Home / Spyware Encyclopedia / IM.Stealth << Back

Recommendation to Automatically remove IM.Stealth


Our products can remove IM.Stealth and thousands of other Virus and Spyware automatically and instantly.

IM.Stealth Details


  • Category IM
  • Discovered 7/21/2006 3:24:00 PM
  • Modified 7/24/2023 3:06:25 PM
  • Threat Level Critical
  • Category Description
    A threat that is capable to cause Denial-Of-Service attacks against other instant messenger client systems.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
Trojan-Dropper.Win32.Small.wg.dll 33280 1.0.0.1bc779bbad96e0f5cf148752cdf83dcea 
Trojan-Dropper.Win32.Small.wc.dll 7680  fefa64fa182bc68c4c4d8657828a2396 
prntsvra.dll 11264  fafb2160e26aa44e972fb79e50be2040 
dvpd.dll 4608  f69e84728c568253cc1e7b1d377a20a2 
rch.dll 4096  eaaefdbb06ab8cebb14d8aac1bf1bb67 
dvpd.dll 5120  ea380b2e25b92cd375a0285ed4db1bb5 
Trojan-Dropper.Win32.Small.we.exe 15872  e8596268c976438b000bef77ab9e5c1b 
javafix4.dll 12288  e2ddb965d9cb041aa63b6d05124df2a1 
dvpd.dll 28672  d792d5f43ea51093eb3ac60cae31c2b7 
Trojan-Dropper.Win32.Small.wi.exe 12800  cfeef653f47d12e68fa6e0f5e27830bc 

The following Registry Entries were created:
..\Software\Microsoft\Windows\CurrentVersion\URL\Prefixes\"www."\"http://"
..\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\\"{203B1C4D9-BC71-8916-38AD-9DEA5D213614}"\"OLE Module"
..\Software\Classes\Clsid\{203B1C4D9-BC71-8916-38AD-9DEA5D213614}\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Uninstall\HTAssLib\(Default)
..\Software\Classes\HTASS.HTDP.1\(Default)
..\Software\Classes\HTASS.HTDP\(Default)
..\Software\Classes\Typelib\{4677FF8F-7740-4A9C-9F5E-E93794A86E85}\(Default)
..\Software\Classes\Clsid\{9E6EC32A-7C19-4409-99E8-FC980BCDAF26}\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\\"{03B1C4D9-BC71-8916-38AD-9DEA5D213614}"\"OLE Module"
..\Software\Microsoft\Internet Explorer\Main\HTASSstp\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware