Search Results
(displaying 13 results)
(displaying 13 results)
Name | Filename | Description | Status |
ctfmon | ctfmon.exe | Added by the Troj/SDBot-06 Trojan! which allows a remote user to access and control the computer via IRC channels. Note: Located in \%WINDIR%\ Note: Do not confuse with the MS Office file of the same name as described here | X |
ctfmon | ctfmon.exe | Adware responsible for tenmonkey.com popups Note: Located in \%WINDIR%\ Note: do not confuse with the MS Office file of the same name as described here | X |
CTFMon | ctfmon.exe | Added by the Family Kelogger program. Found at hxxp://www.spyarsenal.com/familykeylogger/ (DO NOT GO THERE). The program lets you record to a special file and then view all the keystrokes typed by everyone using your computer. Note: Remember if you did not put this on your computer then someone else did! Note: This Keylogging file is located in \%WINDIR%\%System%\CTF\ | X |
ctfmon.exe | ctfmon.exe | CTFMon is involved with the language/alternative input services in Office XP. CTFMON.exe will continue to put itself back into MSConfig when you run the Office XP apps as long as the Text Services and Speech applets in the Control Panel are enabled. Not required if you don't need these features. For more info on ctfmon See_Here ;en-us;282599 . CTFMON can be disabled from Control Panel, Text & Speech Services. Note: The file will always be located in the \%WINDIR%\System32\ folder. Note: If it is located elsewhere, it will likely be a worm or trojan! | U |
CTFMON.EXE | ctfmon.exe | Added by the Troj/Bckdr-QF TROJAN! Note: Located in \%WINDIR%\System\ Note: Do not confuse with the MS Office file of the same name as described here Note: Read the link, rootkit type stealth involved. | X |
ctfmon.exe | ctfmon.exe | Added by the Trojan.Satiloler.D TROJAN! Note: Located in \%WINDIR%\System\ Note: do not confuse with the MS Office file of the same name as described here Note: Read the link, rootkit type stealth involved. | X |
ctfnnon | ctfmon.exe | Identified as a variant of the Backdoor.Win32.Turkojan.ake malware. Note: located in \%WINDIR%\ Note: Use SDFix under supervision. Note: Please notethat C:\Windows\System32\ctfmon.exe is legitimate and should not be deleted. | X |
Firewall | ctfmon.exe | Added by a variant of the IRCBOT Note: Located in \%WINDIR%\ Note: Use SDFix under supervision. Not to be confused by the original file in \%WINDIR%\%SYSTEM%\ folder. | X |
Windows Live Messenger 8.12 | ctfmon.exe | Added by a W32/LiPark-A WORM! Note: Located in \%User%\ Note: Do not remove the legitimate program file in \%WINDIR%\%System%\ Note: The worm spread by copying itself into shared folders used by common Peer to Peer (P2P) filesharing applications. | X |
ctfmon | ctfmon.exe | Added by the Worm.Win32.AutoRun.ctz Note: Located in \%WINDIR%\ Note: Do not remove the legitimate ctfmon.exe file which is always found in \%WINDIR%\%System%\ | X |
SetUp | ctfmon.exe | Added by the Trojan.Win32.Pasta.fuw Note: Located in \%Program Files%\Windows NT\ | X |
MsWerr | ctfmon.dll | Added by the W32.Virut.CF VIRUT! Note: Located in \%WINDIR%\%System%\ | X |
ctfmon.exe | ctfmon.exe eminem.exe | Added by the BHARAT.A WORM! Note: Located in \%WINDIR%\System32\ Note: do not confuse with the MS Office file of the same name as described here Note: Read the link. | X |