This HTML5 document contains 11 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n13http://dbkwik.webdatacommons.org/resource/JZK7RwE-9uTp7P-hk7qJrA==
dctermshttp://purl.org/dc/terms/
n6http://dbkwik.webdatacommons.org/resource/TVwvNU4-d_LvWw2YrCFDZg==
n3http://dbkwik.webdatacommons.org/ontology/
n14http://dbkwik.webdatacommons.org/resource/YKgLOQg-jjW-_izFLEkC4Q==
n11http://dbkwik.webdatacommons.org/resource/HovNODxkCDeUNKY2k5WKBg==
n10http://dbkwik.webdatacommons.org/malware/property/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n9http://dbkwik.webdatacommons.org/resource/VljlHEXgtg6mRqStIVmt4w==
n2http://dbkwik.webdatacommons.org/resource/_JQGXlkOUvAYBxwZh09-_A==
n12http://dbkwik.webdatacommons.org/resource/SC3t0onGLwvwF8QvxxzX0w==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n5http://dbkwik.webdatacommons.org/resource/F_j8ASzeeVYnurM3HJQXEA==
xsdhhttp://www.w3.org/2001/XMLSchema#
n8http://dbkwik.webdatacommons.org/resource/6hHN-muilW-lUmjLB6nWpA==
Subject Item
n2:
rdfs:label
Verst!inf
rdfs:comment
Verst!inf is a detection for autorun.inf files that are dropped by the Verst family when spreading to local, network, or removable drives. When copying themselves to a drive, these worms also create a file named 'autorun.inf' in the root of the targeted drive. The autorun.inf file contains execution instructions for the operating system which are invoked when the drive is viewed using Windows Explorer, thus executing the copy of the worm. It should be noted that autorun.inf files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs.
dcterms:subject
n5: n6: n8: n9: n12:
n10:wikiPageUsesTemplate
n11: n13: n14:
n3:abstract
Verst!inf is a detection for autorun.inf files that are dropped by the Verst family when spreading to local, network, or removable drives. When copying themselves to a drive, these worms also create a file named 'autorun.inf' in the root of the targeted drive. The autorun.inf file contains execution instructions for the operating system which are invoked when the drive is viewed using Windows Explorer, thus executing the copy of the worm. It should be noted that autorun.inf files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs.