Get a behaviour report from a private file

🚧

Special privileges required

Private Scanning endpoints are only available to users with Private Scanning license.

Fetches a Private File Behaviour object by ID. It expects the sandbox ID returned by the GET /private/files/{id}/behaviours endpoint.

{
    "data": {
        "attributes": {
            "behash": "3f4a02b305dde56c7c606849289bb194",
            "calls_highlighted": [
                "GetTickCount"
            ],
            "files_opened": [
                "C:\\Windows\\system32\\ws2_32.dll",
                "C:\\Windows\\system32\\UxTheme.dll",
                "C:\\Windows\\system32\\ole32.dll",
                "C:\\Users\\<USER>\\Downloads\\putty.hlp",
                "C:\\Users\\<USER>\\Downloads\\putty.cnt",
                "C:\\Users\\<USER>\\Downloads\\putty.chm",
                "C:\\Windows\\system32\\user32.dll",
                "C:\\Windows\\system32\\advapi32.dll",
                "C:\\Windows\\system32\\ntmarta.dll",
                "C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d",
                "C:\\Windows\\Fonts\\staticcache.dat"
            ],
            "has_html_report": true,
            "has_pcap": true,
            "modules_loaded": [
                "UxTheme.dll",
                "IMM32.dll",
                "SspiCli.dll",
                "ADVAPI32.dll"
            ],
            "processes_tree": [
                {
                    "name": "9f9e74241d59eccfe7040bfdcbbceacb374eda397cc53a4197b59e4f6f380a91.exe",
                    "process_id": "2340"
                }
            ],
            "registry_keys_opened": [
                "HKCU\\Software\\SimonTatham\\PuTTY\\Sessions",
                "HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\FontLink\\SystemLink",
                "HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0",
                "HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0\\Disable",
                "HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0\\DataFilePath",
                "HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback",
                "HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\MS Shell Dlg"
            ],
            "sandbox_name": "VirusTotal Jujubox",
            "tags": [
                "DIRECT_CPU_CLOCK_ACCESS",
                "RUNTIME_MODULES"
            ],
            "text_highlighted": [
                "PuTTY Configuration",
                "&Open",
                "Cate&gory:",
                "C:\\Windows\\system32\\cmd.exe"
            ]
        },
        "id": "9f9e74241d59eccfe7040bfdcbbceacb374eda397cc53a4197b59e4f6f380a91_VirusTotal Jujubox-1658933614",
        "links": {
            "self": "https://www.virustotal.com/api/v3/private/file_behaviours/9f9e74241d59eccfe7040bfdcbbceacb374eda397cc53a4197b59e4f6f380a91_VirusTotal Jujubox-1658933614"
        },
        "type": "private_file_behaviour"
    }
}
Language
Click Try It! to start a request and see the response here!