Jump to content
  • Advertisement
Sign in to follow this  

Edit/Delete Protected Registry Key Value

This topic is 2027 days old which is more than the 365 day threshold we allow for new replies. Please post a new topic.

If you intended to correct an error in the post then please contact us.

Recommended Posts

My question: Is it possible to edit a registry key's value when it was created using a custom security descriptor? Do I need to call RegSetKeyValueEx with a SECURITY_ATTRIBUTES structure? If not, then I would need to delete the key then recreate it.

I am attempting to edit(or delete then rewrite) a registry key value but its not working. Some important information is that I created the registry key with a custom Security Descriptor. The custom security descriptor only has the KEY_READ Registry Key Security and Access Rights set.

But I cant even delete the key because of its ACL security descriptor. This is a problem because when I uninstall I wont even be able to delete the registry key then either. The reason why I create the registry key with a custom security descriptor is so the user cant change it accidentally or on purpose. The key tells me if my application has run before.

Does anyone know how I can edit/delete a registry key of this type?

My code(that attempts to edit my key and shows how I created the key in the first place): 

    // Code to change key value
    LONG lResult = RegOpenKeyEx(HKEY_CURRENT_USER, _T("Software/MyApplication"), 0, KEY_READ, &hKey);
    LONG setValueRes = RegSetValueEx(hKey, _T("FirstRunSignafier"), 0, REG_DWORD, (LPBYTE) &firstRunSignafierValue,
                                     (DWORD) sizeof(firstRunSignafierValue));
    // Error Value of setValueRes is 5. lResult succeeds

    // Code that creates the registry key
    int  recordFirstApplicationRun()
        tstring REG_FIRST_RUN_SIGNIFIER = _T("Software\\MyApplication");
        HKEY hKey;
        LONG lResult;
        int      res                      = 1;
        DWORD dwValue, dwType, dwSize = sizeof(dwValue);
        DWORD firstRunSignafierValue  = 1;
        DWORD keyAlreadyExists;    // Two potential values: REG_CREATED_NEW_KEY or REG_OPENED_EXISTING_KEY
        PSID pEveryoneSID              = NULL;
        PACL pACL                      = NULL;
        createSecurityAttributes(&secAttr, pEveryoneSID, pACL, pSD);
                                        KEY_WRITE|KEY_WRITE, &secAttr, &hKey, &keyAlreadyExists);
        if (createRes != ERROR_SUCCESS) {
            //_tprintf(_T("Failed to create key: Last Error: %x, Return Val: %x\n"), GetLastError(), createRes);
            CPP_Utilities::outputLastError("Failed to create key");
            res = -1;
            goto Cleanup;
        //CPP_Utilities::outputLastErrorEx( (keyAlreadyExists == REG_CREATED_NEW_KEY) ? _T("Created new registry key"):_T("Registry key already exists") );
        _tprintf( (keyAlreadyExists == REG_CREATED_NEW_KEY) ? _T("Created new registry key\n"):_T("Registry key already exists\n") );
        // To Write a DWORD to the registry
        LONG setValueRes = RegSetValueEx(hKey, _T("FirstRunSignafier"), 0, REG_DWORD, (LPBYTE) &firstRunSignafierValue,
                                         (DWORD) sizeof(firstRunSignafierValue));
        if (setValueRes != ERROR_SUCCESS) {
            _tprintf(_T("B: %X\n"), setValueRes);
            CPP_Utilities::outputLastError("Failed to set registry value");
            res = -2;
            goto Cleanup;
            if (pEveryoneSID)
            if (pACL)
            if (pSD)
            if (hKey)
        return res;
    int createSecurityAttributes(SECURITY_ATTRIBUTES* secAttr, PSID pEveryoneSID, PACL pACL, PSECURITY_DESCRIPTOR pSD)
        // Pre:    Memory release for parameters MUST be handled by caller
        DWORD dwRes;
        /*PSID*/ pEveryoneSID                    = NULL;
        /*PACL*/ pACL                            = NULL;
        /*PSECURITY_DESCRIPTOR*/ pSD            = NULL;
        // Create a well-known SID for the Everyone group.
        if(!AllocateAndInitializeSid(&SIDAuthWorld, 1, SECURITY_WORLD_RID, 0, 0, 0, 0, 0, 0, 0, &pEveryoneSID)) {
            _tprintf(_T("AllocateAndInitializeSid Error %u\n"), GetLastError());
            CPP_Utilities::outputLastError("AllocateAndInitializeSid Error");
            return -1;
        // Initialize an EXPLICIT_ACCESS structure for an ACE. The ACE will allow Everyone read access to the key.
        ZeroMemory(&ea, sizeof(EXPLICIT_ACCESS));
        ea.grfAccessPermissions = KEY_READ;
        ea.grfAccessMode        = SET_ACCESS;
        ea.grfInheritance        = NO_INHERITANCE;
        ea.Trustee.TrusteeForm    = TRUSTEE_IS_SID;
        ea.Trustee.TrusteeType    = TRUSTEE_IS_WELL_KNOWN_GROUP;
        ea.Trustee.ptstrName    = (LPTSTR) pEveryoneSID;
        // Create a new ACL that contains the new ACEs.
        dwRes = SetEntriesInAcl(1, &ea, NULL, &pACL);
        if (ERROR_SUCCESS != dwRes) {
            _tprintf(_T("SetEntriesInAcl Error %u\n"), GetLastError());
            CPP_Utilities::outputLastError("SetEntriesInAcl Error");
            return -2;
        // Initialize a security descriptor.  
        if (NULL == pSD) {
            _tprintf(_T("LocalAlloc Error %u\n"), GetLastError());
            CPP_Utilities::outputLastError("LocalAlloc Error");
            return -3;
        if (!InitializeSecurityDescriptor(pSD, SECURITY_DESCRIPTOR_REVISION)) {  
            _tprintf(_T("InitializeSecurityDescriptor Error %u\n"), GetLastError());
            CPP_Utilities::outputLastError("InitializeSecurityDescriptor Error");
            return -4;
        // Add the ACL to the security descriptor.
        if (!SetSecurityDescriptorDacl(pSD, TRUE, pACL, FALSE)) {  
            _tprintf(_T("SetSecurityDescriptorDacl Error %u\n"), GetLastError());
            CPP_Utilities::outputLastError("SetSecurityDescriptorDacl Error");
            return -5;
        // Initialize a security attributes structure.
        secAttr->nLength                = sizeof (SECURITY_ATTRIBUTES);
        secAttr->lpSecurityDescriptor    = pSD;
        secAttr->bInheritHandle            = FALSE;
        return 1;

Share this post

Link to post
Share on other sites

The documentation you linked to describes exactly how to solve this. Enable the correct privileges and take ownership of the key, then modify it to your desires.


(Note that in general a user with sufficient rights can do the exact same thing, so don't rely too much on your notion that nobody will edit or modify the key!)

Share this post

Link to post
Share on other sites
Sign in to follow this  

  • Advertisement

Important Information

By using GameDev.net, you agree to our community Guidelines, Terms of Use, and Privacy Policy.

We are the game development community.

Whether you are an indie, hobbyist, AAA developer, or just trying to learn, GameDev.net is the place for you to learn, share, and connect with the games industry. Learn more About Us or sign up!

Sign me up!