Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Ctfmon.exe Possibly Corrupted

  • Please log in to reply
1 reply to this topic

#1 draconisastra


  • Members
  • 2 posts
  • Location:Georgia
  • Local time:02:35 AM

Posted 09 May 2008 - 03:11 AM


Totally clueless here. AVG identified Trojan, Uniblue SpyErase was supposed to get rid of it.
Have been having lockup problems, screen freezes, computer response slow. I did another virus scan in safe mode with ctgmon.exe off, and nothing showed. Professional fix-it 8 utilities, identifies the ctfmon file as ctfmon.exe RAIDYS Trojan...so it seems my ctfmon.exe file is still corrupted, with the title still there can it still activate??.
I followed instructions for the SmitFraudFix v2, and did the search. The following popped up:
with this added !!!Attention, following keys are not inevitably infected!!!

SmitFraudFix v2.320

Scan done at 3:04:05.12, Fri 05/09/2008
Run from C:\Documents and Settings\Morgan\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in normal mode


C:\Program Files\Common Files\Creative Labs Shared\Service\CreativeLicensing.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\Iaantmon.exe
C:\Program Files\Dell Support Center\bin\sprtsvc.exe
C:\Program Files\Intel\IntelDH\Intel® Quick Resume Technology Drivers\Elservice.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\Iaanotif.exe
C:\Program Files\Dell\Media Experience\DMXLauncher.exe
C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe
C:\Program Files\Creative\SBAudigy\Surround Mixer\CTSysVol.exe
C:\Program Files\Microsoft IntelliPoint\ipoint.exe
C:\Program Files\Creative\MediaSource5\CTDetctu.exe
C:\Program Files\Dell Support Center\bin\sprtcmd.exe
C:\Program Files\Uniblue\SpyEraser\SpyEraser.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\Program Files\Dell Support Center\gs_agent\dsc.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE

C:\Documents and Settings\Morgan
C:\Documents and Settings\Morgan\Application Data
Start Menu

C:\DOCUME~1\ALLUSE~1\STARTM~1\Online Security Guide.url FOUND !
C:\DOCUME~1\ALLUSE~1\STARTM~1\Security Troubleshooting.url FOUND !


C:\DOCUME~1\Morgan\FAVORI~1\Online Security Test.url FOUND !

C:\Program Files

C:\Program Files\VirusProtectPro 3.3\ FOUND !

Corrupted keys
Desktop Components

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
"FriendlyName"="My Current Home Page"

!!!Attention, following keys are not inevitably infected!!!

Credits: Malware Analysis & Diagnostic
Code: S!Ri

!!!Attention, following keys are not inevitably infected!!!

Credits: Malware Analysis & Diagnostic
Code: S!Ri

!!!Attention, following keys are not inevitably infected!!!

Credits: Malware Analysis & Diagnostic
Code: S!Ri

!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]

!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]


Description: Speedstream Ethernet USB Adapter - Packet Scheduler Miniport
DNS Server Search Order:

HKLM\SYSTEM\CCS\Services\Tcpip\..\{E7B44002-0F1A-4190-BAAA-142F8906EC04}: DhcpNameServer=
HKLM\SYSTEM\CS1\Services\Tcpip\..\{E7B44002-0F1A-4190-BAAA-142F8906EC04}: DhcpNameServer=
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=

Scanning for wininet.dll infection

Pleaz excuse my ignorance...how do I fix this, how can I fix the Corrupted ctfmon.exe with the correct version, and shoud I be worried about !!!Attention, following keys are not inevitably infected!!!
Have been searching all night for a possible fix, I will appreciate any help you can offer. I checked forums and nothing seemed to match. If it did I either missed it or did not understand what I was reading (which happened a lot.)
If you need other info, please let me know and I will give it here


P.S. There are advertised products stating they can fix the ctfmon.exe file...can any be trusted??? UniBlue SpyErase was supposed too. If so why does the name still show?? :

Type: Not recommended
Filename: ctfmon.exe
Publisher: Microsoft Corporation
Version: Date: 08/16/05 File size: 15.1 KB

Description: Added by the RAIDYS TROJAN! Note - this should not be confused with the valid Office XP file, see here
Source: Paul Collins Startup list

BC AdBot (Login to Remove)


#2 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 51,744 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:35 AM

Posted 09 May 2008 - 07:39 AM

SmitFraud is a generic description for a family of rogue applications/trojans such as Win32.Zlob that uses misleading advertising, downloads rogue security products, changes (hijacks) the Windows Desktop and drops additional malware infected files. The Trojan uses bogus security warnings and fake alerts to indicate that your computer is infected with spyware or has critical errors. SmitFraud is responsible for downloading and installing programs that purport to scan for spyware and then uses false scan reports as a scare tactic to goad you into purchasing one of several rogue programs to fix it.

You did not follow all the instructions for using Smitfruadfix. The rapport.txt you posted indicates that you only ran option #1 while in normal mode. You still need to complete the next step. Please print out these "instructions".
  • Make sure you scroll down to Clean and perform the steps where you reboot in "Safe Mode" and run option #2.
  • When done, a text file named rapport.txt will appear onscreen with results from the cleaning process.
  • The file is automatically saved to the root of the system drive, usually at C:\rapport.txt.
  • Please copy/paste the contents of that report into your next reply.
Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2
  • Make sure you are connected to the Internet.
  • Double-click on Download_mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself.
  • Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Acan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users