URL:

https://github.com/ufileb76/Discord-Nitro/releases/download/Download/latest-x32.zip

Full analysis: https://app.any.run/tasks/95fe1748-0487-405d-aff9-9e6e2d599b3e
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: May 21, 2025, 10:48:28
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
autoit
vidar
stealer
telegram
Indicators:
MD5:

15AFA2E5C40F0C3D13AB83318C7A4C65

SHA1:

F409E7DE75E8FB9D4F4A56C4D7FF02996A3CFD2C

SHA256:

7EF961F62329E47230698190E7C10DA1A435DA9E4A5AB8619D0FBDD6E606ACDF

SSDEEP:

3:N8tEdgcAAKhMWdDfrkCcSLJf8AfUn:2u2cVKhMe9tS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • Setup.exe (PID: 7332)
      • Setup.exe (PID: 900)
    • Antivirus name has been found in the command line (generic signature)

      • findstr.exe (PID: 1040)
      • findstr.exe (PID: 7152)
      • findstr.exe (PID: 780)
      • findstr.exe (PID: 4988)
    • Uses Task Scheduler to autorun other applications

      • Millennium.pif (PID: 6740)
    • Steals credentials from Web Browsers

      • Millennium.pif (PID: 1056)
    • VIDAR mutex has been found

      • Millennium.pif (PID: 1056)
    • Starts CMD.EXE for self-deleting

      • Millennium.pif (PID: 1056)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Setup.exe (PID: 7332)
      • WinRAR.exe (PID: 8156)
      • Millennium.pif (PID: 8108)
      • Setup.exe (PID: 900)
      • Millennium.pif (PID: 1056)
    • Starts CMD.EXE for commands execution

      • Setup.exe (PID: 7332)
      • cmd.exe (PID: 7348)
      • Millennium.pif (PID: 8108)
      • Setup.exe (PID: 900)
      • cmd.exe (PID: 6252)
      • Millennium.pif (PID: 1056)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 7348)
      • cmd.exe (PID: 6252)
    • Get information on the list of running processes

      • cmd.exe (PID: 7348)
      • cmd.exe (PID: 6252)
    • Drops a file with a rarely used extension (PIF)

      • cmd.exe (PID: 7348)
      • Millennium.pif (PID: 6740)
    • Executable content was dropped or overwritten

      • cmd.exe (PID: 7348)
      • Millennium.pif (PID: 6740)
    • Executing commands from ".cmd" file

      • Setup.exe (PID: 7332)
      • Setup.exe (PID: 900)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 7348)
      • cmd.exe (PID: 6252)
      • Millennium.pif (PID: 6740)
    • Starts application with an unusual extension

      • cmd.exe (PID: 7348)
      • cmd.exe (PID: 6252)
      • Millennium.pif (PID: 6740)
    • Application launched itself

      • cmd.exe (PID: 7348)
      • cmd.exe (PID: 6252)
      • Millennium.pif (PID: 6740)
    • The executable file from the user directory is run by the CMD process

      • Millennium.pif (PID: 8108)
      • Setup.exe (PID: 900)
      • Millennium.pif (PID: 6740)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 7348)
      • cmd.exe (PID: 6252)
      • cmd.exe (PID: 5600)
    • There is functionality for taking screenshot (YARA)

      • Millennium.pif (PID: 6740)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • Millennium.pif (PID: 1056)
    • Searches for installed software

      • Millennium.pif (PID: 1056)
  • INFO

    • Application launched itself

      • firefox.exe (PID: 1628)
      • firefox.exe (PID: 5256)
    • Manual execution by a user

      • WinRAR.exe (PID: 8156)
    • Process checks computer location settings

      • Setup.exe (PID: 7332)
      • Millennium.pif (PID: 8108)
      • Setup.exe (PID: 900)
      • Millennium.pif (PID: 1056)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 8156)
    • Checks supported languages

      • Setup.exe (PID: 7332)
      • Millennium.pif (PID: 8108)
      • Setup.exe (PID: 900)
      • Millennium.pif (PID: 6740)
      • Millennium.pif (PID: 1056)
    • Create files in a temporary directory

      • Setup.exe (PID: 7332)
      • Setup.exe (PID: 900)
    • Creates a new folder

      • cmd.exe (PID: 5556)
      • cmd.exe (PID: 4336)
    • Reads the computer name

      • Setup.exe (PID: 7332)
      • Setup.exe (PID: 900)
      • Millennium.pif (PID: 8108)
      • Millennium.pif (PID: 6740)
      • Millennium.pif (PID: 1056)
    • Reads mouse settings

      • Millennium.pif (PID: 8108)
      • Millennium.pif (PID: 6740)
    • Creates files or folders in the user directory

      • Millennium.pif (PID: 6740)
      • Millennium.pif (PID: 1056)
    • The sample compiled with english language support

      • Millennium.pif (PID: 6740)
    • Reads the software policy settings

      • slui.exe (PID: 8136)
      • Millennium.pif (PID: 1056)
    • Reads Environment values

      • Millennium.pif (PID: 1056)
    • Reads the machine GUID from the registry

      • Millennium.pif (PID: 1056)
    • Creates files in the program directory

      • Millennium.pif (PID: 1056)
    • Checks proxy server information

      • Millennium.pif (PID: 1056)
    • Reads product name

      • Millennium.pif (PID: 1056)
    • Reads CPU info

      • Millennium.pif (PID: 1056)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
179
Monitored processes
47
Malicious processes
7
Suspicious processes
2

Behavior graph

Click at the process to see the details
start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs sppextcomobj.exe no specs firefox.exe no specs slui.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs winrar.exe setup.exe no specs cmd.exe conhost.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs millennium.pif no specs timeout.exe no specs cmd.exe conhost.exe no specs setup.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs millennium.pif timeout.exe no specs schtasks.exe no specs conhost.exe no specs #VIDAR millennium.pif slui.exe cmd.exe no specs conhost.exe no specs timeout.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
208tasklist C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
616timeout 15C:\Windows\SysWOW64\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
timeout - pauses command processing
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\timeout.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
668timeout /t 10 C:\Windows\SysWOW64\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
timeout - pauses command processing
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\timeout.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
780findstr /I "wrsa.exe opssvc.exe" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\user32.dll
900C:\Users\admin\AppData\Local\Temp\Rar$EXa8156.34586\Setup.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa8156.34586\Setup.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Store Installer
Exit code:
0
Version:
22405.508.1.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa8156.34586\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
920cmd /c copy /b Hoped 671268\r C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
1040findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\user32.dll
1056C:\Users\admin\AppData\Local\Temp\671268\Millennium.pif C:\Users\admin\AppData\Local\Temp\671268\Millennium.pif
Millennium.pif
User:
admin
Company:
AutoIt Team
Integrity Level:
HIGH
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 2
Modules
Images
c:\users\admin\appdata\local\temp\671268\millennium.pif
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\user32.dll
1628"C:\Program Files\Mozilla Firefox\firefox.exe" https://github.com/ufileb76/Discord-Nitro/releases/download/Download/latest-x32.zipC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\vcruntime140.dll
1660findstr /V "FgFtpPoloRadios" Spas C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\user32.dll
Total events
18 925
Read events
18 912
Write events
13
Delete events
0

Modification events

(PID) Process:(1628) firefox.exeKey:HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(8156) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(8156) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(8156) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(8156) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Downloads\latest-x32.zip
(PID) Process:(8156) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(8156) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(8156) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(8156) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1056) Millennium.pifKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
Executable files
3
Suspicious files
190
Text files
33
Unknown types
0

Dropped files

PID
Process
Filename
Type
1628firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\9kie7cg6.default-release\startupCache\scriptCache-current.bin
MD5:
SHA256:
1628firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\9kie7cg6.default-release\startupCache\scriptCache-child-current.binbinary
MD5:C95DDC2B1A525D1A243E4C294DA2F326
SHA256:3A5919E086BFB31E36110CF636D2D5109EB51F2C410B107F126126AB25D67363
1628firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\sessionCheckpoints.json.tmpbinary
MD5:EA8B62857DFDBD3D0BE7D7E4A954EC9A
SHA256:792955295AE9C382986222C6731C5870BD0E921E7F7E34CC4615F5CD67F225DA
1628firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
1628firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\sessionCheckpoints.jsonbinary
MD5:EA8B62857DFDBD3D0BE7D7E4A954EC9A
SHA256:792955295AE9C382986222C6731C5870BD0E921E7F7E34CC4615F5CD67F225DA
1628firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
MD5:
SHA256:
1628firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
1628firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\prefs-1.jstext
MD5:2C99A16AED3906D92FFE3EF1808E2753
SHA256:08412578CC3BB4922388F8FF8C23962F616B69A1588DA720ADE429129C73C452
1628firefox.exeC:\Users\admin\Downloads\latest-x32.HscMjCp3.zip.part
MD5:
SHA256:
1628firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\datareporting\glean\db\data.safe.tmpbinary
MD5:C78F36BF78A74A5C37232FA18305FA6E
SHA256:319C730AC6614FDCE611894E281CBE1B5E1A304DCD812D6B642D3BE978E82EEC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
31
TCP/UDP connections
80
DNS requests
137
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1628
firefox.exe
POST
200
184.24.77.44:80
http://r11.o.lencr.org/
unknown
whitelisted
1628
firefox.exe
POST
200
184.24.77.44:80
http://r10.o.lencr.org/
unknown
whitelisted
1628
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.32.97.216:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1628
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
1628
firefox.exe
POST
200
184.24.77.44:80
http://r11.o.lencr.org/
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1628
firefox.exe
POST
200
172.217.18.3:80
http://o.pki.goog/s/wr3/FIY
unknown
whitelisted
1628
firefox.exe
POST
200
104.18.38.233:80
http://ocsp.sectigo.com/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.32.97.216:80
www.microsoft.com
AKAMAI-AS
SE
whitelisted
6544
svchost.exe
20.190.159.23:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
1628
firefox.exe
140.82.121.4:443
github.com
GITHUB
US
whitelisted
1628
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
1628
firefox.exe
34.36.137.203:443
contile.services.mozilla.com
GOOGLE-CLOUD-PLATFORM
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.110
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 23.32.97.216
  • 23.35.229.160
whitelisted
login.live.com
  • 20.190.159.23
  • 20.190.159.130
  • 40.126.31.67
  • 20.190.159.128
  • 40.126.31.69
  • 40.126.31.71
  • 40.126.31.130
  • 40.126.31.129
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
github.com
  • 140.82.121.4
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted

Threats

PID
Process
Class
Message
1056
Millennium.pif
Misc activity
ET INFO Observed Telegram Domain (t .me in TLS SNI)
No debug info