Is "HiPDF" on Chrome Web Store Safe to Install?

[email protected] · chrome · v2.0.3

Wondershare HiPDF prioritizes user experience and security, boasting a user-friendly interface and adherence to internationally recognized standards such as ISO 27001 and SSI SECURE. As a trusted member of the PDF Association, we are committed to providing both simplicity and reliability in PDF document management. ➤ Chat with PDF: Communicate with your PDF documents directly through our intuitive interface. ➤ AI Read: Let AI read your PDF documents aloud for convenient access. ➤ Compress PDF: Reduce the file size of your PDF documents without compromising quality. ➤ PDF to Word: Seamlessly convert PDF files into editable Word documents for easy editing. ➤ Crop PDF: Trim and adjust the size of your PDF pages as needed. ➤ Merge PDF: Combine multiple PDF files into a single document for streamlined organization. ➤ PDF Editor: Edit your PDF documents with ease, including text, images, and annotations. ➤ All Tools: Explore our full suite of PDF tools, including conversion, compression, splitting, and more.

Risk Assessment

Analyzed
64.9
out of 100
MEDIUM

414 security findings detected across all analyzers

Chrome extension requesting 6 permissions

Severity Breakdown

0
Critical
21
High
393
Medium
0
Low
0
Info

Finding Categories

21
Malware Signatures
1
Obfuscation
2
Network
388
IoC Indicators

YARA Rules Matched

12 rules(21 hits)
NoUseWeakRandom postinstall system command postinstall registry modification postinstall file download postinstall network communication postinstall file manipulation postinstall obfuscation postinstall crypto operations credential env files postinstall environment access UntrustedContentShouldNotBeIncluded LocalStorageShouldNotBeUsed

Requested Permissions

6 permissions
https://web-api.hipdf.com/*
Low
https://ws-hipdf-com.oss-accelerate.aliyuncs.com/*
Low
https://eus-storage.pdfelement.io/*
Low
https://eop-storage.pdfelement.io/*
Low
https://sgp-storage.pdfelement.io/*
Low
https://pdfelement-storage.wondershare.cc/*
Low

About This Extension

Wondershare HiPDF prioritizes user experience and security, boasting a user-friendly interface and adherence to internationally recognized standards such as ISO 27001 and SSI SECURE. As a trusted member of the PDF Association, we are committed to providing both simplicity and reliability in PDF document management. ➤ Chat with PDF: Communicate with your PDF documents directly through our intuitive interface. ➤ AI Read: Let AI read your PDF documents aloud for convenient access. ➤ Compress PDF: Reduce the file size of your PDF documents without compromising quality. ➤ PDF to Word: Seamlessly convert PDF files into editable Word documents for easy editing. ➤ Crop PDF: Trim and adjust the size of your PDF pages as needed. ➤ Merge PDF: Combine multiple PDF files into a single document for streamlined organization. ➤ PDF Editor: Edit your PDF documents with ease, including text, images, and annotations. ➤ All Tools: Explore our full suite of PDF tools, including conversion, compression, splitting, and more.

Detailed Findings

24 total

YARA Rule Matches

12 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
27
IP Addresses
18
Domains
359
Strings
388

All Indicators · 388

Domain
detected Domain: w.is

XIOC detected Domain: w.is

extracted_from_files

Domain
detected Domain: t.call

XIOC detected Domain: t.call

extracted_from_files

Domain
detected Domain: r.host

XIOC detected Domain: r.host

extracted_from_files

URL
detected URL: https://sgp-storage.pdfelement.io/*

XIOC detected URL: https://sgp-storage.pdfelement.io/*

extracted_from_files

URL
detected URL: https://pdfelement-storage.wondershare.cc/*

XIOC detected URL: https://pdfelement-storage.wondershare.cc/*

extracted_from_files

URL
detected URL: https://www.baidu.com/

XIOC detected URL: https://www.baidu.com/

extracted_from_files

URL
detected URL: http://

XIOC detected URL: http://

extracted_from_files

URL
detected URL: https://analytics.wondershare.cc:8106/sa?project=

XIOC detected URL: https://analytics.wondershare.cc:8106/sa?project=

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg

XIOC detected URL: http://www.w3.org/2000/svg

extracted_from_files

URL
detected URL: https://clients2.google.com/service/update2/crx

XIOC detected URL: https://clients2.google.com/service/update2/crx

extracted_from_files

URL
detected URL: https://web-api.hipdf.com/*

XIOC detected URL: https://web-api.hipdf.com/*

extracted_from_files

URL
detected URL: https://ws-hipdf-com.oss-accelerate.aliyuncs.com/*

XIOC detected URL: https://ws-hipdf-com.oss-accelerate.aliyuncs.com/*

extracted_from_files

URL
detected URL: https://www.hipdf.com/all-tools?utm_source=google&utm_medium=display&utm_campaign=ce_popup01

XIOC detected URL: https://www.hipdf.com/all-tools?utm_source=google&utm_medium=display&utm_campaign=ce_popup01

extracted_from_files

URL
detected URL: https://web-api.hipdf.com/middle/

XIOC detected URL: https://web-api.hipdf.com/middle/

extracted_from_files

URL
detected URL: https://vuejs.org/error-reference/#runtime-$

XIOC detected URL: https://vuejs.org/error-reference/#runtime-$

extracted_from_files

URL
detected URL: http://www.w3.org/1999/xlink

XIOC detected URL: http://www.w3.org/1999/xlink

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg'%3e%3cg%20clip-path='url(%23clip0_3049_1821)'%20filter='url(%23filter0_i_3049_1821)'%3e%3cg%20clip-path='url(%23clip1_3049_1821)'%3e%3crect%20width='32'%20height='32'%20fill='url(%23paint0_linear_3049_1821)'/%3e%3cpath%20d='M12.8297%208.7489L9.30686%2012.2496L12.8297%2015.7503L16.3526%2012.2496L12.8297%208.7489Z'%20fill='white'/%3e%3cpath%20d='M12.8295%2017.1502L10.0112%2019.9508L12.8295%2022.7513L15.6478%2019.9508L12.8295%2017.1502Z'%20fill='white'/%3e%3cpath%20d='M6.48733%2016.4496L9.30562%2013.6491L12.1239%2016.4496L9.30562%2019.2502L6.48733%2016.4496Z'%20fill='white'/%3e%3cpath%20d='M5.78414%2017.1506L4.375%2018.5508L5.78414%2019.9511L7.19329%2018.5508L5.78414%2017.1506Z'%20fill='white'/%3e%3cpath%20d='M13.5336%2016.4494L20.5793%209.44808L27.625%2016.4494L20.5793%2023.4508L13.5336%2016.4494Z'%20fill='white'/%3e%3c/g%3e%3c/g%3e%3cdefs%3e%3cfilter%20id='filter0_i_3049_1821'%20x='0'%20y='0'%20width='32'%20height='32'%20filterUnits='userSpaceOnUse'%20color-interpolation-filters='sRGB'%3e%3cfeFlood%20flood-opacity='0'%20result='BackgroundImageFix'/%3e%3cfeBlend%20mode='normal'%20in='SourceGraphic'%20in2='BackgroundImageFix'%20result='shape'/%3e%3cfeColorMatrix%20in='SourceAlpha'%20type='matrix'%20values='0%200%200%200%200%200%200%200%200%200%200%200%200%200%200%200%200%200%20127%200'%20result='hardAlpha'/%3e%3cfeOffset/%3e%3cfeGaussianBlur%20stdDeviation='0.0625'/%3e%3cfeComposite%20in2='hardAlpha'%20operator='arithmetic'%20k2='-1'%20k3='1'/%3e%3cfeColorMatrix%20type='matrix'%20values='0%200%200%200%200%200%200%200%200%200%200%200%200%200%200%200%200%200%200.24%200'/%3e%3cfeBlend%20mode='darken'%20in2='shape'%20result='effect1_innerShadow_3049_1821'/%3e%3c/filter%3e%3clinearGradient%20id='paint0_linear_3049_1821'%20x1='16'%20y1='0'%20x2='16'%20y2='32'%20gradientUnits='userSpaceOnUse'%3e%3cstop%20stop-color='%23566CFD'/%3e%3cstop%20offset='1'%20stop-color='%234D64FD'/%3e%3c/linearGradient%3e%3cclipPath%20id='clip0_3049_1821'%3e%3crect%20width='32'%20height='32'%20fill='white'/%3e%3c/clipPath%3e%3cclipPath%20id='clip1_3049_1821'%3e%3crect%20width='32'%20height='32'%20rx='7.30097'%20fill='white'/%3e%3c/clipPath%3e%3c/defs%3e%3c/svg%3e

XIOC detected URL: http://www.w3.org/2000/svg'%3e%3cg%20clip-path='url(%23clip0_3049_1821)'%20filter='url(%23filter0_i_3049_1821)'%3e%3cg%20clip-path='url(%23clip1_3049_1821)'%3e%3crect%20width='32'%20height='32'%20fill='url(%23paint0_linear_3049_1821)'/%3e%3cpath%20d='M12.8297%208.7489L9.30686%2012.2496L12.8297%2015.7503L16.3526%2012.2496L12.8297%208.7489Z'%20fill='white'/%3e%3cpath%20d='M12.8295%2017.1502L10.0112%2019.9508L12.8295%2022.7513L15.6478%2019.9508L12.8295%2017.1502Z'%20fill='white'/%3e%3cpath%20d='M6.48733%2016.4496L9.30562%2013.6491L12.1239%2016.4496L9.30562%2019.2502L6.48733%2016.4496Z'%20fill='white'/%3e%3cpath%20d='M5.78414%2017.1506L4.375%2018.5508L5.78414%2019.9511L7.19329%2018.5508L5.78414%2017.1506Z'%20fill='white'/%3e%3cpath%20d='M13.5336%2016.4494L20.5793%209.44808L27.625%2016.4494L20.5793%2023.4508L13.5336%2016.4494Z'%20fill='white'/%3e%3c/g%3e%3c/g%3e%3cdefs%3e%3cfilter%20id='filter0_i_3049_1821'%20x='0'%20y='0'%20width='32'%20height='32'%20filterUnits='userSpaceOnUse'%20color-interpolation-filters='sRGB'%3e%3cfeFlood%20flood-opacity='0'%20result='BackgroundImageFix'/%3e%3cfeBlend%20mode='normal'%20in='SourceGraphic'%20in2='BackgroundImageFix'%20result='shape'/%3e%3cfeColorMatrix%20in='SourceAlpha'%20type='matrix'%20values='0%200%200%200%200%200%200%200%200%200%200%200%200%200%200%200%200%200%20127%200'%20result='hardAlpha'/%3e%3cfeOffset/%3e%3cfeGaussianBlur%20stdDeviation='0.0625'/%3e%3cfeComposite%20in2='hardAlpha'%20operator='arithmetic'%20k2='-1'%20k3='1'/%3e%3cfeColorMatrix%20type='matrix'%20values='0%200%200%200%200%200%200%200%200%200%200%200%200%200%200%200%200%200%200.24%200'/%3e%3cfeBlend%20mode='darken'%20in2='shape'%20result='effect1_innerShadow_3049_1821'/%3e%3c/filter%3e%3clinearGradient%20id='paint0_linear_3049_1821'%20x1='16'%20y1='0'%20x2='16'%20y2='32'%20gradientUnits='userSpaceOnUse'%3e%3cstop%20stop-color='%23566CFD'/%3e%3cstop%20offset='1'%20stop-color='%234D64FD'/%3e%3c/linearGradient%3e%3cclipPath%20id='clip0_3049_1821'%3e%3crect%20width='32'%20height='32'%20fill='white'/%3e%3c/clipPath%3e%3cclipPath%20id='clip1_3049_1821'%3e%3crect%20width='32'%20height='32'%20rx='7.30097'%20fill='white'/%3e%3c/clipPath%3e%3c/defs%3e%3c/svg%3e

extracted_from_files

URL
detected URL: http://modernizr.com/

XIOC detected URL: http://modernizr.com/

extracted_from_files

URL
detected URL: https://www.hipdf.com/app/chat-pdf?utm_source=google&utm_medium=display&utm_campaign=ce_popup01

XIOC detected URL: https://www.hipdf.com/app/chat-pdf?utm_source=google&utm_medium=display&utm_campaign=ce_popup01

extracted_from_files

Domain
detected Domain: el-progress.is

XIOC detected Domain: el-progress.is

extracted_from_files

Domain
detected Domain: item.is

XIOC detected Domain: item.is

extracted_from_files

Domain
detected Domain: el-upload-dragger.is

XIOC detected Domain: el-upload-dragger.is

extracted_from_files

Domain
detected Domain: el-upload.is

XIOC detected Domain: el-upload.is

extracted_from_files

Domain
detected Domain: el-icon.is

XIOC detected Domain: el-icon.is

extracted_from_files

IP
detected IP: ::bac

XIOC detected IP: ::bac

extracted_from_files

IP
detected IP: ea::

XIOC detected IP: ea::

extracted_from_files

Domain
detected Domain: n.map

XIOC detected Domain: n.map

extracted_from_files

Domain
detected Domain: f.name

XIOC detected Domain: f.name

extracted_from_files

Domain
detected Domain: window.open

XIOC detected Domain: window.open

extracted_from_files

IP
detected Domain: web-api.hipdf.com

XIOC detected Domain: web-api.hipdf.com

extracted_from_files

IP
detected Domain: www.hipdf.com

XIOC detected Domain: www.hipdf.com

extracted_from_files

Domain
detected Domain: element-plus.org

XIOC detected Domain: element-plus.org

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

Domain
detected Domain: pl.call

XIOC detected Domain: pl.call

extracted_from_files

Domain
detected Domain: ul.call

XIOC detected Domain: ul.call

extracted_from_files

Domain
detected Domain: ll.call

XIOC detected Domain: ll.call

extracted_from_files

Domain
detected Domain: nl.call

XIOC detected Domain: nl.call

extracted_from_files

Domain
detected Domain: rl.call

XIOC detected Domain: rl.call

extracted_from_files

Domain
detected Domain: zi.call

XIOC detected Domain: zi.call

extracted_from_files

Domain
detected Domain: xi.call

XIOC detected Domain: xi.call

extracted_from_files

Domain
detected Domain: vl.call

XIOC detected Domain: vl.call

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: e.call

XIOC detected Domain: e.call

extracted_from_files

Domain
detected Domain: xl.call

XIOC detected Domain: xl.call

extracted_from_files

Domain
detected Domain: al.call

XIOC detected Domain: al.call

extracted_from_files

Domain
detected Domain: ur.keys.ie

XIOC detected Domain: ur.keys.ie

extracted_from_files

Domain
detected Domain: kn.call

XIOC detected Domain: kn.call

extracted_from_files

Domain
detected Domain: tc.call

XIOC detected Domain: tc.call

extracted_from_files

Domain
detected Domain: zu.call

XIOC detected Domain: zu.call

extracted_from_files

Domain
detected Domain: hu.call

XIOC detected Domain: hu.call

extracted_from_files

Domain
detected Domain: uu.call

XIOC detected Domain: uu.call

extracted_from_files

Domain
detected Domain: du.call

XIOC detected Domain: du.call

extracted_from_files

Domain
detected Domain: ou.call

XIOC detected Domain: ou.call

extracted_from_files

Domain
detected Domain: nu.call

XIOC detected Domain: nu.call

extracted_from_files

Domain
detected Domain: so.call

XIOC detected Domain: so.call

extracted_from_files

Domain
detected Domain: nf.call

XIOC detected Domain: nf.call

extracted_from_files

Domain
detected Domain: kc.call

XIOC detected Domain: kc.call

extracted_from_files

Domain
detected Domain: nc.call

XIOC detected Domain: nc.call

extracted_from_files

Domain
detected Domain: ma.call

XIOC detected Domain: ma.call

extracted_from_files

Domain
detected Domain: r.map

XIOC detected Domain: r.map

extracted_from_files

Domain
detected Domain: ic.call

XIOC detected Domain: ic.call

extracted_from_files

Domain
detected Domain: n.name

XIOC detected Domain: n.name

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: po.call

XIOC detected Domain: po.call

extracted_from_files

Domain
detected Domain: fp.call

XIOC detected Domain: fp.call

extracted_from_files

Domain
detected Domain: fr.call

XIOC detected Domain: fr.call

extracted_from_files

Domain
detected Domain: t.name

XIOC detected Domain: t.name

extracted_from_files

Domain
detected Domain: e.name

XIOC detected Domain: e.name

extracted_from_files

Domain
detected Domain: o.is

XIOC detected Domain: o.is

extracted_from_files

Domain
detected Domain: o.bm

XIOC detected Domain: o.bm

extracted_from_files

Domain
detected Domain: t.open

XIOC detected Domain: t.open

extracted_from_files

Domain
detected Domain: e.file.name

XIOC detected Domain: e.file.name

extracted_from_files

Domain
detected Domain: e.data

XIOC detected Domain: e.data

extracted_from_files

Domain
detected Domain: a.total

XIOC detected Domain: a.total

extracted_from_files

Domain
detected Domain: i.map

XIOC detected Domain: i.map

extracted_from_files

Domain
detected Domain: v.center

XIOC detected Domain: v.center

extracted_from_files

Domain
detected Domain: r.value.map

XIOC detected Domain: r.value.map

extracted_from_files

Domain
detected Domain: y.name

XIOC detected Domain: y.name

extracted_from_files

Domain
detected Domain: s.value.click

XIOC detected Domain: s.value.click

extracted_from_files

Domain
detected Domain: m.name

XIOC detected Domain: m.name

extracted_from_files

Domain
detected Domain: r.data

XIOC detected Domain: r.data

extracted_from_files

Domain
detected Domain: w.name

XIOC detected Domain: w.name

extracted_from_files

Domain
detected Domain: wy.call

XIOC detected Domain: wy.call

extracted_from_files

Domain
detected Domain: a.center

XIOC detected Domain: a.center

extracted_from_files

Domain
detected Domain: a.id

XIOC detected Domain: a.id

extracted_from_files

Domain
detected Domain: r.id

XIOC detected Domain: r.id

extracted_from_files

Domain
detected Domain: n.id

XIOC detected Domain: n.id

extracted_from_files

Domain
detected Domain: o.id

XIOC detected Domain: o.id

extracted_from_files

Domain
detected Domain: v.id

XIOC detected Domain: v.id

extracted_from_files

Domain
detected Domain: pairs.map

XIOC detected Domain: pairs.map

extracted_from_files

Domain
detected Domain: o.call

XIOC detected Domain: o.call

extracted_from_files

Domain
detected Domain: s.name

XIOC detected Domain: s.name

extracted_from_files

Domain
detected Domain: f.call

XIOC detected Domain: f.call

extracted_from_files

Domain
detected Domain: error.call

XIOC detected Domain: error.call

extracted_from_files

Domain
detected Domain: r.top-a.top

XIOC detected Domain: r.top-a.top

extracted_from_files

Domain
detected Domain: c.target

XIOC detected Domain: c.target

extracted_from_files

Domain
detected Domain: t.el.style

XIOC detected Domain: t.el.style

extracted_from_files

Domain
detected Domain: l.call

XIOC detected Domain: l.call

extracted_from_files

Domain
detected Domain: n.data

XIOC detected Domain: n.data

extracted_from_files

Domain
detected Domain: r.call

XIOC detected Domain: r.call

extracted_from_files

Domain
detected Domain: n.call

XIOC detected Domain: n.call

extracted_from_files

Domain
detected Domain: e.map

XIOC detected Domain: e.map

extracted_from_files

Domain
detected Domain: l.name

XIOC detected Domain: l.name

extracted_from_files

Domain
detected Domain: a.map

XIOC detected Domain: a.map

extracted_from_files

Domain
detected Domain: vh.read

XIOC detected Domain: vh.read

extracted_from_files

Domain
detected Domain: d.open

XIOC detected Domain: d.open

extracted_from_files

Domain
detected Domain: o.total

XIOC detected Domain: o.total

extracted_from_files

Domain
detected Domain: n.host

XIOC detected Domain: n.host

extracted_from_files

Domain
detected Domain: l.host

XIOC detected Domain: l.host

extracted_from_files

Domain
detected Domain: r.search

XIOC detected Domain: r.search

extracted_from_files

Domain
detected Domain: object.prototype.tostring.call

XIOC detected Domain: object.prototype.tostring.call

extracted_from_files

Domain
detected Domain: e.post

XIOC detected Domain: e.post

extracted_from_files

Domain
detected Domain: no.call

XIOC detected Domain: no.call

extracted_from_files

Domain
detected Domain: m.call

XIOC detected Domain: m.call

extracted_from_files

Domain
detected Domain: e.merge.call

XIOC detected Domain: e.merge.call

extracted_from_files

Domain
detected Domain: n.response.data

XIOC detected Domain: n.response.data

extracted_from_files

Domain
detected Domain: yr.call

XIOC detected Domain: yr.call

extracted_from_files

Domain
detected Domain: ks.call

XIOC detected Domain: ks.call

extracted_from_files

Domain
detected Domain: a.name

XIOC detected Domain: a.name

extracted_from_files

Domain
detected Domain: function.call

XIOC detected Domain: function.call

extracted_from_files

Domain
detected Domain: tt.call

XIOC detected Domain: tt.call

extracted_from_files

Domain
detected Domain: function.prototype.call

XIOC detected Domain: function.prototype.call

extracted_from_files

Domain
detected Domain: gr.foo

XIOC detected Domain: gr.foo

extracted_from_files

Domain
detected Domain: object.prototype.propertyisenumerable.call

XIOC detected Domain: object.prototype.propertyisenumerable.call

extracted_from_files

Domain
detected Domain: vs.call

XIOC detected Domain: vs.call

extracted_from_files

Domain
detected Domain: qo.call

XIOC detected Domain: qo.call

extracted_from_files

Domain
detected Domain: jr.call

XIOC detected Domain: jr.call

extracted_from_files

Domain
detected Domain: pe.call

XIOC detected Domain: pe.call

extracted_from_files

Domain
detected Domain: d0.call

XIOC detected Domain: d0.call

extracted_from_files

Domain
detected Domain: re.call

XIOC detected Domain: re.call

extracted_from_files

Domain
detected Domain: en.call

XIOC detected Domain: en.call

extracted_from_files

Domain
detected Domain: l0.call

XIOC detected Domain: l0.call

extracted_from_files

Domain
detected Domain: vr.call

XIOC detected Domain: vr.call

extracted_from_files

Domain
detected Domain: jt.call

XIOC detected Domain: jt.call

extracted_from_files

Domain
detected Domain: vo.call

XIOC detected Domain: vo.call

extracted_from_files

Domain
detected Domain: vt.call

XIOC detected Domain: vt.call

extracted_from_files

Domain
detected Domain: ko.call

XIOC detected Domain: ko.call

extracted_from_files

Domain
detected Domain: xo.call

XIOC detected Domain: xo.call

extracted_from_files

Domain
detected Domain: yt.call

XIOC detected Domain: yt.call

extracted_from_files

Domain
detected Domain: dt.call

XIOC detected Domain: dt.call

extracted_from_files

Domain
detected Domain: c0.call

XIOC detected Domain: c0.call

extracted_from_files

Domain
detected Domain: f0.call

XIOC detected Domain: f0.call

extracted_from_files

Domain
detected Domain: u0.call

XIOC detected Domain: u0.call

extracted_from_files

Domain
detected Domain: s0.call

XIOC detected Domain: s0.call

extracted_from_files

Domain
detected Domain: t.constructor.name

XIOC detected Domain: t.constructor.name

extracted_from_files

