Behaviors
List of software behaviors discovered with static code analysis.
Might contain potentially obfuscated code or data. (x5)
anomaly
Contains URLs that link to interesting file formats. (x2)
network
Encodes data using the Base16 algorithm. (x3)
file
Contains IP addresses. (x4)
network
Connects through HTTP. (x3)
network
Might enumerate information about screen. (x3)
monitor
Queries the value of an environment variable. (x25)
search
Converts binary data to its string representation, commonly used in obfuscation. (x3)
packer
Might communicate with server over HTTP using Fetch API. (x3)
network
Might create additional elements programmatically. (x11)
document