Event ID - 1026

Port No1026
Service NameDarkirc
RFC Doc0
ProtocolTCP
DescriptionThis backdoor drops several copies of itself in the Windows folder. It acts as an IRC (Internet Relay Chat) bot and enables the remote user to perform the following actions:

Modify the Windows registry
Obtain screen captures
Restart the system
Download and execute files
Create clones of the backdoor and logon to an IRC Server
Join clone in a channel
It runs on Windows 95, 98, ME, NT, 2000 and XP.
Reference LinkDarkirc
AttackSolution:

This procedure terminates the running malware process from memory.

Open Windows Task Manager.
On Windows 95/98/ME systems, press
CTRL+ALT+DELETE
On Windows NT/2000/XP systems, press
CTRL+SHIFT+ESC, and click the Processes tab.
In the list of running programs*, locate the process:
TapiServ.exe
CleanDll.exe
runtime.exe
SysRq.exe
rgedit.exe
sl_scan.exe
gspan.exe
MsUpd.exe
sysbat.exe
loadsys.exe
gl_modulate.exe
fpscan.exe
fps.exe
Sysload.exe
WinServ.exe
glpod.exe
modulate.exe
statnum.exe
fileload.exe
sysctrls.exe
Select the malware process, then press either the End Task or the
End
Process button, depending on the version of Windows on your
system.
To check if the malware process has been terminated, close Task
Manager, and then open it again.
Close Task Manager.

*NOTE: On systems running Windows 95/98/ME, Windows Task Manager may not show certain processes. You may use a third party process viewer to terminate the malware process. Otherwise, continue with the next procedure, noting additional instructions

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.