Saturday, 5 May 2012

3.GENERAL INTRO ABOUT VIRUSES


computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types ofmalware, including but not limited to adware and spyware programs that do not have a reproductive ability.










what are types of virus programs?
  

Virus programs

The Creeper virus was first detected on ARPANET, the forerunner of the Internet, in the early 1970s.Creeper was an experimental self-replicating program written by Bob Thomas at BBN Technologies in 1971.Creeper used the ARPANET to infect DEC PDP-10 computers running the TENEX operating system.Creeper gained access via the ARPANET and copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed. The Reaper program was created to delete Creeper.
A program called "Elk Cloner" was the first personal computer virus to appear "in the wild"—that is, outside the single computer or lab where it was created. Written in 1981 by Richard Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread via floppy disk. This virus, created as a practical joke when Skrenta was still in high school, was injected in a game on a floppy disk. On its 50th use the Elk Cloner virus would be activated, infecting the personal computer and displaying a short poem beginning "Elk Cloner: The program with a personality."
The first IBM PC virus in the wild was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi Brothers in Lahore, Pakistan, reportedly to deter piracy of the software they had written.
Before computer networks became widespread, most viruses spread on removable media, particularly floppy disks. In the early days of the personal computer, many users regularly exchanged information and programs on floppies. Some viruses spread by infecting programs stored on these disks, while others installed themselves into the disk boot sector, ensuring that they would be run when the user booted the computer from the disk, usually inadvertently. Personal computers of the era would attempt to boot first from a floppy if one had been left in the drive. Until floppy disks fell out of use, this was the most successful infection strategy and boot sector viruses were the most common in the wild for many years
Traditional computer viruses emerged in the 1980s, driven by the spread of personal computers and the resultant increase in BBSmodem use, and software sharing. Bulletin board-driven software sharing contributed directly to the spread of Trojan horse programs, and viruses were written to infect popularly traded software. Shareware and bootleg software were equally common vectors for viruses on BBSs.[citation needed] Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers.
Macro viruses have become common since the mid-1990s. Most of these viruses are written in the scripting languages for Microsoft programs such as Word and Excel and spread throughout Microsoft Office by infecting documents and spreadsheets. Since Word and Excel were also available for Mac OS, most could also spread to Macintosh computers. Although most of these viruses did not have the ability to send infected email messages, those viruses which did take advantage of the Microsoft Outlook COM interface.[citation needed]
Some old versions of Microsoft Word allow macros to replicate themselves with additional blank lines. If two macro viruses simultaneously infect a document, the combination of the two, if also self-replicating, can appear as a "mating" of the two and would likely be detected as a virus unique from the "parents".
A virus may also send a web address link as an instant message to all the contacts on an infected machine. If the recipient, thinking the link is from a friend (a trusted source) follows the link to the website, the virus hosted at the site may be able to infect this new computer and continue propagating.
Viruses that spread using cross-site scripting were first reported in 2002, and were academically demonstrated in 2005.There have been multiple instances of the cross-site scripting viruses in the wild, exploiting websites such as MySpace and Yahoo.
A Quick Reference Picture about VIRUSES:

                                             





Here is a List of COMPUTER  VIRUSES:


NameAlias(es)TypeSubtypeIsolation DateIsolationOriginAuthorNotes
1260MS-DOS1990Mark Washburn, Ralf BurgerFirst virus to use polymorphic encryption
4K4096MS-DOSJanuary 1990unknownThe first virus to use stealth
5loMS-DOSOctober 1992unknownInfects .EXE files only
A and AMS-DOS
Windows 95,Windows 98
unknownunknown
A-403MS-DOS
Windows 95,Windows 98
1998unknown
AbraxasMS-DOS
Windows 95,Windows 98
April 1993unknownInfects COM file. Disk directory listing will be set to the system date and time when infection occurred.
AcidMS-DOS
Windows 95,Windows 98
1992Corp-$MZUInfects COM file. Disk directory listing will not be altered.
AcmeUpon executing infected EXE, this infects another EXE in current directory by making a hidden COM file with same base name.
ABC
A ctifedh
Ada
Agena
AGI-Plan
Ah
AI
AIDS
AIDS II
AirCopAir cop-BMS-DOSJan 1990
Ajax
Alabama
Albanet
Alcon
Alien
Ambulance
Amstrad
Ancient
Andre
Andre2
Andromeda
Angelina
Anna
Anna KournikovaEmail
VBScript
Jan de Wit
Anninja
ANT
Ant-Cow
Anthrax - Boot
Anthrax - File
ANTI2-1989Does not spread under MultiFinder.
AntiCMOS
AntiHeuristicaIt's payload is opposite of Cascade DOS virus, instead of the letters being pushed down, it pushes it upwards.
Anti-D
Anti-Daf
Anti-MIT
Anti-Pascal II
Anti-Pascal
Anti-Tel
Anti-Telefonica
Apadana
Apost.exe
Arab
Aragon
Aragorn
ARCV-n
Argentina
Arka
Arma
Armagedon The Greek
Armagedon
Arriba
Arusiek
ASC
Ash
ASP-472
Astra
AT 144
AT 149
Atas
Atas3321
Atas-400
Atom
Atomic1A
Atomic1b
Atomic2A
Atomic2b
Atte-629
August 16
AusPar
Australian
Azusa
B Ugly
B3
B-52
BA101
Back Time
Bacros
Badass
Bad Boy
Bad Brains
Bad Command
Bad Guy
Bad Sectors 1.2
Bad-389
Bak
Bamestra
Banana
Bandit
Baobab 731
Barcelona
Barrotes 2
Barrotes
Basil
Bat
Beach
Beaches
Beast
BeBe
Beeper
Beer
Benoit
Real PvP Flava
Berlin
Best Wishes
Beta
Beva-32
Beva-33
Beva-96
Beware
BFD
Big 2000
Bit Addict
BlackDeath
Black Knight
Blackworm
Black Monday
Blackjack
Black Pegasus
Blaze
Bljec
Blood Lust
Blood Rage
Blood
Blood-2
Bob
Bomber
Boot Killer
BounceWindowsUpon activation, it makes message boxes on screen and the mouse cursor "bounce" up and down. It does no other damage.[1]
Bouncing Dot
Bow
Boys
Brainy
BrO_AcTWindows XPThis virus will block most anti-virus programs and disable 'regedit', 'msconfig', and 'task manager'
Brotherhood
Brothers
Browser EnhancementClaims to enhance browser experience, but when computer is re-booted, displays a fake anti-piracy warning claiming to need to pay to drop charges, but steals your credit card number.
Bryansk
Bubbles 2
Bubbles
Bubonic
Budo
Burger
Burghofer
Busted
Butterfly
Butthole
Byte BanditAmiga, Bootsector virusJanuary 1988Swiss Cracking Association
Byte WarriorAmiga, Boot sector virus
(c)BrainPakistani flu,January 1986Lahore,PakistanBasit andAmjad Farooq AlviConsidered to be the first computer virus for the PC
C
Cabanas
Caco-Daemon
CAD Kill
C-A-D
Cannabis
Cansu
Capital
Cara
Caribe
Carioca
CaroEvil
Cartuja
Casc1621
Casc-2
Cascade
Casino
Casper
Casteggio
Caterpillar1575MS-DOS
Catman
Catphish
Caz
CB-1530
CD
CDEF8-1990
CDFL Mac
CD-10
Century
Cerburus
CFSK
Chad
Chang
Chaos
Chaser
Chasna
Chcc
Cheeba
Cheesy
Chemist
Chemnitz
Chernobyl
Chile Mediera
Chinese Blood
Chr-869
Chrisj13
Christmas Tree
Christmas Violator
CIH
Cinderella
Civil Service
Civil War II
Civil War III
Civil War IV
Civil War V
Civil War
CkSum
Clagger
Clint
Clonewar 2
Clonewar
Clust
Coahuila
CODE 111-1993Renames the hard drive to "Trent Saburo" on any October 31.
CODE 2524-1992
Code Zero
Coffee Shop
Collor de Mello
Color
Com16850
Com2S
Comdex
Commentator
Commwarriormost common mobile phone virus for nokia mobile phones, transmits via bluetooth wireless.
Como
Compiler2
Comspec
Conficker
Cop-Mpl
Copyright
Copyr-ug
Coruna
Coruna3
Cossiga No Grazie
Cossiga
Costeau
CPXK
Cracker Jack
Cracky
Crash
Crasher
Crazy Eddie
Crazy Imp
CrazyI B
CRF
Cross Over
Crystal
CSL
CV4
D1
DKid
Dada
Damage
Danny
Dark Apocalypse
Dark Avenger
Dark End
DataLock
Datos
Davis
D-Day
Death
Deathead
Deceide 2
Dedicated
Deicide
Demolition
Demon
Den Zuk
Dennis
Deranged
Diablo
Dial
DigiDeliver
Dima
Disk Killer
Dismember
Dodgy 1024
Dodo 2456
Dodo
Doodle
Dorn
Dose-A
Druid
Dudley
Dutch Tiny
DutchScare Worm This virus deletes all users, all data, and s the worst virus yet.Earthday
Eclypse
ECV
Ed
Edcl
EDV
EggEgg is a computer virus that affects the COM. and EXE files.
Eggdrop
Ein Volk
Einstein
Ekoterror
E1ectr0n
ElizaDOSDec 1991
Elk ClonerApple IIRichard SkrentaThe first virus observed "in the wild"
Elvirus
Elvira
EMF 625
EMF
Emmie
EMO
Empire
End-of
Enemy
Enigma
Enola
Error 412 virus
Error
Essex
Estepa
ETC
Europe-92
Evil Genius
Exper416
Explode
Exploration
Exterminator
Eziarch
Family Q
Farcus
Father Christmas
Faust
Fax Free
Fear
Feist
Fellowship
Fich
Fich897
Filedate
Filename
Filler
Fingers
Finn-357
Fish 1100
Fish 2
Fish 2420
Fish Boot
Fish
Flagyll
Flash
Flex
Flip
Flower
Flu-2
Fly11
Fone Sex
Fotomoto
Forger2
Form
Fortran
Frajer
Francois
FrankieMacintosh emulatorTargeted pirated versions of the Aladdin emulator.
Fratricide
Free
Frere Jacques
Fri13-nz
Friday 13th COM
Friday 13th
Friday the 13th - Version A
Frodo Soft
Frodo-458
Frogs
Fu Manchu
Fune
Fun.exe virusw32.AssarmWindowsXP6-23-2008
Fvhs-a
Fvhs-B
F-Word
paul eduard
G
Galicia
Ganeu
Gedza
Geek
Gergana
Germ
Get Password 1
Ghost Boot
Ghost COM
Ghost Dos-62
Gijon
Gliss
Goblin
Gomb
Gorlovka
Gotch 4
Gotcha 1
