Hide Navigation Hide TOC Potential Persistence Via COM Search Order Hijacking (a0ff33d8-79e4-4cef-b4f3-9dc4133ccd12) Detects potential COM object hijacking leveraging the COM Search Order Cluster A Galaxy A Cluster B Galaxy B Level Potential Persistence Via COM Search Order Hijacking (a0ff33d8-79e4-4cef-b4f3-9dc4133ccd12) Sigma-Rules Component Object Model Hijacking - T1546.015 (bc0f5e80-91c0-4e04-9fbb-e4e332c85dae) Attack Pattern 1 Event Triggered Execution - T1546 (b6301b64-ef57-4cce-bb0b-77026f14a8db) Attack Pattern Component Object Model Hijacking - T1546.015 (bc0f5e80-91c0-4e04-9fbb-e4e332c85dae) Attack Pattern 2