WinRoot is designed to unlock features of Session 0 that are not available in interactive user sessions. WinRoot uses the account System (NT AUTHORITY\System) in Session 0 to obtain high privilege that the user normally does not pose. With the help of WinRoot, you can also own what TrustedInstaller owns without modifying ownership.
WinRoot can be used to bypass the Session 0 isolation protection and create interactive process even without Interactive Service Detection dialog. The interactive Windows Station WinSta0 is made available and thus the process can display UI and receive user inputs. A separate instance of explorer window can be opened by WinRoot under Session 0, that will help us to browse through files and folders.
Windows Server 2008,