Event ID - 65530

Port No65530
Service NameWindows Mite
RFC Doc0
ProtocolTCP
DescriptionAVAILABLE IN DATABASEThis memory-resident backdoor program allows a remote hacker access to an infected system. It appears as a Windows registry checker program, SCANREGW.EXE in an infected system. It compromises network security.
Reference LinkWINMITE
AttackSolution

Manual Removal Instructions


Run REGEDIT.EXE and delete the below registry entries:
HKEY_LOCAL_MACHINE\Software\Microsoft
DirectOpenGLDirectX=dword:00000000
HKEY_LOCAL_MACHINE\Software\Microsoft\DirectOpenGL
SettingsAPPID=dword:0000fffa
Click Start|Shutdown|Restart in MS-DOS mode
Obtain a copy of SCANREGW.EXE from a clean backup or from a clean system.
Copy the file to a clean diskette.
In the command prompt, type the following to change from the current drive to A: A:
Copy the clean SCANREGW.EXE to the Windows directory. Type the following, pressing the enter key after every line:
copy scanregw.exe c:\windows
If asked to overwrite, press Y. If successful, the following should be displayed:
1 files copied
Type the below command and then press the enter key to return to Windows:
exit
Scan your system with Trend antivirus and delete all other files detected as BKDR_WINMITE.10. To do this, Trend customers must download the latest pattern file and scan their system. Other email users may use Trend HouseCall, a free online virus scanner.

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.