Domain
detected Domain: sg.call

XIOC detected Domain: sg.call

extracted_from_files

Domain
detected Domain: symbol.prototype.tostring.call

XIOC detected Domain: symbol.prototype.tostring.call

extracted_from_files

Domain
detected Domain: g0.call

XIOC detected Domain: g0.call

extracted_from_files

Domain
detected Domain: e.next

XIOC detected Domain: e.next

extracted_from_files

Domain
detected Domain: r.next

XIOC detected Domain: r.next

extracted_from_files

Domain
detected Domain: p0.call

XIOC detected Domain: p0.call

extracted_from_files

Domain
detected Domain: jo.call

XIOC detected Domain: jo.call

extracted_from_files

Domain
detected Domain: file.prototype.slice.call

XIOC detected Domain: file.prototype.slice.call

extracted_from_files

Domain
detected Domain: s.prototype.setstate.call

XIOC detected Domain: s.prototype.setstate.call

extracted_from_files

Domain
detected Domain: s.prototype.getstate.call

XIOC detected Domain: s.prototype.getstate.call

extracted_from_files

Domain
detected Domain: w.data

XIOC detected Domain: w.data

extracted_from_files

Domain
detected Domain: t.data

XIOC detected Domain: t.data

extracted_from_files

Domain
detected Domain: r.name

XIOC detected Domain: r.name

extracted_from_files

Domain
detected Domain: og.call

XIOC detected Domain: og.call

extracted_from_files

Domain
detected Domain: analytics.wondershare.cc

XIOC detected Domain: analytics.wondershare.cc

extracted_from_files

Domain
detected Domain: www.baidu.com

XIOC detected Domain: www.baidu.com

extracted_from_files

Domain
detected Domain: modernizr.com

XIOC detected Domain: modernizr.com

extracted_from_files

Domain
detected Domain: vuejs.org

XIOC detected Domain: vuejs.org

extracted_from_files

Domain
detected Domain: o.value.name

XIOC detected Domain: o.value.name

extracted_from_files

Domain
detected Domain: s.data.data

XIOC detected Domain: s.data.data

extracted_from_files

Domain
detected Domain: s.target

XIOC detected Domain: s.target

extracted_from_files

Domain
detected Domain: a.call

XIOC detected Domain: a.call

extracted_from_files

Domain
detected Domain: i.call

XIOC detected Domain: i.call

extracted_from_files

Domain
detected Domain: has.call

XIOC detected Domain: has.call

extracted_from_files

Domain
detected Domain: h.call

XIOC detected Domain: h.call

extracted_from_files

Domain
detected Domain: object.is

XIOC detected Domain: object.is

extracted_from_files

Domain
detected Domain: fl.call

XIOC detected Domain: fl.call

extracted_from_files

Domain
detected Domain: ep.call

XIOC detected Domain: ep.call

extracted_from_files

Domain
detected Domain: w.call

XIOC detected Domain: w.call

extracted_from_files

Domain
detected Domain: i.id

XIOC detected Domain: i.id

extracted_from_files

Domain
detected Domain: t.id

XIOC detected Domain: t.id

extracted_from_files

Domain
detected Domain: f.ec

XIOC detected Domain: f.ec

extracted_from_files

Domain
detected Domain: r.effect.run

XIOC detected Domain: r.effect.run

extracted_from_files

Domain
detected Domain: ui.call

XIOC detected Domain: ui.call

extracted_from_files

Domain
detected Domain: w.next

XIOC detected Domain: w.next

extracted_from_files

Domain
detected Domain: f.app

XIOC detected Domain: f.app

extracted_from_files

Domain
detected Domain: t.exposed

XIOC detected Domain: t.exposed

extracted_from_files

Domain
detected Domain: p.call

XIOC detected Domain: p.call

extracted_from_files

Domain
detected Domain: i.name

XIOC detected Domain: i.name

extracted_from_files

Domain
detected Domain: e.id

XIOC detected Domain: e.id

extracted_from_files

Domain
detected Domain: de.run

XIOC detected Domain: de.run

extracted_from_files

Domain
detected Domain: t.map

XIOC detected Domain: t.map

extracted_from_files

Domain
detected Domain: b.next

XIOC detected Domain: b.next

extracted_from_files

Domain
detected Domain: d.id

XIOC detected Domain: d.id

extracted_from_files

Domain
detected Domain: b.run

XIOC detected Domain: b.run

extracted_from_files

Domain
detected Domain: ae.style

XIOC detected Domain: ae.style

extracted_from_files

Domain
detected Domain: z.style

XIOC detected Domain: z.style

extracted_from_files

Domain
detected Domain: re.properties

XIOC detected Domain: re.properties

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

Domain
detected Domain: array.prototype.slice.call

XIOC detected Domain: array.prototype.slice.call

extracted_from_files

Domain
detected Domain: ft.scope.off

XIOC detected Domain: ft.scope.off

extracted_from_files

Domain
detected Domain: t.scope.off

XIOC detected Domain: t.scope.off

extracted_from_files

Domain
detected Domain: i.style

XIOC detected Domain: i.style

extracted_from_files

Domain
detected Domain: t.target

XIOC detected Domain: t.target

extracted_from_files

Domain
detected Domain: r.style

XIOC detected Domain: r.style

extracted_from_files

Domain
detected Domain: b.suspense.next

XIOC detected Domain: b.suspense.next

extracted_from_files

Domain
detected Domain: t.direct

XIOC detected Domain: t.direct

extracted_from_files

URL
detected URL: https://eop-storage.pdfelement.io/*

XIOC detected URL: https://eop-storage.pdfelement.io/*

extracted_from_files

URL
detected URL: https://www.hipdf.com/app/ai-read?utm_source=google&utm_medium=display&utm_campaign=ce_popup01

XIOC detected URL: https://www.hipdf.com/app/ai-read?utm_source=google&utm_medium=display&utm_campaign=ce_popup01

