Exploit:Win32/CVE-2010-1885.A

Exploit:Win32/CVE-2010-1885.A Description

Exploit:Win32/CVE-2010-1885.A is a harmful computer Trojan that may change and disable computer functions. Exploit:Win32/CVE-2010-1885.A is created to bypass computer security applications. Exploit:Win32/CVE-2010-1885.A make a PC system virtually useless by degrading performance and keeping the computer from starting normally. Exploit:Win32/CVE-2010-1885.A has even been known to prevent systems from starting into Safe Mode in a try to remove Exploit:Win32/CVE-2010-1885.A!B. Remove Exploit:Win32/CVE-2010-1885.A from your computer system immediately after detection.

Technical Information

File System Details

Exploit:Win32/CVE-2010-1885.A creates the following file(s):
# File Name Detection Count
1 %PROGRAM_FILES%\ Exploit:Win32/CVE-2010-1885.A\ Exploit:Win32/CVE-2010-1885.A N/A

Registry Details

Exploit:Win32/CVE-2010-1885.A creates the following registry entry or registry entries:
Registry key
HKEY_LOCAL_MACHINE\Software\ Exploit:Win32/CVE-2010-1885.A