List Information

Started by: Paul Collins

Maintained by: random/random, nasdaq, Vino Rosso
Startup List

The Startup List catalogues startup applications - not running processes.
For information on the difference, please see here.

These are entries for programs that can start automatically with your computer.

Status Key:
Y = Normally leave to run at start-up
N = Not required - often infrequently used tasks that can be started manually, if necessary
U = User's choice - depends whether a user deems it necessary
X = Malware, spyware, adware, or other potentially unwanted items
? = Currently unknown status
Search Results
(displaying 13 results)

Name Filename Description Status
ctfmonctfmon.exeAdded by the Troj/SDBot-06 Trojan! which allows a remote user to access and control the computer via IRC channels. Note: Located in \%WINDIR%\ Note: Do not confuse with the MS Office file of the same name as described hereX
ctfmonctfmon.exeAdware responsible for tenmonkey.com popups Note: Located in \%WINDIR%\ Note: do not confuse with the MS Office file of the same name as described hereX
CTFMonctfmon.exeAdded by the Family Kelogger program. Found at hxxp://www.spyarsenal.com/familykeylogger/ (DO NOT GO THERE). The program lets you record to a special file and then view all the keystrokes typed by everyone using your computer. Note: Remember if you did not put this on your computer then someone else did! Note: This Keylogging file is located in \%WINDIR%\%System%\CTF\X
ctfmon.exectfmon.exeCTFMon is involved with the language/alternative input services in Office XP. CTFMON.exe will continue to put itself back into MSConfig when you run the Office XP apps as long as the Text Services and Speech applets in the Control Panel are enabled. Not required if you don't need these features. For more info on ctfmon See_Here ;en-us;282599 . CTFMON can be disabled from Control Panel, Text & Speech Services. Note: The file will always be located in the \%WINDIR%\System32\ folder. Note: If it is located elsewhere, it will likely be a worm or trojan!U
CTFMON.EXEctfmon.exeAdded by the Troj/Bckdr-QF TROJAN! Note: Located in \%WINDIR%\System\ Note: Do not confuse with the MS Office file of the same name as described here Note: Read the link, rootkit type stealth involved.X
ctfmon.exectfmon.exeAdded by the Trojan.Satiloler.D TROJAN! Note: Located in \%WINDIR%\System\ Note: do not confuse with the MS Office file of the same name as described here Note: Read the link, rootkit type stealth involved.X
ctfnnonctfmon.exeIdentified as a variant of the Backdoor.Win32.Turkojan.ake malware. Note: located in \%WINDIR%\ Note: Use SDFix under supervision. Note: Please notethat C:\Windows\System32\ctfmon.exe is legitimate and should not be deleted.X
Firewallctfmon.exeAdded by a variant of the IRCBOT Note: Located in \%WINDIR%\ Note: Use SDFix under supervision. Not to be confused by the original file in \%WINDIR%\%SYSTEM%\ folder.X
Windows Live Messenger 8.12ctfmon.exeAdded by a W32/LiPark-A WORM! Note: Located in \%User%\ Note: Do not remove the legitimate program file in \%WINDIR%\%System%\ Note: The worm spread by copying itself into shared folders used by common Peer to Peer (P2P) filesharing applications.X
ctfmonctfmon.exeAdded by the Worm.Win32.AutoRun.ctz Note: Located in \%WINDIR%\ Note: Do not remove the legitimate ctfmon.exe file which is always found in \%WINDIR%\%System%\X
SetUpctfmon.exeAdded by the Trojan.Win32.Pasta.fuw Note: Located in \%Program Files%\Windows NT\X
MsWerrctfmon.dllAdded by the W32.Virut.CF VIRUT! Note: Located in \%WINDIR%\%System%\X
ctfmon.exectfmon.exe eminem.exeAdded by the BHARAT.A WORM! Note: Located in \%WINDIR%\System32\ Note: do not confuse with the MS Office file of the same name as described here Note: Read the link.X


Powered by SystemLookup Engine. © 2008-2018 BrightFort. All Rights Reserved. | Privacy Policy | Terms of Use