Event ID - 2140

Port No2140
Service NameWin32.DeepThroat
RFC Doc0
ProtocolTCP
DescriptionThis backdoor hacking tool is used to remotely control an infected computer via the Internet. It consists of a server and client side. The server side is distributed to the users, while the client side is run by a remote user to control the PC where the server side is running.
Reference LinkWin32.DeepThroat
AttackSolutions:

Restart your system in Windows.
Click Start > Run then type "regedit" in the text box that will popup.
Browse though the registry and locate the entry "SystemDLL32" under the following registry key:
\HKEY_LOCAL_MACHINE\Software\Classes\Software\
Microsoft\Windows\Currentversion\Run\
Delete the registry entry by right-clicking on the "SystemDLL32" and then select delete.
Restart your system in MS-DOS mode.
Scan your system with Trend antivirus and delete all files detected as BKDR_DVT1. To do this, Trend customers must download the latest pattern file and scan their system. Other email users may use Trend HouseCall

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.