Fake Trojan

Should I remove “Trojan:Win32/Fakefolder.A”?

Malware Removal

The Trojan:Win32/Fakefolder.A is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Fakefolder.A virus can do?

  • Creates RWX memory
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • Installs itself for autorun at Windows startup
  • Network activity detected but not expressed in API logs
  • Creates a copy of itself
  • Created a service that was not started
  • Attempts to modify Explorer settings to prevent file extensions from being displayed
  • Attempts to modify Explorer settings to prevent hidden files from being displayed

How to determine Trojan:Win32/Fakefolder.A?


File Info:

crc32: 9918D817
md5: 8a248d9184b1a54cad24a145a4f531bb
name: dadfe75a-e4fa-4f31-b1e7-1e161d50c53b_1567301922764.exe
sha1: ee3ce6f82e7b5eea34f840d2a40d9b4a52ea3d44
sha256: e589a254b03e7653166de2365893310414657b3653158700a71159f4479cde3e
sha512: 788033ded4bb9b907644868c02ab3e386e85d925186a2a4fc4feffa19ceb4b55efd49986b67a643ee0229a223e16e8a363e3b1cc0251144b76816ebdffa10fb0
ssdeep: 12288:exckcFwY9rXkEzmMH+rffHD7bUiR1bW4OhsHKawSwFoUiXPlEN2VfRtkO:BbTXkEzmMH+rffHDXUQbW4OhsHKawSw
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Trojan:Win32/Fakefolder.A also known as:

MicroWorld-eScanGen:Heur.Zard.30
FireEyeGeneric.mg.8a248d9184b1a54c
CAT-QuickHealBackdoor.Blackhole.17410
McAfeeGeneric.boq
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
AegisLabTrojan.Win32.BlackHole.m!c
K7AntiVirusTrojan ( 7000000f1 )
BitDefenderGen:Heur.Zard.30
K7GWTrojan ( 7000000f1 )
Cybereasonmalicious.184b1a
TrendMicroTROJ_FRS.0NA003FU17
BaiduWin32.Worm.Delf.bc
SymantecBackdoor.Singu
TotalDefenseWin32/FakeFLDR_i
APEXMalicious
AvastWin32:Trojan-gen
ClamAVWin.Trojan.Blackhole-3285
GDataGen:Heur.Zard.30
KasperskyBackdoor.Win32.BlackHole.cwf
AlibabaBackdoor:Win32/BlackHole.1c2c2d4e
NANO-AntivirusTrojan.Win32.BlackHole.edmrhd
ViRobotBackdoor.Win32.BlackHole.491008
RisingWorm.VobfusEx!1.99DF (CLASSIC)
Endgamemalicious (high confidence)
SophosMal/Generic-L
ComodoTrojWare.Win32.Trojan.Agent.Gen@91pp7
F-SecureTrojan.TR/Crypt.CFI.Gen
DrWebTrojan.Siggen.34032
ZillyaBackdoor.BlackHole.Win32.955
Invinceaheuristic
McAfee-GW-EditionGeneric.boq
Trapminemalicious.moderate.ml.score
CMCBackdoor.Win32!O
EmsisoftGen:Heur.Zard.30 (B)
IkarusWorm.Win32.AutoRun
JiangminBackdoor/Heidong.qn
AviraTR/Crypt.CFI.Gen
Antiy-AVLTrojan/Win32.Zapchast
MicrosoftTrojan:Win32/Fakefolder.A
ArcabitTrojan.Zard.30
ZoneAlarmBackdoor.Win32.BlackHole.cwf
TACHYONBackdoor/W32.DP-BlackHole.491008
AhnLab-V3HEUR/Fakon.mwf
Acronissuspicious
VBA32Backdoor.BlackHole
MAXmalware (ai score=84)
Ad-AwareGen:Heur.Zard.30
MalwarebytesWorm.AutoRun.OL
PandaBck/BlackHole.AN
ZonerTrojan.Win32.68836
ESET-NOD32Win32/AutoRun.Delf.QO
TrendMicro-HouseCallTROJ_FRS.0NA003FU17
TencentBackdoor.Win32.Blackhole.aab
YandexBackdoor.BlackHole!JydJ19saF2c
SentinelOneDFI – Malicious PE
MaxSecureTrojan.Malware.828447.susgen
FortinetW32/BlackHole.PAG!tr
AVGWin32:Trojan-gen
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_80% (D)
Qihoo-360HEUR/QVM41.1.Malware.Gen

How to remove Trojan:Win32/Fakefolder.A?

Trojan:Win32/Fakefolder.A removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment