IOC Report
Taylorfarms1VS7-HKQZ7K-XAF9.pdf

loading gif

Files

File Path
Type
Category
Malicious
Taylorfarms1VS7-HKQZ7K-XAF9.pdf
PDF document, version 1.7, 0 pages
initial sample
malicious
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\7a2c35a2-da09-4aab-8554-d30004bb6c60.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State~RF608c2f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\a2a8e9f8-e900-454a-ac32-dd756438e1bf.tmp
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-240523232426Z-168.bmp
PC bitmap, Windows 3.x format, 117 x -152 x 32, cbSize 71190, bits offset 54
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3040000, file counter 2, database pages 14, cookie 0x5, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.7124
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 19, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 19
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Temp\MSIf7fa1.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-05-23 19-24-24-196.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\250081f2-a274-4a42-9bd6-3073e55c5e83.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\295598f4-665a-4dca-b3a6-f18ce585bd14.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\c7dee4d4-78f8-4e8a-8619-49139840d9f4.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\ca287585-238f-433c-b9fe-fca9e84fe82a.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 23 22:24:25 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 23 22:24:25 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 23 22:24:25 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 23 22:24:25 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 23 22:24:25 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 176
HTML document, ASCII text
downloaded
Chrome Cache Entry: 177
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 178
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 179
PNG image data, 1920 x 1080, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 180
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 181
ASCII text, with very long lines (32065)
downloaded
Chrome Cache Entry: 182
PNG image data, 29 x 96, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 183
ASCII text, with very long lines (42526)
downloaded
Chrome Cache Entry: 184
PNG image data, 29 x 96, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 185
HTML document, ASCII text, with very long lines (1982), with CRLF line terminators
downloaded
Chrome Cache Entry: 186
ASCII text, with very long lines (50758)
downloaded
Chrome Cache Entry: 187
PNG image data, 245 x 36, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 188
ASCII text, with very long lines (6357), with no line terminators
downloaded
Chrome Cache Entry: 189
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 190
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 191
ASCII text, with very long lines (52208)
downloaded
Chrome Cache Entry: 192
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 193
PNG image data, 245 x 36, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 194
PNG image data, 1920 x 1080, 8-bit/color RGBA, non-interlaced
dropped
There are 64 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\Taylorfarms1VS7-HKQZ7K-XAF9.pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=1732 --field-trial-handle=1592,i,14515335496562884618,17631141373330643909,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.jneurosci.org/highwire_log/share/reddit?link=https%3A%2F%2Fqreventsharedfilesonpdf%E3%80%82com/docauth/#5883ZGFndWlsYXJAdGF5bG9yZmFybXMuY29t??lCRr==49695=/..=L5QpUY&u=276b8dda4ef94158348d5b6b8&id=6b7205781d#
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2004 --field-trial-handle=1952,i,13626343138641345857,11972276155321232469,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://qreventsharedfilesonpdf.com/docauth/#5883ZGFndWlsYXJAdGF5bG9yZmFybXMuY29t??lCRr==49695=/..=L5QpUY&u=276b8dda4ef94158348d5b6b8&id=6b7205781d#
malicious
https://qrbarcodepdfauthentication.com/M
unknown
malicious
https://qrbarcodepdfauthentication.com/6fc27ea7f3db2fd9787a0f6b674d5bc4664fd08cc80dcPAS6fc27ea7f3db2fd9787a0f6b674d5bc4664fd08cc80dd
malicious
https://qrbarcodepdfauthentication.com/MZGFndWlsYXJAdGF5bG9yZmFybXMuY29t
malicious
https://chrome.cloudflare-dns.com
unknown
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/i/8888ccc24da44381/1716506672557/HijGlZLEE2JATpy
104.17.2.184
https://aadcdn.msauthimages.net/dbd5a2dd-2-9w78ronpz5zkipfl1ahlxmjf3f2wwvw0nuoqfn-kw/logintenantbranding/0/illustration?ts=638454295683009577
152.199.21.175
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_api/v1?ray=8888ccc24da44381
104.17.2.184
https://www.jneurosci.org/highwire_log/share/reddit?link=https%3A%2F%2Fqreventsharedfilesonpdf%E3%80%82com/docauth/
104.18.34.200
https://www.signable.us/
unknown
https://qrbarcodepdfauthentication.com/boot/425cb2f9ba00f9ccfdfbce46c58880aa664fd08dc3ac4
104.21.95.123
https://qrbarcodepdfauthentication.com/cdn-cgi/challenge-platform/h/b/flow/ov1/847735381:1716502368:DI6K_33vfJLBggrqoQzkGVSUfzV-Ei_MzZut-BncrMg/8888ccb0e85c43e3/ca07ea9a478c4a8
104.21.95.123
https://qrbarcodepdfauthentication.com/jq/425cb2f9ba00f9ccfdfbce46c58880aa664fd08dc3abf
104.21.95.123
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/flow/ov1/1963781076:1716502226:dvJvWstRVXlPW9BABJZd_3drpu2HTNqJEQzJmjO2eIE/8888ccc24da44381/99303ef48c10824
104.17.2.184
https://getbootstrap.com/)
unknown
https://qrbarcodepdfauthentication.com/2
104.21.95.123
https://qrbarcodepdfauthentication.com/favicon.ico
104.21.95.123
https://qreventsharedfilesonpdf.com/docauth/
188.114.96.3
https://aadcdn.msauthimages.net/dbd5a2dd-2-9w78ronpz5zkipfl1ahlxmjf3f2wwvw0nuoqfn-kw/logintenantbranding/0/bannerlogo?ts=638454295656641193
152.199.21.175
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/2450o/0x4AAAAAAADnPIDROrmt1Wwj/light/normal
https://qrbarcodepdfauthentication.com/jm/425cb2f9ba00f9ccfdfbce46c58880aa664fd08dc3ac5
104.21.95.123
https://a.nel.cloudflare.com/report/v4?s=c0iRH1STUaaM4CEjW2KxeAwUanrTWX4MJDtZbcTm7N%2FQ%2FSCjsxQxvF1kNAVc1CVXv7b7y43tca9Lh7xds4XZrhLE9%2BizCvVlscBqzUhkXgHaMmitf9pOzQVtnN994VYYmTAaIQYuiLY94BaikkEEv6Q%3D
35.190.80.1
https://qrbarcodepdfauthentication.com/e/425cb2f9ba00f9ccfdfbce46c58880aa664fd090a6b45
104.21.95.123
https://github.com/twbs/bootstrap/graphs/contributors)
unknown
https://a.nel.cloudflare.com/report/v4?s=V7PmQZEsE8kBksIcZ4AnNM0%2BI4drUy7gfbI%2FSLEusjAwCDUivQOMuMEsZ2av4arBuC%2Fuwb3gF59MYxQT7jGNtuG7DVtsoyupzMhaHf8oYMZ9dEfJkSe3rgMttgHX5vuD%2F8KRwoXZk4AM2C28lkGcKxc%3D
35.190.80.1
https://qrbarcodepdfauthentication.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8888ccb0e85c43e3
104.21.95.123
https://a.nel.cloudflare.com/report/v4?s=Try6x4XOXo0SyqnoNsU898aV19VmdTU3ujHRkrONHmApYo5OiIEVUceuifEkz6tJtNhMammntIPay0PY8Z%2FLofGXZlCHFuyXvJm2mii1n5BWx5qP364eDTVdgmKXhhy0qnvIcBYGZ6JTC8omVUypfag%3D
35.190.80.1
https://unpkg.com/axios@1.7.2/dist/axios.min.js
104.17.246.203
https://qrbarcodepdfauthentication.com/api-as1f?email=daguilar@taylorfarms.com&data=background
104.21.95.123
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/cmg/1/wh0E0SXYnx6pTBdJW%2Fl926I%2BPRUplRdtQz3K9lHXs%2Fs%3D
104.17.2.184
https://unpkg.com/axios/dist/axios.min.js
104.17.246.203
https://qrbarcodepdfauthentication.com/api-as1f?email=daguilar@taylorfarms.com&data=logo
104.21.95.123
https://github.com/twbs/bootstrap/blob/master/LICENSE)
unknown
https://qrbarcodepdfauthentication.com/o/425cb2f9ba00f9ccfdfbce46c58880aa664fd090a6b3e
104.21.95.123
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/pat/8888ccc24da44381/1716506672557/39acde6229b1a99262dc72f278a859320bd99e3e6f64e5ba16ac208e08b1f0dd/m0cZ5tcBk6M_Uph
104.17.2.184
https://qrbarcodepdfauthentication.com/APP-QUUQZR/425cb2f9ba00f9ccfdfbce46c58880aa664fd090a6916
104.21.95.123
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
qrbarcodepdfauthentication.com
104.21.95.123
malicious
a.nel.cloudflare.com
35.190.80.1
www.jneurosci.org
104.18.34.200
sni1gl.wpc.upsiloncdn.net
152.199.21.175
qreventsharedfilesonpdf.com
188.114.96.3
challenges.cloudflare.com
104.17.2.184
www.google.com
142.250.184.196
unpkg.com
104.17.246.203
aadcdn.msauthimages.net
unknown

