Attention: We have transitioned to a new AAD or Microsoft Entra ID from the week of May 20, 2024. In case your tenant requires admin consent, please refer to this document located at Overview of user and admin consent - Microsoft Entra ID | Microsoft Learn and grant access to App ID: 6ba09155-cb24-475b-b24f-b4e28fc74365 with graph permissions for Directory.Read.All and User.Read for continued access. While the app may appear unverified, you can confirm its legitimacy by verifying the App ID provided.
Send us feedback
Thank you for your feedback
We couldn't find the malware. Try searching for the malware you’ve encountered. If you opened this link from a Microsoft product, please
use the Feedback Hub app
to report the invalid URL.
We couldn't find the malware. We’ve returned search results instead. If you opened this link from a Microsoft product, please
use the Feedback Hub app
to report the invalid URL.
The autorun.inffile is created by worms when they copy themselves to a local, network, or removable drive.
Some worms can spread to other PCs by infecting removable drives that you have plugged into your PC (such as USB drives or portable hard disks). If you plug those drives into another PC, the worm will infect that PC as well.
This is a common way for malware to spread. However, autorun.inf files on their own are not necessarily a sign of infection, they are also used by legitimate programs.
VirTool:INF/Autorun.gen!H is a generic detection for the "autorun.inf" configuration data file that performs automated actions associated with removable media drives. One such action is to open an executable named "\BUMARA\darica.exe" when the drive is first connected or accessed and Autorun is enabled.
VirTool:INF/Autorun.gen!J is a generic detection for the "autorun.inf" configuration data files dropped by various worms, which perform automated actions associated with removable media drives.
VirTool:INF/Autorun.gen!k is a generic detection for the "autorun.inf" configuration data file that performs automated actions associated with removable media drives.
VirTool:INF/Autorun.gen!L is a detection for "autorun.inf" files that may be used by worms when spreading to local, network, or removable drives. When copying themselves to a drive, worms can create a file named "autorun.inf", which contains execution instructions for the operating system. When the drive is viewed using Windows Explorer, "autorun.inf" runs, thus executing the worm copy.
It should be noted that "autorun.inf" files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs.
VirTool:INF/Autorun.VirTool:INF/Autorun.gen!P is a detection for "autorun.inf" files that may be used by worms when spreading to local, network, or removable drives. When copying themselves to a drive, worms can create a file named "autorun.inf", which contains execution instructions for the operating system. When the drive is viewed using Windows Explorer, "autorun.inf" runs, thus executing the worm copy.
It should be noted that "autorun.inf" files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs.
VirTool:INF/Autorun.gen!N is a detection for "autorun.inf" files that may be used by worms when spreading to local, network, or removable drives. When copying themselves to a drive, worms can create a file named "autorun.inf", which contains execution instructions for the operating system. When the drive is viewed using Windows Explorer, "autorun.inf" runs, thus executing the worm copy.
It should be noted that "autorun.inf" files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs.
VirTool:INF/Autorun.gen!C is a detection for "autorun.inf" files that may be used by worms when spreading to local, network, or removable drives. When copying themselves to a drive, worms can create a file named "autorun.inf", which contains execution instructions for the operating system. When the drive is viewed using Windows Explorer, "autorun.inf" runs, thus executing the worm copy.
It should be noted that "autorun.inf" files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs.
VirTool:INF/Autorun.gen!E is a detection for "autorun.inf" files that may be used by worms when spreading to local, network, or removable drives. When copying themselves to a drive, worms can create a file named "autorun.inf", which contains execution instructions for the operating system. When the drive is viewed using Windows Explorer, "autorun.inf" runs, thus executing the worm copy.
It should be noted that "autorun.inf" files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs.
VirTool:INF/Autorun.gen!G is a detection for "autorun.inf" files that may be used by worms when spreading to local, network, or removable drives. When copying themselves to a drive, worms can create a file named "autorun.inf", which contains execution instructions for the operating system. When the drive is viewed using Windows Explorer, "autorun.inf" runs, thus executing the worm copy.
It should be noted that "autorun.inf" files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs.
VirTool:INF/Autorun.gen!I is a detection for "autorun.inf" files that may be used by worms when spreading to local, network, or removable drives. When copying themselves to a drive, worms can create a file named "autorun.inf", which contains execution instructions for the operating system. When the drive is viewed using Windows Explorer, "autorun.inf" runs, thus executing the worm copy.
It should be noted that "autorun.inf" files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs.
VirTool:INF/Autorun.gen!M is a detection for "autorun.inf" files that may be used by worms when spreading to local, network, or removable drives. When copying themselves to a drive, worms can create a file named "autorun.inf", which contains execution instructions for the operating system. When the drive is viewed using Windows Explorer, "autorun.inf" runs, thus executing the worm copy.
It should be noted that "autorun.inf" files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs.
VirTool:INF/Autorun.gen!O is a detection for "autorun.inf" files that may be used by worms when spreading to local, network, or removable drives. When copying themselves to a drive, worms can create a file named "autorun.inf", which contains execution instructions for the operating system. When the drive is viewed using Windows Explorer, "autorun.inf" runs, thus executing the worm copy.
It should be noted that "autorun.inf" files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs.
VirTool:INF/Autorun.gen!R is a detection for "autorun.inf" files that may be used by worms when spreading to local, network, or removable drives. When copying themselves to a drive, worms can create a file named "autorun.inf", which contains execution instructions for the operating system. When the drive is viewed using Windows Explorer, "autorun.inf" runs, thus executing the worm copy.
It should be noted that "autorun.inf" files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs.
VirTool:INF/Autorun.gen!Q is a detection for "autorun.inf" files that may be used by worms when spreading to local, network, or removable drives. When copying themselves to a drive, worms can create a file named "autorun.inf", which contains execution instructions for the operating system. When the drive is viewed using Windows Explorer, "autorun.inf" runs, thus executing the worm copy.
It should be noted that "autorun.inf" files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs.
VirTool:INF/Autorun.gen!S is a detection for "autorun.inf" files that may be used by worms when spreading to local, network, or removable drives. When copying themselves to a drive, worms can create a file named "autorun.inf", which contains execution instructions for the operating system. When the drive is viewed using Windows Explorer, "autorun.inf" runs, thus executing the worm copy.
It should be noted that "autorun.inf" files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs.
VirTool:INF/Autorun.gen!T is a generic detection for "autorun.inf" files that use suspicious actions or commands. It may be used by other malware to automatically launch related .EXE or executable files.