IOC Report
101_Labs_Cisco_CCNA.pdf

loading gif

Files

File Path
Type
Category
Malicious
101_Labs_Cisco_CCNA.pdf
PDF document, version 1.4, 9 pages
initial sample
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0786087c3c360803_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0998db3a32ab3f41_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0ace9ee3d914a5c0_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0f25049d69125b1e_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\230e5fe3e6f82b2c_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2798067b152b83c7_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2a426f11fd8ebe18_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\39c14c1f4b086971_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\3a4ae3940784292a_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4a0e94571d979b3c_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\560e9c8bff5008d8_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\56c4cd218555ae2b_0
data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\6267ed4d4a13f54b_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\6fb6d030c4ebbc21_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\7120c35b509b0fae_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\71febec55d5c75cd_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\86b8040b7132b608_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c159cc5880890bc_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c84d92a9dbce3e0_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8e417e79df3bf0e9_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\91cec06bb2836fa5_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\927a1596c37ebe5e_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\92c56fa2a6c4d5ba_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\946896ee27df7947_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\983b7a3da8f39a46_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\aba6710fde0876af_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\b6d5deb4812ac6e9_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bba29d2e6197e2f4_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bf0ac66ae1eb4a7f_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\cf3e34002cde7e9c_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d449e58cb15daaf1_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d88192ac53852604_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\de789e80edd740d6_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f0cf6dfa8a1afa3d_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f4a0d4ca2f3b95da_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f941376b2efdd6e6_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f971b7eda7fa05c3_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fd17b2d8331c91e8_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fdd733564de6fbcb_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\febb41df4ea2b63a_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\temp-index
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index~RF685385.TMP (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\todelete_05349744be1ad4ad_0_1 (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\todelete_0998db3a32ab3f41_0_1 (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\todelete_56c4cd218555ae2b_0_1 (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\todelete_91cec06bb2836fa5_0_1 (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\todelete_927a1596c37ebe5e_0_1 (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\todelete_aba6710fde0876af_0_1 (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\todelete_f0cf6dfa8a1afa3d_0_1 (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old~RF67e0a6.TMP (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Visited Links
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-230108235837Z-455.bmp
PC bitmap, Windows 3.x format, 117 x -152 x 32, cbSize 71190, bits offset 54
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3024000, file counter 12, database pages 15, cookie 0x5, schema 4, UTF-8, version-valid-for 12
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\ES_session_store
data
dropped
There are 50 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\Desktop\101_Labs_Cisco_CCNA.pdf
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043

