Click on screenshot to zoom
Danger level 8
Type: Trojans
Common infection symptoms:
  • Connects to the internet without permission
  • Shows commercial adverts
  • Strange toolbar installed without Your permission
  • Slow internet connection
  • System crashes
  • Annoying Pop-up's
  • Slow Computer

Trojan.Pakes

Trojan.Pakes, also commonly referred to as Trojan.Win32.Pakes.bqb is a well-known and despised seditious Trojan. One of its main goals is to act as a gateway for other equally harmful and destructive threats to enter the PC more easily. It will grant remote access to faceless hackers, which will ultimately assume control of the compromised PC. This Trojan gains entry to the system by bundling itself with other security downloads and updates obtained from third party websites. Most recently it has also been reported that browser hijacking websites using seditious drive-by download tactics as part of their online marketing campaigns surreptitiously root this malicious Trojan into unsuspecting users’ PCs. Some of the harmful software this infection has been found to download includes ISTBar, Internet Optimizer, Sidebar, and Target Saver. Although these threats require removal, this report focuses on helping you to delete Trojan.Pakes.

Trojan BHO.MJX, Trojan Crypt.WKG, Trojan Pakes.FLB, Trojan Pakes.FLC, and Trojan Pakes.FLD are few of the many names that Trojan.Pakes is known by. According to our researchers, the original infection was targeted at Windows XP systems which, as you know, are no longer supported by Microsoft, and are much more vulnerable. Although it is possible that new variants can affect operating systems running on Windows 7 as well, it is most likely that it will have to be removed from Windows XP systems. The main goal for this infection is to install rogue security software and convince you that your operating system is infected with malware. If you are tricked into believing this, the Trojan will attempt to convince you to pay money for the malware removal services. According to our analysis, this malware performs various actions silently, and this is why some users do not realize being scammed.

Once installed, Trojan.Pakes makes changes in the Windows Registry. It is capable of changing certain values and value data under HKCU\Control Panel\Desktop. This Trojan modifies the value data associated with your wallpaper and background to introduce you to an intimidating desktop image that is meant to trick you into believing that your operating system is infected. This image states: “Warning! Spyware detected on your computer! Install an antivirus or spyware remover to clean your computer.” Of course, this warning is fictitious, and you should realize this right away, considering that Windows or authentic AVs would never send you a warning in this manner. We have also found that this Trojan is launched from HKLM\Software\Microsoft\Windows\CurrentVersion\Run, where the ctfmona value is created. Ctfmona.exe is the installer of this threat, and ctfmonb.bmp and blackster.scr are the files that represent the wallpaper with the fake security warning.

The clandestine Trojan.Pakes has also been found to connect to remote servers silently. This silent connection can be used to transmit information about your operating system and possibly download necessary elements. Needless to say, it also creates a security backdoor to let in malicious rogues. If fake AV tools slither in, they might perform fake system cans to list bogus infections and further intimidate you. The worst thing you can do – besides letting in this malware – is to pay money for the services they promote. Rogue anti-malware software is not created to help you delete infections or protect your operating system from them. They are created to trick you into giving up your money! If you have been tricked into making a transaction, your credit card information might have been collected as well, and that is bad news. Report the fraud to the authorities and remove the infection as soon as possible.

We provide a manual removal guide that you can use to eliminate Trojan.Pakes. This guide shows how to get rid of malicious files and delete/modify registry data. If you are not sure you can perform every single step without making a mistake, do NOT proceed manually. Instead, employ an automated malware remover to securely eliminate all existing threats. This method is irreplaceable if other threats are active. Although this malicious Trojan is meant to download a rogue, it could have entered your operating system bundled with other threats, or it could have been downloaded by another clandestine Trojan. A legitimate, updated anti-malware tool will eliminate all existing threats within a few minutes; however, if you choose the manual option, you need to be ready to spend some time in front of your computer.

Trojan.Pakes Removal

  1. Launch Explorer by tapping Win+E keys.
  2. Type C:\WINDOWS\system32\ into the address bar and tap Enter.
  3. Right-click and Delete these files: ctfmona.exe, blackster.scr, ctfmonb.bmp.
  4. Launch RUN by tapping Win+R keys.
  5. In the panel on the left navigate to HKCU\Control Panel\Desktop.
  6. Right-click the value “Wallpaper” and click Modify.
  7. Erase “C:\WINDOWS\system32\ctfmonb.bmp”.
  8. Right-click the value “OriginalWallpaper” and click Modify.
  9. Erase “C:\WINDOWS\system32\ctfmonb.bmp”.
  10. Right-click the value “ConvertedWallpaper” and click Modify.
  11. Erase “C:\WINDOWS\system32\ctfmonb.bmp”.
  12. Navigate to HKLM\Software\Microsoft\Windows\CurrentVersion\Run.
  13. Right-click and Delete value “ctfmona” (value data C:\WINDOWS\system32\ctfmona.exe).
Download Spyware Removal Tool to Remove* Trojan.Pakes
  • Quick & tested solution for Trojan.Pakes removal.
  • 100% Free Scan for Windows
disclaimer

How to manually remove Trojan.Pakes

Files associated with Trojan.Pakes infection:

WinPrint.exe
svchost.exe
senekamsfvgddc.sys
~tmpd.exe
M8YKyToD.exe
~tmp6.exe
f.exe
notaped.exe
CbEvnSvc.exe
ccnd[1].exe
1102917817.exe
outpuk25[1].exe
1225739779.exe
mcenspc.dll
11[1].exe
rdl2.tmp.exe
rdl1.tmp.exe
ftp[1].exe
imod3.dll
vvunbwrhxa.exe
AntivirusXP.exe
winlogin.exe
oqarib.dll
cvucujahoza.dll
uxeqipuzimocin.dll
1462403437.exe
9179499.exe
fwanqtvosgmeh.dll
duzfajdjnnyxethwo.dll
nucrdgutfobgtns.dll
slvfjr.dll
janizf.dll
kaakrfarngn.dll
i386si.sys
Hyves_Browser_Instalation.exe
Hyves_Browser.exe
loader[1].exe
Test.exe
ieupdates.exe
new26[1].exe
adv111[1].exe
gr[2].exe
new23[1].exe
Omahonafazeq.dll
usp10.dll
ntos.exe
1[1].exe
StartApp.exe
SSEngine.dll
AdwarePro_Setup[1].exe
AdwarePro.exe
ert51791.exe
card[1].exe
TckBX673.exe
winkfmc.exe
ParisHilton[1].exe
winafoe.exe
load[1].exe
iii[1].exe
vamsoft.exe
bd3q0qix.exe
bnmio.exe
~tmpa.exe
setupapi.dll
28823330.exe
ati8quxx.sys
install[1].exe
zaqlfc.dll
ntdrv32.exe
twex.exe
new16[1].exe
eecelfib.dll
new21[1].exe
liddlalh.dll
new5[1].exe
HBCHIBI.dll
ajgojmki.dll
kcfajmeg.dll
anymie360.exe
new20[1].exe
new11[1].exe
lbenehfc.dll
new8[1].exe
new3[1].exe
new6[1].exe
new19[1].exe
ofdokkmi.dll
new1[1].exe
csrss.dll
new10[1].exe
new18[1].exe
anymie360.dll
new22[1].exe
new25[1].exe
new2[1].exe
new14[1].exe
fkldidbm.dll
eonbogdn.dll
new7[1].exe
apghpimo.dll
new17[1].exe
new9[1].exe
new24[1].exe
new13[1].exe
hafknipi.dll
nkkbpieg.dll
sh05022.dll
mpnfpomk.dll
new15[1].exe
new12[1].exe
0001.exe
comre.dll
d.exe
c.exe

Trojan.Pakes DLL's to remove:

mcenspc.dll
imod3.dll
oqarib.dll
cvucujahoza.dll
uxeqipuzimocin.dll
fwanqtvosgmeh.dll
duzfajdjnnyxethwo.dll
nucrdgutfobgtns.dll
slvfjr.dll
janizf.dll
kaakrfarngn.dll
Omahonafazeq.dll
usp10.dll
SSEngine.dll
setupapi.dll
zaqlfc.dll
eecelfib.dll
liddlalh.dll
HBCHIBI.dll
ajgojmki.dll
kcfajmeg.dll
lbenehfc.dll
ofdokkmi.dll
csrss.dll
anymie360.dll
fkldidbm.dll
eonbogdn.dll
apghpimo.dll
hafknipi.dll
nkkbpieg.dll
sh05022.dll
mpnfpomk.dll
comre.dll

Trojan.Pakes processes to kill:

WinPrint.exe
svchost.exe
~tmpd.exe
M8YKyToD.exe
~tmp6.exe
f.exe
notaped.exe
CbEvnSvc.exe
ccnd[1].exe
1102917817.exe
outpuk25[1].exe
1225739779.exe
11[1].exe
rdl2.tmp.exe
rdl1.tmp.exe
ftp[1].exe
vvunbwrhxa.exe
AntivirusXP.exe
winlogin.exe
1462403437.exe
9179499.exe
Hyves_Browser_Instalation.exe
Hyves_Browser.exe
loader[1].exe
Test.exe
ieupdates.exe
new26[1].exe
adv111[1].exe
gr[2].exe
new23[1].exe
ntos.exe
1[1].exe
StartApp.exe
AdwarePro_Setup[1].exe
AdwarePro.exe
ert51791.exe
card[1].exe
TckBX673.exe
winkfmc.exe
ParisHilton[1].exe
winafoe.exe
load[1].exe
iii[1].exe
vamsoft.exe
bd3q0qix.exe
bnmio.exe
~tmpa.exe
28823330.exe
install[1].exe
ntdrv32.exe
twex.exe
new16[1].exe
new21[1].exe
new5[1].exe
anymie360.exe
new20[1].exe
new11[1].exe
new8[1].exe
new3[1].exe
new6[1].exe
new19[1].exe
new1[1].exe
new10[1].exe
new18[1].exe
new22[1].exe
new25[1].exe
new2[1].exe
new14[1].exe
new7[1].exe
new17[1].exe
new9[1].exe
new24[1].exe
new13[1].exe
new15[1].exe
new12[1].exe
0001.exe
d.exe
c.exe

