Tro.Win32.ExitWin.z Trojan Information
High risk threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction. May open up communication ports, use polymorphic tactics, stealth installations, and/or anti-spy counter measures. May use a security flaw in the operating system to gain access to your computer.
||Tro.Win32.ExitWin.z is a program that will re-boot the infected machine after one hour.
If the attempt to re-boot the infected machine is unsuccessful, then the Trojan will log out the current user.
||process: rsysinit.exe: MD5 Hash: 1d7bbec3b2bc56a5235..
||Trojan - A Trojan software is any software on a user's computer that the user is not aware or intentionally installed. Most Trojan software is designed to perform some sort of actions that could jeopardize the user's security or privacy.
Top Trojan Visited Pages:
Anti Netbus - 3475 visits
Tro.Downloader.loadadv - 589 visits
Netbus Fucker - 294 visits
Server Sockets - Alias: Backdoor.Sockets, Sockets23 - 284 visits
SMF.166.Batch - 271 visits
Enable Regedit - 252 visits
Trojan.BankerSpy - 236 visits
Java.ClassLoader.Dummy.d - 234 visits
Lamping - 187 visits
Silver Surfer Trojan - 150 visits
Random Trojan Pages:
API PM Bomber 2
XMLid.Exploit - Alias: Exploit-CodeBase, Exploit.CodeBaseExec
Recycle Fucker - Alias: Recker, Trojan.Win32.Recker
Hat - Alias: BackDoor-CY, Backdoor.HackTack.2K.c