This has to be a first. The tl;dr of this is that if the company detects their software installation using a blacklisted/fraudulent product key, it pushes a “test.exe” to the target machine. This executable was revealed to be the Chrome Password Dumping Tool by SecurityXploded – available at http://securityxploded.com/chrome-password-dump.php. The dump of the passwords is packaged by an included “base64.exe” and sent via HTTP back to FSLabs. Once this was revealed to the public, the company issued a statement defending their stance on piracy, followed by a new release of their downloader that promises this DRM is not included. Superhero or supervillian? Read more here.