Event ID - 54283

Port No54283
Service NameSub7
RFC Doc0
ProtocolTCP
DescriptionThis is an updated version of the SubSeven backdoor package which carries out typical SubSeven backdoor activities such as:

send chat messages
send system and user info
change remote keyboards, mouse and desktop settings
open a web site
browse and executes programs
download programs from infected machine
scan IP addresses
Aside from a client and a server component, it also has a server editor which sets and modifies the settings of the server component. To facilitate the modification of the server component, the server-editor provides a Graphical User Interface (GUI).

By default, this version connects to a remote machine using port 27374, but may still be modified using the editor component.

This backdoor program runs on Windows 95, 98, NT, 2000, ME, and XP systems and requires some DLL files to function properly.
Reference LinkSub7
AttackSolution:

This procedure terminates the running malware process from memory.
Open Windows Task Manager.
On Windows 95/98/ME systems, press
CTRL+ALT+DELETE
On Windows NT/2000/XP systems, press
CTRL+SHIFT+ESC, and click the Processes tab.
In the list of running programs*, locate the process:

Select the malware process, then press either the End Task or the End Process button, depending on the version of Windows on your system.
To check if the malware process has been terminated, close Task Manager, and then open it again. Close Task Manager.

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.