Cyber 57 Shield
Unknown developer · 13 users at risk
Threat Summary
Key Security Threats
YARA rule match: -postinstall_registry_modification
unknown_file
YARA rule match: -postinstall_system_command
unknown_file
YARA rule match: -postinstall_system_command
unknown_file
YARA rule match: -postinstall_file_manipulation
unknown_file
YARA rule match: -postinstall_file_download
unknown_file
AI Security Analysis
AI Security Analysis: Cyber 57 Shield
Analysis generated: 2025-12-11T14:18:52+13:00
Model: gemini-3-pro-preview
Quick Facts
| Property | Value |
|---|---|
| UUID | 1085e377-2939-5aca-a340-23d8fc52c4f5 |
| Type | chrome |
| Version | |
| Users | 7 |
| Risk Score | 100.0/100 (CRITICAL) |
| Malware Detected | ⚠️ Yes |
| Secrets Exposed | ✅ No |
| Critical Vulns | ✅ No |
AI Analysis
Based on the data provided, here is the security analysis for the "Cyber 57 Shield" extension.
Executive Summary
Cyber 57 Shield represents a CRITICAL security threat and should be considered malicious. Despite its description as a security tool designed to "block known malicious sites," the analysis reveals over 27,000 security findings, including thousands of high-severity malware signatures indicating attempts at system command execution, file manipulation, and obfuscation. With only 7 users and an unverified publisher, this extension exhibits the classic characteristics of "fake security software" or a Trojan horse. Immediate removal and blocking are required.
Threat Assessment
The security posture of this extension is non-existent; it appears to be an active threat vector.
- Malicious Behavior Patterns: The analysis identified 7,127 high-severity malware signatures. The recurring presence of
postinstall_tags (e.g.,postinstall_system_command,postinstall_file_manipulation) suggests the extension contains scripts designed to execute immediately after deployment. These behaviors are typical of malicious "droppers" or supply chain attacks where the goal is to compromise the host system, not just the browser environment. - System Integrity Risk: Findings such as
postinstall_environment_accessandpostinstall_file_downloadindicate capabilities that exceed standard browser extension permissions. This suggests the extension may be attempting to download additional payloads or access local environment variables (which often contain API keys or credentials). - Evasion Techniques: The high volume of
postinstall_obfuscationfindings indicates that the code is deliberately hidden or packed to bypass traditional security scanners. Legitimate open-source or commercial extensions rarely use heavy obfuscation unless they are hiding malicious logic. - Reputational Indicators: The extension has a Trust Score of 0/100, is published by an unverified entity, and has a negligible user base (7 users). There is no community validation or history to support its legitimacy.
Risk Justification
The calculated Risk Score of 100.0/100 is fully justified and accurate.
- Severity of Findings: The presence of
system_commandandfile_manipulationsignatures elevates this from a privacy risk (e.g., tracking) to a system compromise risk. - Volume of Anomalies: A total of 27,240 findings is statistically impossible for a legitimate, well-coded browser extension. This volume suggests the inclusion of massive malicious libraries or a "spray and pray" approach to malware inclusion.
- Deceptive Nature: The extension masquerades as a security tool ("Shield"), which is a common social engineering tactic to trick users into granting extensive permissions.
Key Findings
- System Command Execution (
postinstall_system_command): Multiple high-severity matches indicate the code attempts to execute commands on the underlying operating system, presenting a risk of full system takeover. - File System Manipulation (
postinstall_file_manipulation): The extension contains logic to create, modify, or delete files on the host, which is highly suspicious for a browser plugin. - Heavy Obfuscation (
postinstall_obfuscation): A significant portion of the code is obfuscated, preventing easy analysis and likely hiding malicious payloads. - Environment Access (
postinstall_environment_access): The code attempts to read environment variables, a common technique used by malware to steal developer credentials (AWS keys, API tokens) or system configuration data. - Network Beacons (
postinstall_network_communication): The extension initiates network connections that match malware command-and-control (C2) patterns, likely to exfiltrate data or receive instructions.
Recommendations
- Immediate Removal: Uninstall the extension from all browsers immediately.
- Organizational Block: Add the Extension UUID (
1085e377-2939-5aca-a340-23d8fc52c4f5) to the enterprise blocklist (e.g., Google Admin Console or Group Policy) to prevent installation. - Endpoint Scan: Run a full antivirus/EDR scan on any machine where this extension was installed. The
file_manipulationfindings suggest it may have dropped files outside the browser sandbox. - Credential Rotation: As a precaution, rotate credentials for any active sessions or environment variables present on the machine during the time the extension was installed, due to the
environment_accessfindings. - Network Investigation: Review firewall logs for unexpected outbound traffic from endpoints that had this extension installed, specifically looking for connections to unknown IPs.
Mitigation Strategies
There is no safe mitigation strategy that allows for the continued use of this extension.
- The risk score is 100/100. The fundamental function of the code appears to be malicious.
- Alternative: Replace this tool with verified, enterprise-grade browser security solutions (e.g., Microsoft Defender Browser Protection, uBlock Origin, or commercial endpoint protection browser plugins).
Confidence Assessment
Confidence Level: High (80-90%)
While static analysis (YARA rules) can sometimes generate false positives, the sheer volume (27,000+) and the specific combination of system command, obfuscation, and network signatures make it statistically improbable that this is benign code. The low user count and unverified publisher further solidify the assessment that this is a malicious actor. The only missing data point for 100% confidence is dynamic analysis (sandboxed execution) to observe the specific C2 servers it contacts.
Disclaimer
This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.
All Findings (1000)
View all 1000 security findings
YARA rule match: -postinstall_registry_modification
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_registry_modification
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -NoUseWeakRandom
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -NoUseWeakRandom
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_registry_modification
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -NoUseWeakRandom
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_crypto_operations
YARA rule match: -NoUseWeakRandom
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_crypto_operations
YARA rule match: -NoUseWeakRandom
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -UsingCommandLineArguments
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_registry_modification
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_registry_modification
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -UsingCommandLineArguments
YARA rule match: -postinstall_file_manipulation
YARA rule match: -UsingCommandLineArguments
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_environment_access
YARA rule match: -credential_env_files
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_environment_access
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -credential_env_files
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -credential_env_files
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_registry_modification
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -NoUseWeakRandom
YARA rule match: -postinstall_registry_modification
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -UsingCommandLineArguments
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -credential_generic_tokens
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -credential_env_files
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -credential_env_files
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_crypto_operations
YARA rule match: -NoUseWeakRandom
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -NoUseWeakRandom
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_crypto_operations
YARA rule match: -NoUseWeakRandom
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -UsingCommandLineArguments
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_registry_modification
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -NoUseWeakRandom
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -UsingCommandLineArguments
YARA rule match: -postinstall_network_communication
YARA rule match: -UsingCommandLineArguments
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_registry_modification
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -credential_env_files
YARA rule match: -credential_env_files
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -credential_env_files
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_download
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -credential_env_files
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -DebuggerStatementsShouldNotBeUsed
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -NoUseWeakRandom
YARA rule match: -DebuggerStatementsShouldNotBeUsed
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_registry_modification
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -NoRenderContentFromRequest
YARA rule match: -postinstall_network_communication
YARA rule match: -StaticallyServingHiddenFilesIsSecuritySensitive
YARA rule match: -postinstall_file_manipulation
YARA rule match: -RedirectToUnknownPath
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -RedirectToUnknownPath
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -credential_env_files
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -DebuggerStatementsShouldNotBeUsed
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -credential_env_files
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_obfuscation
YARA rule match: -DebuggerStatementsShouldNotBeUsed
YARA rule match: -NoUseWeakRandom
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -DebuggerStatementsShouldNotBeUsed
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_registry_modification
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_environment_access
YARA rule match: -credential_env_files
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
Recommended Action
This extension has significant security concerns that warrant careful review. Consider uninstalling or finding a safer alternative. If you must use it, limit the permissions and monitor for suspicious activity.