Fake

FakeAV.84 removal guide

Malware Removal

The FakeAV.84 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What FakeAV.84 virus can do?

  • Unconventionial language used in binary resources: Russian
  • The binary contains an unknown PE section name indicative of packing
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine FakeAV.84?


File Info:

name: 3BC450B96ADEF62C94D1.mlw
path: /opt/CAPEv2/storage/binaries/abd44667c3040b976c40077d0c6bdc7a066e2b60395ad58fd6450ccc009d7a11
crc32: CC1E45D5
md5: 3bc450b96adef62c94d1108a5b4fa793
sha1: 9a8cf9fd1bd7504d33aacc65c9c000f3af8b04a9
sha256: abd44667c3040b976c40077d0c6bdc7a066e2b60395ad58fd6450ccc009d7a11
sha512: 562e5f005af44264318c1e149edaa53637672790ec7f0deb2e74197bfba441a48faba2108c6a2f975a8776b8f782e7e733072297dd3137230d12064d276a7d59
ssdeep: 12288:w9522xJ/bI3kwv9uqNK8ZhfltA6v4KGYtT/W4dc4dx3CvmyblmCpdbpQ4SfIlxjI:weS03kwzlJvAeDx33JZXI/bk
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T10F255ADE8D496766D7FA06F2DFDE85A034243E02A93FF52E18B401F611E322A9DD1271
sha3_384: 459848cf9d9942391290cb787659af19dd81b1a6341201dde6aa67203562f7e332580ab7aceb70941af82fe55b70b28f
ep_bytes: 60be001060008dbe0000e0ffc787f83c
timestamp: 2011-06-14 08:26:59

Version Info:

CompanyName: BitDefender
FileDescription: BitDefender Core
FileVersion: 4.0.2.8
InternalName: Qayuej.exe
LegalCopyright: (C) WJUM Software
OriginalFilename: Jir.exe
ProductName: Jhbxnq
ProductVersion: 4.0.2.8
Translation: 0x001b 0x04b0

FakeAV.84 also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Generic.mlSX
Elasticmalicious (moderate confidence)
DrWebTrojan.FakeAV.6552
MicroWorld-eScanGen:Variant.FakeAV.84
FireEyeGeneric.mg.3bc450b96adef62c
ALYacGen:Variant.FakeAV.84
Cylanceunsafe
VIPREGen:Variant.FakeAV.84
CrowdStrikewin/malicious_confidence_70% (D)
AlibabaTrojan:Win32/Kryptik.097c9c88
K7GWTrojan ( 0028a9fd1 )
K7AntiVirusTrojan ( 0028a9fd1 )
BitDefenderThetaGen:NN.ZexaF.36164.7m0@am82bqic
VirITTrojan.Win32.Generic.EUU
CyrenW32/Ransom.O.gen!Eldorado
ESET-NOD32a variant of Win32/Kryptik.KGY
APEXMalicious
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.FakeAV.84
NANO-AntivirusTrojan.Win32.Dapato.dlyky
SUPERAntiSpywareTrojan.Agent/Gen-FakeSpy
AvastFileRepMalware [Trj]
TencentWin32.Trojan.Generic.Simw
EmsisoftGen:Variant.FakeAV.84 (B)
F-SecureHeuristic.HEUR/AGEN.1313487
ZillyaDropper.Dapato.Win32.1736
McAfee-GW-EditionFakeAV-SysDef.w
Trapminemalicious.moderate.ml.score
IkarusTrojan.Win32.FakeAV
GDataGen:Variant.FakeAV.84
WebrootW32.Rogue.Gen
AviraHEUR/AGEN.1313487
Antiy-AVLTrojan/Win32.AGeneric
XcitiumMalware@#1jt9fg3t3kj4o
ArcabitTrojan.FakeAV.84
ZoneAlarmHEUR:Trojan.Win32.Generic
MicrosoftTrojan:Win32/Wacatac.B!ml
GoogleDetected
AhnLab-V3Trojan/Win32.FakeAV.R7107
Acronissuspicious
McAfeeFakeAV-SysDef.w
MAXmalware (ai score=100)
PandaGeneric Malware
RisingAdware.FakeRean!8.1340B (TFE:5:WkXWfxCrdDH)
SentinelOneStatic AI – Suspicious PE
FortinetW32/Dapato.AJT!tr
AVGFileRepMalware [Trj]
Cybereasonmalicious.96adef
DeepInstinctMALICIOUS

How to remove FakeAV.84?

FakeAV.84 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment