Startup Entries

! | ' | $ | % | ( | * | , | - | . | / | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | \ | space | ? | @ | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ^ | _ | {
ctfmon.exe
File Name: ctfmon.exe
Description:
Added by the External: RAIDYS TROJAN! Note - this overwrites the legitimate ctfmon.exe process associated with alternate text inputs which is located in %System%
(0) | (0) | (7)
ctfmon.exe
File Name: msupdate32.exe
Description:
Spy Sheriff/SpywareNO malware, also detected as the External: SPYHOAX-A TROJAN, pretends to be a spyware remover! - file names spotted sofar include VXH8JKDQ2.EXE, NS6281400.so, CVXH8JKDQ2.EXE, down3.exe, sefe.exe, winstall.exe, and tool2.exe
(0) | (0) | (7)
ctfmon.exe
File Name: ctfmon.exe
Description:
Supports multiple languages and alternative method inputs in Windows and MS Office. The language bar is displayed alongside the System Tray if more than one keyboard layout is enabled (for switching input languages) or, for example, if speech is selected as an alternative input for MS Office or Notepad. Required to support advanced text services (such as right to left text) for East Asian users. Can be disabled via Start → Control Panel → Regional and Language Options → Languages → Text Services and Input Languages → Details → Advanced → System Configuration → Turn off advanced text services (which also turns off the language bar). See also External: here and External: here. Can also cause problems with some other programs if left enabled - see External: here for such an example
(0) | (0) | (7)
ctfmon.exe
File Name: ctfmon.exe eminem.exe
Description:
Added by the External: BHARAT.A WORM!
(0) | (0) | (7)
CTFMON.EXE
File Name: svchost.exe
Description:
Added by the External: JUEGO-B WORM! Note - this is not the legitimate External: svchost.exe process which is always located in %System% and should not normally figure in Msconfig/Startup! This one is located in %Windir%
(0) | (0) | (7)
ctfmon.exe
File Name: CTFM0N.EXE
Description:
Added by the External: AUTORUN-AYX WORM! Notice the digit "0" in the filename rather than the upper case "o"
(0) | (0) | (7)
ctfmon.exe
File Name: ctfmon.exe
Description:
External: TotalSpy keystroke logger/monitoring program - remove unless you installed it yourself! Note - this is not the legitimate ctfmon.exe process associated with alternate text inputs which is always located in %System%. This one is located in %ProgramFiles%\TS Trial
(0) | (0) | (0)
CTFMON.EXE
File Name: ctfmon.exe
Description:
Added by the External: VBSP-A WORM! Note - this is not the legitimate ctfmon.exe process associated with alternate language and method inputs which is always located in %System%. This one is located in a "1126" sub-folder
(0) | (0) | (0)
CTFMON32
File Name: CTFMON32.EXE
Description:
CoolWebSearch External: Ctfmon32 parasite variant - also detected as the External: CWS-E TROJAN!
(0) | (0) | (0)
ctfmon32
File Name: [random filename].exe
Description:
Added by the External: RBOT-GSN WORM!
(0) | (0) | (0)
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 | 96 | 97 | 98 | 99 | 100 | 101 | 102 | 103 | 104 | 105 | 106 | 107 | 108 | 109 | 110 | 111 | 112 | 113 | 114 | 115 | 116 | 117 | 118 | 119 | 120 | 121 | 122 | 123 | 124 | 125 | 126 | 127 | 128 | 129 | 130