Home / Spyware Encyclopedia / IM.Stealth << Back

Recommendation to Automatically remove IM.Stealth


Our products can remove IM.Stealth and thousands of other Virus and Spyware automatically and instantly.

IM.Stealth Details


  • Category IM
  • Discovered 7/21/2006 3:24:00 PM
  • Modified 7/24/2023 3:06:25 PM
  • Threat Level Critical
  • Category Description
    A threat that is capable to cause Denial-Of-Service attacks against other instant messenger client systems.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
Trojan-Dropper.Win32.Small.wc.dll 7680  fefa64fa182bc68c4c4d8657828a2396 
dvpd.dll 4608  f69e84728c568253cc1e7b1d377a20a2 
rch.dll 4096  eaaefdbb06ab8cebb14d8aac1bf1bb67 
Trojan-Dropper.Win32.Small.we.exe 15872  e8596268c976438b000bef77ab9e5c1b 
javafix4.dll 12288  e2ddb965d9cb041aa63b6d05124df2a1 
dvpd.dll 28672  d792d5f43ea51093eb3ac60cae31c2b7 
netdx.dat 31  71ece5f681cd2a4bc34f494fd72cb50d 
winup2date.dll 5632  33536cef5b2856cd79a050a675f4c654 
Trojan-Dropper.Win32.Small.wn.exe 7680  13e5fcd886e72ddd46cd87aaaa53b0e6 
rch32.dll 13    

The following Registry Entries were created:
..\Software\Microsoft\Windows\CurrentVersion\URL\Prefixes\"www."\"http://"
..\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\\"{203B1C4D9-BC71-8916-38AD-9DEA5D213614}"\"OLE Module"
..\Software\Classes\Clsid\{203B1C4D9-BC71-8916-38AD-9DEA5D213614}\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Uninstall\HTAssLib\(Default)
..\Software\Classes\HTASS.HTDP.1\(Default)
..\Software\Classes\HTASS.HTDP\(Default)
..\Software\Classes\Typelib\{4677FF8F-7740-4A9C-9F5E-E93794A86E85}\(Default)
..\Software\Classes\Clsid\{9E6EC32A-7C19-4409-99E8-FC980BCDAF26}\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\\"{03B1C4D9-BC71-8916-38AD-9DEA5D213614}"\"OLE Module"
..\Software\Microsoft\Internet Explorer\Main\HTASSstp\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware