?
Solved

What is Winklrx.exe?

Posted on 2003-02-27
3
Medium Priority
?
137 Views
Last Modified: 2010-04-13
Hi, I have Win 2000 pro installed. I just placed ZoneAlarm on this machine and can now see that my machine is connecting to port 25 at many different IP addresses. Apparantly this is caused by the program Winklrx.exe which is running as a service in the background. This .exe is kept in c:/WINNT/System32/ but I cannot see it in there even when viewing all hidden files. My question is; Can anyone tell me if Winklrx.exe is part of Win 2000 pro and what it is?
Thanks.
0
Comment
Question by:zaken1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 20

Accepted Solution

by:
Dufo G. Belski earned 400 total points
ID: 8033673
An executable named wink*.exe is a sure sign of the Klez worm.  See here for info:

http://securityresponse.symantec.com/avcenter/venc/data/w32.klez.e@mm.html

http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?Vname=WORM_KLEZ.G

Update your virus definitions and scan for viruses, or download theh removal tool found at the Symantec site I posted.
0
 
LVL 6

Expert Comment

by:danich
ID: 8033751
Since the local machine is compromised you'd be advised to run an AV app that runs outside the sandbox.

http://housecall.antivirus.com
0
 

Author Comment

by:zaken1
ID: 8034053
Thanks for the very quick response.
0

Featured Post

New benefit for Premium Members - Upgrade now!

Ready to get started with anonymous questions today? It's easy! Learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Learn how to use the free Acronis True Image app to easily transfer data between iPhones and Android phones.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question