Behaviors
List of software behaviors discovered with static code analysis.
Accesses system passwords. (x2)
steal
Retrieves the name of the user associated with the process. (x10)
search
Deletes the value of a registry key. (x5)
registry
Deletes a registry key and its values. (x2)
registry
Requests permission to open other processes. (x4)
permissions
Requests permission required to perform restore operations. (x1)
permissions
Requests permission required to perform a number of security-related functions, such as controlling and viewing audit messages. (x1)
permissions
Modifies file/directory permissions. (x1)
permissions
Sends data on a connected TCP socket. (x2)
network
Receives data from a connected TCP socket. (x2)
network