Hide Navigation Hide TOC Reg Add Suspicious Paths (b7e2a8d4-74bb-4b78-adc9-3f92af2d4829) Detects when an adversary uses the reg.exe utility to add or modify new keys or subkeys Cluster A Galaxy A Cluster B Galaxy B Level Reg Add Suspicious Paths (b7e2a8d4-74bb-4b78-adc9-3f92af2d4829) Sigma-Rules Modify Registry - T1112 (57340c81-c025-4189-8fa0-fc7ede51bae4) Attack Pattern 1 Reg Add Suspicious Paths (b7e2a8d4-74bb-4b78-adc9-3f92af2d4829) Sigma-Rules Disable or Modify Tools - T1562.001 (ac08589e-ee59-4935-8667-d845e38fe579) Attack Pattern 1 Disable or Modify Tools - T1562.001 (ac08589e-ee59-4935-8667-d845e38fe579) Attack Pattern Impair Defenses - T1562 (3d333250-30e4-4a82-9edc-756c68afc529) Attack Pattern 2