Port No | 202 |
Service Name | One Windows Trojan |
RFC Doc | 0 |
Protocol | TCP |
Description | This Windows Trojan uses Internet Relay Chat (mIRC) to compromise the security of an infected user's Computer (PC). It sets up various network services such as, file servers, IRC bouncers/spoofers, port scanners, and ICQ flooders. It does not have a destructive payload. |
Reference Link | One Windows Trojan Trojan |
Attack | SOLUTION : 1.Manually delete the following files in your Windows System folder: GATES.TXT TEMP.SCR TEMP2.EXE PR.INI REMOTE.INI 2.Restart your computer. 3.Scan your system with Trend Micro antivirus and delete all files detected as TROJ_RSP.C, IRC_RSP.C, IRC_GTMINE_INI2 and IRC_GTMINE_INI3. To do this, Trend Micro customers must download the latest pattern file and scan their system. Other email users may use HouseCall, Trend Micro's free online virus scanner. |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.