Check logs, pls - disappeared D: contents and W32.Changeup!gen28

Discussion in 'Malware Help (A Specialist Will Reply)' started by KrushR, May 6, 2013.

  1. KrushR

    KrushR Private E-2

    Here are the logs from the four scans. Old 2003 server, and someone has been surfing on it. :cry

    The D: drive appeared to have nothing on it, although my users could get to network programs that had info in shares on it. I couldn't see anything, so I did an attrib -S -H on the main data directory and saw that there was a 0kb .avi file there, along with an autorun.inf that had a lot of trash, and a line referencing autorun=jeaun.exe, which was also in the directory. As soon as I attrib'd those files, Symantec Endpoint Protection snagged it (W32.Changeup!gen28). I'll include that log as well.

    If someone could check this over and let me know if anything got missed, I'd appreciate it. ;)
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Your logs appear to be clean. The only item of question is the below. Did you install this?
    Code:
    "C:\Program Files\"
    ONLINE~2      Apr 18 2013              "Online Backup and Recovery Manager"
    
    This may be related to StrongVault which is problematic software we frequently have to forcefully remove for many users posting here with problems.
     
  3. KrushR

    KrushR Private E-2

    Yes, we did. sosonlinebackup.com is our rebranded corporate offsite backup solution.

    Thanks for looking it over. I'll attrib the rest of the directory back the way it was. :-D
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Go back to step 4 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 6 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds