Adversaries may execute their own malicious payloads by hijacking the Registry entries used by services.
Sub-technique of
T1574
See: MITRE ATT&CK
Adversaries may execute their own malicious payloads by hijacking the Registry entries used by services.
Sub-technique of
T1574
See: MITRE ATT&CK