_@##.TMP Folders  ( _@10.tmp _@22.tmp etc )

Posted on 2011-02-26
Last Modified: 2013-12-05
We have a Windows 2000 server that has the folder _@##.tmp appearing in the root of one of the drives.  This folder cannot be deleted by normal means and we use zap.exe to get rid of it. It then reappears with the number, represented by the  ## incremented.

I've seen this problem before on another Windows server some years back and used one of the virus scanners of the day to remove the malware causing the folder to appear and reappear.

In this case we have run VIPER, PREVX, Spybot, Malwarebytes, Superantispyware etc., with no ultimate resolution. It is suspected that it may be caused by a variant of Win32/Agent trogen.  

Was wondering if anyone has some new information re this problem and it's ultimate resolution.

Thanks - Al      
Question by:Alyork
  • 4
  • 3
  • 2
LVL 38

Expert Comment

ID: 34991732
For a Server OS, you might want to try Hitman Pro 64 Bit -

I'll look around and see if I can find out more about this malware.
LVL 38

Expert Comment

ID: 34991839
I just confirmed that 'McAfee Stinger' is good for Server OS use and you should try it:

LVL 31

Accepted Solution

moorhouselondon earned 250 total points
ID: 34992316
Is it possible to "down" the server for a period to eradicate the problem?  If so, there are three suggestions I would make:-

(1) Use a virus checker that is capable of being run in Safe Mode.  AVG will do the trick.

(2) Use a virus checker on a CD that has its own built in OS to look across at the drive and eradicate it like that.  I recommend the BitDefender CD which is hosted on a Linux OS.  Boot off the CD and let it run, the OS can be a bit fussy about certain hardware though.

(3) Take the drive out, bung it in another pc as a slave drive and run a conventional virus scan on the drive.

Author Comment

ID: 34992606
Unfortunately the server in question is in the boonies and I'm having to do this via remote support. And they have no tech person there to assist. I may have to go there if it's not able to be resoved and will detach the drives and do a scan from another computer.

One of the anomalies is that, although Explorer and the Command box both see the "_@xx.tmp" folder, Windows search does not. Supposedly Windows 2000 search was before MS decided what we can and can't search for. I should check the registry to see if the "FilterFilesWithUnknownExtensions" is present.  

Thank you for your responses and will do what more I can remotely and let you know what happens.

Thanks - Al
Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

LVL 38

Assisted Solution

younghv earned 250 total points
ID: 34992620
Both of my suggestions can be attempted by a non-technical person.
Just send them the links and talk them through it.

One of the drawbacks to 'Safe Mode' or 'Slave Scans' is that various malware processes will not be running in either instance.

The truly effective anti-malware applications need the system running in full "Normal Mode" to effect the repairs.

Author Comment

ID: 35053363
The _@xx.tmp file just happened to be recreating itself on a partition that had never been used. Deleting  and recreating the partition along with the malware scans, seems to have eliminated the culprit.

Interesting note: Searching for  *.tmp  didn't find the  _@xx.tmp   file, however a search for  _*.tmp  did.  

Author Closing Comment

ID: 35053388
The solution was only fully effective after a drive partion was deleted and recreated as if there was some connection to the drives structure.

The last product that was run was VIPRE from Sunbelt Software.
LVL 31

Expert Comment

ID: 35054086
>Searching for  *.tmp  didn't find the  _@xx.tmp   file, however a search for  _*.tmp  did.  

Out of interest: was Windows Explorer being used to perform the search?  If so then what *other* things is Windows Explorer not showing us?  This could be a very serious problem for those of us who think we've done a complete copy of something from one place to another, only to find that things are missing.  

I wonder whether _@xx.tmp was chosen because of this advantage (to them) of being hidden?

Thank you for the points.

Author Comment

ID: 35054199
The search was done with the Windows 2000 Search, which I'm assuming is part of Windows Explorer  as no third party search product was installed..  

Featured Post

Free Gift Card with Acronis Backup Purchase!

Backup any data in any location: local and remote systems, physical and virtual servers, private and public clouds, Macs and PCs, tablets and mobile devices, & more! For limited time only, buy any Acronis backup products and get a FREE Amazon/Best Buy gift card worth up to $200!

Join & Write a Comment

Suggested Solutions

I annotated my article on ransomware somewhat extensively, but I keep adding new references and wanted to put a link to the reference library.  Despite all the reference tools I have on hand, it was not easy to find a way to do this easily. I finall…
This article describes how to use the timestamp of existing data in a database to allow Tableau to calculate the prior work day instead of relying on case statements or if statements to calculate the days of the week.
This video will demonstrate how to find the puppet warp tool from the edit menu and where to put the points to edit.
The viewer will learn how to successfully download and install the SARDU utility on Windows 7, without downloading adware.

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now