Event ID - 7274

Port No7274
Service NameAutoSpY
RFC Doc0
ProtocolTCP
DescriptionThis backdoor malware, written and compiled in Visual Basic, has a client component and a server component. The server component infects a target system and hackers use the client component to access and control the infected system. Apart from compromising network security, this remote access backdoor enables a hacker with the client program to delete files and folders from an infected system.
Reference LinkAutoSpY Trojan
Attack SOLUTION :
1.Launch the Registry Editor. Click Start>Run, type REGEDIT then hit the Enter key. 2.In the left panel, double click the following:
HKEY_CURRENT_USER>Software>Microsoft>Windows CurrentVersion>Run
3.In the right panel, locate and delete the entry named: MsUpdate
4.Again in the left panel, double click the following: HKEY_USERS>DEFAULT>Software>Microsoft>Windows >CurrentVersion>Run
5.In the right panel, locate and delete the entry named: MsUpdate
6.Restart your system.
7.Scan your system with Trend Micro antivirus and delete all files detected as BKDR_AUTOSPY.A. To do this Trend Micro customers must download the latest pattern file and scan their system. Other email users may use HouseCall, Trend Micro's free online virus scanner.

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.