
Registry modifications may also include actions to hide keys, such as prepending key names with a null character, which will cause an error and/or be ignored when read via Reg or other utilities using the Win32 API. Other tools may also be used, such as a remote access tool, which may contain functionality to interact with the Registry through the Windows API. The built-in Windows command-line utility Reg may be used for local or remote Registry modification. Adversaries may interact with the Windows Registry to hide configuration information within Registry keys, remove information as part of cleaning up, or as part of other techniques to aid in persistence and execution.Īccess to specific areas of the Registry depends on account permissions, some requiring administrator-level access.
