by ?
Written in Microsoft Visual C++, compressed with UPX
Origin: China
size: 57,344 bytes port: 33440 TCP added to registry: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_TCP32SEC HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_TCP32SEC\0000 HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_TCP32SEC\0000\Control HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tcp32sec HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tcp32sec\Enum HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tcp32sec\Security HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\l HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_TCP32SEC HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_TCP32SEC\0000 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_TCP32SEC\0000\Control HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tcp32sec HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tcp32sec\Enum HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tcp32sec\Security HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer "mutexname" data: kSOSVXJ HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer "sockport" data: 33440 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer "spoofurl" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "devsec" data: C:\WINDOWS\tcp32ss.exe c:\windows\win.ini, [windows] "load" value: tcp32ss.exe tested on Windows XP April 17, 2005MegaSecurity