?
Solved

Suspicious file in C

Posted on 2008-06-21
9
Medium Priority
?
352 Views
Last Modified: 2011-10-19
hello there,

i have noticed i have two files in my C:/ called 888 and jj.one has 52 MB and the other is about 31 MB. I dont know what these files are or how it came here in the first place. also when i tried to delete them it says being used by other user. this made me suspicious about these files. i want to know are these virus,spyware,trojans. how do i get to know more about these files. appreciate your help

cheers
zolf
0
Comment
Question by:zolf
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
  • 2
9 Comments
 
LVL 3

Assisted Solution

by:sistemu
sistemu earned 90 total points
ID: 21839881
Hello zolf,
Have you tried finding any new processes in Task Manager(Ctrl + Alt + Del). Anything with resemblance in name...

If this is not working for you, try rebooting your machine in Safe Mode (press F8 before Windows starts loading) and try then to delete.

Hope this helps
0
 

Author Comment

by:zolf
ID: 21840005

no i dont see anything in the TM with that name. can i know which application is using this file
0
 
LVL 3

Expert Comment

by:sistemu
ID: 21840014
If you have Vista i think you can try in "Reliability and performance". It should appear the file and with it, the process using it.
In XP i don't know similar program.
0
Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

 
LVL 47

Expert Comment

by:rpggamergirl
ID: 21840102
It could be a remnant of a smitfraud 888 toolbar, or could be a remnant folder of some other programs, I assume they are folders and not file or are they?
If you rightclick in those folders and click on Properties what does it say?

0
 

Author Comment

by:zolf
ID: 21840202

i have attached a screen shot.
1.JPG
0
 

Author Comment

by:zolf
ID: 21843493

please help
0
 
LVL 47

Accepted Solution

by:
rpggamergirl earned 660 total points
ID: 21844059
The jpeg attachment is not very clear for me to see, what does it say in the Description?
I would be confident to delete it if it was in my pc.

In Explorer, when you're viewing your files in "Details" and with " Date Created" check all the files that was created at that exact time and see what program matches. And if none matches then that 's just a leftover file.
I would just delete it or rename it(if you're not sure)
0
 

Author Comment

by:zolf
ID: 21844293

click on the image to view it large
0
 
LVL 47

Expert Comment

by:rpggamergirl
ID: 21844480
I did zoom on the image but can't make out what the description is, it looks like an "RF8" or something.
Anyway I would just delete that file.
0

Featured Post

Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Operating system developers such as Microsoft (https://www.microsoft.com) and Apple have made incredible strides in virus protection over the past decade. Operating systems come packaged with built in defensive tools such as virus protection and a f…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…
Suggested Courses
Course of the Month11 days, 16 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question