Systweak Spyware Library
Systweak Spyware Library text
More than 21875 spyware signatures and growing
Microsoft Gold Certified Partner
Search in:
Malware.awolaantispyware Analysis Report
Threat Submitted On: 11/1/2008 9:05:00 AM
Threat Analysed On: 11/1/2008 2:05:00 PM
Threat Updated On: 1/27/2011 6:59:51 PM
Type : Malware (General)
Symptoms of awolaantispyware
  • Program that is developed to creep into a computer system without user’s consent
  • Has the capability to amend the system settings, distort the registry and annihilate personal data
Information
Alias : not-a-virus.fraudtool.win32.awolaantispyware.to
Md5 Hash : [Not Available]
File Size : [ Not Available ]

Technical Details

Here are the Technical findings of our analysis team after analyzing this malware in detail :-

Creates the following infected Files on user's System
Note:
Delete the following Files to remove Infection
File: 0047fa16df.dat
Path : %userprofile%\application data

Md5Hash :( bytes)
File: 0048c84376.dat
Path : %userprofile%\application data

Md5Hash :( bytes)
File: 00490c1368.dat
Path : %userprofile%\application data

Md5Hash :( bytes)
File: ajolf.exe
Path : %userprofile%\application data

Md5Hash :92ed73eef6ce8229c1a3bb13c2999994 ( 14336 bytes)
File: aupya.exe
Path : %userprofile%\application data

Md5Hash :4a71fc3a0174f7da550ed10d71f9f524 ( 13824 bytes)
File: awola.exe
Path : %userprofile%\application data\awola

Skip Navigation Links.
Collapse Md5Hash :Md5Hash :
271daad4d12f0216751a60b50a8b7314 ( 489984 bytes)
351056a65ec82becfdf05ee68692b4cd ( 489474 bytes)
42ff03cdd33b37b78f1ada8679fbe6e9 ( 489474 bytes)
557b9ba05439716f235c4a422dde21fa ( 480770 bytes)
62866d92b90b87d4d6a8cb901fb714f7 ( 480768 bytes)
af4d6255ada9f6f9eb0b987fff35e448 ( 480768 bytes)
df09262f1929fdc4756709771b23421c ( 493058 bytes)
File: awola001.bas
Path : %userprofile%\application data\awola

Skip Navigation Links.
Collapse Md5Hash :Md5Hash :
254c847437d2c3d44f8f2371d36bdba1 ( 716800 bytes)
50e184bc8cd5308b3208b4e5c7c25cfe ( 716800 bytes)
d760a7b82bcf32225d652bc91433a608 ( 716800 bytes)
f7f5d191c211eb1bc523b977a8e3acbd ( 716800 bytes)
File: awola6.exe
Path : %userprofile%\application data\awola6

Skip Navigation Links.
Collapse Md5Hash :Md5Hash :
0a0d3709bbda5344b277025ec65ba5af ( 485888 bytes)
1cf08584f2a4885a4e58d7f17b4b3920 ( 485888 bytes)
36b223662f0e1564ece5fbe893bd31e7 ( 485888 bytes)
7d11ba0d2814529976ca5f42f5654024 ( 485888 bytes)
951d6526ec1e23add475cef2186d4f69 ( 485888 bytes)
cc8ccd46fc4fbae6f20f5626547ed389 ( 485888 bytes)
File: settings.ini
Path : %userprofile%\application data\awola6

Md5Hash :1de284334a9879c8ae2406f3d9df1fb5 ( 37 bytes)
File: axzoq.exe
Path : %userprofile%\application data

Md5Hash :41cfbcda968434946e62cf721d3acd8f ( 14336 bytes)
File: bmwou.exe
Path : %userprofile%\application data

Md5Hash :c769987b0299153dd4e509157b5dd041 ( 14336 bytes)
File: bryeq.exe
Path : %userprofile%\application data

Md5Hash :98c2a3c1f5d8bc713ffe20b435ae4d3c ( 14336 bytes)
File: cevsv.exe
Path : %userprofile%\application data

Md5Hash :279adc7e297cf1e4f01d39e4516e260f ( 14336 bytes)
File: cmnwo.exe
Path : %userprofile%\application data

Md5Hash :5af49d121bc1c934a8f93597cd44d416 ( 14336 bytes)
File: cotpn.exe
Path : %userprofile%\application data

Md5Hash :21a8a1aa109665993bddba7b76aae11b ( 14336 bytes)
File: cuwetxb.exe
Path : %userprofile%\application data

Md5Hash :61d5addb37851c201b61cb9cc22eed8c ( 40960 bytes)
File: dvicn.exe
Path : %userprofile%\application data

Md5Hash :17237d7bbc42297cf4ad97ec3dbff3ec ( 14336 bytes)
File: erqab.exe
Path : %userprofile%\application data

Md5Hash :5fa12297ccec43792a2ab5c4f74b366b ( 14336 bytes)
File: gwpqz.exe
Path : %userprofile%\application data

Md5Hash :7f0622d040dd494673d8ceb32d3b77a2 ( 14336 bytes)
File: inmxr.exe
Path : %userprofile%\application data

Md5Hash :c6ef266438707eebd7f29a932fe06641 ( 14336 bytes)
File: ipjso.exe
Path : %userprofile%\application data

Md5Hash :d5218868dae3eed80a681aa661841180 ( 14336 bytes)
File: joknu.exe
Path : %userprofile%\application data

Md5Hash :54997fd346bd718fc7c4867842937d74 ( 14336 bytes)
File: jucku.exe
Path : %userprofile%\application data

Md5Hash :de662b139b7346be299f6ac1ff606181 ( 13824 bytes)
File: kfcsw.exe
Path : %userprofile%\application data

Md5Hash :6d14a6d830c8afaa0882dc413b440a75 ( 14336 bytes)
File: kigrg.exe
Path : %userprofile%\application data

Md5Hash :92f5911e08f84c7b7566d6a77a2508bb ( 14336 bytes)
File: lvzot.exe
Path : %userprofile%\application data

Md5Hash :f98eb1911a6979833404cc22be3cb92f ( 14336 bytes)
File: mdymd.exe
Path : %userprofile%\application data

Md5Hash :e4996c5764216a6b3d1e2778d0404dca ( 14336 bytes)
File: mzuzjy.exe
Path : %userprofile%\application data

Md5Hash :ce1de12d7636728899006567b468e98e ( 12800 bytes)
File: nlyll.exe
Path : %userprofile%\application data

Md5Hash :54997fd346bd718fc7c4867842937d74 ( 14336 bytes)
File: nwiuk.exe
Path : %userprofile%\application data

Md5Hash :365d664f2869a9470d6d368435df50e0 ( 14336 bytes)
File: oqadf.exe
Path : %userprofile%\application data

Md5Hash :56e36440019b9a325b415d851dd3c4ab ( 14336 bytes)
File: psaks.exe
Path : %userprofile%\application data

Md5Hash :7f0622d040dd494673d8ceb32d3b77a2 ( 14336 bytes)
File: qcvml.exe
Path : %userprofile%\application data

Md5Hash :5af49d121bc1c934a8f93597cd44d416 ( 14336 bytes)
File: rewks.exe
Path : %userprofile%\application data

Md5Hash :9c2899dd5d27da89ff9cd83255deeab9 ( 14336 bytes)
File: rhwcq.exe
Path : %userprofile%\application data

Md5Hash :1596b39cc2c6d44c7c4a787534a3d9fe ( 14336 bytes)
File: rqnvr.exe
Path : %userprofile%\application data

Md5Hash :56486bac7e5f3634f7667538e74c8612 ( 23552 bytes)
File: rvbzq.exe
Path : %userprofile%\application data

Md5Hash :6d14a6d830c8afaa0882dc413b440a75 ( 14336 bytes)
File: scjtk.exe
Path : %userprofile%\application data

Md5Hash :282f183b1549ceb0a303f51685e7f73c ( 14336 bytes)
File: spcsg.exe
Path : %userprofile%\application data

Md5Hash :593e2c03d174bc0bb21fa063d8aed21b ( 14336 bytes)
File: ultoi.exe
Path : %userprofile%\application data

Md5Hash :4ef0581a8f99a33e549f535ecf4ca205 ( 13824 bytes)
File: vnpeo.exe
Path : %userprofile%\application data

Md5Hash :56e36440019b9a325b415d851dd3c4ab ( 14336 bytes)
File: vnxgzt.exe
Path : %userprofile%\application data

Md5Hash :d16e993adb565b61ccab34fe0fd94698 ( 19456 bytes)
File: wstyh.exe
Path : %userprofile%\application data

Md5Hash :5fa12297ccec43792a2ab5c4f74b366b ( 14336 bytes)
File: wwxroze.exe
Path : %userprofile%\application data

