Greetings --
That particular file certainly doesn't seem to be a normal Windows
or Office file. As already suggested, try right-clicking on the file
and see if its properties shed any light upon its origins. In the
meantime, until you know exactly what the file does, why it needs
Internet access, and are confident that you trust the process'
manufacturer/vendor, I'd strongly recommend that you deny it access to
the Internet.
It might also be a good idea to scan your system for viruses,
Trojans, and worms, as well as checking for spyware.
To deal with issues caused by any sort of "adware" and/or
"spyware,"such as Gator, Comet Cursors, Xupiter, Bonzai Buddy, or
KaZaA, and their remnants, that you've deliberately (but without
understanding the consequences) installed, two products that are
quite effective (at finding and removing this type of scumware) are
Ad-Aware from
www.lavasoft.de and SpyBot Search & Destroy from
www.safer-networking.org/. Both have free versions. It's even
possible to use SpyBot Search & Destroy to "immunize" your system
against most future intrusions. I use both and generally perform
manual scans every week or so to clean out cookies, etc.
Additionally, manual removal instructions for the most common
varieties of scumware are available here:
PC Hell Spyware and Adware Removal Help
http://www.pchell.com/support/spyware.shtml
Additionally, Look in the C:\Documents and Settings\All
Users\Start Menu\Programs\Start Up and C:\Documents and
Settings\username\Start Menu\Programs\Start Up folders, and in the
system registry, primarily in the
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run and
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run keys.
How to Troubleshoot By Using the Msconfig Utility in Windows XP
http://support.microsoft.com/default.aspx?scid=kb;EN-US;310560
Bruce Chambers
--
Help us help you:
You can have peace. Or you can have freedom. Don't ever count on
having both at once. -- RAH