relx-i18n
Unknown developer ยท 36 users at risk
Threat Summary
Key Security Threats
YARA rule match: -postinstall_network_communication
unknown_file
YARA rule match: -postinstall_file_manipulation
unknown_file
YARA rule match: -postinstall_file_download
unknown_file
YARA rule match: -postinstall_network_communication
unknown_file
YARA rule match: -postinstall_file_manipulation
unknown_file
All Findings (1000)
View all 1000 security findings
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -credential_env_files
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_registry_modification
YARA rule match: -postinstall_network_communication
YARA rule match: -OriginsNotVerified
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_crypto_operations
YARA rule match: -NoUseWeakRandom
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -DebuggerStatementsShouldNotBeUsed
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -DebuggerStatementsShouldNotBeUsed
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_environment_access
YARA rule match: -credential_env_files
YARA rule match: -postinstall_registry_modification
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -OriginsNotVerified
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -NoUseWeakRandom
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_obfuscation
YARA rule match: -DebuggerStatementsShouldNotBeUsed
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_file_manipulation
YARA rule match: -NoUseWeakRandom
YARA rule match: -OriginsNotVerified
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_registry_modification
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -credential_env_files
YARA rule match: -credential_env_files
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -credential_env_files
YARA rule match: -credential_env_files
YARA rule match: -credential_env_files
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_registry_modification
YARA rule match: -postinstall_obfuscation
YARA rule match: -DebuggerStatementsShouldNotBeUsed
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_registry_modification
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_crypto_operations
YARA rule match: -NoUseWeakRandom
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -credential_env_files
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -credential_env_files
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_registry_modification
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -credential_env_files
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -credential_env_files
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -credential_env_files
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -credential_env_files
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -credential_env_files
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -credential_env_files
YARA rule match: -credential_env_files
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -credential_env_files
YARA rule match: -postinstall_system_command
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -credential_env_files
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_environment_access
YARA rule match: -credential_env_files
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -DebuggerStatementsShouldNotBeUsed
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -credential_env_files
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -credential_env_files
YARA rule match: -credential_env_files
YARA rule match: -DebuggerStatementsShouldNotBeUsed
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -DebuggerStatementsShouldNotBeUsed
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -DebuggerStatementsShouldNotBeUsed
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_network_communication
YARA rule match: -credential_env_files
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -DebuggerStatementsShouldNotBeUsed
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -DebuggerStatementsShouldNotBeUsed
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_file_manipulation
YARA rule match: -credential_env_files
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_environment_access
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -credential_env_files
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -DebuggerStatementsShouldNotBeUsed
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_crypto_operations
YARA rule match: -DebuggerStatementsShouldNotBeUsed
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -credential_env_files
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_registry_modification
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -NoUseWeakRandom
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -credential_env_files
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -NoUseWeakRandom
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -NoUseWeakRandom
YARA rule match: -postinstall_file_manipulation
YARA rule match: -UsingCommandLineArguments
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_network_communication
YARA rule match: -UsingShellInterpreterWhenExecutingOSCommands
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -NoUseWeakRandom
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_environment_access
YARA rule match: -postinstall_system_command
YARA rule match: -credential_env_files
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -UsingCommandLineArguments
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_crypto_operations
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_download
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_system_command
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_persistence_mechanism
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_file_manipulation
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_network_communication
YARA rule match: -postinstall_obfuscation
YARA rule match: -postinstall_obfuscation
Recommended Action
This extension has significant security concerns that warrant careful review. Consider uninstalling or finding a safer alternative. If you must use it, limit the permissions and monitor for suspicious activity.