Behaviors
List of software behaviors discovered with static code analysis.
Might contain potentially obfuscated code or data. (x5)
anomaly
Contains Visa credit card numbers. (x9)
steal
Might evaluate code dynamically. (x8)
anomaly
Might communicate to server over HTTP using XMLHttpRequest. (x5)
network
Makes HTTP GET requests. (x5)
network
Connects through HTTP. (x7)
network
Converts binary data to its string representation, commonly used in obfuscation. (x19)
packer
Might communicate with server over HTTP using Fetch API. (x8)
network
Contains URLs related to search engines. (x11)
network
Serializes data into the JSON format. (x8)
file