Skip to main content

Registry

IDDescriptionSignificance / Prevalence
BH12107Accesses FTP related registry keys.
BH12116Accesses PowerShell registry entries.
BH12168Changes the value of a registry key.
BH12209Creates autorun registry keys.
BH12216Creates registry keys.
BH12225Deletes a registry key and its values.
BH12233Deletes autorun registry keys.
BH12560Sets browser homepage.
BH12648Tampers with filetype risk registry settings.
BH12708Tampers with PowerShell Module Logging registry key.
BH12709Tampers with PowerShell Script Block Logging registry key.
BH12711Tampers with PowerShell Transcription registry key.
BH12777Tampers with Windows registry settings.
BH12782Tampers with Windows services registry keys.
BH13286Reads the content of a registry key value.
BH13287Deletes the value of a registry key.
BH13288Opens registry keys.
BH13293Contains references to registry paths that hold credentials.
BH16187Establishes a connection to a registry on a remote computer.
BH17303Accesses Telnet related registry keys.
BH17416Writes data to Outlook Express stored credentials.
BH17418Writes data to Outlook 2002-2019 stored credentials.
BH17420Writes data to Yahoo! Mail stored credentials.
BH17422Writes data to MSN Messenger stored credentials.
BH17426Writes data to IncrediMail stored credentials.
BH17432Writes data to Google Talk stored credentials.
BH17434Writes data to Google Desktop stored credentials.
BH19305Enumerates the subkeys of a registry key.
BH19456Enumerates the values of a registry key.
BH19534Enumerates registry key value names.
BH19536Enumerates registry keys.
BH20159Uses a Nishang command to set the 'Debugger' registry key for a screensaver to allow remote code execution.
BH20160Uses a Nishang command to set the 'Debugger' registry key for Sticky Keys and Utilman to allow remote code execution.
BH20299Uses PowerSploit/Empire command to return who is logged onto the local or a remote machine through enumeration of remote registry keys.