|W32.Aizu is a worm that attempts to exploit the Microsoft Windows Local Security Authority Service Remote Buffer Overflow (described in Microsoft Security Bulletin MS04-011) using TCP port 445.
This worm propagates by scanning randomly selected IP addresses for vulnerable systems.
Copies itself as %System%\aux32.exe and adds the value: "auxAudioDevice"="c:\winnt\system32\aux32.exe"
to the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Pings a randomly generated IP address to determine whether a remote computer is online.
If the remote computer appears to be online, the worm connects to it on TCP port 445 and sends shell code to it.
Downloads zu.exe, which is a corrupted Trojan, from 22.214.171.124.
Also, attempts to connect to 126.96.36.199/zuu.php.
Remove this spyware with antivirus (also check How To Remove section)Startuip Optimizer.