Behaviors
List of software behaviors discovered with static code analysis.
Retrieves the name of the user associated with the process. (x28)
search
Deletes the value of a registry key. (x4)
registry
Deletes a registry key and its values. (x2)
registry
Requests permission required to perform restore operations. (x2)
permissions
Requests permission required to shut down a system using a network request. (x2)
permissions
Requests permission required to perform a number of security-related functions, such as controlling and viewing audit messages. (x2)
permissions
Requests permission to open other processes. (x4)
permissions
Requests permission required to shut down a system. (x2)
permissions
Receives data from an open UDP socket. (x6)
network
Sends data on a connected TCP socket. (x6)
network