File name:

voukoder-13.3.msi

Full analysis: https://app.any.run/tasks/5f9014db-51de-4df8-ae84-aa5cb391a811
Verdict: Malicious activity
Analysis date: January 25, 2025, 11:29:20
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
generated-doc
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Installs the Voukoder component, Author: Daniel Stankewitz, Keywords: Installer, Comments: This installer database contains the logic and data required to install Voukoder 13.3., Template: x64;1033, Revision Number: {BF45683A-1A97-47B8-8848-2DE1E7FFBFA0}, Create Time/Date: Sun Oct 29 12:20:02 2023, Last Saved Time/Date: Sun Oct 29 12:20:02 2023, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
MD5:

1FC7C5B3FC6056FC39AB515C81C1A3F2

SHA1:

92D5C0F003762DAF0C698201F25053B0D39A3371

SHA256:

60EB7E109A5167D0E759D27DCF6C447F911CCD91718BCD8F15B0C4073100FA51

SSDEEP:

98304:UnU0tfeQkVhD2Fs+NuFZlg/z11NAfW2GNjjsxpHDkDnEGmY+SaZDNQCTwlr+S38r:UUqoT5RYYly5S9MNAHVdczQjL9awGU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executes as Windows Service

      • VSSVC.exe (PID: 6380)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 6932)
    • Process drops legitimate windows executable

      • msiexec.exe (PID: 6932)
    • Checks Windows Trust Settings

      • msiexec.exe (PID: 6932)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 6932)
    • Creates/Modifies COM task schedule object

      • msiexec.exe (PID: 6932)
  • INFO

    • Checks proxy server information

      • msiexec.exe (PID: 6768)
    • Reads the software policy settings

      • msiexec.exe (PID: 6768)
      • msiexec.exe (PID: 6932)
    • Reads the computer name

      • msiexec.exe (PID: 6240)
      • msiexec.exe (PID: 6932)
    • Checks supported languages

      • msiexec.exe (PID: 6240)
      • msiexec.exe (PID: 6932)
    • Reads the machine GUID from the registry

      • msiexec.exe (PID: 6932)
    • The sample compiled with english language support

      • msiexec.exe (PID: 6932)
      • msiexec.exe (PID: 6768)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 6932)
      • msiexec.exe (PID: 6768)
    • Manages system restore points

      • SrTasks.exe (PID: 5788)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 6932)
    • Manual execution by a user

      • mspaint.exe (PID: 1864)
      • WINWORD.EXE (PID: 6088)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 6768)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 6768)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (98.5)
.msi | Microsoft Installer (100)

EXIF

FlashPix

CodePage: Windows Latin 1 (Western European)
Title: Installation Database
Subject: Installs the Voukoder component
Author: Daniel Stankewitz
Keywords: Installer
Comments: This installer database contains the logic and data required to install Voukoder 13.3.
Template: x64;1033
RevisionNumber: {BF45683A-1A97-47B8-8848-2DE1E7FFBFA0}
CreateDate: 2023:10:29 12:20:02
ModifyDate: 2023:10:29 12:20:02
Pages: 301
Words: 2
Software: Windows Installer XML Toolset (3.11.2.4516)
Security: Read-only recommended
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
9
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msiexec.exe msiexec.exe msiexec.exe no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs mspaint.exe no specs winword.exe ai.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1864"C:\WINDOWS\system32\mspaint.exe" "C:\Users\admin\Desktop\guestevidence.png"C:\Windows\System32\mspaint.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Paint
Exit code:
0
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mspaint.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\acgenral.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
3832"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "FC22C10C-1BC3-4726-AE5F-17B58115F490" "65B9A607-C200-4664-8753-4830FFE19286" "6088"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64.
Version:
0.12.2.0
Modules
Images
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\office16\ai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4548\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5788C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11C:\Windows\System32\SrTasks.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Windows System Protection background tasks.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6088"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\admin\Desktop\networksbeginning.rtf" /o ""C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\rpcrt4.dll
6240C:\Windows\syswow64\MsiExec.exe -Embedding 3ED597ADC43CB83C443A4E2BC14689B2 CC:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
6380C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6768"C:\Windows\System32\msiexec.exe" /i C:\Users\admin\AppData\Local\Temp\voukoder-13.3.msiC:\Windows\System32\msiexec.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
6932C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
17 881
Read events
17 225
Write events
622
Delete events
34

Modification events

(PID) Process:(6932) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
48000000000000007D1029731C6FDB01141B00007C180000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6932) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
48000000000000007D1029731C6FDB01141B00007C180000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6932) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
4800000000000000CC9170731C6FDB01141B00007C180000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6932) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Leave)
Value:
4800000000000000672E6E731C6FDB01141B00007C180000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6932) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
4800000000000000672E6E731C6FDB01141B00007C180000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6932) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
48000000000000005BBC77731C6FDB01141B00007C180000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6932) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
11
(PID) Process:(6380) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer
Operation:writeName:IDENTIFY (Leave)
Value:
48000000000000000D0A02741C6FDB01EC18000010190000E80300000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6932) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
4800000000000000B998EC731C6FDB01141B00007C180000D30700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6932) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000AAFCEE731C6FDB01141B000000190000E80300000100000000000000000000009CE90639361883459FBBC1CF2FE7C6D300000000000000000000000000000000
Executable files
11
Suspicious files
36
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
6932msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
6932msiexec.exeC:\Windows\Installer\13e959.msi
MD5:
SHA256:
6932msiexec.exeC:\Program Files\Voukoder\voukoder.dll
MD5:
SHA256:
6768msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\54C62B182F5BF07FA8427C07B0A3AAF8_4DBBCB40FA282C06F1543D887F4F4DCCbinary
MD5:B800D2749C9A0FBE3B14F7091FFE1F8C
SHA256:EAA27E3E118208C3FD669C38DBE0A6D3C8BD81D4C6D8499FC62BE75E7183577B
6932msiexec.exeC:\System Volume Information\SPP\OnlineMetadataCache\{3906e99c-1836-4583-9fbb-c1cf2fe7c6d3}_OnDiskSnapshotPropbinary
MD5:7514CC14D538D1270E9596FDDCF3B292
SHA256:20F88C176D37C0B582243E7031994AD960FECB0464171C9CA6D0A3F7E2DD0D5C
6932msiexec.exeC:\Windows\Installer\13e95b.msi
MD5:
SHA256:
6932msiexec.exeC:\Windows\Installer\MSIF4B4.tmpbinary
MD5:AB910044224FAA15887CACA5B73EF678
SHA256:419ADAB0F579C38FA8C6092BE5DAB9E80B8EC2CB0D259BBE8BC5ED18D588C85A
6932msiexec.exeC:\Windows\Installer\$PatchCache$\Managed\1DB554972779E9D4FAFB55BC7E6DFAE1\13.3.0\concrt140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3executable
MD5:57734F3144566911588DCA572928E47D
SHA256:C1856587ADECCBA6FF8241F46DC180F23ABA6F4DCBDFC62805A4431D2E62B5C6
6932msiexec.exeC:\Windows\Installer\$PatchCache$\Managed\1DB554972779E9D4FAFB55BC7E6DFAE1\13.3.0\msvcp140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3executable
MD5:9AEACFD60C19FDB1AF926ECF7E6EAB87
SHA256:7BB664A486E941D0F6004EF1EB48773C7C5F1BE5F1CBF1AA5F9819A215863D5D
6932msiexec.exeC:\Windows\Installer\$PatchCache$\Managed\1DB554972779E9D4FAFB55BC7E6DFAE1\13.3.0\msvcp140_codecvt_ids.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3executable
MD5:D2E447C1D7804DA425370DDD09296A72
SHA256:A6642A0657DBA55570E272D20788BC5ECE4D49535B4F0C4DE1F97602F0B13EEB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
43
DNS requests
27
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6768
msiexec.exe
GET
200
18.244.18.54:80
http://crls.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.crl
unknown
whitelisted
6708
SIHClient.exe
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6768
msiexec.exe
GET
200
18.173.205.76:80
http://ocsps.ssl.com/MEkwRzBFMEMwQTAJBgUrDgMCGgUABBQMDtATfnJO6JAXDQoHl8pAaJdhTQQU3QQJB6L1en1SUxKSle44gCUNplkCCGQzUdPHOJ8I
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6088
WINWORD.EXE
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6708
SIHClient.exe
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.37.237.227:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
23.37.237.227:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2.16.204.138:443
www.bing.com
Akamai International B.V.
DE
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
40.126.31.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1076
svchost.exe
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 23.37.237.227
whitelisted
google.com
  • 142.250.184.206
whitelisted
www.bing.com
  • 2.16.204.138
  • 2.16.204.150
  • 2.16.204.146
  • 2.16.204.134
  • 2.16.204.155
  • 2.16.204.135
whitelisted
ocsp.digicert.com
  • 2.17.190.73
  • 2.23.77.188
whitelisted
login.live.com
  • 40.126.31.73
  • 20.190.159.71
  • 40.126.31.71
  • 20.190.159.73
  • 20.190.159.0
  • 20.190.159.2
  • 20.190.159.4
  • 20.190.159.64
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
ocsps.ssl.com
  • 18.173.205.76
  • 18.173.205.43
  • 18.173.205.113
  • 18.173.205.57
whitelisted
crls.ssl.com
  • 18.244.18.54
  • 18.244.18.60
  • 18.244.18.92
  • 18.244.18.55
whitelisted

Threats

No threats detected
Process
Message
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.