Home / Spyware Encyclopedia / IM.VB << Back

Recommendation to Automatically remove IM.VB


Our products can remove IM.VB and thousands of other Virus and Spyware automatically and instantly.

IM.VB Details


  • Category IM
  • Discovered 2/9/2009 1:45:33 PM
  • Modified 7/14/2023 12:15:34 PM
  • Threat Level High
  • Category Description
    A threat that is capable to cause Denial-Of-Service attacks against other instant messenger client systems.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
37872BB5.EXE 60416Picture1.0.0.0bbc7c12ca52e7afc5bd4ea68b41df98f 
8E00015E.EXE 147456Picture1.0.0.0a5b512ccf631c2cf168427bbdc0abb6c 
CD72F5F6.EXE 26624MAGIC_H20011.0.0.08eefcd8a7c06e1f28ca025aaede7eb3a 
Trojan-Dropper.Win32.StealthBat.exe 114688Faceless Wonder1.0.0.029e33f2b38dbdee462a8af706cd9870e 
D56EFF35.EXE 40186Britney1.0.0.090af78efe257cf04ab0587122cdb0913 
tmp_file_1.exe 7936  f3d15d2fc7ea734166f043519b1d873c 
Trojan-Dropper.Win32.Sohs.exe 60928  5bb06b9129d257f060a8adeb31ea7ca4 
31C97713.EXE 135168Picture1.0.0.0d87e2bc3dd757c7d98d98c795c558f0c30/10/2020
7890E8D9.EXE 59904Picture1.0.0.0f2b719cf723a21be6d76a92f2dc8072d11/02/2023
37872BB5.EXE 60416Picture1.0.0.0bbc7c12ca52e7afc5bd4ea68b41df98f14/07/2023

The following Registry Entries were created:
..\Software\Microsoft\Mrv3\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Run\\"wsys"\"%PF%\STARo\wsys.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"Windows Spooler"\"%ROOT%\WINNT\spooler.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"Services"\"%WIN%\svchost.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"RunWin32"\"%WIN.SYS32%\RunWin32.exe"
..\Software\Microsoft\Msdrv\(Default)
..\Software\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E2851929}\(Default)
..\Software\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E9941929}\(Default)
..\Software\surfsidekick2\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware