mekoz.no-ip.org 66.207.128.24
 * C&C Server: 66.207.128.24:6667
 * Server Password:
 * Username: DEU8
 * Nickname: Error7056818
 * Channel: #pr0n (Password: r00t)
 * Channeltopic: :oie oieeeee… campaña para ayudar a chile, mira el spot 😀 … http://iicvascularcenter.com.ar/nuevaweb/inv_docs/ayuda-chile.php??aporta=img2010 (H)
Registry Changes by all processes
 Create or Open 
 Changes  HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun “Windows Taskmager” = taskmrg.exe
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionpoliciesExplorerRun “Windows Taskmager” = taskmrg.exe
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunServices “Windows Taskmager” = taskmrg.exe
 Reads  HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionIMM “Ime File”
 HKEY_CURRENT_USERSoftwareMicrosoftCTF “Disable Thread Input Manager”
 HKEY_CURRENT_USERSoftwareMicrosoftVisual Basic6.0 “AllowUnsafeObjectPassing”
 HKEY_LOCAL_MACHINESYSTEMWPAMediaCenter “Installed”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey”
 HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionIMM “Ime File”
 HKEY_CURRENT_USERSoftwareMicrosoftCTF “Disable Thread Input Manager”
 HKEY_CURRENT_USERSoftwareMicrosoftVisual Basic6.0 “AllowUnsafeObjectPassing”
 HKEY_LOCAL_MACHINESOFTWAREMicrosoftRpcSecurityService “DefaultAuthLevel”
File Changes by all processes
 New Files  c:1.exe
 DeviceTcp
 DeviceIp
 DeviceIp
 C:WINDOWS/system32taskmrg.exe
 C:WINDOWSsystem32taskmrg.exe
 DeviceTcp
 DeviceIp
 DeviceIp
 C:WINDOWS/system32taskmrg.exe
 DeviceRasAcd
 Opened Files  .Ip
 C:WINDOWSAppPatchsysmain.sdb
 C:WINDOWSAppPatchsystest.sdb
 DeviceNamedPipeShimViewer
 C:WINDOWSsystem32
 .Ip
 Deleted Files 
 Chronological Order  Create/Open File: c:1.exe (OPEN_ALWAYS)
 Get File Attributes: C:WINDOWSsystem32.HLP Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWSHelp.HLP Flags: (SECURITY_ANONYMOUS)
 Create/Open File: DeviceTcp (OPEN_ALWAYS)
 Create/Open File: DeviceIp (OPEN_ALWAYS)
 Create/Open File: DeviceIp (OPEN_ALWAYS)
 Open File: .Ip (OPEN_EXISTING)
 Get File Attributes: C:WINDOWS/system32taskmrg.exe Flags: (SECURITY_ANONYMOUS)
 Copy File: c:1.exe to C:WINDOWS/system32taskmrg.exe
 Set File Attributes: C:WINDOWS/system32taskmrg.exe Flags: (FILE_ATTRIBUTE_HIDDEN FILE_ATTRIBUTE_READONLY FILE_ATTRIBUTE_SYSTEM SECURITY_ANONYMOUS)
 Open File: C:WINDOWSAppPatchsysmain.sdb (OPEN_EXISTING)
 Open File: C:WINDOWSAppPatchsystest.sdb (OPEN_EXISTING)
 Open File: DeviceNamedPipeShimViewer (OPEN_EXISTING)
 Open File: C:WINDOWSsystem32 ()
 Find File: C:WINDOWSsystem32taskmrg.exe
 Create/Open File: C:WINDOWSsystem32taskmrg.exe (OPEN_ALWAYS)
 Get File Attributes: C:WINDOWSsystem32.HLP Flags: (SECURITY_ANONYMOUS)
 Get File Attributes: C:WINDOWSHelp.HLP Flags: (SECURITY_ANONYMOUS)
 Create/Open File: DeviceTcp (OPEN_ALWAYS)
 Create/Open File: DeviceIp (OPEN_ALWAYS)
 Create/Open File: DeviceIp (OPEN_ALWAYS)
 Open File: .Ip (OPEN_EXISTING)
 Get File Attributes: C:WINDOWS/system32taskmrg.exe Flags: (SECURITY_ANONYMOUS)
 Set File Attributes: C:WINDOWS/system32taskmrg.exe Flags: (FILE_ATTRIBUTE_NORMAL SECURITY_ANONYMOUS)
 Copy File: C:WINDOWSsystem32taskmrg.exe to C:WINDOWS/system32taskmrg.exe
 Set File Attributes: C:WINDOWS/system32taskmrg.exe Flags: (FILE_ATTRIBUTE_HIDDEN FILE_ATTRIBUTE_READONLY FILE_ATTRIBUTE_SYSTEM SECURITY_ANONYMOUS)
 Create/Open File: DeviceRasAcd (OPEN_ALWAYS)