Click on screenshot to zoom
Danger level 9
Type: Trojans
Common infection symptoms:
  • Installs itself without permissions
  • Connects to the internet without permission
  • Slow internet connection
  • Slow Computer
Other mutations known as:
Trojan.Renos.G

Trojan.Renos

Trojan.Renos is the latest malware you should look out for. Being a form of a Trojan infection, Trojan.Renos will enter into a computer system covertly, to perform the function it was designed to do: to download and install additional and various malware, badware, adware, etc, so as to ensure that the Trojan, as well as the hacker in control of this whole operation, are equip with the full control of the infiltrated machine

Trojan.Renos, also referred to as Trojan.Renos.G and Trojan.Renos.M, allows for a hacker from a remote location to change the infiltrated systems’ settings, delete important files, steal passwords and watch the user’s computer activity.

Infiltration methods used frequently by Trojan.Renos are as follows:
• Email: via email attachments, Trojan.Renos will enter into a system, disguised as a small file, for example: a jpeg or might be downloaded via a website or FTP.
• Websites: Many Trojan infections will exploit browser security vulnerabilities
• Open-Ports: Programs which allow for file-sharing functions, e.g. AIM, MSN messenger, are at risk of being used to install these nefarious infections, as it may ensure the hacker has remote control over the computer in question.

Trojan.Renos is designed to open up large security exploits through which hundreds of malicious adware and spyware will be able to infiltrate a system. In addition, Trojan.Renos opens a backdoor that allows the remote attacker to get full control over the infected computer.

This in turn leads to the hacker having full access to the user’s financial or banking information stored on the computer. Obviously this puts the user’s personal information in severe jeopardy and represents a serious security risk.

Trojan.Renos is particularly damaging to a computer system, once it has fully embedded itself within the PC’s system, therefore it is given a high priority security risk status by many computer analysts.

So, how would you know whether your system has been infiltrated by this dubious infection, or not?

Well, there are a few symptoms one can look out for:
1. Slow computer performance:
It only takes one PC parasite to slow down a PC’s performance drastically. Check for infections if your system takes longer than usual to reboot, or if your internet connection is slower than usual.

2. New desktop shortcuts or different homepage:
This type of infection is highly capable of adding desktop short-cuts to the infected system, as well as redirecting the users’ browser to display a different homepage.

The best way to deal with the threat of Trojan.Renos is to simply remove it from the affected PC system.

Although manual removal may be the best way to delete this parasite, and all its affiliates, the manual removal process is rather complicated and cumbersome, and should not be attempted by a computer novice, as one needs to be able to navigate their way around the registry files of the infected system, therefore, I would recommend that in order to avoid any unneeded risks of damage to your computer system, it is highly recommended to make use of a reliable and legitimate anti-spyware application, so as to remove Trojan.Renos and all its components from the infected computer system.

Download Spyware Removal Tool to Remove* Trojan.Renos
  • Quick & tested solution for Trojan.Renos removal.
  • 100% Free Scan for Windows
disclaimer

How to manually remove Trojan.Renos

Files associated with Trojan.Renos infection:

phtrc345015.exe
sprof.exe
navf.dll
iebtm.exe
wcs.exe
lsass.exe
vvihh.dll
pphcc4dj0epbv.exe
pphcj7cj0ea59.exe
pphcpgsj0ega1.exe

Trojan.Renos DLL's to remove:

navf.dll
vvihh.dll

Trojan.Renos processes to kill:

phtrc345015.exe
sprof.exe
iebtm.exe
wcs.exe
lsass.exe
pphcc4dj0epbv.exe
pphcj7cj0ea59.exe
pphcpgsj0ega1.exe

Remove Trojan.Renos registry entries:

HKEY_CURRENT_USERSOFTWAREMICROSOFTWINDOWSCURRENTVERSIONRUN Lsass Service
HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ Lsass Service
HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionExplorerSharedTaskScheduler{b36d60c8-e1ce-464e-b74c-8128a627ef56}
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser HelperObjects\{1AB6932F-92FE-42E6-870C-544AE458EA78}
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{b36d60c8-e1ce-464e-b74c-8128a627ef56}
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ realtecss
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ sprof
RUNNING PROGRAMiebtm.exe
RUNNING PROGRAMpphcc4dj0epbv.exe
RUNNING PROGRAMpphcj7cj0ea59.exe
RUNNING PROGRAMpphcpgsj0ega1.exe
RUNNING PROGRAMwcs.exe
RUNNING PROGRAM\iebtm.exe
RUNNING PROGRAM\pphcc4dj0epbv.exe
RUNNING PROGRAM\pphcj7cj0ea59.exe
RUNNING PROGRAM\pphcpgsj0ega1.exe
RUNNING PROGRAM\wcs.exe
Disclaimer

Comments

  1. traci Mar 16, 2010

    Thank-you!

  2. Incubus Jun 16, 2010

    Beware this site: is a "home" of the Reno Trojan!the hacker change dayly the virus version. All files are the sane virus!

Post comment — WE NEED YOUR OPINION!

Comment:
Name:
Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.