Class Trojan-Spy
Platform Win32

Technical Details

This Trojan is designed to steal confidential data. It is a Windows PE EXE file. It is 428,032 bytes in size. It is written in Delphi.


The Trojan also adds a link to its executable file in the system registry, ensuring that it will be launched when Windows is rebooted on the victim machine:

“Win32Mgr” = “

This ensures that the Trojan will be launched automatically each time Windows is restarted on the victim machine.


The Trojan scans the system for windows with the class “aim_imessage” and gets contact names from the window titles.

It then scans the windows found for control elements with the class “wndate32class” and for elements with the class “ate32class” and gets text from them.

This text will be saved by the Trojan to the file which contains the Trojan executable file. The files will have a .htm extension, and the file name will be the same name as the contact name.

Removal instructions

If your computer does not have an up-to-date antivirus, or does not have an antivirus solution at all, follow the instructions below to delete the malicious program:

  1. Use Task Manager to terminate the Trojan process.
  2. Delete the original Trojan file (the location will depend on how the program originally penetrated the victim machine).
  3. Delete the following link from the system registry:
    “Win32Mgr” = “
  4. Delete all files created by the Trojan.
  5. Update your antivirus databases and perform a full scan of the computer ( download a trial version of Kaspersky Anti-Virus).
Find out the statistics of the threats spreading in your region