Fake

Rogue:Win32/FakeXPA removal guide

Malware Removal

The Rogue:Win32/FakeXPA is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Rogue:Win32/FakeXPA virus can do?

  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Dynamic (imported) function loading detected
  • Performs HTTP requests potentially not found in PCAP.
  • HTTPS urls from behavior.
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Attempts to modify proxy settings

How to determine Rogue:Win32/FakeXPA?


File Info:

name: F33980154D296F4701FC.mlw
path: /opt/CAPEv2/storage/binaries/ffcff6d889e85b1d2391bf87eb113fbc74edcdd2ead32375d7d9805b4146d152
crc32: 149ECA1B
md5: f33980154d296f4701fcca18e9371259
sha1: b02539e42e403d4c438d8c5813b904987bfe9fdf
sha256: ffcff6d889e85b1d2391bf87eb113fbc74edcdd2ead32375d7d9805b4146d152
sha512: 19e44b107dfbba6ef5899934f73775cd4543b20d05826e2794dd5b485f5967d4c262ef8f714b1fafebc2b61bb75566469900939c86d36e9dd76d6b0341ce38c8
ssdeep: 1536:7+gesn+FcYFG1XfM6aIpUK+TvqQOPKybix9E/O:7+tFJwPM6vpUXrUbGx9U
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1625302781144FEFFC27285321F7AE1182D4B94FA0FD45654A989953E1FBA6E9060C836
sha3_384: 95496c4e2170eef827c17d6d8c67b0ff8f06988424d05dc085ed13e7a46f1391c6e6fd71f7a8176d5a951dd41fcf05be
ep_bytes: 60be00d041008dbe0040feff5783cdff
timestamp: 1992-06-19 22:22:17

Version Info:

0: [No Data]

Rogue:Win32/FakeXPA also known as:

BkavW32.AIDetect.malware2
LionicWorm.Win32.Zhelatin.kYUb
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.FakeAlert.RZ
FireEyeGeneric.mg.f33980154d296f47
McAfeeGeneric.bmh
CylanceUnsafe
SangforTrojan.Win32.FraudLoad.gen
K7AntiVirusAdware ( 004cda521 )
AlibabaAdWare:Win32/Delphi.02c3a895
K7GWAdware ( 004cda521 )
Cybereasonmalicious.54d296
VirITTrojan.Win32.Fakealert.BT
CyrenW32/FakeAlert.EP.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32Win32/Adware.XPAntivirus
APEXMalicious
Paloaltogeneric.ml
ClamAVWin.Trojan.Xpantivirus-9877988-0
KasperskyHEUR:Trojan-Downloader.Win32.FraudLoad.gen
BitDefenderTrojan.FakeAlert.RZ
NANO-AntivirusTrojan.Win32.FakeAV.bbmejk
AvastFileRepMalware
TencentWin32.Trojan-downloader.Fraudload.Eamr
Ad-AwareTrojan.FakeAlert.RZ
SophosTroj/FakeVir-BL
ComodoApplicUnsaf.Win32.Fakeav.dy01@4nbfcf
DrWebTrojan.Fakealert
ZillyaTrojan.XPAntivirus.Win32.8
TrendMicroTROJ_GEN.R002C0CLB21
McAfee-GW-EditionBehavesLike.Win32.PolyPatch.kc
EmsisoftTrojan.FakeAlert.RZ (B)
SentinelOneStatic AI – Suspicious PE
GDataTrojan.FakeAlert.RZ
JiangminPacked.PolyCrypt.cuz
AviraTR/Dldr.Delphi.Gen
Antiy-AVLTrojan/Generic.ASMalwS.19658
GridinsoftRansom.Win32.Sabsik.sa
ArcabitTrojan.FakeAlert.RZ
ViRobotTrojan.Win32.Z.Fakealert.61952.A
MicrosoftRogue:Win32/FakeXPA
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.FraudLoad.C116625
Acronissuspicious
VBA32OScope.Downloader.XPAntivirus
ALYacTrojan.FakeAlert.RZ
MAXmalware (ai score=89)
MalwarebytesRogue.XPantiVirus.Ancient
TrendMicro-HouseCallTROJ_GEN.R002C0CLB21
YandexTrojan.GenAsa!BeZ0rrxAKfk
IkarusPHISH
FortinetRiskware/XPAntivirus
BitDefenderThetaAI:Packer.8B30319F1F
AVGFileRepMalware
PandaApplication/XPAntivirus2008

How to remove Rogue:Win32/FakeXPA?

Rogue:Win32/FakeXPA removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment