FakeXPA is a family of rogue security applications that have been detected in the wild since 2008. Some examples of rogue security programs that belong to the FakeXPA family of fake security applications include Antivirus 2009, 2010 and 360, Total Security 2009 and 2011, Green AV, Alpha AV, Cyber Security and fake versions of E-Set and AVG anti-virus programs. ESG security researchers consider that any fake security programs on your computer system belonging to the FakeXPA family of rogue security programs pose a severe threat to your computer system's security and should be removed immediately with a real, legitimate anti-malware application.
Understanding How Fake Security Programs in the FakeXPA Family Infect Your System
Programs in the FakeXPA family of malware claim to scan the victim's computer system and display multiple fake error messages claiming that the victim's computer has fallen victim to a virus attack. These fake security programs claim that they can only remove these imaginary threats if the victims pay for a 'full version' of the rogue security program in question. Malware in the FakeXPA family are characterized because they imitate Windows Security Center closely. According to ESG security researchers, some malware in the FakeXPA family has been known to connect to a remote server and download the Alureon Trojan and rootkit and install it onto the victim's computer. These distributions of FakeXPA rogue security programs are particularly dangerous and may require a specialized anti-rootkit tool to be removed.
How FakeXPA Rogue Security Programs are Installed on the Victim's Computer System
The FakeXPA installer will usually be associated with additional malware, which will be installed on the same directory as the rogue security program itself. This malware infection will usually take the form of an executable file with the EXE extension (such as 'win.exe', for example). As part of their payload, malware belonging to the FakeXPA family will overwrite any security programs it finds on the victim's computer. They will check the victim's computer's Windows Registry in order to detect common security programs, particularly AVG, Kaspersky, Norton, McAfee and Norton. Then, these dangerous rogue security programs will overwrite portions of executable files corresponding to these legitimate security applications. This corrupts them, disabling them completely. Once the victim's security software has been disabled, FakeXPA has free rein to attack the victim's computer and cause browser redirects, block access to the victim's files and carry out its malicious scam.
File System Details
|#||File Name||Size||MD5||Detection Count|
|2||%USERPROFILE%\My Documents\Stephen\new 11\AGTwin_2005-19_b5.exe||268,800||5b934bfc6f714bdafacb620fcaee8619||29|
|8||%USERPROFILE%\My Documents\My Downloads\Alpha-Scan-32a1_2024-5.exe||172,032||f6c646da9662c3d8bcaa916ade3f461a||8|
|19||%USERPROFILE%\My Documents\Elliot\mry lafco\XPantivirus2008_v880167.exe||60,416||4bec938c17474000c588d1ae7c2ab953||2|
|22||%USERPROFILE%\My Documents\My Data Sources\Install_2018-2.exe||135,168||867da937330d28b92f1caae0ba1b7ad4||1|
This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.