Home / Spyware Encyclopedia / IM.Faker << Back

Recommendation to Automatically remove IM.Faker


Our products can remove IM.Faker and thousands of other Virus and Spyware automatically and instantly.

IM.Faker Details


  • Category IM
  • Discovered 5/13/2009 9:29:04 AM
  • Modified 8/24/2023 5:12:23 PM
  • Threat Level Critical
  • Category Description
    A threat that is capable to cause Denial-Of-Service attacks against other instant messenger client systems.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
Trojan-Dropper.Win32.Small.dk.exe 120320Microsoft Corporation2.1.4.92121e7cd658f40f349020f5dafbaf442 
Trojan-Dropper.Win32.Small.do.exe 36864Microsoft Corporation2, 1, 4, 90db8f436ae6476a16399e840eefecd1f 
Trojan-Dropper.Win32.Small.dq.exe 84992http://r3L4x.cruel-intentionz.net1.0.0.0ef630f897d6ba0cf6f038900e7c8ef1e 
msdos.exe 136860 9.9.9.9  
Trojan-Dropper.Win32.Small.dm.exe 7168  e2fbe14d9d745b7a4119b01644773d45 
Trojan-Dropper.Win32.Small.dn.exe 6144  b34effbe409ec5f58fd22e86d58b3922 
Trojan-Dropper.Win32.Small.dt.exe 18750  aaf4c108314ad01020747373ed136c8e 
Trojan-Dropper.Win32.Small.dd.exe 6144  a3b1648cbaa1dba502dc24b8d77e10f8 
Trojan-Dropper.Win32.Small.da.exe 5120  491fd70413f68a59b086db1fc2af5b06 
msdos.exe 3072  43818ebf74e49b3161e1fe802e94776f 

The following Registry Entries were created:
..\Software\Microsoft\Windows NT\CurrentVersion\Windows\\"AppInit_DLLs"\"%WIN.SYS32%\ctrlpan.dll"
..\Software\Microsoft\IEAK\"ui"\"3zqBG1pgLZf2jRGshBCgIBwiKZhzMERJ"
..\Software\Microsoft\IEAK\"chk"\"1242123859"
..\Software\Microsoft\IEAK\"errcnt"\"1"
..\System\CurrentControlSet\Services\down\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Run\\"MsSystem"\"%ROOT%\msdos.exe"
..\Software\Classes\searchword.excelexport\(Default)
..\Software\Classes\searchword.excelexport.1\(Default)
..\Software\Microsoft\MSERV\(Default)
..\Software\Classes\Typelib\{fb19bc08-e664-462c-909b-3e9c3f4ff90e}\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware