winstart.bat

when i do a scan boot,avast tells me" error in winstart.bat "
is it important?
xp pro sp2 full updated
ms antispy
kerio 2.1.5

Hi GYL,

See if this helps: http://support.microsoft.com/default.aspx?scid=kb;en-us;310353

–lee

thanks Lee.Only avast tells me about this problem
no problem pointed by windows or others av;so I think it’s not very important,or rather I hope!

Well its kinda hard to help without more specific infomation them, please provide:

Your OS
Your Avast Version
Exact error message

Also have you tried running a scandisk/chkdisk

–lee

Wait a second :slight_smile:
When exactly is the problem reported? I’m not aware of any checks of winstart.bat in avast!..

2 weeks ago.avast 4.6.623
yes i did scan disk/chkdisk

I would like to know when is the error displayed…

when scan on demand only
report tells"c:/windows/winstart.bat error 42006

You mean, when you run a scan from the Simple User Interface, the final report shows error 42006 for that file?

boot scan “error42006”
scan with interface “cannot open winstart.bat”

Well, the error 42006 means “file is offline”, which is rather strange… (unless somebody set the “offline” attribute to this file). Can you check the content of the file? (can you open it in Notepad, for example)?

no ,I can’t find c:/windows/winstart.bat anywhere

Are you sure this file is not hidden?
Windows Explorer > Tools > Folder options > Show… (2nd tab) > Show hidden and system files
Search…

If it’s really not there, I’d try the RootKit Revealer… I believe winstart.bat shouldn’t normally be present in WinXP system.

It’s really not there! and it’s not hidden technical I’ll try your util Igor and tell you after.thanks

here is what i see
HKLM\softwate\microsoft\windows\current version\system

time: 04/02/2005

size:0 bytes

description: key name contains embedded nulls

If somebody can help me .Thanks!

Key name contains embedded nulls.
The Windows API treats key names as null-terminated strings whereas the kernel treats them as counted strings. Thus, it is possible to create Registry keys that are visible to the operating system, yet only partially visible to Registry tools like Regedit. The Reghide sample code at Sysinternals demonstrates this technique, which is used by both malware and rootkits to hide Registry data.

This is from its help file… My system scan reveals the same… I haven’t too much time to interpret it but it seems to be normal and not a problem really…

Thank you Technical !It’s reassuring!