File name:

Christmas Tree.exe

Full analysis: https://app.any.run/tasks/9deb1588-2acb-4371-9a12-55a0855e3875
Verdict: Malicious activity
Threats:

The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes.

Analysis date: April 19, 2025, 00:49:00
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
rat
quasar
remote
evasion
github
meterpreter
backdoor
auto
generic
pastebin
remcos
telegram
njrat
bladabindi
neshta
miner
coinminer
loki
ransomware
stealer
lumma
adesstealer
psexec
gcleaner
asyncrat
vidar
discordtoken
rdp
screenconnect
tool
winring0x64-sys
vuln-driver
arechclient2
salatstealer
stealc
hausbomber
dcrat
sheet
mirai
botnet
purelogs
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

A239A27C2169AF388D4F5BE6B52F272C

SHA1:

0FEB9A0CD8C25F01D071E9B2CFC2AE7BD430318C

SHA256:

98E895F711226A32BFAB152E224279D859799243845C46E550C2D32153C619FC

SSDEEP:

48:YqYHO2f7Frk70zDJZZJOfTHH/rPmckulbfSqXSfbNtm:27Jlm/6ypf6zNt

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • HeimdallGuard.exe (PID: 2772)
      • ULauncher.exe (PID: 5892)
      • remcos_a.exe (PID: 7700)
      • Device2.exe (PID: 8264)
      • XClient.exe (PID: 4628)
      • s.exe (PID: 1096)
      • Fix.exe (PID: 2560)
      • Host.exe (PID: 5736)
    • QUASAR has been detected (SURICATA)

      • S123.exe (PID: 1328)
    • Connects to the CnC server

      • S123.exe (PID: 1328)
    • HAUSBOMBER has been detected (YARA)

      • Christmas Tree.exe (PID: 6324)
    • Executing a file with an untrusted certificate

      • brbotnet.exe (PID: 2908)
      • FoxmailSetup_7.2.25.375.exe (PID: 1748)
    • QUASAR has been detected (YARA)

      • S123.exe (PID: 1328)
    • METERPRETER has been detected (SURICATA)

      • Christmas Tree.exe (PID: 6324)
    • GENERIC has been found (auto)

      • Christmas Tree.exe (PID: 6324)
      • Christmas Tree.exe (PID: 6324)
      • Christmas Tree.exe (PID: 6324)
      • Christmas Tree.exe (PID: 6324)
    • QUASAR has been found (auto)

      • Christmas Tree.exe (PID: 6324)
      • Quas13k.exe (PID: 668)
    • Changes Windows Defender settings

      • XClient.exe (PID: 4628)
      • s.exe (PID: 1096)
      • Host.exe (PID: 5736)
      • Fix.exe (PID: 2560)
    • Changes powershell execution policy (Bypass)

      • XClient.exe (PID: 4628)
      • s.exe (PID: 1096)
      • Host.exe (PID: 5736)
      • Fix.exe (PID: 2560)
    • Adds path to the Windows Defender exclusion list

      • XClient.exe (PID: 4628)
      • s.exe (PID: 1096)
      • Host.exe (PID: 5736)
      • Fix.exe (PID: 2560)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 1004)
      • powershell.exe (PID: 6004)
      • powershell.exe (PID: 7336)
      • powershell.exe (PID: 7468)
      • powershell.exe (PID: 8012)
      • powershell.exe (PID: 8168)
      • powershell.exe (PID: 8204)
      • powershell.exe (PID: 8764)
      • powershell.exe (PID: 8640)
      • powershell.exe (PID: 8460)
      • powershell.exe (PID: 9192)
      • powershell.exe (PID: 8784)
      • powershell.exe (PID: 5020)
      • powershell.exe (PID: 8732)
    • Uses Task Scheduler to autorun other applications

      • Quas13k.exe (PID: 668)
      • explorer.exe (PID: 7440)
      • RuntimeBroker.exe (PID: 7264)
      • RuntimeBroker.exe (PID: 8424)
      • bootstrapper.exe (PID: 8076)
      • bootstrapper.exe (PID: 8872)
    • Adds process to the Windows Defender exclusion list

      • XClient.exe (PID: 4628)
      • s.exe (PID: 1096)
      • Fix.exe (PID: 2560)
      • Host.exe (PID: 5736)
    • Create files in the Startup directory

      • Cloudy.exe (PID: 5216)
      • ULauncher.exe (PID: 5892)
      • raw_cbot.exe (PID: 7432)
      • Device2.exe (PID: 8264)
      • s.exe (PID: 1096)
      • Fix.exe (PID: 2560)
      • Host.exe (PID: 5736)
    • REMCOS mutex has been found

      • remcos_a.exe (PID: 7700)
    • Uses Task Scheduler to run other applications

      • ULauncher.exe (PID: 5892)
    • REMCOS has been detected

      • remcos_a.exe (PID: 7700)
    • UAC/LUA settings modification

      • reg.exe (PID: 8048)
    • RAT has been found (auto)

      • Christmas Tree.exe (PID: 6324)
      • RuntimeBroker.exe (PID: 7264)
      • Christmas Tree.exe (PID: 6324)
      • Christmas Tree.exe (PID: 6324)
    • NJRAT has been found (auto)

      • Christmas Tree.exe (PID: 6324)
      • Device2.exe (PID: 8264)
    • NjRAT is detected

      • Device2.exe (PID: 8264)
    • NESHTA mutex has been found

      • taskhostw.exe (PID: 8040)
    • RANSOMWARE has been found (auto)

      • Christmas Tree.exe (PID: 6324)
      • Christmas Tree.exe (PID: 6324)
    • ADESSTEALER has been found (auto)

      • Christmas Tree.exe (PID: 6324)
      • Christmas Tree.exe (PID: 6324)
    • LUMMA has been found (auto)

      • Christmas Tree.exe (PID: 6324)
      • Christmas Tree.exe (PID: 6324)
    • COINMINER has been found (auto)

      • c2new.exe (PID: 9080)
      • Christmas Tree.exe (PID: 6324)
    • TOOL has been found (auto)

      • Christmas Tree.exe (PID: 6324)
    • Vulnerable driver has been detected

      • updater.exe (PID: 9092)
    • MINER has been detected (SURICATA)

      • svchost.exe (PID: 2196)
    • SALATSTEALER has been found (auto)

      • Christmas Tree.exe (PID: 6324)
    • BOTNET has been found (auto)

      • Christmas Tree.exe (PID: 6324)
    • PURELOGS has been found (auto)

      • Christmas Tree.exe (PID: 6324)
    • STEALER has been found (auto)

      • Christmas Tree.exe (PID: 6324)
  • SUSPICIOUS

    • Starts another process probably with elevated privileges via RUNAS.EXE

      • runas.exe (PID: 5156)
    • Application launched itself

      • HeimdallGuard.exe (PID: 2772)
    • Potential Corporate Privacy Violation

      • Christmas Tree.exe (PID: 6324)
      • svchost.exe (PID: 2196)
    • Connects to the server without a host name

      • Christmas Tree.exe (PID: 6324)
    • Process requests binary or script from the Internet

      • Christmas Tree.exe (PID: 6324)
    • Executable content was dropped or overwritten

      • Christmas Tree.exe (PID: 6324)
      • Quas13k.exe (PID: 668)
      • Cloudy.exe (PID: 5216)
      • ULauncher.exe (PID: 5892)
      • RuntimeBroker.exe (PID: 7264)
      • bootstrapper.exe (PID: 8076)
      • raw_cbot.exe (PID: 7432)
      • Device2.exe (PID: 8264)
      • s.exe (PID: 1096)
      • Fix.exe (PID: 2560)
      • Host.exe (PID: 5736)
      • c2new.exe (PID: 9080)
      • updater.exe (PID: 9092)
    • Reads security settings of Internet Explorer

      • Christmas Tree.exe (PID: 6324)
      • S123.exe (PID: 1328)
      • brbotnet.exe (PID: 2908)
      • s.exe (PID: 1096)
      • XClient.exe (PID: 4628)
      • ULauncher.exe (PID: 5892)
      • Host.exe (PID: 5736)
      • asdasdasdasdasd.exe (PID: 7576)
      • Fix.exe (PID: 2560)
      • ShellExperienceHost.exe (PID: 6560)
      • csrss.exe (PID: 3796)
      • hkcmd.exe (PID: 732)
    • Reads the date of Windows installation

      • Christmas Tree.exe (PID: 6324)
      • XClient.exe (PID: 4628)
      • s.exe (PID: 1096)
      • ULauncher.exe (PID: 5892)
      • Host.exe (PID: 5736)
      • Fix.exe (PID: 2560)
    • Contacting a server suspected of hosting an CnC

      • S123.exe (PID: 1328)
    • Checks for external IP

      • svchost.exe (PID: 2196)
      • Cloudy.exe (PID: 5216)
      • XClient.exe (PID: 4628)
      • s.exe (PID: 1096)
      • ULauncher.exe (PID: 5892)
      • Host.exe (PID: 5736)
      • Fix.exe (PID: 2560)
    • There is functionality for taking screenshot (YARA)

      • S123.exe (PID: 1328)
    • Connects to unusual port

      • Christmas Tree.exe (PID: 6324)
      • remcos_a.exe (PID: 7700)
      • asdasdasdasdasd.exe (PID: 7576)
      • explorer.exe (PID: 7440)
      • Cloudy.exe (PID: 5216)
      • RuntimeBroker.exe (PID: 8424)
      • ULauncher.exe (PID: 5892)
      • bootstrapper.exe (PID: 8872)
      • raw_cbot.exe (PID: 7432)
      • Device2.exe (PID: 8264)
      • XClient.exe (PID: 4628)
      • Host.exe (PID: 5736)
      • Fix.exe (PID: 2560)
      • s.exe (PID: 1096)
      • explorer.exe (PID: 7400)
    • The process creates files with name similar to system file names

      • Christmas Tree.exe (PID: 6324)
      • Quas13k.exe (PID: 668)
      • Fix.exe (PID: 2560)
      • Host.exe (PID: 5736)
    • Starts POWERSHELL.EXE for commands execution

      • XClient.exe (PID: 4628)
      • s.exe (PID: 1096)
      • Host.exe (PID: 5736)
      • Fix.exe (PID: 2560)
    • Script adds exclusion path to Windows Defender

      • XClient.exe (PID: 4628)
      • s.exe (PID: 1096)
      • Host.exe (PID: 5736)
      • Fix.exe (PID: 2560)
    • Script adds exclusion process to Windows Defender

      • XClient.exe (PID: 4628)
      • s.exe (PID: 1096)
      • Fix.exe (PID: 2560)
      • Host.exe (PID: 5736)
    • Starts itself from another location

      • Quas13k.exe (PID: 668)
      • RuntimeBroker.exe (PID: 7264)
      • bootstrapper.exe (PID: 8076)
    • Starts CMD.EXE for commands execution

      • remcos_a.exe (PID: 7700)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 7780)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • ULauncher.exe (PID: 5892)
    • Executes application which crashes

      • csrss.exe (PID: 3796)
      • hkcmd.exe (PID: 732)
    • Process drops legitimate windows executable

      • Christmas Tree.exe (PID: 6324)
    • The process checks if it is being run in the virtual environment

      • BruterV3.1.exe (PID: 8780)
      • Christmas Tree.exe (PID: 6324)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • Device2.exe (PID: 8264)
    • Mutex name with non-standard characters

      • taskhostw.exe (PID: 8040)
    • PSEXEC has been detected

      • PsExec.exe (PID: 8736)
    • Deletes scheduled task without confirmation

      • schtasks.exe (PID: 7340)
    • Uses powercfg.exe to modify the power settings

      • cmd.exe (PID: 8496)
      • cmd.exe (PID: 8620)
    • The process executes via Task Scheduler

      • updater.exe (PID: 9092)
    • Drops a system driver (possible attempt to evade defenses)

      • updater.exe (PID: 9092)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 5544)
    • Disables trace logs

      • HeimdallGuard.exe (PID: 2772)
      • Christmas Tree.exe (PID: 6324)
      • S123.exe (PID: 1328)
      • XClient.exe (PID: 4628)
      • Cloudy.exe (PID: 5216)
      • s.exe (PID: 1096)
      • ULauncher.exe (PID: 5892)
      • Host.exe (PID: 5736)
      • Fix.exe (PID: 2560)
    • Checks proxy server information

      • HeimdallGuard.exe (PID: 2772)
      • Christmas Tree.exe (PID: 6324)
      • S123.exe (PID: 1328)
      • XClient.exe (PID: 4628)
      • Cloudy.exe (PID: 5216)
      • s.exe (PID: 1096)
      • ULauncher.exe (PID: 5892)
      • Host.exe (PID: 5736)
      • Fix.exe (PID: 2560)
      • csrss.exe (PID: 3796)
      • hkcmd.exe (PID: 732)
      • slui.exe (PID: 6876)
    • Reads the computer name

      • HeimdallGuard.exe (PID: 1188)
      • HeimdallGuard.exe (PID: 2772)
      • HeimdallGuard.exe (PID: 7052)
      • Christmas Tree.exe (PID: 6324)
      • S123.exe (PID: 1328)
      • FoxmailSetup_7.2.25.375.exe (PID: 1748)
      • CZXCVTD.exe (PID: 924)
      • brbotnet.exe (PID: 2908)
      • CONVERTER.exe (PID: 4012)
      • snd16061.exe (PID: 6476)
      • XClient.exe (PID: 4628)
      • s.exe (PID: 1096)
      • ULauncher.exe (PID: 5892)
      • Cloudy.exe (PID: 5216)
      • Host.exe (PID: 5736)
      • Fix.exe (PID: 2560)
      • Quas13k.exe (PID: 668)
      • thin.exe (PID: 4784)
      • explorer.exe (PID: 7440)
      • asdasdasdasdasd.exe (PID: 7576)
      • remcos_a.exe (PID: 7700)
      • RuntimeBroker.exe (PID: 7264)
      • ShellExperienceHost.exe (PID: 6560)
      • csrss.exe (PID: 3796)
      • bootstrapper.exe (PID: 8076)
      • hkcmd.exe (PID: 732)
      • RuntimeBroker.exe (PID: 8424)
      • BruterV3.1.exe (PID: 8780)
      • bootstrapper.exe (PID: 8872)
      • 1.exe (PID: 8884)
      • payload1.exe (PID: 9012)
      • Device2.exe (PID: 8264)
      • mimikatz.exe (PID: 8404)
      • feishu.exe (PID: 7740)
      • PsExec.exe (PID: 8736)
    • Reads the machine GUID from the registry

      • HeimdallGuard.exe (PID: 2772)
      • HeimdallGuard.exe (PID: 1188)
      • HeimdallGuard.exe (PID: 7052)
      • Christmas Tree.exe (PID: 6324)
      • S123.exe (PID: 1328)
      • XClient.exe (PID: 4628)
      • Cloudy.exe (PID: 5216)
      • s.exe (PID: 1096)
      • Fix.exe (PID: 2560)
      • Quas13k.exe (PID: 668)
      • ULauncher.exe (PID: 5892)
      • Host.exe (PID: 5736)
      • asdasdasdasdasd.exe (PID: 7576)
      • explorer.exe (PID: 7440)
      • RuntimeBroker.exe (PID: 7264)
      • bootstrapper.exe (PID: 8076)
      • RuntimeBroker.exe (PID: 8424)
      • BruterV3.1.exe (PID: 8780)
      • bootstrapper.exe (PID: 8872)
      • Device2.exe (PID: 8264)
    • Reads the software policy settings

      • HeimdallGuard.exe (PID: 2772)
      • Christmas Tree.exe (PID: 6324)
      • S123.exe (PID: 1328)
      • ULauncher.exe (PID: 5892)
      • slui.exe (PID: 6876)
    • Manual execution by a user

      • WinRAR.exe (PID: 5544)
      • HeimdallGuard.exe (PID: 2772)
      • HeimdallGuard.exe (PID: 1188)
      • cmd.exe (PID: 8496)
      • schtasks.exe (PID: 516)
      • schtasks.exe (PID: 8092)
      • cmd.exe (PID: 8620)
      • schtasks.exe (PID: 7220)
      • schtasks.exe (PID: 7340)
      • conhost.exe (PID: 4696)
      • explorer.exe (PID: 7400)
    • Checks supported languages

      • HeimdallGuard.exe (PID: 2772)
      • HeimdallGuard.exe (PID: 1188)
      • HeimdallGuard.exe (PID: 7052)
      • Christmas Tree.exe (PID: 6324)
      • S123.exe (PID: 1328)
      • CZXCVTD.exe (PID: 924)
      • FoxmailSetup_7.2.25.375.exe (PID: 1748)
      • brbotnet.exe (PID: 2908)
      • nvnc.exe (PID: 4740)
      • snd16061.exe (PID: 6476)
      • CONVERTER.exe (PID: 4012)
      • csrss.exe (PID: 3796)
      • hkcmd.exe (PID: 732)
      • s.exe (PID: 1096)
      • XClient.exe (PID: 4628)
      • Cloudy.exe (PID: 5216)
      • ULauncher.exe (PID: 5892)
      • Host.exe (PID: 5736)
      • Fix.exe (PID: 2560)
      • Quas13k.exe (PID: 668)
      • thin.exe (PID: 4784)
      • explorer.exe (PID: 7440)
      • asdasdasdasdasd.exe (PID: 7576)
      • remcos_a.exe (PID: 7700)
      • ShellExperienceHost.exe (PID: 6560)
      • RuntimeBroker.exe (PID: 7264)
      • bootstrapper.exe (PID: 8076)
      • Device2.exe (PID: 8264)
      • RuntimeBroker.exe (PID: 8424)
      • BruterV3.1.exe (PID: 8780)
      • bootstrapper.exe (PID: 8872)
      • 1.exe (PID: 8884)
      • payload1.exe (PID: 9012)
      • mimikatz.exe (PID: 8404)
      • feishu.exe (PID: 7740)
      • csl.exe (PID: 7176)
      • PsExec.exe (PID: 8736)
      • c2new.exe (PID: 9080)
      • taskhostw.exe (PID: 8040)
      • updater.exe (PID: 9092)
    • Reads Environment values

      • Christmas Tree.exe (PID: 6324)
      • S123.exe (PID: 1328)
      • Quas13k.exe (PID: 668)
      • XClient.exe (PID: 4628)
      • s.exe (PID: 1096)
      • Cloudy.exe (PID: 5216)
      • ULauncher.exe (PID: 5892)
      • explorer.exe (PID: 7440)
      • asdasdasdasdasd.exe (PID: 7576)
      • Host.exe (PID: 5736)
      • Fix.exe (PID: 2560)
      • RuntimeBroker.exe (PID: 7264)
      • bootstrapper.exe (PID: 8076)
      • RuntimeBroker.exe (PID: 8424)
      • bootstrapper.exe (PID: 8872)
      • BruterV3.1.exe (PID: 8780)
      • Device2.exe (PID: 8264)
    • The sample compiled with chinese language support

      • Christmas Tree.exe (PID: 6324)
    • Process checks computer location settings

      • brbotnet.exe (PID: 2908)
    • Creates files in the program directory

      • remcos_a.exe (PID: 7700)
      • s.exe (PID: 1096)
      • c2new.exe (PID: 9080)
    • Attempting to use instant messaging service

      • svchost.exe (PID: 2196)
      • ULauncher.exe (PID: 5892)
    • The sample compiled with english language support

      • Christmas Tree.exe (PID: 6324)
      • raw_cbot.exe (PID: 7432)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 7336)
      • powershell.exe (PID: 8168)
      • powershell.exe (PID: 7468)
      • powershell.exe (PID: 8012)
      • powershell.exe (PID: 8640)
      • powershell.exe (PID: 8764)
      • powershell.exe (PID: 8204)
      • powershell.exe (PID: 8460)
      • powershell.exe (PID: 9192)
      • powershell.exe (PID: 8784)
      • powershell.exe (PID: 5020)
      • powershell.exe (PID: 8732)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 8012)
      • powershell.exe (PID: 8168)
      • powershell.exe (PID: 7336)
      • powershell.exe (PID: 7468)
      • powershell.exe (PID: 8764)
      • powershell.exe (PID: 8204)
      • powershell.exe (PID: 8640)
      • powershell.exe (PID: 8460)
      • powershell.exe (PID: 8784)
      • powershell.exe (PID: 9192)
      • powershell.exe (PID: 5020)
      • powershell.exe (PID: 8732)
    • The sample compiled with japanese language support

      • updater.exe (PID: 9092)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Quasar

(PID) Process(1328) S123.exe
Version1.4.1
C2 (2)118.195.162.44:443
Sub_DirSubDir
Install_NameClient.exe
Mutex68d5e2b3-4339-4659-a181-0c8f9f98a553
StartupQuasar Client Startup
Tagtest2
LogDirLogs
SignatureItx+iqkvtAHU0ddWUZIBXYd/SsF44lLiuVg1y9tF8zG+oaV0ZDHZcgLmFdV/L0i3nytWBcfDlhsfvA49gHjtjane29uAbGgiSgWwJ08RoiSbs0Bb8AAPrJsSZPa5R+ru0D/B5MDH83s0wasVTOLhYqpZIhB5jIgxoWa6Rg/D6NpggEQB7ZiV44BLR686HNCq+HcTovLPnmdmndhogjg+Gn3KSlvctkBAB3k4R8Z9K26W9QfxgHMomQvI7VVIWQzvcndtrUEtKoKB3xht5B0/e0u4PvRrYkEW6wTgcbhQOIEB...
CertificateMIIE9DCCAtygAwIBAgIQAJ3N+Lg26iiv+teE8eSluTANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI1MDQxNjA5NDIwOFoYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAlKRXqa4ec5vGBeQC55RFDLVLGjIX7bzKxlR1/NiZ088j9UE85fqpmuewJsRJwH40vpDJ6VqG...
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:09:30 16:32:57+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 2048
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0x268e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows command line
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 0.0.0.0
InternalName: New Text Document.exe
LegalCopyright:
OriginalFileName: New Text Document.exe
ProductVersion: 0.0.0.0
AssemblyVersion: 0.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
269
Monitored processes
128
Malicious processes
21
Suspicious processes
5

Behavior graph

Click at the process to see the details
start runas.exe no specs conhost.exe no specs sppextcomobj.exe no specs winrar.exe rundll32.exe no specs heimdallguard.exe no specs conhost.exe no specs heimdallguard.exe conhost.exe no specs heimdallguard.exe no specs conhost.exe no specs #METERPRETER christmas tree.exe conhost.exe no specs #QUASAR s123.exe #MINER svchost.exe slui.exe foxmailsetup_7.2.25.375.exe no specs czxcvtd.exe no specs brbotnet.exe no specs conhost.exe no specs nvnc.exe no specs conhost.exe no specs converter.exe no specs snd16061.exe no specs csrss.exe hkcmd.exe xclient.exe cloudy.exe s.exe ulauncher.exe host.exe fix.exe #QUASAR quas13k.exe thin.exe no specs powershell.exe no specs powershell.exe no specs schtasks.exe no specs conhost.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs explorer.exe powershell.exe no specs conhost.exe no specs asdasdasdasdasd.exe #REMCOS remcos_a.exe schtasks.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs reg.exe no specs powershell.exe no specs conhost.exe no specs #RAT runtimebroker.exe shellexperiencehost.exe no specs bootstrapper.exe schtasks.exe no specs conhost.exe no specs #NJRAT device2.exe runtimebroker.exe schtasks.exe no specs schtasks.exe no specs conhost.exe no specs conhost.exe no specs werfault.exe no specs werfault.exe no specs bruterv3.1.exe no specs bootstrapper.exe 1.exe no specs payload1.exe no specs schtasks.exe no specs conhost.exe no specs raw_cbot.exe mimikatz.exe no specs conhost.exe no specs feishu.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs powershell.exe no specs conhost.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs netsh.exe no specs csl.exe no specs conhost.exe no specs THREAT psexec.exe no specs powershell.exe no specs conhost.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs #COINMINER c2new.exe #NESHTA taskhostw.exe no specs cmd.exe schtasks.exe conhost.exe no specs conhost.exe no specs schtasks.exe conhost.exe no specs powercfg.exe no specs powercfg.exe no specs powercfg.exe no specs powercfg.exe no specs schtasks.exe conhost.exe no specs THREAT updater.exe cmd.exe conhost.exe no specs powercfg.exe no specs powercfg.exe no specs powercfg.exe no specs powercfg.exe no specs schtasks.exe conhost.exe no specs conhost.exe explorer.exe

Process information

PID
CMD
Path
Indicators
Parent process
516C:\WINDOWS\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\ADMINI~1\AppData\Local\Temp\flaevwjwirpw.xml"C:\Windows\System32\schtasks.exe
explorer.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
668"C:\Windows\System32\a\Quas13k.exe" C:\Windows\System32\a\Quas13k.exe
Christmas Tree.exe
User:
Administrator
Integrity Level:
HIGH
Description:
Quasar Client
Exit code:
3
Version:
1.4.1
Modules
Images
c:\windows\system32\a\quas13k.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
732"C:\Windows\System32\a\hkcmd.exe" C:\Windows\System32\a\hkcmd.exe
Christmas Tree.exe
User:
Administrator
Integrity Level:
HIGH
Exit code:
3221225477
Modules
Images
c:\windows\system32\a\hkcmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
872"schtasks" /create /tn "MicrosoftQuasUpdate" /sc ONLOGON /tr "C:\WINDOWS\system32\explorer\explorer.exe" /rl HIGHEST /fC:\Windows\System32\schtasks.exeQuas13k.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
924"C:\Windows\System32\a\CZXCVTD.exe" C:\Windows\System32\a\CZXCVTD.exeChristmas Tree.exe
User:
Administrator
Integrity Level:
HIGH
Description:
CZXCVTD
Exit code:
2148734720
Version:
1.0.0.0
Modules
Images
c:\windows\system32\a\czxcvtd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
1004"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\a\XClient.exe'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeXClient.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
1004powercfg /x -hibernate-timeout-dc 0 C:\Windows\System32\powercfg.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Power Settings Command-Line Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\powercfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\bcrypt.dll
1096"C:\Windows\System32\a\s.exe" C:\Windows\System32\a\s.exe
Christmas Tree.exe
User:
Administrator
Integrity Level:
HIGH
Description:
Version:
1.0.0.0
Modules
Images
c:\windows\system32\a\s.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1188"C:\Users\admin\Desktop\Guard-Endpoint\HeimdallGuard.exe" C:\Users\admin\Desktop\Guard-Endpoint\HeimdallGuard.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
HeimdallGuard
Exit code:
3221225786
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\guard-endpoint\heimdallguard.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
1328"C:\Windows\System32\a\S123.exe" C:\Windows\System32\a\S123.exe
Christmas Tree.exe
User:
Administrator
Integrity Level:
HIGH
Description:
Quasar Client
Version:
1.4.1
Modules
Images
c:\windows\system32\a\s123.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Quasar
(PID) Process(1328) S123.exe
Version1.4.1
C2 (2)118.195.162.44:443
Sub_DirSubDir
Install_NameClient.exe
Mutex68d5e2b3-4339-4659-a181-0c8f9f98a553
StartupQuasar Client Startup
Tagtest2
LogDirLogs
SignatureItx+iqkvtAHU0ddWUZIBXYd/SsF44lLiuVg1y9tF8zG+oaV0ZDHZcgLmFdV/L0i3nytWBcfDlhsfvA49gHjtjane29uAbGgiSgWwJ08RoiSbs0Bb8AAPrJsSZPa5R+ru0D/B5MDH83s0wasVTOLhYqpZIhB5jIgxoWa6Rg/D6NpggEQB7ZiV44BLR686HNCq+HcTovLPnmdmndhogjg+Gn3KSlvctkBAB3k4R8Z9K26W9QfxgHMomQvI7VVIWQzvcndtrUEtKoKB3xht5B0/e0u4PvRrYkEW6wTgcbhQOIEB...
CertificateMIIE9DCCAtygAwIBAgIQAJ3N+Lg26iiv+teE8eSluTANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI1MDQxNjA5NDIwOFoYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAlKRXqa4ec5vGBeQC55RFDLVLGjIX7bzKxlR1/NiZ088j9UE85fqpmuewJsRJwH40vpDJ6VqG...
Total events
133 765
Read events
133 191
Write events
572
Delete events
2

Modification events

(PID) Process:(5544) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5544) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5544) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5544) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2772) HeimdallGuard.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HeimdallGuard_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2772) HeimdallGuard.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HeimdallGuard_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2772) HeimdallGuard.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HeimdallGuard_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2772) HeimdallGuard.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HeimdallGuard_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2772) HeimdallGuard.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HeimdallGuard_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(2772) HeimdallGuard.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\HeimdallGuard_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
Executable files
137
Suspicious files
66
Text files
58
Unknown types
5

