This exploit checks for incorrect permissions on several keys that may allow attackers to use a Trojan horse to capture usernames and passwords.
The Trojan Registry Keys List lists the registry keys that Internet Scanner checks for Trojan horses.