This week I talk about the use of RUNDLL32 to exploit information files (.INF) to "fetch and execute" malware.