Event ID - 28678

Port No28678
Service NameExploiter
RFC Doc0
ProtocolTCP
DescriptionThis memory-resident backdoor program is designed to access and control a target system. It has a client and server component to carry out its malicious capabilities. The server component is installed on the target system while the client is with the remote malicious user. The server attempts to open a port and thereafter wait for client connection. Upon establishing port connection, the client component may perform the following actions, which effectively compromises the target system's security: This malicious programs runs on Windows 9x and ME systems.
Reference LinkExploiter Trojan
AttackSOLUTION :
Identifying the Malware Program
Before proceeding to remove this malware, first identify the malware program.
Scan your system with Trend Micro antivirus and NOTE all files detected as BKDR_EXPLOIT.A. To do this, Trend Micro customers must download the latest pattern file and scan their system. Other Internet users can use HouseCall, Trend Micro's free online virus scanner.

Terminating the Malware Program
This procedure terminates the running malware process from memory. You will need the name(s) of the file(s) detected earlier.
1.Open Windows Task Manager.
On Windows 9x/ME systems, press
CTRL+ALT+DELETE
On Windows NT/2000/XP systems, press
CTRL+SHIFT+ESC, and click the Processes tab.
2.In the list of running programs*, locate the malware file or files detected earlier.
3.Select one of the detected files, then press either the End Task or the End Process button, depending on the version of Windows on your system.
4.Do the same for all detected malware files in the list of running processes.
5.To check if the malware process has been terminated, close Task Manager, and then open it again.
6.Close Task Manager.

Removing Autostart Entries from the Registry

Removing autostart entries from the registry prevents the malware from executing during startup.
1.Open Registry Editor. To do this, click Start>Run, type REGEDIT, then press Enter.
2.In the left panel, double-click the following:
HKEY_LOCAL_MACHINE>Software>Microsoft>
Windows>CurrentVersion>Run
3.In the right panel, locate and delete the entry:
Server.exe
4.Close Registry Editor.

NOTE :
If you were not able to terminate the malware process from memory as described in the previous procedure, restart your system.

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.