Trojan.FakeAV

Trojan.FakeAV Description

Type: Trojan

Trojan.FakeAV is from a family of Trojans that assist in the spread of fake anti-spyware and anti-virus applications. Trojan.FakeAV may download malicious files onto a compromised PC and display frequent pop-ups and fake virus alerts. Trojan.FakeAV may also be associated with botnet activities. You can remove Trojan.FakeAV and its related rogueware with a trustworthy computer security program.

Aliases

15 security vendors flagged this file as malicious.

Anti-Virus Software Detection
Fortinet Vundo.DI!tr
McAfee RDN/Vundo!di
McAfee-GW-Edition Heuristic.LooksLike.Suspicious.C!85
DrWeb Trojan.Packed.22307
ClamAV Trojan.Packed-1520
AntiVir TR/Kazy.157665.27
McAfee Artemis!E1C96D405EEC
McAfee Artemis!5EA5864D4F0E
AVG Generic5.ATP
DrWeb Trojan.Siggen3.56096
BitDefender Gen:Variant.Graftor.19305
NOD32 probably a variant of Win32/Adware.WintionalityChe
McAfee FakeAlert-FCG!FF7367A2280C
Ikarus Gen.Variant.Buzy
McAfee-GW-Edition Heuristic.BehavesLike.Win32.ModifiedUPX.F

Technical Information

Screenshots & Other Imagery

SpyHunter Detects & Remove Trojan.FakeAV

File System Details

Trojan.FakeAV creates the following file(s):
# File Name MD5 Detection Count
1 uRshEirOfhWeeq.exe 96fcb1966cfe73ec750fa63aeb833a2c 43
2 file.exe 78792f32a285ad13477e8b7bc0a7f0a9 31
3 IkEJJmteVRTh.exe ef68b476e237e645e39a476b4223acf2 26
4 yBlqxAdBNPjQ.exe 5cd375d6d0e3c2195064ca2f238fff87 16
5 hintJPHiMDKXoFo.exe 694430ce427e02698d2a171e051505d1 13
6 mgqwpisksnjc.exe b06b8a9e80dd4652513f2c8c0eed0bc9 12
7 6DSS92c31Apgjk.exe c8bb019eda069f786c15a0ada1081d69 7
8 bmilntyeqvwt.exe d1e92a75cc9bb2b05632b6682e916f94 5
9 privacy.exe 8984d563ffa5df0e1ec677f77902886f 4
10 funmoods.exe a049802122120fc9e73235abe46f6dfa 4
11 IwoieKBvQMts0Y.exe 2991ddb9efed491938cc5ed00727ffb2 3
12 PvrtVtYGxyGUr.exe 346ce6d5a19dd0ab25fdef24ae06b854 2
13 ldb.exe 64e3764601487e367e1e3fadb2ceb571 2
14 oeCQY7EiohPXoI.exe 687fa80541ae0ba780222479913d0186 2
15 smss.exe 4d47c101947dba51cbe1bdfa8a8ddc31 2
16 lfpcvJMzp89Jf4.exe 0d9d22b5a3d9ddef7cfb1df83c994dfb 1
17 Dpr5RGA9j357xZ.exe 2ba45ec4d6294a5fecb2476adebf138c 1
18 rilfzsggoj.exe b5109d99e88dbe3f45de0b2ac86bffd8 1
19 efs.exe 06e72e6a3c824e4b4be31796031e6320 1
20 jga.exe f5bb253c89d2ddbf0a6e3f9808a2c500 1
21 NYdZ9m9M5y92F6.exe 14f999b381b53799f9de6cbb1e2e0f5c 1
22 7e78b158-8050.exe 579c6c85984266cd18138143c3ae9761 1
23 Protector-hjkk.exe ff7367a2280c099701d447fd2457a90e 1
24 b7116kyb2r6tse.exe 524ad9450b4cfdea69e67a620c17bf0b 1
25 rYu6h34w.exe 9b08e69b22ac5b6a897c667f733b44ff 1
26 svrwsc.exe 4f709998ed475cd6063c4b81d850e539 0
More files

Related Posts

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.