What is FakeMBAM Backdoor?
|
Keylogger
|
Do FakeMBAM Backdoor modifies or delete files?
|
Yes
|
IS FakeMBAM Backdoor connects Itself To remote server?
|
No
|
Does It Alters Safe Mode and System Restore Point?
|
No
|
Can FakeMBAM Backdoor provide unauthorized access To Hackers?
|
Yes
|
Can FakeMBAM Backdoor Result Into DdoS attack ?
|
Yes
|
Can FakeMBAM Backdoor Drop additional malicious files On PC?
|
Yes
|
Trojan Dropped are Trojan Horse PSW Generic9.UCX, MIRC Abuser, Puper, Trojan.Comet.A, Pripecs, TSR.BOOT, Lowzones.gen!A, PKZap Trojan, IRC-Worm.Delarm.a2, Trojan.Rustok-B
|
Is it possible for It to drop a keylogger into PC?
|
Yes
|
Do It uses Self-Replicating technique?
|
Yes
|
Does FakeMBAM Backdoor captures keystrokes?
|
Yes
|
DO Trojan Monitor Internet Sessions?
|
Yes
|
Does It Lead To “BSOD Error”
|
Yes
|
Does It provide superuser-level access to Hackers?
|
No
|
Is your System log files accessed by Trojan?
|
No
|
Do Trojan belong to large botnet category?
|
Yes
|
Can FakeMBAM Backdoor search for the specific cookies?
|
Yes
|
Can FakeMBAM Backdoor Install spyware and viruses ?
|
Yes
|
Spyware installed by SmartPCKeylogger, SniperSpy, Adware.ActivShop, Rootkit.Agent.DP, DLSearchBar, Kidda Toolbar, Remote Password Stealer, SpySure, Spyware.Keylogger, IE PassView, Windows Custom Settings
|
Does FakeMBAM Backdoor blocks Task Manager and Registry Editor?
|
Yes
|
Do Trojan present itself as a fake screen saver?
|
No
|
Does It disable the Windows processes and services?
|
No
|
Can FakeMBAM Backdoor disable Windows processes without users awareness?
|
Yes
|
Does FakeMBAM Backdoor degrade net speed and browsing experience?
|
No
|
Does FakeMBAM Backdoor perform some unusual browser activity?
|
Yes
|
Do You Notice error message on regular basis Due To FakeMBAM Backdoor?
|
Yes
|
Windows Error caused by FakeMBAM Backdoor are – 0xf080E CBS_E_MANIFEST_VALIDATION_DUPLICATE_ATTRIBUTES multiple attributes have the same name, 0xf0820 CBS_E_CANCEL user cancel, IDCANCEL returned by ICbsUIHandler method except Error(), 0x80249004 WU_E_INVENTORY_UNEXPECTED There was an inventory error not covered by another error code., 0x000000E3, 0x00000100, 0x8024402C WU_E_PT_WINHTTP_NAME_NOT_RESOLVED Same as ERROR_WINHTTP_NAME_NOT_RESOLVED – the proxy server or target server name cannot be resolved., 0xf081A CBS_E_INVALID_DRIVER_OPERATION_KEY the driver operations key is corrupt or invalid, 0x0000001B, 0x00000012, 0x80243FFD WU_E_NON_UI_MODE Unable to show UI when in non-UI mode; WU client UI modules may not be installed.
|
|
Does FakeMBAM Backdoor affect your system severely?
|
Yes
|
Does FakeMBAM Backdoor intercepts DNS requests?
|
Yes
|
Does FakeMBAM Backdoor drop a keylogger Into PC?
|
Yes
|
DO FakeMBAM Backdoor Keeps hiding its original host location?
|
No
|
Does It Disrupts Windows Firewall installed on the PC?
|
No
|
Is the bandwidth consumed by FakeMBAM Backdoor maximum?
|
No
|
Does It target government organizations?
|
Yes
|
Does It USE P2P file sharing distribution method?
|
No
|
Does It use Self-Replicating technique?
|
No
|
FakeMBAM Backdoor infects wlnotify.dll 5.1.2600.2180, drmv2clt.dll 11.0.7600.16385, System.Printing.ni.dll 3.0.6920.5011, smpclrc1.dll 0.3.1281.2, winipsec.dll 5.1.2600.5512, wsnmp32.dll 5.1.2600.5512, PresentationUI.dll 3.0.6920.4902, kbdcr.dll 7.0.5730.13, sbe.dll 6.5.2715.3011, psbase.dll 6.1.7600.16385, rdpdd.dll 6.1.7601.17514, scrrun.dll 5.7.0.18000, cabview.dll 6.0.6000.21203, msvcp50.dll 5.0.0.7051
|
Does It open backdoor in infected system?
|
Yes
|
Does It Disables security software on infected system?
|
Yes
|
Can It Record Keystrokes?
|
Yes
|
How FakeMBAM Backdoor Monitor Internet Activity On Compromised PC
|
Bundled With Freeware Program
|
Is It possible for Trojan To Encrypt files ?
|
Yes
|
Is it possible for It to Change browser settings?
|
No
|
Can FakeMBAM Backdoor Steal User Account Information?
|
No
|
Does FakeMBAM Backdoor changes Default System configurations ?
|
Yes
|
Are you seeing fake scan dialog boxes on your screen because of Trojan?
|
No
|
Does FakeMBAM Backdoor modify or corrupts users System files?
|
Yes
|
Can Trojan Be Rated on Threat Level?
|
Critical
|