Adware Spyware Be Gone

By GoldSparrow in Rogue Anti-Spyware Program
Translate To:

Threat Scorecard

Popularity Rank: 19,593
Threat Level: 20 % (Normal)
Infected Computers: 21
First Seen: July 24, 2009
Last Seen: August 12, 2025
OS(es) Affected: Windows

This is a fake spyware removal application aimed at tricking the user into purchacing its payed version by repeatedly generating false system security alerts. The program is usually downloaded onto the victim machine by a trojan.

SpyHunter Detects & Remove Adware Spyware Be Gone

File System Details

Adware Spyware Be Gone may create the following file(s):
# File Name MD5 Detections
1. 1dayasbg_2.53.exe a12e7302c2bed136fde31f78103ea37e 6
2. Adware Spyware Be Gone.exe dd85b3b1578ba02f6056eb48453e1105 0

Analysis Report

General information

Family Name: Adware Spyware Be Gone
Signature status: No Signature

Known Samples

MD5: 42a7a0bdbe9d20a3a0b0af433b28e632
SHA1: 0ffe20be261128cdd21b1fb87cf120cab839f96c
SHA256: 8260EDFE98F7C8B5B32F5F5E72EF99C4B8858E687E1F32529A7FDEE09522B129
File Size: 2.55 MB, 2552292 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments Created with Setup Factory 6.0
File Description Setup Application
File Version 6.0.1.4
Internal Name suf60_setup
Legal Copyright Setup Engine Copyright © 2001 - 2004 Indigo Rose Corporation
Legal Trademarks Setup Factory is a trademark of Indigo Rose Corporation.
Original Filename setup.exe
Product Name Setup Factory 6.0 Runtime
Product Version 6.0.1.4

File Traits

  • .adata
  • .aspack
  • ASPack v2.12
  • HighEntropy
  • packed
  • x86

Block Information

Total Blocks: 102
Potentially Malicious Blocks: 0
Whitelisted Blocks: 94
Unknown Blocks: 8

Visual Map

? ? ? ? ? ? 0 ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\users\user\appdata\local\temp\irimg1.bmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\irimg2.bmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\irimg3.bmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\irsetup.dat Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\irsetup.exe Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\irsetup.ini Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\suf6lng.9 Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\windows\spyware begone setup log.txt Generic Read,Write Data,Write Attributes,Write extended,Append data

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Other Suspicious
  • SetWindowsHookEx

Shell Command Execution

C:\Users\Pqppyfjw\AppData\Local\Temp\irsetup.exe

Trending

Most Viewed

Loading...