Behaviors
List of software behaviors discovered with static code analysis.
Might monitor keystrokes. (x3)
steal
Connects through HTTP. (x2)
network
Contains domains used for intercepting and inspecting HTTP requests. (x2)
network
Converts binary data to its string representation, commonly used in obfuscation. (x2)
packer
Serializes data into the JSON format. (x7)
file
Queries a specific selector within the page's Document Object Model. (x3)
behavior