Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Manifest fingerprint file

Posted on 2013-12-16
4
Medium Priority
?
7,348 Views
Last Modified: 2014-01-18
I have a client who is extremely concerned about security on her machine. She has found a folder in her temp folder that has three files in it:
crl-set
manifest.fingerprint
manifest.json

I suggested that these files are just temp files generated by the fingerprint reader of the laptop but she insists they just started appearing. She does not use the fingerprint reader nor has she ever.

She wants an explanation. She suspects that someone is trying to access her computer remotely without her knowledge.

Any ideas?
0
Comment
Question by:jooolie3
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 64

Expert Comment

by:btan
ID: 39723328
These are generic file and likely from chrome.exe. try deleting rhat specific tmp folder and have the process monitor to track its creation to reveal the binary creating it. Likewise you can even send those files to virustotal since they are supposed to be harmless and not malicious exe to virustotal online for check. The user does have valid concern in this case and also good to track the creation and modify time for those files on frequency of changes..need to ascertain if really due to FP software or others.
0
 

Author Comment

by:jooolie3
ID: 39732848
Thank you. I have set up an appointment with her for next week. I will try what you suggested and report back.
0
 

Accepted Solution

by:
jooolie3 earned 0 total points
ID: 39778120
The client decided she didn't want to spend any more time troubleshooting this now. Thanks for the suggestions.
0
 

Author Closing Comment

by:jooolie3
ID: 39790476
Client decided not to pursue the issue.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question