$ 11.99|https://store.pandasecurity.com/300/purl-vpn?currencies=USS&x-track=55499&cart=iA001PVPNS05&language=en&quantity=1&enablecoupon=false&coupon=1STMOFFPD&x-coupon=1STMOFFPD&x-market=usa&x-track=190478|$ 0.00|$;PREFIX;.;,;11;99;0;00

Get 50% discount! Discover the plan that suits you best!

See offer

Get 50% discount! Discover the plan that suits you best!

See offer

Renew and get 50% off*

Only available for 48 hours!

::

*For home users only

Renew at a discount
::

Renew and get 50% off*

Renew
*Home users only

*For home users only Renew and get 50% off*

::
Renew

Special offer: Renew and get 50% off**

Only available for 48 hours!

::

*For home users only

Renew at a discount

*For home users only Special offer: Renew and get 50% off*

::04
Renew

Hello!

You’re about to visit our web page in English
Would you like to continue?

Yes, I want to visit the web page in English No, I want to visit the web page in

If this is not what you’re looking for,

Visit our Welcome Page!

Call us 24/7 and get a free diagnosis 951 203 528

Active Scan. Scan your PC free

Virus Encyclopedia

Welcome to the Virus Encyclopedia of Panda Security.

Autorun.INF

 
Threat LevelLow threatDamageHighDistributionNot widespread
Common name:Autorun.INF
Technical name:W32/Autorun.INF.worm
Threat level:Medium
Type:Worm
Effects:   It spreads and affects other computers. It spreads , via mapped drives, through shared network resources, by infecting files that are then distributed.
Affected platforms:

Windows 2003/XP/2000/NT/ME/98/95

First detected on:Feb. 4, 2009
Detection updated on:Sept. 21, 2009
StatisticsNo

Brief Description 

    

Autorun.INF is a worm that spreads by copying itself, without infecting other files.

 

Autorun.INF uses the following propagation or distribution methods:

  • Exploiting vulnerabilities with the intervention of the user: exploiting vulnerabilities in file formats or applications. To exploit them successfully it needs the intervention of the user: opening files, viewing malicious web pages, reading emails, etc.
  • Computer networks (mapped drives): it creates copies of itself in mapped drives.
  • Computer networks (shared resources): it creates copies of itself in shared network resources to which it has access.
  • File infection: it infects different types of files, which are then distributed through any of the usual means: floppy disks, email messages with attachments, Internet download, files transferred via FTP, IRC channels, P2P file sharing networks, etc.

 

ARE YOU FACING ANY PC OR INTERNET RELATED PROBLEMS?
FREE SUPPORT INCLUDED. CALL US 24/7

powered by Anytech365