Home / Spyware Encyclopedia / IM.Stealth << Back

Recommendation to Automatically remove IM.Stealth


Our products can remove IM.Stealth and thousands of other Virus and Spyware automatically and instantly.

IM.Stealth Details


  • Category IM
  • Discovered 7/21/2006 3:24:00 PM
  • Modified 7/24/2023 3:06:25 PM
  • Threat Level Critical
  • Category Description
    A threat that is capable to cause Denial-Of-Service attacks against other instant messenger client systems.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
Trojan-Dropper.Win32.Small.wg.dll 33280 1.0.0.1bc779bbad96e0f5cf148752cdf83dcea 
dvpd.dll 4608  f69e84728c568253cc1e7b1d377a20a2 
javafix4.dll 12288  e2ddb965d9cb041aa63b6d05124df2a1 
dvpd.dll 28672  d792d5f43ea51093eb3ac60cae31c2b7 
Trojan-Dropper.Win32.Small.wo.exe 494080  7c0a24b230d17df1cc54b1c1dd666aac 
netdx.dat 31  71ece5f681cd2a4bc34f494fd72cb50d 
bre32.dll 39  6746248019882197e5980f8c6214e8ea 
winup2date.dll 5632  33536cef5b2856cd79a050a675f4c654 
Trojan-Dropper.Win32.Small.wn.exe 7680  13e5fcd886e72ddd46cd87aaaa53b0e6 
rch32.dll 13    

The following Registry Entries were created:
..\Software\Microsoft\Windows\CurrentVersion\URL\Prefixes\"www."\"http://"
..\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\\"{203B1C4D9-BC71-8916-38AD-9DEA5D213614}"\"OLE Module"
..\Software\Classes\Clsid\{203B1C4D9-BC71-8916-38AD-9DEA5D213614}\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Uninstall\HTAssLib\(Default)
..\Software\Classes\HTASS.HTDP.1\(Default)
..\Software\Classes\HTASS.HTDP\(Default)
..\Software\Classes\Typelib\{4677FF8F-7740-4A9C-9F5E-E93794A86E85}\(Default)
..\Software\Classes\Clsid\{9E6EC32A-7C19-4409-99E8-FC980BCDAF26}\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\\"{03B1C4D9-BC71-8916-38AD-9DEA5D213614}"\"OLE Module"
..\Software\Microsoft\Internet Explorer\Main\HTASSstp\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware