I've spent more time on the issue and it seems that there are a whole host of things happening simultaneously.
Just as a matter of interest, it is a 8GB stick with no data of any real value. If it works or doesn't work is not really important because I have various other sticks lying around. I am just really interested in the behaviour of the stick and why I get such different results on W7 & XP
Lets separate issues:
The stick got messed up due to the format...I think. I will see if I can work through the tools on that Russian site to see whether it will come alive again.
---
I am looking at another stick with the same hidden file problem:
Yes, you guys are right, the reason I couldn't see the files was because Explorer did not show hidden or system files for the stick. I find this rather odd because I see those files on all my other drives. I want to know why those files are hidden, nobody would ever hide them and I seem to have all sorts of files hidden on a couple of the sticks.
Ok, so, on W7 I see hidden files and there is a curious file sitting in the root called asnzlvvpmp.vbe. I try to rename the file. T.txt nd the machine gets very upset. It claims that the file is owned by "everyone" and that I do not have permission to rename it. I also cannot copy it, delete it or anything.
So, I now put the same stick into the XP machine and I see all the files. I rename asnzlvvpmp.vbe to ttt.txt and the machine is happy to do so. I now open ttt.txt and find crudely encrypted instruction within the file. The program is a long string of decimal values separated by the pipe sign. There is a routine later on that creates a new string by converting the decimal values to their ASCII equivalents and also strips off the pipe signs. The last instruction is then to execute the code.
I will write a routine this evening to work out what the code actually does.
My concern is that the W7 machines react rather violently to me trying to fiddle with the fie and XP doesn't seem to care about the file at all. I do have anti virus etc. but it seems to me as if that file is being protected in some way.
Now here is a thought, lets say that the file is part of a virus. It may be possible that when the file is written to the stick all the files and directories become inadvertently hidden when the virus tries to hide that file. It makes sense because the files and directories that are hidden are not significant in any way, some drawing, music, jpgs and other odds and ends.
I think that there is a much larger serious issue lurking under the hood of my W7 machines and I am hell bent on finding out exactly what it is.
Just as a matter of interest, it is a 8GB stick with no data of any real value. If it works or doesn't work is not really important because I have various other sticks lying around. I am just really interested in the behaviour of the stick and why I get such different results on W7 & XP
Lets separate issues:
The stick got messed up due to the format...I think. I will see if I can work through the tools on that Russian site to see whether it will come alive again.
---
I am looking at another stick with the same hidden file problem:
Yes, you guys are right, the reason I couldn't see the files was because Explorer did not show hidden or system files for the stick. I find this rather odd because I see those files on all my other drives. I want to know why those files are hidden, nobody would ever hide them and I seem to have all sorts of files hidden on a couple of the sticks.
Ok, so, on W7 I see hidden files and there is a curious file sitting in the root called asnzlvvpmp.vbe. I try to rename the file. T.txt nd the machine gets very upset. It claims that the file is owned by "everyone" and that I do not have permission to rename it. I also cannot copy it, delete it or anything.
So, I now put the same stick into the XP machine and I see all the files. I rename asnzlvvpmp.vbe to ttt.txt and the machine is happy to do so. I now open ttt.txt and find crudely encrypted instruction within the file. The program is a long string of decimal values separated by the pipe sign. There is a routine later on that creates a new string by converting the decimal values to their ASCII equivalents and also strips off the pipe signs. The last instruction is then to execute the code.
I will write a routine this evening to work out what the code actually does.
My concern is that the W7 machines react rather violently to me trying to fiddle with the fie and XP doesn't seem to care about the file at all. I do have anti virus etc. but it seems to me as if that file is being protected in some way.
Now here is a thought, lets say that the file is part of a virus. It may be possible that when the file is written to the stick all the files and directories become inadvertently hidden when the virus tries to hide that file. It makes sense because the files and directories that are hidden are not significant in any way, some drawing, music, jpgs and other odds and ends.
I think that there is a much larger serious issue lurking under the hood of my W7 machines and I am hell bent on finding out exactly what it is.
Comment