Behaviors
List of software behaviors discovered with static code analysis.
Might contain potentially obfuscated code or data. (x2)
anomaly
Encodes data using the Base16 algorithm. (x2)
file
Decodes data using the Base16 algorithm. (x2)
file
Contains URLs that use non-standard ports. (x1)
network
Might evaluate code dynamically. (x2)
anomaly
Might use the Credential Management API. (x2)
steal
Might monitor keystrokes. (x2)
steal
Contains URLs with an unusual number of subdomains. (x1)
network
Connects through HTTP. (x2)
network
Might enumerate information about screen. (x2)
monitor