Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Taylorfarms1VS7-HKQZ7K-XAF9.pdf
|
PDF document, version 1.7, 0 pages
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\7a2c35a2-da09-4aab-8554-d30004bb6c60.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State~RF608c2f.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\a2a8e9f8-e900-454a-ac32-dd756438e1bf.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-240523232426Z-168.bmp
|
PC bitmap, Windows 3.x format, 117 x -152 x 32, cbSize 71190, bits offset 54
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
|
SQLite 3.x database, last written using SQLite version 3040000, file counter 2, database pages 14, cookie 0x5, schema 4, UTF-8,
version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.7124
|
PostScript document text
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
|
PostScript document text
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
|
SQLite 3.x database, last written using SQLite version 3040000, file counter 19, database pages 3, cookie 0x2, schema 4, UTF-8,
version-valid-for 19
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MSIf7fa1.LOG
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-05-23 19-24-24-196.log
|
ASCII text, with very long lines (393)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
|
ASCII text, with very long lines (393), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\250081f2-a274-4a42-9bd6-3073e55c5e83.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\295598f4-665a-4dca-b3a6-f18ce585bd14.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\c7dee4d4-78f8-4e8a-8619-49139840d9f4.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\ca287585-238f-433c-b9fe-fca9e84fe82a.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 23 22:24:25 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 23 22:24:25 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 23 22:24:25 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 23 22:24:25 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 23 22:24:25 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
Chrome Cache Entry: 176
|
HTML document, ASCII text
|
downloaded
|
||
Chrome Cache Entry: 177
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 178
|
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 179
|
PNG image data, 1920 x 1080, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 180
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 181
|
ASCII text, with very long lines (32065)
|
downloaded
|
||
Chrome Cache Entry: 182
|
PNG image data, 29 x 96, 8-bit/color RGB, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 183
|
ASCII text, with very long lines (42526)
|
downloaded
|
||
Chrome Cache Entry: 184
|
PNG image data, 29 x 96, 8-bit/color RGB, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 185
|
HTML document, ASCII text, with very long lines (1982), with CRLF line terminators
|
downloaded
|
||
Chrome Cache Entry: 186
|
ASCII text, with very long lines (50758)
|
downloaded
|
||
Chrome Cache Entry: 187
|
PNG image data, 245 x 36, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 188
|
ASCII text, with very long lines (6357), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 189
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 190
|
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 191
|
ASCII text, with very long lines (52208)
|
downloaded
|
||
Chrome Cache Entry: 192
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 193
|
PNG image data, 245 x 36, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 194
|
PNG image data, 1920 x 1080, 8-bit/color RGBA, non-interlaced
|
dropped
|
There are 64 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
|
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\Taylorfarms1VS7-HKQZ7K-XAF9.pdf"
|
||
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
|
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
|
||
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
|
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0"
--lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=1732
--field-trial-handle=1592,i,14515335496562884618,17631141373330643909,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.jneurosci.org/highwire_log/share/reddit?link=https%3A%2F%2Fqreventsharedfilesonpdf%E3%80%82com/docauth/#5883ZGFndWlsYXJAdGF5bG9yZmFybXMuY29t??lCRr==49695=/..=L5QpUY&u=276b8dda4ef94158348d5b6b8&id=6b7205781d#
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2004 --field-trial-handle=1952,i,13626343138641345857,11972276155321232469,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://qreventsharedfilesonpdf.com/docauth/#5883ZGFndWlsYXJAdGF5bG9yZmFybXMuY29t??lCRr==49695=/..=L5QpUY&u=276b8dda4ef94158348d5b6b8&id=6b7205781d#
|
|||
https://qrbarcodepdfauthentication.com/M
|
unknown
|
||
https://qrbarcodepdfauthentication.com/6fc27ea7f3db2fd9787a0f6b674d5bc4664fd08cc80dcPAS6fc27ea7f3db2fd9787a0f6b674d5bc4664fd08cc80dd
|
|||
https://qrbarcodepdfauthentication.com/MZGFndWlsYXJAdGF5bG9yZmFybXMuY29t
|
|||
https://chrome.cloudflare-dns.com
|
unknown
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/i/8888ccc24da44381/1716506672557/HijGlZLEE2JATpy
|
104.17.2.184
|
||
https://aadcdn.msauthimages.net/dbd5a2dd-2-9w78ronpz5zkipfl1ahlxmjf3f2wwvw0nuoqfn-kw/logintenantbranding/0/illustration?ts=638454295683009577
|
152.199.21.175
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_api/v1?ray=8888ccc24da44381
|
104.17.2.184
|
||
https://www.jneurosci.org/highwire_log/share/reddit?link=https%3A%2F%2Fqreventsharedfilesonpdf%E3%80%82com/docauth/
|
104.18.34.200
|
||
https://www.signable.us/
|
unknown
|
||
https://qrbarcodepdfauthentication.com/boot/425cb2f9ba00f9ccfdfbce46c58880aa664fd08dc3ac4
|
104.21.95.123
|
||
https://qrbarcodepdfauthentication.com/cdn-cgi/challenge-platform/h/b/flow/ov1/847735381:1716502368:DI6K_33vfJLBggrqoQzkGVSUfzV-Ei_MzZut-BncrMg/8888ccb0e85c43e3/ca07ea9a478c4a8
|
104.21.95.123
|
||
https://qrbarcodepdfauthentication.com/jq/425cb2f9ba00f9ccfdfbce46c58880aa664fd08dc3abf
|
104.21.95.123
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/flow/ov1/1963781076:1716502226:dvJvWstRVXlPW9BABJZd_3drpu2HTNqJEQzJmjO2eIE/8888ccc24da44381/99303ef48c10824
|
104.17.2.184
|
||
https://getbootstrap.com/)
|
unknown
|
||
https://qrbarcodepdfauthentication.com/2
|
104.21.95.123
|
||
https://qrbarcodepdfauthentication.com/favicon.ico
|
104.21.95.123
|
||
https://qreventsharedfilesonpdf.com/docauth/
|
188.114.96.3
|
||
https://aadcdn.msauthimages.net/dbd5a2dd-2-9w78ronpz5zkipfl1ahlxmjf3f2wwvw0nuoqfn-kw/logintenantbranding/0/bannerlogo?ts=638454295656641193
|
152.199.21.175
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/2450o/0x4AAAAAAADnPIDROrmt1Wwj/light/normal
|
|||
https://qrbarcodepdfauthentication.com/jm/425cb2f9ba00f9ccfdfbce46c58880aa664fd08dc3ac5
|
104.21.95.123
|
||
https://a.nel.cloudflare.com/report/v4?s=c0iRH1STUaaM4CEjW2KxeAwUanrTWX4MJDtZbcTm7N%2FQ%2FSCjsxQxvF1kNAVc1CVXv7b7y43tca9Lh7xds4XZrhLE9%2BizCvVlscBqzUhkXgHaMmitf9pOzQVtnN994VYYmTAaIQYuiLY94BaikkEEv6Q%3D
|
35.190.80.1
|
||
https://qrbarcodepdfauthentication.com/e/425cb2f9ba00f9ccfdfbce46c58880aa664fd090a6b45
|
104.21.95.123
|
||
https://github.com/twbs/bootstrap/graphs/contributors)
|
unknown
|
||
https://a.nel.cloudflare.com/report/v4?s=V7PmQZEsE8kBksIcZ4AnNM0%2BI4drUy7gfbI%2FSLEusjAwCDUivQOMuMEsZ2av4arBuC%2Fuwb3gF59MYxQT7jGNtuG7DVtsoyupzMhaHf8oYMZ9dEfJkSe3rgMttgHX5vuD%2F8KRwoXZk4AM2C28lkGcKxc%3D
|
35.190.80.1
|
||
https://qrbarcodepdfauthentication.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8888ccb0e85c43e3
|
104.21.95.123
|
||
https://a.nel.cloudflare.com/report/v4?s=Try6x4XOXo0SyqnoNsU898aV19VmdTU3ujHRkrONHmApYo5OiIEVUceuifEkz6tJtNhMammntIPay0PY8Z%2FLofGXZlCHFuyXvJm2mii1n5BWx5qP364eDTVdgmKXhhy0qnvIcBYGZ6JTC8omVUypfag%3D
|
35.190.80.1
|
||
https://unpkg.com/axios@1.7.2/dist/axios.min.js
|
104.17.246.203
|
||
https://qrbarcodepdfauthentication.com/api-as1f?email=daguilar@taylorfarms.com&data=background
|
104.21.95.123
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/cmg/1/wh0E0SXYnx6pTBdJW%2Fl926I%2BPRUplRdtQz3K9lHXs%2Fs%3D
|
104.17.2.184
|
||
https://unpkg.com/axios/dist/axios.min.js
|
104.17.246.203
|
||
https://qrbarcodepdfauthentication.com/api-as1f?email=daguilar@taylorfarms.com&data=logo
|
104.21.95.123
|
||
https://github.com/twbs/bootstrap/blob/master/LICENSE)
|
unknown
|
||
https://qrbarcodepdfauthentication.com/o/425cb2f9ba00f9ccfdfbce46c58880aa664fd090a6b3e
|
104.21.95.123
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/pat/8888ccc24da44381/1716506672557/39acde6229b1a99262dc72f278a859320bd99e3e6f64e5ba16ac208e08b1f0dd/m0cZ5tcBk6M_Uph
|
104.17.2.184
|
||
https://qrbarcodepdfauthentication.com/APP-QUUQZR/425cb2f9ba00f9ccfdfbce46c58880aa664fd090a6916
|
104.21.95.123
|
There are 26 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
qrbarcodepdfauthentication.com
|
104.21.95.123
|
||
a.nel.cloudflare.com
|
35.190.80.1
|
||
www.jneurosci.org
|
104.18.34.200
|
||
sni1gl.wpc.upsiloncdn.net
|
152.199.21.175
|
||
qreventsharedfilesonpdf.com
|
188.114.96.3
|
||
challenges.cloudflare.com
|
104.17.2.184
|
||
www.google.com
|
142.250.184.196
|
||
unpkg.com
|
104.17.246.203
|
||
aadcdn.msauthimages.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.95.123
|
qrbarcodepdfauthentication.com
|
United States
|
||
142.250.184.196
|
www.google.com
|
United States
|
||
104.17.246.203
|
unpkg.com
|
United States
|
||
192.168.2.16
|
unknown
|
unknown
|
||
104.18.34.200
|
www.jneurosci.org
|
United States
|
||
104.17.3.184
|
unknown
|
United States
|
||
23.47.168.24
|
unknown
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
188.114.96.3
|
qreventsharedfilesonpdf.com
|
European Union
|
||
152.199.21.175
|
sni1gl.wpc.upsiloncdn.net
|
United States
|
||
35.190.80.1
|
a.nel.cloudflare.com
|
United States
|
||
104.17.2.184
|
challenges.cloudflare.com
|
United States
|
There are 2 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
aFS
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
tDIText
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
tFileName
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
tFileSource
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
sFileAncestors
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
sDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
sDate
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
uFileSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
uPageCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
sAssetId
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
bisSharedFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
aFS
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
tDIText
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
tFileName
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
sFileAncestors
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
sDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
sDate
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
uFileSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
uPageCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
bisSharedFile
|
There are 10 hidden registries, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://qreventsharedfilesonpdf.com/docauth/#5883ZGFndWlsYXJAdGF5bG9yZmFybXMuY29t??lCRr==49695=/..=L5QpUY&u=276b8dda4ef94158348d5b6b8&id=6b7205781d#
|
||
https://qrbarcodepdfauthentication.com/MZGFndWlsYXJAdGF5bG9yZmFybXMuY29t
|
||
https://qrbarcodepdfauthentication.com/6fc27ea7f3db2fd9787a0f6b674d5bc4664fd08cc80dcPAS6fc27ea7f3db2fd9787a0f6b674d5bc4664fd08cc80dd
|
||
https://qrbarcodepdfauthentication.com/MZGFndWlsYXJAdGF5bG9yZmFybXMuY29t
|
||
https://qrbarcodepdfauthentication.com/MZGFndWlsYXJAdGF5bG9yZmFybXMuY29t
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/2450o/0x4AAAAAAADnPIDROrmt1Wwj/light/normal
|
||
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/2450o/0x4AAAAAAADnPIDROrmt1Wwj/light/normal
|
||
https://qrbarcodepdfauthentication.com/6fc27ea7f3db2fd9787a0f6b674d5bc4664fd08cc80dcPAS6fc27ea7f3db2fd9787a0f6b674d5bc4664fd08cc80dd
|