Want to highlight a helpful answer? Upvote!

Did someone help you, or did an answer or User Tip resolve your issue? Upvote by selecting the upvote arrow. Your feedback helps others! Learn more about when to upvote >

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Wierd .plist preference files getting corrupt?

Hello people,


I've come here because I searched for the names of these .plist files on the net and got no results whatsover - ZERO.


Drive Genius 3 picks out the following .plist files as corrupt, on a fairly regular basis. When I delete them, they come back pretty quickly, and the first I hear about it is when DG3 points them out to me again - only days later:


/Users/Kev/Library/Preferences/com.Incoradial.Stomatic.plist: Unexpected character at line 1



/Users/kev/Library/Preferences/com.Datawise.Mousquetaire.plist: Unexpected character at line 1



I am not experiencing any strange behaviour that I could link to the presence of these files, I'm just curious at to where they orginate from and why they get picked up as possibly corrupt so quickly?


Like I say a quick search on the net brings up nothing at all for the names of these files. Sometimes there are about 3 more - but they all have names that I cannot relate to any applications I have on the Mac?


I had noticed some wierd looking preference files before when using MainMenu and seeing the list as it was processing the batch tasks - but never got round to investigating it properly.


Anyone know anything about these guys?....

Mac Pro, Mac OS X (10.6.8), RME Fireface 400/Logic 9.1.6

Posted on May 12, 2012 2:49 PM

Reply
17 replies

May 15, 2012 4:44 AM in response to WZZZ

One of the words - "incoradial" actually brings up no results at all on Google - quite a feat!


Later....


So, I've just managed to find ONE result on the web. It's some forum post on a French site from 2009:



http://www.powerbook-fr.com/forum/viewtopic.php?t=16198&start=0&postdays=0&posto rder=asc&highlight=&sid=6b3582ddf706b3cfa77a71dc233c6efc


Still baffled.....

May 15, 2012 4:08 PM in response to X423424X

I did this the first time, and just did it all again to double check - nada. I searched ALL my volumes, not just the system drive.


I also did a sweep with ClamXav:


Four.zip files came up as carrying trojans - they were all files that would need to be opened in Windows, I have never opened them and don't have Windows on this Mac anyway. I secure deleted them - they were not required.


About 100 emails came up as being various types of "spoofdomian" or "phishing" etc. I foolishly binned these straight away, only later checking some of the emails out on a second CX sweep of my Mail folder - seems the checker in CX is pretty sensitive on the email front - lots of emails from sources I trust were moved into the Quarantine folder! God knows what I've trashed out of my email account the previous time! Ooops!


As far as the mystery files go, nothing really significant as far as I can tell - mean anything to you?



Is it worth doing a sweep with the Sophos app as well?


Message was edited by: edgemusic - adding a question - afterthought...

May 15, 2012 4:54 PM in response to edgemusic

Frankly ignore all malware reported by these so called virus detectors. They are simply reporting false hits with their heuristics and pattern matchers matching on binary data. That's why I think they are all useless and a waste of time. And don't let them "quarantine" (move) anything automatically or you may end up breaking something (e.g., especially mail when it thinks it has a match in a mail message--you will break the mail message database).


Look, this all started because you said there are two plists that you remove and then get automatically recreated (forget that they may have some garbage at the end of them). There's no magic here. There are two processes that create them. So they are in your system somewhere. They are not apple plists. So they are something you installed implicitly or explicitly.


Remove the plists again now. Do they reappear? No? Then log out and log back in? Do they reappear?


If yes, then look in your login items and ~/Library/LaunchAgents in your home directory).


If no, then reboot. Do they appear now? I assume they would. So if yes, look in the following places:


/Library/LaunchAgents

/Library/LaunchDaemons

/Library/StartupItems


Post the files you see in these and your login items and ~/Library/LaunchAgents if it isn't obvious who is spawing the processes creating those plists.

May 15, 2012 7:01 PM in response to edgemusic

edgemusic wrote:


About 100 emails came up as being various types of "spoofdomian" or "phishing" etc. I foolishly binned these straight away, only later checking some of the emails out on a second CX sweep of my Mail folder - seems the checker in CX is pretty sensitive on the email front - lots of emails from sources I trust were moved into the Quarantine folder! God knows what I've trashed out of my email account the previous time! Ooops!

You should rebuild all your mailboxes as the mailbox indexes were corrupted when you quarantined those emails.


Any time you see the word "Heuristics" in an infection name you should always read the message first. Heuristics means that no actual signature was found, but something about url formatting looked suspicious enough to warn you about it. After you've read it in your e-mail client, then use the delete function there to prevent damage and to make certain the message is removed from both your hard drive and your e-mail ISP's server.

May 20, 2012 3:12 PM in response to X423424X

So, thanks for your input everyone.


The plot thickens:


The files do not reappear after logout/login. Nor do they reappear after a restart.


I now have a few more weird ones for you - again brought to my attention by Drive Genius 3, telling me these are potentially corrupt - I've just started checking them on the net - the first one at least, has no results at all:


com.seard.cutwork.plist

com.webrexia.remove.plist

com.Elitecargo.Whoso.plist

com.equicresearch.lightless.plist

com.SystrusCapital.ABCcomp.plist


No return of the previous ones since I did the virus check and deleted all those files...



About the mailbox rebuild - I did do that, just in case - thanks!

Jul 4, 2012 10:56 AM in response to edgemusic

Hello people - well - the weirdness continues....


I now have some more new ones coming in on the corrupt prefs front - all with totally unfamiliar names that mean nothing to me, and have little or no presence on the net when serached for..


I have a .pdf of the contents at the locations requested, but I can't see how to attach it here?


I would really appreciate some light shed on this prefs stuff - it's pretty weird to me....

Nov 1, 2012 12:15 PM in response to edgemusic

I too have been experiencing this. The only two file names that come up consistently are:


com.Incoradial.Insist.plist

com.Utterlus.Erythrocyte.plist


Like you, these come up periodically but with no apparent pattern; and I'm not experiencing anything odd, as far as I know ⚠. Also, web searches produced no results except this thread for the "Incoradial" search.


It seems strange to me that no one out in the ether has documented this experience.


Like you, the only place I got an alert was from Drive Genius 3 to Verify Preferences listed.


Running a full Sophos scan now just to see what it picks up. I'll chime back in with the results in a couple of days.


Thanks everyone!

Nov 1, 2012 12:44 PM in response to low_notes

low_notes wrote:


I too have been experiencing this. The only two file names that come up consistently are:


com.Incoradial.Insist.plist

com.Utterlus.Erythrocyte.plist

Although preferences are supposed to be formatted as XML files, I have run across exceptions several times. I don't know exactly what Drive Genius 3 is looking for, but I suspect they are simply verifying that the file has properly followed XML formatting rules. If the developer chooses to use their .plist for a different reason, they can do so at their own peril. The ones I have found have been plain text files, so you might want to try to open them with your favorite text editor and see if they contain any clues. I am not aware of any way to use such a file in a malicious way, if that's a concern.

Wierd .plist preference files getting corrupt?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.