Solved

flpycntl.exe error on XP; virus or trojan horse???

Posted on 2004-03-31
9
786 Views
Last Modified: 2013-12-04

Hi Guys,

each time I boot my windows XP (SP1) I get the below error report:

"An error has occurred in flpycntl.exe and the program must be shut down..."

I had a look on the web and did find a couple of references indicating it might be related to a virus or some spyware. Unfortunately these sites are not in English. I did run spybot but nothing was found.

Any ideas??

Cheers,
2810
0
Comment
Question by:2810
  • 7
  • 2
9 Comments
 
LVL 57

Expert Comment

by:Pete Long
ID: 10726823
Using the Windows System Configuration Utility (startup)


Windows 98, ME, and XP have MSCONFIG

*****************
Windows 2000 doesn’t have msconfig but you can use it, if you...
Download the two files here
http://www2.whidbey.com/djdenham/Msconfig.htm
OR
http://www.perfectdrivers.com/howto/msconfig.html
************

If annoying programs are popping up every time you boot into windows XP or log in, you can disable them with the System Configuration Utility.

Press START > RUN > type MSCONFIG to launch

When the application starts you will need to click the startup tab.

This lists all the applications that will start when you boot up or log in, you can simply untick the ones you don’t want to start and reboot (if a problem occurs you can simply re-tick it)

Most programs launch from the following registry Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Once you are sure you no longer need the application you can launch REGEDIT and go and delete a programs value from this key (DON’T DELETE THE ENTIRE KEY!!!)

Any software that is listed as "Common Startup" is being launched from the startup folder (click START >PROGRAMS >STARTUP to view them.  You can delete the Icons from here  <by right clicking it and selecting delete> to stop it launching.) This only deletes the shortcut; it does not uninstall the application.

*****Links*****

XP http://support.microsoft.com/default.aspx?scid=kb;en-us;310560
98 http://support.microsoft.com/default.aspx?scid=kb;en-us;281965
ME http://support.microsoft.com/default.aspx?scid=kb;en-us;281995


System32 Folder Opens When Logging on to Windows
http://support.microsoft.com/default.aspx?scid=KB;EN-US;Q170086

*****Start up Software*****

Autorun Software Downloads
http://www.bykeyword.com/pages/autorun.html

Startup Control Panel
http://www.mlin.net/StartupCPL.shtml
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 10726852
open your win.ini file and remove this line

run=c:\windows\system32\flpycntl.exe
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 10726866
you will also see its launched from the registry key (above)
0
U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

 
LVL 57

Expert Comment

by:Pete Long
ID: 10726870
Then reboot and if it exists delete this file c:\windows\system32\flpycntl.exe
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 10726880
when youve done all that update your AV and scan for virus then get some spyware software and scan again

Spyware & Adware

What is Spyware?

Spyware is ANY SOFTWARE which uses a user's Internet connection in the without the user knowledge. Although Software Firms and Web pages that launch this "code" on your PC are required to ask your permission many don’t! ANY SOFTWARE communicating across the Internet from Your PC without your knowledge is guilty of information theft and is rightfully termed: Spyware.

What is Adware?

Adware is basically any application in which advertising banners are displayed while the program is running. This is built in to the coding of the Software that delivers the Adds to your desktop, these adds are either displayed as pop up windows or through a Banner on the software front end. Many people believe that the revenue earned from this is justification for recouping development costs, which then doesn’t need to be passed to the user.

Adware, Spyware and other unwanted "malware" - and how to remove them
http://www.cexx.org/adware.htm

*****Removal Tools (Freeware) *****

Ad Aware http://www.lavasoftusa.com/software/adaware/
Spy Bot http://security.kolla.de/news.php?lang=en
Trojan Remover :http://www.simplysup.com/
HijackThis http://www.spychecker.com/program/hijackthis.html
Spyware Blaster http://www.javacoolsoftware.com/spywareblaster.html
X Cleaner Free http://www.xblock.com/download-freeware.shtml
 
*****Removal Tools (Shareware & Trialware)*****

Goodbye Spy http://www.topshareware.com/GoodBye-Spy-download-2012.htm
Spy Cop http://spycop.com/products.htm

**********Prevent Browser Hijacking**********
BHODemon (Freeware)
Think of BHODemon as a guardian for your Internet browser: it protects you from unknown Browser Helper Objects (BHOs), by letting you enable/disable them individually. This program is my choice for BHO detection and is highly recommended.
http://www.spywareinfo.com/downloads/bhod/
or
Browser Hijack Blaster http://www.wilderssecurity.net/bhblaster.html
0
 

Author Comment

by:2810
ID: 10726980

Hi PeteLong,

Thanks for that. I see now how I can prevent the executable from being run, but how can I be sure this app is not needed for windows to run properly?? Can you please confirm that we do not actually need to add this file to the system32 directory. Do you have the file on your system?

Cheers,
2810
0
 
LVL 57

Accepted Solution

by:
Pete Long earned 150 total points
ID: 10727002
it aint! the only file that comes close in your system32 directory is flpydisk.sys (DONT delete that one)

Pete
0
 

Author Comment

by:2810
ID: 10727146

Thanks for the very prompt response Pete!
2810
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 10727167
:) ThanQ
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
In a recent question (https://www.experts-exchange.com/questions/28997919/Pagination-in-Adobe-Acrobat.html) here at Experts Exchange, a member asked how to add page numbers to a PDF file using Adobe Acrobat XI Pro. This short video Micro Tutorial sh…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question