Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-240328172621Z-155.bmp
|
PC bitmap, Windows 3.x format, 117 x -152 x 32, cbSize 71190, bits offset 54
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeCMapFnt23.lst (copy)
|
PostScript document text
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.7056
|
PostScript document text
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
|
PostScript document text
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AcroFnt23.lst (copy)
|
PostScript document text
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AdobeFnt23.lst.7056
|
PostScript document text
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
|
SQLite 3.x database, last written using SQLite version 3040000, file counter 19, database pages 3, cookie 0x2, schema 4, UTF-8,
version-valid-for 19
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache64.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MSIe1fb1.LOG
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-03-28 18-26-19-340.log
|
ASCII text, with very long lines (393)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
|
ASCII text, with very long lines (393), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\60556eeb-e59e-45d3-87e4-880f1747450a.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\b4317e28-d561-403b-b80e-786b715422fe.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\cc837a4e-a826-465b-b42c-9e1bc6278678.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrocef_low\d4d9ebac-ba0f-4449-89b7-e3a43c469fa2.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:24:59 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:24:59 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:24:59 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:24:59 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:24:59 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\Downloads\downloaded.pdf (copy)
|
PDF document, version 1.4, 1 pages
|
dropped
|
||
C:\Users\user\Downloads\downloaded.pdf.crdownload
|
PDF document, version 1.4, 1 pages
|
dropped
|
||
Chrome Cache Entry: 161
|
XML 1.0 document, ASCII text
|
downloaded
|
||
Chrome Cache Entry: 162
|
PDF document, version 1.4, 1 pages
|
downloaded
|
There are 43 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2208 --field-trial-handle=2168,i,205359438332987707,12576120220741081305,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://click.ewellix.com/s/055-381137bc-b499-4c3a-80bb-8a9aa9cb2fe1?enr=naahiaduabyaa4yahiac6abpabsaamyan4agiadkab2aazqaouadaadcab4qa5aapiadkaboabrqa3aan4ahkadeabtaa4qan4ag4aduaaxaa3qamuahiabpaayaamaageac2absaa2qayqaguadeabyabrqanqafuagcadfaa2qaoaafuadiadbabtaamiafuageadeaazqayyafuadaaddaazqayqameageabwaa4aaniagiageadfaaxqatqaieae2abfaazaamaajeag2adbabtqaziaomac6acfab3qazianqagyadjab4aajiagiadaaccabqqa3qanmackabsaayaaqyanaagcadoabtqaziaeuadeabqabcaaziaoqagcadjabwaa4yaeuadeabqaayaamyafuadeabqaazaanaafyahaadeabtaa7aanqag6advabsaa3yanyac4adgabzaaziammagqadfab2aa5aamuaeaadhabwaa3yamiagcadmabtaa3yaouag4adeabzaa2iamuahgaboabrqa3yanuahyabrab6aaqyajiafiacfabeqaqiagaadaabraa2aaviai4ahyabqaa2qamqafuadaabraa3aanyagqageadcabsqaliageagcabsaa2qaliagqadcabwabraaliamiadsabsaazqaliaheadeabraayaamaamuagkabxaazaaniagyadkad4aayaaniaheac2abxaa2aayiammadiabzaa3aayqafuagiabvaa2qayyafuadiabrabsaayyafuagcabxaazaaoiafuageabqaa4qaziagqaggaddaa2aazqageadmabwab6aamaagaadcabnaazaaniamiadkabsaa4aayyagyac2adbabsqaniahaac2abuabqqazqageac2adcabsaamyammac2abqabrqamyamiagcadcaa3aaoaaguadeadcabsqa7aaoaaeuacuabcqasiaieadaabqaayaaqiaiyadgad4abaqa7aa"
|
||
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
|
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\downloaded.pdf"
|
||
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
|
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
|
||
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
|
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0"
--lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log"
