From: Rick on
"David H. Lipman" <DLipman~nospam~@Verizon.Net> wrote in
news:hfo2tu0md9(a)news3.newsguy.com:
>
> So let me modify my NEVER answer to practically NEVER. Interpreting
> .INI files is an old construct that was used in Win9x/ME and and to a
> lesser degree in NT v3.5x and NT4 and thus *may* have some left over
> functionality in subsequent OS'. However for the most part, .INI
> files are no longer interpreted by the OS.


Yes, I'm aware of how .ini files have been used going back through Win3.x.


> Notice in the aumha article it states...
> "In Windows 2000 and XP, the WININIT.INI file, if existing, will be
> executed. However it is usually replaced by the
> �PendingFileRenameOperations� sub-key in the Registry key
> HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager."
>
> This shows that for backwards compatibility Win2k and WinXP may
> interpret WININIT.INI but has been really replaced by Registry
> functionality.


I'm also aware of how wininit.ini is just a hangover and there are other,
preferred methods of doing the same thing. According to the aumha article
however, even though it is not the preferred method, Win XP will execute
the instructions in a wininit.ini file if one is found.


> This will not affect Robin's problem as the message "INFECTION:
> DOCUMENTS AND SETTINGS\ROBIN BIGNALL\COOKIES\INDEX.DAT
> COULD NOT BE REMOVED. FILE IS NO LONGER EXISTENT" occurs "before the
> logon screen" and would not be generated by such a process. This is
> presumed to be a security tool/utility in action.


And this is where my original question comes in. Just where in the boot
process does wininit.ini get processed? Since the aumha article points out
that:

a) "WININIT.INI is used to complete Windows and program installation steps
that cannot be completed while Windows is running"

b) "During the boot process, Windows checks to see if there is a
WININIT.INI file and, if it finds one, executes its instructions."

c) and specifies that Windows XP will execute such a file, if it exists
(assumedly to maintain backwards compatibility)


I was just curious if anyone happened to know where in the boot process
that execution was performed. Whether it was before or after the logon
process.


--
Rick Simon rsimon(a)cris.com

Include "spam(trap)key" somewhere in the
body of any email to avoid spam filters.
From: David H. Lipman on
From: "Rick" <rsimon(a)cris.com>

| "David H. Lipman" <DLipman~nospam~@Verizon.Net> wrote in
| news:hfo2tu0md9(a)news3.newsguy.com:

>> So let me modify my NEVER answer to practically NEVER. Interpreting
>> .INI files is an old construct that was used in Win9x/ME and and to a
>> lesser degree in NT v3.5x and NT4 and thus *may* have some left over
>> functionality in subsequent OS'. However for the most part, .INI
>> files are no longer interpreted by the OS.


| Yes, I'm aware of how .ini files have been used going back through Win3.x.


>> Notice in the aumha article it states...
>> "In Windows 2000 and XP, the WININIT.INI file, if existing, will be
>> executed. However it is usually replaced by the
>> �PendingFileRenameOperations� sub-key in the Registry key
>> HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager."

>> This shows that for backwards compatibility Win2k and WinXP may
>> interpret WININIT.INI but has been really replaced by Registry
>> functionality.


| I'm also aware of how wininit.ini is just a hangover and there are other,
| preferred methods of doing the same thing. According to the aumha article
| however, even though it is not the preferred method, Win XP will execute
| the instructions in a wininit.ini file if one is found.


>> This will not affect Robin's problem as the message "INFECTION:
>> DOCUMENTS AND SETTINGS\ROBIN BIGNALL\COOKIES\INDEX.DAT
>> COULD NOT BE REMOVED. FILE IS NO LONGER EXISTENT" occurs "before the
>> logon screen" and would not be generated by such a process. This is
>> presumed to be a security tool/utility in action.


| And this is where my original question comes in. Just where in the boot
| process does wininit.ini get processed? Since the aumha article points out
| that:

| a) "WININIT.INI is used to complete Windows and program installation steps
| that cannot be completed while Windows is running"

| b) "During the boot process, Windows checks to see if there is a
| WININIT.INI file and, if it finds one, executes its instructions."

| c) and specifies that Windows XP will execute such a file, if it exists
| (assumedly to maintain backwards compatibility)


| I was just curious if anyone happened to know where in the boot process
| that execution was performed. Whether it was before or after the logon
| process.


Rick I think you have a good point in that if the WININIT.INI file is found by the OS it
will do a a file move/delete function "before the logon screen" which is 100% relevant to
Robin's problem.

However, this is a silent function. No screen displays and certainly not "INFECTION:...".

Since you know this INI file and its directives, maybe you could create a test and see
what it does.

--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp


From: Buffalo on


Robin Bignall wrote:
[snip]
> John, Andy, thanks for the suggestions. I have checked autoruns. In
> fact, A-squared contains a very useful feature called Hijackfree which
> gives detailed information on what's present in 5 categories:
> processes, ports, autoruns, services and others. I don't see anything
> amiss. PCButts emailed me to make the sensible suggestion of checking
> the runonce registry entries. They're empty. The weird thing is
> where the message is coming from, since no executable on my system
> disk contains the string "infection".
Dl and instal a free anti-virus program like Avira AntiVir and install it.
Disable or uninstall your present anti-virus program (A-squared)
Uninstall your anti-malware programs and install the free version of
MalwareBytes AntiMalware.
Use it to scan frequently.
See if you have the same problem. If not, install each of the programs you
uninstalled or disabled one at a time to see if you can find out which one
causes the problem.
I don't think you ever said you installed and ran the free version of MBAM
(MalwareBytes Anti-Malware) and the free version of SAS (SuperAntiSpyware).
If you didn't (this is a damn long thread) please do it.
Buffalo


From: Beauregard T. Shagnasty on
In alt.privacy.spyware, Buffalo wrote:

> Disable or uninstall your present anti-virus program (A-squared)

A� (A-Squared) is an anti-spyware program, not an anti-virus program.
There should be no conflict with anything, assuming of course you don't
set full-time scanners in action.

http://www.emsisoft.com/en/ (pay)
http://www.emsisoft.com/en/software/free/ (free)

--
-bts
-Friends don't let friends drive Windows
From: Buffalo on


Beauregard T. Shagnasty wrote:
> In alt.privacy.spyware, Buffalo wrote:
>
>> Disable or uninstall your present anti-virus program (A-squared)
>
> A� (A-Squared) is an anti-spyware program, not an anti-virus program.
> There should be no conflict with anything, assuming of course you
> don't set full-time scanners in action.
>
> http://www.emsisoft.com/en/ (pay)
> http://www.emsisoft.com/en/software/free/ (free)

Right you are. Sorry.
I now realize that Robin uses Kaspersky.
Ok, Robin, disable or uninstall Kaspersky and use the free version of Avira
AntiVir temporarily.\
Since even Lipman can't nail it, please post back on what program is causing
the message.
Thanks,
Buffalo