IOC Report
NTADMD.DLL.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\NTADMD.DLL.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\NTADMD.DLL.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\NTADMD.DLL.dll,ServiceMain
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\NTADMD.DLL.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\NTADMD.DLL.dll",ServiceMain

URLs

Name
IP
Malicious
http://registrationeasy.com/tucson/info.html
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
890000
heap
page read and write
2DEF000
stack
page read and write
321E000
stack
page read and write
3030000
heap
page read and write
AFE000
stack
page read and write
335F000
stack
page read and write
E2F000
stack
page read and write
2B20000
heap
page read and write
C3F000
heap
page read and write
BE0000
heap
page read and write
2DCC000
stack
page read and write
2AA0000
heap
page read and write
2B80000
heap
page read and write
2B6E000
stack
page read and write
2BE0000
heap
page read and write
27F0000
heap
page read and write
2BEA000
heap
page read and write
2D8B000
stack
page read and write
83D000
stack
page read and write
2AEA000
heap
page read and write
3070000
heap
page read and write
322A000
heap
page read and write
B50000
heap
page read and write
27E0000
heap
page read and write
C30000
heap
page read and write
3430000
heap
page read and write
341D000
stack
page read and write
C54000
heap
page read and write
9ED000
stack
page read and write
3040000
heap
page read and write
880000
heap
page read and write
2AB0000
heap
page read and write
4710000
heap
page read and write
3241000
heap
page read and write
4680000
heap
page read and write
2DAE000
stack
page read and write
273B000
stack
page read and write
2E20000
heap
page read and write
277C000
stack
page read and write
C3B000
heap
page read and write
B3E000
stack
page read and write
44FF000
stack
page read and write
31DD000
stack
page read and write
33DD000
stack
page read and write
44BE000
stack
page read and write
C48000
heap
page read and write
319D000
stack
page read and write
2AE0000
heap
page read and write
2BCF000
stack
page read and write
2D6E000
stack
page read and write
27FB000
stack
page read and write
3220000
heap
page read and write
1010000
heap
page read and write
2C10000
heap
page read and write
2A3C000
stack
page read and write
2D2E000
stack
page read and write
4DB0000
heap
page read and write
F2E000
stack
page read and write
There are 48 hidden memdumps, click here to show them.