TrojanDropper:MSIL/VB.I
Posted: February 22, 2011
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
| Threat Level: | 8/10 |
|---|---|
| Infected PCs: | 379 |
| First Seen: | February 11, 2011 |
|---|---|
| Last Seen: | June 20, 2022 |
| OS(es) Affected: | Windows |
Just as the name implies, TrojanDropper:MSIL/VB.I is a Trojan that drops malware onto your computer. TrojanDropper:MSIL/VB.I may be distributed in software bundles, especially through P2P and other large-scale file-sharing networks. Infection by TrojanDropper:MSIL/VB.I has been classified a severe threat, because this Trojan will install malware without your consent and may also serve as a backdoor for remote hacker assailants. Deleting TrojanDropper:MSIL/VB.I should usually be handled by reliable software programmed for the task, since some reports have indicated this Trojan to be polymorphic and correspondingly hard to identify.
TrojanDropper:MSIL/VB.I is Every Other Trojan's Best Friend
TrojanDropper:MSIL/VB.I has several functions, but its primary risk comes from its ability to download and install malware in secret. Any system infected with TrojanDropper:MSIL/VB.I will rapidly find itself infected by other attackers as well, and these other malware invaders may or may not give any readily observable inklings of their presence. Some other popular types of malware can allow remote attackers to spy on or control your computer, hijack your browser or create fake system alerts. If you don't delete TrojanDropper:MSIL/VB.I when you first see Trojan.Win32.Scar.dimu, the next day may very well be too late!
As a secondary danger, TrojanDropper:MSIL/VB.I can also reduce your security deliberately to enable remote attacker access. This is tantamount to giving your computer away to a hacker with all information and system resources still intact. Even without obvious signs of a remote attack, the attacker may still be using keylogging malware or other spyware to record and steal all information that passes through your machine.
How Your Computer Contracted the TrojanDropper:MSIL/VB.I Taint
TrojanDropper:MSIL/VB.I has been reported to be distributed as part of bundled packages with other software. Its presence is particularly likely on large-scale file-sharing services such as P2P networks, where security against Trojans like TrojanDropper:MSIL/VB.I is low.
The TrojanDropper:MSIL/VB.I infection may also be difficult to spot because some reports have given an indication of polymorphic (or shape-changing) abilities. This trait allows malware to change its appearance while keeping all core functions intact, making problems like TrojanDropper:MSIL/VB.I quite difficult to stomp out. In particular, file and process names may change completely after a reboot, so you shouldn't try to identify TrojanDropper:MSIL/VB.I without help in most cases.
Relying on popular and updated security tools is your most likely salvation against TrojanDropper:MSIL/VB.I. Any anti-virus program that hasn't been updated since November of 2010 may not be capable of deleting TrojanDropper:MSIL/VB.I, so check the date on that malware definitions file every once in a while!
Aliases
More aliases (296)
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%ALLUSERSPROFILE%\Datos de programa\ff0234\SIff0_231.exe
File name: SIff0_231.exeSize: 3.73 MB (3739136 bytes)
MD5: 8a32323d1b867c9ac4b24db1ed374b08
Detection count: 96
File type: Executable File
Mime Type: unknown/exe
Path: %ALLUSERSPROFILE%\Datos de programa\ff0234
Group: Malware file
Last Updated: February 14, 2011
%PROGRAMFILES%\Messenger Detect\mdsrv.exe
File name: mdsrv.exeSize: 426.49 KB (426496 bytes)
MD5: 099502f2474112197aff69459d4254a1
Detection count: 91
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Messenger Detect
Group: Malware file
Last Updated: February 14, 2011
%APPDATA%\Dvdmod\deptor.exe
File name: deptor.exeSize: 281.08 KB (281088 bytes)
MD5: b64566457ad3bad891d85045e3f2613c
Detection count: 86
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\Dvdmod
Group: Malware file
Last Updated: February 14, 2011
