Home > General > Wmmiexe.exe


Enduser & Server Endpoint Protection Comprehensive security for users and data. One of these file extensions is .exe. Reverse the changes that the Trojan made to the registry. (Windows 95/98/Me only) Restore theshell= line in the System.ini file, and restore therun= line in the Win.ini file. English 简体中文 český English Français Deutsch Magyar Italiano 日本語 한국의 Polski Español 繁體中文 Legal Privacy Cookie Information 1 of 5 previous next close This site uses cookies.

This site is completely free -- paid for by advertisers and donations. All rights reserved. If any files are detected as infected with Backdoor.OptixPro.11, click Delete. If a threat exploits one or more network services, disable, or block access to, those services until a patch is applied.

Its possible somone has already solved this, but seeing as I am lazy, and dont have the time to read through several strings, I am asking it here... When you click OK, the (Default) value should look exactly like this: ""%1" %*" On Windows 2000/XP, the additional quotation marks will not appear. They must be downloaded from the Symantec Security Response Web site and installed manually. If they are removed, threats have less avenues of attack.

  1. Reset Post Submit Post Search Related Discussions 11 Microsoft Surface Studio vs.
  2. Stay logged in Sign up now!
  3. Thanx for your help Mark ps.
  4. In the 'Export range' panel, click 'All', then save your registry as Backup.
  5. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.
  6. Do one of the following: Windows 95/98/Me: Restart the computer in Safe mode.

Double-click the Image Name column header to sort the processes alphabetically. It then sets the following registry entries: HKLM\Software\Microsoft\Windows\CurrentVersion\Run\winrun = "C:\\winrun.exe" and HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices\winrun = "C:\\winrun.exe" so that it will be started on Windows startup. It seems as though he opened a Optix server backdoor. Yes, my password is: Forgot your password?

If you're new to the TechRepublic Forums, please read our TechRepublic Forums FAQ. Do not delete anything else. OEM Solutions Trusted by world-leading brands. Rollin' Rog, Jan 10, 2003 #14 Marx Joined: Jan 10, 2003 Messages: 2 Dear Rog, Thank you so much, on behalf of me and my friend :-D We owe you and

The Trojan installs hook procedures into a hook chain to monitor the system for any keyboard and mouse messages. When you click OK, the (Default) value should look exactly like this: "%1" %* Make sure that you completely delete all value data in the command key before you type the This tool requires that its server component is running on the infected machine before the client component can access the infected system. Show Ignored Content As Seen On Welcome to Tech Support Guy!

In the left panel, double click the following:HKEY_LOCAL_MACHINE>Software>Microsoft>Windows>CurrentVersion>Run In the right panel, look for and then delete this registry value. %windir% is the Windows directory usually located at C:\Windows:"vscanner" "%windir%\spooll32.exe" In To make a copy of the Registry Editor: Do one of the following, depending on which version of Windows you are running: Windows 95/98: Click Start, point to Programs, and click If write access is not required, enable read-only mode if the option is available. Home Skip to content Skip to footer Worldwide [change] Welcome, Account Log Out My Cisco Cisco.com Worldwide Home Products & Services (menu) Support (menu) How to Buy (menu) Training & Events

The keyboard and mouse hook procedures process the messages and pass the hook information to the next hook procedure in the current hook chain. If Bluetooth is not required for mobile devices, it should be turned off. After you finish editing the registry, exit the Registry Editor, and then exit the DOS window. Backdoor.OptixPro.11 displays a message and copies itself as \%Windows%\win32loader.exe on the infected system. The trojan also creates the file wmmiexe.exe. Backdoor.OptixPro.11b also displays a message and creates the file spooll32.exe. Both

Kaholo42, Sep 16, 2002 #11 Rollin' Rog Joined: Dec 9, 2000 Messages: 45,855 Outstanding. File system monitoring software should be usedto detectunusual activity that may indicate the presence of a trojan on the system. Please start a New Thread if you're having a similar issue.View our Welcome Guide to learn how to use this site. Modify only the keys that are specified.

I shut down spooll32.exe right away. These alerts document threats that are active in the wild and provide SenderBase RuleIDs for mitigations; sample email messages; and names, sizes, and MD5 hashes of files. Business  For Home  Alerts No new notifications at this time.

Buy Home Office Online Store Renew Online Business Find a Partner Contact Us 1-877-218-7353 (M-F 8am - 5pm CST) Small Business Small Business Online Store Renew Online Find a Partner Contact

Thanks Kaholo42, Sep 16, 2002 #9 Rollin' Rog Joined: Dec 9, 2000 Messages: 45,855 I just tried it and it works for me, both the .htm page and the download By default it opens port 50021 on the compromised computer. We've fixed a couple of Optix infections here. If the data was "wmmiexe.exe "%1" %*", after modifying, it should look like ""%1" %*".

Complex passwords make it difficult to crack password files on compromised computers. DAT File 4200 and higheris available at the following link: McAfee The Symantec Security Response for Backdoor.OptixPro.11is available at the following link: Security Response. I am glad there are people as generous with their knowlege as you are! The processes that kill firewalls and antivirus programs are loaded through the winstart.bat file which is not a default startup and can be deleted.

Finally, the Trojan sends a notification message to the remote intruder through ICQ. Sophos Central Synchronized security management. Sophos Mobile Countless devices, one solution. When executed, it copies itself to a SPOOLL32.EXE file in the Windows directory.

All rights reserved. If file sharing is required, use ACLs and password protection to limit access. Solutions Industries Your industry. Backdoor.OptixPro.11b contains the same functionality as the original with a few slight changes.

Thread Status: Not open for further replies. You can ignore stubpaths.txt http://home.earthlink.net/~rmbox/Reticulated/Toys.html Note: if the Optix trojan remains on the system, it could rebuild itself following a reboot. Public Cloud Stronger, simpler cloud security. This helps to prevent or limit damage when a computer is compromised.

Upon execution Troj/Opt-Pro11B drops itself to the Windows folder as WINRUN.EXE. If users believe their systems are infected they should alert the security staff or administrator for assistance in identifying and removing the trojan.SafeguardsUpdate current virus definitions and antivirus software programs to Network monitoring can aid in identifying unauthorized communications between a trojan and the attacker.