{
	"id": "09012095-db45-4209-9616-85c808557bdc",
	"created_at": "2026-04-06T01:30:05.911815Z",
	"updated_at": "2026-04-10T03:24:30.195164Z",
	"deleted_at": null,
	"sha1_hash": "ccca597fe5b9ce144b8725ee04fb39e8315f5756",
	"title": "TROJ_FAKEAV.GZD - Threat Encyclopedia | Trend Micro (US)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 83725,
	"plain_text": "TROJ_FAKEAV.GZD - Threat Encyclopedia | Trend Micro (US)\r\nBy Analysis by: Sabrina Lei Sioting\r\nArchived: 2026-04-06 00:23:12 UTC\r\nThis Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when\r\nvisiting malicious sites.\r\nIt employs registry shell spawning by adding certain registry entries. This allows this malware to execute even when other\r\napplications are opened.\r\nIt modifies registry entries to disable the Windows Firewall settings. This action allows this malware to perform its routines\r\nwithout being deteted by the Windows Firewall. It creates certain registry entries to disable applications related to security.\r\nIt deletes itself after execution.\r\nIt displays fake alerts that warn users of infection. It also displays fake scanning results of the affected system. It then asks\r\nfor users to purchase it once scanning is completed. If users decide to purchase the rogue product, users are directed to a\r\ncertain website asking for sensitive information, such as credit card numbers.\r\nArrival Details\r\nThis Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when\r\nvisiting malicious sites.\r\nInstallation\r\nThis Trojan drops the following copies of itself into the affected system:\r\n%User Profile%\\Local Settings\\Application Data\\{random 3 letters}.exe\r\n(Note: %User Profile% is the current user's profile folder, which is usually C:\\Windows\\Profiles\\{user name} on Windows\r\n98 and ME, C:\\WINNT\\Profiles\\{user name} on Windows NT, and C:\\Documents and Settings\\{user name} on Windows\r\n2000, XP, and Server 2003.)\r\nAutostart Technique\r\nThis Trojan employs registry shell spawning to ensure its execution when certain file types are accessed by adding the\r\nfollowing entries:\r\nHKEY_CLASSES_ROOT\\.exe\\shell\\\r\nopen\\command\r\n(Default) = \"\"%User Profile%\\Local Settings\\Application Data\\{random 3 letters}.exe\" -a \"%1\" %*\"\r\nHKEY_CLASSES_ROOT\\.exe\\shell\\\r\nopen\\command\r\nIsolatedCommand = \"\"%1\" %*\"\r\nHKEY_CLASSES_ROOT\\.exe\\shell\\\r\nrunas\\command\r\n(Default) = \"\"%1\" %*\"\r\nhttps://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_fakeav.gzd\r\nPage 1 of 8\n\nHKEY_CLASSES_ROOT\\.exe\\shell\\\r\nrunas\\command\r\nIsolatedCommand = \"\"%1\" %*\"\r\nHKEY_CLASSES_ROOT\\exefile\\shell\\\r\nopen\\command\r\nIsolatedCommand = \"\"%1\" %*\"\r\nHKEY_CLASSES_ROOT\\exefile\\shell\\\r\nrunas\\command\r\nIsolatedCommand = \"\"%1\" %*\"\r\nHKEY_CURRENT_USER\\Software\\Classes\\\r\n.exe\\shell\\open\\\r\ncommand\r\n(Default) = \"\"%User Profile%\\Local Settings\\Application Data\\{random 3 letters}.exe\" -a \"%1\" %*\"\r\nHKEY_CURRENT_USER\\Software\\Classes\\\r\n.exe\\shell\\open\\\r\ncommand\r\nIsolatedCommand = \"\"%1\" %*\"\r\nHKEY_CURRENT_USER\\Software\\Classes\\\r\n.exe\\shell\\runas\\\r\ncommand\r\n(Default) = \"\"%1\" %*\"\r\nHKEY_CURRENT_USER\\Software\\Classes\\\r\n.exe\\shell\\runas\\\r\ncommand\r\nIsolatedCommand = \"\"%1\" %*\"\r\nHKEY_CURRENT_USER\\Software\\Classes\\\r\nexefile\\shell\\open\\\r\ncommand\r\n(Default) = \"\"%User Profile%\\Local Settings\\Application Data\\{random 3 letters}.exe\" -a \"%1\" %*\"\r\nHKEY_CURRENT_USER\\Software\\Classes\\\r\nexefile\\shell\\open\\\r\ncommand\r\nIsolatedCommand = \"\"%1\" %*\"\r\nHKEY_CURRENT_USER\\Software\\Classes\\\r\nexefile\\shell\\runas\\\r\ncommand\r\n(Default) = \"\"%1\" %*\"\r\nHKEY_CURRENT_USER\\Software\\Classes\\\r\nexefile\\shell\\runas\\\r\ncommand\r\nIsolatedCommand = \"\"%1\" %*\"\r\nhttps://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_fakeav.gzd\r\nPage 2 of 8\n\nOther System Modifications\r\nThis Trojan adds the following registry keys:\r\nHKEY_CLASSES_ROOT\\.exe\\shell\r\nHKEY_CLASSES_ROOT\\.exe\\shell\\\r\nopen\r\nHKEY_CLASSES_ROOT\\.exe\\shell\\\r\nopen\\command\r\nHKEY_CLASSES_ROOT\\.exe\\shell\\\r\nrunas\r\nHKEY_CLASSES_ROOT\\.exe\\shell\\\r\nrunas\\command\r\nHKEY_CURRENT_USER\\Software\\Classes\\\r\n.exe\\shell\r\nHKEY_CURRENT_USER\\Software\\Classes\\\r\n.exe\\shell\\open\r\nHKEY_CURRENT_USER\\Software\\Classes\\\r\n.exe\\shell\\open\\\r\ncommand\r\nHKEY_CURRENT_USER\\Software\\Classes\\\r\n.exe\\shell\\runas\r\nHKEY_CURRENT_USER\\Software\\Classes\\\r\n.exe\\shell\\runas\\\r\ncommand\r\nHKEY_CURRENT_USER\\Software\\Classes\\\r\nexefile\\shell\r\nHKEY_CURRENT_USER\\Software\\Classes\\\r\nexefile\\shell\\open\r\nHKEY_CURRENT_USER\\Software\\Classes\\\r\nexefile\\shell\\open\\\r\ncommand\r\nHKEY_CURRENT_USER\\Software\\Classes\\\r\nexefile\\shell\\runas\r\nHKEY_CURRENT_USER\\Software\\Classes\\\r\nexefile\\shell\\runas\\\r\ncommand\r\nhttps://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_fakeav.gzd\r\nPage 3 of 8\n\nHKEY_CURRENT_USER\\Software\\Microsoft\\\r\nInternet Connection Wizard\r\nIt adds the following registry entries as part of its installation routine:\r\nHKEY_CURRENT_USER\\Software\\Microsoft\\\r\nInternet Connection Wizard\r\nShellNext = \"http://{BLOCKED}qag.com/10170004131137353284\"\r\nIt modifies the following registry key(s)/entry(ies) as part of its installation routine:\r\nHKEY_CLASSES_ROOT\\exefile\\shell\\\r\nopen\\command\r\n(Default) = \"\"%User Profile%\\Local Settings\\Application Data\\{random 3 letters}.exe\" -a \"%1\" %*\"\r\n(Note: The default value data of the said registry entry is \"%1\" %*.)\r\nHKEY_LOCAL_MACHINE\\SOFTWARE\\Clients\\\r\nStartMenuInternet\\FIREFOX.EXE\\shell\\\r\nopen\\command\r\n(Default) = \"\"%User Profile%\\Local Settings\\Application Data\\{random three letter}.exe\" -a \"%Program Files%\\Mozilla\r\nFirefox\\firefox.exe\"\"\r\n(Note: The default value data of the said registry entry is %Program Files%\\Mozilla Firefox\\firefox.exe.)\r\nHKEY_LOCAL_MACHINE\\SOFTWARE\\Clients\\\r\nStartMenuInternet\\FIREFOX.EXE\\shell\\\r\nsafemode\\command\r\n(Default) = \"\"%User Profile%\\Local Settings\\Application Data\\{random three letter}.exe\" -a \"%Program Files%\\Mozilla\r\nFirefox\\firefox.exe\" -safe-mode\"\r\n(Note: The default value data of the said registry entry is \"%Program Files%\\Mozilla Firefox\\firefox.exe\" -safe-mode.)\r\nHKEY_LOCAL_MACHINE\\SOFTWARE\\Clients\\\r\nStartMenuInternet\\IEXPLORE.EXE\\shell\\\r\nopen\\command\r\n(Default) = \"\"%User Profile%\\Local Settings\\Application Data\\{random three letter}.exe\" -a \"%Program Files%\\Internet\r\nExplorer\\iexplore.exe\"\"\r\n(Note: The default value data of the said registry entry is \"%Program Files%\\Internet Explorer\\iexplore.exe\".)