Event ID - 80

Port No80
Service NameAckCmd
RFC Doc0
ProtocolTCP
DescriptionThis is a proof of concept backdoor malware. It allows a remote user access to an infected computer running on Windows 2000. It consists of a client component and a server component. A hacker uses the client component to communicate with the server component on the infected system. With the client program, the hacker can open a command prompt on the infected system. The hacker may communicate directly with the target system via certain firewall configurations. This backdoor hacking tool compromises network security.
Reference LinkACKCMD
AttackSolution:
Scan your system with Trend Micro antivirus. Write down all the files detected as BKDR_ACKMD.A and then delete these files. To do this Trend Micro customers must download the latest pattern file and scan their system. Other email users may use HouseCall, Trend Micro's free online virus scanner.
Press CTRL+ALT+DEL simultaneously. The Windows Security dialog Box should appear.
Click the Task Manager button to launch Windows Task Manager.
Choose the Processes tab
From the list of the running processes, locate the name of the backdoor processes. These are the file names, which you have written down.
One at a time, select the backdoor processes, then click the End Process button.
Again scan your system with Trend Micro antivirus and delete all files detected as BKDR_ACKCMD.A. To do this Trend Micro customers must download the latest pattern file and scan their system. Other email users may use HouseCall, Trend Micro's free online virus scanner. XE

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.