extracted_from_files

URL
detected URL: https://eus-storage.pdfelement.io/*

XIOC detected URL: https://eus-storage.pdfelement.io/*

extracted_from_files

Domain
detected Domain: w.style

XIOC detected Domain: w.style

extracted_from_files

Domain
detected Domain: t.style

XIOC detected Domain: t.style

extracted_from_files

Domain
detected Domain: i.target

XIOC detected Domain: i.target

extracted_from_files

Domain
detected Domain: a.host

XIOC detected Domain: a.host

extracted_from_files

Domain
detected Domain: location.host

XIOC detected Domain: location.host

extracted_from_files

Domain
detected Domain: document.documentelement.style

XIOC detected Domain: document.documentelement.style

extracted_from_files

Domain
detected Domain: r.top

XIOC detected Domain: r.top

extracted_from_files

Domain
detected Domain: i.top-a.top

XIOC detected Domain: i.top-a.top

extracted_from_files

Domain
detected Domain: l.map

XIOC detected Domain: l.map

extracted_from_files

Domain
detected Domain: t.run

XIOC detected Domain: t.run

extracted_from_files

Domain
detected Domain: c.keys.map

XIOC detected Domain: c.keys.map

extracted_from_files

Domain
detected Domain: q.name

XIOC detected Domain: q.name

extracted_from_files

Domain
detected Domain: c.record.name

XIOC detected Domain: c.record.name

extracted_from_files

Domain
detected Domain: record.name

XIOC detected Domain: record.name

extracted_from_files

Domain
detected Domain: e.record.name

XIOC detected Domain: e.record.name

extracted_from_files

Domain
detected Domain: h.name

XIOC detected Domain: h.name

extracted_from_files

Domain
detected Domain: location.search

XIOC detected Domain: location.search

extracted_from_files

Domain
detected Domain: n.date

XIOC detected Domain: n.date

extracted_from_files

Domain
detected Domain: y.date

XIOC detected Domain: y.date

extracted_from_files

Domain
detected Domain: object.prototype.hasownproperty.call

XIOC detected Domain: object.prototype.hasownproperty.call

extracted_from_files

Domain
detected Domain: b.to

XIOC detected Domain: b.to

extracted_from_files

Domain
detected Domain: k.delta

XIOC detected Domain: k.delta

extracted_from_files

Domain
detected Domain: t.to

XIOC detected Domain: t.to

extracted_from_files

Domain
detected Domain: k.name

XIOC detected Domain: k.name

extracted_from_files

Domain
detected Domain: h.prototype.off

XIOC detected Domain: h.prototype.off

extracted_from_files

Domain
detected Domain: values.host

XIOC detected Domain: values.host

extracted_from_files

Domain
detected Domain: s.host

XIOC detected Domain: s.host

extracted_from_files

Domain
detected Domain: s.search

XIOC detected Domain: s.search

extracted_from_files

Domain
detected Domain: an.call

XIOC detected Domain: an.call

extracted_from_files

Domain
detected Domain: ft.call

XIOC detected Domain: ft.call

extracted_from_files

Domain
detected Domain: ri.call

XIOC detected Domain: ri.call

extracted_from_files

Domain
detected Domain: array.prototype.map

XIOC detected Domain: array.prototype.map

extracted_from_files

Domain
detected Domain: s.open

XIOC detected Domain: s.open

extracted_from_files

Domain
detected Domain: pe.target

XIOC detected Domain: pe.target

extracted_from_files

Domain
detected Domain: y.call

XIOC detected Domain: y.call

extracted_from_files

Domain
detected Domain: this.target

XIOC detected Domain: this.target

extracted_from_files

Domain
detected Domain: this.off

XIOC detected Domain: this.off

extracted_from_files

Domain
detected Domain: c.listener.call

XIOC detected Domain: c.listener.call

extracted_from_files

Domain
detected Domain: z.is

XIOC detected Domain: z.is

extracted_from_files

Domain
detected Domain: ae.call

XIOC detected Domain: ae.call

extracted_from_files

Domain
detected Domain: s.call

XIOC detected Domain: s.call

extracted_from_files

Domain
detected Domain: n.chrome

XIOC detected Domain: n.chrome

extracted_from_files

Domain
detected Domain: n.ie

XIOC detected Domain: n.ie

extracted_from_files

Domain
detected Domain: u.call

XIOC detected Domain: u.call

extracted_from_files

Domain
detected Domain: e.top

XIOC detected Domain: e.top

extracted_from_files

Domain
detected Domain: slice.call

XIOC detected Domain: slice.call

extracted_from_files

Domain
detected Domain: baidu.com

XIOC detected Domain: baidu.com

extracted_from_files

Domain
detected Domain: s.properties

XIOC detected Domain: s.properties

extracted_from_files

Domain
detected Domain: i.is

XIOC detected Domain: i.is

extracted_from_files

Domain
detected Domain: this.is

XIOC detected Domain: this.is

extracted_from_files

Domain
detected Domain: e.properties

XIOC detected Domain: e.properties

extracted_from_files

Domain
detected Domain: this.data

XIOC detected Domain: this.data

extracted_from_files

Domain
detected Domain: type.social

XIOC detected Domain: type.social

extracted_from_files

Domain
detected Domain: type.search

XIOC detected Domain: type.search

extracted_from_files

Domain
detected Domain: d.properties

XIOC detected Domain: d.properties

extracted_from_files

Domain
detected Domain: properties.search

XIOC detected Domain: properties.search

extracted_from_files

Domain
detected Domain: e.ck

XIOC detected Domain: e.ck

extracted_from_files

Domain
detected Domain: this.data.id

XIOC detected Domain: this.data.id

extracted_from_files

Domain
detected Domain: c.data

XIOC detected Domain: c.data

extracted_from_files

Domain
detected Domain: this.save

XIOC detected Domain: this.save

extracted_from_files

Domain
detected Domain: id.name

XIOC detected Domain: id.name

extracted_from_files

Domain
detected Domain: p.data

XIOC detected Domain: p.data

extracted_from_files

Domain
detected Domain: l.data

XIOC detected Domain: l.data

extracted_from_files

Domain
detected Domain: ze.data

XIOC detected Domain: ze.data

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: c.click

XIOC detected Domain: c.click

extracted_from_files

Domain
detected Domain: n.properties

XIOC detected Domain: n.properties

extracted_from_files

Domain
detected Domain: c.page

XIOC detected Domain: c.page

extracted_from_files

Domain
detected Domain: s.page

XIOC detected Domain: s.page

extracted_from_files

Domain
detected Domain: e.host

XIOC detected Domain: e.host

extracted_from_files

URL
detected Domain: url.host

XIOC detected Domain: url.host

extracted_from_files

Domain
detected Domain: this.properties.call

XIOC detected Domain: this.properties.call

extracted_from_files

Domain
detected Domain: a.save

XIOC detected Domain: a.save

extracted_from_files

Domain
detected Domain: c.properties

XIOC detected Domain: c.properties

extracted_from_files

Domain
detected Domain: this.storage

XIOC detected Domain: this.storage

extracted_from_files

Domain
detected Domain: info.page

XIOC detected Domain: info.page

extracted_from_files

Domain
detected Domain: d.host

XIOC detected Domain: d.host

extracted_from_files

Domain
detected Domain: d.page

XIOC detected Domain: d.page

extracted_from_files

Domain
detected Domain: this.events

XIOC detected Domain: this.events

extracted_from_files

Domain
detected Domain: n.events

XIOC detected Domain: n.events

extracted_from_files

Domain
detected Domain: v.top

XIOC detected Domain: v.top

extracted_from_files

Domain
detected Domain: static.sensorsdata.cn

XIOC detected Domain: static.sensorsdata.cn

extracted_from_files

Domain
detected Domain: c.download

XIOC detected Domain: c.download

extracted_from_files

URL
detected URL: https://www.hipdf.com/app/crop-pdf?utm_source=google&utm_medium=display&utm_campaign=ce_popup01

