Event ID - 4128

Port No4128
Service NameREDSHAD
RFC Doc0
ProtocolUDP
DescriptionSolution:
Scan your system with Trend Micro antivirus and note down all files detected as BKDR_REDSHAD.101.
Click Start>Run, type REGEDIT.EXE, then hit the ENTER key.
In the left panel, double click the following:
HKEY_LOCAL_MACHINE>Software>Microsoft>Windows
>CurrentVersion>Run
In the right panel, look for and then delete this registry entry. Backdoor filename.EXE is the filename u noted down in step 1:
"(Backdoor filename.EXE", "C:\Windows\Desktop\Backdoor filename.exe"
Close the Registry.
Restart your system.
Click Start>Run, type COMMAND then hit the ENTER key.
Type "DEL (detected file)" then hit the ENTER key. For example, using the above data, you should have typed in "DEL C:\WINDOWS\DESKTOP\server.exe"
Scan your system with Trend Micro antivirus and delete all files detected as BKDR_REDSHAD.101. To do this Trend Micro customers must download the latest pattern file and scan their system. Other email users may use HouseCal
Reference LinkREDSHAD
AttackSolution:
Scan your system with Trend Micro antivirus and note down all files detected as BKDR_REDSHAD.101.
Click Start>Run, type REGEDIT.EXE, then hit the ENTER key.
In the left panel, double click the following:
HKEY_LOCAL_MACHINE>Software>Microsoft>Windows
>CurrentVersion>Run
In the right panel, look for and then delete this registry entry. Backdoor filename.EXE is the filename u noted down in step 1:
"(Backdoor filename.EXE", "C:\Windows\Desktop\Backdoor filename.exe"
Close the Registry.
Restart your system.
Click Start>Run, type COMMAND then hit the ENTER key.
Type "DEL (detected file)" then hit the ENTER key. For example, using the above data, you should have typed in "DEL C:\WINDOWS\DESKTOP\server.exe"
Scan your system with Trend Micro antivirus and delete all files detected as BKDR_REDSHAD.101. To do this Trend Micro customers must download the latest pattern file and scan their system. Other email users may use HouseCal

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.