Gotcha 2
Gotcha 3
Gotcha 9e
GotchaCreated from original identity 'Gotchix'Spread on Facebook through 'add friend' linkage
Got-you
Grapje
Graveyard
Graybird(Backdoor Graybird, Backdoor Graybird P)
Green
Grog31
Groovy
Growing Block
Grue
Grunt
Grunt-3
Guppy
H-2
H-457
HA
Happy virus
Hack-83
HACKER
Hacktic
Hafen
Haifa
Hallo
Halloechen
Halloween
Hammer
Happy N. Y.
Happy
Hara
Harakiri
HareMS-DOS
Windows 95,Windows 98
August 1996UnknownFamous for press coverage which blew its destructiveness out of proportion
Harm
Hary
Hastings
Hate
HBT
Heevahava
Hello
Hellween 1182
Hellween
Here
Hero
Hero-394
Hi
Hidrag
Highland
Hiperion
Hitchcock
Hitler
Holland Girl
Holo/Holocaust
Holiday
Horror
Horse Boot
Horse
HS
Huge
Hungarian
Hybrid
Hymn
IB Demonic
I-B
Ice 9
ICE9-159
ICE9-199
ICE9-224
Ice9-250
Icelandic II
Icelandic
Icelandic-3
IDF
Idle
Ieronim
IKV528
Ill
ILOVEYOU
Incom
Infinity
INIT 174-1993
INIT 291988
INIT 198413-3-1992Malicious, triggered on Friday the 13th.
INIT 9403SysX3-1994Very destructive, destroys all data. Found only on Italian systems so far.
INIT-M4-1993Malicious, triggered on Friday the 13th.
Inofensivo
Inrud-B
Internal
Intruder
Invader
Invisible Man
Invitation
Invol
IOU
Iranian
Iraqi Warrior
IT
IVP EX1
IVP EX2
IVP
Japan
Jeefo
Jeff
Jerk
Jeru-1663
Jerusalem
Joanna
Jobbie
John
JoJo
Joke
Joker
Joker-1602
Joker3
Jonathan (malware)
Joshi
Joshua
July 13th
July 26
June 16th
June1530
Junky
Justice
Kamasutra
Kak worm
killerjeff.exe
L1Infects .COM files. Affects the computers runtime operation and corrupts data files.
Labelh1n1
Lamer ExterminatorAmiga, Boot sector virusOctober 1989GermanyRandom encryption, fills random sector with "LAMER"
Lanc
Lanc5476
Lanc5882
Larry
Lazy
LCV
Leapfrog
Leech
Lehigh
Leper AOD
LeprosyInfects COM.And EXE. Files after its visual payload on DOS
Les
Lib1172
Liberty
Liquid Code - 2
Liquid Code
Lisbon
Little Brother
Little Girl
Little Pieces
Little
LixoNuke
Loa Duong
LockJaw
Lockz
LPT-OFF
Lycee
Mabuhay
Macedonia
MacMagDrew, Bradow, Aldus, Peace12-1987
Madcow
Magnitogorski 3
Magnum
Malage
Malaise
Malign
Malmsey Habitat v3.b
Malmsey2
Malmsey
Maltese Amoeba
Malware Defense
Mannequin
Manola
Manta
Many Fingers
Marauder
Mardi Bros .
MAS
Mark II
Marzia
Math Test
Matura
Mayak
MazorTrojanworm/virus2-2008infects .exe files
MBDF2-1992
MCWH1022
McWhale
MDEFGarfield, Top Cat5-1990
Meditation
MegM
Melissa1999part macro virus and part worm
Memory Lapse
MG
MichelangeloApril 1991New ZealandRan March 6 (Michelangelo's birthday)
Michelangelo II
Mindless
Mini
Mini-125
Mini-132
Mini-195
Mini-207
Minimax
Minimite
Minsk-GH
Mir
Mirror
Missouri
Mix2
Moctezuma
Monika
Monkey
Mono
Monxla
Monxla-B
More
Mosquito
Mozkin
Mr. G
Mr. Vir
MS Antivirus
Msk
MuddScriptAtomical
Mugshot
Mule
Multi
Multi-11
Multi-2
Mummy
Munich
Murphy
Music Bug
Mutant
Mutating Interrupt
Mutation Engine
Mystic
NAPC
Navidad
Nazi
NatasMultipartite, stealth, polymorphic1994"Priest"
N-Beta
NCU Li
Necro
Necrophilia
Necrosoft
NED
New Sunday
New Zealand
Vesion 1.0.0.0
New-1701
NewBug
Newcom
Next Generation
Neznamy
Night Grawler
Nina
Nines Compliment
Ninja
No Par
No Wednesday
Nobock
NoCopy
No-Int
Nomenclature
NOP
NoStart
Not-586
Nov17
NPox 2.0
NPox 2.1
Null
Number 6
Number of The Beast
numgame.vbs
nVIR1987
Nygus-KL
Nutty MouseMalfunctions the mouse while putting itself to the system.
Offspring
Off Stealth
Ohio
Omega
Omt
OneHalf
Ontario.1024
Ontario.2048
Ontario1990
Oropax
Otto-415
Over4032
Oxana
P1
P-45
P529
PA-5792
Page B
Page
Parite
Parity B
Payday
PC Cyborg
PC Flu
PCBB11
PCBB3072
PCBB5B
PCV
PE2
Peach
Peek
Pegg
Peking
Penis Size
Pentagon
Penza
Perfume
Phantom
Phoenix
PI
Pig
Pikachu virus
Ping-pongBoot, Bouncing Ball, Bouncing Dot, Italian, Italian-A, VeraCruzBoot sector virusHarmless to most computers
Pizelun
PL
Platinum
PLO
Popular
Porridge
Poshkill
Possessed
Predator Dropper
Prabhagaran
Predator
Pregnant
Prime Evil B
Prime
Print Monster
Print Screen
Prism
Prob-734
Problem
Proto-T
Prudents
Quamo
RabbitInfects the operational memory. It's one of the fastest copying viruses and makes the computer totally unuseful.
Random
Rattle
Raubkopi
RavMonE.exeRJump.A, Rajump, JisxWorm2006-06-20Once distributed in Apple iPods, but a Windows-only virus
Reaper
Reader_sA malware that infects a computer and damages system core files, sometimes making BSOD and disabling anti-viruses. This is a high-risk computer virus.
Rebo-715
Red Cross
Redemption
Red Team
RedX
Reklama
Relzfu
Replicator
Reset
Revelation
Rigel
Romanian
Russian Tiny
S-847Trojan horse
Sabathvindu
Sacramento
Saddam
Sadist
Sair
Sakora
San Diego
Sandra
Sandwich
Saratoga
Satan
Saturday 14th
Saturday
Sayha Waptpu
SBC
SCAAmiga, Boot sector virusNovember 1987SwitzerlandSwiss Cracking AssociationPuts a message on screen. Harmless except it might destroy a legitimate non-standard boot block.
Schrunch
ScoresEric, Vult, NASA, San Jose FluSpring 1988Designed to attack two specific applications which were never released.
Scott's Valley
Scream 2
Screaming Fist
Scribble
Scroll
SCT
Scythe2D
Sdir
Secrets
Selectronics
Semtex
Sentinel
Sentinel-X
Seoul
Serena
Sergeant
SevenDust
Sh
Shadow
Shake
Shaman
Shanghai
Shankar's VirusW97M.Marker.oPolymorphic VirusInfects Word Documents
Shatin
Shiny Happy
Shock Therapy
Shoerec
Show Game
Silence
Silent Banker
Silly Willy
Silver Dollar
Silver3b
SimileThe Mental Driller
Simple 1992
Simulati
Sis
Sk
Sk1
Skeleton
Skew 469
Skism 808
Skism
SkyTap Gen
Slant
Slayer
Slovak
Slow
Sma-108a
Small 129
Small 132B
Small 146
Small 157
Small 178
Small 185
Small 187
Small
Small-38
Smash
Smily
Smithsonian
SolanoSoup Delete (computer virus) Simple format C drive
Something
Snow White and the Seven Dwarfs
Soupy
Sov
Soyun
Spanish April Fool
Spanish
Spanz
Spar
Sparta
Sp0rk3h
Spyer
SQR
Squawk
Squeaker
Squisher
SRE
Staf
Stahl Platte
Stealth_CBoot Sector VirusStealth_C causes the total system and available free memory, to decrease by 4,096 bytes.
Stoned
Striker
Stupid
Subliminal
SubZero
Suicide
Sunday
Sunday-2
Sundevil
Suriv 402
Suriv A
Suriv B
Surrender
Susan
SVC 5.0/6.0
Sverdlov
SVir
Swap Boot
Swen - "News" spelled backwards
Swiss 143
Swiss Phoenix
SX
Sylvia
Sys
Syslock/3551
saplad, roberto
T-1
T46-1992Included in GoMoku 2.0 and 2.1.
T297
Tabulero 2
Taiwan
Taiwan3
Taiwan4
Taocheng
Techno
Tecla
Telecom Boot
Telecom File
Telekom
Teletype
Teletype-2
Tentacle
Tequila
Terror
Tester
TigraaPolandPiotr Bania aka Lord Yup aka dis69, 29A group memberPeter Ferrie's analysis
TMTM
TP
Tremor2
TridenT
Triple Shot
Troi Two
Tschantches
T-series
TU-482
Tuesday
Tula
Tumen V0.5
Tumen V2.0
Tumen
Turbo
Turkey
Tver
Twin Peaks
Twin-351
twoneight
Typo Boot
Ucender
Ugur
Undressed
Unk
Uriel
Uruk 300
Uruk 361
Uruk-HaiUnknown
USSR
USSR 1049
USSR 2144windows extract
USSR 256
USSR 257
USSR 3103
USSR 311
USSR 394
USSR-394
USSR 492
USSR 516
USSR 600
USSR 696
USSR 707
USSR 711
USSR 830
USSR 948
V1 0
V1 1
V1028
V125
V1463
V163
V1-Not
V2 0
V2000
V2100
V270X
V299
V2P2
V2P6
V-351
V-388
V400
V483
V5
V600
V800
V801
V82
V914
V961
VA
Vacsina
VCL
VCL-HEEvE
Vcomm
VCS
VDV-853
VHP
VHP-2
V-Label
VM
VP
VTS
VVF-34
Venge-E
Vera Cruz
Victor
Vienna/648
Vietnamese
Violator
Viper
Viperizer B
Viral Messiah
Virdem
Virflop
virus-101
virus-90
Voco
Vootie
Voronezh
Vote/Vote1000
Vriest
W13
WAVE
Warbiest Terminator2008For Windows XP Only.
Warbiest Terminator v.2.02009For Windows XP and Vista.
WWT
Walkabout
Walker
Warez
Warrior 2
Warrior
Wazoo
WDEF12-1989Affects only Macintosh System 6.
Weak
Whale
Wharps
WhoCares
Why win
Wilbur 3
Wild trojan
Willistrover III
Willow
Willow 2
WinAble2004Windows systems only.Disrupts system performance by displaying pop-ups. Starts only when computer is on, and slows internet performance as well.
Windmill
WinNuke
Winvir
Wisconsin
Wizard 3.0
Wolfman
Wonder
Word Atom Macro
Word Color Macro
Word Concept Macro
Word Hot Macro
Wordswap
World Peacew32.myzor.FK@yf
Wsnpoem
X-1
X-2
X-3A
X-3B
X77
Xabaras
Xpeh
XTAC
Xuxa
Yale
Yan2505a
Yankee
Yankee - 2
Yap
Year 1993
Yerg
Youth
Yukon
Z10
ZK900
ZRK
ZU1
Zak2
Zaragosa
Zeppelin
Zero Bug
Zero Time
ZeroHunt
ZMistZMistfall, Zombie.MistfallZ0mbie
Zoda
Zohra

Get bored of reading those list of viruses? Here is a interesting stuff,were you too can make a virus

Here is the list of the softwares that allows you to make Virus:

1. In Shadow Batch Virus Generator

1. First of all download the virus maker from here

2. Run "In Shadow Batch Virus Generator.exe" application to see something like this:


3. You can use various options to make virus to suit your needs. You can:
  • Infect files of various extensions
  • Insert virus in startup menu, Kill various processes.
  • Disable all security services like Windows Defender, Antivirus, Firewall.
  • Rename file extensions, spread virus via file sharing.
  • Create new admin account, change user account password.
  • Block various websites, download trojan files to victim computer, shutdown victim computer and much more.

4. After selecting various options, move on to "Creating Options" tab and hit on "Save as Bat". Assign name to the virus and hit on Save.

5. Now, you have your virus ready to hack your victim. This virus maker is undetectable by the most antiviruses.

I am not responsible for any action performed by you. Also, do not try this virus on your own computer. This virus software is one of the most efficient virus software used today.


2. JPS Virus Maker


This is also a great virus maker with many features in it. Check all the features of JPS Virus maker 
here.


3. TeraBIT Virus Maker


A powerful virus maker for you. Look for updates here

These two virus makers are detected as a viruses by the most anti-virus softwares, but they won't harm your pc in any way. Before you run these virus makers disable your anti-virus temporarily.

NOTE:
These posts are educational purpose only.I Can't take charge of any illegal activities done
using this.

IS AUTORUN.INF A VIRUS?
 When i  start using kaspersky it detected autorun.inf as a virus.  I thought so.  Because my antivirus blocks autorun.inf files . But when i search about autorun.inf file in net, i realize about the auto run file.

 Today i bring some files from my college system.  When i insert the pen drive in my system, there are lot of exe files.They are viruses.  I delete all of them.  Finally i opened the autorun.inf file in notepad and saw the instructions.  Then only i remembered that i forget to post about autorun file.  This article will give you complete details about the autorun.inf file.
This is the instructions that saved in the infected(call virus programs) autorun.inf file:

[Autorun]
Open=RECYCLER\QqFvXcB.exe
Explore=RECYCLER\QqFvXcB.exe
AutoPlay=RECYCLER\QqFvXcB.exe
shell\Open\Command=RECYCLER\QqFvXcB.exe
shell\Open\Default=1
shell\Explore\command=RECYCLER\QqFvXcB.exe
shell\Autoplay\Command=RECYCLER\QqFvXcB.exe



is autorun.inf virus file?  no.  Then why antivirus block the autorun.inf files?  Go ahead to know the full details about auto run file.

Introduction to Autorun.inf File:
Auto run is file that triggers other programs,documents ,other files to be opened when the cd or pen drives are inserted.  Simpy triggers.

When cd or pen drives are inserted, windows will search for the autorun.inf file and follow the instructions of autorun.inf file(instructions have written inside the autorun.inf file). 

How to create Autorun file?
Open notepad
type this command:
[Autorun]
save the file as "autorun.inf" (select all files, not text )

Complete Syntax and instructions inside the Autorun file:
Basic syntax must be inside  the autorun.inf file is :
[Autorun]
This will be used to identify the the file as autorun.

OPEN=
This will specify which application should be opened when the cd or pen drive is opened

Example:
open=virus.exe
This will launch the virus.exe file when cd or pen drive is opened.  The file should be in root directory.
if the file is in any other sub directories ,then we have to specify it.
Open=RECYCLER\Virus.exe
Explore=
Nothing big difference. if you right click and select explore option in cd or pen drive.  This command will be run.

AutoPlay=
Same as the above , but it will launch the the program when auto played.


SHELL\VERB =

The SHELL\VERB command adds a custom command to the drive's shortcut menu. This custom command can for example be used to launch an application on the CD/DVD.

Example:

shell\Open\Command=RECYCLER\QqFvXcB.exe
shell\Open\Default=1
shell\Explore\command=RECYCLER\QqFvXcB.exe
shell\Autoplay\Command=RECYCLER\QqFvXcB.exe



Use a series of shell commands to specify one or more entries in the pop-up menu that appears when the user right-clicks on the CD icon. (The shell entries supplement the open command.)

Icon=
Change the icon of your pen drive or cd.  you can use .ico,.bmp images(also .exe,.dll)

Example:
icon=breakthesecurity.ico
Label=

Specifies a text label to displayed for this CD in Explorer
Note that using the LABEL option can lead to problems displaying the selected ICON under Windows XP.

Example:
Label=Ethical hacking


Why Antivirus Block Autorun.inf file?
From above ,you come to know that autorun.inf file is not virus.  But why antivirus blocks it?  Because as i told autorun file call or launch any application or exe files.  It will lead to virus attack.  If the autorun.inf is blocked,then there is no way to launch the virus code. 

Autorun is not virus but it can call virus files.

                         <<<<<<<<<<<<Soon Updating This  More>>>>>>>>>>>>>