Hi @ll, the "Microsoft Installer" creates for applications installed via an .MSI the following uninstall information in the Windows registry (see ): [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall] "UninstallString"="MsiExec.Exe /X{}" "ModifyPath"="MsiExec.Exe /I{}" Note the unqualified path to the executable "msiexec.exe". On Windows installations without the "SafeProcessSearchMode" hotfix (cf. ) or with this safeguard turned off (cf. , which refers to alias MS09-015), an executable "msiexec.exe" placed in the CWD or the users "base" directory (addressed by "%HOMEDRIVE%%HOMEPATH%" and typically equal to "%USERPROFILE%") can be run instead of the intended executable "%SystemRoot%\System32\MsiExec.Exe". The VERY simple fix (which eliminates this attack vector completely): always use fully-qualified paths to the well-known executables. JFTR: cf. Stefan Kanthak