We're updating the issue view to help you get more done. 

Query Registry

Description

Adversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software.

The Registry contains a significant amount of information about the operating system, configuration, software, and security. (Citation: Wikipedia Windows Registry) Some of the information may help adversaries to further their operation within a network. Adversaries may use the information from [Query Registry](https://attack.mitre.org/techniques/T1012) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.

id

T1012

tactic

discovery

datasources

Process command-line parameters
Process monitoring
Windows Registry

maturity

Not Tracked

Assignee

Unassigned
Configure