IOC Report
dfsvc.exe

loading gif

Files

File Path
Type
Category
Malicious
dfsvc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dfsvc.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\dfsvc.exe
"C:\Users\user\Desktop\dfsvc.exe"

Memdumps

Base Address
Regiontype
Protect
Malicious
18F395D0000
heap
page execute and read and write
234F4FE000
stack
page read and write
234F2FC000
stack
page read and write
18F37AA4000
heap
page read and write
18F37910000
unkown
page readonly
18F495E3000
trusted library allocation
page read and write
7FFD9B901000
trusted library allocation
page read and write
18F37A69000
heap
page read and write
18F37D45000
heap
page read and write
18F37A00000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
234EEFE000
stack
page read and write
18F37A09000
heap
page read and write
234EBEE000
stack
page read and write
234F1FE000
stack
page read and write
18F37A3A000
heap
page read and write
234F5FE000
stack
page read and write
7FFD9B77C000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
7FFD9B764000
trusted library allocation
page read and write
234F3FE000
stack
page read and write
7FF43FD50000
trusted library allocation
page execute and read and write
234F6FA000
stack
page read and write
7FFD9B772000
trusted library allocation
page read and write
7FFD9B90B000
trusted library allocation
page read and write
234EBA3000
stack
page read and write
18F37A3E000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
18F495E8000
trusted library allocation
page read and write
18F37C30000
trusted library allocation
page read and write
18F37CB0000
heap
page read and write
18F37A28000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
18F37ACA000
heap
page read and write
18F37BD0000
heap
page read and write
18F37D05000
heap
page read and write
18F379D0000
heap
page read and write
18F37912000
unkown
page readonly
18F37D00000
heap
page read and write
18F379A0000
heap
page read and write
18F37D40000
heap
page read and write
18F37910000
unkown
page readonly
18F379B0000
heap
page read and write
18F52280000
heap
page execute and read and write
234F73E000
stack
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9B905000
trusted library allocation
page read and write
18F37A3C000
heap
page read and write
18F37A43000
heap
page read and write
234F83E000
stack
page read and write
18F37914000
unkown
page readonly
7FFD9B76D000
trusted library allocation
page execute and read and write
18F37C10000
trusted library allocation
page read and write
18F395E1000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
18F37A30000
heap
page read and write
18F495E1000
trusted library allocation
page read and write
There are 50 hidden memdumps, click here to show them.