• File Path: C:\Program Files (x86)\Microsoft SDKs\Windows\v10.0A\bin\NETFX 4.8 Tools\Tracker.exe
  • Description: Tracker


Type Hash
MD5 566303DFC036D3B99B62B158CE5636C5
SHA1 5105E7EB421521C139F15D9E4175B7BAFDC253AE
SHA256 5B97761C5C93FC7205EEED95BDA09CC48BD5511E3ECE91F107DC175B89BE8975
SHA512 BE99E1D8A38256DF6D803DB6BF9000FFE932FE8A4BEAD1639AC0D4C20ADD66E4A7C0D258D54C4506DAA5B7CDFDE0221DC1F70D1072C182A9EB79013AE904D541
SSDEEP 3072:3IKUy2ssbzT385i0wrv2eJwJX/aqIvjusqfaU7t0WxpM1f2i4w:0T/85i0wKMuX1IPqVrU1um
IMP C680C48710AC898A7A6D38020952E20D
PE256 4AAD9F492C5216285331D723848DF6762B03B7ADA267D56EA2A7DD5042D3A08D

Runtime Data

Usage (stderr):

TRACKER : error TRK0000: Bad argument: --help
Microsoft (R) Build (MSBuild) File Tracker Version 4.0.30319
Copyright (C) Microsoft Corporation. All rights reserved.
    Tracker.exe [options] [@tracker-response-file] /c [command-line]


 /d file.dll             : Start the process with the tracking dll file.dll.
                           (default: FileTracker.dll from the PATH)

 /i[f] <path>            : Intermediate directory for tracking log output.
                           (using /if will expand the path to full immediately)
                           (default: current directory in tracked process)

 /o                      : Track operations performed on each file

 /m                      : Include missing files in tracking logs
                           i.e. those that are deleted before process closes

 /u                      : Do not remove duplicate file operations from the
                           tracking log.

 /t                      : Track command lines (will expand response files
                           specified with the '@filename' syntax)

 /a                      : Enable extended tracking: GetFileAttributes,

 /e                      : Enable extended tracking: GetFileAttributes,
                           GetFileAttributesEx, RemoveDirectory, CreateDirectory

 /k                      : Keep the full tool chain in tlog filenames.

 /r file1;file2;..;filen : Root primary input file(s) being tracked
                           (default: none)

 /c [command-line]       : Command to be tracked (must be the last argument).

 /?                      : This help text.

Loaded Modules:

C:\Program Files (x86)\Microsoft SDKs\Windows\v10.0A\bin\NETFX 4.8 Tools\Tracker.exe


  • Status: Signature verified.
  • Serial: 33000001519E8D8F4071A30E41000000000151
  • Thumbprint: 62009AAABDAE749FD47D19150958329BF6FF4B34
  • Issuer: CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
  • Subject: CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US

File Metadata

  • Original Filename: Tracker.exe
  • Product Name: Microsoft .NET Framework
  • Company Name: Microsoft Corporation
  • File Version: 14.8.4084.0 built by: NET48REL1
  • Product Version: 14.8.4084.0
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.
  • Machine Type: 32-bit

File Scan

  • VirusTotal Detections: 0/73
  • VirusTotal Link:

Possible Misuse

The following table contains possible examples of Tracker.exe being misused. While Tracker.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
sigma win_susp_emotet_rudll32_execution.yml - '\tracker.exe' #When Visual Studio compile NodeJS program, it might use MSBuild to create tracker.exe and then, the tracker.exe fork rundll32.exe DRL 1.0
LOLBAS Tracker.yml Name: Tracker.exe  
LOLBAS Tracker.yml - Command: Tracker.exe /d .\calc.dll /c C:\Windows\write.exe  
LOLBAS Tracker.yml Description: Use tracker.exe to proxy execution of an arbitrary DLL into another process. Since tracker.exe is also signed it can be used to bypass application whitelisting solutions.  
malware-ioc rqz-dnsduvel_blocklist.json "", © ESET 2014-2018
malware-ioc winnti_group www2.dyn.tracker[.]com © ESET 2014-2018
malware-ioc winnti_group ssl2.dyn-tracker[.]com © ESET 2014-2018
signature-base exploit_rtf_ole2link.yar author = “@h3x2b " CC BY-NC 4.0

MIT License. Copyright (c) 2020-2021 Strontic.