Worm:Win32/Autorun.QF
Worm:Win32/Autorun.AEU
Worm:Win32/Autorun.gen!AED
Worm:Win32/Autorun.gen!AED is the worm component of Backdoor:Win32/Poison.E. Variants of Worm:Win32/Autorun usually spread using methods that include, but may not be limited to, copying themselves to removable or network drives, and placing an autorun.inf file in the root directory of each affected drive in an attempt to ensure that the worm is run when the removable drive is attached, or the network drive is visited from a remote system supporting the Autorun feature.
In the wild, Worm:Win32/Autorun.gen!AED has been observed to be packaged with two components: a clean application (usually a program called "Resource Hacker") and Backdoor:Win32/Poison.E. The package containing all three components is usually created by a tool detected as Virtool:Win32/Obfuscator.C.
Worm:Win32/Autorun.AAW
Worm:Win32/Autorun.ZJ
Worm:INF/Autorun
Windows Defender Antivirus detects and removes this threat.
This is a detection for a file, called autorun.inf, that can be used by worms when they spread to local, network, or removable drives.
The file has instructions to launch the malware automatically when the removable drive is connected to a PC with the Autorun feature turned on.
This is a common way for malware to spread. However, autorun.inf files on their own are not necessarily a sign of infection; they are also used by legitimate programs.
See our infographic to the right which shows how these worms can spread.
Worm:Win32/Autorun.ADB
Worm:Win32/Autorun.ACS
Worm:Win32/Autorun.AAZ
Worm:VBS/Autorun.BN!inf
Worm:VBS/Autorun.BN!inf is an "autorun.inf" file that is dropped by Worm:VBS/Autorun.BN and used by the worm to propagate through removable drives.