Solved

Suspicious .exe file.

Posted on 2012-03-20
6
370 Views
Last Modified: 2012-06-27
Anyone ever seen this file? I'm going through backups and found it. Never heard of  it and google didn't show anything.  "WOLF-X-[cn].exe"
0
Comment
Question by:TheGreenMan13
  • 2
  • 2
  • 2
6 Comments
 
LVL 8

Assisted Solution

by:Tymetwister
Tymetwister earned 333 total points
ID: 37745168
Never heard of it myself, but you can try uploading it to https://www.virustotal.com/ and http://virusscan.jotti.org/en and see if it finds anything on it. If it's on a backup but not needed now, I'd probably rename it to .ex~ or something for now and keep it around for backup purposes if it scans clean. Could also be a user-created program (like in Visual Studio or something) or just simply a renamed program, but just a thought.
0
 

Author Comment

by:TheGreenMan13
ID: 37746699
Well that's a good idea if it needs to get scanned for viruses, but this file is also active on the drive. My only other idea would be to possibly move the file or re-name it and see if any programs stop working. Trying to save some space on the selections list. Using Axcient.
0
 
LVL 8

Accepted Solution

by:
Tymetwister earned 333 total points
ID: 37746710
Maybe try renaming the extension to an inactive one and see if everything runs smoothly? Obviously, if we have googled the file name and it comes up nil, there's going to be no one here who has heard of that file name so we can rule that out.
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 
LVL 5

Assisted Solution

by:andrewmcc
andrewmcc earned 167 total points
ID: 37746825
Have you checked the file path, or where the file was located.
Right click on the file, goto properties and see what information might be listed?
Suggest maybe looking at the version or type of EXE, plus date accessed, modified, created etc.
Also, maybe worth checking the registry of the system to do a wild card search and see if it gives you any cross searches?
0
 
LVL 5

Expert Comment

by:andrewmcc
ID: 37747307
Would also check if you've got any large archive files or iso's which have been downloaded.
I did a job a few weeks back and the customer's pc had a number of large various different rar/zip plus some other formats which they had been using to download apps, games music etc.
We found a virus hidden within the iso (which was itself in a RAR archive).
The virus checker that the client had was set not to scan within archives.
0
 

Author Closing Comment

by:TheGreenMan13
ID: 37747399
Thanks guys, I'll get if figured out your suggestions are all great! Will try them all and they will most likely work.
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Edit header 19 103
How does your business securely share, sync and collaborate with external partners 7 80
Backup Data/Portable NAS storage 4 65
Transferring files to iPhone 3 40
Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
All of the resources available today make learning a new digital media easier than ever-- if you know where to begin. This is a clear, simple guide to a few of the basic digital art mediums and how to begin learning them on your own.
This video shows how use content aware, what it’s used for, and when to use it over other tools.
The viewer will learn how to successfully create a multiboot device using the SARDU utility on Windows 7. Start the SARDU utility: Change the image directory to wherever you store your ISOs, this will prevent you from having 2 copies of an ISO wit…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now