Global Search

Not sure what a file is? Sort through the possibilities with a quick search of all of the lists.
Or get more accurate results by browsing and searching by list.
Startup List Results
Startup Entry

Name Filename Description Status
ctfmonctfmon.exeAdded by the Troj/SDBot-06 Trojan! which allows a remote user to access and control the computer via IRC channels. Note: Located in \%WINDIR%\ Note: Do not confuse with the MS Office file of the same name as described hereX
ctfmonctfmon.exeAdware responsible for tenmonkey.com popups Note: Located in \%WINDIR%\ Note: do not confuse with the MS Office file of the same name as described hereX
CTFMonctfmon.exeAdded by the Family Kelogger program. Found at hxxp://www.spyarsenal.com/familykeylogger/ (DO NOT GO THERE). The program lets you record to a special file and then view all the keystrokes typed by everyone using your computer. Note: Remember if you did not put this on your computer then someone else did! Note: This Keylogging file is located in \%WINDIR%\%System%\CTF\X
ctfmon.exectfmon.exeCTFMon is involved with the language/alternative input services in Office XP. CTFMON.exe will continue to put itself back into MSConfig when you run the Office XP apps as long as the Text Services and Speech applets in the Control Panel are enabled. Not required if you don't need these features. For more info on ctfmon See_Here ;en-us;282599 . CTFMON can be disabled from Control Panel, Text & Speech Services. Note: The file will always be located in the \%WINDIR%\System32\ folder. Note: If it is located elsewhere, it will likely be a worm or trojan!U
CTFMON.EXEctfmon.exeAdded by the Troj/Bckdr-QF TROJAN! Note: Located in \%WINDIR%\System\ Note: Do not confuse with the MS Office file of the same name as described here Note: Read the link, rootkit type stealth involved.X

O23 List Results
Windows Services

Name Filename Description Status
Alternative User Input Services (Ctfmon)ctfmon.exeAdded by the W32/Tilebot-JR WORM! Note: This worm is located in C:\%WINDIR%\ Note: NoteThis is not the cftmon.exe normally found in C:\WINDOWS\System32\X
LPTRDC server (LPTRDCsrv)ctfmon.exeIdentified as TrojanDownloader:Win32/Fourta.A Malware Note: located in \%WINDIR%\ Note: Use SDFix under supervision.X
Microsoft CTF Loaderctfmon.exeCTF LoaderL
Windows CTF Loaderctfmon.exeW32/Sdbot-DFSCopies itself to %Windows% directoryX
Drivers List Results
Driver Entry

Name Filename Description Status
System Servicectfmon.exeInfostealer trojan, detected by ESET's Nod32 antivirus as a variant of Win32/PSW.OnLineGames.PSKX
Active Setup List Results
Active Setup - Installed Component

CLSID Name Filename Description Status
{F5776D81-AE53-4935-8E84-B0B284D4BCEF}(no name)ctfmon.exeInfostealer trojan, detected by Sophos as Troj/Insidoor-AX
{003M185M-XA30-WYI2-3PNK-YXN35127018N}(no name)ctfmon.exe Infostealer trojan, see hereX
{7N365172-32M6-8LL2-XRW7-EF733H5H8722}(no name)ctfmon.exeInfostealer trojan, see hereX
{7A4Q2V25-7CXG-D2RT-6C77-166PLA7SA7Y7}(no name)ctfmon.exeInfostealer trojan, detected by Kaspersky antivirus as Trojan.Win32.Jorik.Llac.ajd, see this ThreatExpert ReportX
{43GQRV6F-35TO-2VGB-GLJ7-L5LBTK7YQ187}(no name)ctfmon.exe Infostealer trojan, detected by Microsoft as Backdoor:Win32/Xtrat.A - also see hereX

Powered by SystemLookup Engine. © 2008-2018 BrightFort. All Rights Reserved. | Privacy Policy | Terms of Use