IOC Report
FastMath.dll.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\FastMath.dll.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\FastMath.dll.dll",#1
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\FastMath.dll.dll",#1

Memdumps

Base Address
Regiontype
Protect
Malicious
8403BEE000
stack
page read and write
8403E7F000
stack
page read and write
210EA19C000
heap
page read and write
CA646FF000
stack
page read and write
8403EFE000
stack
page read and write
210EA195000
heap
page read and write
25BDDF20000
heap
page read and write
210ED840000
trusted library allocation
page read and write
210ED6E0000
heap
page read and write
210EA0E0000
heap
page read and write
25BDE000000
heap
page read and write
210EA385000
heap
page read and write
25BDE040000
heap
page read and write
210ED6C0000
heap
page read and write
25BDE080000
heap
page read and write
25BDFD90000
heap
page read and write
8403B6F000
stack
page read and write
210EA150000
heap
page read and write
CA645FF000
stack
page read and write
210EA38B000
heap
page read and write
210EA18F000
heap
page read and write
210EA1A4000
heap
page read and write
210EA18F000
heap
page read and write
25BDE0E9000
heap
page read and write
210EA0F0000
heap
page read and write
210EA198000
heap
page read and write
25BDE040000
heap
page read and write
210EA18C000
heap
page read and write
210ED6C3000
heap
page read and write
25BDE11E000
heap
page read and write
25BDE0F8000
heap
page read and write
25BDE106000
heap
page read and write
25BDE0E0000
heap
page read and write
25BDE120000
heap
page read and write
210EA198000
heap
page read and write
8403AD6000
stack
page read and write
210EA16D000
heap
page read and write
210EA19D000
heap
page read and write
210EA1A1000
heap
page read and write
210EA18F000
heap
page read and write
CA644E6000
stack
page read and write
210EA18F000
heap
page read and write
25BDE0ED000
heap
page read and write
210EA1A1000
heap
page read and write
210EBE70000
heap
page read and write
210EA380000
heap
page read and write
210EA198000
heap
page read and write
210EA110000
heap
page read and write
210EA184000
heap
page read and write
210EA185000
heap
page read and write
210EA198000
heap
page read and write
210EA198000
heap
page read and write
210EA158000
heap
page read and write
There are 43 hidden memdumps, click here to show them.