--mojo-platform-channel-handle=2120 --field-trial-handle=1528,i,842396996072084598,1934659045707896709,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://click.ewellix.com/s/055-381137bc-b499-4c3a-80bb-8a9aa9cb2fe1?enr=naahiaduabyaa4yahiac6abpabsaamyan4agiadkab2aazqaouadaadcab4qa5aapiadkaboabrqa3aan4ahkadeabtaa4qan4ag4aduaaxaa3qamuahiabpaayaamaageac2absaa2qayqaguadeabyabrqanqafuagcadfaa2qaoaafuadiadbabtaamiafuageadeaazqayyafuadaaddaazqayqameageabwaa4aaniagiageadfaaxqatqaieae2abfaazaamaajeag2adbabtqaziaomac6acfab3qazianqagyadjab4aajiagiadaaccabqqa3qanmackabsaayaaqyanaagcadoabtqaziaeuadeabqabcaaziaoqagcadjabwaa4yaeuadeabqaayaamyafuadeabqaazaanaafyahaadeabtaa7aanqag6advabsaa3yanyac4adgabzaaziammagqadfab2aa5aamuaeaadhabwaa3yamiagcadmabtaa3yaouag4adeabzaa2iamuahgaboabrqa3yanuahyabrab6aaqyajiafiacfabeqaqiagaadaabraa2aaviai4ahyabqaa2qamqafuadaabraa3aanyagqageadcabsqaliageagcabsaa2qaliagqadcabwabraaliamiadsabsaazqaliaheadeabraayaamaamuagkabxaazaaniagyadkad4aayaaniaheac2abxaa2aayiammadiabzaa3aayqafuagiabvaa2qayyafuadiabrabsaayyafuagcabxaazaaoiafuageabqaa4qaziagqaggaddaa2aazqageadmabwab6aamaagaadcabnaazaaniamiadkabsaa4aayyagyac2adbabsqaniahaac2abuabqqazqageac2adcabsaamyammac2abqabrqamyamiagcadcaa3aaoaaguadeadcabsqa7aaoaaeuacuabcqasiaieadaabqaayaaqiaiyadgad4abaqa7aa
|
|||
https://d3odjtfu0bytz5.cloudfront.net/001-25b528c6-ae58-4af1-bd3c-0c3bab6852be/NAM%20Images/Ewellix%20Bank%20Change%20Details%2003-2024.pdf
|
|||
https://d3odjtfu0bytz5.cloudfront.net/favicon.ico
|
13.249.178.69
|
||
https://chrome.cloudflare-dns.com/dns-query
|
162.159.61.3
|
||
file:///C:/Users/user/Downloads/downloaded.pdf
|
|||
http://click.ewellix.com/s/055-381137bc-b499-4c3a-80bb-8a9aa9cb2fe1?enr=naahiaduabyaa4yahiac6abpabsaamyan4agiadkab2aazqaouadaadcab4qa5aapiadkaboabrqa3aan4ahkadeabtaa4qan4ag4aduaaxaa3qamuahiabpaayaamaageac2absaa2qayqaguadeabyabrqanqafuagcadfaa2qaoaafuadiadbabtaamiafuageadeaazqayyafuadaaddaazqayqameageabwaa4aaniagiageadfaaxqatqaieae2abfaazaamaajeag2adbabtqaziaomac6acfab3qazianqagyadjab4aajiagiadaaccabqqa3qanmackabsaayaaqyanaagcadoabtqaziaeuadeabqabcaaziaoqagcadjabwaa4yaeuadeabqaayaamyafuadeabqaazaanaafyahaadeabtaa7aanqag6advabsaa3yanyac4adgabzaaziammagqadfab2aa5aamuaeaadhabwaa3yamiagcadmabtaa3yaouag4adeabzaa2iamuahgaboabrqa3yanuahyabrab6aaqyajiafiacfabeqaqiagaadaabraa2aaviai4ahyabqaa2qamqafuadaabraa3aanyagqageadcabsqaliageagcabsaa2qaliagqadcabwabraaliamiadsabsaazqaliaheadeabraayaamaamuagkabxaazaaniagyadkad4aayaaniaheac2abxaa2aayiammadiabzaa3aayqafuagiabvaa2qayyafuadiabrabsaayyafuagcabxaazaaoiafuageabqaa4qaziagqaggaddaa2aazqageadmabwab6aamaagaadcabnaazaaniamiadkabsaa4aayyagyac2adbabsqaniahaac2abuabqqazqageac2adcabsaamyammac2abqabrqamyamiagcadcaa3aaoaaguadeadcabsqa7aaoaaeuacuabcqasiaieadaabqaayaaqiaiyadgad4abaqa7aa
|
35.82.168.99
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
chrome.cloudflare-dns.com
|
162.159.61.3
|
||
alb-uw2-ig-trans-968983241.us-west-2.elb.amazonaws.com
|
35.82.168.99
|
||
www.google.com
|
172.253.62.106
|
||
d3odjtfu0bytz5.cloudfront.net
|
13.249.178.69
|
||
click.ewellix.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
23.48.8.182
|
unknown
|
United States
|
||
13.249.178.69
|
d3odjtfu0bytz5.cloudfront.net
|
United States
|
||
192.168.2.5
|
unknown
|
unknown
|
||
162.159.61.3
|
chrome.cloudflare-dns.com
|
United States
|
||
35.82.168.99
|
alb-uw2-ig-trans-968983241.us-west-2.elb.amazonaws.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
172.253.62.106
|
www.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
aFS
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
tDIText
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
tFileName
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
tFileSource
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
sFileAncestors
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
sDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
sDate
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
uFileSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
uPageCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
sAssetId
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
|
bisSharedFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
aFS
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
tDIText
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
tFileName
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
sFileAncestors
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
sDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
sDate
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
uFileSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
uPageCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
|
bisSharedFile
|
There are 10 hidden registries, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://d3odjtfu0bytz5.cloudfront.net/001-25b528c6-ae58-4af1-bd3c-0c3bab6852be/NAM%20Images/Ewellix%20Bank%20Change%20Details%2003-2024.pdf
|
||
file:///C:/Users/user/Downloads/downloaded.pdf
|