URLs

Name
IP
Malicious
http://www.howtonetwork.com/)
unknown
https://www.101labs.net/)
unknown
http://www.in60days.com/)
unknown
http://www.101labs.net/resources)
unknown
https://calibre-ebook.com
unknown
http://www.101labs.net/)
unknown
http://www.mypage.com/)
unknown
https://www.onworks.net/)
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
aFS
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
tDIText
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
tFileName
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
tFileSource
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
sFileAncestors
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
sDI
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
sDate
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
uFileSize
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
uPageCount
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
aFS
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
tDIText
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
tFileName
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
sFileAncestors
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
sDI
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
sDate
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6FDE87F000
stack
page read and write
22C13273000
heap
page read and write
15A36868000
heap
page read and write
6FDE67F000
stack
page read and write
22C13A02000
trusted library allocation
page read and write
207F9480000
heap
page read and write
6FDE77C000
stack
page read and write
3279D3C000
stack
page read and write
EB9C79B000
stack
page read and write
F0C617F000
stack
page read and write
F0C657E000
stack
page read and write
324A9CB000
stack
page read and write
15A37122000
heap
page read and write
1F94C1E0000
trusted library allocation
page read and write
24F44C02000
trusted library allocation
page read and write
26B60802000
heap
page read and write
4313DFA000
stack
page read and write
24F44502000
heap
page read and write
90FA0BB000
stack
page read and write
15A37100000
heap
page read and write
15A37154000
heap
page read and write
22C1327D000
heap
page read and write
EB9CD7E000
stack
page read and write
24F4446E000
heap
page read and write
4313A7E000
stack
page read and write
26B60848000
heap
page read and write
6FDE47B000
stack
page read and write
22C1324E000
heap
page read and write
22C13267000
heap
page read and write
24F44513000
heap
page read and write
90FA7FE000
stack
page read and write
22C131C0000
trusted library allocation
page read and write
22C13302000
heap
page read and write
207F9F00000
heap
page read and write
22C1325E000
heap
page read and write
22C13241000
heap
page read and write
1F94C010000
heap
page read and write
26B6082A000
heap
page read and write
15A37002000
heap
page read and write
22C13262000
heap
page read and write
15A366A0000
heap
page read and write
22C13261000
heap
page read and write
F0C627F000
stack
page read and write
22C13202000
heap
page read and write
43134CB000
stack
page read and write
19138150000
trusted library allocation
page read and write
207F9666000
heap
page read and write
15A3682A000
heap
page read and write
22C13269000
heap
page read and write
19138180000
remote allocation
page read and write
22C1325F000
heap
page read and write
90FA5FE000
stack
page read and write
F0C607E000
stack
page read and write
19138229000
heap
page read and write
324B07F000
stack
page read and write
22C13240000
heap
page read and write
90FA57C000
stack
page read and write
15A37102000
heap
page read and write
22C13264000
heap
page read and write
4313EFF000
stack
page read and write
17DCD413000
heap
page read and write
1F94C23B000
heap
page read and write
1F94C22F000
heap
page read and write
AE0C47B000
stack
page read and write
26B60918000
heap
page read and write
22C13213000
heap
page read and write
AE0C27B000
stack
page read and write
90FA47E000
stack
page read and write
17DCD2B0000
heap
page read and write
324B17E000
stack
page read and write
207F9640000
heap
page read and write
19138241000
heap
page read and write
6FDE2FC000
stack
page read and write
17DCD310000
heap
page read and write
24F442E0000
heap
page read and write
207F96E1000
heap
page read and write
207F9664000
heap
page read and write
22C13283000
heap
page read and write
17DCD46F000
heap
page read and write
26B60902000
heap
page read and write
EB9CF7F000
stack
page read and write
324B57F000
stack
page read and write
15A37200000
heap
page read and write
19138180000
remote allocation
page read and write
22C1323C000
heap
page read and write
17DCD45A000
heap
page read and write
43138FB000
stack
page read and write
26B62270000
trusted library allocation
page read and write
17DCD47E000
heap
page read and write
17DCD402000
heap
page read and write
15A37122000
heap
page read and write
207F9702000
heap
page read and write
207F95F0000
trusted library allocation
page read and write
24F44500000
heap
page read and write
15A3688D000
heap
page read and write
17DCD464000
heap
page read and write
26B60900000
heap
page read and write
AE0C17B000
stack
page read and write
1F94C200000
heap
page read and write
22C130C0000
heap
page read and write
15A369B9000
heap
page read and write
AE0BE7B000
stack
page read and write
19137FF0000
heap
page read and write
26B607B0000
heap
page read and write
19137FE0000
heap
page read and write
EB9CE7E000
stack
page read and write
17DCD423000
heap
page read and write
15A3683C000
heap
page read and write
19138050000
heap
page read and write
207F94F0000
heap
page read and write
22C13279000
heap
page read and write
324B27F000
stack
page read and write
17DCD476000
heap
page read and write
324ADFB000
stack
page read and write
4313BF9000
stack
page read and write
22C1323A000
heap
page read and write
1F94BFB0000
heap
page read and write
24F4443C000
heap
page read and write
6FDE17F000
stack
page read and write
15A371BF000
heap
page read and write
22C13263000
heap
page read and write
1F94C202000
heap
page read and write
324B67F000
stack
page read and write
6FDE3FD000
stack
page read and write
6FDE27F000
stack
page read and write
15A36886000
heap
page read and write
207F96BD000
heap
page read and write
207F966D000
heap
page read and write
90FA97D000
stack
page read and write
1F94C213000
heap
page read and write
1F94BFC0000
heap
page read and write
19138180000
remote allocation
page read and write
22C13258000
heap
page read and write
22C13242000
heap
page read and write
22C13248000
heap
page read and write
26B60870000
heap
page read and write
90FAA7D000
stack
page read and write
22C1325C000
heap
page read and write
26B60858000
heap
page read and write
22C13257000
heap
page read and write
24F44340000
heap
page read and write
22C13234000
heap
page read and write
17DCD502000
heap
page read and write
17DCD465000
heap
page read and write
22C13276000
heap
page read and write
17DCD400000
heap
page read and write
207F9F32000
heap
page read and write
24F44454000
heap
page read and write
15A36875000
heap
page read and write
207F9613000
heap
page read and write
327A47E000
stack
page read and write
207F9490000
heap
page read and write
F0C5EFC000
stack
page read and write
15A36E80000
trusted library allocation
page read and write
19138202000
heap
page read and write
24F442D0000
heap
page read and write
26B62402000
trusted library allocation
page read and write
22C13256000
heap
page read and write
15A36E60000
trusted library allocation
page read and write
207F9688000
heap
page read and write
15A37143000
heap
page read and write
19138213000
heap
page read and write
F0C647D000
stack
page read and write
327A37E000
stack
page read and write
26B60750000
heap
page read and write
1F94C229000
heap
page read and write
207F96CE000
heap
page read and write
15A37196000
heap
page read and write
22C13259000
heap
page read and write
17DCD454000
heap
page read and write
324B77F000
stack
page read and write
15A36913000
heap
page read and write
EB9CA7E000
stack
page read and write
207F9629000
heap
page read and write
24F44370000
trusted library allocation
page read and write
26B60913000
heap
page read and write
F0C667D000
stack
page read and write
24F44428000
heap
page read and write
17DCD2A0000
heap
page read and write
26B60813000
heap
page read and write
15A37223000
heap
page read and write
327A17E000
stack
page read and write
EB9CC7E000
stack
page read and write
19138257000
heap
page read and write
90FA87E000
stack
page read and write
24F44479000
heap
page read and write
324B87E000
stack
page read and write
1F94C23E000
heap
page read and write
1F94C246000
heap
page read and write
F0C637C000
stack
page read and write
26B60889000
heap
page read and write
22C13274000
heap
page read and write
26B60740000
heap
page read and write
15A37227000
heap
page read and write
4313B7C000
stack
page read and write
26B62360000
remote allocation
page read and write
26B622A0000
trusted library allocation
page read and write
324B47F000
stack
page read and write
207F9E02000
heap
page read and write
1F94C302000
heap
page read and write
22C13229000
heap
page read and write
22C13060000
heap
page read and write
19138200000
heap
page read and write
15A36800000
heap
page read and write
15A37230000
heap
page read and write
15A369E5000
heap
page read and write
4313CFF000
stack
page read and write
22C13227000
heap
page read and write
F0C5ADB000
stack
page read and write
22C1326C000
heap
page read and write
26B607E0000
trusted library allocation
page read and write
17DCD513000
heap
page read and write
17DCDC02000
trusted library allocation
page read and write
1F94C24A000
heap
page read and write
EB9CAFE000
stack
page read and write
15A36843000
heap
page read and write
22C13255000
heap
page read and write
26B62360000
remote allocation
page read and write
1913825F000
heap
page read and write
22C13200000
heap
page read and write
1F94C802000
trusted library allocation
page read and write
26B6086B000
heap
page read and write
90FA6FF000
stack
page read and write
207F9600000
heap
page read and write
26B60858000
heap
page read and write
22C13231000
heap
page read and write
15A36813000
heap
page read and write
6FDE57D000
stack
page read and write
17DCD429000
heap
page read and write
26B60857000
heap
page read and write
15A3698E000
heap
page read and write
15A36893000
heap
page read and write
24F44402000
heap
page read and write
24F44413000
heap
page read and write
26B60862000
heap
page read and write
15A37213000
heap
page read and write
22C1327A000
heap
page read and write
22C1326A000
heap
page read and write
19138A02000
trusted library allocation
page read and write
26B60800000
heap
page read and write
15A37202000
heap
page read and write
22C13050000
heap
page read and write
15A36856000
heap
page read and write
15A36690000
heap
page read and write
6FDDB9C000
stack
page read and write
17DCD43D000
heap
page read and write
15A371B1000
heap
page read and write
26B622E0000
trusted library allocation
page read and write
26B60840000
heap
page read and write
6FDDFFB000
stack
page read and write
19138302000
heap
page read and write
24F44400000
heap
page read and write
24F4445F000
heap
page read and write
15A36878000
heap
page read and write
207F96C7000
heap
page read and write
324B37D000
stack
page read and write
1F94C255000
heap
page read and write
22C13260000
heap
page read and write
26B62360000
remote allocation
page read and write
26B60848000
heap
page read and write
15A37173000
heap
page read and write
207F9713000
heap
page read and write
AE0C37E000
stack
page read and write
24F44475000
heap
page read and write
15A36700000
heap
page read and write
15A36895000
heap
page read and write
17DCDA70000
trusted library allocation
page read and write
4313F7F000
stack
page read and write
26B60847000
heap
page read and write
4313FFE000
stack
page read and write
22C1325A000
heap
page read and write
15A371C7000
heap
page read and write
324AF7C000
stack
page read and write
327A279000
stack
page read and write
15A36865000
heap
page read and write
15A36859000
heap
page read and write
There are 266 hidden memdumps, click here to show them.