Behaviors
List of software behaviors discovered with static code analysis.
Might contain potentially obfuscated code or data. (x2)
anomaly
Encodes data using the Base16 algorithm. (x2)
file
Might evaluate code dynamically. (x2)
anomaly
Might communicate to server over HTTP using XMLHttpRequest. (x2)
network
Makes HTTP GET requests. (x2)
network
Contains an uninterrupted sequence of Unicode-escaped characters. (x2)
evasion
Queries the value of an environment variable. (x2)
search
Enumerates files in a given directory. (x2)
search
Converts binary data to its string representation, commonly used in obfuscation. (x2)
packer
Might access or change current URL (location). (x2)
network