Home / Spyware Encyclopedia / IM.Stealth << Back

Recommendation to Automatically remove IM.Stealth


Our products can remove IM.Stealth and thousands of other Virus and Spyware automatically and instantly.

IM.Stealth Details


  • Category IM
  • Discovered 7/21/2006 3:24:00 PM
  • Modified 7/24/2023 3:06:25 PM
  • Threat Level Critical
  • Category Description
    A threat that is capable to cause Denial-Of-Service attacks against other instant messenger client systems.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
Trojan-Dropper.Win32.Small.wc.dll 7680  fefa64fa182bc68c4c4d8657828a2396 
dvpd.dll 4608  f69e84728c568253cc1e7b1d377a20a2 
dvpd.dll 28672  d792d5f43ea51093eb3ac60cae31c2b7 
netdx.dat 31  71ece5f681cd2a4bc34f494fd72cb50d 
HTASSUI.exe 3072  648ce356f8867c85e4a107759f6d7b36 
strto.exe 13312  0943135ea79fd2af640342430ff84357 
Trojan-AOL.Win32.Stealth 0Microsoft Corporation4.10.199817c0d4b52853d5ae74e870484ae8a5ac23/01/2020
bre.dll 7168  3b935062248a85c1cfcfc635ee675b1126/02/2021
1e1e1edefa490b60553f86ec8cb50d6a.vir.exe 15430Microsoft Corporation4.10.19981e1e1edefa490b60553f86ec8cb50d6a 
rch32.dll 13    

The following Registry Entries were created:
..\Software\Microsoft\Windows\CurrentVersion\URL\Prefixes\"www."\"http://"
..\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\\"{203B1C4D9-BC71-8916-38AD-9DEA5D213614}"\"OLE Module"
..\Software\Classes\Clsid\{203B1C4D9-BC71-8916-38AD-9DEA5D213614}\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Uninstall\HTAssLib\(Default)
..\Software\Classes\HTASS.HTDP.1\(Default)
..\Software\Classes\HTASS.HTDP\(Default)
..\Software\Classes\Typelib\{4677FF8F-7740-4A9C-9F5E-E93794A86E85}\(Default)
..\Software\Classes\Clsid\{9E6EC32A-7C19-4409-99E8-FC980BCDAF26}\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\\"{03B1C4D9-BC71-8916-38AD-9DEA5D213614}"\"OLE Module"
..\Software\Microsoft\Internet Explorer\Main\HTASSstp\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware