Home / Spyware Encyclopedia / IM.Stealth << Back

Recommendation to Automatically remove IM.Stealth


Our products can remove IM.Stealth and thousands of other Virus and Spyware automatically and instantly.

IM.Stealth Details


  • Category IM
  • Discovered 7/21/2006 3:24:00 PM
  • Modified 7/24/2023 3:06:25 PM
  • Threat Level Critical
  • Category Description
    A threat that is capable to cause Denial-Of-Service attacks against other instant messenger client systems.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
Trojan-Dropper.Win32.Small.wg.dll 33280 1.0.0.1bc779bbad96e0f5cf148752cdf83dcea 
prntsvra.dll 11264  fafb2160e26aa44e972fb79e50be2040 
dvpd.dll 4608  f69e84728c568253cc1e7b1d377a20a2 
javafix4.dll 12288  e2ddb965d9cb041aa63b6d05124df2a1 
dvpd.dll 28672  d792d5f43ea51093eb3ac60cae31c2b7 
prntsvra.dll 13312  cc7d2fc2493e4f60f4f68561d372f521 
rdrlib.dll 6656  c7a0c5d04e93a6c564a40dc318fbb044 
Trojan-Dropper.Win32.Small.wp.exe 31920  c387f815e5858429665fa43a5505ddc3 
Trojan-Dropper.Win32.Small.wa.exe 28287  be8ccf0a5ff99e4cd126f45d7dfdef3f 
Trojan-Dropper.Win32.Small.vy.dll 33280  985ab2ec9044240ee8b59e92962e1e02 

The following Registry Entries were created:
..\Software\Microsoft\Windows\CurrentVersion\URL\Prefixes\"www."\"http://"
..\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\\"{203B1C4D9-BC71-8916-38AD-9DEA5D213614}"\"OLE Module"
..\Software\Classes\Clsid\{203B1C4D9-BC71-8916-38AD-9DEA5D213614}\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Uninstall\HTAssLib\(Default)
..\Software\Classes\HTASS.HTDP.1\(Default)
..\Software\Classes\HTASS.HTDP\(Default)
..\Software\Classes\Typelib\{4677FF8F-7740-4A9C-9F5E-E93794A86E85}\(Default)
..\Software\Classes\Clsid\{9E6EC32A-7C19-4409-99E8-FC980BCDAF26}\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\\"{03B1C4D9-BC71-8916-38AD-9DEA5D213614}"\"OLE Module"
..\Software\Microsoft\Internet Explorer\Main\HTASSstp\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware