pimp.foilball.info

pimp.foilball.info 78.129.228.56
Resolved: [pimp.foilball.info] To [78.129.228.56]

C&C Server: 78.129.228.56:65267
Server Password:
Username: ylbcherw
Nickname: DEU|00|XP|SP3|7410895
Channel: #NzM# (Password: screwu)
Channeltopic: :.root.start sym 100 5 0 -a -r
Now talking in #NzM#
Topic On: [ #NzM# ] [ .root.start dcom135 200 0 0 59.x.x.x -a -r -s ]
Topic By: [ weeble ]

Registry Changes by all processes
Create or Open
Changes HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesNetBTParameters “TransportBindName” =
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesSharedAccess “Start” = [REG_DWORD, value: 00000004]
HKEY_LOCAL_MACHINESYSTEMControlSet001Serviceswuauserv “Start” = [REG_DWORD, value: 00000004]
HKEY_LOCAL_MACHINESYSTEMControlSet001Serviceswscsvc “Start” = [REG_DWORD, value: 00000004]
HKEY_LOCAL_MACHINESOFTWAREMicrosoftOle “EnableDCOM” = N
HKEY_LOCAL_MACHINESOFTWAREMicrosoftOle “EnableRemoteConnect” = N
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsa “restrictanonymous” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlSecurityProvidersSCHANNELProtocolsPCT1.0Server “Enabled” = [REG_BINARY, size: 1 bytes]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesLanmanServerParameters “AutoShareWks” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesLanmanServerParameters “AutoShareServer” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “NameServer” =
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “ForwardBroadcasts” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “IPEnableRouter” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “Domain” =
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “SearchList” =
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “UseDomainNameDevolution” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “EnableICMPRedirect” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DeadGWDetectDefault” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DontAddDefaultGatewayDefault” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “EnableSecurityFilters” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “AllowUnqualifiedQuery” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “PrioritizeRecordData” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “TCP1320Opts” = [REG_DWORD, value: 00000003]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “KeepAliveTime” = [REG_DWORD, value: 00023280]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “BcastQueryTimeout” = [REG_DWORD, value: 000002EE]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “BcastNameQueryCount” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “CacheTimeout” = [REG_DWORD, value: 0000EA60]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “Size/Small/Medium/Large” = [REG_DWORD, value: 00000003]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “LargeBufferSize” = [REG_DWORD, value: 00001000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “SynAckProtect” = [REG_DWORD, value: 00000002]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “PerformRouterDiscovery” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “EnablePMTUBHDetect” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “FastSendDatagramThreshold ” = [REG_DWORD, value: 00000400]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “StandardAddressLength ” = [REG_DWORD, value: 00000018]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DefaultReceiveWindow ” = [REG_DWORD, value: 00004000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DefaultSendWindow” = [REG_DWORD, value: 00004000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “BufferMultiplier” = [REG_DWORD, value: 00000200]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “PriorityBoost” = [REG_DWORD, value: 00000002]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “IrpStackSize” = [REG_DWORD, value: 00000004]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “IgnorePushBitOnReceives” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DisableAddressSharing” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “AllowUserRawAccess” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DisableRawSecurity” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DynamicBacklogGrowthDelta” = [REG_DWORD, value: 00000032]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “FastCopyReceiveThreshold” = [REG_DWORD, value: 00000400]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “LargeBufferListDepth” = [REG_DWORD, value: 0000000A]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “MaxActiveTransmitFileCount” = [REG_DWORD, value: 00000002]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “MaxFastTransmit” = [REG_DWORD, value: 00000040]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “OverheadChargeGranularity” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “SmallBufferListDepth” = [REG_DWORD, value: 00000020]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “SmallerBufferSize” = [REG_DWORD, value: 00000080]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “TransmitWorker” = [REG_DWORD, value: 00000020]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DNSQueryTimeouts” = [REG_MULTI_SZ, value: “1”, size: 26 bytes]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DefaultRegistrationTTL” = [REG_DWORD, value: 00000014]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DisableReplaceAddressesInConflicts” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DisableReverseAddressRegistrations” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “UpdateSecurityLevel ” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DisjointNameSpace” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “QueryIpMatching” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “NoNameReleaseOnDemand” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “EnableDeadGWDetect” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “EnableFastRouteLookup” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “MaxFreeTcbs” = [REG_DWORD, value: 000007D0]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “MaxHashTableSize” = [REG_DWORD, value: 00000800]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “SackOpts” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “Tcp1323Opts” = [REG_DWORD, value: 00000003]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “TcpMaxDupAcks” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “TcpRecvSegmentSize” = [REG_DWORD, value: 00000585]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “TcpSendSegmentSize” = [REG_DWORD, value: 00000585]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “TcpWindowSize” = [REG_DWORD, value: 0007D200]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DefaultTTL” = [REG_DWORD, value: 00000030]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “TcpMaxHalfOpen” = [REG_DWORD, value: 0000004B]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “TcpMaxHalfOpenRetried” = [REG_DWORD, value: 00000050]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “TcpTimedWaitDelay” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “MaxNormLookupMemory” = [REG_DWORD, value: 00030D40]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “FFPControlFlags” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “FFPFastForwardingCacheSize” = [REG_DWORD, value: 00030D40]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “MaxForwardBufferMemory” = [REG_DWORD, value: 00019DF7]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “MaxFreeTWTcbs” = [REG_DWORD, value: 000007D0]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “GlobalMaxTcpWindowSize” = [REG_DWORD, value: 0007D200]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “EnablePMTUDiscovery” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “ForwardBufferMemory” = [REG_DWORD, value: 00019DF7]
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet Settings “MaxConnectionsPer1_0Server” = [REG_DWORD, value: 00000050]
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet Settings “MaxConnectionsPerServer” = [REG_DWORD, value: 00000050]
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun “Nod32 Service” = nod64.exe
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunServices “Nod32 Service” = nod64.exe
HKEY_CURRENT_USERSoftwareMicrosoftOLE “Nod32 Service” = nod64.exe
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesSharedAccessParametersFirewallPolicyStandardProfileAuthorizedApplicationsList “” = :*:Enabled:Nod32 Service
HKEY_LOCAL_MACHINESOFTWAREMicrosoftOle “EnableDCOM” = N
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsa “restrictanonymous” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesNetBTParameters “TransportBindName” =
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesSharedAccess “Start” = [REG_DWORD, value: 00000004]
HKEY_LOCAL_MACHINESYSTEMControlSet001Serviceswuauserv “Start” = [REG_DWORD, value: 00000004]
HKEY_LOCAL_MACHINESYSTEMControlSet001Serviceswscsvc “Start” = [REG_DWORD, value: 00000004]
HKEY_LOCAL_MACHINESOFTWAREMicrosoftOle “EnableDCOM” = N
HKEY_LOCAL_MACHINESOFTWAREMicrosoftOle “EnableRemoteConnect” = N
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsa “restrictanonymous” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlSecurityProvidersSCHANNELProtocolsPCT1.0Server “Enabled” = [REG_BINARY, size: 1 bytes]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesLanmanServerParameters “AutoShareWks” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesLanmanServerParameters “AutoShareServer” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “NameServer” =
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “ForwardBroadcasts” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “IPEnableRouter” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “Domain” =
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “SearchList” =
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “UseDomainNameDevolution” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “EnableICMPRedirect” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DeadGWDetectDefault” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DontAddDefaultGatewayDefault” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “EnableSecurityFilters” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “AllowUnqualifiedQuery” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “PrioritizeRecordData” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “TCP1320Opts” = [REG_DWORD, value: 00000003]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “KeepAliveTime” = [REG_DWORD, value: 00023280]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “BcastQueryTimeout” = [REG_DWORD, value: 000002EE]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “BcastNameQueryCount” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “CacheTimeout” = [REG_DWORD, value: 0000EA60]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “Size/Small/Medium/Large” = [REG_DWORD, value: 00000003]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “LargeBufferSize” = [REG_DWORD, value: 00001000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “SynAckProtect” = [REG_DWORD, value: 00000002]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “PerformRouterDiscovery” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “EnablePMTUBHDetect” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “FastSendDatagramThreshold ” = [REG_DWORD, value: 00000400]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “StandardAddressLength ” = [REG_DWORD, value: 00000018]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DefaultReceiveWindow ” = [REG_DWORD, value: 00004000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DefaultSendWindow” = [REG_DWORD, value: 00004000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “BufferMultiplier” = [REG_DWORD, value: 00000200]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “PriorityBoost” = [REG_DWORD, value: 00000002]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “IrpStackSize” = [REG_DWORD, value: 00000004]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “IgnorePushBitOnReceives” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DisableAddressSharing” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “AllowUserRawAccess” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DisableRawSecurity” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DynamicBacklogGrowthDelta” = [REG_DWORD, value: 00000032]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “FastCopyReceiveThreshold” = [REG_DWORD, value: 00000400]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “LargeBufferListDepth” = [REG_DWORD, value: 0000000A]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “MaxActiveTransmitFileCount” = [REG_DWORD, value: 00000002]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “MaxFastTransmit” = [REG_DWORD, value: 00000040]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “OverheadChargeGranularity” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “SmallBufferListDepth” = [REG_DWORD, value: 00000020]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “SmallerBufferSize” = [REG_DWORD, value: 00000080]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “TransmitWorker” = [REG_DWORD, value: 00000020]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DNSQueryTimeouts” = [REG_MULTI_SZ, value: “1”, size: 26 bytes]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DefaultRegistrationTTL” = [REG_DWORD, value: 