This HTML5 document contains 48 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n2http://dbkwik.webdatacommons.org/resource/eE0YPTlE7P_ihCzxSw8M0Q==
n35http://dbkwik.webdatacommons.org/resource/AqhawVOHaOOD3Jp6GgA-mA==
n42http://dbkwik.webdatacommons.org/resource/m5268hoCy0FopVdhvAYd7w==
n29http://dbkwik.webdatacommons.org/resource/ivsCT9g7FOWlPv28deDABw==
dbrhttp://dbpedia.org/resource/
n15http://dbkwik.webdatacommons.org/resource/jzcEmcdXknZvkgkoU16SKw==
n32http://dbkwik.webdatacommons.org/resource/-3Gfk54d75n79ASLuxJdcA==
n44http://dbkwik.webdatacommons.org/resource/SC3t0onGLwvwF8QvxxzX0w==
n18http://dbkwik.webdatacommons.org/resource/RiaMY-W7ua567zJeXjY1LA==
n24http://dbkwik.webdatacommons.org/resource/D027KYJoXcK9FTa3tVa4qA==
n8http://dbkwik.webdatacommons.org/resource/lqAJD5CoJiH4QkuGOupOvg==
n46http://dbkwik.webdatacommons.org/resource/oFabzcYCTg1AHZ7eWuhCqw==
n26http://dbkwik.webdatacommons.org/resource/6hHN-muilW-lUmjLB6nWpA==
dctermshttp://purl.org/dc/terms/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n9http://dbkwik.webdatacommons.org/resource/uazuHg3wEfJ5Uid5iYR3Jw==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n5http://dbkwik.webdatacommons.org/resource/-0XKh82v7N6KqOm73sc6DA==
n13http://dbkwik.webdatacommons.org/resource/FBDHD3NYLre4A0ULYYdn4w==
n27http://dbkwik.webdatacommons.org/resource/EBTk8fB32gpdlsr7xXF73Q==
n30http://dbkwik.webdatacommons.org/resource/IkyuwrJA0hosBHU5MUpQHA==
xsdhhttp://www.w3.org/2001/XMLSchema#
n23http://dbkwik.webdatacommons.org/resource/BZZE-CBpuyKPHPHQKl3ahA==
n17http://dbkwik.webdatacommons.org/resource/Cteci1yq58wDC25geOK15A==
n14http://dbkwik.webdatacommons.org/computersecurity/property/
n33http://dbkwik.webdatacommons.org/resource/YCXPH3z2dbCiF8bueebk3g==
n40http://dbkwik.webdatacommons.org/resource/Pqv16rRY2mX1evSPgXcqkQ==
n4http://dbkwik.webdatacommons.org/resource/lfyBksQXQtsrADzpttT8Zw==
n37http://dbkwik.webdatacommons.org/resource/zXJH7-3NS2TLQgBDiEN8CQ==
n38http://dbkwik.webdatacommons.org/itlaw/property/
n20http://dbkwik.webdatacommons.org/resource/j79587lJaWnOy1x0hUs-6A==
n48http://dbkwik.webdatacommons.org/resource/h0MO9e-m2iwxFFjOGluuIA==
n45http://dbkwik.webdatacommons.org/resource/l5gLjy0mcDHJZl83r62g5A==
n28http://dbkwik.webdatacommons.org/resource/7RuURChrRAi2wcC2ZBcNKw==
n39http://dbkwik.webdatacommons.org/resource/SN4_-8oiZ_OquUw3ahJT3g==
n25http://dbkwik.webdatacommons.org/resource/qUS58TsunhqCeY71OHCGlQ==
n34http://dbkwik.webdatacommons.org/resource/jLtOO3Gs-wxZ7H9jm3Tfpw==
n12http://dbkwik.webdatacommons.org/ontology/
n6http://dbkwik.webdatacommons.org/resource/NeUSOUMmOzRLF40A7sulFw==
n47http://dbkwik.webdatacommons.org/resource/rnga6qiBm4Rtiai6BDB8BA==
n7http://dbkwik.webdatacommons.org/resource/tspjsossm0iZab0x3tufmA==
n16http://dbkwik.webdatacommons.org/malware/property/
n36http://dbkwik.webdatacommons.org/resource/dhn4Tc-C_Pnm-Sc8BHA5QQ==
n31http://dbkwik.webdatacommons.org/resource/dJ24MxWGRceVziLXnMLNtA==
n10http://dbkwik.webdatacommons.org/resource/u9CoJLveKa3hQjUy9NRJUg==
n43http://dbkwik.webdatacommons.org/resource/Utdzx-k_kaXrUjonZN5oEQ==
n41http://dbkwik.webdatacommons.org/resource/NWejT2BOCH-YUhUjNRXCyg==
owlhttp://www.w3.org/2002/07/owl#
n19http://dbkwik.webdatacommons.org/resource/L1GHlBYX4J98h74YQS9dVg==
Subject Item
n2:
rdf:type
n9:
rdfs:label
Sobig
rdfs:comment
The Sobig worm is considered one of the most destructive worms of its time, with an reported total of $37.1 Billion in damage. It has also set records in spreading ability, including the number of emails sent with itself attached. The worm appeared only a little more than two weeks before Slammer. <default>Sobig</default> Type Subtype Creator(s) Date Place of Origin Source Language Platform File Type Aliases Family File Size Infection Size Infection Impact Reported Costs MD5 Hash SHA1 Hash CRC32 Hash The Sobig worm is considered one of the most destructive worms of its time, with a reported total of $37.1 billion in damage. It has also set records in spreading ability, including the number of emails sent with itself attached. The worm appeared only a little more than two weeks before Slammer. Sobig.F is the most destructive variant. The Sobig worm is a computer worm that infected millions of Internet-connected, Microsoft Windows computers in August 2003. It spreadg via the Internet as an attachment to infected emails. It also downloads and sets up a backdoor program. The worm itself is a Windows PE EXE file about 64 KB in length (when compressed by TeLock), and written in Microsoft Visual C++. The Sobig worm was a computer worm that infected millions of Internet-connected, Microsoft Windows computers in August 2003. Sobig is not just a computer worm in the sense that it replicates by itself, but also a Trojan horse that masquerades as something other than malware.
owl:sameAs
dbr:Sobig
n37:
2000000
dcterms:subject
n4: n5: n7: n8: n20: n23: n24: n25: n26: n29: n30: n31: n32: n33: n34: n40: n44: n45: n46: n47: n48:
n16:wikiPageUsesTemplate
n17:
n14:wikiPageUsesTemplate
n15: n35: n41:
n27:
2003-01-09
n36:
Microsoft Windows
n42:
Sobig
n18:
n19: Worm
n38:wikiPageUsesTemplate
n39:
n28:
* I-Worm.Sobig.a * W32/Sobig.a@MM * W32.Sobig.A@mm * Win32.HLLM.Reteras * W32/Sobig-A * Win32/Sobig.A@mm * WORM_SOBIG.A * Worm/Sobig.A * W32/Sobig.A@mm * Win32:Sobig * I-Worm/Sobig.A * Win32.Sobig.A@mm * Worm.Sobig.A * W32/Sobig * Win32/Sobig.A
n13:
C++
n6:
.exe, .pif
n10:
3.71E10
n43:
Microsoft Windows
n12:abstract
<default>Sobig</default> Type Subtype Creator(s) Date Place of Origin Source Language Platform File Type Aliases Family File Size Infection Size Infection Impact Reported Costs MD5 Hash SHA1 Hash CRC32 Hash The Sobig worm is considered one of the most destructive worms of its time, with a reported total of $37.1 billion in damage. It has also set records in spreading ability, including the number of emails sent with itself attached. The worm appeared only a little more than two weeks before Slammer. Sobig.F is the most destructive variant. The Sobig worm was a computer worm that infected millions of Internet-connected, Microsoft Windows computers in August 2003. Sobig is not just a computer worm in the sense that it replicates by itself, but also a Trojan horse that masquerades as something other than malware. The Sobig worm is considered one of the most destructive worms of its time, with an reported total of $37.1 Billion in damage. It has also set records in spreading ability, including the number of emails sent with itself attached. The worm appeared only a little more than two weeks before Slammer. The Sobig worm is a computer worm that infected millions of Internet-connected, Microsoft Windows computers in August 2003. It spreadg via the Internet as an attachment to infected emails. It also downloads and sets up a backdoor program. The worm itself is a Windows PE EXE file about 64 KB in length (when compressed by TeLock), and written in Microsoft Visual C++. Although there were indications that tests of the worm were carried out as early as August 2002, Sobig.A was first found in the wild in January 2003. Sobig.B was released on May 2003. It was first called Palyh, but was later renamed to Sobig.B after anti-virus experts discovered it was a new generation of Sobig. Sobig.C was released May 31 and fixed the timing bug in Sobig.B. Sobig.D came a couple of weeks later followed by Sobig.E in June 25. On August 19, Sobig.F became known and set a record in sheer volume of e-mails.