File name:

KMSPico.exe

Full analysis: https://app.any.run/tasks/3a5d1da7-967b-457c-beaa-bf3f4559bf2f
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: August 19, 2024, 02:54:12
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
raccoon
stealer
recordbreaker
loader
exfiltration
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

FB4FDEFE65C7B05021C2EF1D64B182CA

SHA1:

D11112050743E37B2D2FA1D51EAACDACA817B580

SHA256:

DAB49C11D4F14E2643A5FFBB93C86D45B53D6129154253AB5B94680EFBB7FE4B

SSDEEP:

98304:Erq3BdwQnppTYtlExWP5rU7az9zy0Lg5BJItCfDjWlDiPwOA+M5kStlUI2TzPTK8:gCmLKCEnckUvYcM5

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes image file execution options

      • KMSELDI.exe (PID: 6316)
    • Raccoon mutex has been detected

      • MSBuild.exe (PID: 7096)
    • Connects to the CnC server

      • MSBuild.exe (PID: 7096)
    • RACCOON has been detected (SURICATA)

      • MSBuild.exe (PID: 7096)
    • Actions looks like stealing of personal data

      • MSBuild.exe (PID: 7096)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • KMSPico.exe (PID: 6644)
      • KMSPico.tmp (PID: 6668)
      • KMSELDI.exe (PID: 6316)
      • MSBuild.exe (PID: 7096)
    • Drops the executable file immediately after the start

      • KMSPico.tmp (PID: 6668)
      • KMSPico.exe (PID: 6644)
      • KMSELDI.exe (PID: 6316)
      • MSBuild.exe (PID: 7096)
    • Reads the Windows owner or organization settings

      • KMSPico.tmp (PID: 6668)
    • Potential Corporate Privacy Violation

      • MSBuild.exe (PID: 7096)
    • Connects to the server without a host name

      • MSBuild.exe (PID: 7096)
    • Reads security settings of Internet Explorer

      • MSBuild.exe (PID: 7096)
    • The process drops Mozilla's DLL files

      • MSBuild.exe (PID: 7096)
    • Process drops legitimate windows executable

      • MSBuild.exe (PID: 7096)
    • Process drops SQLite DLL files

      • MSBuild.exe (PID: 7096)
    • The process drops C-runtime libraries

      • MSBuild.exe (PID: 7096)
    • Searches for installed software

      • MSBuild.exe (PID: 7096)
    • Process requests binary or script from the Internet

      • MSBuild.exe (PID: 7096)
  • INFO

    • Reads Environment values

      • KMSPico.exe (PID: 6644)
      • KMSPico.tmp (PID: 6668)
      • KMSELDI.exe (PID: 6316)
      • MSBuild.exe (PID: 7096)
    • Create files in a temporary directory

      • KMSPico.exe (PID: 6644)
      • KMSPico.tmp (PID: 6668)
    • Checks supported languages

      • oakley.exe (PID: 3908)
      • KMSELDI.exe (PID: 6316)
      • KMSPico.exe (PID: 6644)
      • KMSPico.tmp (PID: 6668)
      • MSBuild.exe (PID: 7096)
    • Reads the computer name

      • KMSPico.tmp (PID: 6668)
      • KMSELDI.exe (PID: 6316)
      • oakley.exe (PID: 3908)
      • KMSPico.exe (PID: 6644)
      • MSBuild.exe (PID: 7096)
    • Creates a software uninstall entry

      • KMSPico.tmp (PID: 6668)
    • Reads the machine GUID from the registry

      • KMSELDI.exe (PID: 6316)
      • oakley.exe (PID: 3908)
      • MSBuild.exe (PID: 7096)
    • Creates files in the program directory

      • KMSPico.tmp (PID: 6668)
      • KMSELDI.exe (PID: 6316)
    • Reads product name

      • KMSELDI.exe (PID: 6316)
      • MSBuild.exe (PID: 7096)
    • Reads Microsoft Office registry keys

      • KMSELDI.exe (PID: 6316)
    • Creates files or folders in the user directory

      • MSBuild.exe (PID: 7096)
    • Checks proxy server information

      • MSBuild.exe (PID: 7096)
    • Manual execution by a user

      • MSBuild.exe (PID: 7096)
    • Stealers network behavior

      • MSBuild.exe (PID: 7096)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (53.5)
.exe | InstallShield setup (21)
.exe | Win32 EXE PECompact compressed (generic) (20.2)
.exe | Win32 Executable (generic) (2.1)
.exe | Win16/32 Executable Delphi generic (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:07:12 07:26:53+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 2.25
CodeSize: 685056
InitializedDataSize: 159744
UninitializedDataSize: -
EntryPoint: 0xa83bc
OSVersion: 6.1
ImageVersion: -
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: AutoPico
FileDescription: AutoPico Setup
FileVersion:
LegalCopyright:
OriginalFileName:
ProductName: AutoPico
ProductVersion: 1.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
7
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start kmspico.exe kmspico.tmp kmseldi.exe oakley.exe no specs #RACCOON msbuild.exe sppextcomobj.exe no specs kmspico.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3908"C:\Program Files (x86)\AutoPico\oakley.exe"C:\Program Files (x86)\AutoPico\oakley.exeKMSPico.tmp
User:
admin
Company:
www.proficad.com
Integrity Level:
HIGH
Description:
ProfiCAD - Electrical Software
Exit code:
4294967295
Version:
12.2.3.0
Modules
Images
c:\program files (x86)\autopico\oakley.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6316"C:\Program Files (x86)\AutoPico\KMSELDI.exe"C:\Program Files (x86)\AutoPico\KMSELDI.exe
KMSPico.tmp
User:
admin
Company:
@ByELDI
Integrity Level:
HIGH
Description:
KMS GUI ELDI
Exit code:
0
Version:
37.1.0.0
Modules
Images
c:\program files (x86)\autopico\kmseldi.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6552C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6584"C:\Users\admin\AppData\Local\Temp\KMSPico.exe" C:\Users\admin\AppData\Local\Temp\KMSPico.exeexplorer.exe
User:
admin
Company:
AutoPico
Integrity Level:
MEDIUM
Description:
AutoPico Setup
Exit code:
3221226540
Version:
Modules
Images
c:\users\admin\appdata\local\temp\kmspico.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6644"C:\Users\admin\AppData\Local\Temp\KMSPico.exe" C:\Users\admin\AppData\Local\Temp\KMSPico.exe
explorer.exe
User:
admin
Company:
AutoPico
Integrity Level:
HIGH
Description:
AutoPico Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\temp\kmspico.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comctl32.dll
6668"C:\Users\admin\AppData\Local\Temp\is-E6DER.tmp\KMSPico.tmp" /SL5="$6029A,5347198,845824,C:\Users\admin\AppData\Local\Temp\KMSPico.exe" C:\Users\admin\AppData\Local\Temp\is-E6DER.tmp\KMSPico.tmp
KMSPico.exe
User:
admin
Company:
AutoPico
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-e6der.tmp\kmspico.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
7096"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MSBuild.exe
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\msbuild.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
7 757
Read events
7 641
Write events
108
Delete events
8

Modification events

(PID) Process:(6668) KMSPico.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
0C1A000038EAC415E3F1DA01
(PID) Process:(6668) KMSPico.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
6EAF838398170FF27539FB900880887FB09213A780BA5A95F6E2F2F4B5454C1D
(PID) Process:(6668) KMSPico.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(6668) KMSPico.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:RegFiles0000
Value:
C:\Program Files (x86)\AutoPico\AutoPico.exe
(PID) Process:(6668) KMSPico.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:RegFilesHash
Value:
FAFC30579DBDA6765F5989CE92E5D8368B16D8ECB761BDE1563BDC3C7A36E910
(PID) Process:(6668) KMSPico.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AutoPico_is1
Operation:writeName:Inno Setup: Setup Version
Value:
6.3.3
(PID) Process:(6668) KMSPico.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AutoPico_is1
Operation:writeName:Inno Setup: App Path
Value:
C:\Program Files (x86)\AutoPico
(PID) Process:(6668) KMSPico.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AutoPico_is1
Operation:writeName:InstallLocation
Value:
C:\Program Files (x86)\AutoPico\
(PID) Process:(6668) KMSPico.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AutoPico_is1
Operation:writeName:Inno Setup: Icon Group
Value:
(Default)
(PID) Process:(6668) KMSPico.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AutoPico_is1
Operation:writeName:Inno Setup: User
Value:
admin
Executable files
25
Suspicious files
41
Text files
690
Unknown types
0

