File name:

install-roxplayer.msi

Full analysis: https://app.any.run/tasks/ed982e48-b138-4d2f-8cf2-8c4c5d06dd7b
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: September 08, 2018, 23:04:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
generated-doc
loader
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Title: Installation Database, Keywords: Installer, MSI, Database, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Dec 11 11:47:44 2009, Number of Pages: 200, Security: 0, Code page: 1252, Revision Number: {AE2EFA33-057A-4EC9-BA4C-5BDE83718529}, Number of Words: 10, Subject: ROX Player, Author: RoxPlayer, Name of Creating Application: Advanced Installer 10.0 build 50412, Template: ;1033, Comments: This installer database contains the logic and data required to install ROX Player.
MD5:

E832B5BC5B5EE9131447548C6418DA04

SHA1:

F9E36D0BC85FE2C2C98CC55878804F509F635587

SHA256:

66CD8D8CBD9D54943BEAFCCEEC3130F12AAC127386AE31C8D679F5CF1275E005

SSDEEP:

24576:QXZAvkYw32DExtE3epqs1VNDSwEF/H+jK++7y+KT4Cf:QXZAvkYw3g6tC4XNDSwEF/H+jKfm+KUm

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • aipackagechainer.exe (PID: 2704)
    • Application was dropped or rewritten from another process

      • aipackagechainer.exe (PID: 2704)
      • install-roxplayer.exe (PID: 3856)
      • install-roxplayer.exe (PID: 2280)
      • roxplayer.exe (PID: 3588)
      • roxplayer.exe (PID: 2488)
    • Loads dropped or rewritten executable

      • roxplayer.exe (PID: 3588)
      • roxplayer.exe (PID: 2488)
    • Downloads executable files from the Internet

      • MsiExec.exe (PID: 3704)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • install-roxplayer.exe (PID: 2280)
      • msiexec.exe (PID: 424)
      • install-roxplayer.exe (PID: 3856)
      • MsiExec.exe (PID: 3704)
      • install-roxplayer.tmp (PID: 2812)
    • Reads the Windows organization settings

      • install-roxplayer.tmp (PID: 2812)
    • Creates files in the user directory

      • MsiExec.exe (PID: 3704)
      • install-roxplayer.tmp (PID: 2812)
      • roxplayer.exe (PID: 2488)
    • Reads Windows owner settings

      • install-roxplayer.tmp (PID: 2812)
    • Modifies the open verb of a shell class

      • install-roxplayer.tmp (PID: 2812)
    • Low-level read access rights to disk partition

      • roxplayer.exe (PID: 3588)
    • Starts CMD.EXE for commands execution

      • aipackagechainer.exe (PID: 2704)
      • cmd.exe (PID: 3432)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 3432)
    • Uses NETSH.EXE for network configuration

      • install-roxplayer.tmp (PID: 2812)
    • Starts Internet Explorer

      • roxplayer.exe (PID: 3588)
  • INFO

    • Application launched itself

      • msiexec.exe (PID: 424)
      • iexplore.exe (PID: 3696)
    • Loads dropped or rewritten executable

      • install-roxplayer.tmp (PID: 2812)
    • Application was dropped or rewritten from another process

      • install-roxplayer.tmp (PID: 1064)
      • install-roxplayer.tmp (PID: 2812)
    • Dropped object may contain Bitcoin addresses

      • install-roxplayer.tmp (PID: 2812)
    • Creates files in the program directory

      • install-roxplayer.tmp (PID: 2812)
    • Changes internet zones settings

      • iexplore.exe (PID: 3696)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2312)
    • Creates files in the user directory

      • iexplore.exe (PID: 2312)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2312)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2312)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2312)
    • Creates a software uninstall entry

      • install-roxplayer.tmp (PID: 2812)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2312)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (88.6)
.mst | Windows SDK Setup Transform Script (10)
.msi | Microsoft Installer (100)

EXIF

FlashPix

Title: Installation Database
Keywords: Installer, MSI, Database
LastPrinted: 2009:12:11 11:47:44
CreateDate: 2009:12:11 11:47:44
ModifyDate: 2009:12:11 11:47:44
Pages: 200
Security: None
CodePage: Windows Latin 1 (Western European)
RevisionNumber: {AE2EFA33-057A-4EC9-BA4C-5BDE83718529}
Words: 10
Subject: ROX Player
Author: RoxPlayer
LastModifiedBy: -
Software: Advanced Installer 10.0 build 50412
Template: ;1033
Comments: This installer database contains the logic and data required to install ROX Player.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
60
Monitored processes
20
Malicious processes
7
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start msiexec.exe no specs msiexec.exe msiexec.exe aipackagechainer.exe install-roxplayer.exe install-roxplayer.tmp no specs install-roxplayer.exe install-roxplayer.tmp netsh.exe no specs netsh.exe no specs roxplayer.exe no specs iexplore.exe iexplore.exe roxplayer.exe cmd.exe no specs attrib.exe no specs attrib.exe no specs cmd.exe no specs cmd.exe no specs rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
424C:\Windows\system32\msiexec.exe /VC:\Windows\system32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1064"C:\Users\admin\AppData\Local\Temp\is-JBR6E.tmp\install-roxplayer.tmp" /SL5="$500130,18673267,174080,C:\Users\admin\AppData\Roaming\RoxTemp\RoxPlayer_1\install-roxplayer.exe" -filename "C:\Users\admin\AppData\Local\Temp\install-roxplayer.msi"C:\Users\admin\AppData\Local\Temp\is-JBR6E.tmp\install-roxplayer.tmpinstall-roxplayer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-jbr6e.tmp\install-roxplayer.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2280"C:\Users\admin\AppData\Roaming\RoxTemp\RoxPlayer_1\install-roxplayer.exe" -filename "C:\Users\admin\AppData\Local\Temp\install-roxplayer.msi"C:\Users\admin\AppData\Roaming\RoxTemp\RoxPlayer_1\install-roxplayer.exe
aipackagechainer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
ROX Player Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\roaming\roxtemp\roxplayer_1\install-roxplayer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2312"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3696 CREDAT:79873C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2404"netsh.exe" advfirewall firewall add allowedprogram "C:\Users\admin\AppData\Local\ROX Player\roxplayer.exe" "ROX Player" ENABLE ALLC:\Windows\system32\netsh.exeinstall-roxplayer.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2488"C:\Users\admin\AppData\Local\ROX Player\roxplayer.exe"C:\Users\admin\AppData\Local\ROX Player\roxplayer.exe
install-roxplayer.tmp
User:
admin
Company:
PS Pay Solutions UG
Integrity Level:
MEDIUM
Description:
ROX Player
Exit code:
0
Version:
1.4.7.0
Modules
Images
c:\users\admin\appdata\local\rox player\roxplayer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\rox player\libtsplayer.dll
c:\users\admin\appdata\local\rox player\libtsplayercore.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2704"C:\Users\admin\AppData\Roaming\RoxTemp\aipackagechainer.exe"C:\Users\admin\AppData\Roaming\RoxTemp\aipackagechainer.exe
msiexec.exe
User:
admin
Company:
RoxPlayer
Integrity Level:
MEDIUM
Description:
This installer database contains the logic and data required to install ROX Player.
Exit code:
0
Version:
1.000
Modules
Images
c:\users\admin\appdata\roaming\roxtemp\aipackagechainer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
2812"C:\Users\admin\AppData\Local\Temp\is-IHKNI.tmp\install-roxplayer.tmp" /SL5="$3E010E,18673267,174080,C:\Users\admin\AppData\Roaming\RoxTemp\RoxPlayer_1\install-roxplayer.exe" /SPAWNWND=$1A0212 /NOTIFYWND=$500130 -filename "C:\Users\admin\AppData\Local\Temp\install-roxplayer.msi"C:\Users\admin\AppData\Local\Temp\is-IHKNI.tmp\install-roxplayer.tmp
install-roxplayer.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-ihkni.tmp\install-roxplayer.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3124"C:\Windows\System32\msiexec.exe" /i "C:\Users\admin\AppData\Local\Temp\install-roxplayer.msi"C:\Windows\System32\msiexec.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3132"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Public\Pictures\Sample Pictures\Chrysanthemum.jpgC:\Windows\system32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
Total events
2 532
Read events
2 195
Write events
313
Delete events
24

Modification events

(PID) Process:(3124) msiexec.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\59\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(424) msiexec.exeKey:HKEY_USERS\S-1-5-21-1302019708-1500728564-335382590-1000_CLASSES\Local Settings\MuiCache\59\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(424) msiexec.exeKey:HKEY_USERS\S-1-5-21-1302019708-1500728564-335382590-1000\Software\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
A801000000436C5BC847D401
(PID) Process:(424) msiexec.exeKey:HKEY_USERS\S-1-5-21-1302019708-1500728564-335382590-1000\Software\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
7396E6525533E3C17159E88D9FAF61765B9920027C806F15B5083AA53481144E
(PID) Process:(424) msiexec.exeKey:HKEY_USERS\S-1-5-21-1302019708-1500728564-335382590-1000\Software\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(424) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\InProgress
Operation:writeName:
Value:
C:\Windows\Installer\4c67a3.ipi
(PID) Process:(424) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
Operation:writeName:C:\Config.Msi\
Value:
(PID) Process:(424) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
Operation:writeName:C:\Config.Msi\4c67a4.rbs
Value:
30689232
(PID) Process:(424) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
Operation:writeName:C:\Config.Msi\4c67a4.rbsLow
Value:
3181423328
(PID) Process:(424) msiexec.exeKey:HKEY_USERS\S-1-5-21-1302019708-1500728564-335382590-1000\Software\Caphyon\Advanced Installer\Prereqs\{6C3CA6AB-FAEB-41C9-AEE5-B392FAAB1C16}\1.000
Operation:writeName:RoxPlayer_1
Value:
1
Executable files
315
Suspicious files
10
Text files
140
Unknown types
60

Dropped files

PID
Process
Filename
Type
424msiexec.exeC:\Windows\Installer\MSI684D.tmp
MD5:
SHA256:
424msiexec.exeC:\Windows\Installer\MSI68EA.tmp
MD5:
SHA256:
424msiexec.exeC:\Windows\Installer\MSI68FB.tmp
MD5:
SHA256:
424msiexec.exeC:\Windows\Installer\MSI690C.tmp
MD5:
SHA256:
424msiexec.exeC:\Windows\Installer\MSI691C.tmp
MD5:
SHA256:
424msiexec.exeC:\Users\admin\AppData\Local\Temp\~DF0AB58D1AE79591A0.TMP
MD5:
SHA256:
424msiexec.exeC:\Windows\Installer\MSI695D.tmp
MD5:
SHA256:
424msiexec.exeC:\Windows\Installer\MSI695C.tmp
MD5:
SHA256:
424msiexec.exeC:\Windows\Installer\MSI699D.tmp
MD5:
SHA256:
3704MsiExec.exeC:\Users\admin\AppData\Local\Temp\{076B9E50-F547-42C0-B15B-B46A8CB54186}.bat
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
25
TCP/UDP connections
16
DNS requests
9
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2312
iexplore.exe
GET
301
78.46.111.130:80
http://roxplayer.com/visit/install/ZXlKVGFYUmxWVlZKUkNJNkltWTJZMlE0WVdRMkxXWmlaRE10WmpJeFlTMDJZMlkwTFdaaE5USmlPV0V6Tm1Ka09TSXNJa052YlhCMWRHVnlTVVFpT2lJNU5UVTBOalExWVMxaFpUQmhMVE5rTnpRdE16VmpPQzAwTkRSa1pqVmlaakZpWTJNaUxDSlNaV3hsWVhObElqb2lNUzQwT0RBaUxDSlBjMVJwZEd4bElqb2lWMmx1Wkc5M2N5QTNJaXdpVDNOV1pYSnphVzl1SWpvaU5pNHhJaXdpUTI5dVptbG5TVVFpT2lJaWZRPT0=
DE
malicious
3704
MsiExec.exe
GET
200
78.46.111.130:80
http://roxplayer.com/install-roxplayer.exe
DE
executable
18.2 Mb
malicious
2312
iexplore.exe
GET
200
78.46.111.130:80
http://roxplayer.com/visit/install/thanx/
DE
html
1.77 Kb
malicious
2312
iexplore.exe
GET
200
78.46.111.130:80
http://static.roxplayer.com/css/style.css?v=0.5.1
DE
text
1.99 Kb
suspicious
2312
iexplore.exe
GET
200
78.46.111.130:80
http://static.roxplayer.com/img/icons/google.png
DE
image
1.81 Kb
suspicious
2312
iexplore.exe
GET
200
78.46.111.130:80
http://static.roxplayer.com/img/icons/facebook.png
DE
image
1.04 Kb
suspicious
2312
iexplore.exe
GET
200
78.46.111.130:80
http://static.roxplayer.com/img/icons/vk.png
DE
image
1.85 Kb
suspicious
2312
iexplore.exe
GET
200
78.46.111.130:80
http://static.roxplayer.com/img/logo.gif
DE
image
4.97 Kb
suspicious
2312
iexplore.exe
GET
200
78.46.111.130:80
http://static.roxplayer.com/img/back.gif
DE
image
3.87 Kb
suspicious
2312
iexplore.exe
GET
301
104.24.114.90:80
http://movieplay.me/transit/
US
html
228 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3704
MsiExec.exe
78.46.111.130:80
roxplayer.com
Hetzner Online GmbH
DE
suspicious
2312
iexplore.exe
78.46.111.130:80
roxplayer.com
Hetzner Online GmbH
DE
suspicious
3696
iexplore.exe
131.253.33.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2312
iexplore.exe
216.58.212.206:80
www.google-analytics.com
Google Inc.
US
whitelisted
2312
iexplore.exe
104.24.114.90:80
movieplay.me
Cloudflare Inc
US
shared
2488
roxplayer.exe
78.46.111.130:443
roxplayer.com
Hetzner Online GmbH
DE
suspicious
2488
roxplayer.exe
78.46.111.130:80
roxplayer.com
Hetzner Online GmbH
DE
suspicious
2312
iexplore.exe
172.217.19.202:443
ajax.googleapis.com
Google Inc.
US
whitelisted
2488
roxplayer.exe
13.107.4.50:80
www.download.windowsupdate.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
roxplayer.com
  • 78.46.111.130
malicious
www.bing.com
  • 131.253.33.200
  • 13.107.22.200
whitelisted
static.roxplayer.com
  • 78.46.111.130
unknown
movieplay.me
  • 104.24.114.90
  • 104.24.115.90
malicious
www.google-analytics.com
  • 216.58.212.206
whitelisted
api.roxplayer.com
  • 78.46.111.130
unknown
www.download.windowsupdate.com
  • 13.107.4.50
whitelisted
ajax.googleapis.com
  • 172.217.19.202
  • 172.217.20.106
  • 216.58.212.170
  • 172.217.17.106
  • 216.58.211.106
  • 172.217.20.74
  • 172.217.17.42
whitelisted

Threats

PID
Process
Class
Message
3704
MsiExec.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3704
MsiExec.exe
Misc activity
ET INFO EXE - Served Attached HTTP
Process
Message
MsiExec.exe
# 2018-09-09 @00:04:56 [PID=3704|Thread=3532] | MsiTableReader: Getting the active MSI database for this installation session...
MsiExec.exe
# 2018-09-09 @00:04:56 [PID=3704|Thread=3532] | MsiTableReader: Getting the active MSI database for this installation session...
MsiExec.exe
# 2018-09-09 @00:04:56 [PID=3704|Thread=3532] | Build JOINed tables CustomActionData string...
MsiExec.exe
# 2018-09-09 @00:04:56 [PID=3704|Thread=3532] | SELECT Join Query: [SELECT * FROM `RemoveFile`, `AI_RemoveFile` WHERE `RemoveFile`.`FileKey` = `AI_RemoveFile`.`RemoveFile`].
MsiExec.exe
# 2018-09-09 @00:04:56 [PID=3704|Thread=3532] | MsiTableReader::ExecuteQuery [SELECT * FROM `RemoveFile`, `AI_RemoveFile` WHERE `RemoveFile`.`FileKey` = `AI_RemoveFile`.`RemoveFile`]...
MsiExec.exe
# 2018-09-09 @00:04:56 [PID=3704|Thread=3532] | MsiTableReader::ExecuteQuery [DELETE FROM `RemoveFile` WHERE `RemoveFile`.`FileKey`='__1']...
MsiExec.exe
# 2018-09-09 @00:04:56 [PID=3704|Thread=3532] | Deffered with rollback scheduled.
MsiExec.exe
# 2018-09-09 @00:04:56 [PID=3704|Thread=3532] | OnAiRemoveFileImmediate end.
MsiExec.exe
# 2018-09-09 @00:04:56 [PID=3704|Thread=2468] | OnAiRemoveFiles start.
MsiExec.exe
# 2018-09-09 @00:04:56 [PID=3704|Thread=2468] | CollectRemoveFileData start.