Home / Spyware Encyclopedia / IM.Faker << Back

Recommendation to Automatically remove IM.Faker


Our products can remove IM.Faker and thousands of other Virus and Spyware automatically and instantly.

IM.Faker Details


  • Category IM
  • Discovered 5/13/2009 9:29:04 AM
  • Modified 8/24/2023 5:12:23 PM
  • Threat Level Critical
  • Category Description
    A threat that is capable to cause Denial-Of-Service attacks against other instant messenger client systems.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
Trojan-Dropper.Win32.Small.dk.exe 120320Microsoft Corporation2.1.4.92121e7cd658f40f349020f5dafbaf442 
Trojan-Dropper.Win32.Small.do.exe 36864Microsoft Corporation2, 1, 4, 90db8f436ae6476a16399e840eefecd1f 
Trojan-Dropper.Win32.Small.dq.exe 84992http://r3L4x.cruel-intentionz.net1.0.0.0ef630f897d6ba0cf6f038900e7c8ef1e 
msdos.exe 136860 9.9.9.9  
Trojan-Dropper.Win32.Small.dm.exe 7168  e2fbe14d9d745b7a4119b01644773d45 
Trojan-Dropper.Win32.Small.dn.exe 6144  b34effbe409ec5f58fd22e86d58b3922 
wmini.exe 7680  8c1f180c2ed5b95494156dd13677aad0 
wmini.exe 3584  6df219abb5f909b72f0ff2c91bd90479 
a7bde86b08b8c17370131adce5ad98ae.exe 16060  a7bde86b08b8c17370131adce5ad98ae 
Trojan-AOL.Win32.Faker 551936  84776a730e74c061e64d651efeae050a23/01/2020

The following Registry Entries were created:
..\Software\Microsoft\Windows NT\CurrentVersion\Windows\\"AppInit_DLLs"\"%WIN.SYS32%\ctrlpan.dll"
..\Software\Microsoft\IEAK\"ui"\"3zqBG1pgLZf2jRGshBCgIBwiKZhzMERJ"
..\Software\Microsoft\IEAK\"chk"\"1242123859"
..\Software\Microsoft\IEAK\"errcnt"\"1"
..\System\CurrentControlSet\Services\down\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Run\\"MsSystem"\"%ROOT%\msdos.exe"
..\Software\Classes\searchword.excelexport\(Default)
..\Software\Classes\searchword.excelexport.1\(Default)
..\Software\Microsoft\MSERV\(Default)
..\Software\Classes\Typelib\{fb19bc08-e664-462c-909b-3e9c3f4ff90e}\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware