Behaviors
List of software behaviors discovered with static code analysis.
Uses a Python script interpreter. (x37)
execution
Adds a path to the DLL search path. (x1)
execution
Executes an expression. (x7)
execution
Queries the value of an environment variable. (x1)
search
Enumerates files in a given directory. (x2)
search
Tampers with keyboard/mouse status. (x1)
monitor
Terminates a process/thread. (x10)
execution
Detects presence of debuggers. (x38)
evasion
Contains reference to kernel32.dll which is Windows NT BASE API Client DLL. (x4)
execution