Port No | 40071 |
Service Name | Antilam.g1 |
RFC Doc | 0 |
Protocol | TCP |
Description | This backdoor malware allows a remote hacker access to and control over a computer running its server component. It compromises network security. |
Reference Link | Antilam.g1 |
Attack | Solution: Removing autostart entries from registry prevents the malware from executing during startup. Here, you will need the name(s) of the file(s) detected earlier. Open the Registry Editor. To do this, click Start>Run, type REGEDIT, then hit the Enter key. In the left panel, double-click the following: HKEY_LOCAL_MACHINE>Software>Microsoft> Windows>CurrentVersion>Run In the right panel, locate and delete the entry or entries that match the malware names detected earlier Restart your computer. |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.