Click on screenshot to zoom
Danger level 7
Type: Trojans
Common infection symptoms:
  • Connects to the internet without permission
  • Slow Computer

Woe is you if you have been infected with the latest Backdoor Trojan infection to be spreading on the internet community, as we speak. is not to be trusted, not even for a second! This infection is a Backdoor Trojan infection, which allows for the unauthorized access and control of the infected system, by a remote controller.

In other words, is an example of a remote administration utility that was designed to open up exploits on an infected system, so as to allow for external control of the machine, via LAN or via the internet itself.

In order to safeguard a computer system against these type of backdoor infections, there are a few steps one can take to ensure the safety of a computer system:

1. Use a firewall to block all dubious connections from the internet.
2. Enforce a password policy. Ensure the passwords implemented are complex, so as to prevent and limit damage to a compromised system.
3. Ensure that programs and users are at its lowest level of privileges – this way access is limited to the administrator.
4. Disable AutoPlay – this way you prevent the automatic launching of executable files on networks and removal drives.
5. Turn off File Sharing if it is not needed.
6. Turn off and remove all unnecessary services.
7. Always keep patch-levels up-to-date
8. Configure your server to block and remove all email attachments that have the file extensions: .vbs, .bat, .exe, .pif, .scr – as these type files are usually affiliated with malicious applications.
9. So, how would one remove this dubious infection from a computer system?

IT experts are of the opinion that manual removal of Backdoor.Refpron is not the best solution, as the manual removal process is rather complicated and cumbersome, and should not be attempted by someone that is not familiar with the registry files of a computer system.

The difference between legitimate remote administrative utilities and Backdoor.Refpron is the fact that Backdoor.Refpron launches and installs backdoors into the system without the user’s knowledge or permission thereof, therefore the infected system is covertly infiltrated and remains covertly active regardless.

As a Backdoor infection, Backdoor.Refpron may be capable of performing the following functions:

• Add registry files
• Download unsolicited files
• Obtain file version information
• Listen on a specific port, to retrieve files and other data

In order to avoid any unneeded risks of damage to your computer system, it is highly recommended to make use of a reliable and legitimate anti-spyware application, to remove Backdoor.Refpron and all its components from the infected computer system.

Download Spyware Removal Tool to Remove*
  • Quick & tested solution for removal.
  • 100% Free Scan for Windows

How to manually remove

Files associated with infection:

ctnuffja.dll DLL's to remove:


Remove registry entries:


Post comment — WE NEED YOUR OPINION!

Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.