XIOC detected URL: https://www.hipdf.com/app/crop-pdf?utm_source=google&utm_medium=display&utm_campaign=ce_popup01

extracted_from_files

URL
detected URL: https://www.hipdf.com/app/pdf-to-word?utm_source=google&utm_medium=display&utm_campaign=ce_popup01

XIOC detected URL: https://www.hipdf.com/app/pdf-to-word?utm_source=google&utm_medium=display&utm_campaign=ce_popup01

extracted_from_files

URL
detected URL: https://www.hipdf.com/app/compress-pdf?utm_source=google&utm_medium=display&utm_campaign=ce_popup01

XIOC detected URL: https://www.hipdf.com/app/compress-pdf?utm_source=google&utm_medium=display&utm_campaign=ce_popup01

extracted_from_files

Domain
detected Domain: s.para.properties

XIOC detected Domain: s.para.properties

extracted_from_files

Domain
detected Domain: so.com

XIOC detected Domain: so.com

extracted_from_files

Domain
detected Domain: m.sm.cn

XIOC detected Domain: m.sm.cn

extracted_from_files

Domain
detected Domain: m.baidu

XIOC detected Domain: m.baidu

extracted_from_files

Domain
detected Domain: www.baidu

XIOC detected Domain: www.baidu

extracted_from_files

Domain
detected Domain: i.para.is

XIOC detected Domain: i.para.is

extracted_from_files

Domain
detected Domain: rr.id

XIOC detected Domain: rr.id

extracted_from_files

Domain
detected Domain: u.target

XIOC detected Domain: u.target

extracted_from_files

Domain
detected Domain: renren.com

XIOC detected Domain: renren.com

extracted_from_files

Domain
detected Domain: weibo.com

XIOC detected Domain: weibo.com

extracted_from_files

Domain
detected Domain: ask.com

XIOC detected Domain: ask.com

extracted_from_files

Domain
detected Domain: bing.com

XIOC detected Domain: bing.com

extracted_from_files

Domain
detected Domain: yahoo.com

XIOC detected Domain: yahoo.com

extracted_from_files

Domain
detected Domain: youdao.com

XIOC detected Domain: youdao.com

extracted_from_files

Domain
detected Domain: sogou.com

XIOC detected Domain: sogou.com

extracted_from_files

Domain
detected Domain: jr.is

XIOC detected Domain: jr.is

extracted_from_files

Domain
detected Domain: weixin.qq.com

XIOC detected Domain: weixin.qq.com

extracted_from_files

Domain
detected Domain: tieba.baidu.com

XIOC detected Domain: tieba.baidu.com

extracted_from_files

Domain
detected Domain: zhihu.com

XIOC detected Domain: zhihu.com

extracted_from_files

Domain
detected Domain: qzone.qq.com

XIOC detected Domain: qzone.qq.com

extracted_from_files

Domain
detected Domain: douban.com

XIOC detected Domain: douban.com

extracted_from_files

Domain
detected Domain: kaixin001.com

XIOC detected Domain: kaixin001.com

extracted_from_files

Domain
detected Domain: this.bridge.call

XIOC detected Domain: this.bridge.call

extracted_from_files

Domain
detected Domain: info.support

XIOC detected Domain: info.support

extracted_from_files

Domain
detected Domain: lr.prototype.call

XIOC detected Domain: lr.prototype.call

extracted_from_files

Domain
detected Domain: window.name

XIOC detected Domain: window.name

extracted_from_files

Domain
detected Domain: n.appcalljscallback.call

XIOC detected Domain: n.appcalljscallback.call

extracted_from_files

Domain
detected Domain: bridge.is

XIOC detected Domain: bridge.is

extracted_from_files

Domain
detected Domain: i.para.app

XIOC detected Domain: i.para.app

extracted_from_files

Domain
detected Domain: i.events

XIOC detected Domain: i.events

extracted_from_files

Domain
detected Domain: va.is

XIOC detected Domain: va.is

extracted_from_files

Domain
detected Domain: j.click

XIOC detected Domain: j.click

extracted_from_files

Domain
detected Domain: i.bridge.app

XIOC detected Domain: i.bridge.app

extracted_from_files

Domain
detected Domain: window.sa

XIOC detected Domain: window.sa

extracted_from_files

Domain
detected Domain: n.data.data

XIOC detected Domain: n.data.data

extracted_from_files

Domain
detected Domain: e.data.data

XIOC detected Domain: e.data.data

extracted_from_files

Domain
detected Domain: wa.call

XIOC detected Domain: wa.call

extracted_from_files

Domain
detected Domain: ti.call

XIOC detected Domain: ti.call

extracted_from_files

Domain
detected Domain: this.sd.store

XIOC detected Domain: this.sd.store

extracted_from_files

Domain
detected Domain: this.sd

XIOC detected Domain: this.sd

extracted_from_files

Domain
detected Domain: v.call

XIOC detected Domain: v.call

extracted_from_files

Domain
detected Domain: i.ee

XIOC detected Domain: i.ee

extracted_from_files

Domain
detected Domain: i.store

XIOC detected Domain: i.store

extracted_from_files

Domain
detected Domain: br.call

XIOC detected Domain: br.call

extracted_from_files

Domain
detected Domain: ya.call

XIOC detected Domain: ya.call

extracted_from_files

Domain
detected Domain: ii.call

XIOC detected Domain: ii.call

extracted_from_files

Domain
detected Domain: ai.call

XIOC detected Domain: ai.call

extracted_from_files

Domain
detected Domain: fe.bridge.is

XIOC detected Domain: fe.bridge.is

extracted_from_files

Domain
detected Domain: fe.para.app

XIOC detected Domain: fe.para.app

extracted_from_files

Domain
detected Domain: qa.call

XIOC detected Domain: qa.call

extracted_from_files

Domain
detected Domain: this.data.android

XIOC detected Domain: this.data.android

extracted_from_files

Domain
detected Domain: this.data.app

XIOC detected Domain: this.data.app

extracted_from_files

Domain
detected Domain: vr.data

XIOC detected Domain: vr.data

extracted_from_files

Domain
detected Domain: jt.store

XIOC detected Domain: jt.store

extracted_from_files

Domain
detected Domain: mr.call

XIOC detected Domain: mr.call

extracted_from_files

Domain
detected Domain: yn.call

XIOC detected Domain: yn.call

extracted_from_files

Domain
detected Domain: ot.para.app

XIOC detected Domain: ot.para.app

