Home / Spyware Encyclopedia / IM.VB << Back

Recommendation to Automatically remove IM.VB


Our products can remove IM.VB and thousands of other Virus and Spyware automatically and instantly.

IM.VB Details


  • Category IM
  • Discovered 2/9/2009 1:45:33 PM
  • Modified 7/14/2023 12:15:34 PM
  • Threat Level High
  • Category Description
    A threat that is capable to cause Denial-Of-Service attacks against other instant messenger client systems.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
D2236A66.EXE 58252Guelfoweb Production1.0.0.0d9d8ed4096daec3fb45a1ccc1d3416f6 
B6B6122C.EXE 61440Guelfoweb Production1.0.0.0ca6919b2e4a385ea289c2d90e9f8d5ea 
Trojan-Dropper.Win32.StealthBat.exe 114688Faceless Wonder1.0.0.029e33f2b38dbdee462a8af706cd9870e 
Trojan-Dropper.Win32.Tantic.exe 147456 1.0.0.0c7a54a93cd47667da308e21e469e7d34 
E2D5F6C2.EXE 289456 1.0.0.0728fdcbd9eee0f4bf5b9b875673c6a7e 
2A89C477.EXE 29676 1.0.0.05fb22af612ac44501090073865fc11d2 
wsys.dll 49153  f55a09473bb1c5b7c33d19574adbb4dd 
tmp_file_1.exe 7936  f3d15d2fc7ea734166f043519b1d873c 
Trojan-Dropper.Win32.Star.exe 610925  e59f709e7372ceeb2440565741dcfd23 
Trojan-Dropper.Win32.Sohs.exe 60928  5bb06b9129d257f060a8adeb31ea7ca4 

The following Registry Entries were created:
..\Software\Microsoft\Mrv3\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Run\\"wsys"\"%PF%\STARo\wsys.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"Windows Spooler"\"%ROOT%\WINNT\spooler.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"Services"\"%WIN%\svchost.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"RunWin32"\"%WIN.SYS32%\RunWin32.exe"
..\Software\Microsoft\Msdrv\(Default)
..\Software\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E2851929}\(Default)
..\Software\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E9941929}\(Default)
..\Software\surfsidekick2\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware