Exploit Indicator
Evasion Behavior
Exploit Code Activity
Possible Anti-emulation behavior
Generic Trojan Behavior
Suspicious Code Injection
Persistance with Self Delete Activity
Process deleting itself
Suspicious Persistence Activity
Suspicious Code Injection Activity
Suspicious Dropper Activity