extracted_from_files

Domain
detected Domain: e.page

XIOC detected Domain: e.page

extracted_from_files

Domain
detected Domain: this.page

XIOC detected Domain: this.page

extracted_from_files

Domain
detected Domain: at.para.app

XIOC detected Domain: at.para.app

extracted_from_files

Domain
detected Domain: xe.bridge.is

XIOC detected Domain: xe.bridge.is

extracted_from_files

Domain
detected Domain: xe.para.app

XIOC detected Domain: xe.para.app

extracted_from_files

Domain
detected Domain: info.app

XIOC detected Domain: info.app

extracted_from_files

Domain
detected Domain: info.download

XIOC detected Domain: info.download

extracted_from_files

Domain
detected Domain: fu.call

XIOC detected Domain: fu.call

extracted_from_files

Domain
detected Domain: e.events

XIOC detected Domain: e.events

extracted_from_files

Domain
detected Domain: v.properties

XIOC detected Domain: v.properties

extracted_from_files

Domain
detected Domain: v.events

XIOC detected Domain: v.events

extracted_from_files

Domain
detected Domain: x.properties

XIOC detected Domain: x.properties

extracted_from_files

Domain
detected Domain: c.sd

XIOC detected Domain: c.sd

extracted_from_files

Domain
detected Domain: this.sd.ee

XIOC detected Domain: this.sd.ee

extracted_from_files

Domain
detected Domain: y.show

XIOC detected Domain: y.show

extracted_from_files

Domain
detected Domain: ct.para.show

XIOC detected Domain: ct.para.show

extracted_from_files

Domain
detected Domain: send.storage

XIOC detected Domain: send.storage

extracted_from_files

Domain
detected Domain: st.para.app

XIOC detected Domain: st.para.app

extracted_from_files

Domain
detected Domain: e.store

XIOC detected Domain: e.store

extracted_from_files

Domain
detected Domain: this.store

XIOC detected Domain: this.store

extracted_from_files

Domain
detected Domain: e.re

XIOC detected Domain: e.re

extracted_from_files

IP
detected Domain: ws-hipdf-com.oss-accelerate.aliyuncs.com

XIOC detected Domain: ws-hipdf-com.oss-accelerate.aliyuncs.com

extracted_from_files

Domain
detected Domain: clients2.google.com

XIOC detected Domain: clients2.google.com

extracted_from_files

Domain
detected Domain: window.location.host

XIOC detected Domain: window.location.host

extracted_from_files

Domain
detected Domain: r.ws

XIOC detected Domain: r.ws

extracted_from_files

Domain
detected Domain: r.android

XIOC detected Domain: r.android

extracted_from_files

Domain
detected Domain: r.windows

XIOC detected Domain: r.windows

extracted_from_files

Domain
detected Domain: t.email

XIOC detected Domain: t.email

extracted_from_files

URL
detected URL: https://element-plus.org/en-US/component/badge.html

XIOC detected URL: https://element-plus.org/en-US/component/badge.html

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg'%3e%3cpath%20d='M7%202.5H3.5C2.94772%202.5%202.5%202.94771%202.5%203.5V12.5C2.5%2013.0523%202.94771%2013.5%203.5%2013.5H12.5C13.0523%2013.5%2013.5%2013.0523%2013.5%2012.5V9'%20stroke='%23606062'%20stroke-linecap='round'/%3e%3cpath%20d='M10%202.5H13.5M13.5%202.5V6M13.5%202.5L6.5%209.5'%20stroke='%23606062'%20stroke-linecap='round'%20stroke-linejoin='round'/%3e%3c/svg%3e

XIOC detected URL: http://www.w3.org/2000/svg'%3e%3cpath%20d='M7%202.5H3.5C2.94772%202.5%202.5%202.94771%202.5%203.5V12.5C2.5%2013.0523%202.94771%2013.5%203.5%2013.5H12.5C13.0523%2013.5%2013.5%2013.0523%2013.5%2012.5V9'%20stroke='%23606062'%20stroke-linecap='round'/%3e%3cpath%20d='M10%202.5H13.5M13.5%202.5V6M13.5%202.5L6.5%209.5'%20stroke='%23606062'%20stroke-linecap='round'%20stroke-linejoin='round'/%3e%3c/svg%3e

extracted_from_files

Domain
detected Domain: pdfelement-storage.wondershare.cc

XIOC detected Domain: pdfelement-storage.wondershare.cc

extracted_from_files

Domain
detected Domain: sgp-storage.pdfelement.io

XIOC detected Domain: sgp-storage.pdfelement.io

extracted_from_files

Domain
detected Domain: eop-storage.pdfelement.io

XIOC detected Domain: eop-storage.pdfelement.io

extracted_from_files

Domain
detected Domain: eus-storage.pdfelement.io

XIOC detected Domain: eus-storage.pdfelement.io

extracted_from_files

URL
detected URL: https://www.hipdf.com/app/pdf-editor?utm_source=google&utm_medium=display&utm_campaign=ce_popup01

XIOC detected URL: https://www.hipdf.com/app/pdf-editor?utm_source=google&utm_medium=display&utm_campaign=ce_popup01

extracted_from_files

URL
detected URL: https://www.hipdf.com/app/merge-pdf?utm_source=google&utm_medium=display&utm_campaign=ce_popup01

XIOC detected URL: https://www.hipdf.com/app/merge-pdf?utm_source=google&utm_medium=display&utm_campaign=ce_popup01

extracted_from_files

Domain
detected Domain: e.event.target

XIOC detected Domain: e.event.target

extracted_from_files

Domain
detected Domain: u.properties

XIOC detected Domain: u.properties

extracted_from_files

Domain
detected Domain: n.next

XIOC detected Domain: n.next

extracted_from_files

Domain
detected Domain: h.id

XIOC detected Domain: h.id

extracted_from_files

Security Analysis Summary

Security Analysis Overview

HiPDF is a Chrome Web Store extension published by [email protected]. Version 2.0.3 has been analyzed by the Risky Plugins security platform, receiving a risk score of 64.9/100 (MEDIUM risk) based on 414 security findings.

Risk Assessment

This extension presents high security risk. Significant concerns were identified during analysis. It is not recommended for use in sensitive or production environments without thorough review.

Findings Breakdown

  • High: 21 finding(s)
  • Medium: 393 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

HiPDF is published by [email protected] on the Chrome Web Store marketplace. The extension has approximately 10K users.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions