File name:

BT_Win10_64_17.1.1532.1814.exe

Full analysis: https://app.any.run/tasks/47609b16-7e10-4e98-a055-1ca2ef5468a0
Verdict: Malicious activity
Analysis date: July 06, 2025, 00:14:43
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

DCEBE71FF2EB3119843C4C7B4B39CD7A

SHA1:

327AF7B26F831901184664F26F3D9053C3194C57

SHA256:

AEB546EFFFC24CE38224E369B6ECC5F8C57A871429390406C4FA570ADC9CBA17

SSDEEP:

98304:+Y5n6qUThfuHWHZIsN1/qpXYrm+Nk2cUPtZmyyszoq3aC5rPPKBXHoWarec2zaAN:gAd+GebppZpriR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • BT_Win10_64_17.1.1532.1814.exe (PID: 4500)
      • Setup.exe (PID: 6876)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • BT_Win10_64_17.1.1532.1814.exe (PID: 7092)
    • Adds/modifies Windows certificates

      • msiexec.exe (PID: 3000)
    • Reads security settings of Internet Explorer

      • Setup.exe (PID: 6876)
  • INFO

    • Checks supported languages

      • BT_Win10_64_17.1.1532.1814.exe (PID: 7092)
      • msiexec.exe (PID: 6224)
      • msiexec.exe (PID: 2272)
      • Setup.exe (PID: 6876)
    • The sample compiled with english language support

      • BT_Win10_64_17.1.1532.1814.exe (PID: 7092)
    • Checks proxy server information

      • msiexec.exe (PID: 3000)
      • slui.exe (PID: 5172)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 3000)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 3000)
    • Reads the computer name

      • BT_Win10_64_17.1.1532.1814.exe (PID: 7092)
      • Setup.exe (PID: 6876)
      • msiexec.exe (PID: 2272)
      • msiexec.exe (PID: 6224)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 3000)
    • Reads the software policy settings

      • slui.exe (PID: 5172)
      • msiexec.exe (PID: 3000)
    • Create files in a temporary directory

      • msiexec.exe (PID: 3000)
      • BT_Win10_64_17.1.1532.1814.exe (PID: 7092)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:04:18 22:14:56+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 225280
InitializedDataSize: 83968
UninitializedDataSize: -
EntryPoint: 0x17092
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 15.5.0.0
ProductVersionNumber: 15.5.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Intel(R) Corporation
FileDescription: Intel(R) PROSet/Wireless SEStub Setup Program
FileVersion: 15, 5, 0, 0
InternalName: SEStub
LegalCopyright: Copyright © Intel Corporation 2006-2011
OriginalFileName: SEStub.exe
ProductName: Intel(R) PROSet/Wireless
ProductVersion: 15, 5, 0, 0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
7
Malicious processes
0
Suspicious processes
3

Behavior graph

Click at the process to see the details
start bt_win10_64_17.1.1532.1814.exe setup.exe msiexec.exe msiexec.exe no specs msiexec.exe no specs slui.exe bt_win10_64_17.1.1532.1814.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2272C:\Windows\syswow64\MsiExec.exe -Embedding F626D4C746245DF8D2D4A65404CFA969 CC:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
3000Msiexec /I "C:\WINDOWS\Installer\_{64FD4757-7186-4F12-9AA8-5EE809CAB282}\Intel Bluetooth.msi" /l*v "C:\Users\admin\AppData\Local\Temp\iProInstLogs\Bluetooth\iProInstLog_20250706001502.txt" REBOOT=ReallySuppress SETUP_SOURCE="C:\Users\admin\AppData\Local\Temp\sef665B.tmp\"C:\Windows\SysWOW64\msiexec.exe
Setup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
4500"C:\Users\admin\Desktop\BT_Win10_64_17.1.1532.1814.exe" C:\Users\admin\Desktop\BT_Win10_64_17.1.1532.1814.exeexplorer.exe
User:
admin
Company:
Intel(R) Corporation
Integrity Level:
MEDIUM
Description:
Intel(R) PROSet/Wireless SEStub Setup Program
Exit code:
3221226540
Version:
15, 5, 0, 0
Modules
Images
c:\users\admin\desktop\bt_win10_64_17.1.1532.1814.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
5172C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6224C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
6876C:\Users\admin\AppData\Local\Temp\sef665B.tmp\Setup.exe C:\Users\admin\AppData\Local\Temp\sef665B.tmp\Setup.exe
BT_Win10_64_17.1.1532.1814.exe
User:
admin
Company:
Intel® Corporation
Integrity Level:
HIGH
Description:
Intel(R) Wireless Bluetooth(R)
Version:
1.0.0.3
Modules
Images
c:\users\admin\appdata\local\temp\sef665b.tmp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
7092"C:\Users\admin\Desktop\BT_Win10_64_17.1.1532.1814.exe" C:\Users\admin\Desktop\BT_Win10_64_17.1.1532.1814.exe
explorer.exe
User:
admin
Company:
Intel(R) Corporation
Integrity Level:
HIGH
Description:
Intel(R) PROSet/Wireless SEStub Setup Program
Version:
15, 5, 0, 0
Modules
Images
c:\users\admin\desktop\bt_win10_64_17.1.1532.1814.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
9 102
Read events
9 094
Write events
6
Delete events
2

Modification events

(PID) Process:(3000) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates
Operation:delete valueName:02FAF3E291435468607857694DF5E45B68851868
Value:
(PID) Process:(3000) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868
Operation:writeName:Blob
Value:
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
(PID) Process:(3000) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868
Operation:writeName:Blob
Value:
5C00000001000000040000000008000068000000010000000800000000409120D035D9011D000000010000001000000006F9583C00A763C23FB9E065A3366D55620000000100000020000000687FA451382278FFF0C8B11F8D43D576671C6EB2BCEAB413FB83D965D06D2FF253000000010000004300000030413022060C2B06010401B231010201050130123010060A2B0601040182373C0101030200C0301B060567810C010330123010060A2B0601040182373C0101030200C019000000010000001000000045ED9BBC5E43D3B9ECD63C060DB78E5C03000000010000001400000002FAF3E291435468607857694DF5E45B688518680F000000010000001400000009B9105C5BBA24343CA7F341C624E183F6EE7C1B090000000100000054000000305206082B0601050507030206082B06010505070303060A2B0601040182370A030406082B0601050507030406082B0601050507030606082B0601050507030706082B0601050507030106082B060105050703080B00000001000000260000005300650063007400690067006F00200028004100640064005400720075007300740029000000140000000100000014000000ADBD987A34B426F7FAC42654EF03BDE024CB541A7E0000000100000008000000000063F58926D7010400000001000000100000001D3554048578B03F42424DBF20730A3F20000000010000003A040000308204363082031EA003020102020101300D06092A864886F70D0101050500306F310B300906035504061302534531143012060355040A130B416464547275737420414231263024060355040B131D41646454727573742045787465726E616C20545450204E6574776F726B312230200603550403131941646454727573742045787465726E616C20434120526F6F74301E170D3030303533303130343833385A170D3230303533303130343833385A306F310B300906035504061302534531143012060355040A130B416464547275737420414231263024060355040B131D41646454727573742045787465726E616C20545450204E6574776F726B312230200603550403131941646454727573742045787465726E616C20434120526F6F7430820122300D06092A864886F70D01010105000382010F003082010A0282010100B7F71A33E6F200042D39E04E5BED1FBC6C0FCDB5FA23B6CEDE9B113397A4294C7D939FBD4ABC93ED031AE38FCFE56D505AD69729945A80B0497ADB2E95FDB8CABF37382D1E3E9141AD7056C7F04F3FE8329E74CAC89054E9C65F0F789D9A403C0EAC61AA5E148F9E87A16A50DCD79A4EAF05B3A671949C71B350600AC7139D38078602A8E9A869261890AB4CB04F23AB3A4F84D8DFCE9FE1696FBBD742D76B44E4C7ADEE6D415F725A710837B37965A459A09437F7002F0DC29272DAD03872DB14A845C45D2A7DB7B4D6C4EEACCD1344B7C92BDD430025FA61B9696A582311B7A7338F567559F5CD29D746B70A2B65B6D3426F15B2B87BFBEFE95D53D5345A270203010001A381DC3081D9301D0603551D0E04160414ADBD987A34B426F7FAC42654EF03BDE024CB541A300B0603551D0F040403020106300F0603551D130101FF040530030101FF3081990603551D2304819130818E8014ADBD987A34B426F7FAC42654EF03BDE024CB541AA173A471306F310B300906035504061302534531143012060355040A130B416464547275737420414231263024060355040B131D41646454727573742045787465726E616C20545450204E6574776F726B312230200603550403131941646454727573742045787465726E616C20434120526F6F74820101300D06092A864886F70D01010505000382010100B09BE08525C2D623E20F9606929D41989CD9847981D91E5B14072336658FB0D877BBAC416C47608351B0F9323DE7FCF62613C78016A5BF5AFC87CF787989219AE24C070A8635BCF2DE51C4D296B7DC7E4EEE70FD1C39EB0C0251142D8EBD16E0C1DF4675E724ADECF442B48593701067BA9D06354A18D32B7ACC5142A17A63D1E6BBA1C52BC236BE130DE6BD637E797BA7090D40AB6ADD8F8AC3F6F68C1A420551D445F59FA76221681520433C99E77CBD24D8A9911773883F561B313818B4710F9ACDC80E9E8E2E1BE18C9883CB1F31F1444CC604734976600FC7F8BD17806B2EE9CC4C0E5A9A790F200A2ED59E63261E559294D882175A7BD0BCC78F4E8604
(PID) Process:(3000) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{618736E0-3C3D-11CF-810C-00AA00389B71}\TypeLib
Operation:writeName:Version
Value:
1.1
(PID) Process:(3000) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{618736E0-3C3D-11CF-810C-00AA00389B71}\TypeLib
Operation:writeName:Version
Value:
1.1
(PID) Process:(3000) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Volatile\00\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{03022430-ABC4-11D0-BDE2-00AA001A1953}\TypeLib
Operation:writeName:Version
Value:
1.1
(PID) Process:(3000) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Volatile\00\MACHINE\SOFTWARE\Classes\Interface\{03022430-ABC4-11D0-BDE2-00AA001A1953}\TypeLib
Operation:writeName:Version
Value:
1.1
Executable files
27
Suspicious files
3
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
7092BT_Win10_64_17.1.1532.1814.exeC:\Users\admin\AppData\Local\Temp\sef665B.tmp\Intel Bluetooth.msi
MD5:
SHA256:
7092BT_Win10_64_17.1.1532.1814.exeC:\Users\admin\AppData\Local\Temp\sef665B.tmp\Lang\setupCHS.dllexecutable
MD5:F9D4E23CA73166AC22F022441DAD4A66
SHA256:1CF485C258BCDD58223CFC29CA5053522202EDCAF5D80CC1F81E2D363AED147B
7092BT_Win10_64_17.1.1532.1814.exeC:\Users\admin\AppData\Local\Temp\sef665B.tmp\Lang\setupCSY.dllexecutable
MD5:0057CBEB5BAE69CF0E65779DD3AAB0F3
SHA256:2107E542529B62557F4F645706374A426C0693D87865E79B008F62B0EA43A523
7092BT_Win10_64_17.1.1532.1814.exeC:\Users\admin\AppData\Local\Temp\sef665B.tmp\Lang\setupARA.dllexecutable
MD5:8A09AD5392087FF2D3197DF959E5EF69
SHA256:2FC1C3EA4E6E7EE190ADDEA5EFB0FF2090B3C07F776F5A237427DA780D5D55D6
7092BT_Win10_64_17.1.1532.1814.exeC:\Users\admin\AppData\Local\Temp\sef665B.tmp\Lang\setupCHT.dllexecutable
MD5:FED3D54C583EEB09456B7C27D1D04BB3
SHA256:FC1010972BF39C0AE97F1F8F6EE108FE10794551E8EF06A602C546663ED3B80E
7092BT_Win10_64_17.1.1532.1814.exeC:\Users\admin\AppData\Local\Temp\sef665B.tmp\Lang\setupELL.dllexecutable
MD5:74BE611AAB931EC5FE2A2AC9FCC622BF
SHA256:B21A7A2C8839298BBF484207DB0EC2F411C878F294D8ACA10FA947816F639AA9
7092BT_Win10_64_17.1.1532.1814.exeC:\Users\admin\AppData\Local\Temp\sef665B.tmp\Lang\setupJPN.dllexecutable
MD5:B2232BEA425057337D0E2E260DDCD928
SHA256:847E953789A03A7F9B4F7CF8B4B60D84C176BAAB084CC2BC15F0CF1DEB9C20F3
7092BT_Win10_64_17.1.1532.1814.exeC:\Users\admin\AppData\Local\Temp\sef665B.tmp\Lang\setupHEB.dllexecutable
MD5:D603CD0464CE2E547E6443422263259A
SHA256:A0208310C11BD8CB05D85140EA592EF6B2C04D0E32DFFD3DB2FBF6CB95D4639D
7092BT_Win10_64_17.1.1532.1814.exeC:\Users\admin\AppData\Local\Temp\sef665B.tmp\Lang\setupDAN.dllexecutable
MD5:4FF0D48BBE55269CD9D97C7118F137F0
SHA256:7F2D3E4C2DF9F4FEE320A52E3AF6C890AA5DA7282D9C0B76C60BA60E22E4BF43
6876Setup.exeC:\Windows\Installer\_{64FD4757-7186-4F12-9AA8-5EE809CAB282}\Intel Bluetooth.msi
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
27
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5944
MoUsoCoreWorker.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3000
msiexec.exe
GET
200
172.64.149.23:80
http://ocsp.trust-provider.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2YejS0Jvf6xCZU7wO94CTLVBoCEHkXSqkUFzb%2BFafKnyz%2FRYg%3D
unknown
whitelisted
3000
msiexec.exe
GET
404
104.18.38.233:80
http://crl.trust-provider.com/AddTrustExternalCARoot.crl
unknown
whitelisted
3000
msiexec.exe
GET
200
172.64.149.23:80
http://ocsp.trust-provider.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2YejS0Jvf6xCZU7wO94CTLVBoCEHkXSqkUFzb%2BFafKnyz%2FRYg%3D
unknown
whitelisted
3000
msiexec.exe
GET
403
2.16.168.106:80
http://certificates.intel.com/repository/CRL/Intel%20External%20Basic%20Policy%20CA(1).crl
unknown
whitelisted
3000
msiexec.exe
GET
403
2.16.168.106:80
http://certificates.intel.com/repository/CRL/Intel%20External%20Basic%20Issuing%20CA%203B(2).crl
unknown
whitelisted
3000
msiexec.exe
GET
403
2.16.168.106:80
http://certificates.intel.com/repository/CRL/Intel%20External%20Basic%20Issuing%20CA%203B(2).crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
5944
MoUsoCoreWorker.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5944
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1268
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.110
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
ocsp.trust-provider.com
  • 172.64.149.23
  • 104.18.38.233
whitelisted
crl.trust-provider.com
  • 104.18.38.233
  • 172.64.149.23
whitelisted
www.intel.com
  • 23.212.208.238
whitelisted
certificates.intel.com
  • 2.16.168.106
  • 2.16.168.125
whitelisted
activation-v2.sls.microsoft.com
  • 13.77.207.86
whitelisted
x1.c.lencr.org
  • 2.23.197.184
whitelisted

Threats

No threats detected
Process
Message
Setup.exe
Setup - InitInstance starting
Setup.exe
SetupInfo::GetOSLanguageIDProInst(): langID_OS = 0409, langID_Res = 0409, langID = 0409
Setup.exe
ProInst - LangId = 0409, ENU [lang\setupENU.dll]
Setup.exe
SetupInfo::GetOSLanguageIDProInst(): langID_OS = 0409, langID_Res = 0409, langID = 0409
Setup.exe
ParseXMLData: Missing product name, key, or prefix!
Setup.exe
SetupInfo::QuerySupportedOS: Queried database C:\Users\admin\AppData\Local\Temp\sef665B.tmp\Intel Bluetooth.msi for supported OS Windows7;Windows8;Windows8.1
Setup.exe
Setup - progress dialog initialization Thread and timer started
Setup.exe
Setup - GetMSICurrent directory[C:\WINDOWS\Installer\Intel Bluetooth.msi]!
Setup.exe
Setup - GetMSICurrentFileSize fails!
Setup.exe
Setup - Timer tick and file size [0]