Query Registry
Adversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software. The Registry contains a significant amount of information about the operating system, configuration, software, and security.(Citation: Wikipedia Windows Registry) Information can easily be queried using the [Reg](https://attack.mitre.org/software/S0075) utility, though other means to access the Registry exist. Some of the information may help adversaries to further t...
BY SOURCE
PROCEDURES (17)
Auto-extracted: 2 detections for azure
Auto-extracted: 2 detections for registry
Auto-extracted: 2 detections for process access
Auto-extracted: 2 detections for bypass
Auto-extracted: 2 detections for registry
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for network connection monitoring
Auto-extracted: 1 detections for event log
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for wmi
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for event log
Auto-extracted: 1 detections for event log
Auto-extracted: 1 detections for anomal
Auto-extracted: 1 detections for service