Trojan

How to remove FakeIE Trojan from PC?

In this message, I am going to clarify how the FakeIE trojan injected into your system, and also the best way to delete FakeIE trojan virus.

Loaris Trojan Remover
Editor's choice
Loaris Trojan Remover
Manual FakeIE removal might be a lengthy and complicated process that requires expert skills. Loaris Trojan Remover is a professional antivirus tool that is recommended to get rid of this FakeIE trojan.
5
EXCELLENT
⭐⭐⭐⭐⭐
By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Loaris Trojan Remover. 7 days free trial available.

What is FakeIE trojan?

Name FakeIE
Infection Type Trojan
Symptoms
  • A file was accessed within the Public folder.;
  • Performs HTTP requests potentially not found in PCAP.;
  • Unconventionial language used in binary resources: Chinese (Simplified);
  • Authenticode signature is invalid;
  • Attempts to modify proxy settings;
  • Touches a file containing cookies, possibly for information gathering;
  • Yara rule detections observed from a process memory dump/dropped files/CAPE;
Similar behavior Penguish, Ejik, DarkGate, Citeary, Phantu, Coswid
Fix Tool

See If Your System Has Been Affected by FakeIE trojan

Trojan The name of this type of malware is a reference to a widely known tale regarding Trojan Horse, which was utilized by Greeks to enter the city of Troy and win the war. Like a fake horse that was made for trojans as a present, FakeIE trojan virus is distributed like something legit, or, at least, effective. Malicious apps are concealing inside of the FakeIE trojan virus, like Greeks inside of a large wooden dummy of a horse.1

Trojan viruses are one of the leading malware sorts by its injection frequency for quite a long time. And now, throughout the pandemic, when malware became immensely active, trojan viruses enhanced their activity, too. You can see a number of messages on different sources, where people are grumbling about the FakeIE trojan virus in their computer systems, and requesting assistance with FakeIE trojan virus clearing.

Trojan FakeIE is a sort of virus that injects right into your PC, and afterwards performs a wide range of harmful features. These features rely on a sort of FakeIE trojan: it might work as a downloader for many other malware or as a launcher for another harmful program which is downloaded along with the FakeIE trojan. Over the last two years, trojans are additionally spread with email attachments, and most of instances utilized for phishing or ransomware infiltration.

FakeIE2 also known as

Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Generic.4!c
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.69447099
FireEye Generic.mg.e6b8d75991cfb224
Skyhigh BehavesLike.Win32.Generic.th
McAfee Artemis!E6B8D75991CF
Malwarebytes Generic.Malware.AI.DDS
VIPRE Trojan.GenericKD.69447099
Sangfor Trojan.Win32.Agent.Vf1i
K7AntiVirus Trojan ( 005246d51 )
BitDefender Trojan.GenericKD.69447099
K7GW Trojan ( 005246d51 )
Cybereason malicious.403acb
BitDefenderTheta Gen:NN.ZexaF.36792.lrW@a8trYvib
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Packed.FlyStudio.AA potentially unwanted
APEX Malicious
Rising [email protected] (RDML:6n/NMU8ffaf6n/X33CCs4A)
Sophos Generic Reputation PUA (PUA)
F-Secure Trojan:W32/DelfInject.R
Trapmine malicious.moderate.ml.score
Emsisoft Trojan.GenericKD.69447099 (B)
SentinelOne Static AI – Malicious PE
MAX malware (ai score=86)
Google Detected
Varist W32/S-47c1ea66!Eldorado
Antiy-AVL Trojan/Win32.FlyStudio.a
Kingsoft malware.kb.a.991
Microsoft Trojan:Win32/FakeIE
Xcitium Worm.Win32.Dropper.RA@1qraug
Arcabit Trojan.Generic.D423ADBB
GData Win32.Trojan.PSE.1S437JY
Cynet Malicious (score: 100)
ALYac Trojan.GenericKD.69447099
DeepInstinct MALICIOUS
Cylance unsafe
TrendMicro-HouseCall TROJ_GEN.R014H09J123
MaxSecure Trojan.Malware.300983.susgen
Fortinet Riskware/Application
AVG Win32:MalwareX-gen [Trj]
Avast Win32:MalwareX-gen [Trj]
CrowdStrike win/malicious_confidence_70% (D)

What are the symptoms of FakeIE trojan?

  • A file was accessed within the Public folder.;
  • Performs HTTP requests potentially not found in PCAP.;
  • Unconventionial language used in binary resources: Chinese (Simplified);
  • Authenticode signature is invalid;
  • Attempts to modify proxy settings;
  • Touches a file containing cookies, possibly for information gathering;
  • Yara rule detections observed from a process memory dump/dropped files/CAPE;

The frequent indicator of the FakeIE trojan virus is a progressive appearance of various malware – adware, browser hijackers, and so on. Due to the activity of these destructive programs, your personal computer comes to be really lagging: malware consumes big quantities of RAM and CPU capabilities.

Related Articles

An additional visible effect of the FakeIE trojan virus presence is unidentified processes showed in task manager. Frequently, these processes may attempt to imitate system processes, but you can understand that they are not legit by looking at the source of these tasks. Quasi system applications and FakeIE trojan’s processes are always listed as a user’s tasks, not as a system’s.

How to remove FakeIE trojan virus?

  • Download and install Loaris Trojan Remover.
  • Open Loaris and perform a “Standard scan“.
  • “Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Approve the reset pressing “Yes” button in the appeared window.
  • Restart your computer.

To get rid of FakeIE trojan and be sure that all additional malware, downloaded with the help of this trojan, will be wiped out, too, I’d suggest you to use Loaris Trojan Remover.

Loaris Trojan RemoverFakeIE trojan virus is very difficult to eliminate by hand. Its paths are very tough to track, as well as the modifications implemented by the FakeIE trojan are concealed deeply within the system. So, the opportunity that you will make your system 100% clean of trojans is very low. And don't ignore malware that has been downloaded and install with the help of the FakeIE trojan virus. I assume these arguments suffice to assure that getting rid of the trojan virus manually is an awful concept.

FakeIE removal guide

To spot and delete all malicious programs on your PC using Loaris Trojan Remover, it’s better to use Standard or Full scan. Removable scan, as well as Custom, will scan only specified locations, so such types of scans cannot provide the full information.

Scan types in Loaris

You can see the detects till the scan process lasts. However, to execute any actions against spotted malware, you need to wait until the process is over, or to stop the scanning process.

Loaris during the scan

To choose the appropriate action for each detected viruses, click the knob in front of the name of detected viruses. By default, all malicious programs will be moved to quarantine.

Loaris Trojan Remover after the scan process

How to remove FakeIE Trojan?

Name: FakeIE

Description: Trojan FakeIE is a kind of virus that infiltrates into your computer, and after that performs different destructive functions. These features depend upon a type of FakeIE trojan: it can act as a downloader for many other malware or as a launcher for another destructive program which is downloaded in addition to the FakeIE trojan. During the last two years, trojans are also dispersed via e-mail attachments, and most of situations utilized for phishing or ransomware infiltration.

Operating System: Windows

Application Category: Trojan

Sending
User Review
4 (12 votes)
Comments Rating 0 (0 reviews)
  1. What is Trojan Horse: https://en.wikipedia.org/wiki/Trojan_horse_(computing)
  2. FakeIE VirusTotal Report: https://www.virustotal.com/api/v3/files/d1eb605d81fec7567fffc7086e6e210dccb00997a9e6da7d7299c07f086e693b

Helga Smith

I was always interested in computer sciences, especially in data security and the theme, which is called nowadays "data science", since my early teens. Because I was lack of related literature, I tried to find something in the Web, so, virus injections was usual for me. That's why I've got quite high skill while dealing with viruses on my computer. When I heard about the website with different guidelines about virus removal and anti-virus programs, I've joined him with no doubt. Before coming into Virusremoval team as Editor-in-chief, I was working as cybersecurity expert several companies, including one of Amazon contractors. Another experience I have got is teaching in Arden and Reading universities.

Leave a Reply

Your email address will not be published. Required fields are marked *

Sending

Back to top button