00000014]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DisableReplaceAddressesInConflicts” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DisableReverseAddressRegistrations” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “UpdateSecurityLevel ” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DisjointNameSpace” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “QueryIpMatching” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “NoNameReleaseOnDemand” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “EnableDeadGWDetect” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “EnableFastRouteLookup” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “MaxFreeTcbs” = [REG_DWORD, value: 000007D0]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “MaxHashTableSize” = [REG_DWORD, value: 00000800]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “SackOpts” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “Tcp1323Opts” = [REG_DWORD, value: 00000003]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “TcpMaxDupAcks” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “TcpRecvSegmentSize” = [REG_DWORD, value: 00000585]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “TcpSendSegmentSize” = [REG_DWORD, value: 00000585]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “TcpWindowSize” = [REG_DWORD, value: 0007D200]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “DefaultTTL” = [REG_DWORD, value: 00000030]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “TcpMaxHalfOpen” = [REG_DWORD, value: 0000004B]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “TcpMaxHalfOpenRetried” = [REG_DWORD, value: 00000050]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “TcpTimedWaitDelay” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “MaxNormLookupMemory” = [REG_DWORD, value: 00030D40]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “FFPControlFlags” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “FFPFastForwardingCacheSize” = [REG_DWORD, value: 00030D40]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “MaxForwardBufferMemory” = [REG_DWORD, value: 00019DF7]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “MaxFreeTWTcbs” = [REG_DWORD, value: 000007D0]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “GlobalMaxTcpWindowSize” = [REG_DWORD, value: 0007D200]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “EnablePMTUDiscovery” = [REG_DWORD, value: 00000001]
HKEY_LOCAL_MACHINESYSTEMControlSet001ServicesTcpipParameters “ForwardBufferMemory” = [REG_DWORD, value: 00019DF7]
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet Settings “MaxConnectionsPer1_0Server” = [REG_DWORD, value: 00000050]
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet Settings “MaxConnectionsPerServer” = [REG_DWORD, value: 00000050]
Reads HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS”
HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey”
HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionIMM “Ime File”
HKEY_CURRENT_USERSoftwareMicrosoftCTF “Disable Thread Input Manager”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS”
HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey”
HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionIMM “Ime File”
HKEY_CURRENT_USERSoftwareMicrosoftCTF “Disable Thread Input Manager”
HKEY_LOCAL_MACHINESYSTEMWPAMediaCenter “Installed”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “DisableUNCCheck”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “EnableExtensions”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “DelayedExpansion”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “DefaultColor”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “CompletionChar”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “PathCompletionChar”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “AutoRun”
HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “DisableUNCCheck”
HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “EnableExtensions”
HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “DelayedExpansion”
HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “DefaultColor”
HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “CompletionChar”
HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “PathCompletionChar”
HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “AutoRun”
HKEY_LOCAL_MACHINESYSTEMWPAMediaCenter “Installed”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS”
HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey”
HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionIMM “Ime File”
HKEY_CURRENT_USERSoftwareMicrosoftCTF “Disable Thread Input Manager”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS”
HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey”
HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionIMM “Ime File”
HKEY_CURRENT_USERSoftwareMicrosoftCTF “Disable Thread Input Manager”
HKEY_LOCAL_MACHINESYSTEMWPAMediaCenter “Installed”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftRpcSecurityService “10”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlSecurityProviders “SecurityProviders”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsapsspc.dll “Name”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsapsspc.dll “Comment”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsapsspc.dll “Capabilities”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsapsspc.dll “RpcId”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsapsspc.dll “Version”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsapsspc.dll “Type”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsapsspc.dll “TokenSize”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachedigest.dll “Name”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachedigest.dll “Comment”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachedigest.dll “Capabilities”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachedigest.dll “RpcId”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachedigest.dll “Version”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachedigest.dll “Type”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachedigest.dll “TokenSize”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsnsspc.dll “Name”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsnsspc.dll “Comment”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsnsspc.dll “Capabilities”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsnsspc.dll “RpcId”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsnsspc.dll “Version”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsnsspc.dll “Type”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsnsspc.dll “TokenSize”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftRpcSecurityService “DefaultAuthLevel”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “DisableUNCCheck”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “EnableExtensions”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “DelayedExpansion”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “DefaultColor”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “CompletionChar”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “PathCompletionChar”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCommand Processor “AutoRun”
HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “DisableUNCCheck”
HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “EnableExtensions”
HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “DelayedExpansion”
HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “DefaultColor”
HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “CompletionChar”
HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “PathCompletionChar”
HKEY_CURRENT_USERSoftwareMicrosoftCommand Processor “AutoRun”
HKEY_LOCAL_MACHINESYSTEMWPAMediaCenter “Installed”

File Changes by all processes
New Files c:a.bat
DeviceTcp
DeviceIp
DeviceIp
C:WINDOWSsystem32nod64.exe
C:DOKUME~1ADMINI~1LOKALE~1Temp1.reg
c:a.bat
DeviceTcp
DeviceIp
DeviceIp
DeviceRasAcd
C:DOKUME~1ADMINI~1LOKALE~1Temp1.reg
Opened Files .PhysicalDrive0
C:WINDOWSAppPatchsysmain.sdb
C:WINDOWSAppPatchsystest.sdb
DeviceNamedPipeShimViewer
c:
.Ip
C:WINDOWSexplorer.exe
C:WINDOWSsystem32nod64.exe
C:WINDOWSsystem32
c:a.bat
C:DOKUME~1ADMINI~1LOKALE~1Temp1.reg
C:WINDOWSAppPatchsysmain.sdb
C:WINDOWSAppPatchsystest.sdb
DeviceNamedPipeShimViewer
C:WINDOWS
C:DOKUME~1ADMINI~1LOKALE~1Temp1.reg
.PhysicalDrive0
C:WINDOWSAppPatchsysmain.sdb
C:WINDOWSAppPatchsystest.sdb
DeviceNamedPipeShimViewer
c:
.Ip
.PIPElsarpc
.PIPEsrvsvc
c:autoexec.bat
.PIPEROUTER
c:a.bat
C:DOKUME~1ADMINI~1LOKALE~1Temp1.reg
C:WINDOWSAppPatchsysmain.sdb
C:WINDOWSAppPatchsystest.sdb
DeviceNamedPipeShimViewer
C:WINDOWS
C:DOKUME~1ADMINI~1LOKALE~1Temp1.reg
Deleted Files C:DOKUME~1ADMINI~1LOKALE~1Temp1.reg
C:DOKUME~1ADMINI~1LOKALE~1Temp1.reg
c:a.bat
Chronological Order Open File: .PhysicalDrive0 (OPEN_EXISTING)
Create File: c:a.bat
Open File: C:WINDOWSAppPatchsysmain.sdb (OPEN_EXISTING)
Open File: C:WINDOWSAppPatchsystest.sdb (OPEN_EXISTING)
Open File: DeviceNamedPipeShimViewer (OPEN_EXISTING)
Open File: c: ()
Find File: C:a.bat
