ComputerDefaults.exe

  • File Path: C:\windows\SysWOW64\ComputerDefaults.exe
  • Description: Set Program Access and Computer Defaults Control Panel

Screenshot

ComputerDefaults.exe

Hashes

Type Hash
MD5 1A506E36A76AD897490E77313CD3259A
SHA1 E734173B941DB9E1260B78FAB6BF21DAF55915B4
SHA256 2990059766F4118256B48DECFE2D586D469A219C1E5DDA038943C97BBFAA661D
SHA384 D97335966E1BB6A92D36F1FD153E7FE752E83253CA98FCE0D8A68A53B1E7212E5607472CDED04F06D0500094909C8AE0
SHA512 DDA7ABC50BE919FFF6E0133FA3C47DCCE92ED82109F3709A3EA79D37E028FC2F99656028367AFC8D19D0D86867A4F301B7946CCD1792824322C901E155350E33
SSDEEP 768:u7Q6e6JTWs2IkRDzsq4ytZZZL2YCX4ibRY:u75fBURDoq4OZZZLlCIibR

Signature

  • Status: The file C:\windows\SysWOW64\ComputerDefaults.exe is not digitally signed. You cannot run this script on the current system. For more information about running scripts and setting execution policy, see about_Execution_Policies at http://go.microsoft.com/fwlink/?LinkID=135170
  • Serial: ``
  • Thumbprint: ``
  • Issuer:
  • Subject:

File Metadata

  • Original Filename: ComputerDefaults.EXE.MUI
  • Product Name: Microsoft Windows Operating System
  • Company Name: Microsoft Corporation
  • File Version: 6.3.9600.16384 (winblue_rtm.130821-1623)
  • Product Version: 6.3.9600.16384
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.

File Similarity (ssdeep match)

File Score
C:\Windows\system32\ComputerDefaults.exe 65
C:\WINDOWS\system32\ComputerDefaults.exe 50
C:\Windows\system32\ComputerDefaults.exe 54
C:\windows\system32\ComputerDefaults.exe 82
C:\Windows\system32\ComputerDefaults.exe 55
C:\Windows\system32\xwizard.exe 57
C:\windows\system32\xwizard.exe 58
C:\Windows\system32\xwizard.exe 49
C:\WINDOWS\system32\xwizard.exe 50
C:\Windows\system32\xwizard.exe 55
C:\WINDOWS\SysWOW64\ComputerDefaults.exe 55
C:\Windows\SysWOW64\ComputerDefaults.exe 71
C:\Windows\SysWOW64\ComputerDefaults.exe 57
C:\Windows\SysWOW64\ComputerDefaults.exe 52
C:\Windows\SysWOW64\xwizard.exe 63
C:\Windows\SysWOW64\xwizard.exe 57
C:\windows\SysWOW64\xwizard.exe 66
C:\Windows\SysWOW64\xwizard.exe 60
C:\WINDOWS\SysWOW64\xwizard.exe 60

Possible Misuse

The following table contains possible examples of ComputerDefaults.exe being misused. While ComputerDefaults.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
atomic-red-team index.md - Atomic Test #5: Bypass UAC using ComputerDefaults (PowerShell) [windows] MIT License. © 2018 Red Canary
atomic-red-team windows-index.md - Atomic Test #5: Bypass UAC using ComputerDefaults (PowerShell) [windows] MIT License. © 2018 Red Canary
atomic-red-team T1548.002.md - Atomic Test #5 - Bypass UAC using ComputerDefaults (PowerShell) MIT License. © 2018 Red Canary
atomic-red-team T1548.002.md ## Atomic Test #5 - Bypass UAC using ComputerDefaults (PowerShell) MIT License. © 2018 Red Canary
atomic-red-team T1548.002.md PowerShell code to bypass User Account Control using ComputerDefaults.exe on Windows 10 MIT License. © 2018 Red Canary
atomic-red-team T1548.002.md Start-Process “C:\Windows\System32\ComputerDefaults.exe” MIT License. © 2018 Red Canary

MIT License. Copyright (c) 2020-2021 Strontic.