Behaviors
List of software behaviors discovered with static code analysis.
Requests permission required to perform restore operations. (x2)
permissions
Requests permission required to perform a number of security-related functions, such as controlling and viewing audit messages. (x2)
permissions
Prompts user for credentials. (x4)
behavior
Tampers with user/account privileges. (x2)
permissions
Requests permission required to create a symbolic link. (x2)
permissions
Accesses the /dev/null pseudo-file. (x1)
file
Enumerates system information. (x6)
search
Enumerates currently available disk drives. (x2)
search
Enumerates user/account privilege information. (x2)
permissions
Requests permission required to lock physical pages in memory. (x2)
permissions