Jump to content


Photo

Interesting directory


  • Please log in to reply
5 replies to this topic

#1 mikeruth

mikeruth

    New Member

  • Members
  • Pip
  • 7 posts

Posted 21 February 2012 - 03:37 PM

Good day all, I have been in PC repair for many years and with the on slaught of malware it is indeed a never ending battle.
While working on a Windows Vista system today I was running MalwareBytes and noticed it was scanning a directory I did not know about.
C:\windows\system32\config\systemprofile\appdata\local\microsoft\windows\temporary internet files\Content.IE5\odd folder names as we have seen before.

I had ran Ccleaner on this system minuets earlier yet there was a significant number of folders and data in each. Looking at my own system those folder did not exisist other than typical index.dat files.

Sooo, I guess my question is, can we delte that data as we would if it were under the user account?

Thanks

Mike R

#2 RJGoodhouse

RJGoodhouse

    Regular Member

  • Honorary Members
  • PipPip
  • 73 posts
  • Gender:Male
  • Location:Monrovia, CA

Posted 21 February 2012 - 04:19 PM

Microsoft Security Support for VISTA Ends on April 10th, I'm not sure how much time you want to put into that System, except to Upgrade it.
You can find your own Personal End of Support date here. It's also known as the Product LifeCycle
[url="http://support.microsoft.com/lifecycle/?LN=en-us&x=14&y=9"]http://support.microsoft.com/lifecycle/?LN=en-us&x=14&y=9[/url]

Thanks for Caring and Sharing

#3 Firefox

Firefox

    Forum Deity

  • Trusted Advisors
  • PipPipPipPipPipPip
  • 9,991 posts
  • Gender:Male
  • Location:USA

Posted 21 February 2012 - 04:22 PM

Hello and :welcome: Without looking at the content of the folder its hard to tell.

From the name of the folder it seems like they are temp files from IE. You could always move the folders someplace else and then restart and see if the computer works OK. Also an inspection of the files may shed some light as to what they are (like temp files).

Did you check the IE settings to see what the temp file location is set to?

@RJGoodhouse BTW support for windows vista has been extended.....

Support end date for Windows XP, Windows Vista and Windows 7 are as follows:


Windows XP 4/8/2014
Windows Vista 4/11/2017
Windows 7 1/14/2020


post-2065-0-92797800-1392234217.jpg


Dell Precision T7500, Win7 Ultimate 64bit fully updated, McAfee Corp Edition v8.8,
Watchguard Firewall, Intel Xeon E5606CPU, Dual Quad Core Processors, 16GB Ram,
E5606 @ 2.13GHz, Nvidia Quadro NVS420, Raid-1 Dual 1TB Sata 10000 rpm Hard Drives
Dual DVD Burners, IE10, Opera, MBAM, MBSB, MBAE


#4 mikeruth

mikeruth

    New Member

  • Members
  • Pip
  • 7 posts

Posted 21 February 2012 - 07:03 PM

RJ thanks, although I didn't ask about support life.
Forum Diety, thx, I'll look into it and try that. The content is data from web pages visited, exactly like XP systems at c:\documents and settings\user name\local settings\application data\temporary internet files.

Mike R

#5 David H. Lipman

David H. Lipman

    Forum Deity

  • Experts
  • PipPipPipPipPipPip
  • 4,245 posts
  • Gender:Male
  • Location:Jersey Shore USA
  • Interests:Malware Research, dSLR Photography, Numismatics & Surf Fishing

Posted 21 February 2012 - 07:31 PM

Mike R:

You can dump the folder. Not sure what you expect to gain but it is a OS System generated TIF.
David H. Lipman
DLipman@Verizon.Net

#6 mikeruth

mikeruth

    New Member

  • Members
  • Pip
  • 7 posts

Posted 07 March 2012 - 11:09 AM

Mike R:

You can dump the folder. Not sure what you expect to gain but it is a OS System generated TIF.


Thanks for the info, nothing to be gained other than privacy, After clearing out the user folders etc, a consideralble amount of info was found there leading me to where the user had been on the PC.

Also concerned that writers of Malicious software might be able to use that as a place to store instalation files. That was the first time I had heard of that location.

Thx
Mike R




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users