%WINDIR%\system32\cbbxww.dll
File name: cbbxww.dllSize: 83.45 KB (83456 bytes)
MD5: a0ea5fa2feb864ef20af1cc617d8f1b9
Detection count: 72
File type: Dynamic link library
Mime Type: unknown/dll
Path: %WINDIR%\system32
Group: Malware file
Last Updated: March 14, 2011
%WINDIR%\l316msh.dll
File name: l316msh.dllSize: 98.3 KB (98304 bytes)
MD5: 99eb23886ae97bf9f110607c55e84f95
Detection count: 65
File type: Dynamic link library
Mime Type: unknown/dll
Path: %WINDIR%
Group: Malware file
Last Updated: February 16, 2011
%WINDIR%\system32\install\server.exe
File name: server.exeSize: 1.01 MB (1015808 bytes)
MD5: 362fa9957ca6d9f82b152d27994cb445
Detection count: 46
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\system32\install
Group: Malware file
Last Updated: February 28, 2011
%APPDATA%\Adobe\Update\flacor.dat
File name: flacor.datSize: 99.84 KB (99840 bytes)
MD5: 1fa09bb9832c5c554eff31f812ab0e2e
Detection count: 37
File type: Data file
Mime Type: unknown/dat
Path: %APPDATA%\Adobe\Update
Group: Malware file
Last Updated: February 16, 2011
C:\Recycle.Bin\Recycle.Bin.exe
File name: Recycle.Bin.exeSize: 263.9 KB (263900 bytes)
MD5: 112fba6f7e516f87515262ef50d320fc
Detection count: 16
File type: Executable File
Mime Type: unknown/exe
Path: C:\Recycle.Bin
Group: Malware file
Last Updated: February 14, 2011
%WINDIR%\system32\xxvttq.dll
File name: xxvttq.dllSize: 120.32 KB (120320 bytes)
MD5: e8757390d669b0f194aaac8d5d15ac96
Detection count: 14
File type: Dynamic link library
Mime Type: unknown/dll
Path: %WINDIR%\system32
Group: Malware file
Last Updated: March 14, 2011
%WINDIR%\system32\ssqomk.dll
File name: ssqomk.dllSize: 119.8 KB (119808 bytes)
MD5: 6573931e3bded828bcf4a3dc52ca6f82
Detection count: 14
File type: Dynamic link library
Mime Type: unknown/dll
Path: %WINDIR%\system32
Group: Malware file
Last Updated: April 11, 2011
%APPDATA%\Flipopia\flipopia.exe
File name: flipopia.exeSize: 741.37 KB (741376 bytes)
MD5: 97efc479b132b145795a756c4f49b47e
Detection count: 12
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\Flipopia
Group: Malware file
Last Updated: February 16, 2011
%TEMP%\khghih.dll
File name: khghih.dllSize: 119.29 KB (119296 bytes)
MD5: 780e077550b7ca7d9697e142c728a094
Detection count: 11
File type: Dynamic link library
Mime Type: unknown/dll
Path: %TEMP%
Group: Malware file
Last Updated: March 14, 2011
%WINDIR%\system32\ir41_qc32.dll
File name: ir41_qc32.dllSize: 250.88 KB (250880 bytes)
MD5: 2bc02e861cf9eafcc7fd2d1ea3c0487b
Detection count: 7
File type: Dynamic link library
Mime Type: unknown/dll
Path: %WINDIR%\system32
Group: Malware file
Last Updated: February 14, 2011
%WINDIR%\system32\ATIDEMGX32.dll
File name: ATIDEMGX32.dllSize: 406.01 KB (406016 bytes)
MD5: 4e188411f7d2738f3a1d9e9cf045f6d9
Detection count: 7
File type: Dynamic link library
Mime Type: unknown/dll
Path: %WINDIR%\system32
Group: Malware file
Last Updated: February 14, 2011
%WINDIR%\java_is1.exe
File name: java_is1.exeSize: 66.19 KB (66196 bytes)
MD5: b85d9ab1d6816fed98f3f44ddc48ad30
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%
Group: Malware file
Last Updated: June 6, 2011
C:\asdfjnkads.exe
File name: asdfjnkads.exeSize: 156.67 KB (156672 bytes)
MD5: fe95429ed5b1990e5edb535a947615fa
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: C:\asdfjnkads.exe
Group: Malware file
Last Updated: February 14, 2011
%USERPROFILE%\Local Settings\Application Data\isaWebClock\CdCommsPath.dll
File name: CdCommsPath.dllSize: 81.92 KB (81920 bytes)
MD5: abd05e0200d8b03b02901d0b2c87e990
Detection count: 5
File type: Dynamic link library
Mime Type: unknown/dll
Path: %USERPROFILE%\Local Settings\Application Data\isaWebClock
Group: Malware file
Last Updated: February 16, 2011
%WINDIR%\system32\msexch4032.dll
File name: msexch4032.dllSize: 248.83 KB (248832 bytes)
MD5: 32952bf929e0b9b2c090241179e51a3e
Detection count: 5
File type: Dynamic link library
Mime Type: unknown/dll
Path: %WINDIR%\system32
Group: Malware file
Last Updated: February 14, 2011
More files
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.