Will running the Suspect File Versions be an effective way to identify the rogue files for removal?