Behaviors
List of software behaviors discovered with static code analysis.
Requests permission required to perform restore operations. (x2)
permissions
Requests permission required to perform a number of security-related functions, such as controlling and viewing audit messages. (x2)
permissions
Requests permission required to create a symbolic link. (x2)
permissions
Tampers with user/account privileges. (x2)
permissions
Enumerates system information. (x2)
search
Enumerates currently available disk drives. (x2)
search
Requests permission required to lock physical pages in memory. (x2)
permissions
Enumerates user/account privilege information. (x2)
permissions
Modifies file/directory attributes. (x2)
file
Modifies the timestamp of a file. (x2)
file