Mensaje
por ynadre » 20 Mar 2009, 16:53
[color=#FF4000]Hola de nuevo! He probado las 3 rutas en el ELIMOVER y he encontrado esta: C:\WINDOWS\SYSTEM32\28463\AKV.exe .
La he copiado y la he enviado con el "virus total". Este es el resultado:[/color]
Análisis del archivo AKV.exe recibido el 04.03.2009 12:47:17 (CET)
Estado actual: análisis terminado
Resultado: 19/39 (48.72%)
Compactar Compactar Imprimir resultados Imprimir resultados
Motor antivirus Versión Última actualización Resultado
a-squared 4.0.0.101 2009.03.04 Trojan.Generic!IK
AhnLab-V3 5.0.0.2 2009.02.27 -
AntiVir 7.9.0.98 2009.03.04 TR/Agent.468480.A
Authentium 5.1.0.4 2009.03.04 -
Avast 4.8.1335.0 2009.03.04 Win32:Spyware-gen
AVG 8.0.0.237 2009.03.04 Ardamax.AHQ
BitDefender 7.2 2009.03.04 Spyware.3141
CAT-QuickHeal 10.00 2009.03.04 -
ClamAV 0.94.1 2009.03.04 -
Comodo 1021 2009.03.03 Unclassified Malware
DrWeb 4.44.0.09170 2009.03.04 -
eSafe 7.0.17.0 2009.03.03 Win32.Banker
eTrust-Vet 31.6.6381 2009.03.03 -
F-Prot 4.4.4.56 2009.03.04 -
F-Secure 8.0.14470.0 2009.03.04 -
Fortinet 3.117.0.0 2009.03.04 -
GData 19 2009.03.04 Spyware.3141
Ikarus T3.1.1.45.0 2009.03.04 Trojan.Generic
K7AntiVirus 7.10.656 2009.03.03 Trojan.Win32.Malware.1
Kaspersky 7.0.0.125 2009.03.04 -
McAfee 5542 2009.03.03 Keylog-Ardamax.dll
McAfee+Artemis 5542 2009.03.03 Keylog-Ardamax.dll
Microsoft 1.4405 2009.03.04 -
NOD32 3907 2009.03.04 a variant of Win32/KeyLogger.Ardamax
Norman 6.00.06 2009.03.03 -
nProtect 2009.1.8.0 2009.03.04 Trojan-Spy/W32.Agent.468480
Panda 10.0.0.10 2009.03.04 Generic Malware
PCTools 4.4.2.0 2009.03.04 Application.Ardamax_Keylogger
Prevx1 V2 2009.03.04 High Risk Worm
Rising 21.19.22.00 2009.03.04 -
SecureWeb-Gateway 6.7.6 2009.03.04 Trojan.Agent.468480.A
Sophos 4.39.0 2009.03.04 -
Sunbelt 3.2.1858.2 2009.03.02 -
Symantec 10 2009.03.04 Spyware.Ardakey
TheHacker 6.3.2.7.271 2009.03.03 -
TrendMicro 8.700.0.1004 2009.03.04 -
VBA32 3.12.10.1 2009.03.03 -
ViRobot 2009.3.4.1634 2009.03.04 -
VirusBuster 4.5.11.0 2009.03.03 -
Información adicional
File size: 468480 bytes
MD5...: 46ccfd974518e5849738449034a05a17
SHA1..: d391108816aed7ba8f7beb205ad7171c74eae6b2
SHA256: 571aae1f8a260909dbc45c67b4c547fc573c07097b36d4e18db0e36d91deccfe
SHA512: 773a40a37ebc54cbde7c40ca98001150e78da43726e475f1ee25ef869a39682c
0fcd46fb57cf6130151cd8115aa6f2c196e57414affe464fd3b137eb5b317a7a
ssdeep: 6144:y3CPF9R/a4bR55krSGKLFLtqWwxSnvAHc/0QR86ll8h/9VGC9HK:l/agR0r
SGKBLtPMEvAHL2lr
PEiD..: -
TrID..: File type identification
Generic Win/DOS Executable (49.9%)
DOS Executable Generic (49.8%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.1%)
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x1f624
timedatestamp.....: 0x48947d96 (Sat Aug 02 15:30:30 2008)
machinetype.......: 0x14c (I386)
( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x4dd39 0x4de00 6.65 235a7e6ac84d1cee6d21af7408047e18
.rdata 0x4f000 0xd5f6 0xd600 5.85 804a4b9387b6a918491f8a74e21516dd
.data 0x5d000 0x74f8 0x5200 4.52 dd1ef440628eaa4ee545c2caff38f01e
.rsrc 0x65000 0x11a68 0x11c00 4.99 043826249238381bfa19a61eead4c41a
( 10 imports )
> SHLWAPI.dll: UrlUnescapeW, PathFindExtensionW, PathRemoveFileSpecW
> COMCTL32.dll: ImageList_Replace, ImageList_SetImageCount, ImageList_Destroy, InitCommonControlsEx, CreateStatusWindowW, ImageList_Draw, ImageList_AddMasked, ImageList_LoadImageW, ImageList_GetImageCount, ImageList_Create, ImageList_Add
> SHELL32.dll: SHGetPathFromIDListW, SHBrowseForFolderW, ShellExecuteW
> KERNEL32.dll: SetLastError, lstrcpynA, lstrlenA, MulDiv, GetCurrentProcessId, GetFileSize, FileTimeToLocalFileTime, CompareFileTime, WideCharToMultiByte, FindClose, WaitForSingleObject, GetFullPathNameW, FindFirstFileW, FindNextFileW, SetFilePointer, HeapFree, HeapAlloc, GetStartupInfoW, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, Sleep, HeapSize, ExitProcess, HeapCreate, HeapDestroy, VirtualFree, GetUserDefaultLangID, HeapReAlloc, GetStdHandle, GetModuleFileNameA, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, LCMapStringW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, SetHandleCount, GetFileType, GetStartupInfoA, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, LoadLibraryA, InitializeCriticalSectionAndSpinCount, RtlUnwind, GetConsoleCP, GetConsoleMode, GetLocaleInfoA, LCMapStringA, GetStringTypeA, GetStringTypeW, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA, FlushFileBuffers, CompareStringA, CompareStringW, SetEnvironmentVariableA, GetProcessHeap, InterlockedCompareExchange, IsProcessorFeaturePresent, SetEndOfFile, GetModuleHandleA, CreateFileW, CloseHandle, ReadFile, WriteFile, InterlockedIncrement, InterlockedDecrement, DeleteCriticalSection, InitializeCriticalSection, GetModuleFileNameW, GetModuleHandleW, LoadLibraryExW, MultiByteToWideChar, lstrcmpiW, lstrcpynW, LoadLibraryW, GetLastError, GetProcAddress, FreeLibrary, GetVersionExW, FindResourceExW, FindResourceW, LoadResource, LockResource, SizeofResource, lstrcpyW, CreateThread, LeaveCriticalSection, EnterCriticalSection, GetCurrentThreadId, FlushInstructionCache, GetCurrentProcess, GetTimeFormatW, GetDateFormatW, FileTimeToSystemTime, SystemTimeToFileTime, lstrcmpW, lstrlenW, RaiseException, VirtualAlloc, VirtualQuery
> USER32.dll: DestroyMenu, ModifyMenuW, SetMenu, CreateWindowExW, GetActiveWindow, GetWindowPlacement, IsWindow, DestroyWindow, CharNextW, SetWindowPlacement, DispatchMessageW, TranslateMessage, GetMessageW, PeekMessageW, LoadBitmapW, LoadStringW, IsMenu, GetMenuItemCount, GetDC, ReleaseDC, RegisterClassExW, GetClassInfoExW, DialogBoxParamW, EndDialog, LoadImageW, wvsprintfW, LoadStringA, PostQuitMessage, SetFocus, SetRectEmpty, IsWindowVisible, SetScrollInfo, DestroyCursor, LoadMenuW, LoadAcceleratorsW, SetRect, GetDlgCtrlID, DrawFocusRect, DrawTextW, OffsetRect, DrawFrameControl, GetMessagePos, WindowFromPoint, ScrollWindowEx, GetScrollInfo, SetScrollPos, MessageBeep, TrackPopupMenuEx, MonitorFromPoint, DrawEdge, GetWindowDC, SystemParametersInfoW, RemoveMenu, CreateDialogParamW, GetFocus, FrameRect, UnhookWindowsHookEx, CallNextHookEx, GetClassNameW, SetWindowsHookExW, CharLowerW, GetKeyState, RegisterWindowMessageW, GetSubMenu, GetWindowThreadProcessId, MoveWindow, MapVirtualKeyW, GetKeyNameTextW, UnregisterClassA, GetMenu, SetMenuDefaultItem, GetMenuItemInfoW, SetMenuItemInfoW, ShowWindow, BeginPaint, EndPaint, GetCapture, CopyRect, LoadCursorW, CreatePopupMenu, IsWindowEnabled, ScreenToClient, PtInRect, EnableMenuItem, AppendMenuW, TrackPopupMenu, BeginDeferWindowPos, DeferWindowPos, EndDeferWindowPos, InflateRect, GetSystemMetrics, InvalidateRect, UpdateWindow, ReleaseCapture, GetCursorPos, SetCapture, SetCursor, FillRect, CallWindowProcW, DefWindowProcW, EnableWindow, SendMessageW, PostMessageW, GetDlgItem, MessageBoxW, GetDlgItemTextW, GetWindow, MonitorFromWindow, GetMonitorInfoW, GetWindowRect, GetParent, GetClientRect, MapWindowPoints, SetWindowTextW, SetDlgItemTextW, DestroyCaret, GetSysColor, SetWindowPos, SetWindowLongW, GetWindowLongW, GetSysColorBrush, GetWindowTextW
> GDI32.dll: PatBlt, CreatePen, CreateFontIndirectW, SetBkMode, CreateCompatibleBitmap, BitBlt, CreateDIBitmap, CreateBitmap, GetTextExtentPoint32W, CreatePatternBrush, SetViewportOrgEx, SelectObject, CreateCompatibleDC, LineTo, CreateDIBSection, MoveToEx, DeleteDC, DeleteObject, SetBrushOrgEx, SetBkColor, CreateFontW, GetStockObject, GetObjectW, SetTextColor
> COMDLG32.dll: GetOpenFileNameW, GetSaveFileNameW
> ADVAPI32.dll: RegCreateKeyExW, RegSetValueExW, RegOpenKeyExW, RegEnumKeyExW, RegQueryInfoKeyW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW
> ole32.dll: CoInitialize, CoCreateInstance, CoTaskMemAlloc, CoTaskMemRealloc, CoTaskMemFree, CoUninitialize
> OLEAUT32.dll: -
( 0 exports )
ThreatExpert info: http://www.threatexpert.com/report.aspx?md5=46ccfd974518e5849738449034a05a17
Prevx info: http://info.prevx.com/aboutprogramtext.asp?PX5=3B308A41009B14C4261C073C414CB80069189B60
CWSandbox info: http://research.sunbelt-software.com/partnerresource/MD5.aspx?md5=46ccfd974518e5849738449034a05a17