Question Analysis

A Windows user’s registry was altered via a command-line tool to disable the lock workstation feature by adding a DWORD entry under the current user Policies\System key. Which registry value name was modified in this operation?

3dacb0d2-46ee-4c27-ac1b-f9886bf91a56
Question ID
7/23
Models Correct
1
Valid Answer
30%
Success Rate
Reference Answer

Human-validated correct answer for this question

DisableLockWorkstation
Model Performance Comparison

See how different AI models performed on this question

ModelAnswerKQL QueryStatusAttemptsTimeCost
gemini-2.5-flash-preview-04-17
No answer provided
No query generated
Incorrect
5
0.00s
0.0258
gpt-35-turbo
No answer provided
No query generated
Incorrect
5
0.00s
0.0113
gpt-4-turbo-2024-04-09
PromptOnSecureDesktop
DeviceRegistryEvents | where ActionType == 'RegistryValueSet' | where RegistryKey has 'Policies\\System' and (InitiatingProcessCommandLine has 'cmd.exe' or InitiatingProcessCommandLine has 'powershell.exe') | project DeviceName, InitiatingProcessAccountName, RegistryKey, RegistryValueName, InitiatingProcessCommandLine, TimeGenerated
Incorrect
4
36.59s
0.2441
gpt-4.1
DisableLockWorkstation
DeviceRegistryEvents | where RegistryKey endswith @"\Software\Microsoft\Windows\CurrentVersion\Policies\System" or RegistryKey endswith @"\Policies\System" | where (tolower(RegistryValueName) == "disablelockworkstation") and tolower(RegistryValueType) == "dword" | project TimeGenerated, DeviceName, RegistryKey, RegistryValueName, RegistryValueType, RegistryValueData, InitiatingProcessFileName, InitiatingProcessCommandLine
Correct
1
10.54s
0.0121
gpt-4.1-finetuned
DisableLockWorkstation
DeviceRegistryEvents | where RegistryKey has "CurrentVersion\\Policies\\System" | summarize by RegistryValueName
Correct
4
28.72s
0.0311
gpt-4.1-mini
No answer provided
No query generated
Incorrect
5
0.00s
0.0052
gpt-4.1-nano
No answer provided
No query generated
Incorrect
5
0.00s
0.0015
gpt-4o
No answer provided
No query generated
Incorrect
5
0.00s
0.0522
gpt-5-high
DisableLockWorkstation
let cmdline_tools = dynamic(["reg.exe","cmd.exe","powershell.exe","pwsh.exe","wscript.exe","cscript.exe"]); DeviceRegistryEvents | where ActionType == "RegistryValueSet" | where tolower(RegistryKey) has "\\software\\microsoft\\windows\\currentversion\\policies\\system" | where RegistryKey startswith "HKEY_USERS" or RegistryKey startswith "HKEY_CURRENT_USER" or RegistryKey startswith "HKU" or RegistryKey startswith "HKCU" | where tostring(RegistryValueType) contains "DWORD" | where tolower(InitiatingProcessFileName) in (cmdline_tools) or InitiatingProcessCommandLine has_any ("reg add","Set-ItemProperty","New-ItemProperty") | summarize LastSeen=max(TimeGenerated) by DeviceId, DeviceName, InitiatingProcessAccountName, RegistryKey, RegistryValueName, RegistryValueData, InitiatingProcessFileName, InitiatingProcessCommandLine | order by LastSeen desc | project RegistryValueName | distinct RegistryValueName
Correct
2
134.79s
0.0731
gpt-5-mini-high
DisableLockWorkstation
DeviceRegistryEvents | where RegistryKey has 'Policies\\System' or RegistryKey has 'Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System' | where tolower(RegistryValueType) contains 'dword' | where ( InitiatingProcessCommandLine has 'reg ' or InitiatingProcessCommandLine has 'reg.exe' or InitiatingProcessCommandLine has 'reg add' or InitiatingProcessCommandLine has 'New-ItemProperty' or InitiatingProcessCommandLine has 'Set-ItemProperty' or InitiatingProcessFileName in~ ("reg.exe", "powershell.exe", "cmd.exe") ) | summarize Count = count(), LastSeen = max(TimeGenerated) by RegistryValueName, RegistryValueData | sort by LastSeen desc | project RegistryValueName, RegistryValueData, Count, LastSeen
Correct
1
26.04s
0.0069
gpt-5-mini-low
No answer provided
No query generated
Incorrect
5
0.00s
0.0163
gpt-5-mini-medium
No answer provided
No query generated
Incorrect
5
0.00s
0.0138
gpt-5-nano-high
PromptOnSecureDesktop
DeviceRegistryEvents | where RegistryKey contains "Policies\\System" | where InitiatingProcessCommandLine has_any ("cmd.exe", "powershell", "reg.exe") | where isnotempty(RegistryValueName) | summarize Count = count() by RegistryValueName, RegistryKey | order by Count desc | take 1 | project RegistryValueName, RegistryKey, Count
Incorrect
3
79.02s
0.0047
gpt-5-nano-medium
No answer provided
No query generated
Incorrect
5
0.00s
0.0063
grok-3-beta
No answer provided
No query generated
Incorrect
5
0.00s
0.0876
grok-3-mini-beta
ModifiedValues
DeviceRegistryEvents | where RegistryKey contains 'HKEY_CURRENT_USER\\Software\\Policies\\Microsoft\\Windows\\System' | where RegistryValueType == 'REG_DWORD' | where ActionType == 'RegistryValueSet' | distinct RegistryValueName | summarize ModifiedValues = make_set(RegistryValueName)
Incorrect
3
43.67s
0.0047
o1-high
No answer provided
No query generated
Incorrect
5
0.00s
0.7382
o1-low
No answer provided
No query generated
Incorrect
5
0.00s
0.7519
o3-high
DisableLockWorkstation
// Registry value added / modified to disable the “Lock Workstation” option let TargetPath = @"\Software\Microsoft\Windows\CurrentVersion\Policies\System"; DeviceRegistryEvents | where ActionType in ("RegistryValueSet","RegistryValueModified","RegistryKeyValueSet") // HKCU path only (current user) | where RegistryKey startswith_cs "HKEY_CURRENT_USER" or RegistryKey startswith_cs "HKCU" | where RegistryKey has_cs TargetPath // Evidence that change came from a script / CLI tool | where InitiatingProcessFileName in~ ("reg.exe","powershell.exe","cmd.exe","regini.exe","regedit.exe") or InitiatingProcessCommandLine has_any ("reg add","New-ItemProperty","Set-ItemProperty") // Answer: which value name(s) were changed? | summarize LastWrite = arg_max(TimeGenerated, RegistryValueData, InitiatingProcessFileName, InitiatingProcessCommandLine, InitiatingProcessAccountName, RegistryKey) by RegistryValueName, DeviceName | project LastWrite, DeviceName, InitiatingProcessAccountName, InitiatingProcessFileName, InitiatingProcessCommandLine, RegistryKey, RegistryValueName, RegistryValueData | order by LastWrite desc
Correct
5
104.43s
0.0845
o3-mini-high
No answer provided
No query generated
Incorrect
5
0.00s
0.0324
o3-mini-low
DisableLockWorkstation
DeviceRegistryEvents | where RegistryKey has "Policies\\System" | where RegistryValueType has "DWORD" | where isnotempty(InitiatingProcessCommandLine) | distinct RegistryValueName
Correct
1
21.69s
0.0100
o4-mini-high
DisableLockWorkstation
DeviceRegistryEvents | where ActionType == "RegistryValueSet" // Only DWORD-type value changes | where RegistryValueType has "DWORD" // Target the current user Policies\System key (where DisableLockWorkstation is stored) | where RegistryKey has @"\Software\Microsoft\Windows\CurrentVersion\Policies\System" // Detect use of reg.exe (reg add) for the modification | where InitiatingProcessFileName has_cs "reg.exe" or InitiatingProcessCommandLine has_cs "reg add" // Return the registry value name and related context | project TimeGenerated, DeviceName, InitiatingProcessAccountName, InitiatingProcessCommandLine, RegistryKey, RegistryValueName, RegistryValueData | order by TimeGenerated desc
Correct
2
101.59s
0.0241
o4-mini-low
No answer provided
No query generated
Incorrect
5
0.00s
0.0390