Behaviors
List of software behaviors discovered with static code analysis.
Requests permission required to create a computer account. (x1)
permissions
Requests permission required to access Credential Manager as a trusted caller. (x1)
permissions
Requests permission required to load or unload a device driver. (x1)
permissions
Requests permission required to identify itself as a part of the trusted computer base. (x1)
permissions
Retrieves the name of the user associated with the process. (x10)
search
Deletes the value of a registry key. (x1)
registry
Requests permission required to perform a number of security-related functions, such as controlling and viewing audit messages. (x1)
permissions
Requests permission required to mark user and computer accounts as trusted for delegation. (x1)
permissions
Requests permission required to shut down a system using a network request. (x1)
permissions
Requests permission required to impersonate a client after authentication. (x1)
permissions