IOC Report
VALUESearch.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\VALUESearch.exe
"C:\Users\user\Desktop\VALUESearch.exe"

URLs

Name
IP
Malicious
https://valuesearch.co.kr/8
unknown
https://valuesearch.co.kr/files/publish/VALUESearchUpdater.exe
unknown
https://valuesearch.co.kr:443/files/publish/xlllibver.txt
unknown
https://valuesearch.co.kr/files/publish/xlllibver.txt
3.39.130.246
https://valuesearch.co.kr/files/publish/
unknown

Domains

Name
IP
Malicious
valuesearch.co.kr
3.39.130.246

IPs

IP
Domain
Country
Malicious
3.39.130.246
valuesearch.co.kr
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Excel\Addins\VALUESearch.XLL
LibraryVersion

Memdumps

Base Address
Regiontype
Protect
Malicious
AFB000
heap
page read and write
556000
stack
page read and write
B15000
heap
page read and write
2DB9000
direct allocation
page read and write
323F000
stack
page read and write
2D20000
direct allocation
page read and write
30F5000
heap
page read and write
B20000
heap
page read and write
B01000
heap
page read and write
EE7000
unkown
page read and write
2D58000
direct allocation
page read and write
2D41000
direct allocation
page read and write
2E09000
direct allocation
page read and write
2D78000
direct allocation
page read and write
B02000
heap
page read and write
B14000
heap
page read and write
B00000
heap
page read and write
2D86000
direct allocation
page read and write
B25000
heap
page read and write
AFA000
heap
page read and write
2D4E000
direct allocation
page read and write
1230000
heap
page read and write
5E0000
heap
page read and write
B0B000
heap
page read and write
B25000
heap
page read and write
2DF2000
direct allocation
page read and write
2DEB000
direct allocation
page read and write
B01000
heap
page read and write
2D70000
direct allocation
page read and write
EE5000
unkown
page write copy
AC0000
heap
page read and write
EEE000
unkown
page read and write
B24000
heap
page read and write
2D9B000
direct allocation
page read and write
11C0000
heap
page read and write
4F60000
heap
page read and write
2E02000
direct allocation
page read and write
B01000
heap
page read and write
2D63000
direct allocation
page read and write
2DD5000
direct allocation
page read and write
EFE000
unkown
page readonly
A90000
heap
page read and write
B01000
heap
page read and write
AB0000
heap
page read and write
AC7000
heap
page read and write
2E3C000
direct allocation
page read and write
AA0000
direct allocation
page execute and read and write
2E18000
direct allocation
page read and write
C00000
unkown
page readonly
337F000
stack
page read and write
308D000
stack
page read and write
2DC0000
direct allocation
page read and write
2D8F000
direct allocation
page read and write
EE5000
unkown
page read and write
304E000
stack
page read and write
EFD000
unkown
page read and write
5B0000
heap
page read and write
B0B000
heap
page read and write
B0A000
heap
page read and write
2DDD000
direct allocation
page read and write
5D0000
heap
page read and write
2E4A000
direct allocation
page read and write
2DFB000
direct allocation
page read and write
2DE4000
direct allocation
page read and write
2E51000
direct allocation
page read and write
121D000
stack
page read and write
30B0000
remote allocation
page read and write
2E43000
direct allocation
page read and write
36FD000
stack
page read and write
B07000
heap
page read and write
2DCE000
direct allocation
page read and write
F00000
unkown
page readonly
B00000
heap
page read and write
2E2D000
direct allocation
page read and write
EF6000
unkown
page read and write
1236000
heap
page read and write
AB3000
heap
page read and write
34D8000
direct allocation
page read and write
327E000
stack
page read and write
2E10000
direct allocation
page read and write
AFC000
heap
page read and write
313E000
stack
page read and write
30F0000
heap
page read and write
2D56000
direct allocation
page read and write
EF1000
unkown
page read and write
30B0000
remote allocation
page read and write
B00000
heap
page read and write
EF9000
unkown
page write copy
2E58000
direct allocation
page read and write
B1C000
heap
page read and write
30E0000
heap
page read and write
2D26000
direct allocation
page read and write
2E1F000
direct allocation
page read and write
B0A000
heap
page read and write
B00000
heap
page read and write
2E26000
direct allocation
page read and write
2E34000
direct allocation
page read and write
AF5000
heap
page read and write
B16000
heap
page read and write
B1B000
heap
page read and write
2D37000
direct allocation
page read and write
AFE000
heap
page read and write
8FB000
stack
page read and write
2DAA000
direct allocation
page read and write
4F70000
heap
page read and write
30B0000
remote allocation
page read and write
5B5000
heap
page read and write
C01000
unkown
page execute read
B0D000
heap
page read and write
AFC000
heap
page read and write
There are 100 hidden memdumps, click here to show them.