I have found several VERY large files in c:\windows
They all have the same name, strangely enough.
The filename is {ED56F1A-81BB-11E2-B17D-0002762AD0CA}
There are six instances of that name. The files total almost 9GB in size!
Any idea what this might be? I googled the name but found nothing.
TIA,
Jason
Let's try it another way.
For *each* file in question, give its exact size in bytes.
You can do "Properties" on the file and get that information.
Another technique you can use, is to generate the MD5sum and SHA1sum
checksums for each file. Do a Google search using those values,
and you'd be surprised what you can find.
The "fciv.exe" utility is an example of a tool that can generate
the checksums for you. The utility is a bit limited (not very
flexible), but with enough trouble, you can get this done.
You can get a copy here.
http://www.microsoft.com/en-us/download/details.aspx?id=11533
Example:
fciv.exe -both D:\{ED56F1A-81BB-11E2-B17D-0002762AD0CA} > myoutput.txt
That would place the two flavors of checksum of that particular file,
into the current working directory of the command prompt (cmd.exe)
window. Opening myoutput.txt, copy/paste to your favorite
search engine, you might discover which Windows (.NET) update
did it.
The site
www.virustotal.com , can perform malware
searches on submitted files. It has an option to search by checksum.
And searching against that site, can sometimes uncover an alias name
for the file. They have apparently added the checksums of
"famous" downloads to their sites, downloads which are larger than
the 20-30MB limit they have. I was able to match the checksum
of a CD sized download, against that site, and discover what
the file was.
*******
The format of your file name is similar to a "GUID". It could be
that the leading digit was a zero, and didn't appear in the name.
{ED56F1A-81BB-11E2-B17D-0002762AD0CA}
http://en.wikipedia.org/wiki/Guid
Those are randomly generated, and intended to come from such a
large potential space, that the same string won't be generated twice.
While you will find patterns in these (these can also be generated
from a subset and appear to have an order to them), for
the most part you should consider them random. Which is why
I really didn't expect to find this in a Google search.
As a consequence of the randomness of the name, I have to
resort to file size in bytes, and MD5 checksum, as alternative
"fingerprinting" techniques to feed to a search engine.
There's still no guarantee they'll show up though. It's
a long shot.
Paul[/QUOTE]
Thanks Paul. That's good info, but I think I figured it out...
I believe that Acronis True Image created these. Earlier today, I
needed to recover a file from a backup and told Acronis to
mount the backup. It assignes new drive letters and makes the
backed up files available in the usual way in Explorer - you can find
files to restore in the mounted images and simply copy them. In today's
case, Acronis reported an error during the mount process (which
always takes a long time). I examined the files with a
hex editor and I'm quite sure that they were associated with
the mounting procedure that failed; there are some text strings
at the beginning of the files that led me to this conclusion...
Jason