Solved

Manifest fingerprint file

Posted on 2013-12-16
4
5,065 Views
Last Modified: 2014-01-18
I have a client who is extremely concerned about security on her machine. She has found a folder in her temp folder that has three files in it:
crl-set
manifest.fingerprint
manifest.json

I suggested that these files are just temp files generated by the fingerprint reader of the laptop but she insists they just started appearing. She does not use the fingerprint reader nor has she ever.

She wants an explanation. She suspects that someone is trying to access her computer remotely without her knowledge.

Any ideas?
0
Comment
Question by:jooolie3
  • 3
4 Comments
 
LVL 61

Expert Comment

by:btan
ID: 39723328
These are generic file and likely from chrome.exe. try deleting rhat specific tmp folder and have the process monitor to track its creation to reveal the binary creating it. Likewise you can even send those files to virustotal since they are supposed to be harmless and not malicious exe to virustotal online for check. The user does have valid concern in this case and also good to track the creation and modify time for those files on frequency of changes..need to ascertain if really due to FP software or others.
0
 

Author Comment

by:jooolie3
ID: 39732848
Thank you. I have set up an appointment with her for next week. I will try what you suggested and report back.
0
 

Accepted Solution

by:
jooolie3 earned 0 total points
ID: 39778120
The client decided she didn't want to spend any more time troubleshooting this now. Thanks for the suggestions.
0
 

Author Closing Comment

by:jooolie3
ID: 39790476
Client decided not to pursue the issue.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Healthcare organizations in the United States must adhere to the guidance of both the HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) for securing and protec…
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now