IOC Report
adaFirmar.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\adaFirmar.exe
"C:\Users\user\Desktop\adaFirmar.exe"

URLs

Name
IP
Malicious
http://albertmonter.com-0b2b9608ed53ToD
unknown
http://www.color.org;colorspace.rgb.is.not.allowed_all.the.fonts.must.be.embedded.this.one.isn.t.1Mt
unknown
http://www.aiim.org/pdfa/ns/id/
unknown
https://?1.not.found.as.file.or.resource_you.can.only.add.a.writer.to.a.pdfdocument.once
unknown
http://albertmonter.comH
unknown
http://albertmonter.comX
unknown
http://albertmonter.com
unknown
http://albertmonter.comD
unknown
http://www.xfa.org/schema/xfa-data/1.0/
unknown

Domains

Name
IP
Malicious
171.39.242.20.in-addr.arpa
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
3539000
trusted library allocation
page read and write
5950000
heap
page read and write
132E000
heap
page read and write
8769000
trusted library allocation
page read and write
1540000
heap
page read and write
8950000
heap
page execute and read and write
6FE0000
trusted library section
page read and write
3502000
trusted library allocation
page read and write
1801000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
87C6000
trusted library allocation
page read and write
1732000
trusted library allocation
page execute and read and write
350F000
trusted library allocation
page read and write
57A0000
heap
page read and write
87CC000
trusted library allocation
page read and write
7112000
trusted library allocation
page read and write
170A000
trusted library allocation
page execute and read and write
7E0000
unkown
page readonly
34F2000
trusted library allocation
page read and write
569C000
stack
page read and write
17E3000
heap
page read and write
1820000
heap
page read and write
3522000
trusted library allocation
page read and write
356F000
trusted library allocation
page read and write
1727000
trusted library allocation
page execute and read and write
1742000
trusted library allocation
page read and write
1747000
trusted library allocation
page execute and read and write
3569000
trusted library allocation
page read and write
3513000
trusted library allocation
page read and write
1320000
heap
page read and write
DCC000
unkown
page readonly
1328000
heap
page read and write
135F000
heap
page read and write
151E000
stack
page read and write
13CF000
heap
page read and write
4411000
trusted library allocation
page read and write
8930000
heap
page read and write
7F310000
trusted library allocation
page execute and read and write
17E0000
heap
page read and write
171C000
trusted library allocation
page execute and read and write
178E000
stack
page read and write
8FF0000
trusted library allocation
page read and write
1702000
trusted library allocation
page execute and read and write
34F8000
trusted library allocation
page read and write
11E0000
heap
page read and write
89A0000
unkown
page read and write
30CF000
stack
page read and write
882A000
trusted library allocation
page read and write
3411000
trusted library allocation
page read and write
58A0000
trusted library section
page readonly
1720000
trusted library allocation
page read and write
3535000
trusted library allocation
page read and write
5994000
heap
page read and write
1712000
trusted library allocation
page execute and read and write
8765000
trusted library allocation
page read and write
131E000
stack
page read and write
172A000
trusted library allocation
page execute and read and write
57B0000
heap
page read and write
5AE0000
trusted library allocation
page read and write
57D0000
heap
page read and write
3563000
trusted library allocation
page read and write
173A000
trusted library allocation
page execute and read and write
34D0000
trusted library allocation
page read and write
3515000
trusted library allocation
page read and write
87AA000
trusted library allocation
page read and write
1710000
trusted library allocation
page read and write
1722000
trusted library allocation
page read and write
3505000
trusted library allocation
page read and write
5A70000
trusted library allocation
page execute and read and write
355F000
trusted library allocation
page read and write
17DE000
stack
page read and write
16F0000
trusted library allocation
page read and write
356B000
trusted library allocation
page read and write
597E000
heap
page read and write
1524000
heap
page execute and read and write
34EA000
trusted library allocation
page read and write
5970000
heap
page read and write
3554000
trusted library allocation
page read and write
1520000
heap
page execute and read and write
354D000
trusted library allocation
page read and write
87B1000
trusted library allocation
page read and write
1083000
stack
page read and write
55B0000
trusted library allocation
page read and write
1205000
heap
page read and write
5960000
heap
page read and write
55AE000
stack
page read and write
1200000
heap
page read and write
16A0000
heap
page read and write
34E7000
trusted library allocation
page read and write
5655000
heap
page read and write
6F5F000
stack
page read and write
1740000
trusted library allocation
page read and write
7E2000
unkown
page readonly
13E7000
heap
page read and write
3558000
trusted library allocation
page read and write
1186000
stack
page read and write
DCA000
unkown
page readonly
5650000
heap
page read and write
3507000
trusted library allocation
page read and write
579D000
stack
page read and write
55C0000
trusted library allocation
page execute and read and write
353E000
trusted library allocation
page read and write
16D0000
heap
page read and write
6E5E000
stack
page read and write
875B000
trusted library allocation
page read and write
11F0000
heap
page read and write
57BE000
heap
page read and write
3548000
trusted library allocation
page read and write
3530000
trusted library allocation
page read and write
34DA000
trusted library allocation
page read and write
174B000
trusted library allocation
page execute and read and write
171A000
trusted library allocation
page execute and read and write
16D7000
heap
page read and write
There are 103 hidden memdumps, click here to show them.