Dropped files

PID
Process
Filename
Type
6324Christmas Tree.exeC:\Windows\System32\a\FoxmailSetup_7.2.25.375.exe
MD5:
SHA256:
2772HeimdallGuard.exeC:\Users\admin\Desktop\Guard-Endpoint\debug.logtext
MD5:A06BAA8FDA73BA75BEAAEAADCCA01243
SHA256:5BA8B66C73F9F6CC5522D5CEF5BCBF6A1C0C549D2EACFC348D3F0E256F3A0369
5544WinRAR.exeC:\Users\admin\Desktop\Guard-Endpoint\Newtonsoft.Json.dllexecutable
MD5:195FFB7167DB3219B217C4FD439EEDD6
SHA256:E1E27AF7B07EEEDF5CE71A9255F0422816A6FC5849A483C6714E1B472044FA9D
5544WinRAR.exeC:\Users\admin\Desktop\Guard-Endpoint\HeimdallGuard.exeexecutable
MD5:EB82D42A6C6CE9794AEB165FE857C7CF
SHA256:A9FD7CAC0FF0B2FE0C4DCA174049DF06C0CC697770365CFE4507EF0453F8B220
6324Christmas Tree.exeC:\Windows\System32\a\CZXCVTD.exeexecutable
MD5:F1FB7323684401E2A5E3E5BAE1E97B72
SHA256:22B68E443FCBDEB3CB7810A1EEEBFC876B7D3BE1ADB7DBCD8217E953EA5B36CC
6324Christmas Tree.exeC:\Windows\System32\a\S123.exeexecutable
MD5:233A781D28BD3B3A86178C48AF135297
SHA256:8C4EDF15B2E0BFAAF67D12A3E17E0D6D314EA1DF16965C8C1D7D2B83F3BC1C36
6324Christmas Tree.exeC:\Windows\System32\a\CONVERTER.exeexecutable
MD5:E856AE17BD77A4AC8FFE5291BA02C4A1
SHA256:4202DDD7AF049132F98A9A28DF3B6B1B34567B78E1DCE8B5D380C8974D697199
6324Christmas Tree.exeC:\Windows\System32\a\Quas13k.exeexecutable
MD5:283557E6108671AF76718BF8BDC84508
SHA256:8FD804D664127A9FE36DAE01487103DEAA045859A0D8C4D801DD476CCBC238E3
6324Christmas Tree.exeC:\Windows\System32\a\snd16061.exeexecutable
MD5:E24D2CDF95E080F2B6A1DB32352D8A3C
SHA256:D2F9DC8E7278A2EC0AA634536AC8D23DB209ABA8CA0E109CE80469C27517AB33
6324Christmas Tree.exeC:\Windows\System32\a\brbotnet.exeexecutable
MD5:4C753F7A2AF14B8DC43F2D169EA61752
SHA256:A951BB26B99601F732F9333D11DFA5028E78D90EF80287DC7E82A2C37DE61993
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
44
TCP/UDP connections
1 244
DNS requests
70
Threats
182

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6324
Christmas Tree.exe
GET
200
45.136.15.39:80
http://45.136.15.39/02.08.2022.exe
unknown
malicious
6324
Christmas Tree.exe
GET
301
140.82.121.3:80
http://github.com/nkminash/my-codd/raw/896d806a9b4569c9c3a275f200ebe7d2ecec5702/snd16061.exe
unknown
whitelisted
6324
Christmas Tree.exe
GET
196.251.71.139:80
http://196.251.71.139/vnc/nvnc.exe
unknown
unknown
6324
Christmas Tree.exe
GET
200
176.65.134.79:80
http://176.65.134.79/hosting/CONVERTER.exe
unknown
malicious
6324
Christmas Tree.exe
GET
200
192.3.26.143:80
http://192.3.26.143/460/csrss.exe
unknown
unknown
6324
Christmas Tree.exe
GET
301
140.82.121.3:80
http://github.com/naruto3213213/111/raw/refs/heads/main/Host.exe
unknown
whitelisted
6324
Christmas Tree.exe
GET
200
192.3.26.143:80
http://192.3.26.143/440/hkcmd.exe
unknown
unknown
6324
Christmas Tree.exe
GET
301
140.82.121.3:80
http://github.com/cybr543809/lua/releases/download/SD/ULauncher.exe
unknown
whitelisted
4628
XClient.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
whitelisted
1096
s.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2772
HeimdallGuard.exe
172.67.194.159:443
countervector.pro
CLOUDFLARENET
US
unknown
6488
SIHClient.exe
4.175.87.197:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
google.com
  • 142.250.184.206
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
client.wns.windows.com
  • 172.211.123.249
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.32.68
  • 20.190.160.130
  • 40.126.32.76
  • 20.190.160.67
  • 20.190.160.17
  • 40.126.32.133
  • 20.190.160.132
  • 40.126.32.140
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
countervector.pro
  • 172.67.194.159
  • 104.21.52.31
unknown
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

PID
Process
Class
Message
6324
Christmas Tree.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
6324
Christmas Tree.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
6324
Christmas Tree.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
6324
Christmas Tree.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
6324
Christmas Tree.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
6324
Christmas Tree.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
6324
Christmas Tree.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
6324
Christmas Tree.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
1328
S123.exe
Domain Observed Used for C2 Detected
ET MALWARE Generic AsyncRAT/zgRAT Style SSL Cert
1328
S123.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Malicious SSL Cert (Quasar CnC)
No debug info