# lnkr/README.md at master · Zenexer/lnkr · GitHub **[github.com/Zenexer/lnkr/blob/master/recon/extensions/fanagokoaogopceablgmpndejhedkjjb/README.md](https://github.com/Zenexer/lnkr/blob/master/recon/extensions/fanagokoaogopceablgmpndejhedkjjb/README.md)** Zenexer ## Extension analysis ### ID ``` fanagokoaogopceablgmpndejhedkjjb ``` ### Name Flash Playlist Version 1.2.0 This extension is a modified, likely unauthorized clone of ``` fnipglnbhfacfmefbgiiodalehbcgcbm. The malicious clone has since been removed from the Chrome Web Store. ## Flow ### Unix timestamps have been replaced with [timestamp] 1. manifest.json specifies background.js as a background script ``` ----- ### 2. manifest.json specifies content_page.js as a content script, which appears to be a standard Mixpanel script 3. background.js performs an ajax request for ``` http://flashplaylist.com/api/? ``` ``` action=params&id=fanagokoaogopceablgmpndejhedkjjb&version=1.2.0 ### 4. background.js stores the result in Chrome local storage via chrome.storage.local.set ; the result includes a value for MIXPANEL_CUSTOM_LIB_URL 5. User visits an arbitrary website 6. content_page.js injects a