• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 774
  • Last Modified:

_@##.TMP Folders ( _@10.tmp _@22.tmp etc )

We have a Windows 2000 server that has the folder _@##.tmp appearing in the root of one of the drives.  This folder cannot be deleted by normal means and we use zap.exe to get rid of it. It then reappears with the number, represented by the  ## incremented.

I've seen this problem before on another Windows server some years back and used one of the virus scanners of the day to remove the malware causing the folder to appear and reappear.

In this case we have run VIPER, PREVX, Spybot, Malwarebytes, Superantispyware etc., with no ultimate resolution. It is suspected that it may be caused by a variant of Win32/Agent trogen.  

Was wondering if anyone has some new information re this problem and it's ultimate resolution.

Thanks - Al      
0
Alyork
Asked:
Alyork
  • 4
  • 3
  • 2
2 Solutions
 
younghvCommented:
For a Server OS, you might want to try Hitman Pro 64 Bit -
http://www.surfright.nl/en/downloads/

I'll look around and see if I can find out more about this malware.
0
 
younghvCommented:
I just confirmed that 'McAfee Stinger' is good for Server OS use and you should try it:
http://www.mcafee.com/us/downloads/free-tools/how-to-use-stinger.aspx

0
 
moorhouselondonCommented:
Is it possible to "down" the server for a period to eradicate the problem?  If so, there are three suggestions I would make:-

(1) Use a virus checker that is capable of being run in Safe Mode.  AVG will do the trick.

(2) Use a virus checker on a CD that has its own built in OS to look across at the drive and eradicate it like that.  I recommend the BitDefender CD which is hosted on a Linux OS.  Boot off the CD and let it run, the OS can be a bit fussy about certain hardware though.

(3) Take the drive out, bung it in another pc as a slave drive and run a conventional virus scan on the drive.
0
Get your problem seen by more experts

Be seen. Boost your question’s priority for more expert views and faster solutions

 
AlyorkAuthor Commented:
Unfortunately the server in question is in the boonies and I'm having to do this via remote support. And they have no tech person there to assist. I may have to go there if it's not able to be resoved and will detach the drives and do a scan from another computer.

One of the anomalies is that, although Explorer and the Command box both see the "_@xx.tmp" folder, Windows search does not. Supposedly Windows 2000 search was before MS decided what we can and can't search for. I should check the registry to see if the "FilterFilesWithUnknownExtensions" is present.  

Thank you for your responses and will do what more I can remotely and let you know what happens.

Thanks - Al
0
 
younghvCommented:
Both of my suggestions can be attempted by a non-technical person.
Just send them the links and talk them through it.

One of the drawbacks to 'Safe Mode' or 'Slave Scans' is that various malware processes will not be running in either instance.

The truly effective anti-malware applications need the system running in full "Normal Mode" to effect the repairs.
0
 
AlyorkAuthor Commented:
The _@xx.tmp file just happened to be recreating itself on a partition that had never been used. Deleting  and recreating the partition along with the malware scans, seems to have eliminated the culprit.

Interesting note: Searching for  *.tmp  didn't find the  _@xx.tmp   file, however a search for  _*.tmp  did.  
0
 
AlyorkAuthor Commented:
The solution was only fully effective after a drive partion was deleted and recreated as if there was some connection to the drives structure.

The last product that was run was VIPRE from Sunbelt Software.
0
 
moorhouselondonCommented:
>Searching for  *.tmp  didn't find the  _@xx.tmp   file, however a search for  _*.tmp  did.  

Out of interest: was Windows Explorer being used to perform the search?  If so then what *other* things is Windows Explorer not showing us?  This could be a very serious problem for those of us who think we've done a complete copy of something from one place to another, only to find that things are missing.  

I wonder whether _@xx.tmp was chosen because of this advantage (to them) of being hidden?

Thank you for the points.
0
 
AlyorkAuthor Commented:
The search was done with the Windows 2000 Search, which I'm assuming is part of Windows Explorer  as no third party search product was installed..  
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Cloud Class® Course: Certified Penetration Testing

This CPTE Certified Penetration Testing Engineer course covers everything you need to know about becoming a Certified Penetration Testing Engineer. Career Path: Professional roles include Ethical Hackers, Security Consultants, System Administrators, and Chief Security Officers.

  • 4
  • 3
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now