HIGH RISK NaN/100

Video Monitor Assistant

Unknown developer · 16 users at risk

Threat Summary

Risk Level
Critical Issues
High Issues
Total Findings

Key Security Threats

HIGH Malware Signature

YARA rule match: -AlertStatementsShouldNotBeUsed

/tmp/extract-1f44bb072f07f43eb019392c2920795d775fc29091e8b0f40877b18ee6282580-1883240978/popup/popup.js

HIGH Malware Signature

YARA rule match: -postinstall_network_communication

/tmp/extract-1f44bb072f07f43eb019392c2920795d775fc29091e8b0f40877b18ee6282580-1883240978/popup/popup.js

HIGH Malware Signature

YARA rule match: -postinstall_file_download

/tmp/extract-1f44bb072f07f43eb019392c2920795d775fc29091e8b0f40877b18ee6282580-1883240978/shared/i18n.js

HIGH Malware Signature

YARA rule match: -postinstall_file_manipulation

/tmp/extract-1f44bb072f07f43eb019392c2920795d775fc29091e8b0f40877b18ee6282580-1883240978/background/service-worker.js

HIGH Malware Signature

YARA rule match: -postinstall_network_communication

/tmp/extract-1f44bb072f07f43eb019392c2920795d775fc29091e8b0f40877b18ee6282580-1883240978/background/service-worker.js

All Findings (41)

View all 41 security findings
Malware Signature

YARA rule match: -AlertStatementsShouldNotBeUsed

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -SQLInjection

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_network_communication

Indicator of Compromise

XIOC detected Domain: e.target

Indicator of Compromise

XIOC detected Domain: example.com

Indicator of Compromise

XIOC detected Domain: www.w3.org

Indicator of Compromise

XIOC detected Domain: gmail.com

Indicator of Compromise

XIOC detected Domain: chrome.storage

Indicator of Compromise

XIOC detected URL: https://clients2.google.com/service/update2/crx

Indicator of Compromise

XIOC detected URL: http://www.w3.org/2000/svg'

Indicator of Compromise

XIOC detected Domain: this.video

Indicator of Compromise

XIOC detected Domain: this.observer

Indicator of Compromise

XIOC detected Domain: window.top

Suspicious Network Activity

Network call of type 'fetch' detected.

Indicator of Compromise

XIOC detected Domain: this.video.play

Indicator of Compromise

XIOC detected Domain: uniquesignals.map

Indicator of Compromise

XIOC detected Domain: clients2.google.com

Indicator of Compromise

XIOC detected Domain: stats.date

Indicator of Compromise

XIOC detected Domain: date.now

Indicator of Compromise

XIOC detected Domain: sender.tab

Indicator of Compromise

XIOC detected Domain: request.data

Indicator of Compromise

XIOC detected Domain: tab.id

Indicator of Compromise

XIOC detected Domain: n.id

Indicator of Compromise

XIOC detected Domain: status.no

manifest-analysis

Potentially sensitive permission 'tabs' declared in manifest.

Suspicious Network Activity

Network call of type 'fetch' detected.

Recommended Action

This extension has significant security concerns that warrant careful review. Consider uninstalling or finding a safer alternative. If you must use it, limit the permissions and monitor for suspicious activity.

Analysis performed on 3/8/2026 · Version 2.0.0

Data sourced from automated security scanning. For detailed analysis, view the full security scorecard.