Md5Hash :2f141c6d8388f8d140113acfdeaff1d3 ( 6656 bytes)
File: ynmga.exe
Path : %userprofile%\application data

Md5Hash :3a2fab9e63439076a55df63074df95a2 ( 14336 bytes)
File: yoszh.exe
Path : %userprofile%\application data

Md5Hash :d190f081f7a1ebbee9c93353adb232d6 ( 32768 bytes)
File: zinaps.exe
Path : %userprofile%\application data\zinaps2008

Md5Hash :601580ef7d062692c8f37b570490b963 ( 384512 bytes)
File: znmgj.exe
Path : %userprofile%\application data

Md5Hash :da65254ce4bded5033f8f4575d4c09c9 ( 14336 bytes)
File: awola anti-spyware 6.0.lnk
Path : %userprofile%\start menu\programs\awola

Skip Navigation Links.
Collapse Md5Hash :Md5Hash :
0773f2750e7c7ddb79f8777eb55243fa ( 914 bytes)
2066e57f4b2b343ae831a927cd705bf2 ( 821 bytes)
432f1308a06b90e55d63e6b7837947bb ( 914 bytes)
936363f90737f6a97065812f4cb36e18 ( 914 bytes)
b94f5f38b340b27574c1f03b90b80ca0 ( 914 bytes)
f8a2724ccde917f903670a225a9d850b ( 914 bytes)
File: uninstall awola anti-spyware 6.0.lnk
Path : %userprofile%\start menu\programs\awola

Skip Navigation Links.
Collapse Md5Hash :Md5Hash :
01897975119925a67f90b29eb89ded53 ( 1759 bytes)
01b434b06df5a0f7e6dc7b314446387e ( 1872 bytes)
1e166c328715e00981bca35893441e6f ( 1872 bytes)
58fe9dbb8f0b37a13a3d590cf80195c6 ( 1872 bytes)
85c003276f4aa334052806b905eb5aff ( 1872 bytes)
b55f91960d55ac3fd037f9dde9e4ef00 ( 1872 bytes)
File: uninstall zinaps anti-spyware 2008.lnk
Path : %userprofile%\start menu\programs\zinaps2008

Md5Hash :42019035ac7035e184e9f8074b002bb9 ( 1924 bytes)
File: zinaps anti-spyware 2008.lnk
Path : %userprofile%\start menu\programs\zinaps2008

Md5Hash :62f69fc67c4276dc407788199120215e ( 954 bytes)
File: [randomname].exe
Path : %workingdir%

Skip Navigation Links.
Collapse Md5Hash :Md5Hash :
0a0d3709bbda5344b277025ec65ba5af ( 485888 bytes)
1596b39cc2c6d44c7c4a787534a3d9fe ( 14336 bytes)
17237d7bbc42297cf4ad97ec3dbff3ec ( 14336 bytes)
1cf08584f2a4885a4e58d7f17b4b3920 ( 485888 bytes)
21a8a1aa109665993bddba7b76aae11b ( 14336 bytes)
271daad4d12f0216751a60b50a8b7314 ( 489984 bytes)
279adc7e297cf1e4f01d39e4516e260f ( 14336 bytes)
282f183b1549ceb0a303f51685e7f73c ( 14336 bytes)
2f141c6d8388f8d140113acfdeaff1d3 ( 6656 bytes)
2fae16fa3e3aad65a4587794d23ae625 ( 35328 bytes)
351056a65ec82becfdf05ee68692b4cd ( 489474 bytes)
365d664f2869a9470d6d368435df50e0 ( 14336 bytes)
36b223662f0e1564ece5fbe893bd31e7 ( 485888 bytes)
3a2fab9e63439076a55df63074df95a2 ( 14336 bytes)
41cfbcda968434946e62cf721d3acd8f ( 14336 bytes)
42ff03cdd33b37b78f1ada8679fbe6e9 ( 489474 bytes)
4a71fc3a0174f7da550ed10d71f9f524 ( 13824 bytes)
4ef0581a8f99a33e549f535ecf4ca205 ( 13824 bytes)
54997fd346bd718fc7c4867842937d74 ( 14336 bytes)
557b9ba05439716f235c4a422dde21fa ( 480770 bytes)
56486bac7e5f3634f7667538e74c8612 ( 23552 bytes)
56e36440019b9a325b415d851dd3c4ab ( 14336 bytes)
593e2c03d174bc0bb21fa063d8aed21b ( 14336 bytes)
5af49d121bc1c934a8f93597cd44d416 ( 14336 bytes)
5fa12297ccec43792a2ab5c4f74b366b ( 14336 bytes)
601580ef7d062692c8f37b570490b963 ( 384512 bytes)
61d5addb37851c201b61cb9cc22eed8c ( 40960 bytes)
62866d92b90b87d4d6a8cb901fb714f7 ( 480768 bytes)
6d14a6d830c8afaa0882dc413b440a75 ( 14336 bytes)
7d11ba0d2814529976ca5f42f5654024 ( 485888 bytes)
7f0622d040dd494673d8ceb32d3b77a2 ( 14336 bytes)
92ed73eef6ce8229c1a3bb13c2999994 ( 14336 bytes)
92f5911e08f84c7b7566d6a77a2508bb ( 14336 bytes)
951d6526ec1e23add475cef2186d4f69 ( 485888 bytes)
98c2a3c1f5d8bc713ffe20b435ae4d3c ( 14336 bytes)
9c2899dd5d27da89ff9cd83255deeab9 ( 14336 bytes)
a66cea1b6c029880dc64f867a4893392 ( 28974 bytes)
af4d6255ada9f6f9eb0b987fff35e448 ( 480768 bytes)
c6ef266438707eebd7f29a932fe06641 ( 14336 bytes)
c769987b0299153dd4e509157b5dd041 ( 14336 bytes)
cc8ccd46fc4fbae6f20f5626547ed389 ( 485888 bytes)
ce1de12d7636728899006567b468e98e ( 12800 bytes)
d16e993adb565b61ccab34fe0fd94698 ( 19456 bytes)
d190f081f7a1ebbee9c93353adb232d6 ( 32768 bytes)
d5218868dae3eed80a681aa661841180 ( 14336 bytes)
da65254ce4bded5033f8f4575d4c09c9 ( 14336 bytes)
de662b139b7346be299f6ac1ff606181 ( 13824 bytes)
df09262f1929fdc4756709771b23421c ( 493058 bytes)
e4996c5764216a6b3d1e2778d0404dca ( 14336 bytes)
f98eb1911a6979833404cc22be3cb92f ( 14336 bytes)
The following Registry Values are added to the provided Registry Keys :-
Note:
Delete the added Values from the Key to remove Infection
|__ Value Added :
awola = ""%userprofile%\application data\awola\awola.exe" /min"
|__ Value Added :
Awola = ""%USERPROFILE%\Application Data\Awola\Awola.exe" /MIN"
|__ Value Added :
awola6 = ""%userprofile%\application data\awola6\awola6.exe" /min"
|__ Value Added :
awola6 = ""%userprofile%\application data\awola6\awola6.exe" /min"
|__ Value Added :
microsft windows adapter 5.1.3013 = "%userprofile%\application data\cuwetxb.exe"
|__ Value Added :
microsft windows adapter 5.1.3013 = "%userprofile%\application data\mzuzjy.exe"
|__ Value Added :
microsft windows adapter 5.1.3013 = "%userprofile%\application data\vnxgzt.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\ajolf.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\aupya.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\axzoq.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\bmwou.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\bryeq.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\cevsv.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\cotpn.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\dvicn.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\inmxr.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\ipjso.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\jucku.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\kigrg.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\lvzot.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\mdymd.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\nlyll.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\nwiuk.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\psaks.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\qcvml.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\rewks.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\rhwcq.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\rqnvr.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\rvbzq.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\scjtk.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\spcsg.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\ultoi.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\vnpeo.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\wstyh.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\wwxroze.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\ynmga.exe"
|__ Value Added :
microsoft windows adapter 5.1.3214 = "%userprofile%\application data\yoszh.exe"
|__ Value Added :
zinaps2008 = ""%userprofile%\application data\zinaps2008\zinaps.exe" /min"

NOTE:

1. %userprofile% Refers to the windows current user's profile folder. By default it is 'C:\Documents and Settings\[user]'
2. %workingdir% Refers to the current directory in which user is working.

Important: We strongly recommend that you backup the Registry before making any changes to it. Incorrect changes to the Registry can result in permanent data loss or corrupted Files. Modify the malicious\suspicious Subkeys only.

Click Here for more spywarelib.com recommended PC Security and Optimization Tools

To modify registry entries in Windows Operating System:
Follow Steps:
1. Click Start > Run
2. Type “regedit” : to open registry editor
3. Navigate to required registry Key from the Left Tree control and modify accordingly.


Microsoft Gold Certified Partner

© Systweak Inc., 1999-2011 All rights reserved.