Behaviors
List of software behaviors discovered with static code analysis.
Requests permission required to perform restore operations. (x3)
permissions
Requests permission required to perform a number of security-related functions, such as controlling and viewing audit messages. (x3)
permissions
Prompts user for credentials. (x6)
behavior
Accesses the /etc/apt directory. (x1)
file
Opens registry keys. (x3)
registry
Enumerates the values of a registry key. (x3)
registry
Tampers with user/account privileges. (x3)
permissions
Requests permission required to create a symbolic link. (x3)
permissions
Downloads files via HTTP. (x1)
network
Decompresses a Tar archive. (x1)
file