Event ID - 45632

Port No45632
Service NameLW
RFC Doc0
ProtocolTCP
DescriptionThis Trojan attempts to download and execute a file from a remote IP address via FTP.

However, as of this writing, it fails to download the file from the said IP address because it cannot login. THis is because it uses incorrect user name and password.

After execution, this Trojan creates and executes a batch file that deletes this Trojan and itself.
Reference LinkLW
AttackSolution:

Important Windows ME/XP Cleaning Instructions
Users running Windows ME and XP must disable System Restore to allow full scanning of infected systems.
Users running other Windows versions can proceed with the succeeding procedure set(s).

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.