MalAgent.J_90233 is a Virus. Virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive
Mutexes created
- Shell.CMruPidlList
- WininetStartupMutex
- _!MSFTHISTORY!_
- c:!documents and settings!soumy!local settings!temporary internet files!content.ie5!
- c:!documents and settings!soumy!cookies!
- c:!documents and settings!soumy!local settings!history!history.ie5!
- WininetConnectionMutex
- WininetProxyRegistryMutex
- ShimCacheMutex
Directory level activity
File level activity
Registry level activity- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersDesktop
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersFavorites
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\ShellNoRoamBagMRUNodeSlots
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\ShellNoRoamBagMRUMRUListEx
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MainWindow_Placement
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\ToolbarLocked
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCache
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsDirectory
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPaths
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath1CachePath
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath2CachePath
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath3CachePath
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath4CachePath
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath1CacheLimit
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath2CacheLimit
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath3CacheLimit
- write - registry - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CachePathsPath4CacheLimit
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCookies
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersHistory
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{0932c062-299c-11e2-afd8-806d6172696f}\BaseClass
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{0932c060-299c-11e2-afd8-806d6172696f}\BaseClass
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersAppData
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Favorites\LinksOrder
- write - registry - HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MainShowedCheckBrowser
Library level activity- load - library - C:\WINDOWS\system32\rpcss.dll
- load - library - C:\WINDOWS\system32\uxtheme.dll
- load - library - uxtheme.dll
- load - library - OLEAUT32.DLL
- load - library - oleaut32.dll
- load - library - ole32.dll
- load - library - SXS.DLL
- load - library - USER32
- load - library - C:\WINDOWS\system32\vb6chs.dll
- load - library - C:\WINDOWS\system32\MSVBVM60.DLL
- load - library - kernel32
- load - library - CLBCATQ.DLL
- load - library - KERNEL32.DLL
- load - library - C:\WINDOWS\system32\wshom.ocx
- load - library - Kernel32
- load - library - C:\WINDOWS\system32\scrrun.dll
- load - library - IEXPLORE.EXE
- load - library - SHELL32.dll
- load - library - KERNEL32
- load - library - SHELL32.DLL
- load - library - EXPLORER.EXE
- load - library - BROWSEUI.dll
- load - library - shdocvw.dll
- load - library - shell32.dll
- load - library - C:\WINDOWS\system32\browselc.dll
- load - library - COMCTL32.dll
- load - library - C:\WINDOWS\system32\SHDOCVW.dll
- load - library - appHelp.dll
- load - library - C:\WINDOWS\system32\shdocvw.dll
- load - library - SHDOCVW.dll
- load - library - OLE32.DLL
- load - library - OLEAUT32.dll
- load - library - userenv
- load - library - UxTheme.dll
- load - library - WININET.dll
- load - library - Secur32.dll
- load - library - rnaapp.exe
- load - library - C:\WINDOWS\system32\SHELL32.dll
- load - library - GDI32
- load - library - C:\WINDOWS\system32\browseui.dll
- load - library - cscui.dll
- load - library - C:\WINDOWS\System32\cscui.dll
- load - library - SETUPAPI.dll
- load - library - urlmon.dll
- load - library - C:\WINDOWS\system32\shdoclc.dll
Process API calls used
- ZwMapViewOfSection
- VirtualProtectEx
- CreateProcessInternalW
- NtCreateSection
- ZwMapViewOfSection
Registry API calls used
- NtOpenKey
- NtQueryValueKey
- RegOpenKeyExA
- RegOpenKeyExW
- RegQueryValueExW
- RegCloseKey
- RegCloseKey
System API calls used
- LdrGetDllHandle
- LdrLoadDll
- IsDebuggerPresent
- LdrGetProcedureAddress
- SetWindowsHookExA
- NtDelayExecution
- LdrGetProcedureAddress
Filesystem API calls used
- NtCreateFile
- NtQueryInformationFile
- NtSetInformationFile
- NtReadFile
- FindFirstFileExW
- NtQueryDirectoryFile
- NtQueryDirectoryFile
Network
UDP source >> destination - 192.168.30.254 >> 192.168.30.6
- 192.168.30.6 >> 192.168.30.255
TCP source >> destination - 192.168.30.6 >> 192.168.30.254
Domains: DNS Request: HTTP Request: DLL related data Number of DLL's imported = 0
|