Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\VALUESearch.exe
|
"C:\Users\user\Desktop\VALUESearch.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://valuesearch.co.kr/8
|
unknown
|
||
https://valuesearch.co.kr/files/publish/VALUESearchUpdater.exe
|
unknown
|
||
https://valuesearch.co.kr:443/files/publish/xlllibver.txt
|
unknown
|
||
https://valuesearch.co.kr/files/publish/xlllibver.txt
|
3.39.130.246
|
||
https://valuesearch.co.kr/files/publish/
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
valuesearch.co.kr
|
3.39.130.246
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
3.39.130.246
|
valuesearch.co.kr
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Excel\Addins\VALUESearch.XLL
|
LibraryVersion
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
AFB000
|
heap
|
page read and write
|
||
556000
|
stack
|
page read and write
|
||
B15000
|
heap
|
page read and write
|
||
2DB9000
|
direct allocation
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
2D20000
|
direct allocation
|
page read and write
|
||
30F5000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
B01000
|
heap
|
page read and write
|
||
EE7000
|
unkown
|
page read and write
|
||
2D58000
|
direct allocation
|
page read and write
|
||
2D41000
|
direct allocation
|
page read and write
|
||
2E09000
|
direct allocation
|
page read and write
|
||
2D78000
|
direct allocation
|
page read and write
|
||
B02000
|
heap
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
2D86000
|
direct allocation
|
page read and write
|
||
B25000
|
heap
|
page read and write
|
||
AFA000
|
heap
|
page read and write
|
||
2D4E000
|
direct allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
B0B000
|
heap
|
page read and write
|
||
B25000
|
heap
|
page read and write
|
||
2DF2000
|
direct allocation
|
page read and write
|
||
2DEB000
|
direct allocation
|
page read and write
|
||
B01000
|
heap
|
page read and write
|
||
2D70000
|
direct allocation
|
page read and write
|
||
EE5000
|
unkown
|
page write copy
|
||
AC0000
|
heap
|
page read and write
|
||
EEE000
|
unkown
|
page read and write
|
||
B24000
|
heap
|
page read and write
|
||
2D9B000
|
direct allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
4F60000
|
heap
|
page read and write
|
||
2E02000
|
direct allocation
|
page read and write
|
||
B01000
|
heap
|
page read and write
|
||
2D63000
|
direct allocation
|
page read and write
|
||
2DD5000
|
direct allocation
|
page read and write
|
||
EFE000
|
unkown
|
page readonly
|
||
A90000
|
heap
|
page read and write
|
||
B01000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
AC7000
|
heap
|
page read and write
|
||
2E3C000
|
direct allocation
|
page read and write
|
||
AA0000
|
direct allocation
|
page execute and read and write
|
||
2E18000
|
direct allocation
|
page read and write
|
||
C00000
|
unkown
|
page readonly
|
||
337F000
|
stack
|
page read and write
|
||
308D000
|
stack
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
2D8F000
|
direct allocation
|
page read and write
|
||
EE5000
|
unkown
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
EFD000
|
unkown
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
B0B000
|
heap
|
page read and write
|
||
B0A000
|
heap
|
page read and write
|
||
2DDD000
|
direct allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
2E4A000
|
direct allocation
|
page read and write
|
||
2DFB000
|
direct allocation
|
page read and write
|
||
2DE4000
|
direct allocation
|
page read and write
|
||
2E51000
|
direct allocation
|
page read and write
|
||
121D000
|
stack
|
page read and write
|
||
30B0000
|
remote allocation
|
page read and write
|
||
2E43000
|
direct allocation
|
page read and write
|
||
36FD000
|
stack
|
page read and write
|
||
B07000
|
heap
|
page read and write
|
||
2DCE000
|
direct allocation
|
page read and write
|
||
F00000
|
unkown
|
page readonly
|
||
B00000
|
heap
|
page read and write
|
||
2E2D000
|
direct allocation
|
page read and write
|
||
EF6000
|
unkown
|
page read and write
|
||
1236000
|
heap
|
page read and write
|
||
AB3000
|
heap
|
page read and write
|
||
34D8000
|
direct allocation
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
2E10000
|
direct allocation
|
page read and write
|
||
AFC000
|
heap
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
2D56000
|
direct allocation
|
page read and write
|
||
EF1000
|
unkown
|
page read and write
|
||
30B0000
|
remote allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
EF9000
|
unkown
|
page write copy
|
||
2E58000
|
direct allocation
|
page read and write
|
||
B1C000
|
heap
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
2D26000
|
direct allocation
|
page read and write
|
||
2E1F000
|
direct allocation
|
page read and write
|
||
B0A000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
2E26000
|
direct allocation
|
page read and write
|
||
2E34000
|
direct allocation
|
page read and write
|
||
AF5000
|
heap
|
page read and write
|
||
B16000
|
heap
|
page read and write
|
||
B1B000
|
heap
|
page read and write
|
||
2D37000
|
direct allocation
|
page read and write
|
||
AFE000
|
heap
|
page read and write
|
||
8FB000
|
stack
|
page read and write
|
||
2DAA000
|
direct allocation
|
page read and write
|
||
4F70000
|
heap
|
page read and write
|
||
30B0000
|
remote allocation
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
C01000
|
unkown
|
page execute read
|
||
B0D000
|
heap
|
page read and write
|
||
AFC000
|
heap
|
page read and write
|
There are 100 hidden memdumps, click here to show them.