Home / Spyware Encyclopedia / IM.VB << Back

Recommendation to Automatically remove IM.VB


Our products can remove IM.VB and thousands of other Virus and Spyware automatically and instantly.

IM.VB Details


  • Category IM
  • Discovered 2/9/2009 1:45:33 PM
  • Modified 7/14/2023 12:15:34 PM
  • Threat Level High
  • Category Description
    A threat that is capable to cause Denial-Of-Service attacks against other instant messenger client systems.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
37872BB5.EXE 60416Picture1.0.0.0bbc7c12ca52e7afc5bd4ea68b41df98f 
8E00015E.EXE 147456Picture1.0.0.0a5b512ccf631c2cf168427bbdc0abb6c 
5E94B588.EXE 163880America Online1.0.0.0ad39a11496c4cc2a3e84a09c1c518eca 
E108D377.EXE 109126America Online1.0.0.096b68f79efcab285fabbbad3c952d95d 
E2C07C30.EXE 163880America Online1.0.0.07bfc3571cf878d4d9544db7d8a717a8e 
Trojan-Dropper.Win32.Tantic.exe 147456 1.0.0.0c7a54a93cd47667da308e21e469e7d34 
tmp_file_1.exe 7936  f3d15d2fc7ea734166f043519b1d873c 
Trojan-Dropper.Win32.Star.exe 610925  e59f709e7372ceeb2440565741dcfd23 
runwin32.exe 25294  7069283a7f9ece8aba6e0d33e2df66f9 
Trojan-Dropper.Win32.Sohs.exe 60928  5bb06b9129d257f060a8adeb31ea7ca4 

The following Registry Entries were created:
..\Software\Microsoft\Mrv3\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Run\\"wsys"\"%PF%\STARo\wsys.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"Windows Spooler"\"%ROOT%\WINNT\spooler.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"Services"\"%WIN%\svchost.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"RunWin32"\"%WIN.SYS32%\RunWin32.exe"
..\Software\Microsoft\Msdrv\(Default)
..\Software\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E2851929}\(Default)
..\Software\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E9941929}\(Default)
..\Software\surfsidekick2\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware