Skip to main content
Skip to main content
Microsoft Security Intelligence
98 entries found. Displaying page 1 of 5.
Updated on Feb 03, 2011

Windows Defender detects and removes this threat.

This threat is a worm, which means it spreads from PC to PC. This particular worm spreads by copying itself to mapped network or removable drives. If someone tries to open that drive from another PC, their PC will be infected.

Find out ways that malware can get on your PC.  

 

Alert level: severe
Updated on Dec 28, 2007
Trojan:Win32/AgentBypass.gen!K is a generic detection for a group of trojans that attempt to inject possibly malicious code into the process address space of commonly found Microsoft Windows and third-party applications.
Alert level: severe
Updated on Jun 18, 2008
Worm:Win32/Ahkarun.A is an AutoHotKey compiled script worm that spreads through removable drives and send the user's IP address to a remote server.
Alert level: severe
Updated on Aug 11, 2008

Windows Defender detects and removes this threat.

This worm tries to steal information from a certain game, which it then sends to a remote server.

It is a worm, which means it infects or "spreads" to other computers. In this case, the worm spreads by infecting removable drives (such as USB flash drives or portable hard disks) that you have plugged into your computer. If you then plug those drives into another computer, the worm will infect that computer as well.

Click on our infographic to the right to see how a worm spreads by removable drives.

Alert level: severe
Updated on Sep 19, 2008
Worm:Win32/Emold.gen!C is a worm that drops a rootkit in the system to hide its malicious activities and spreads to removable drives. It is also capable of downloading additional malware onto the system from a certain website.
Alert level: severe
Updated on Sep 26, 2008
Worm:Win32/Emold.B is a worm that installs a trojan rootkit, downloads malware and spreads to removable drives.
Alert level: severe
Updated on Oct 14, 2008
Worm:Win32/Mytob.RR is a mass-mailing worm that that targets computers running certain versions of Microsoft Windows and computers across a network. The worm can spread by exploiting Windows vulnerabilities that are fixed by installing Microsoft Security Updates MS03-026 and MS04-011. 
 
The worm can spread by sending a copy of itself through e-mail, AOL Messenger, MSN Messenger, or Windows Messenger. The worm also spreads by copying itself to common shared folders for peer-to-peer file sharing applications such as Morpheus, Limewire, Emule and others. Win32/Mytob.RR has a backdoor component that connects to an IRC server from the infected computer, allowing it to receive commands from attackers.
Alert level: severe
Updated on Dec 04, 2008
Worm:Win32/Slenfbot.ZD is a worm that can spread via MSN Messenger. The worm also contains backdoor functionality that allows unauthorized access to an affected machine. This worm does not spread automatically upon installation, but must be ordered to spread by a remote attacker.
Alert level: severe
Updated on Dec 17, 2008
Worm:Win32/Hamweq.J is a worm that spreads via removable drives, such as USB memory sticks. It may also be used by a remote attacker to order the affected machine to participate in Distributed Denial of Service attacks.
Alert level: severe
Updated on Apr 09, 2009

Worm:Win32/SillyShareCopy.E!inf is an "autorun.inf" file created by a worm to enable it to spread and infect other computers through network shares, removable devices and local drives.

Alert level: severe
Updated on May 27, 2009
Worm:Win32/Autorun.PQ is a worm that spreads to other drives. This worm may terminate applications, change the access control lists (ACLs) of multiple files and download additional malware.
Alert level: severe
Updated on Jul 23, 2009
Worm:Win32/Autorun.CS is a worm that attempts to spread by copying itself to the local computer and to removable drives. This worm modifies system settings to hide its presence.
Alert level: severe
Updated on Dec 14, 2009
Worm:Win32/Hamweq.T is a worm that spreads via removable drives, such as USB memory sticks. It contains an IRC-based backdoor, which may request that it participate in Distributed Denial of Service attacks.
Alert level: severe
Updated on Dec 29, 2009
Worm:Win32/Noxjasm.A is a worm that spreads by copying itself to all drives. It attempts to terminate certain security-related processes and prevent the use of other Windows utilities such as Task Manager.
Alert level: severe
Updated on Dec 29, 2009
Worm:Win32/Autorun.UO is a worm that copies Backdoor:Win32/IRCbot.DP locally and to all removable drives.
Alert level: severe
Updated on Jan 29, 2010
Worm:Win32/Nuqel.Q is a worm that attempts to spread by copying itself to removable drives and network shares, and via Internet chat applications. The worm may download arbitrary files, block certain system utilities and lower security on the affected computer.
Alert level: severe
Updated on Mar 11, 2010
Worm:Win32/Emold.G is an encrypted executable with a file size of 38,912 bytes. It can spread via removable drives, be spammed to users as an e-mail attachment, or distributed from malicious Web sites. It is capable of downloading arbitrary files, including other malware, from a specific Web site.
Alert level: severe
Updated on Feb 03, 2011

Windows Defender Antivirus detects and removes this threat.

This family of worms spreads by copying itself to the mapped drives of an infected PC, including network or removable drives.

Alert level: severe
Updated on Oct 31, 2008

Worm:Win32/Autorun.PL is a worm that spreads by dropping copies of itself onto removable drives. It also modifies the system file "explorer.exe".

Alert level: severe
Updated on Feb 03, 2009
Worm:Win32/Autorun.FC is a worm that spreads via removable drives and attempts to download files from a remote Web address.
Alert level: severe