Dropped files

PID
Process
Filename
Type
6668KMSPico.tmpC:\Program Files (x86)\AutoPico\is-RUQR1.tmpexecutable
MD5:1397B23F30681F97049DF61F94F54D05
SHA256:FA76151A783250014AC8FA55D4C833100A623FCAD1D6E2DDADCDE259F5709609
6668KMSPico.tmpC:\Program Files (x86)\AutoPico\unins000.exeexecutable
MD5:8E34C5942B6D976A0B6ADE26C07D5FA3
SHA256:C5AF0E9D4BD80FBA2CFB9B9E22CD055785F2561C3205E2206CE8D37F96923AAC
6668KMSPico.tmpC:\Program Files (x86)\AutoPico\DevComponents.DotNetBar2.dllexecutable
MD5:1397B23F30681F97049DF61F94F54D05
SHA256:FA76151A783250014AC8FA55D4C833100A623FCAD1D6E2DDADCDE259F5709609
6668KMSPico.tmpC:\Program Files (x86)\AutoPico\is-ICLQM.tmpexecutable
MD5:722CE6EF94372C7DF83AA5DF74A60F9C
SHA256:BE7CEAE52902E657D14A987FBF5284B1600811456CCFC6766284600B42673AD5
6668KMSPico.tmpC:\Program Files (x86)\AutoPico\is-GR5ON.tmpexecutable
MD5:CFE1C391464C446099A5EB33276F6D57
SHA256:4A714D98CE40F5F3577C306A66CB4A6B1FF3FD01047C7F4581F8558F0BCDF5FA
6668KMSPico.tmpC:\Program Files (x86)\AutoPico\oakley.exeexecutable
MD5:722CE6EF94372C7DF83AA5DF74A60F9C
SHA256:BE7CEAE52902E657D14A987FBF5284B1600811456CCFC6766284600B42673AD5
6668KMSPico.tmpC:\Program Files (x86)\AutoPico\AutoPico.exeexecutable
MD5:CFE1C391464C446099A5EB33276F6D57
SHA256:4A714D98CE40F5F3577C306A66CB4A6B1FF3FD01047C7F4581F8558F0BCDF5FA
6668KMSPico.tmpC:\Program Files (x86)\AutoPico\is-8SGCR.tmptext
MD5:98726CF4E77C2A5159801D4E888833DA
SHA256:20AEE3A1B0ECD68E642A5C8FF550D1525DF1C3F2FDA22B7DB51010947153FEBA
6668KMSPico.tmpC:\Program Files (x86)\AutoPico\is-AO153.tmpexecutable
MD5:F0280DE3880EF581BF14F9CC72EC1C16
SHA256:50EBFA1DD5B147E40244607D5D5BE25709EDF2CC66247A78BEB920C77AC514CC
6668KMSPico.tmpC:\Program Files (x86)\AutoPico\ReadMe KMSpico Portable.txttext
MD5:86AA9132AE3244852522D93639CCE650
SHA256:19869F8F354DBF31247A19BF6E5BE7819BA9FBFE4E921EE84D70B0F846BC79ED
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
31
DNS requests
15
Threats
20

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
640
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6968
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
5052
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7096
MSBuild.exe
POST
200
185.26.236.51:80
http://185.26.236.51/
unknown
unknown
7096
MSBuild.exe
GET
200
185.26.236.51:80
http://185.26.236.51/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/msvcp140.dll
unknown
unknown
7096
MSBuild.exe
GET
200
185.26.236.51:80
http://185.26.236.51/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/vcruntime140.dll
unknown
unknown
7096
MSBuild.exe
GET
200
185.26.236.51:80
http://185.26.236.51/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/mozglue.dll
unknown
unknown
7096
MSBuild.exe
GET
200
185.26.236.51:80
http://185.26.236.51/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/nss3.dll
unknown
unknown
7096
MSBuild.exe
GET
200
185.26.236.51:80
http://185.26.236.51/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/freebl3.dll
unknown
unknown
7096
MSBuild.exe
GET
200
185.26.236.51:80
http://185.26.236.51/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/softokn3.dll
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4088
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
1164
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3260
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
640
svchost.exe
40.126.32.74:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
640
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
2120
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6968
backgroundTaskHost.exe
20.223.36.55:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
whitelisted
google.com
  • 142.250.184.238
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
login.live.com
  • 40.126.32.74
  • 40.126.32.140
  • 40.126.32.76
  • 20.190.160.20
  • 40.126.32.134
  • 40.126.32.133
  • 20.190.160.17
  • 40.126.32.72
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
slscr.update.microsoft.com
  • 40.68.123.157
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
3.pool.ntp.org
  • 81.7.16.52
  • 148.251.54.81
  • 94.16.122.152
  • 148.251.235.164
whitelisted

Threats

PID
Process
Class
Message
7096
MSBuild.exe
A Network Trojan was detected
ET MALWARE Win32/RecordBreaker CnC Checkin M1
7096
MSBuild.exe
A Network Trojan was detected
ET MALWARE Win32/RecordBreaker CnC Checkin - Server Response
7096
MSBuild.exe
Potentially Bad Traffic
ET INFO Dotted Quad Host DLL Request
7096
MSBuild.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
7096
MSBuild.exe
A suspicious filename was detected
ET HUNTING HTTP GET Request for nss3.dll - Possible Infostealer Activity
7096
MSBuild.exe
Potentially Bad Traffic
ET INFO Dotted Quad Host DLL Request
7096
MSBuild.exe
A suspicious filename was detected
ET HUNTING HTTP GET Request for vcruntime140.dll - Possible Infostealer Activity
7096
MSBuild.exe
Potentially Bad Traffic
ET INFO Dotted Quad Host DLL Request
7096
MSBuild.exe
A suspicious filename was detected
ET HUNTING HTTP GET Request for mozglue.dll - Possible Infostealer Activity
7096
MSBuild.exe
Potentially Bad Traffic
ET INFO Dotted Quad Host DLL Request
2 ETPRO signatures available at the full report
Process
Message
MSBuild.exe
tw0xu14w8
MSBuild.exe
tf9fnyzeu
MSBuild.exe
tv8nwi2ye
MSBuild.exe
tv8nwi2ye
MSBuild.exe
tv8nwi2ye
MSBuild.exe
tv8nwi2ye
MSBuild.exe
tv8nwi2ye
MSBuild.exe
tv8nwi2ye
MSBuild.exe
tv8nwi2ye
MSBuild.exe
tv8nwi2ye