Event ID - 903

Port No903
Service NameAntilam.g1
RFC Doc0
ProtocolTCP
DescriptionThis backdoor malware allows a remote hacker access to and control over a computer running its server component. It compromises network security
Reference LinkAntilam.g1
AttackSolutions:

Identifying the Malware Program/


Before proceeding to remove this malware, identify first the malware program.
Scan your system with Trend Micro antivirus and NOTE all files detected as BKDR_PESTDOOR.40. To do this, Trend Micro customers must download the latest pattern file and scan their system. Other Internet users can use HouseCall, Trend Micro's free online virus scanner


Removing Autostart Entries from the Registry

Removing autostart entries from registry prevents the malware from executing during startup. Here, you will need the name(s) of the file(s) detected earlier.

Open the Registry Editor. To do this, click Start>Run, type REGEDIT, then hit the Enter key. In the left panel, double-click the following:
HKEY_LOCAL_MACHINE>Software>Microsoft>
Windows>CurrentVersion>Run
In the right panel, locate and delete the entry or entries that match the malware names detected earlier
Restart your computer.

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.