Remove MSIL.Stimilik.Terminate Fade.exe Keylogger - How to, Technology and PC Security Forum |

Remove MSIL.Stimilik.Terminate Fade.exe Keylogger

A new Trojan horse attack has been spotted in the wild. According to the research team at Symantec, the malware known as MSIL.Stimilik is primarily distributed via Steam instant messages.

TypeTrojan Horse, keylogger
Short DescriptionThe Trojan horse is most likely designed to harvest passwords through a keylogger.
SymptomsEntries are added to the Registry, files are added or deleted from the system.
Distribution MethodInstant messages
Detection toolDownload Malware Removal Tool, to See If Your System Has Been Affected By MSIL.Stimilik

Systems Affected by MSIL.Stimilik

The Trojan is designed to affect the following versions of the Windows operating system:
Windows 2000, Windows 7, Windows 8, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP

MSIL.Stimilik Technical Details

The MSIL.Stimilik Trojan is most likely capable of executing several malicious activities on the affected machine – adding and deleting files and folders, tempering with the Windows registry, connecting to a remote server to receive commands.

Once the Trojan has sneaked into the system, it may create multiple files:

  • %SystemDrive%\Documents and Settings\All Users\Application Data\[FOLDER name]\[FILE name].exe
  • %Temp%\difdicrj.txt
  • %Temp%\visited.txt
  • %Temp%\[RANDOM CHARACTERS].vbs

Besides adding new files, MSIL.Stimilik can delete all of the files in the following folder:

  • %SystemDrive%\Documents and Settings\All Users\Start Menu\Programs\Startup

According to Symantec, new registry entries will also be added:

  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\”Microsoft” = “[PATH TO MALWARE]”
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Winlogon\”shell” = “[PATH TO MALWARE], explorer.exe”

Our research indicates that the MSIL.Stimilik Trojan may have keylogging capabilities. According to a VirusTotal scan report, the fade.exe process is associated with the Trojan.

We have already discussed the fade.exe process. It is an executable file, a keylogger in nature, designed to start a parasite on an infected computer. Once executed, fade.exe will run a process and activate a payload.

Read More about Fade.exe

Fade.exe may be detected as any of the following:

  • MSIL:GenMalicious-AUQ [Trj] – Avast
  • Gen:Variant.Zusy.143004 – BitDefender
  • a variant of MSIL/Stimilik.AG – ESET NOD-32
  • Trojan.Passwords.STM – MalwareBytes
  • – Kaspersky
  • Trojan:Win32/Skeeyah.A!rf – Microsoft
  • Infostealer.Stimaler – Sophos

Other processes that can be affected by MSIL.Stimilik include:

dimariqq_crypt.exe; screenshot.exe; Vintrila.exe

MSIL.Stimilik Removal Options

As visible by the information provided in this article, this particular Trojan is most likely designed to harvest passwords via a keylogger. However, other types of personal information, such as banking credentials, may be targeted as well. Dealing with the Trojan may not be as easy as it seems.

Even though it is possible to manually locate and remove the threat, relying on professional AV software is recommended. MSIL.Stimilik tempers with the Windows Registry and hides in multiple directories, and a manual removal may leave traces behind

If you feel confident enough to deal with the Trojan, you can refer to our removal guide just below the article.

Step 1: Start Your PC in Safe Mode to Remove MSIL.Stimilik.

Removing MSIL.Stimilik from Windows XP, Vista, 7 systems:

1. Remove all CDs and DVDs, and then Restart your PC from the “Start” menu.
2. Select one of the two options provided below:

For PCs with a single operating system: Press “F8” repeatedly after the first boot screen shows up during the restart of your computer. In case the Windows logo appears on the screen, you have to repeat the same task again.


For PCs with multiple operating systems: Тhe arrow keys will help you select the operating system you prefer to start in Safe Mode. Press “F8” just as described for a single operating system.


3. As the “Advanced Boot Options” screen appears, select the Safe Mode option you want using the arrow keys. As you make your selection, press “Enter“.

4. Log on to your computer using your administrator account

While your computer is in Safe Mode, the words “Safe Mode” will appear in all four corners of your screen.

Removing MSIL.Stimilik from Windows 8, 8.1 and 10 systems:

Substep 1:

Open the Start Menu
Windows-10-0 (1)

Substep 2:

Whilst holding down Shift button, click on Power and then click on Restart.

Substep 3:

After reboot, the aftermentioned menu will appear. From there you should choose Troubleshoot.

Substep 4:

You will see the Troubleshoot menu. From this menu you can choose Advanced Options.
Windows-10-2 (1)

Substep 5:

After the Advanced Options menu appears, click on Startup Settings.
Windows-10-3 (1)

Substep 6:

Click on Restart.
Windows-10-5 (1)

Substep 7:

A menu will appear upon reboot. You should choose Safe Mode by pressing its corresponding number and the machine will restart and boot into Safe Mode so you can scan for and remove MSIL.Stimilik.

Step 2: Remove MSIL.Stimilik automatically by downloading an advanced anti-malware program.

To clean your computer you should download an updated anti-malware program on a safe PC and then install it on the affected computer in offline mode. After that you should boot into safe mode and scan your computer to remove all MSIL.Stimilik associated objects.

NOTE! Substantial notification about the MSIL.Stimilik threat: Manual removal of MSIL.Stimilik requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum for 4 years. Enjoys ‘Mr. Robot’ and fears ‘1984’. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles!

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share