Skip to main content
Skip to main content
Published Mar 10, 2010 | Updated Sep 15, 2017

Worm:Win32/Emold.F

Detected by Microsoft Defender Antivirus

Aliases: Win32/Autorun.worm.40960.H (AhnLab) W32/Downldr2.ELHZ (Command) Worm.Win32.AutoRun.qpr (Kaspersky) W32/AutoRun.GRM (Norman) Worm.Autorun.Gen!Pac.10 (VirusBuster) Win32.Worm.Autorun.NJ (BitDefender) Win32/Auraax.BL (CA) Win32.HLLW.Autoruner.2640 (Dr.Web) Win32/AutoRun.Agent.E (ESET) Worm.Win32.Autorun (Ikarus) Spy-Agent.bw (McAfee) W32/Autorun.AEL.worm (Panda) Worm.Win32.AutoRun.qpr (Rising AV) W32/AutoRun-LN (Sophos) Worm.Win32.AutoRun.qpr (Sunbelt Software) W32.Auraax (Symantec) WORM_AUTORUN.CTO (Trend Micro)

Summary

Worm:Win32/Emold.F is a worm that installs a trojan rootkit. It can spread via removable drives, spammed to users as an e-mail attachment, and distributed from malicious Web sites. It is capable of downloading arbitrary files, including other malware, from a specific Web site.
Manual removal is not recommended for this threat. To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as Microsoft Security Essentials, or the Microsoft Safety Scanner. For more information about using antivirus software, see http://www.microsoft.com/security/antivirus/av.aspx.
Additional remediation steps for Worm:Win32/Emold.F
This worm may overwrite certain system files that will NOT be restored by its detection and removal. In order to return an infected computer to its pre-infected state, these system files must be restored from backup. The files that may need to be restored are:
  • aec.sys
  • asyncmac.sys
Follow us