Home / Spyware Encyclopedia / IM.VB << Back

Recommendation to Automatically remove IM.VB


Our products can remove IM.VB and thousands of other Virus and Spyware automatically and instantly.

IM.VB Details


  • Category IM
  • Discovered 2/9/2009 1:45:33 PM
  • Modified 7/14/2023 12:15:34 PM
  • Threat Level High
  • Category Description
    A threat that is capable to cause Denial-Of-Service attacks against other instant messenger client systems.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
37872BB5.EXE 60416Picture1.0.0.0bbc7c12ca52e7afc5bd4ea68b41df98f 
8E00015E.EXE 147456Picture1.0.0.0a5b512ccf631c2cf168427bbdc0abb6c 
CD72F5F6.EXE 26624MAGIC_H20011.0.0.08eefcd8a7c06e1f28ca025aaede7eb3a 
D2236A66.EXE 58252Guelfoweb Production1.0.0.0d9d8ed4096daec3fb45a1ccc1d3416f6 
B6B6122C.EXE 61440Guelfoweb Production1.0.0.0ca6919b2e4a385ea289c2d90e9f8d5ea 
Trojan-Dropper.Win32.StealthBat.exe 114688Faceless Wonder1.0.0.029e33f2b38dbdee462a8af706cd9870e 
D56EFF35.EXE 40186Britney1.0.0.090af78efe257cf04ab0587122cdb0913 
5E94B588.EXE 163880America Online1.0.0.0ad39a11496c4cc2a3e84a09c1c518eca 
E108D377.EXE 109126America Online1.0.0.096b68f79efcab285fabbbad3c952d95d 
E2C07C30.EXE 163880America Online1.0.0.07bfc3571cf878d4d9544db7d8a717a8e 

The following Registry Entries were created:
..\Software\Microsoft\Mrv3\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Run\\"wsys"\"%PF%\STARo\wsys.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"Windows Spooler"\"%ROOT%\WINNT\spooler.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"Services"\"%WIN%\svchost.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"RunWin32"\"%WIN.SYS32%\RunWin32.exe"
..\Software\Microsoft\Msdrv\(Default)
..\Software\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E2851929}\(Default)
..\Software\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E9941929}\(Default)
..\Software\surfsidekick2\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware