~/Privilege Escalation/Windows/Binaries# cat Reg.exe.md

Used to manipulate the registry

Paths:

C:\Windows\System32\reg.exe
C:\Windows\SysWOW64\reg.exe

Detection: reg.exe writing to an ADS

Alternate data streams

Export the target Registry key and save it to the specified .REG file within an Alternate data stream.

reg export HKLM\SOFTWARE\Microsoft\Evilreg c:\ads\file.txt:evilreg.reg