Supported Malware detectors The detectors for malware evidences listed below are classified by their resource kind. Execution Decoded Code Execution Decrypted Code Execution Downloaded Code Execution Malicious Command Execution Obfuscated Code Execution Silent execution System Registry Code Execution Unusual File Execution File Masquerade File Type Network Suspicious Request Suspicious URL Package Malicious Installation Scripts Registry System Registry Tampering Sensitive Data Browser Sensitive Data Enumeration Sensitive Data Enumeration Sensitive Data Exfiltration Sensitive File encryption Sensitive File Exfiltration System Bidirectional Characters Clipboard Hijacker Execution Policy Bypass Impair Defenses: Disabled Tools Invisible Characters Obfuscated Code Process Termination Suspicious Scheduled system service Virtualization Sandbox Evasion