Behaviors
List of software behaviors discovered with static code analysis.
Requests permission required to access Credential Manager as a trusted caller. (x1)
permissions
Requests permission required to identify itself as a part of the trusted computer base. (x1)
permissions
Requests permission required to create a computer account. (x1)
permissions
Requests permission required to load or unload a device driver. (x1)
permissions
Retrieves the name of the user associated with the process. (x10)
search
Deletes the value of a registry key. (x1)
registry
Requests permission required to enable volume management privileges. (x1)
permissions
Requests permission to open other processes. (x3)
permissions
Requests permission required to perform restore operations. (x1)
permissions
Requests permission required to perform a number of security-related functions, such as controlling and viewing audit messages. (x1)
permissions