{"id":6338,"date":"2017-01-23T15:50:26","date_gmt":"2017-01-23T23:50:26","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-176\/"},"modified":"2017-01-23T15:50:26","modified_gmt":"2017-01-23T23:50:26","slug":"news-176","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-176\/","title":{"rendered":"MSRT November 2016: Unwanted software has nowhere to hide in this month\u2019s release"},"content":{"rendered":"<p>We came across a <span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/mmpc\/shared\/glossary.aspx#browser_modifier\">browser modifier<\/a><\/span> that sports <span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/mmpc\/shared\/glossary.aspx#rootkit\">rootkit<\/a><\/span> capabilities. Not only does the threat, detected as <span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\">BrowserModifier:Win32\/Soctuseer<\/a><\/span>, cross the line that separates legitimate software from <span><a target=\"_blank\" href=\"http:\/\/mpecms\/kb\/KBDocument\/GetFile?id=13510\">unwanted<\/a><\/span>, it also takes staying under the radar to the next level.<\/p>\n<p>Rootkit capabilities, which make it difficult to detect and remove applications, are usually associated with <span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/mmpc\/shared\/glossary.aspx#malware\">malware<\/a><\/span>. Yet <span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\">Soctuseer<\/a><\/span> uses rootkit capabilities to conceal its presence on a computer, ultimately making it difficult for affected users to control their device and browsing experience.<\/p>\n<p>Apart from hiding its presence, <span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\">Soctuseer<\/a><\/span> installs itself without using your browser\u2019s supported extensibility model for installation. And, once installed and running, it takes away the control you should have about how it operates. You can&#8217;t enable or disable it from your browser settings. The result is that you can be served webpage content that is modified without your consent.<\/p>\n<p>No matter how it attempts to hide, though, most <span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\">Soctuseer<\/a><\/span> installations and system modifications will be uncovered and removed by the <span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/download\/malicious-software-removal-tool-details.aspx\">Microsoft Malicious Software Removal Tool<\/a><\/span> (MSRT). We\u2019re adding detections for <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\">BrowserModifier:Win32\/Soctuseer<\/a> in this month\u2019s MSRT release, helping to lessen interference to your browsing experience.<\/p>\n<p>&nbsp;<\/p>\n<h2><span>More than a million machines infected<\/span><\/h2>\n<p>Just like most browser modifiers, <span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\">Soctuseer<\/a><\/span> is distributed by <span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/portal\/mmpc\/shared\/glossary.aspx#software_bundler\">software bundlers<\/a><\/span>. We have seen Soctuseer brought along by other unwanted software that we detect as <span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=SoftwareBundler:Win32\/InstallMonster\">SoftwareBundler:Win32\/InstallMonster<\/a><\/span> and <span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=SoftwareBundler:Win32\/Techrelinst\">SoftwareBundler:Win32\/Techrelinst<\/a><\/span>.<\/p>\n<p>Since September 2016, we have seen over 1.2 million infected machines, 40% of which are in the US, Indonesia, and India.<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/MSRTnov1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"732\" class=\"alignnone size-large wp-image-9245\" alt=\"Map showing location of observed Soctuseer infections. The United States, Indonesia and India account for 40% of infections\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/MSRTnov1-1024x732.png\" \/><\/a><\/p>\n<p><em>Figure 1: Map showing location of observed <\/em><span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\"><em>Soctuseer<\/em><\/a><\/span><em> infections. The United States, Indonesia and India account for 40% of infections.<\/em><\/p>\n<p><em>\u00a0<\/em><\/p>\n<h2><span>Ads for discounted products tailored to your search activities<\/span><\/h2>\n<p><span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\">Soctuseer<\/a><\/span>\u2019s main objective is to display advertisements while you browse the internet. It pops up ads based on searches you make on specific websites. For example, if you were searching for \u201claptop\u201d on your favorite online retailer, <span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\">Soctuseer<\/a><\/span> pops up ads for other sites offering laptops, supposedly at discounted rates. The ads have the attribute name \u201cSocial2Search\u201d.<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/MSRTnov2.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"609\" class=\"alignnone size-large wp-image-9255\" alt=\"Screenshot of Social2Search ads for \u201cred shoes\u201d on Microsoft Edge\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/MSRTnov2-1024x609.jpg\" \/><\/a><\/p>\n<p><em>Figure 2: Social2Search ads for \u201cred shoes\u201d on Microsoft Edge<\/em><\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/MSRTnov3.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"647\" class=\"alignnone size-large wp-image-9265\" alt=\"Screenshot of Social2Search ads for a \u201claptop\u201d on Internet Explorer\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/MSRTnov3-1024x647.jpg\" \/><\/a><\/p>\n<p><em>Figure 3: Social2Search ads for a \u201claptop\u201d on Internet Explorer<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\">Soctuseer<\/a><\/span> uses the following methods to display ads:<\/p>\n<ul>\n<li>Installing a NetFilter driver<\/li>\n<li>Injecting a DLL directly to the browser&#8217;s process<\/li>\n<\/ul>\n<p>Both methods meet the <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/portal\/mmpc\/shared\/objectivecriteria.aspx\">evaluation criteria<\/a> that Microsoft Malware Protection Center (MMPC) uses for identifying unwanted software. MMPC categorizes as unwanted software any program that changes the browsing experience without using the browsers\u2019 supported extensibility models. The <a target=\"_blank\" href=\"https:\/\/developer.microsoft.com\/en-us\/microsoft-edge\/platform\/documentation\/extensions\/microsoft-browser-extension-policy\/\">Microsoft browser extension policy<\/a> states: &#8220;Programs should use the supported mechanisms for extending or modifying the behavior or user experience of Microsoft Edge and Internet Explorer, or the content displayed by these browsers. These supported extension mechanisms are designed to ensure that users are able to customize and extend their browser with software of their choice, while maintaining safe and uninterrupted use of their browser and PC.&#8221;<\/p>\n<h2><span>System changes made by Soctuseer are reversed by MSRT<\/span><\/h2>\n<p><strong>Folder and files<\/strong><\/p>\n<p><span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\">Soctuseer<\/a><\/span> creates a random 32-digit hexadecimal subfolder under the Program Files folder. It then adds all its files in the subfolder. All the files follow the same 32-digit hexadecimal format.<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/MSRTnov4.jpg.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1012\" height=\"542\" class=\"alignnone wp-image-9325 size-full\" alt=\"Folder and files created by Soctuseer follow the same 32-digit hexadecimal format\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/MSRTnov4.jpg.png\" \/><\/a><\/p>\n<p><em>Figure 4: Folder and files created by <\/em><span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\"><em>Soctuseer<\/em><\/a><\/span><em> follow the same 32-digit hexadecimal format<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Rootkit<\/strong><\/p>\n<p>Some <span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\">Soctuseer<\/a><\/span> versions have rootkit capabilities, which is not very common in browser modifiers. These versions install a driver that limits access to its files. Only the following processes, which are related to certain system files, web browsers, and its own uninstaller, can access its files, effectively hiding <span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\">Soctuseer<\/a><\/span>\u2019s files from any other process not on this list:<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/MSRTnov51.png\"><img loading=\"lazy\" decoding=\"async\" width=\"420\" height=\"348\" class=\"alignnone wp-image-9226 size-full\" alt=\"Only the processes on this list have access to Soctuseer\u2019s files \" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/MSRTnov51.png\" \/><\/a><\/p>\n<p><em>Figure 5: Only the processes on this list have access to <\/em><span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\"><em>Soctuseer<\/em><\/a><\/span><em>\u2019s files <\/em><\/p>\n<p>To demonstrate this, the following screenshot shows two command prompt windows. The window on the left is the normal cmd.exe, while the one on the right shows what happens when you rename cmd.exe to one of the process names above (for example, browser.exe):<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/MSRTnov61.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"259\" class=\"alignnone size-large wp-image-9335\" alt=\"Modifying the file name of a command prompt to one of the process names above allows you to access the folder and list the files inside it\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/MSRTnov61-1024x259.png\" \/><\/a><\/p>\n<p><em>Figure 6: Modifying the file name of a command prompt to one of the process names above allows you to access the folder and list the files inside it<\/em><\/p>\n<p><strong>Service<\/strong><\/p>\n<p><span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\">Soctuseer<\/a><\/span> creates a service that automatically executes at system startup. The service uses a randomly generated name in 32-digit hexadecimal format, but always uses \u201cEnhances experience when browsing the web\u201d as the description:<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/MSRTnov71.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"358\" class=\"alignnone wp-image-9236 size-large\" alt=\"Screenshot showing Soctuseer\u2019s service name also uses the 32-digit hexadecimal format\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/MSRTnov71-1024x358.png\" \/><\/a><\/p>\n<p><em>Figure 7: <\/em><span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\"><em>Soctuseer<\/em><\/a><\/span><em>\u2019s service name also uses the 32-digit hexadecimal format<\/em><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Scheduled Task<\/strong><\/p>\n<p>Some versions of <span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\">Soctuseer<\/a><\/span> also install an updater component that runs in a scheduled task. The updater is a PowerShell script that checks and downloads updates, if available. It also uses the same 32-digit hexadecimal format for the task name. The task file is located in the Windows folder (usually C:Windows),<\/p>\n<p>In this example, the scheduled task runs every 20 minutes:<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/MSRTnov8.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"444\" class=\"alignnone size-large wp-image-9345\" alt=\"Screenshot showing that Soctuseer also creates a Scheduled Task to download updates\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/MSRTnov8-1024x444.png\" \/><\/a><\/p>\n<p><em>Figure 8: <\/em><span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\"><em>Soctuseer<\/em><\/a><\/span><em> also creates a Scheduled Task to download updates<\/em><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Start Menu shortcuts<\/strong><\/p>\n<p><span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\">Soctuseer<\/a><\/span> adds various shortcuts to the user&#8217;s Start Menu.<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/MSRTnov9.png\"><img loading=\"lazy\" decoding=\"async\" width=\"405\" height=\"464\" class=\"alignnone size-full wp-image-9355\" alt=\"Example of shortcuts created by Soctuseer in Start Menu\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/MSRTnov9.png\" \/><\/a><\/p>\n<p><em>Figure 9: Example of shortcuts created by <\/em><span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\"><em>Soctuseer<\/em><\/a><\/span><em> in Start Menu<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Uninstall entry<\/strong><\/p>\n<p>Interestingly, <span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\">Soctuseer<\/a><\/span> adds an uninstall entry using the name \u201cSocial2Search\u201d.<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/MSRTnov10.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1012\" height=\"542\" class=\"alignnone size-full wp-image-9365\" alt=\"Screenshot that shows Soctuseer\u2019s uninstallation entry with the name \u201cSearch2Search\u201d\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/MSRTnov10.png\" \/><\/a><\/p>\n<p><em>Figure 10: <\/em><span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=BrowserModifier:Win32\/Soctuseer\"><em>Soctuseer<\/em><\/a><\/span><em>\u2019s uninstall entry with the name \u201cSearch2Search\u201d<\/em><\/p>\n<p>&nbsp;<\/p>\n<h2><span>Prevention, detection, and recovery<\/span><\/h2>\n<p>To help stay protected:<\/p>\n<ul>\n<li>Keep your Windows Operating System and antivirus <a target=\"_blank\" href=\"http:\/\/www.microsoft.com\/security\/portal\/mmpc\/help\/updatesoftware.aspx\">up-to-date<\/a> and, if you haven\u2019t already, upgrade to <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/windows\/windows-10-upgrade\">Windows 10<\/a>.<\/li>\n<li><a target=\"_blank\" href=\"https:\/\/blogs.windows.com\/msedgedev\/2015\/12\/16\/smartscreen-drive-by-improvements\/\">Use Microsoft Edge<\/a>. It can:\n<ul>\n<li>Help warn you about sites that are known to be hosting exploits<\/li>\n<li>Help protect you from socially-engineered attacks such as phishing and malware downloads<\/li>\n<li>Automatically detect bad changes and protects settings<\/li>\n<\/ul>\n<\/li>\n<li>Use the <strong>Settings<\/strong> app to reset to Microsoft recommended defaults if your default apps were changed.\n<ul>\n<li>Launch the Settings app.<\/li>\n<li>Navigate to the <strong>Default apps<\/strong> page<u>.<\/u>\n<ul>\n<li>From Home go to <strong>System <\/strong>&gt;<strong> Default apps<\/strong>.<\/li>\n<li>Click <strong>Reset<\/strong>.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>Avoid browsing web sites that are likely to host malware (such as illegal music, movies and TV, and pirated software download sites)<\/li>\n<li>Ensure your antimalware protection (such as <a target=\"_blank\" href=\"http:\/\/windows.microsoft.com\/en-us\/windows\/using-defender#1TC=windows-10\">Windows Defender<\/a> and <a target=\"_blank\" href=\"http:\/\/www.microsoft.com\/en-us\/download\/malicious-software-removal-tool-details.aspx\">Microsoft Malicious Software Removal Tool<\/a>) is up-to-date.\n<ul>\n<li>If you are using Windows Defender, you can check your exclusion settings to see whether the malware added some entries in an attempt to exclude folders from being scanned.\n<ul>\n<li>To check and remove excluded items in Windows Defender:\n<ol>\n<li>Navigate to <strong>Settings<\/strong> &gt; <strong>Update &amp; security<\/strong> &gt; <strong>Windows Defender<\/strong> &gt; <strong>Add an exclusion<\/strong>.<\/li>\n<li>Go through the lists under <strong>Files<\/strong> and <strong>File locations,<\/strong> select the excluded item that you want to remove, and click <strong>Remove<\/strong>.<\/li>\n<li>Click <strong>OK<\/strong> to confirm.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>Use cloud protection to help guard against the latest malware threats. It\u2019s turned on by default for Microsoft Security Essentials and Windows Defender for Windows 10. Go to <strong>All settings<\/strong> &gt; <strong>Update &amp; security<\/strong> &gt; <strong>Windows Defender<\/strong> and make sure that your <strong>Cloud-based Protection<\/strong> settings is turned <strong>On<\/strong>.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><span>Related information<\/span><\/h2>\n<p>See\u00a0<span><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/security\/portal\/mmpc\/shared\/objectivecriteria.aspx\">How Microsoft antimalware products identify malware: unwanted software and malicious software<\/a><\/span> for the objective criteria details.<\/p>\n<p>For additional information about what Browser Extensibility Models are, and why we require programs to use them, see the following pages:<\/p>\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/04\/21\/a-brief-discourse-on-changing-browsing-experience\/\">A brief discourse on Changing browsing experience<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/03\/23\/keeping-browsing-experience-update\/\">Keeping Browsing Experience in Users\u2019 Hands, an Update\u2026<\/a><u>\u00a0<\/u><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/msdn.microsoft.com\/library\/aa753587\">Internet Explorer Browser Extensions<\/a><\/li>\n<\/ul>\n<p><span><em>\u00a0<\/em><\/span><\/p>\n<p><span><em>James Patrick Dee<\/em><\/span><\/p>\n<p><span><em>MMPC<\/em><\/span><\/p>\n<p><a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/11\/08\/msrt-november-2016-unwanted-software-has-nowhere-to-hide-in-this-months-release\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We came across a browser modifier that sports rootkit capabilities. Not only does the threat, detected as BrowserModifier:Win32\/Soctuseer, cross the line that separates legitimate software from unwanted, it also takes staying under the radar to the next level. Rootkit capabilities, which make it difficult to detect and remove applications, are usually associated with malware. Yet&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[10760,10996,10997,10998,10999,11000,11001,10700,10785,10786,10767,11002,11003,11004,11005,10936,11006,11007,10768,10762,10976],"class_list":["post-6338","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-antimalware-research-for-it-pros-and-enthusiasts","tag-browser-modifier-with-rootkit-capabilities","tag-browsermodifierwin32soctuseer","tag-installmonster","tag-internet-explorer-browser-extensions","tag-keeping-browsing-experience-in-users-hands","tag-microsoft-browser-extension-policy","tag-microsoft-edge","tag-microsoft-malicious-software-removal-tool","tag-msrt","tag-objective-criteria","tag-rootkit","tag-social2search","tag-soctuseer","tag-software-bundlers","tag-softwarebundlerwin32installmonster","tag-softwarebundlerwin32techrelinst","tag-techrelinst","tag-unwanted-software","tag-windows-defender","tag-windows-defender-in-windows-10"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6338"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6338\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6338"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}