Solved

flpycntl.exe error on XP; virus or trojan horse???

Posted on 2004-03-31
9
783 Views
Last Modified: 2013-12-04

Hi Guys,

each time I boot my windows XP (SP1) I get the below error report:

"An error has occurred in flpycntl.exe and the program must be shut down..."

I had a look on the web and did find a couple of references indicating it might be related to a virus or some spyware. Unfortunately these sites are not in English. I did run spybot but nothing was found.

Any ideas??

Cheers,
2810
0
Comment
Question by:2810
  • 7
  • 2
9 Comments
 
LVL 57

Expert Comment

by:Pete Long
Comment Utility
Using the Windows System Configuration Utility (startup)


Windows 98, ME, and XP have MSCONFIG

*****************
Windows 2000 doesn’t have msconfig but you can use it, if you...
Download the two files here
http://www2.whidbey.com/djdenham/Msconfig.htm
OR
http://www.perfectdrivers.com/howto/msconfig.html
************

If annoying programs are popping up every time you boot into windows XP or log in, you can disable them with the System Configuration Utility.

Press START > RUN > type MSCONFIG to launch

When the application starts you will need to click the startup tab.

This lists all the applications that will start when you boot up or log in, you can simply untick the ones you don’t want to start and reboot (if a problem occurs you can simply re-tick it)

Most programs launch from the following registry Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Once you are sure you no longer need the application you can launch REGEDIT and go and delete a programs value from this key (DON’T DELETE THE ENTIRE KEY!!!)

Any software that is listed as "Common Startup" is being launched from the startup folder (click START >PROGRAMS >STARTUP to view them.  You can delete the Icons from here  <by right clicking it and selecting delete> to stop it launching.) This only deletes the shortcut; it does not uninstall the application.

*****Links*****

XP http://support.microsoft.com/default.aspx?scid=kb;en-us;310560
98 http://support.microsoft.com/default.aspx?scid=kb;en-us;281965
ME http://support.microsoft.com/default.aspx?scid=kb;en-us;281995


System32 Folder Opens When Logging on to Windows
http://support.microsoft.com/default.aspx?scid=KB;EN-US;Q170086

*****Start up Software*****

Autorun Software Downloads
http://www.bykeyword.com/pages/autorun.html

Startup Control Panel
http://www.mlin.net/StartupCPL.shtml
0
 
LVL 57

Expert Comment

by:Pete Long
Comment Utility
open your win.ini file and remove this line

run=c:\windows\system32\flpycntl.exe
0
 
LVL 57

Expert Comment

by:Pete Long
Comment Utility
you will also see its launched from the registry key (above)
0
 
LVL 57

Expert Comment

by:Pete Long
Comment Utility
Then reboot and if it exists delete this file c:\windows\system32\flpycntl.exe
0
Superior storage. Superior surveillance.

WD Purple drives are built for 24/7, always-on, high-definition security systems. With support for up to 8 hard drives and 32 cameras, WD Purple drives are optimized for surveillance.

 
LVL 57

Expert Comment

by:Pete Long
Comment Utility
when youve done all that update your AV and scan for virus then get some spyware software and scan again

Spyware & Adware

What is Spyware?

Spyware is ANY SOFTWARE which uses a user's Internet connection in the without the user knowledge. Although Software Firms and Web pages that launch this "code" on your PC are required to ask your permission many don’t! ANY SOFTWARE communicating across the Internet from Your PC without your knowledge is guilty of information theft and is rightfully termed: Spyware.

What is Adware?

Adware is basically any application in which advertising banners are displayed while the program is running. This is built in to the coding of the Software that delivers the Adds to your desktop, these adds are either displayed as pop up windows or through a Banner on the software front end. Many people believe that the revenue earned from this is justification for recouping development costs, which then doesn’t need to be passed to the user.

Adware, Spyware and other unwanted "malware" - and how to remove them
http://www.cexx.org/adware.htm

*****Removal Tools (Freeware) *****

Ad Aware http://www.lavasoftusa.com/software/adaware/
Spy Bot http://security.kolla.de/news.php?lang=en
Trojan Remover :http://www.simplysup.com/
HijackThis http://www.spychecker.com/program/hijackthis.html
Spyware Blaster http://www.javacoolsoftware.com/spywareblaster.html
X Cleaner Free http://www.xblock.com/download-freeware.shtml
 
*****Removal Tools (Shareware & Trialware)*****

Goodbye Spy http://www.topshareware.com/GoodBye-Spy-download-2012.htm
Spy Cop http://spycop.com/products.htm

**********Prevent Browser Hijacking**********
BHODemon (Freeware)
Think of BHODemon as a guardian for your Internet browser: it protects you from unknown Browser Helper Objects (BHOs), by letting you enable/disable them individually. This program is my choice for BHO detection and is highly recommended.
http://www.spywareinfo.com/downloads/bhod/
or
Browser Hijack Blaster http://www.wilderssecurity.net/bhblaster.html
0
 

Author Comment

by:2810
Comment Utility

Hi PeteLong,

Thanks for that. I see now how I can prevent the executable from being run, but how can I be sure this app is not needed for windows to run properly?? Can you please confirm that we do not actually need to add this file to the system32 directory. Do you have the file on your system?

Cheers,
2810
0
 
LVL 57

Accepted Solution

by:
Pete Long earned 150 total points
Comment Utility
it aint! the only file that comes close in your system32 directory is flpydisk.sys (DONT delete that one)

Pete
0
 

Author Comment

by:2810
Comment Utility

Thanks for the very prompt response Pete!
2810
0
 
LVL 57

Expert Comment

by:Pete Long
Comment Utility
:) ThanQ
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now