Behaviors
List of software behaviors discovered with static code analysis.
Modifies file/directory permissions. (x2)
permissions
Changes file ownership. (x1)
file
Creates a process. (x4)
execution
Opens registry keys. (x1)
registry
Contains URLs that use suspicious top-level domains. (x1)
network
Deletes a file/directory. (x5)
file
Truncates a file. (x1)
file
Executes an expression. (x1)
execution
Enumerates system information. (x1)
search
Calculates the SHA-256 hash of data. (x1)
file