Critical Key Permissions

This exploit checks several registry keys to determine if they are writable by non-Administrators. These keys can lead to unauthorized access by attackers.

To add key permissions, click Add. To remove key permissions, click Remove. To remove all key permissions, click Remove All.