Behaviors
List of software behaviors discovered with static code analysis.
Retrieves the name of the user associated with the process. (x28)
search
Deletes the value of a registry key. (x4)
registry
Deletes a registry key and its values. (x2)
registry
Requests permission required to shut down a system. (x2)
permissions
Requests permission required to shut down a system using a network request. (x2)
permissions
Requests permission required to perform a number of security-related functions, such as controlling and viewing audit messages. (x2)
permissions
Requests permission required to perform restore operations. (x2)
permissions
Requests permission to open other processes. (x4)
permissions
Receives data from a connected TCP socket. (x6)
network
Sends data on a connected TCP socket. (x6)
network