Behaviors
List of software behaviors discovered with static code analysis.
Might contain potentially obfuscated code or data. (x5)
anomaly
Might monitor keystrokes. (x6)
steal
Might connect to a server over HTTP and receive events. (x2)
network
Contains URLs related to release pages of projects hosted on GitHub. (x1)
network
Connects through HTTP. (x2)
network
Contains an uninterrupted sequence of Unicode-escaped characters. (x5)
evasion
Contains Unicode-escaped characters that are otherwise printable. (x6)
evasion
Queries the value of an environment variable. (x5)
search
Converts binary data to its string representation, commonly used in obfuscation. (x4)
packer
Enumerates display information. (x3)
monitor