Tuesday, January 24, 2012

This is a valid program, but it is up to you whether or not you want it to run on startup.

   This is a valid program, but it is up to you whether or not you want it to run on startup.

Whether or not you need to run this program on startup must be decided by you. If you feel that you want this program starting automatically so that you have it available as needed, then do not disable it. The following information is a brief description of what is known about this file. If you require further assistance for this file, feel free to ask about in the forums.

Name: ctfmon.exe
Filename: ctfmon.exe
Command: C:\WINDOWS\system32\ctfmon.exe
Description:
CTFMon is involved with the language/alternative input services in Office XP. CTFMON.exe will continue to put itself back into MSConfig when you run the Office XP apps as long as the Text Services and Speech applets in the Control Panel are enabled. Not required if you don't need these features. For more info on ctfmon see here.
File Location: %System%
Startup Type: This startup entry is started automatically from a Run, RunOnce, RunServices, or RunServicesOnce entry in the registry.
HijackThis Category: O4 Entry
Note: %System% is a variable that refers to the Windows System folder. By default this is C:\Windows\System for Windows 95/98/ME, C:\Winnt\System32 for Windows NT/2000, or C:\Windows\System32 for Windows XP/Vista/7.


Name: alcmtr
Filename: ALCMTR.EXE
Command: ALCMTR.EXE
Description:
Realtek AC97 Audio - Event Monitor. "Sypware" file used surreptitiously monitor one
File Location: %WinDir%
Startup Type: This startup entry is started automatically from a Run, RunOnce, RunServices, or RunServicesOnce entry in the registry.
HijackThis Category: O4 Entry
Note: %Windir% refers to the Windows installation folder. By default, this is C:\Windows for Windows 95/98/ME/XP/Vista/7 or C:\Winnt for Windows NT/2000.
Removal Instructions: How to remove a Trojan, Virus, Worm, or other Malware

Name: 1.exe
Filename: 1.exe
Command: %WinDir%\1.exe
Description:
Added by the Troj/Multidr-C Trojan! This Trojan downloads and installs further malware onto your computer.
File Location: %WinDir%
Startup Type: This startup entry is started automatically from a Run, RunOnce, RunServices, or RunServicesOnce entry in the registry.
HijackThis Category: O4 Entry
Note: %Windir% refers to the Windows installation folder. By default, this is C:\Windows for Windows 95/98/ME/XP/Vista/7 or C:\Winnt for Windows NT/2000.
Removal Instructions: How to remove a Trojan, Virus, Worm, or other Malware

Name: AlcxMonitor
Filename: Alcxmntr.exe
Command: Alcxmntr.exe
Description:
Realtek AC97 Audio - Event Monitor. Sypware file used surreptitiously monitor one's actions. It is not a sinister one, like remote control programs, but is being used by Realtek to gather data about customers
File Location: %WinDir%
Startup Type: This startup entry is started automatically from a Run, RunOnce, RunServices, or RunServicesOnce entry in the registry.
HijackThis Category: O4 Entry
Note: %Windir% refers to the Windows installation folder. By default, this is C:\Windows for Windows 95/98/ME/XP/Vista/7 or C:\Winnt for Windows NT/2000.
Removal Instructions: How to remove a Trojan, Virus, Worm, or other Malware

Name: MsvcService
Filename: msvcs.exe
Command: msvcs.exe
Description:
Added by the W32/Rbot-RK worm. This infection connects to an IRC server where it waits for remote commands.
File Location: %System%
Startup Type: This startup entry is started automatically from a Run, RunOnce, RunServices, or RunServicesOnce entry in the registry.
HijackThis Category: O4 Entry
Note: %System% is a variable that refers to the Windows System folder. By default this is C:\Windows\System for Windows 95/98/ME, C:\Winnt\System32 for Windows NT/2000, or C:\Windows\System32 for Windows XP/Vista/7.
Removal Instructions: How to remove a Trojan, Virus, Worm, or other Malware


Name: Java Sun Scheduler
Filename: jusched.exe
Command: C:\Windows\jusched.exe
Description:
Added by the W32/Sdbot-CQC worm and IRC backdoor.

W32/Sdbot-CQC spreads to other network computers by exploiting common buffer
overflow vulnerabilities, including: SRVSVC (MS06-040), WKS (MS03-049)
(CAN-2003-0812), PNP (MS05-039) and ASN.1 (MS04-007). The worm may also spread
via network shares and MSSQL servers protected by weak passwords.
File Location: %WinDir%
Startup Type: This startup entry is installed as a Windows service.
Service Name: JUSCHED
Service Display Name: Java Sun Scheduler
HijackThis Category: O23 Entry
Note: %Windir% refers to the Windows installation folder. By default, this is C:\Windows for Windows 95/98/ME/XP/Vista/7 or C:\Winnt for Windows NT/2000.
Removal Instructions: How to remove a Trojan, Virus, Worm, or other Malware

0 comments:

Post a Comment