Remove Trojan.Pakes registry entries:

Adware Pro
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Explorer Bars\{5F97CFC7-609B-0740-CE35-0442284C213C}
HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ ColdWare
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\seneka
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Timple Mail Transfer Protocol
Microsoft\Windows\CurrentVersion\App Paths\AdwarePro.exe
Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{09EB15FA-17D8-4D60-8598-3F549A848DF2}
Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1431fda9-cc48-4eb6-8105-4bfac469daf3}
Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{17a4a069-0fd2-4171-bbb0-1645bd6d1822}
Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2b4873f5-ac2b-4ea1-a7f8-5e0e76ac6a66}
Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{39b5f242-0fd4-0d28-3b4b-1a8db926b970}
Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4273b739-5c53-4180-bdc1-7058285408e1}
Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{47665FA5-FCF5-4444-B552-DF6549ECCA27}
Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5857ea6b-8026-4480-9a54-8f31eef8558a}
Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{638bdd5c-1962-4eaf-91d8-3daaf0ede4ab}
Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6A6779ED-A95C-4946-8B3F-39F33E2D2140}
Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{735CA461-6C66-4BCA-8290-B0B27B8E9312}
Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8eb480e8-dcb5-4db5-92b5-4480e91f4d8c}
Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{bbe160c6-8bd8-4ac6-2473-08baeca009ec}
Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{CDAA8EDA-5EBE-B4C8-8205-5C732F6F815E}
Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{f9905805-0ccc-4ded-8691-6c2a9991633d}
Microsoft\Windows\CurrentVersion\Run\AdwareProMFCT
MICROSOFT\WINDOWS\CURRENTVERSION\RUN\AntivirusXP.exe
Microsoft\Windows\CurrentVersion\Run\kxva
Microsoft\Windows\CurrentVersion\Run\Mmexofumutokara
Microsoft\Windows\CurrentVersion\Uninstall\AdwarePro
Microsoft\Windows\CurrentVersion\Uninstall\Hyves Browser
RUNNING PROGRAM\M8YKyToD.exe
RUNNING PROGRAM\~tmp6.exe
RUNNING PROGRAM\~tmpd.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{1AF47292-E866-4E01-AF5C-C542C084925E}
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{47665FA5-FCF5-4444-B552-DF6549ECCA27}
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{4CFA36E0-94A0-41C2-A656-6A10DF213015}
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{52DD5A51-643A-419F-A202-C037912A7C5C}
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{5BE7E1FC-1503-4FA4-AD6A-A71BE13C9FA0}
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{697F9864-6D8E-4FD4-8686-7162C6FF67AA}
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{744B92E0-B771-478B-80DC-CD9E77E5A8D8}
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{8FD84462-BE2A-4E47-8CA0-E7AA55C62527}
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{A3083642-8392-48D2-BAB7-35075F86C3DD}
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{A9019268-F38D-43F4-9E85-7443037BEDC6}
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{E87B80D7-842E-40A7-86B4-76A0E5D76674}
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{EECE5F2B-BD93-4477-8027-D3BE0EE7EB1A}
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{F45D2DB6-1DC5-4C32-87F4-C47FBF0D8BA2}
SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run\Alcmtr
SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run\ctfn
SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\1AF47292
SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\4CFA36E0
SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\52DD5A51
SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\5BE7E1FC
SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\697F9864
SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\744B92E0
SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\8FD84462
SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\A3083642
SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\A9019268
SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\E87B80D7
SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\EECE5F2B
SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\F45D2DB6
{1AF47292-E866-4E01-AF5C-C542C084925E}
{47665FA5-FCF5-4444-B552-DF6549ECCA27}
{4CFA36E0-94A0-41C2-A656-6A10DF213015}
{52DD5A51-643A-419F-A202-C037912A7C5C}
{5BE7E1FC-1503-4FA4-AD6A-A71BE13C9FA0}
{697F9864-6D8E-4FD4-8686-7162C6FF67AA}
{744B92E0-B771-478B-80DC-CD9E77E5A8D8}
{8FD84462-BE2A-4E47-8CA0-E7AA55C62527}
{A3083642-8392-48D2-BAB7-35075F86C3DD}
{A9019268-F38D-43F4-9E85-7443037BEDC6}
{E87B80D7-842E-40A7-86B4-76A0E5D76674}
{EECE5F2B-BD93-4477-8027-D3BE0EE7EB1A}
{F45D2DB6-1DC5-4C32-87F4-C47FBF0D8BA2}
Disclaimer

Post comment — WE NEED YOUR OPINION!

Comment:
Name:
Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.