Solved

ctf loader

Posted on 2006-07-01
6
1,019 Views
Last Modified: 2011-10-03
My ctf loader executable seems to act as spy ware for my web browser. I noticed when I use the hijack this program and remove the cftmon.exe the browser experiences no hesistation. In researching this issue, it seems that the executable is a language application as part of the office suite. Why is it behaving like spyware and how do I permanentely remove it? Also I noticed the driverT file as well and that seems to help. Both reappear again and again in the hijack log. And once I remove them, I'm able to have seemless web surfing.
Thank you,
Brad
0
Comment
Question by:bstagy
  • 2
6 Comments
 
LVL 97

Expert Comment

by:war1
ID: 17024465
Greetings, bstagy !

Cftmon.exe is part of the Microsoft Office suite and handles speech input for this product.  It can also be added by the Troj/Delbot-B TROJAN/IRC backdoor!

To remove this file, you may need Killbox or Unlocker
Use Killbox or Unlocker in Safe Mode to remove hard to remove file.

Killbox to remove stuborn files
http://www.scancomplete.com/download/killbox/
OR
Unlocker
http://www.majorgeeks.com/download4660.html

Best wishes!
0
 
LVL 19

Accepted Solution

by:
simpswr earned 125 total points
ID: 17024575
Go into msconfig startup and uncheck Ctfmon  . . that will keep it from starting and should allow HJT to kill it for good . . Turn off system restore first, so that it does not come back
0
 
LVL 97

Expert Comment

by:war1
ID: 17043561
bstagy,

We have not heard from you. Did any comment help you solve your problem? Do you have any more question? If an Expert helped you, please accept his/her answer above with an excellent or good grade.

Thanks, war1
0
 

Author Comment

by:bstagy
ID: 17043653
Thanks guys for your help. I tried simpswr's suggestion because it was easiest to do. It worked.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Disclosure: Use this tutorial only when no other options helps to get Windows XP running without any problems and you don't want to format the drive. The back up of the data is the responsible of the user, however there is a description of how t…
Step by step guide to Clean and Sort your windows registry! Introduction: Always remember: A Clean registry = Better performance = Save your invaluable time In this article we're going to clear our registry manually! Yes, manually! The e…
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…
Migrating to Microsoft Office 365 is becoming increasingly popular for organizations both large and small. If you have made the leap to Microsoft’s cloud platform, you know that you will need to create a corporate email signature for your Office 365…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now