Home / Spyware Encyclopedia / IM.Faker << Back

Recommendation to Automatically remove IM.Faker


Our products can remove IM.Faker and thousands of other Virus and Spyware automatically and instantly.

IM.Faker Details


  • Category IM
  • Discovered 5/13/2009 9:29:04 AM
  • Modified 8/24/2023 5:12:23 PM
  • Threat Level Critical
  • Category Description
    A threat that is capable to cause Denial-Of-Service attacks against other instant messenger client systems.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
Trojan-Dropper.Win32.Small.dq.exe 84992http://r3L4x.cruel-intentionz.net1.0.0.0ef630f897d6ba0cf6f038900e7c8ef1e 
wmini.exe 7680  8c1f180c2ed5b95494156dd13677aad0 
wmini.exe 3584  6df219abb5f909b72f0ff2c91bd90479 
Trojan-Dropper.Win32.Small.dr.exe 5632  01e60682ff6359995887a565e7d55788 
Trojan-AOL.Win32.Faker 551936  84776a730e74c061e64d651efeae050a23/01/2020
Trojan-Dropper.Win32.Small.do.exe 36864Microsoft Corporation2.1.4.90db8f436ae6476a16399e840eefecd1f24/08/2023
TROJAN-DROPPER.WIN32.SMALL.DT.EXE 18750  aaf4c108314ad01020747373ed136c8e24/08/2023
a7bde86b08b8c17370131adce5ad98ae.exe 16060  a7bde86b08b8c17370131adce5ad98ae 
TROJAN-DROPPER.WIN32.SMALL.DU.EXE 19968  1188c8e35f8cd2c967d9838cde5a5662 
TROJAN-DROPPER.WIN32.SMALL.DA.EXE 5120  491fd70413f68a59b086db1fc2af5b06 

The following Registry Entries were created:
..\Software\Microsoft\Windows NT\CurrentVersion\Windows\\"AppInit_DLLs"\"%WIN.SYS32%\ctrlpan.dll"
..\Software\Microsoft\IEAK\"ui"\"3zqBG1pgLZf2jRGshBCgIBwiKZhzMERJ"
..\Software\Microsoft\IEAK\"chk"\"1242123859"
..\Software\Microsoft\IEAK\"errcnt"\"1"
..\System\CurrentControlSet\Services\down\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Run\\"MsSystem"\"%ROOT%\msdos.exe"
..\Software\Classes\searchword.excelexport\(Default)
..\Software\Classes\searchword.excelexport.1\(Default)
..\Software\Microsoft\MSERV\(Default)
..\Software\Classes\Typelib\{fb19bc08-e664-462c-909b-3e9c3f4ff90e}\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware