This HTML5 document contains 16 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n10http://dbkwik.webdatacommons.org/resource/TVwvNU4-d_LvWw2YrCFDZg==
n17http://dbkwik.webdatacommons.org/ontology/
dctermshttp://purl.org/dc/terms/
n7http://dbkwik.webdatacommons.org/resource/YCXPH3z2dbCiF8bueebk3g==
rdfshttp://www.w3.org/2000/01/rdf-schema#
n3http://dbkwik.webdatacommons.org/malware/property/
n15http://dbkwik.webdatacommons.org/resource/_Jn-k_09DH4ap0wd8jsflA==
n4http://dbkwik.webdatacommons.org/resource/Cteci1yq58wDC25geOK15A==
n16http://dbkwik.webdatacommons.org/resource/uazuHg3wEfJ5Uid5iYR3Jw==
n9http://dbkwik.webdatacommons.org/resource/dhn4Tc-C_Pnm-Sc8BHA5QQ==
n12http://dbkwik.webdatacommons.org/resource/dPAZcem1i5gw1J9r_nZqFw==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n18http://dbkwik.webdatacommons.org/resource/EBTk8fB32gpdlsr7xXF73Q==
n14http://dbkwik.webdatacommons.org/resource/h0MO9e-m2iwxFFjOGluuIA==
n19http://dbkwik.webdatacommons.org/resource/F_j8ASzeeVYnurM3HJQXEA==
n8http://dbkwik.webdatacommons.org/resource/RiaMY-W7ua567zJeXjY1LA==
xsdhhttp://www.w3.org/2001/XMLSchema#
n11http://dbkwik.webdatacommons.org/resource/m5268hoCy0FopVdhvAYd7w==
n6http://dbkwik.webdatacommons.org/resource/6hHN-muilW-lUmjLB6nWpA==
n2http://dbkwik.webdatacommons.org/resource/sBe9K1Ja3kyICflNLpnCmg==
Subject Item
n2:
rdf:type
n16:
rdfs:label
Unicle
rdfs:comment
<default>Unicle</default> Type Subtype Creator(s) Date Place of Origin Source Language Platform File Type Aliases Family File Size Infection Size Infection Impact Reported Costs MD5 Hash SHA1 Hash CRC32 Hash This worm is able to work on Chinese versions of Windows only, and spreads itself by sending infected e-mail messages. The virus has two components: a script program and Windows PE .exe file. The first component (script) is sent in infected e-mails, infects the computer, then downloads and executes a .exe. That's the component that completes the infection and spreads the worm copies further.
dcterms:subject
n6: n7: n10: n14: n19:
n3:wikiPageUsesTemplate
n4:
n18:
January. 18, 2007
n9:
Microsoft Windows
n11:
Unicle
n8:
Virus
n15:
Worm
n12:
133632
n17:abstract
<default>Unicle</default> Type Subtype Creator(s) Date Place of Origin Source Language Platform File Type Aliases Family File Size Infection Size Infection Impact Reported Costs MD5 Hash SHA1 Hash CRC32 Hash This worm is able to work on Chinese versions of Windows only, and spreads itself by sending infected e-mail messages. The virus has two components: a script program and Windows PE .exe file. The first component (script) is sent in infected e-mails, infects the computer, then downloads and executes a .exe. That's the component that completes the infection and spreads the worm copies further. * It spreads by attacking IP addresses connected to the Internet obtained at random. * It tries to access the compromised IP address by exploiting an existing vulnerability that hasn't been fixed or through an open port. If it does this, it copies itself onto the compromised computer.