Mal/FakeAV-PY Description

Type: Adware

Some security applications stop scareware attacks proactively, detecting various sorts of payloads associated with several categories of scareware, blocking them, and displaying a Mal/FakeAV-PY detection. According to ESG security researchers, if your computer system is detecting a Mal/FakeAV-PY attack, this usually refers to a suspicious behavior which may mean that your computer system has become the target of a scareware attack. There are several types of scareware that are detected as Mal/FakeAV-PY, most of which are usually Trojans that install a fake anti-virus or defragmenter on the victim's computer system. The Mal/FakeAV-PY detection indicates that the victim's computer is the target of a popular online scam that is often the result of having visited an unsafe website, downloaded an infected file or opened an infected file attachment or link in an unsolicited email message. If your security software indicates that you are the victim of a Mal/FakeAV-PY attack, you are probably protected, but should scan your hard drive just to be on the safe side. Most modern malware attacks include various components. While your real-time malware scanner may be able to intercept some attacks, modern malware will attempt to exploit as many known vulnerabilities as possible, injecting batches of malicious files onto the victim's computer system. In fact, it is not uncommon for PC security analysts to remove hundreds of Trojans, viruses and other kinds of malware infections from a single infected drive!

Understanding Online Scams Detected as Mal/FakeAV-PY

Scareware scams are usually designed to scare inexperienced computer users in order to scam them out of their money. Some examples of scareware include the following:

  • Mal/FakeAV-PY may refer to fake anti-virus programs that detect numerous fake infections and then attempt to convince the victim to purchase a useless 'full version' in order to remove these non-existent infections. These kinds of scareware threats are known as rogue anti-virus or rogue anti-malware applications.
  • Mal/FakeAV-PY may also refer to the presence of a fake defragmenter which, in a way similar to rogue anti-virus programs, will pretend to be a legitimate computer optimization tool. However, these kinds of programs are actually designed to spam their victims with error messages claiming that their computer has several severe problems that can only be removed by purchasing a 'full version' of the rogue defragmenter.
  • Other kinds of scareware associated with Mal/FakeAV-PY are also known as ransomware, programs designed to lock the victim's computer (often claiming to be doing so on behalf of a law enforcement agency), demanding the payment of a ransom in order to return control of the infected computer.


5 security vendors flagged this file as malicious.

Anti-Virus Software Detection
Panda Suspicious file
Sophos Mal/FakeAV-PY
AntiVir TR/Crypt.ZPACK.Gen
K7AntiVirus Trojan
McAfee Artemis!9E8510765E97

Technical Information

File System Details

Mal/FakeAV-PY creates the following file(s):
# File Name MD5 Detection Count
1 xmxmrxh.exe 9e8510765e974a0042471f4ab1961ec7 1

Site Disclaimer is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.