This Metasploit module modifies a registry key, but cleans up the key once the payload has been invoked. The module does not require the architecture of the payload to match the OS.
cd1628d6088adebed1146b07de97a52f751b4685343a34fc4a0afdafa192d6a7
This exploit modifies a windows language registry key which causes some windows binaries to stick, including login which makes the session unusable. The key is in HKCU and can be modified without admin rights, but with a bypass UAC, all user sessions can be paralyzed by using reg.exe and user's NTUSER.DAT.
cebc8192e58860f9e56ac23e83917c52d657bce5533347a18906dba9296c9c96
This exploit permits an attacker to bypass UAC by hijacking a registry key during computerSecurity.exe (auto elevate windows binary) execution.
21b288f1176d274ff81831600b08bc360a27850b835d8b11afeb4c8176e4c76b