Windows fails to find in its file system an existing file

  • Thread starter Thread starter Vadim
  • Start date Start date
V

Vadim

Hi!

Problem summary: my Windows XP fails to found in its file system a file
with specific name.

All of a sudden an executable with some specific name (lets say
Myfile.exe) can't be run by Windows XP.
After double-click in explorer I get "Windows cannot find
'c:\temp\MyFile.exe'. Make sure you typed the name correctly and then
try again. To search for a file, click the Start button, and then click
Search" error.

More details:
1. The problem is system wide: the OS refuses to locate MyFile.exe on
any disk folder or even on USB drive.
2. Renaming the file solves the problem (MyFile_.exe works Ok).
3. The problem has nothing to do with the content of the file, since
when I took regedit.exe application and renamed it to MyFile.exe, I got
the same problem
4. Nothing suspicious related to "Myfile.exe" was found in registry.
5. I assume that this happen as a result of running Microsoft
Application Verifier with this exe. I uninstalled Microsoft Application
Verifier, but the problem persisted.

Any ideas?
Thanks in advance!
 
No, there are no quotes there.
In addition, I don't run it from command line, but from explorer.
 
Vadim, in your details, you say renaming the file works.

Instead of renaming the file (MyFile_.exe) use quotes instead "MyFile .exe"
This tells XP it is the true name of the file.
 
Depending on the file attributes, explorer may not find the file. This is
very common practice used in virus/adware files. If you know the directory
where the file is located, go into dos and do a "attribs filename -h -s"
and the file will appear in explorer.
 
Problem summary: my Windows XP fails to found in its file system a file
with specific name.

Smells like a rootkit, doesn't it?
All of a sudden an executable with some specific name (lets say
Myfile.exe) can't be run by Windows XP.
After double-click in explorer I get "Windows cannot find
'c:\temp\MyFile.exe'. Make sure you typed the name correctly and then
try again. To search for a file, click the Start button, and then click
Search" error.

That's interesting, and less rootkit-like.

Can you see the file via the shell, but find it doesn't run when
launched? If so, then maybe it's the opposite of the rootkit
objective; some sort of protection that is blocking running that file.

Or can you not see that file through the shell at all, whether you
eyeball it or use Search to find it, even though you've de-lamered
explorer so that it no longer hides hidden or system files?
More details:
1. The problem is system wide: the OS refuses to locate MyFile.exe on
any disk folder or even on USB drive.

OK. Both rootkits and safety blocks can do that.
2. Renaming the file solves the problem (MyFile_.exe works Ok).

OK; fits with both the above, suggesting they are too weak to use MD5
or similar fingerprinting and are name-based only.
3. The problem has nothing to do with the content of the file, since
when I took regedit.exe application and renamed it to MyFile.exe, I got
the same problem

OK; also points away from true identity management to simple
name-based blocking or hiding.
4. Nothing suspicious related to "Myfile.exe" was found in registry.

5. I assume that this happen as a result of running Microsoft
Application Verifier with this exe. I uninstalled Microsoft Application
Verifier, but the problem persisted.

I'm not familiar with Application Verifier. URL? Description?
Any ideas?

Let's hear more about what "MyFile.exe" actually is?

On rootkits: A rootkit is simply a malware that makes use of
opportunities open to it, to hide itself from the OS in various ways.

Like any large and mature industry, malware vendors often specialize
in particular niches. So rootkit functionality often exists as a
separate stand-alone malware, rather than simply being integrated into
the same malware that does other stuff. This current state of affairs
has created a false sense of security, that "rootkits" are a special
breed of threat that can be managed separately.

There are two ways to detect rootkits:

1) Test for divergant behaviors

This is a test for rootkit quality failure, i.e. a rootkit that traops
some OS functionality while failing to trap parallel methods that can
be used to compare results. Where these two methods give different
results, it suggests that a rootkit is interfering with one method.

For example, a rootkit detector may use a high-level API call to list
files in a directory, then use a low-level API call to view the raw
cluster chain of the directory and build up a list of files based on
its own interpretation of the data. If some files appear in the
second view that are not shown in the first, it implies a rootkit is
"editing" the hi-level API call to hide those files.

This method of detection has to be run while the rootkit is active,
and is prone to false positives if the contents of what is being
tested should change between one test and the next. For example, if a
harmless process were to delete a file from a directory test after the
first test and before the second, it will appear as if the second
method was being fiddled with to hide the file.

There's a risk of provoking a punitive response, when going after
malware while it is actively running. A rootkit that has already
grabbed the API calls being tested, is well-placed to do this.

2) Formal scan for known rootkits

If you scan the system while none of that system's code is running,
then the rootkit is "asleep", and is just another inert files that can
be scanned as easily and safely as anything else. As long as the
scanner "knows" the rootkit's signature, it can detect it.

This approach is safer, but will fail if the rootkit is not known to
the scanner, whereas the other approach may detect such malware by
virtue of the way it behaves.

Played any "audio CDs" from Sony lately?


--------------- ----- ---- --- -- - - -
First, the good Customer feedback has
been clear and unambiguous.
 
Hi!

Thanks for all your advises, but they didn't help.

1. My file isn't hidden at all. It can be seen in Exploerer and in cmd.
In addition, when I launch an explorer search, it's perfectly found.

2. Microsoft Application Verifier -
http://www.microsoft.com/technet/prodtechnol/windows/appcompatibility/appverifier.mspx

3. I didn't run any Sony Cds or the stuff like this.

4. MyFile.exe is my propritery created exe module (I compilled it by
myself in Visual Studio). I know perefectly what is in this file, so
that is not trojan or stuff like that.

Looking forward for additional clues....

Thanks
 
1. My file isn't hidden at all. It can be seen in Exploerer and in cmd.
In addition, when I launch an explorer search, it's perfectly found.
OK.

2. Microsoft Application Verifier -
http://www.microsoft.com/technet/prodtechnol/windows/appcompatibility/appverifier.mspx

Looks nice. What does it do if it sees stuff it doesn't like?
3. I didn't run any Sony Cds or the stuff like this.
;-)

4. MyFile.exe is my propritery created exe module (I compilled it by
myself in Visual Studio). I know perefectly what is in this file, so
that is not trojan or stuff like that.

OK, leaving aside the generic Win32PE infector possibility.

Let's paste from a previous post...

: All of a sudden Myfile.exe can't be run by Windows XP.
: After double-click in explorer I get "Windows cannot find
: 'c:\temp\MyFile.exe'.

First Q: Is the file actually in C:\Temp? If not, then suspect a
namespace or AppPaths thing that may be intercepting the name and
redirecting access to the wrong location.

Second Q: Does the .EXE have any external dependencies, such as calls
to code in .DLLs etc.? Perhaps the reporting is misleading and it is
one of these that is missing, or even a broken self-reference.

Suspect this if the phrase "...(or one of its components)..." is in
the error message.

Third Q: Are there any conflicting Properties in an associated .LNK
file, or references in the registry? I'd use NirSoft's RegScanner to
search registry for all refs to the file name.

Fourth Q: Is the file name an LFN? If it's an LFN that generates a
different underlying 8.3 name, then search registry also for the 8.3
name, and suspect other LFN/8.3 issues, e.g. NTFS with no 8.3

: 1. The problem is system wide: the OS refuses to locate
: MyFile.exe on any disk folder or even on USB drive.

Including the predicted path (if that path is incorrect)?

: 2. Renaming the file solves the problem (MyFile_.exe works Ok).

OK, that proves it's a name thing, so that searching for the name
should find the cause, unless that's foiled by obfuscation.

: 3. The problem has nothing to do with the content of the file,
: since when I took regedit.exe application and renamed it to
: MyFile.exe, I got the same problem

OK, confirms it's a name reference only, no MD5 etc. check

: 4. Nothing suspicious related to "Myfile.exe" was found in registry.

No free (cheap) lunch, alas :-/

: 5. I assume that this happen as a result of running Microsoft
: Application Verifier with this exe. I uninstalled Microsoft Application
: Verifier, but the problem persisted.

Effects may be static ("tattooing"), and thus persist after the app's
gone. I'd search for MyFile.pif, MyFile.lnk, MyFile.exe.maifest,
MyFile.pf etc. just for laffs, and also try bypassing system or user
account rights (other accounts, Safe Mode, Bart CD boot, copy the file
to FATxx and try there, tho USB stick test should exclude that)


---------- ----- ---- --- -- - - - -
Don't pay malware vendors - boycott Sony
 
Back
Top