Create/Open File: DeviceTcp (OPEN_ALWAYS)
Create/Open File: DeviceIp (OPEN_ALWAYS)
Create/Open File: DeviceIp (OPEN_ALWAYS)
Open File: .Ip (OPEN_EXISTING)
Get File Attributes: C:WINDOWSsystem32nod64.exe Flags: (SECURITY_ANONYMOUS)
Copy File: c:nepenthesbcb907ea85adcb1baaff5a76c4361e88nod64.exe to C:WINDOWSsystem32nod64.exe
Open File: C:WINDOWSexplorer.exe (OPEN_EXISTING)
Open File: C:WINDOWSsystem32nod64.exe (OPEN_EXISTING)
Set File Time: C:WINDOWSsystem32nod64.exe
Set File Attributes: C:WINDOWSsystem32nod64.exe Flags: (FILE_ATTRIBUTE_HIDDEN FILE_ATTRIBUTE_READONLY FILE_ATTRIBUTE_SYSTEM SECURITY_ANONYMOUS)
Open File: C:WINDOWSsystem32 ()
Find File: C:WINDOWSsystem32nod64.exe
Get File Attributes: C: Flags: (SECURITY_ANONYMOUS)
Find File: C:
Find File: c:a.bat
Open File: c:a.bat (OPEN_EXISTING)
Create File: C:DOKUME~1ADMINI~1LOKALE~1Temp1.reg
Find File: c:Echo..*
Find File: c:Echo.
Find File: C:WINDOWSsystem32Echo..*
Find File: C:WINDOWSsystem32Echo.
Find File: C:WINDOWSEcho..*
Find File: C:WINDOWSEcho.
Find File: C:WINDOWSSystem32WbemEcho..*
Find File: C:WINDOWSSystem32WbemEcho.
Find File: C:ProgrammeIntelDMIXEcho..*
Open File: C:DOKUME~1ADMINI~1LOKALE~1Temp1.reg (OPEN_EXISTING)
Get File Attributes: Echo. Flags: (SECURITY_ANONYMOUS)
Find File: c:REGEDIT.*
Find File: c:REGEDIT
Find File: C:WINDOWSsystem32REGEDIT.*
Find File: C:WINDOWSsystem32REGEDIT
Find File: C:WINDOWSREGEDIT.*
Find File: C:WINDOWSregedit.COM
Find File: C:WINDOWSregedit.EXE
Open File: C:WINDOWSAppPatchsysmain.sdb (OPEN_EXISTING)
Open File: C:WINDOWSAppPatchsystest.sdb (OPEN_EXISTING)
Open File: DeviceNamedPipeShimViewer (OPEN_EXISTING)
Open File: C:WINDOWS ()
Find File: C:WINDOWSregedit.exe
Get File Attributes: C:DOKUME~1ADMINI~1LOKALE~1Temp1.reg Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:DOKUME~1ADMINI~1LOKALE~1Temp Flags: (SECURITY_ANONYMOUS)
Find File: C:DOKUME~1ADMINI~1LOKALE~1Temp1.reg
Delete File: C:DOKUME~1ADMINI~1LOKALE~1Temp1.reg
Open File: C:DOKUME~1ADMINI~1LOKALE~1Temp1.reg (OPEN_EXISTING)
Open File: .PhysicalDrive0 (OPEN_EXISTING)
Get File Attributes: C:WINDOWSsystem32.HLP Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSHelp.HLP Flags: (SECURITY_ANONYMOUS)
Create File: c:a.bat
Open File: C:WINDOWSAppPatchsysmain.sdb (OPEN_EXISTING)
Open File: C:WINDOWSAppPatchsystest.sdb (OPEN_EXISTING)
Open File: DeviceNamedPipeShimViewer (OPEN_EXISTING)
Open File: c: ()
Find File: C:a.bat
Create/Open File: DeviceTcp (OPEN_ALWAYS)
Create/Open File: DeviceIp (OPEN_ALWAYS)
Create/Open File: DeviceIp (OPEN_ALWAYS)
Open File: .Ip (OPEN_EXISTING)
Open File: .PIPElsarpc (OPEN_EXISTING)
Open File: .PIPEsrvsvc (OPEN_EXISTING)
Get File Attributes: c:autoexec.bat Flags: (SECURITY_ANONYMOUS)
Open File: c:autoexec.bat (OPEN_EXISTING)
Open File: .PIPEROUTER (OPEN_EXISTING)
Find File: C:Dokumente und EinstellungenAll UsersAnwendungsdatenMicrosoftNetworkConnectionsPbk*.pbk
Find File: C:WINDOWSsystem32Ras*.pbk
Find File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenMicrosoftNetworkConnectionsPbk*.pbk
Create/Open File: DeviceRasAcd (OPEN_ALWAYS)
Get File Attributes: C:WINDOWSsystem32 Flags: (SECURITY_ANONYMOUS)
Find File: C:WINDOWS
Find File: C:WINDOWSsystem32
Find File: c:a.bat
Open File: c:a.bat (OPEN_EXISTING)
Create File: C:DOKUME~1ADMINI~1LOKALE~1Temp1.reg
Find File: C:WINDOWSsystem32Echo..*
Find File: C:WINDOWSsystem32Echo.
Find File: C:WINDOWSEcho..*
Find File: C:WINDOWSEcho.
Find File: C:WINDOWSSystem32WbemEcho..*
Find File: C:WINDOWSSystem32WbemEcho.
Find File: C:ProgrammeIntelDMIXEcho..*
Open File: C:DOKUME~1ADMINI~1LOKALE~1Temp1.reg (OPEN_EXISTING)
Get File Attributes: Echo. Flags: (SECURITY_ANONYMOUS)
Find File: C:WINDOWSsystem32REGEDIT.*
Find File: C:WINDOWSsystem32REGEDIT
Find File: C:WINDOWSREGEDIT.*
Find File: C:WINDOWSregedit.COM
Find File: C:WINDOWSregedit.EXE
Open File: C:WINDOWSAppPatchsysmain.sdb (OPEN_EXISTING)
Open File: C:WINDOWSAppPatchsystest.sdb (OPEN_EXISTING)
Open File: DeviceNamedPipeShimViewer (OPEN_EXISTING)
Open File: C:WINDOWS ()
Find File: C:WINDOWSregedit.exe
Get File Attributes: C:DOKUME~1ADMINI~1LOKALE~1Temp1.reg Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:DOKUME~1ADMINI~1LOKALE~1Temp Flags: (SECURITY_ANONYMOUS)
Find File: C:DOKUME~1ADMINI~1LOKALE~1Temp1.reg
Delete File: C:DOKUME~1ADMINI~1LOKALE~1Temp1.reg
Get File Attributes: c:a.bat Flags: (SECURITY_ANONYMOUS)
Get File Attributes: c: Flags: (SECURITY_ANONYMOUS)
Delete File: c:a.bat
Open File: C:DOKUME~1ADMINI~1LOKALE~1Temp1.reg (OPEN_EXISTING)

Categories: Uncategorized