Home / Spyware Encyclopedia / IM.Geef << Back

Recommendation to Automatically remove IM.Geef


Our products can remove IM.Geef and thousands of other Virus and Spyware automatically and instantly.

IM.Geef Details


  • Category IM
  • Discovered 1/12/2014 12:29:42 AM
  • Modified 8/2/2023 6:04:07 PM
  • Threat Level Critical
  • Category Description
    A threat that is capable to cause Denial-Of-Service attacks against other instant messenger client systems.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
Trojan-Dropper.Win32.Small.es.exe 10240  fedd92c7432d404f637929497ff27154 
gigdkhmg.exe 10752  bbe8e9d5d5e9df3c56c37bfc0bcb9be2 
hfgdpkbc.exe 10752  bbe8e9d5d5e9df3c56c37bfc0bcb9be2 
Trojan-Dropper.Win32.Small.er.exe 10752  bbe8e9d5d5e9df3c56c37bfc0bcb9be2 
keikhlbc.exe 10752  bbe8e9d5d5e9df3c56c37bfc0bcb9be2 
swchost.exe 780696  9f0570a29981d0a576348c587ce1c6ce 
Trojan-Dropper.Win32.Small.fb.exe 32768  6d9cd720c012aec017b89c93880fe08b 
scchostc.exe 30000  1d983a4b8559e369dbcec82472f9345a 
Trojan-Dropper.Win32.Small.eu.exe 3584  15363c2c8599d5f8effc1b5e7aa759ec 
surte.exe 1585    

The following Registry Entries were created:
..\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\\"SysTray.Ex"\"{F5B7D0BE-5f02-4255-96DB-386DFA244900}"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"Windows report"\"%WIN%\swchost.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"Systems"\"%WIN%\svchost.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"Alive System"\"%WIN.SYS32%\scchost.exe"
..\Software\Classes\MsnIeSfty.Update\(Default)
..\Software\Classes\Typelib\{853B6F42-EE7D-49A1-84E6-960942D2A073}\(Default)
..\Software\Classes\Typelib\{5631DCE7-6AE2-4A3D-B960-7D0417812FE9}\(Default)
..\Software\Classes\Clsid\{F5B7D0BE-5f02-4255-96DB-386DFA244900}\(Default)
..\Software\Classes\Clsid\{A959F206-CF51-40B2-9E19-589DD5D24E42}\(Default)
..\Software\Classes\Clsid\{53E10C2C-43B2-4657-BA29-AAE179E7D35C}\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware