Danger level 6
Type: Backdoors
Common infection symptoms:
  • Connects to the internet without permission
  • Installs itself without permissions
  • Slow Computer
  • Slow internet connection


Backdoor.Bustem.A is a malicious computer threat categorized as a backdoor Trojan or simply a backdoor. It is type of a program that allows hackers to access your computer and control it for indefinite period of time, depending on the type of attack the hacker wants to perform. It might come to your computer bundled together with various shareware programs, so you need to be sure of the legitimacy of the programs that you are downloading, because you can never know what they might bring along. You can never know when Backdoor.Bustem.A gets into your computer.

Backdoors are different from rogue antispyware in a way that they do not have an interface, so unless you notice the changes in the system configuration, you will not know whether Backdoor.Bustem.A is there or not. Actually, when it infects you, it drops copies of files into the directions: C:\Documents and Settings\Administrator\Application data\bmscreen\bm2.exe and C:\Documents and Settings\Administrator\Local Settings\Temp\ixp000.tmp\bm2.exe. These files are not there just for nothing. When Backdoor.Bustem.A is installed in your computer, it also modifies registry entries in your system, making sure that the files it has installed run automatically every time you boot your computer.

You can determine the infection by the file called ctxmon.exe. This process file is associated with Backdoor.Bustem.A directly and it will be running in your Windows Task Manager if you have been infected with the pest. The reason why you shouldn’t allow this backdoor to stay in your computer any longer is that it can easily download and execute various malicious files, crippling your computer to the point it is no longer possible to operate it. What is more, your computer might become the source of infection as Backdoor.Bustem.A can spread itself to other machines using various methods of distribution. If that weren’t enough, the backdoor can also record your sensitive data using the method of keylogging and then send information such as your banking logins and passwords to a hacker over the network.

Thus you must remove Backdoor.Bustem.A from your system as soon as possible. If you have no idea how to do that manually, acquire a reliable security tool that will terminate Backdoor.Bustem.A for you automatically. But whatever you do, don’t just sit and wait before it is too late to do anything about it.

Download Spyware Removal Tool to Remove* Backdoor.Bustem.A
  • Quick & tested solution for Backdoor.Bustem.A removal.
  • 100% Free Scan for Windows

How to manually remove Backdoor.Bustem.A

Files associated with Backdoor.Bustem.A infection:


Backdoor.Bustem.A processes to kill:



  1. stedsim Sep 5, 2012

    remove ctxmon.exe from
    1. c:\windows\temp
    2. c:\users\{profile name}\appdata\local\temp

  2. stedsim Sep 5, 2012

    remove pwrwin.exe

  3. Pcthreat Sep 6, 2012

    Thanks for the comments stedsim

Post comment — WE NEED YOUR OPINION!

Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.