Windows Defender; Trojan:Win/32/Fake XPA

M

MichaelBN

First of all, this is what I have.

OS Name Microsoft® Windows Vista™ Home Premium
Version 6.0.6001 Service Pack 1 Build 6001
Other OS Description Not Available
OS Manufacturer Microsoft Corporation
System Name MANDTBN
System Manufacturer Gateway
System Model GT5622
System Type X86-based PC
Processor Intel(R) Pentium(R) Dual CPU
E2160 1.80GHz, 1800 Mhz, 2 Core(s), 2
Logical Processor (s)

BIOS Version/Date American Megatrends Inc. 080013, 8/31/2007
SMBIOS Version 2.3
Windows Directory C:\Windows
System Directory C:\Windows\system32
Boot Device \Device\HarddiskVolume2
Locale United States
Hardware Abstraction Layer Version = "6.0.6001.18000"
User Name MANDTBN\minusthemusic
Time Zone Pacific Daylight Time
Installed Physical Memory (RAM) 3.00 GB
Total Physical Memory 2.99 GB
Available Physical Memory 1.83 GB
Total Virtual Memory 6.19 GB
Available Virtual Memory 5.10 GB
Page File Space 3.28 GB
Page File C:\pagefile.sys

Last night I was struck by the Trojan:Win/32/Fake XPA virus. To quote the
Microsoft Malware Protection Center, “Trojan:Win32/FakeXPA is a family of
programs that claims to scan for malware and displays fake warnings of
“malicious programs and virusesâ€. They then inform the user that they need to
pay money to register the software in order to remove these non-existent
threats.†Judging from how much there is about this on the internet, I’m
certain you’ve heard of it.

I shut the computer down last night with the intention of working on it this
morning (3/21/09).

When I restarted the computer this morning, the virus was there front and
center, very obnoxious.

I decided to run a Windows Defender scan, but, before I was able to begin
the scan, Defender told me that I had the virus. What didn’t it tell me last
night?

I clicked “Fix It†and Defender did so.

However, it is now in Defender’s “History†window. On the top of the window
is the following:

“Name Alert Level Action Take Date
Status
Trojan:Win/32/Fake XPA High Quarantine 3/21/2009 8:58 A
Succeededâ€

Beneath that is:

“Category:
Trojan

Description:
This program is dangerous and executes commands from an attacker.

Advice:
Remove this software immediately.

Resources:
process:
pid:4464

View more information about this item onlineâ€

The “View more information about this item online†is a link. Nothing
happens when I right click on the link. So I left clicked on the link and
was brought to the web page which explains the virus.

The way it directs me to get rid of the virus is to go to the “Quarantined
Items†window, highlight the virus and click on “Removeâ€.

Unfortunately, when I go to the “Quarantined Items†window, the virus is not
there.

By all indications, it appears that Defender did, indeed, remove the virus.

However, as the web site warned, it put two files in the “Start Menuâ€
“Programs†list, but, when I went to the “Programs Files†via the C drive, it
wasn’t there. I right clicked on the files in the “Start Menu†“Program
list†and deleted the two files.

Why is it still in the “History†window, where it tells me to remove it as
soon as possible, but not in the “Quarantined Items†window, where there is
ability to remove it?

I also did a Registry Cleaning to remove anything that it may have placed in
the registry.

Bottom line, I’d like to know if this virus was really, totally removed from
my computer.

Thanks in advance.

MichaelBN
 
K

Kayman

First of all, this is what I have.

OS Name Microsoft® Windows Vista™ Home Premium
Version 6.0.6001 Service Pack 1 Build 6001
Other OS Description Not Available
OS Manufacturer Microsoft Corporation
System Name MANDTBN
System Manufacturer Gateway
System Model GT5622
System Type X86-based PC
Processor Intel(R) Pentium(R) Dual CPU
E2160 1.80GHz, 1800 Mhz, 2 Core(s), 2
Logical Processor (s)

BIOS Version/Date American Megatrends Inc. 080013, 8/31/2007
SMBIOS Version 2.3
Windows Directory C:\Windows
System Directory C:\Windows\system32
Boot Device \Device\HarddiskVolume2
Locale United States
Hardware Abstraction Layer Version = "6.0.6001.18000"
User Name MANDTBN\minusthemusic
Time Zone Pacific Daylight Time
Installed Physical Memory (RAM) 3.00 GB
Total Physical Memory 2.99 GB
Available Physical Memory 1.83 GB
Total Virtual Memory 6.19 GB
Available Virtual Memory 5.10 GB
Page File Space 3.28 GB
Page File C:\pagefile.sys

Last night I was struck by the Trojan:Win/32/Fake XPA virus. To quote the
Microsoft Malware Protection Center, “Trojan:Win32/FakeXPA is a family of
programs that claims to scan for malware and displays fake warnings of
“malicious programs and virusesâ€. They then inform the user that they need to
pay money to register the software in order to remove these non-existent
threats.†Judging from how much there is about this on the internet, I’m
certain you’ve heard of it.

I shut the computer down last night with the intention of working on it this
morning (3/21/09).

When I restarted the computer this morning, the virus was there front and
center, very obnoxious.

I decided to run a Windows Defender scan, but, before I was able to begin
the scan, Defender told me that I had the virus. What didn’t it tell me last
night?

I clicked “Fix It†and Defender did so.

However, it is now in Defender’s “History†window. On the top of the window
is the following:

“Name Alert Level Action Take Date
Status
Trojan:Win/32/Fake XPA High Quarantine 3/21/2009 8:58 A
Succeededâ€

Beneath that is:

“Category:
Trojan

Description:
This program is dangerous and executes commands from an attacker.

Advice:
Remove this software immediately.

Resources:
process:
pid:4464

View more information about this item onlineâ€

The “View more information about this item online†is a link. Nothing
happens when I right click on the link. So I left clicked on the link and
was brought to the web page which explains the virus.

The way it directs me to get rid of the virus is to go to the “Quarantined
Items†window, highlight the virus and click on “Removeâ€.

Unfortunately, when I go to the “Quarantined Items†window, the virus is not
there.

By all indications, it appears that Defender did, indeed, remove the virus.

However, as the web site warned, it put two files in the “Start Menuâ€
“Programs†list, but, when I went to the “Programs Files†via the C drive, it
wasn’t there. I right clicked on the files in the “Start Menu†“Program
list†and deleted the two files.

Why is it still in the “History†window, where it tells me to remove it as
soon as possible, but not in the “Quarantined Items†window, where there is
ability to remove it?

I also did a Registry Cleaning to remove anything that it may have placed in
the registry.

Do I need a Registry Cleaner?
http://www.whatthetech.com/2007/11/25/do-i-need-a-registry-cleaner/

Why I don’t use registry cleaners!
http://www.edbott.com/weblog/archives/000643.html

I'd use:
CCleaner - Free
Cleans temporary internet files, cookies, history, recent URLs, application
MRUs, etc. ... (*Tune out the registry scanning/fixing option!*)
http://www.ccleaner.com/download/builds/downloading-slim

Followed by:
NTREGOPT
http://www.larshederer.homepage.t-online.de/erunt/

Re: CCleaner set-up
If Windows Defender is utilized go to Applications, under Utilities uncheck
"Windows Defender" (so it won't delete the history of WD)
--or--
Setup CCleaner to Automatically Run Each Night in Vista or XP
http://www.howtogeek.com/howto/wind...-automatically-run-each-night-in-vista-or-xp/
Bottom line, I’d like to know if this virus was really, totally removed from
my computer.

Preferred practice is to 'flatten' and rebuild a computer that has been
exposed to malware.
http://www.microsoft.com/technet/community/columns/secmgmt/sm0504.mspx
http://technet.microsoft.com/en-au/library/cc512595.aspx

Install Windows Vista
http://vistasupport.mvps.org/install_windows_vista.htm

It is defenitely advantageous to create an 'image' of the operating system
and create a data/file backup of the affected PC.
The image can then restored to the impacted PC and the user's data/file is
subsequently restored to the operating system.

An experienced and properly prepared user can do that in substantial less
time than scanning with complex and sophisticated AV applications.

Alas, since many users are less prepared and/or lacking the experience;
Scanning with an AV apps. is the only option, unless the user consults a
computer technician.
If you're one of the many less-experienced users, try to go through the
succeeding steps 1-4:

1.Clear the (IE) temporary Internet files and the history cache.
Click 'Start' and then click 'Run'... then type (or copy/paste)
"inetcpl.cpl" (w/out quotation marks) into the box, then click the 'OK'
button.
In Internet Properties panel 'General' tab, under 'Browsing history', click
'Delete...'button, in 'Delete Browsing History' panel, click the 'Delete
all...' button then place a checkmark into the box beside 'Also delete
files and settings stored by add-ons', Click 'Yes' and exit the Internet
Properties panel by clicking the 'OK' button.

2.Clean HDD
Delete files using Disk Cleanup
http://windowshelp.microsoft.com/Windows/en-US/help/1264bc24-72a8-48aa-84e3-a355327139d91033.mspx

3.Download/execute:
Malwarebytes© Corporation - Anti-Malware
http://www.download.com/Malwarebytes-Anti-Malware/3000-8022_4-10804572.html?tag=mncol
--or--
http://majorgeeks.com/Malwarebytes_Anti-Malware_d5756.html
--direct--
http://www.malwarebytes.org/mbam/program/mbam-setup.exe
--and--
SuperAntispyware - Free
http://www.superantispyware.com/superantispywarefreevspro.html
--direct--
http://www.superantispyware.com/downloadfile.html?productid=SUPERANTISPYWAREFREE

Both free versions of MBAM and SAS are on-demand scanners and offer no
'real-time' protection. Keep them installed and use them as
'second-opinion' scanner which is purposely (by design) recommended by
their respective authors.

4.Download and execute HiJack This! (HJT)
http://www.trendsecure.com/portal/en-US/tools/security_tools/hijackthis

Please, do not post HJT logs to this newsgroup.
Fora where you can get expert advice for HiJack This! (HJT) logs.

http://www.thespykiller.co.uk/index.php?board=3.0
http://www.spywarewarrior.com/viewforum.php?f=5
http://forums.tomcoyote.org/index.php?showforum=27
http://www.bleepingcomputer.com/forums/forum22.html
http://www.malwarebytes.org/forums/index.php?showforum=7
http://www.5starsupport.com/ipboard/index.php?showforum=18
http://www.theeldergeek.com/forum/index.php?s=2e9ea4e19d3289dd877ab75a8220bff6&showforum=29

NOTE:
Registration is required in any of the above mentioned fora before posting
a HJT log and read the 'stickies' (instructions/guidelines) for the
respective HJT forum.

Additional references:
Malicious Software Removal Tool
http://www.microsoft.com/security/malwareremove/default.mspx

GMER - is an application that detects and removes rootkits.
http://www.gmer.net/index.php

For additional assistance in relation GMER scan results consult either:
http://www.thespykiller.co.uk/index.php?board=3.0
--or--
http://antirootkit.com/forums/index.php?sid=9e746bb696ac0bb38781ffe4361c3a17

Routinely practice Safe-Hex.
http://www.claymania.com/safe-hex.html

Good luck :)
 
S

shell

This is the same thing that happened to me but what did you do? There is no
solution to the problem here....
 
B

Bill Sanderson

If you are having trouble with one of the fake antimalware viruses, the
first thing to do at this point is to try Microsoft's Malicious Software
Removal Tool.

http://www.microsoft.com/security/malwareremove/default.mspx

I would grab the latest version from the above link--it is updated monthly,
and occasionally more often--and is cumulative--the new version replaces the
previous one.

Run it. If it doesn't do the job, restart is safe mode and run it again.

If that doesn't do it, you can run Microsoft's latest antimalware removal
tool and definitions at:

safety.live.com

This can can be run in safe mode with networking for better results.

And, if you are in the U.S. or Canada, you can call 1-866-pcsafety for free
help with this issue. Users elsewhere in the world can get the same free
help, although the phone call may not be toll free--by calling the nearest
number for paid Microsoft support in their locale.
 
T

Tony

MichaelIBN,

I have the same problem, did you manage to fix the problem with your PC and
get rid of win32 fakexpa ? Please let me know how did you do it.Thanks

Tony
 
B

Bill Sanderson

Tony: If neither your own up to date antivirus nor the Malicious Software
Removal tool has fixed this for you, you can certainly get free help from
Microsoft to take care of the problem:

If you are in the U.S. or Canada, call 1-866-pcsafety. Elsewhere, call the
nearest number for Microsoft support and ask for the free help with security
patch issues, or viruses and spyware. The call may not be toll-free, but
Microsoft's assistance will be free.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top