HIGH RISK NaN/100

SFshare - Custom Salesforce Connector

Unknown developer ยท 29 users at risk

Threat Summary

Risk Level
Critical Issues
High Issues
Total Findings

Key Security Threats

HIGH Code Obfuscation

Obfuscation pattern 'unicode_heavy' detected.

addons/validator/validator.js:148

HIGH Malware Signature

YARA rule match: -postinstall_network_communication

unknown_file

HIGH Malware Signature

YARA rule match: -postinstall_obfuscation

unknown_file

HIGH Malware Signature

YARA rule match: -postinstall_crypto_operations

unknown_file

HIGH Malware Signature

YARA rule match: -postinstall_file_download

unknown_file

All Findings (1000)

View all 1000 security findings
Code Obfuscation

Obfuscation pattern 'unicode_heavy' detected.

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_persistence_mechanism

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -credential_env_files

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -credential_env_files

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_environment_access

Malware Signature

YARA rule match: -postinstall_persistence_mechanism

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -credential_env_files

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -credential_env_files

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_environment_access

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_environment_access

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_persistence_mechanism

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_environment_access

Malware Signature

YARA rule match: -postinstall_persistence_mechanism

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -SQLInjection

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -SQLInjection

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -SQLInjection

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -SQLInjection

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_persistence_mechanism

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -SQLInjection

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -SQLInjection

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_persistence_mechanism

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_persistence_mechanism

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -credential_env_files

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -credential_env_files

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_environment_access

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_persistence_mechanism

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_registry_modification

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -NoUseWeakRandom

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -SQLInjection

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -AlertStatementsShouldNotBeUsed

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -SQLInjection

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_crypto_operations

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_obfuscation

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_crypto_operations

Code Obfuscation

Obfuscation pattern 'function_indirect' detected.

Suspicious Network Activity

Network call of type 'jquery_ajax' detected.

Suspicious Network Activity

Network call of type 'xmlhttprequest' detected.

Suspicious Network Activity

Network call of type 'xmlhttprequest' detected.

Code Obfuscation

Obfuscation pattern 'function_indirect' detected.

Suspicious Network Activity

Network call of type 'xmlhttprequest' detected.

Suspicious Network Activity

Network call of type 'jquery_ajax' detected.

Suspicious Network Activity

Network call of type 'xmlhttprequest' detected.

Suspicious Network Activity

Network call of type 'xmlhttprequest' detected.

Suspicious Network Activity

Network call of type 'jquery_ajax' detected.

Code Obfuscation

Obfuscation pattern 'function_indirect' detected.

Suspicious Network Activity

Network call of type 'xmlhttprequest' detected.

Suspicious Network Activity

Network call of type 'xmlhttprequest' detected.

Suspicious Network Activity

Network call of type 'xmlhttprequest' detected.

Suspicious Network Activity

Network call of type 'xmlhttprequest' detected.

Suspicious Network Activity

Network call of type 'xmlhttprequest' detected.

Suspicious Network Activity

Network call of type 'xmlhttprequest' detected.

Suspicious Network Activity

Network call of type 'xmlhttprequest' detected.

Code Obfuscation

Obfuscation pattern 'function_indirect' detected.

Code Obfuscation

Obfuscation pattern 'function_indirect' detected.

Suspicious Network Activity

Network call of type 'xmlhttprequest' detected.

Suspicious Network Activity

Network call of type 'xmlhttprequest' detected.

Suspicious Network Activity

Network call of type 'xmlhttprequest' detected.

Code Obfuscation

Obfuscation pattern 'function_indirect' detected.

Suspicious Network Activity

Network call of type 'xmlhttprequest' detected.

Suspicious Network Activity

Network call of type 'xmlhttprequest' detected.

Suspicious Network Activity

Network call of type 'jquery_ajax' detected.

Code Obfuscation

Obfuscation pattern 'function_indirect' detected.

Suspicious Network Activity

Network call of type 'xmlhttprequest' detected.

Code Obfuscation

Obfuscation pattern 'function_indirect' detected.

Code Obfuscation

Obfuscation pattern 'function_indirect' detected.

Suspicious Network Activity

Network call of type 'xmlhttprequest' detected.

Suspicious Network Activity

Network call of type 'xmlhttprequest' detected.

Code Obfuscation

Obfuscation pattern 'function_indirect' detected.

Suspicious Network Activity

Network call of type 'jquery_ajax' detected.

Indicator of Compromise

XIOC detected Domain: l.md

Indicator of Compromise

XIOC detected Domain: b.reset.call

Indicator of Compromise

XIOC detected Domain: d.md

Indicator of Compromise

XIOC detected Domain: v.decrypt.call

Indicator of Compromise

XIOC detected Domain: b.md

Indicator of Compromise

XIOC detected Domain: algo.md

Indicator of Compromise

XIOC detected Domain: p.clone.call

Indicator of Compromise

XIOC detected Domain: l.clone.call

Indicator of Compromise

XIOC detected Domain: www.openssl.org

Indicator of Compromise

XIOC detected Domain: c.decrypt.call

Indicator of Compromise

XIOC detected Domain: t.rest

Indicator of Compromise

XIOC detected Domain: s.reset.call

Indicator of Compromise

XIOC detected Domain: z.reset.call

Indicator of Compromise

XIOC detected Domain: g.clone.call

Indicator of Compromise

XIOC detected Domain: h.clone.call

Indicator of Compromise

XIOC detected Domain: w.reset.call

Indicator of Compromise

XIOC detected Domain: k.reset.call

Indicator of Compromise

XIOC detected Domain: v.map

Indicator of Compromise

XIOC detected Domain: z.style

Indicator of Compromise

XIOC detected Domain: classes.group

Indicator of Compromise

XIOC detected Domain: j.decrypt.call

Indicator of Compromise

XIOC detected Domain: q.md

Indicator of Compromise

XIOC detected Domain: s.clone.call

Indicator of Compromise

XIOC detected Domain: r.md

Indicator of Compromise

XIOC detected Domain: hasher.clone.call

Indicator of Compromise

XIOC detected Domain: cipher.reset.call

Indicator of Compromise

XIOC detected Domain: modecreator.call

Indicator of Compromise

XIOC detected Domain: e.event.global

Indicator of Compromise

XIOC detected Domain: serializablecipher.decrypt.call

Indicator of Compromise

XIOC detected Domain: f.clone.call

Indicator of Compromise

XIOC detected Domain: base.clone.call

Indicator of Compromise

XIOC detected Domain: a.md

Indicator of Compromise

XIOC detected Domain: cryptojs.md

Indicator of Compromise

XIOC detected Domain: q.reset.call

Indicator of Compromise

XIOC detected Domain: n.reset.call

Indicator of Compromise

XIOC detected Domain: j.encrypt.call

Indicator of Compromise

XIOC detected Domain: serializablecipher.encrypt.call

Indicator of Compromise

XIOC detected Domain: bootboxjs.com

Indicator of Compromise

XIOC detected Domain: www.iso.org

Indicator of Compromise

XIOC detected Domain: escape.close.bb

Indicator of Compromise

XIOC detected Domain: superinit.call

Indicator of Compromise

XIOC detected Domain: x.children.map

Indicator of Compromise

XIOC detected Domain: d.map

Indicator of Compromise

XIOC detected Domain: attributes.id

Indicator of Compromise

XIOC detected Domain: mainpath.children.map

Indicator of Compromise

XIOC detected Domain: y.group

Indicator of Compromise

XIOC detected Domain: e.md

Indicator of Compromise

XIOC detected Domain: f.map

Indicator of Compromise

XIOC detected Domain: window.fontawesomedetection.report

Indicator of Compromise

XIOC detected Domain: console.group

Indicator of Compromise

XIOC detected Domain: e.data.md

Indicator of Compromise

XIOC detected Domain: console.info

Indicator of Compromise

XIOC detected Domain: deploy.dog

Indicator of Compromise

XIOC detected Domain: cloudscale.ch

Indicator of Compromise

XIOC detected Domain: battle.net

Indicator of Compromise

XIOC detected Domain: app.net

Indicator of Compromise

XIOC detected Domain: l.rest

Indicator of Compromise

XIOC detected Domain: e.children.map

Indicator of Compromise

XIOC detected Domain: q.map

Indicator of Compromise

XIOC detected Domain: thinkpeaks.com

Indicator of Compromise

XIOC detected Domain: affiliatetheme.io

Indicator of Compromise

XIOC detected Domain: rocket.chat

Indicator of Compromise

XIOC detected Domain: rev.io

Indicator of Compromise

XIOC detected Domain: micro.blog

Indicator of Compromise

XIOC detected Domain: last.fm

Indicator of Compromise

XIOC detected Domain: itch.io

Indicator of Compromise

XIOC detected Domain: angrycreative.se

Indicator of Compromise

XIOC detected Domain: www.amilia.com

Indicator of Compromise

XIOC detected Domain: aws.amazon.com

Indicator of Compromise

XIOC detected Domain: www.algolia.com

Indicator of Compromise

XIOC detected Domain: www.adversal.com

Indicator of Compromise

XIOC detected Domain: administrator.de

Indicator of Compromise

XIOC detected Domain: www.accusoft.com

Indicator of Compromise

XIOC detected Domain: bity.com

Indicator of Compromise

XIOC detected Domain: bimobject.com

Indicator of Compromise

XIOC detected Domain: www.avianex.de

Indicator of Compromise

XIOC detected Domain: www.ausmed.com.au

Indicator of Compromise

XIOC detected Domain: asymmetrik.com

Indicator of Compromise

XIOC detected Domain: www.apper.com

Indicator of Compromise

XIOC detected Domain: appsignal.com

Indicator of Compromise

XIOC detected Domain: www.clearbluetechnologies.com

Indicator of Compromise

XIOC detected Domain: www.cibltd.com

Indicator of Compromise

XIOC detected Domain: www.centercode.com

Indicator of Compromise

XIOC detected Domain: cpanel.com

Indicator of Compromise

XIOC detected Domain: www.bueromoebel-experte.de

Indicator of Compromise

XIOC detected Domain: blissbook.com

Indicator of Compromise

XIOC detected Domain: www.blackpulp.com

Indicator of Compromise

XIOC detected Domain: www.deskpro.com

Indicator of Compromise

XIOC detected Domain: www.cymedicaortho.com

Indicator of Compromise

XIOC detected Domain: wearecuttlefish.com

Indicator of Compromise

XIOC detected Domain: www.cloudversify.com

Indicator of Compromise

XIOC detected Domain: cloudsmith.io

Indicator of Compromise

XIOC detected Domain: www.cloudscale.ch

Indicator of Compromise

XIOC detected Domain: www.cloudflare.com

Indicator of Compromise

XIOC detected Domain: www.fleetplan.net

Indicator of Compromise

XIOC detected Domain: www.firstdraft.com

Indicator of Compromise

XIOC detected Domain: www.econopublish.com

Indicator of Compromise

XIOC detected Domain: www.dyalog.com

Indicator of Compromise

XIOC detected Domain: draft2digital.com

Indicator of Compromise

XIOC detected Domain: dochub.com

Indicator of Compromise

XIOC detected Domain: discourse.org

Indicator of Compromise

XIOC detected Domain: hips.com

Indicator of Compromise

XIOC detected Domain: hms.harvard.edu

Indicator of Compromise

XIOC detected Domain: www.guilded.gg

Indicator of Compromise

XIOC detected Domain: gripfire.io

Indicator of Compromise

XIOC detected Domain: gofore.com

Indicator of Compromise

XIOC detected Domain: www.gitkraken.com

Indicator of Compromise

XIOC detected Domain: www.getaroom.com

Indicator of Compromise

XIOC detected Domain: innosoft.com.sa

Indicator of Compromise

XIOC detected Domain: www.insitesystems.com

Indicator of Compromise

XIOC detected Domain: www.hubspot.com

Indicator of Compromise

XIOC detected Domain: www.hotjar.com

Indicator of Compromise

XIOC detected Domain: www.hornbill.com

Indicator of Compromise

XIOC detected Domain: hive.io

Indicator of Compromise

XIOC detected Domain: www.hireahelper.com

Indicator of Compromise

XIOC detected Domain: www.megaport.com

Indicator of Compromise

XIOC detected Domain: medapps.com.au

Indicator of Compromise

XIOC detected Domain: korvue.com

Indicator of Compromise

XIOC detected Domain: www.keycdn.com

Indicator of Compromise

XIOC detected Domain: www.joget.org

Indicator of Compromise

XIOC detected Domain: instalod.com

Indicator of Compromise

XIOC detected Domain: www.inspira.be

Indicator of Compromise

XIOC detected Domain: nimblr.ai

Indicator of Compromise

XIOC detected Domain: www.napster.com

Indicator of Compromise

XIOC detected Domain: www.mylogin.info

Indicator of Compromise

XIOC detected Domain: mylogin.info

Indicator of Compromise

XIOC detected Domain: medrt.co.jp

Indicator of Compromise

XIOC detected Domain: www.mizuni.com

Indicator of Compromise

XIOC detected Domain: mix.com

Indicator of Compromise

XIOC detected Domain: patchpatrol.com

Indicator of Compromise

XIOC detected Domain: www.palfed.com

Indicator of Compromise

XIOC detected Domain: en.page4.com

Indicator of Compromise

XIOC detected Domain: octopus.com

Indicator of Compromise

XIOC detected Domain: www.nutritionix.com

Indicator of Compromise

XIOC detected Domain: www.ns8.com

Indicator of Compromise

XIOC detected Domain: nomp.se

Indicator of Compromise

XIOC detected Domain: pushed.co

Indicator of Compromise

XIOC detected Domain: www.purelyinteractive.ca

Indicator of Compromise

XIOC detected Domain: pulse-eight.com

Indicator of Compromise

XIOC detected Domain: promowizard.co.uk

Indicator of Compromise

XIOC detected Domain: phacility.com

Indicator of Compromise

XIOC detected Domain: www.perbyte.com

Indicator of Compromise

XIOC detected Domain: www.pcsg.de

Indicator of Compromise

XIOC detected Domain: schlix.com

Indicator of Compromise

XIOC detected Domain: rockrms.com

Indicator of Compromise

XIOC detected Domain: resolving.com

Indicator of Compromise

XIOC detected Domain: river.red

Indicator of Compromise

XIOC detected Domain: readme.io

Indicator of Compromise

XIOC detected Domain: www.react-europe.org

Indicator of Compromise

XIOC detected Domain: www.quinscape.de

Indicator of Compromise

XIOC detected Domain: www.atomsoftware.com.au

Indicator of Compromise

XIOC detected Domain: www.sistrix.de

Indicator of Compromise

XIOC detected Domain: siliconbarn.com

Indicator of Compromise

XIOC detected Domain: shp.com

Indicator of Compromise

XIOC detected Domain: shopware.de

Indicator of Compromise

XIOC detected Domain: servicestack.net

Indicator of Compromise

XIOC detected Domain: searcheng.in

Indicator of Compromise

XIOC detected Domain: www.ussunnah.org

Indicator of Compromise

XIOC detected Domain: theredyeti.com

Indicator of Compromise

XIOC detected Domain: supple.com.au

Indicator of Compromise

XIOC detected Domain: studiovinari.com

Indicator of Compromise

XIOC detected Domain: stickermule.com

Indicator of Compromise

XIOC detected Domain: www.staylinked.com

Indicator of Compromise

XIOC detected Domain: speakap.com

Indicator of Compromise

XIOC detected Domain: www.vnv.ch

Indicator of Compromise

XIOC detected Domain: www.via.software

Indicator of Compromise

XIOC detected Domain: vaadin.com

Indicator of Compromise

XIOC detected Domain: uniregistry.com

Indicator of Compromise

XIOC detected Domain: uncharted.software

Indicator of Compromise

XIOC detected Domain: typo3.org

Indicator of Compromise

XIOC detected Domain: theme.co

Indicator of Compromise

XIOC detected Domain: 1f.sz

Indicator of Compromise

XIOC detected Domain: wpressr.com

Indicator of Compromise

XIOC detected Domain: www.workrails.com

Indicator of Compromise

XIOC detected Domain: www.wodu.com

Indicator of Compromise

XIOC detected Domain: www.whmcs.com

Indicator of Compromise

XIOC detected Domain: www.weedable.com

Indicator of Compromise

XIOC detected Domain: www.watchmanmonitoring.com

Indicator of Compromise

XIOC detected Domain: s.event.handlers.call

Indicator of Compromise

XIOC detected Domain: s.event.global

Indicator of Compromise

XIOC detected Domain: s.map

Indicator of Compromise

XIOC detected Domain: t.flat.call

Indicator of Compromise

XIOC detected Domain: k.no

Indicator of Compromise

XIOC detected Domain: ne.pf

Indicator of Compromise

XIOC detected Domain: a.mq

Indicator of Compromise

XIOC detected Domain: raw.githubusercontent.com

Indicator of Compromise

XIOC detected Domain: m.name

Indicator of Compromise

XIOC detected Domain: location.name

Indicator of Compromise

XIOC detected Domain: s.now

Indicator of Compromise

XIOC detected Domain: mt.host

Indicator of Compromise

XIOC detected Domain: s.fx.off

Indicator of Compromise

XIOC detected Domain: u.data

Indicator of Compromise

XIOC detected Domain: n.at

Indicator of Compromise

XIOC detected Domain: i.target

Indicator of Compromise

XIOC detected Domain: e.off

Indicator of Compromise

XIOC detected Domain: this.bindings.off

Indicator of Compromise

XIOC detected Domain: this.element.off

Indicator of Compromise

XIOC detected Domain: jqueryui.com

Indicator of Compromise

XIOC detected Domain: benjaminrh.github.io

Indicator of Compromise

XIOC detected Domain: e.my

Indicator of Compromise

XIOC detected Domain: s.offset.top

Indicator of Compromise

XIOC detected Domain: n.using.call

Indicator of Compromise

XIOC detected Domain: g.top-d.top

Indicator of Compromise

XIOC detected Domain: n.my

Indicator of Compromise

XIOC detected Domain: k.my

Indicator of Compromise

XIOC detected Domain: k.at

Indicator of Compromise

XIOC detected Domain: c.hsla.to

Indicator of Compromise

XIOC detected Domain: o.to

Indicator of Compromise

XIOC detected Domain: s.to

Indicator of Compromise

XIOC detected Domain: l.support

Indicator of Compromise

XIOC detected Domain: o.space

Indicator of Compromise

XIOC detected Domain: n.offset.top

Indicator of Compromise

XIOC detected Domain: e.at

Indicator of Compromise

XIOC detected Domain: o.id

Indicator of Compromise

XIOC detected Domain: t.is

Indicator of Compromise

XIOC detected Domain: t.fx.off

Indicator of Compromise

XIOC detected Domain: t.effects.animateclass.call

Indicator of Compromise

XIOC detected Domain: h.complete.call

Indicator of Compromise

XIOC detected Domain: p.style

Indicator of Compromise

XIOC detected Domain: n.to

Indicator of Compromise

XIOC detected Domain: t.fn.show

Indicator of Compromise

XIOC detected Domain: this.effect.call

Indicator of Compromise

XIOC detected Domain: i.show

Indicator of Compromise

XIOC detected Domain: r.is

Indicator of Compromise

XIOC detected Domain: h.call

Indicator of Compromise

XIOC detected Domain: t.clip.top

Indicator of Compromise

XIOC detected Domain: t.clip.bottom-t.clip.top

Indicator of Compromise

XIOC detected Domain: t.effects.effect.scale.call

Indicator of Compromise

XIOC detected Domain: t.effects.effect.size.call

Indicator of Compromise

XIOC detected Domain: v.top

Indicator of Compromise

XIOC detected Domain: p.show

Indicator of Compromise

XIOC detected Domain: s.bottom-s.top

Indicator of Compromise

XIOC detected Domain: e.start.top

Indicator of Compromise

XIOC detected Domain: e.end.top-e.start.top

Indicator of Compromise

XIOC detected Domain: i.space

Indicator of Compromise

XIOC detected Domain: this.headers.next

Indicator of Compromise

XIOC detected Domain: this.active.next

Indicator of Compromise

XIOC detected Domain: this.form.data

Indicator of Compromise

XIOC detected Domain: a.is

Indicator of Compromise

XIOC detected Domain: n.name

Indicator of Compromise

XIOC detected Domain: s.is

Indicator of Compromise

XIOC detected Domain: t.ui.keycode.page

Indicator of Compromise

XIOC detected Domain: this.element.is

Indicator of Compromise

XIOC detected Domain: this.select

Indicator of Compromise

XIOC detected Domain: ui.menu

Indicator of Compromise

XIOC detected Domain: i.now

Indicator of Compromise

XIOC detected Domain: o.next

Indicator of Compromise

XIOC detected Domain: a.next

Indicator of Compromise

XIOC detected Domain: this.menu

Indicator of Compromise

XIOC detected Domain: n.page

Indicator of Compromise

XIOC detected Domain: this.menu.element.is

Indicator of Compromise

XIOC detected Domain: o.tab

Indicator of Compromise

XIOC detected Domain: this.menu.select

Indicator of Compromise

XIOC detected Domain: t.ui.keycode.space

Indicator of Compromise

XIOC detected Domain: this.active.is

Indicator of Compromise

XIOC detected Domain: s.dpdiv.show

Indicator of Compromise

XIOC detected Domain: h.top

Indicator of Compromise

XIOC detected Domain: o.dpdiv.is

Indicator of Compromise

XIOC detected Domain: this.menu.next

Indicator of Compromise

XIOC detected Domain: this.search

Indicator of Compromise

XIOC detected Domain: i.item.data

Indicator of Compromise

XIOC detected Domain: this.document.one

Indicator of Compromise

XIOC detected Domain: t.pagey-this.offset.top

Indicator of Compromise

XIOC detected Domain: this.offset.click

Indicator of Compromise

XIOC detected Domain: this.positionabs.top-this.margins.top

Indicator of Compromise

XIOC detected Domain: mousedownevent.target

Indicator of Compromise

XIOC detected Domain: this.document.off

Indicator of Compromise

XIOC detected Domain: t.ui.ie

Indicator of Compromise

XIOC detected Domain: t.input.is

Indicator of Compromise

XIOC detected Domain: this.offset.click.top

Indicator of Compromise

XIOC detected Domain: this.helper.is

Indicator of Compromise

XIOC detected Domain: mouseup.call

Indicator of Compromise

XIOC detected Domain: this.handleelement.is

Indicator of Compromise

XIOC detected Domain: this.options.revert.call

Indicator of Compromise

XIOC detected Domain: this.position.top

Indicator of Compromise

XIOC detected Domain: style.top

Indicator of Compromise

XIOC detected Domain: t.pagey-this.offset.click.top

Indicator of Compromise

XIOC detected Domain: this.offset.scroll.top

Indicator of Compromise

XIOC detected Domain: this.offset.parent.top

Indicator of Compromise

XIOC detected Domain: this.offset.relative.top

Indicator of Compromise

XIOC detected Domain: this.helperproportions.height-this.margins.top

Indicator of Compromise

XIOC detected Domain: this.offset.relative.top-this.offset.parent.top

Indicator of Compromise

XIOC detected Domain: this.margins.top

Indicator of Compromise

XIOC detected Domain: o.offset.click.top

Indicator of Compromise

XIOC detected Domain: s.offset.click

Indicator of Compromise

XIOC detected Domain: o.offset.click

Indicator of Compromise

XIOC detected Domain: trigger.call

Indicator of Compromise

XIOC detected Domain: t.ui.plugin.call

Indicator of Compromise

XIOC detected Domain: l-this.offset.click.top-this.offset.relative.top-this.offset.parent.top

Indicator of Compromise

XIOC detected Domain: n-this.offset.click.top

Indicator of Compromise

XIOC detected Domain: top-s.margins.top

Indicator of Compromise

XIOC detected Domain: i.offset.top

Indicator of Compromise

XIOC detected Domain: e.pagey-s.overflowoffset.top

Indicator of Compromise

XIOC detected Domain: s.overflowoffset.top

Indicator of Compromise

XIOC detected Domain: s.offset.parent.top-o.offset.parent.top

Indicator of Compromise

XIOC detected Domain: o.offset.parent.top

Indicator of Compromise

XIOC detected Domain: s.offset.click.top

Indicator of Compromise

XIOC detected Domain: this.prevposition.top

Indicator of Compromise

XIOC detected Domain: c.position.top-c.originalposition.top

Indicator of Compromise

XIOC detected Domain: e.pagey-n.top

Indicator of Compromise

XIOC detected Domain: handles.show

Indicator of Compromise

XIOC detected Domain: s.options.snap.snap.call

Indicator of Compromise

XIOC detected Domain: i.position.top

Indicator of Compromise

XIOC detected Domain: s.options.snap.release.call

Indicator of Compromise

XIOC detected Domain: a.parentdata.top

Indicator of Compromise

XIOC detected Domain: a.offset.top

Indicator of Compromise

XIOC detected Domain: a.position.top

Recommended Action

This extension has significant security concerns that warrant careful review. Consider uninstalling or finding a safer alternative. If you must use it, limit the permissions and monitor for suspicious activity.

Analysis performed on 10/30/2025 ยท Version 1.1.3

Data sourced from automated security scanning. For detailed analysis, view the full security scorecard.