This Trojan is designed to steal confidential data. It is a Windows PE EXE file. It is 428,032 bytes in size. It is written in Delphi.
The Trojan also adds a link to its executable file in the system registry, ensuring that it will be launched when Windows is rebooted on the victim machine:
“Win32Mgr” = “
This ensures that the Trojan will be launched automatically each time Windows is restarted on the victim machine.
The Trojan scans the system for windows with the class “aim_imessage” and gets contact names from the window titles.
It then scans the windows found for control elements with the class “wndate32class” and for elements with the class “ate32class” and gets text from them.
This text will be saved by the Trojan to the file which contains the Trojan executable file. The files will have a .htm extension, and the file name will be the same name as the contact name.
If your computer does not have an up-to-date antivirus, or does not have an antivirus solution at all, follow the instructions below to delete the malicious program:
|Find out the statistics of the threats spreading in your region|