File name:

apache-tomcat-10.1.11.exe

Full analysis: https://app.any.run/tasks/f5b7d72b-29e7-4c8a-812b-19d36323587d
Verdict: Malicious activity
Analysis date: August 08, 2023, 11:56:51
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

DE2E4687E9E0C5101B2C345F9F4F15B1

SHA1:

DF1E17EA714AFF3AB32ED3A9FD161F79962E1485

SHA256:

EDB87BC6A1094708F5AA89F65A50016894164D76F301E16C96BB5C68F6587CAE

SSDEEP:

393216:TqaT84OTndjSkWY+UYUCoVrue47gsurqZ23ZnVI402aFX4Xfp1B3:TqaQjfYUCoVtkZ2pnVO27Tt

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Tomcat10w.exe (PID: 1236)
      • Tomcat10.exe (PID: 2472)
      • Tomcat10.exe (PID: 1412)
      • Tomcat10.exe (PID: 3852)
      • Tomcat10.exe (PID: 2100)
      • Tomcat10.exe (PID: 2356)
      • Tomcat10.exe (PID: 2808)
    • Loads dropped or rewritten executable

      • apache-tomcat-10.1.11.exe (PID: 540)
  • SUSPICIOUS

    • Checks for Java to be installed

      • apache-tomcat-10.1.11.exe (PID: 540)
    • Executable content was dropped or overwritten

      • apache-tomcat-10.1.11.exe (PID: 540)
    • Starts application with an unusual extension

      • apache-tomcat-10.1.11.exe (PID: 540)
    • The process creates files with name similar to system file names

      • apache-tomcat-10.1.11.exe (PID: 540)
    • Reads the Internet Settings

      • apache-tomcat-10.1.11.exe (PID: 540)
    • Uses ICACLS.EXE to modify access control lists

      • nsC3BC.tmp (PID: 2364)
      • nsC43A.tmp (PID: 1832)
      • nsC4B8.tmp (PID: 2124)
    • Executes as Windows Service

      • Tomcat10.exe (PID: 2808)
  • INFO

    • Checks supported languages

      • apache-tomcat-10.1.11.exe (PID: 540)
      • nsBCC2.tmp (PID: 1140)
      • Tomcat10.exe (PID: 2472)
      • nsC147.tmp (PID: 3052)
      • Tomcat10.exe (PID: 3852)
      • Tomcat10.exe (PID: 2100)
      • nsC1C5.tmp (PID: 2564)
      • Tomcat10.exe (PID: 1412)
      • nsC234.tmp (PID: 3516)
      • nsC2A2.tmp (PID: 1052)
      • Tomcat10.exe (PID: 2356)
      • nsC3BC.tmp (PID: 2364)
      • nsC43A.tmp (PID: 1832)
      • Tomcat10w.exe (PID: 1236)
      • Tomcat10.exe (PID: 2808)
      • nsC4B8.tmp (PID: 2124)
    • Reads the computer name

      • apache-tomcat-10.1.11.exe (PID: 540)
      • Tomcat10.exe (PID: 2472)
      • Tomcat10.exe (PID: 3852)
      • Tomcat10.exe (PID: 2100)
      • Tomcat10.exe (PID: 1412)
      • Tomcat10.exe (PID: 2356)
      • Tomcat10w.exe (PID: 1236)
      • Tomcat10.exe (PID: 2808)
    • The process checks LSA protection

      • apache-tomcat-10.1.11.exe (PID: 540)
      • Tomcat10.exe (PID: 2472)
      • Tomcat10.exe (PID: 3852)
      • Tomcat10.exe (PID: 2100)
      • Tomcat10.exe (PID: 1412)
      • Tomcat10.exe (PID: 2356)
      • icacls.exe (PID: 2692)
      • icacls.exe (PID: 1856)
      • icacls.exe (PID: 3404)
      • icacls.exe (PID: 3240)
    • Creates files in the program directory

      • apache-tomcat-10.1.11.exe (PID: 540)
      • Tomcat10.exe (PID: 2808)
    • Create files in a temporary directory

      • apache-tomcat-10.1.11.exe (PID: 540)
    • Creates files or folders in the user directory

      • apache-tomcat-10.1.11.exe (PID: 540)
    • Manual execution by a user

      • WINWORD.EXE (PID: 3844)
      • WINWORD.EXE (PID: 3388)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (52.5)
.scr | Windows screen saver (22)
.dll | Win32 Dynamic Link Library (generic) (11)
.exe | Win32 Executable (generic) (7.5)
.exe | Generic Win/DOS Executable (3.3)

EXIF

EXE

ProductVersion: 10.1.11
ProductName: Apache Tomcat
LegalCopyright: Copyright (c) 1999-2023 The Apache Software Foundation
InternalName: apache-tomcat-10.1.11.exe
FileVersion: 2
FileDescription: Apache Tomcat Installer
CompanyName: Apache Software Foundation
Comments: tomcat.apache.org
CharacterSet: Unicode
LanguageCode: English (U.S.)
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x0000
ProductVersionNumber: 10.1.11.0
FileVersionNumber: 10.1.11.0
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: 6
OSVersion: 4
EntryPoint: 0x3640
UninitializedDataSize: 2048
InitializedDataSize: 141824
CodeSize: 26624
LinkerVersion: 6
PEType: PE32
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
TimeStamp: 2021:09:25 21:56:47+00:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 25-Sep-2021 21:56:47
Detected languages:
  • English - United States
Comments: tomcat.apache.org
CompanyName: Apache Software Foundation
FileDescription: Apache Tomcat Installer
FileVersion: 2.0
InternalName: apache-tomcat-10.1.11.exe
LegalCopyright: Copyright (c) 1999-2023 The Apache Software Foundation
ProductName: Apache Tomcat
ProductVersion: 10.1.11

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000D8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 25-Sep-2021 21:56:47
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00006676
0x00006800
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.41746
.rdata
0x00008000
0x0000139A
0x00001400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.14107
.data
0x0000A000
0x00020378
0x00000600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.11058
.ndata
0x0002B000
0x0003A000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x00065000
0x00006D98
0x00006E00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.38582

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.28834
1070
UNKNOWN
English - United States
RT_MANIFEST
2
3.58585
3752
UNKNOWN
English - United States
RT_ICON
3
4.1463
3240
UNKNOWN
English - United States
RT_ICON
4
3.71606
2216
UNKNOWN
English - United States
RT_ICON
5
2.64646
1640
UNKNOWN
English - United States
RT_ICON
6
2.71436
1384
UNKNOWN
English - United States
RT_ICON
7
4.23914
872
UNKNOWN
English - United States
RT_ICON
8
2.95894
744
UNKNOWN
English - United States
RT_ICON
9
2.78721
296
UNKNOWN
English - United States
RT_ICON
102
2.71813
180
UNKNOWN
English - United States
RT_DIALOG

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
71
Monitored processes
23
Malicious processes
2
Suspicious processes
3

Behavior graph

Click at the process to see the details
drop and start start apache-tomcat-10.1.11.exe nsbcc2.tmp no specs tomcat10.exe no specs nsc147.tmp no specs tomcat10.exe no specs nsc1c5.tmp no specs tomcat10.exe no specs nsc234.tmp no specs tomcat10.exe no specs nsc2a2.tmp no specs tomcat10.exe no specs nsc3bc.tmp no specs icacls.exe no specs nsc43a.tmp no specs icacls.exe no specs nsc4b8.tmp no specs icacls.exe no specs tomcat10w.exe no specs tomcat10.exe no specs icacls.exe no specs winword.exe no specs winword.exe no specs apache-tomcat-10.1.11.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
540"C:\Users\admin\AppData\Local\Temp\apache-tomcat-10.1.11.exe" C:\Users\admin\AppData\Local\Temp\apache-tomcat-10.1.11.exe
explorer.exe
User:
admin
Company:
Apache Software Foundation
Integrity Level:
HIGH
Description:
Apache Tomcat Installer
Exit code:
0
Version:
2.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\users\admin\appdata\local\temp\apache-tomcat-10.1.11.exe
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\shell32.dll
c:\windows\system32\gdi32.dll
1052"C:\Users\admin\AppData\Local\Temp\nsh9841.tmp\nsC2A2.tmp" "C:\Program Files\Apache Software Foundation\Tomcat 10.1\bin\Tomcat10.exe" //US//Tomcat10 --StdOutput auto --StdError auto --JvmMs 128 --JvmMx 256C:\Users\admin\AppData\Local\Temp\nsh9841.tmp\nsC2A2.tmpapache-tomcat-10.1.11.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nsh9841.tmp\nsc2a2.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1140"C:\Users\admin\AppData\Local\Temp\nsh9841.tmp\nsBCC2.tmp" "C:\Program Files\Apache Software Foundation\Tomcat 10.1\bin\Tomcat10.exe" //IS//Tomcat10 --DisplayName "Apache Tomcat 10.1 Tomcat10" --Description "Apache Tomcat 10.1.11 Server - https://tomcat.apache.org/" --LogPath "C:\Program Files\Apache Software Foundation\Tomcat 10.1\logs" --Install "C:\Program Files\Apache Software Foundation\Tomcat 10.1\bin\Tomcat10.exe" --Jvm "C:\Program Files\Java\jre1.8.0_271\bin\client\jvm.dll" --StartPath "C:\Program Files\Apache Software Foundation\Tomcat 10.1" --StopPath "C:\Program Files\Apache Software Foundation\Tomcat 10.1"C:\Users\admin\AppData\Local\Temp\nsh9841.tmp\nsBCC2.tmpapache-tomcat-10.1.11.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nsh9841.tmp\nsbcc2.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1236"C:\Program Files\Apache Software Foundation\Tomcat 10.1\bin\Tomcat10w.exe" //MR//Tomcat10C:\Program Files\Apache Software Foundation\Tomcat 10.1\bin\Tomcat10w.exeapache-tomcat-10.1.11.exe
User:
admin
Company:
Apache Software Foundation
Integrity Level:
HIGH
Description:
Apache Commons Daemon Service Manager
Exit code:
0
Version:
1.3.4.0
Modules
Images
c:\program files\apache software foundation\tomcat 10.1\bin\tomcat10w.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\rpcrt4.dll
1412"C:\Program Files\Apache Software Foundation\Tomcat 10.1\bin\Tomcat10.exe" //US//Tomcat10 --JvmOptions9 "--add-opens=java.base/java.lang=ALL-UNNAMED#--add-opens=java.base/java.io=ALL-UNNAMED#--add-opens=java.rmi/sun.rmi.transport=ALL-UNNAMED"C:\Program Files\Apache Software Foundation\Tomcat 10.1\bin\Tomcat10.exensC234.tmp
User:
admin
Company:
Apache Software Foundation
Integrity Level:
HIGH
Description:
Apache Commons Daemon Service Runner
Exit code:
0
Version:
1.3.4.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\program files\apache software foundation\tomcat 10.1\bin\tomcat10.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
1832"C:\Users\admin\AppData\Local\Temp\nsh9841.tmp\nsC43A.tmp" icacls "C:\Program Files\Apache Software Foundation\Tomcat 10.1\tomcat.ico" /inheritance:e /grant *S-1-5-11:(R)C:\Users\admin\AppData\Local\Temp\nsh9841.tmp\nsC43A.tmpapache-tomcat-10.1.11.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\appdata\local\temp\nsh9841.tmp\nsc43a.tmp
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1856icacls "C:\Program Files\Apache Software Foundation\Tomcat 10.1\tomcat.ico" /inheritance:e /grant *S-1-5-11:(R)C:\Windows\System32\icacls.exensC43A.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
2100"C:\Program Files\Apache Software Foundation\Tomcat 10.1\bin\Tomcat10.exe" //US//Tomcat10 --JvmOptions "-Dcatalina.home=C:\Program Files\Apache Software Foundation\Tomcat 10.1#-Dcatalina.base=C:\Program Files\Apache Software Foundation\Tomcat 10.1#-Djava.io.tmpdir=C:\Program Files\Apache Software Foundation\Tomcat 10.1\temp#-Djava.util.logging.manager=org.apache.juli.ClassLoaderLogManager#-Djava.util.logging.config.file=C:\Program Files\Apache Software Foundation\Tomcat 10.1\conf\logging.properties"C:\Program Files\Apache Software Foundation\Tomcat 10.1\bin\Tomcat10.exensC1C5.tmp
User:
admin
Company:
Apache Software Foundation
Integrity Level:
HIGH
Description:
Apache Commons Daemon Service Runner
Exit code:
0
Version:
1.3.4.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\apache software foundation\tomcat 10.1\bin\tomcat10.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
2124"C:\Users\admin\AppData\Local\Temp\nsh9841.tmp\nsC4B8.tmp" icacls "C:\Program Files\Apache Software Foundation\Tomcat 10.1\Uninstall.exe" /inheritance:e /grant *S-1-5-11:(RX)C:\Users\admin\AppData\Local\Temp\nsh9841.tmp\nsC4B8.tmpapache-tomcat-10.1.11.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nsh9841.tmp\nsc4b8.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2356"C:\Program Files\Apache Software Foundation\Tomcat 10.1\bin\Tomcat10.exe" //US//Tomcat10 --StdOutput auto --StdError auto --JvmMs 128 --JvmMx 256C:\Program Files\Apache Software Foundation\Tomcat 10.1\bin\Tomcat10.exensC2A2.tmp
User:
admin
Company:
Apache Software Foundation
Integrity Level:
HIGH
Description:
Apache Commons Daemon Service Runner
Exit code:
0
Version:
1.3.4.0
Modules
Images
c:\program files\apache software foundation\tomcat 10.1\bin\tomcat10.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
Total events
6 044
Read events
5 695
Write events
74
Delete events
275

Modification events

(PID) Process:(540) apache-tomcat-10.1.11.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(540) apache-tomcat-10.1.11.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(540) apache-tomcat-10.1.11.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(540) apache-tomcat-10.1.11.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(3388) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(3388) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1041
Value:
On
(PID) Process:(3388) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1046
Value:
On
(PID) Process:(3388) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1036
Value:
On
(PID) Process:(3388) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1031
Value:
On
(PID) Process:(3388) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1040
Value:
On
Executable files
51
Suspicious files
5
Text files
194
Unknown types
12

Dropped files

PID
Process
Filename
Type
540apache-tomcat-10.1.11.exeC:\Users\admin\AppData\Local\Temp\nsh9841.tmp\modern-wizard.bmpimage
MD5:E8F7993C6AC99314393499863E18B4C7
SHA256:9E700B8009506B81EEAB6EB9D2AA55954CB28750B550563792BF59A603B17BD5
540apache-tomcat-10.1.11.exeC:\Users\admin\AppData\Local\Temp\nsh9841.tmp\nsDialogs.dllexecutable
MD5:6C3F8C94D0727894D706940A8A980543
SHA256:56B96ADD1978B1ABBA286F7F8982B0EFBE007D4A48B3DED6A4D408E01D753FE2
540apache-tomcat-10.1.11.exeC:\Users\admin\AppData\Local\Temp\nsh9841.tmp\modern-header.bmpimage
MD5:46F339AA9B187E4B5736DEA11883AEB6
SHA256:82F819B9281F6A7799A3A000F03555B52E6AF990E2D9B2F68A5A82045681951A
540apache-tomcat-10.1.11.exeC:\Users\admin\AppData\Local\Temp\nsh9841.tmp\System.dllexecutable
MD5:CFF85C549D536F651D4FB8387F1976F2
SHA256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
540apache-tomcat-10.1.11.exeC:\Program Files\Apache Software Foundation\Tomcat 10.1\lib\catalina-ant.jarjava
MD5:6F4D6F3C60703B6EF8C9110F8051B03B
SHA256:71271947D6D70ED12095EC71864AB062935BBE293D52849C98EF4484F6984E2A
540apache-tomcat-10.1.11.exeC:\Program Files\Apache Software Foundation\Tomcat 10.1\lib\catalina-ssi.jarjava
MD5:D55E6085210571C5862D68877C4948CD
SHA256:74262301AF02D0BF569518EA84BC454FBDC9CCC2723857198171CC5AEFBADA01
540apache-tomcat-10.1.11.exeC:\Program Files\Apache Software Foundation\Tomcat 10.1\lib\catalina-storeconfig.jarjava
MD5:89CA37C4A24EC7CE11488DFBA2C96D26
SHA256:60DCC463ADD446727069239A0CC26DA66E85FBF14370DA1BCDE4420E1C99533C
540apache-tomcat-10.1.11.exeC:\Program Files\Apache Software Foundation\Tomcat 10.1\lib\el-api.jarjava
MD5:801B21074610B1C451B011E9CAD509FB
SHA256:D1DCE4ADFEDC9EBF11D2AB39AA90A09BC355B2761C3D0BC1E045DB492DB0577B
540apache-tomcat-10.1.11.exeC:\Program Files\Apache Software Foundation\Tomcat 10.1\lib\ecj-4.27.jarcompressed
MD5:8F97CA731449B0DD4CBF23AA34774C6F
SHA256:F7686C4960CF70C2EBC5C500A73A8CFC04541B730C18F1C5C21329889B137F45
540apache-tomcat-10.1.11.exeC:\Program Files\Apache Software Foundation\Tomcat 10.1\lib\catalina.jarjava
MD5:561D2FC2E2E914CD5D8D13E42A317DC6
SHA256:E237BAAA0914059D4C6C022B7D115902E337CB9124A1C7AE5C0AAE5596ECC80A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3284
svchost.exe
239.255.255.250:1900
whitelisted

DNS requests

No data

Threats

No threats detected
No debug info