Behaviors
List of software behaviors discovered with static code analysis.
Requests permission required to identify itself as a part of the trusted computer base. (x1)
permissions
Requests permission required to create a computer account. (x1)
permissions
Requests permission required to access Credential Manager as a trusted caller. (x1)
permissions
Requests permission required to load or unload a device driver. (x1)
permissions
Contains potentially deceptive links. (x1)
evasion
Accesses credentials from the Windows Credential Manager. (x1)
steal
Retrieves the name of the user associated with the process. (x3)
search
Deletes the value of a registry key. (x6)
registry
Deletes a registry key and its values. (x14)
registry
Requests permission required to impersonate a client after authentication. (x1)
permissions