IPs

IP
Domain
Country
Malicious
104.21.95.123
qrbarcodepdfauthentication.com
United States
malicious
142.250.184.196
www.google.com
United States
104.17.246.203
unpkg.com
United States
192.168.2.16
unknown
unknown
104.18.34.200
www.jneurosci.org
United States
104.17.3.184
unknown
United States
23.47.168.24
unknown
United States
239.255.255.250
unknown
Reserved
188.114.96.3
qreventsharedfilesonpdf.com
European Union
152.199.21.175
sni1gl.wpc.upsiloncdn.net
United States
35.190.80.1
a.nel.cloudflare.com
United States
104.17.2.184
challenges.cloudflare.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileSource
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sAssetId
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
bisSharedFile
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
bisSharedFile
There are 10 hidden registries, click here to show them.

DOM / HTML

URL
Malicious
https://qreventsharedfilesonpdf.com/docauth/#5883ZGFndWlsYXJAdGF5bG9yZmFybXMuY29t??lCRr==49695=/..=L5QpUY&u=276b8dda4ef94158348d5b6b8&id=6b7205781d#
malicious
https://qrbarcodepdfauthentication.com/MZGFndWlsYXJAdGF5bG9yZmFybXMuY29t
malicious
https://qrbarcodepdfauthentication.com/6fc27ea7f3db2fd9787a0f6b674d5bc4664fd08cc80dcPAS6fc27ea7f3db2fd9787a0f6b674d5bc4664fd08cc80dd
malicious
https://qrbarcodepdfauthentication.com/MZGFndWlsYXJAdGF5bG9yZmFybXMuY29t
https://qrbarcodepdfauthentication.com/MZGFndWlsYXJAdGF5bG9yZmFybXMuY29t
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/2450o/0x4AAAAAAADnPIDROrmt1Wwj/light/normal
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/2450o/0x4AAAAAAADnPIDROrmt1Wwj/light/normal
https://qrbarcodepdfauthentication.com/6fc27ea7f3db2fd9787a0f6b674d5bc4664fd08cc80dcPAS6fc27ea7f3db2fd9787a0f6b674d5bc4664fd08cc80dd