Jump to content

____.tmp file in C:\Windows\SoftwareDistribution\Download\***********


Recommended Posts

So for some reason yesterday (after 9 months of paid version scanning daily) I had two "trojan" hits.  They are both the same time of file found in:



The files are both the same size looking like:


When you open in Notepad they look like normal temp files from MS windows updates being applied.  I decided to upload one to "VirusTotal" and got a full clean (all green check marks) even from MalwareBytes.


So I believe they are both Temp files created when I "uninstalled" KB3035583 (didn't want the GWX on my one PC).


Since these are just Temp files I figured I'd let my local MalwayreBytes go ahead and quarantine both of them just because I don't see it hurting anything.


I have a screen capture of VirusTotal saying the tmp file is all clean (0/54).


I am also uncertain if the Temp files had any personal data in them so I have requested VIrustotal to remove it when possible.  Like I said MalwareBytes found 2 of these exact same temp files that I believe were generated by the two times I had to uninstall the same KB Win7 update.

Link to post
Share on other sites

Here's a copy paste of the log.  Sorry it's in the XML format.  I did change the username, PC name & IP.  The rest I promise is untouched.


<?xml version="1.0" encoding="UTF-16" ?>
<date>2016/02/10 14:35:32 -0500</date>
<logfile>mbam-log-2016-02-10 (14-35-32).xml</logfile>
<osversion>Windows 7 Service Pack 1</osversion>

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.