IOC Report
0430tely.pdf

loading gif

Files

File Path
Type
Category
Malicious
0430tely.pdf
PDF document, version 1.3, 1 pages
initial sample
malicious
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\d52f2a14-5a7e-4fe8-9b3e-8660dd32ebfb.tmp
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-250115184123Z-172.bmp
PC bitmap, Windows 3.x format, 164 x -92 x 32, cbSize 60406, bits offset 54
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3040000, file counter 2, database pages 14, cookie 0x5, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeCMapFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.6308
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AcroFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AdobeFnt23.lst.6308
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 19, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 19
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache64.bin
data
dropped
C:\Users\user\AppData\Local\Temp\MSIdf94f.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2025-01-15 13-41-21-511.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\1fc75a93-d3ed-41a8-8daf-ccb3e3554c91.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\4f347548-c1ee-4785-9606-5ce490bb6bbd.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\684b2032-0ed1-4bb1-b7de-626e043e0224.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\8d3eeb9c-ac30-4a81-a921-5abdc6905753.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 25552
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jan 15 17:41:50 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jan 15 17:41:50 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jan 15 17:41:50 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jan 15 17:41:50 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jan 15 17:41:50 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 176
HTML document, ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 177
PNG image data, 1520 x 170, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 178
PNG image data, 42 x 22, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 179
PNG image data, 1520 x 170, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 180
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 181
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 182
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 183
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 184
PNG image data, 9 x 135, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 185
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 186
GIF image data, version 89a, 41 x 40
dropped
Chrome Cache Entry: 187
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 188
PNG image data, 9 x 135, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 189
Web Open Font Format, TrueType, length 84472, version 1.0
downloaded
Chrome Cache Entry: 190
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 191
PNG image data, 14 x 9, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 192
Unicode text, UTF-8 text
downloaded
Chrome Cache Entry: 193
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
Chrome Cache Entry: 194
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
downloaded
Chrome Cache Entry: 195
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 196
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
downloaded
Chrome Cache Entry: 197
PNG image data, 849 x 84, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 198
Unicode text, UTF-8 text
dropped
Chrome Cache Entry: 199
ASCII text, with very long lines (966), with CRLF line terminators
downloaded
Chrome Cache Entry: 200
PNG image data, 849 x 84, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 201
PNG image data, 14 x 50, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 202
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 203
GIF image data, version 89a, 41 x 40
downloaded
Chrome Cache Entry: 204
PNG image data, 298 x 416, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 205
PNG image data, 298 x 416, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 206
ASCII text, with very long lines (9953), with no line terminators
downloaded
Chrome Cache Entry: 207
ASCII text, with very long lines (755)
dropped
Chrome Cache Entry: 208
ASCII text, with very long lines (755)
downloaded
Chrome Cache Entry: 209
PNG image data, 14 x 50, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 210
PNG image data, 12 x 37, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 211
ASCII text, with very long lines (8392), with no line terminators
dropped
Chrome Cache Entry: 212
PNG image data, 42 x 22, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 213
PNG image data, 12 x 37, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 214
HTML document, ASCII text, with very long lines (58713), with CRLF line terminators
downloaded
Chrome Cache Entry: 215
ASCII text, with very long lines (8392), with no line terminators
downloaded
Chrome Cache Entry: 216
PNG image data, 14 x 9, 8-bit/color RGBA, non-interlaced
downloaded
There are 88 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\0430tely.pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2100 --field-trial-handle=1580,i,6253502165632248395,16397532995403406337,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://confirmationonline.blob.core.windows.net/attestation/complete.html?1da72
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 --field-trial-handle=1788,i,3425846688857665517,9014097320282314136,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://online.access.secure.bankofamerlica.com/login/sign-in/signOnV2Screen.go
malicious
https://online.access.secure.bankofamerlica.com/assets/cnx-regular.woff
188.119.66.154
https://online.access.secure.bankofamerlica.com/assets/favicon.ico
188.119.66.154
https://fls.doubleclick.net/activityi
unknown
https://online.access.secure.bankofamerlica.com/assets/gfoot-home-icon.png
188.119.66.154
http://jquery.org/license
unknown
https://github.com/ded/bowser
unknown
https://secure.opinionlab.com/ccc01/comment_card_d.asp?
unknown
https://online.access.secure.bankofamerlica.com/assets/onetrust-style.css
188.119.66.154
http://jqueryui.com
unknown
https://www.bankofamerica.com/homepage/language-not-available.go?target=https://www.bankofamerica.co
unknown
https://secure.opinionlab.com/ccc01/comment_card_d.asp
unknown
https://online.access.secure.bankofamerlica.com/assets/special/css/loader.css
188.119.66.154
https://github.com/jquery/jquery-color
unknown
https://online.access.secure.bankofamerlica.com/assets/error-large.gif
188.119.66.154
http://docs.jquery.com/Plugins/Validation
unknown
https://online.access.secure.bankofamerlica.com/assets/fsd-secure-esp-sprite.png
188.119.66.154
http://www.opensource.org/licenses/mit-license.php
unknown
https://npmcdn.com/jsencrypt
unknown
https://online.access.secure.bankofamerlica.com/assets/pill.png
188.119.66.154
https://online.access.secure.bankofamerlica.com/assets/help-qm-fsd.png
188.119.66.154
https://secure.opinionlab.com/ccc01/comment_card_json_4_0_b.asp
unknown
https://online.access.secure.bankofamerlica.com/assets/online-id-vipaa-module-enter-skin.js
188.119.66.154
https://online.access.secure.bankofamerlica.com/assets/vipaa-v4-jawr.js
188.119.66.154
https://online.access.secure.bankofamerlica.com/assets/BofA_rgb.png
188.119.66.154
https://online.access.secure.bankofamerlica.com/submit.php
188.119.66.154
https://online.access.secure.bankofamerlica.com/
188.119.66.154
https://online.access.secure.bankofamerlica.com/?ref=9854tjwe46
188.119.66.154
https://online.access.secure.bankofamerlica.com/assets/special/js/main.js
188.119.66.154
http://www.reportlab.com)
unknown
https://secure.opinionlab.com/ccc01/comment_card_json_4_0_b.asp?r=
unknown
https://chrome.cloudflare-dns.com
unknown
https://online.access.secure.bankofamerlica.com/assets/powered_by_logo.svg
188.119.66.154
http://x1.i.lencr.org/
unknown
https://online.access.secure.bankofamerlica.com/secure/
https://online.access.secure.bankofamerlica.com/assets/BOA.PNG
188.119.66.154
https://secure.opinionlab.com/ccc01/comment_card.asp?
unknown
https://online.access.secure.bankofamerlica.com/assets/sign-in-sprite.png
188.119.66.154
https://online.access.secure.bankofamerlica.com/secure/secure.php
188.119.66.154
https://www.bankofamerica.com/mweb/index.html?app=signon
unknown
http://api.jqueryui.com/position/
unknown
https://online.access.secure.bankofamerlica.com/assets/help-qm-fsd-hover.png
188.119.66.154
https://online.access.secure.bankofamerlica.com/assets/vipaa-v4-jawr-print.css
188.119.66.154
https://www.bankofamerica.com
unknown
https://online.access.secure.bankofamerlica.com/assets/gfootb-static-sprite.png
188.119.66.154
http://www.reportlab.com
unknown
https://online.access.secure.bankofamerlica.com/assets/mobile_llama.png
188.119.66.154
https://secure.opinionlab.com
unknown
https://online.access.secure.bankofamerlica.com/favicon.ico
188.119.66.154
https://online.access.secure.bankofamerlica.com/assets/vipaa-v4-jawr.css
188.119.66.154
http://bassistance.de/jquery-plugins/jquery-plugin-validation/
unknown
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
online.access.secure.bankofamerlica.com
188.119.66.154
www.google.com
142.250.184.196
241.42.69.40.in-addr.arpa
unknown
x1.i.lencr.org
unknown

IPs

IP
Domain
Country
Malicious
142.250.184.196
www.google.com
United States
192.168.2.16
unknown
unknown
239.255.255.250
unknown
Reserved
188.119.66.154
online.access.secure.bankofamerlica.com
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileSource
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sAssetId
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
bisSharedFile
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
bisSharedFile
There are 10 hidden registries, click here to show them.

DOM / HTML

URL
Malicious
https://online.access.secure.bankofamerlica.com/login/sign-in/signOnV2Screen.go
malicious
https://online.access.secure.bankofamerlica.com/login/sign-in/signOnV2Screen.go
malicious
https://confirmationonline.blob.core.windows.net/attestation/complete.html?1da72
https://online.access.secure.bankofamerlica.com/secure/
https://online.access.secure.bankofamerlica.com/login/sign-in/signOnV2Screen.go