[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

AVLog Folder

Posted on 2010-08-23
11
Medium Priority
?
484 Views
Last Modified: 2013-12-04
I have several pc's on our network that all of a sudden now have a folder at the root of C that is called
AVLog

C:\AVLog

In this folder are many files like RXI3223.08

Any idea what this is or what is causing it?

We use McAfee for antivirus.

Thanks
0
Comment
Question by:Wildone63
  • 6
  • 5
11 Comments
 
LVL 37

Expert Comment

by:Neil Russell
ID: 33505613
I suspect that you MAY have an infection. Download and install and run Malwarebytes.
http://www.malwarebytes.org/ 
0
 
LVL 1

Author Comment

by:Wildone63
ID: 33505647
I have Malwarebytes. Used it for along time now. It comes up clean.
0
 
LVL 37

Expert Comment

by:Neil Russell
ID: 33505750
How many files exist in this folder? how frequently are they created? have you looked at there contents at all?
0
 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

 
LVL 1

Author Comment

by:Wildone63
ID: 33505759
some have only a few some have hundreds. Can't look at the contents.
0
 
LVL 37

Expert Comment

by:Neil Russell
ID: 33505797
Why cant you?
0
 
LVL 1

Author Comment

by:Wildone63
ID: 33505804
they seem to be binary files. So if you open it in note pad it is just jibberish
0
 
LVL 37

Expert Comment

by:Neil Russell
ID: 33505817
and the frequency of creation?
Can you rename the folder to C:\AVLog.old ?
 
0
 
LVL 1

Author Comment

by:Wildone63
ID: 33505831
The frequency seems to be different on different machines. some once an hour some once every other day and everything in between,

Yes I can rename, and or delete, it comes back
0
 
LVL 37

Expert Comment

by:Neil Russell
ID: 33505850
Ok if you can rename it you should be able to alter permissins on it. Change the security permissions and make it READ ONLY for every account listed on the security tab. Leave the PC to run for a while and see if you either get any errors on screen or recorded in the eventlog. Might give away whats using it.
0
 
LVL 37

Accepted Solution

by:
Neil Russell earned 2000 total points
ID: 33511503
Any feedback?
0
 
LVL 1

Author Closing Comment

by:Wildone63
ID: 33512375
Well as you suggested I made the folder read only. I have two errors in the event log from this am. They are from my McAfee AV-Diagnostics. So.... I am assuming that the AVLog folder is something from McAfee. The errors are very cryptic and do not mean anything to me. But it does look like part of it is an error opening. (the read only folder I am assuming.)

So I will go down that track and see if I can find anything from Mcafee.

Thanks for your help.
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question