\r\nIt modifies the following registry entries to disable the Windows Firewall settings:\r\nHKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\\r\nServices\\SharedAccess\\Parameters\\\r\nFirewallPolicy\\StandardProfile\r\nEnableFirewall = \"0\"\r\n(Note: The default value data of the said registry entry is 1.)\r\nHKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\\r\nServices\\SharedAccess\\Parameters\\\r\nhttps://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_fakeav.gzd\r\nPage 4 of 8\n\nFirewallPolicy\\StandardProfile\r\nDisableNotifications = \"1\"\r\n(Note: The default value data of the said registry entry is 0.)\r\nIt creates the following registry entry(ies) to bypass Windows Firewall:\r\nHKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\\r\nServices\\SharedAccess\\Parameters\\\r\nFirewallPolicy\\DomainProfile\r\nEnableFirewall = \"0\"\r\nHKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\\r\nServices\\SharedAccess\\Parameters\\\r\nFirewallPolicy\\DomainProfile\r\nDoNotAllowExceptions = \"0\"\r\nHKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\\r\nServices\\SharedAccess\\Parameters\\\r\nFirewallPolicy\\DomainProfile\r\nDisableNotifications = \"1\"\r\nIt creates the following registry entries to disable applications related to security:\r\nHKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\\r\nSecurity Center\r\nAntiVirusDisableNotify = \"1\"\r\nHKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\\r\nSecurity Center\r\nAntiVirusOverride = \"1\"\r\nHKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\\r\nSecurity Center\r\nFirewallDisableNotify = \"1\"\r\nHKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\\r\nSecurity Center\r\nFirewallOverride = \"1\"\r\nHKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\\r\nSecurity Center\r\nUpdatesDisableNotify = \"1\"\r\nDropping Routine\r\nThis Trojan drops the following files:\r\n%System Root%\\Documents and Settings\\All Users\\Application Data\\2335886254\r\n%User Profile%\\Local Settings\\Application Data\\2335886254\r\n%User Temp%\\2335886254\r\n%User Profile%\\Templates\\2335886254\r\nhttps://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_fakeav.gzd\r\nPage 5 of 8\n\n(Note: %System Root% is the root folder, which is usually C:\\. It is also where the operating system is located.. %User\r\nProfile% is the current user's profile folder, which is usually C:\\Windows\\Profiles\\{user name} on Windows 98 and ME,\r\nC:\\WINNT\\Profiles\\{user name} on Windows NT, and C:\\Documents and Settings\\{user name} on Windows 2000, XP, and\r\nServer 2003.. %User Temp% is the current user's Temp folder, which is usually C:\\Documents and Settings\\{user\r\nname}\\Local Settings\\Temp on Windows 2000, XP, and Server 2003.)\r\nOther Details\r\nThis Trojan connects to the following possibly malicious URL:\r\nhttp://{BLOCKED}qag.com/10170004131137353284\r\nIt deletes itself after execution.\r\nRogue Antivirus Routine\r\nThis Trojan displays fake alerts that warn users of infection. It also displays fake scanning results of the affected system. It\r\nthen asks for users to purchase it once scanning is completed. If users decide to purchase the rogue product, users are\r\ndirected to a certain website asking for sensitive information, such as credit card numbers.\r\nStep 2\r\nIdentify and terminate files detected as TROJ_FAKEAV.GZD\r\n[ Learn More ]\r\na. If the detected file is displayed in either Windows Task Manager or Process Explorer but you cannot delete it, restart\r\nyour computer in safe mode. To do this, refer to this linkopen on a new tab for the complete steps.\r\nb. If the detected file is not displayed in either Windows Task Manager or Process Explorer, continue doing the next\r\nsteps.\r\nStep 3\r\nDelete this registry key\r\n[ Learn More ]\r\nImportant: Editing the Windows Registry incorrectly can lead to irreversible system malfunction. Please do this step only if\r\nyou know how or you can ask assistance from your system administrator. Else, check this Microsoft articleopen on a new\r\ntab first before modifying your computer's registry.\r\nIn HKEY_CLASSES_ROOT\\.exe\\shell\r\nrunas\r\nIn HKEY_CURRENT_USER\\Software\\Classes\\.exe\r\nshell\r\nIn HKEY_CURRENT_USER\\Software\\Classes\\exefile\r\nshell\r\nIn HKEY_CURRENT_USER\\Software\\Microsoft\r\nInternet Connection Wizard\r\nStep 4\r\nDelete this registry value\r\nhttps://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_fakeav.gzd\r\nPage 6 of 8\n\n[ Learn More ]\r\nImportant: Editing the Windows Registry incorrectly can lead to irreversible system malfunction. Please do this step only if\r\nyou know how or you can ask assistance from your system administrator. Else, check this Microsoft articleopen on a new\r\ntab first before modifying your computer's registry.\r\nIn HKEY_CLASSES_ROOT\\exefile\\shell\\open\\command\r\nIsolatedCommand = \"%1 %*\"\r\nIn HKEY_CLASSES_ROOT\\exefile\\shell\\runas\\command\r\nIsolatedCommand = \"%1 %*\"\r\nIn HKEY_CURRENT_USER\\Software\\Classes\\exefile\\shell\\open\\command\r\n(Default) = \"%User Profile%\\Local Settings\\Application Data\\{random 3 letters}.exe -a %1 %*\"\r\nIn HKEY_CURRENT_USER\\Software\\Classes\\exefile\\shell\\open\\command\r\nIsolatedCommand = \"%1 %*\"\r\nIn\r\nHKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile\r\nEnableFirewall = \"0\"\r\nIn\r\nHKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile\r\nDoNotAllowExceptions = \"0\"\r\nIn\r\nHKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile\r\nDisableNotifications = \"1\"\r\nIn HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Security Center\r\nAntiVirusDisableNotify = \"1\"\r\nIn HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Security Center\r\nAntiVirusOverride = \"1\"\r\nIn HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Security Center\r\nFirewallDisableNotify = \"1\"\r\nIn HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Security Center\r\nFirewallOverride = \"1\"\r\nIn HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Security Center\r\nUpdatesDisableNotify = \"1\"\r\nStep 5\r\nRestore this modified registry value\r\n[ Learn More ]\r\nImportant: Editing the Windows Registry incorrectly can lead to irreversible system malfunction. Please do this step only if\r\nyou know how or you can ask assistance from your system administrator. Else, check this Microsoft articleopen on a new\r\ntab first before modifying your computer\"s registry.