Behaviors
List of software behaviors discovered with static code analysis.
Requests permission required to identify itself as a part of the trusted computer base. (x1)
permissions
Requests permission required to access Credential Manager as a trusted caller. (x1)
permissions
Requests permission required to load or unload a device driver. (x1)
permissions
Requests permission required to create a computer account. (x1)
permissions
Accesses credentials from the Windows Credential Manager. (x1)
steal
Retrieves the name of the user associated with the process. (x1)
search
Deletes a registry key and its values. (x13)
registry
Deletes the value of a registry key. (x5)
registry
Requests permission required to shut down a system. (x1)
permissions
Requests permission required to impersonate a client after authentication. (x1)
permissions