Archive A Reconstructed © MegaSecurity Database
Pointex (j)
Copyright © MegaSecurity
By ?
Informations
| From | China |
| Author | ? |
| Family | Pointex |
| Category | Remote Access |
| Version | Pointex (j) |
| Language | Visual Basic, compressed with ASPack |
Additional Information
Backdoor.Win32.Pointex.j:
startup:
HKEY_CLASSES_ROOT\Applications\notepad.exe\shell\open\command "(Default)"
HKEY_CLASSES_ROOT\txtfile\shell\open\command "(Default)"
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run "CnsMax"
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
c:\windows\win.ini, [windows] "run"
added:
c:\WINDOWS\internat.exe
c:\WINDOWS\SYSTEM\kernel.exe
c:\WINDOWS\SYSTEM\mstest.exe
c:\WINDOWS\SYSTEM\outlook32.exe
c:\WINDOWS\SYSTEM\test.exe (Backdoor.Pointex.k)
all size: 135.360 bytes
registry added:
HKEY_CURRENT_USER\Software\Microsoft\Ftp
HKEY_CLASSES_ROOT\Applications\notepad.exe\shell\open\command
HKEY_CLASSES_ROOT\txtfile\shell\open\command
deleted:
c:\WINDOWS\SYSTEM\Sendmail.ocx
changed:
HKEY_CLASSES_ROOT\mailto\shell\open\command "(Default)"
Old data: "C:\PROGRAM FILES\OUTLOOK EXPRESS\MSIMN.EXE" /mailurl:%1
New data: C:\WINDOWS\SYSTEM\outlook32.exe
HKEY_CLASSES_ROOT\mp3file\shell\open\command "(Default)"
Old data: "C:\Program Files\Windows Media Player\mplayer2.exe" /Play "%L"
New data: C:\WINDOWS\SYSTEM\kernel.exe
HKEY_CLASSES_ROOT\mpegfile\Shell\Open\Command "(Default)"
Old data: "C:\Program Files\Windows Media Player\mplayer2.exe" /Play "%L"
New data: C:\WINDOWS\SYSTEM\kernel.exe
This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.