\r\nIn HKEY_CLASSES_ROOT\\exefile\\shell\\open\\command\r\nFrom: (Default) = \"%User Profile%\\Local Settings\\Application Data\\{random 3 letters}.exe -a %1 %*\"\r\nTo: (Default) = \"%1 %*\"\r\nIn HKEY_LOCAL_MACHINE\\SOFTWARE\\Clients\\StartMenuInternet\\FIREFOX.EXE\\shell\\open\\command\r\nFrom: (Default) = \"%User Profile%\\Local Settings\\Application Data\\{random 3 letters}.exe -a\r\n%Program Files%\\Mozilla Firefox\\firefox.exe\"\r\nhttps://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_fakeav.gzd\r\nPage 7 of 8\n\nTo: (Default) = \"%Program Files%\\Mozilla Firefox\\firefox.exe\"\r\nIn HKEY_LOCAL_MACHINE\\SOFTWARE\\Clients\\StartMenuInternet\\FIREFOX.EXE\\shell\\safemode\\command\r\nFrom: (Default) = %User Profile%\\Local Settings\\Application Data\\{random 3 letters}.exe -a\r\n%Program Files%\\Mozilla Firefox\\firefox.exe -safe-mode\r\nTo: (Default) = %Program Files%\\Mozilla Firefox\\firefox.exe -safe-mode\r\nIn HKEY_LOCAL_MACHINE\\SOFTWARE\\Clients\\StartMenuInternet\\IEXPLORE.EXE\\shell\\open\\command\r\nFrom: (Default) = \"%User Profile%\\Local Settings\\Application Data\\{random 3 letters}.exe -a\r\n%Program Files%\\Internet Explorer\\iexplore.exe\"\r\nTo: (Default) = \"%Program Files%\\Internet Explorer\\iexplore.exe\"\r\nIn\r\nHKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfi\r\nFrom: EnableFirewall = \"0\"\r\nTo: EnableFirewall = \"1\"\r\nIn\r\nHKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfi\r\nFrom: DisableNotifications = \"1\"\r\nTo: DisableNotifications = \"0\"\r\nStep 6\r\nSearch and delete this file\r\n[ Learn More ]\r\nThere may be some component files that are hidden. Please make sure you check the Search Hidden Files and Folders\r\ncheckbox in the More advanced options option to include all hidden files and folders in the search result.\r\n%System Root%\\Documents and Settings\\All Users\\Application Data\\2335886254\r\n%User Profile%\\Local Settings\\Application Data\\2335886254\r\n%User Temp%\\2335886254\r\n%User Profile%\\Templates\\2335886254\r\nStep 7\r\nScan your computer with your Trend Micro product to delete files detected as TROJ_FAKEAV.GZD. If the detected files\r\nhave already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to\r\nsimply delete the quarantined files. Please check this Knowledge Base pageopen on a new tab for more information.\r\nDid this description help? Tell us how we did.open on a new tab\r\nSource: https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_fakeav.gzd\r\nhttps://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_fakeav.gzd\r\nPage 8 of 8",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_fakeav.gzd"
	],
	"report_names": [
		"troj_fakeav.gzd"
	],
	"threat_actors": [
		{
			"id": "aa73cd6a-868c-4ae4-a5b2-7cb2c5ad1e9d",
			"created_at": "2022-10-25T16:07:24.139848Z",
			"updated_at": "2026-04-10T02:00:04.878798Z",
			"deleted_at": null,
			"main_name": "Safe",
			"aliases": [],
			"source_name": "ETDA:Safe",
			"tools": [
				"DebugView",
				"LZ77",
				"OpenDoc",
				"SafeDisk",
				"TypeConfig",
				"UPXShell",
				"UsbDoc",
				"UsbExe"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775439005,
	"ts_updated_at": 1775791470,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/ccca597fe5b9ce144b8725ee04fb39e8315f5756.pdf",
		"text": "https://archive.orkl.eu/ccca597fe5b9ce144b8725ee04fb39e8315f5756.txt",
		"img": "https://archive.orkl.eu/ccca597fe5b9ce144b8725ee04fb39e8315f5756.jpg"
	}
}