Behaviors
List of software behaviors discovered with static code analysis.
Might contain potentially obfuscated code or data. (x5)
anomaly
Encodes data using the Base16 algorithm. (x5)
file
Compresses data using the Brotli algorithm. (x2)
packer
Compresses data using the GZip algorithm. (x2)
packer
Calculates the SHA-1 hash of data. (x2)
file
Converts binary data to its string representation, commonly used in obfuscation. (x5)
packer
Writes to files. (x3)
file
Might access or change current URL (location). (x4)
network
Enumerates the current platform of the browser. (x5)
monitor
Creates a directory. (x3)
file