Home Malware Programs Trojans Exploit:Win32/CVE-2010-1885.A

Exploit:Win32/CVE-2010-1885.A

Posted: July 14, 2011

Exploit:Win32/CVE-2010-1885.A is a Windows Help and Support Center exploit that remote attackers can use to install at least two types of Trojan droppers onto your computer. Updating your web browser, media player and Windows version will all help prevent Exploit:Win32/CVE-2010-1885.A attacks from occurring or create additional barriers (such as a yes/no prompt) before the attack happens. Computers without these updates are particularly vulnerable to Exploit:Win32/CVE-2010-1885.A attacks, which can trigger when launched by malicious websites and may show no visual indications that they've occurred. You can remove Exploit:Win32/CVE-2010-1885.A-related infections from your PC with any good anti-malware product.

Preventing Exploit:Win32/CVE-2010-1885.A Trojans from Climbing Onto Your PC

Since Exploit:Win32/CVE-2010-1885.A is a general exploit instead of infection, there's nothing you can do to make your computer utterly invulnerable to Exploit:Win32/CVE-2010-1885.A. However, taking any or all of the following precautions have been known to reduce possible Exploit:Win32/CVE-2010-1885.A attacks:

  • Avoid using Windows XP or Windows 2003. As of the time of this writing, these two versions of Windows are the only ones that are affected by the Exploit:Win32/CVE-2010-1885.A exploit.
  • Use Internet Explorer 9 or an entirely different web browser. Exploit:Win32/CVE-2010-1885.A can only attack Internet Explorer 8 and lower versions of the browser.
  • Ugrade Windows Media Player to version 10. This doesn't prevent Exploit:Win32/CVE-2010-1885.A from trying to attack your PC, but Exploit:Win32/CVE-2010-1885.A will add an extra prompt before the attack happens, thus giving you a chance to stop it.
  • Stay away from potentially malicious websites or links. Exploit:Win32/CVE-2010-1885.A typically attacks through these sources, which can include pirate software websites, phony 'adult' websites and sites that rely heavily on affiliate-driven traffic.

What to Do if Exploit:Win32/CVE-2010-1885.A Gets to You

Exploit:Win32/CVE-2010-1885.A is used to install two separate, JavaScript-based Trojans: TrojanDownloader:JS/Adodb.F and TrojanDownloader:JS/Adodb.G. Neither of these Trojans will offer any visible symptoms by themselves, which makes the presence of updated and active security software important for detecting Exploit:Win32/CVE-2010-1885.A's attacks.

Both of these Trojans are known as dropper Trojans that install other harmful programs without your permission. Some possibilities, such as keyloggers, may attempt to steal passwords and other private information while showing limited or no signs of being active. Like rogue security programs, Trojans may blatantly display themselves while providing inaccurate information to confuse you about your PC health.

Some symptoms that can be related to Trojans like the ones that are installed by Exploit:Win32/CVE-2010-1885.A include poor system responsiveness, slow web browsing, hijacks that redirect your browser to an unfamiliar website, pop-ups, excessive memory usage or the appearance of unrecognizable files or memory processes.

Both of these Trojans can be removed by an appropriate anti-malware product. However, manually removing Exploit:Win32/CVE-2010-1885.A-related infections isn't recommended and may even harm Windows if done without an expert's help. To have the best chance of removing all Exploit:Win32/CVE-2010-1885.A problems scan your computer in Safe Mode or use an alternate system boot source prior to deleting Exploit:Win32/CVE-2010-1885.A infections.

File System Modifications

  • The following files were created in the system:
    # File Name
    1 %PROGRAM_FILES%\ Exploit:Win32/CVE-2010-1885.A\ Exploit:Win32/CVE-2010-1885.A

Registry Modifications

  • The following newly produced Registry Values are:
    HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\Software\ Exploit:Win32/CVE-2010-1885.A
Loading...