This is a valid program, but it is up to you whether or not you want it to run on startup.
Whether or not you need to run this program on startup must be decided by you. If you feel that you want this program starting automatically so that you have it available as needed, then do not disable it. The following information is a brief description of what is known about this file. If you require further assistance for this file, feel free to ask about in the forums.
Whether or not you need to run this program on startup must be decided by you. If you feel that you want this program starting automatically so that you have it available as needed, then do not disable it. The following information is a brief description of what is known about this file. If you require further assistance for this file, feel free to ask about in the forums.
Name: | ctfmon.exe | |||
Filename: | ctfmon.exe | |||
Command: | C:\WINDOWS\system32\ctfmon.exe | |||
Description: |
CTFMon is involved with the
language/alternative input services in Office XP. CTFMON.exe will
continue to put itself back into MSConfig when you run the Office XP
apps as long as the Text Services and Speech applets in the Control
Panel are enabled. Not required if you don't need these features. For
more info on ctfmon see here.
|
|||
File Location: | %System% | |||
Startup Type: | This startup entry is started automatically from a Run, RunOnce, RunServices, or RunServicesOnce entry in the registry. | |||
HijackThis Category: | O4 Entry | |||
Note: | %System% is a variable that refers to the Windows System folder. By default this is C:\Windows\System for Windows 95/98/ME, C:\Winnt\System32 for Windows NT/2000, or C:\Windows\System32 for Windows XP/Vista/7. |
Name: | alcmtr |
Filename: | ALCMTR.EXE |
Command: | ALCMTR.EXE |
Description: |
Realtek AC97 Audio - Event Monitor. "Sypware" file used surreptitiously monitor one
|
File Location: | %WinDir% |
Startup Type: | This startup entry is started automatically from a Run, RunOnce, RunServices, or RunServicesOnce entry in the registry. |
HijackThis Category: | O4 Entry |
Note: | %Windir% refers to the Windows installation folder. By default, this is C:\Windows for Windows 95/98/ME/XP/Vista/7 or C:\Winnt for Windows NT/2000. |
Removal Instructions: | How to remove a Trojan, Virus, Worm, or other Malware |
Name: | 1.exe |
Filename: | 1.exe |
Command: | %WinDir%\1.exe |
Description: |
Added by the Troj/Multidr-C Trojan! This Trojan downloads and installs further malware onto your computer.
|
File Location: | %WinDir% |
Startup Type: | This startup entry is started automatically from a Run, RunOnce, RunServices, or RunServicesOnce entry in the registry. |
HijackThis Category: | O4 Entry |
Note: | %Windir% refers to the Windows installation folder. By default, this is C:\Windows for Windows 95/98/ME/XP/Vista/7 or C:\Winnt for Windows NT/2000. |
Removal Instructions: | How to remove a Trojan, Virus, Worm, or other Malware |
Name: | AlcxMonitor |
Filename: | Alcxmntr.exe |
Command: | Alcxmntr.exe |
Description: |
Realtek AC97 Audio - Event Monitor. Sypware
file used surreptitiously monitor one's actions. It is not a sinister
one, like remote control programs, but is being used by Realtek to
gather data about customers
|
File Location: | %WinDir% |
Startup Type: | This startup entry is started automatically from a Run, RunOnce, RunServices, or RunServicesOnce entry in the registry. |
HijackThis Category: | O4 Entry |
Note: | %Windir% refers to the Windows installation folder. By default, this is C:\Windows for Windows 95/98/ME/XP/Vista/7 or C:\Winnt for Windows NT/2000. |
Removal Instructions: | How to remove a Trojan, Virus, Worm, or other Malware |
Name: | MsvcService |
Filename: | msvcs.exe |
Command: | msvcs.exe |
Description: |
Added by the W32/Rbot-RK worm. This infection connects to an IRC server where it waits for remote commands.
|
File Location: | %System% |
Startup Type: | This startup entry is started automatically from a Run, RunOnce, RunServices, or RunServicesOnce entry in the registry. |
HijackThis Category: | O4 Entry |
Note: | %System% is a variable that refers to the Windows System folder. By default this is C:\Windows\System for Windows 95/98/ME, C:\Winnt\System32 for Windows NT/2000, or C:\Windows\System32 for Windows XP/Vista/7. |
Removal Instructions: | How to remove a Trojan, Virus, Worm, or other Malware |
Name: | Java Sun Scheduler |
Filename: | jusched.exe |
Command: | C:\Windows\jusched.exe |
Description: |
Added by the W32/Sdbot-CQC worm and IRC backdoor.
W32/Sdbot-CQC spreads to other network computers by exploiting common buffer overflow vulnerabilities, including: SRVSVC (MS06-040), WKS (MS03-049) (CAN-2003-0812), PNP (MS05-039) and ASN.1 (MS04-007). The worm may also spread via network shares and MSSQL servers protected by weak passwords. |
File Location: | %WinDir% |
Startup Type: | This startup entry is installed as a Windows service. |
Service Name: | JUSCHED |
Service Display Name: | Java Sun Scheduler |
HijackThis Category: | O23 Entry |
Note: | %Windir% refers to the Windows installation folder. By default, this is C:\Windows for Windows 95/98/ME/XP/Vista/7 or C:\Winnt for Windows NT/2000. |
Removal Instructions: | How to remove a Trojan, Virus, Worm, or other Malware |
0 comments:
Post a Comment