOC detected Domain: ka.td
extracted_from_files
detected Domain: q.events XIOC detected Domain: q.events
extracted_from_files
detected Domain: l.setup.call XIOC detected Domain: l.setup.call
extracted_from_files
detected Domain: l.add.call XIOC detected Domain: l.add.call
extracted_from_files
detected Domain: r.event.global XIOC detected Domain: r.event.global
extracted_from_files
detected Domain: l.remove.call XIOC detected Domain: l.remove.call
extracted_from_files
detected Domain: b.name XIOC detected Domain: b.name
extracted_from_files
detected Domain: b.map XIOC detected Domain: b.map
extracted_from_files
detected Domain: f.empty.fire XIOC detected Domain: f.empty.fire
extracted_from_files
detected Domain: a.style XIOC detected Domain: a.style
extracted_from_files
detected Domain: r.style XIOC detected Domain: r.style
extracted_from_files
detected Domain: d.style XIOC detected Domain: d.style
extracted_from_files
detected Domain: this.show XIOC detected Domain: this.show
extracted_from_files
detected Domain: a.now XIOC detected Domain: a.now
extracted_from_files
detected Domain: b.id XIOC detected Domain: b.id
extracted_from_files
detected Domain: b.next XIOC detected Domain: b.next
extracted_from_files
detected Domain: e.call XIOC detected Domain: e.call
extracted_from_files
detected Domain: ga.select XIOC detected Domain: ga.select
extracted_from_files
detected Domain: d.call XIOC detected Domain: d.call
extracted_from_files
detected Domain: j.call XIOC detected Domain: j.call
extracted_from_files
detected Domain: i.call XIOC detected Domain: i.call
extracted_from_files
detected Domain: j.id XIOC detected Domain: j.id
extracted_from_files
detected Domain: ga.support XIOC detected Domain: ga.support
extracted_from_files
detected Domain: e.top XIOC detected Domain: e.top
extracted_from_files
detected Domain: d.find.id XIOC detected Domain: d.find.id
extracted_from_files
detected Domain: d.filter.id XIOC detected Domain: d.filter.id
extracted_from_files
detected Domain: s.call XIOC detected Domain: s.call
extracted_from_files
detected Domain: f.call XIOC detected Domain: f.call
extracted_from_files
detected Domain: r.map XIOC detected Domain: r.map
extracted_from_files
detected Domain: a.call XIOC detected Domain: a.call
extracted_from_files
detected Domain: k.call XIOC detected Domain: k.call
extracted_from_files
detected Domain: l.call XIOC detected Domain: l.call
extracted_from_files
detected Domain: b.call XIOC detected Domain: b.call
extracted_from_files
detected Domain: h.call XIOC detected Domain: h.call
extracted_from_files
detected Domain: fpstext.id XIOC detected Domain: fpstext.id
extracted_from_files
detected Domain: fpsgraph.id XIOC detected Domain: fpsgraph.id
extracted_from_files
detected Domain: msdiv.id XIOC detected Domain: msdiv.id
extracted_from_files
detected Domain: mstext.id XIOC detected Domain: mstext.id
extracted_from_files
detected Domain: msgraph.id XIOC detected Domain: msgraph.id
extracted_from_files
detected Domain: jquery.org XIOC detected Domain: jquery.org
extracted_from_files
detected Domain: m.call XIOC detected Domain: m.call
extracted_from_files
detected Domain: www.high-logic.com XIOC detected Domain: www.high-logic.com
extracted_from_files
detected Domain: www.inkscape.org XIOC detected Domain: www.inkscape.org
extracted_from_files
detected Domain: ns.adobe.com XIOC detected Domain: ns.adobe.com
extracted_from_files
detected Domain: mrdoob.com XIOC detected Domain: mrdoob.com
extracted_from_files
detected Domain: date.now XIOC detected Domain: date.now
extracted_from_files
detected Domain: container.id XIOC detected Domain: container.id
extracted_from_files
detected Domain: fpsdiv.id XIOC detected Domain: fpsdiv.id
extracted_from_files
detected IP: 1.0.0.9 XIOC detected IP: 1.0.0.9
extracted_from_files
detected Domain: www.w3.org XIOC detected Domain: www.w3.org
extracted_from_files
detected Domain: signingca1.addons.mozilla.org XIOC detected Domain: signingca1.addons.mozilla.org
extracted_from_files
detected Domain: mozilla.com XIOC detected Domain: mozilla.com
extracted_from_files
detected Domain: addons.mozilla.org XIOC detected Domain: addons.mozilla.org
extracted_from_files
detected Domain: content-signature.mozilla.org XIOC detected Domain: content-signature.mozilla.org
extracted_from_files
detected Domain: spritecontroller.prototype.keypressed.call XIOC detected Domain: spritecontroller.prototype.keypressed.call
extracted_from_files
Security Analysis Summary
Security Analysis Overview
Battle Tank Games is a Firefox Add-ons extension published by mr_JSm1th. Version 1.0.0.9resigned1 has been analyzed by the Risky Plugins security platform, receiving a risk score of 41.88/100 (MEDIUM risk) based on 204 security findings.
Risk Assessment
This extension presents moderate security risk. Several findings were detected that may warrant attention. Users should carefully review the permissions and findings before installation.
Findings Breakdown
- High: 35 finding(s)
- Medium: 169 finding(s)
What Was Analyzed
The security assessment covers multiple analysis categories:
- Malware Detection: YARA rule matching against 2,400+ malware signatures
- Secret Detection: Scanning for exposed API keys, tokens, and credentials
- Static Analysis: Code-level security analysis for common vulnerability patterns
- Network Analysis: Detection of suspicious network communications and endpoints
- Obfuscation Detection: Identification of code obfuscation techniques
Developer Information
Battle Tank Games is published by mr_JSm1th on the Firefox Add-ons marketplace. The extension has approximately 471 users.
Recommendation
Exercise caution with this extension. Review the detailed findings and ensure the requested permissions align with the extension's stated functionality before installation.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace