JavaScript support is required for our site to be fully operational in your browser.
Win32.HLLW.Autoruner2.16285
Added to the Dr.Web virus database:
2014-07-21
Virus description added:
2014-07-21
Technical Information
To ensure autorun and distribution:
Creates the following files on removable media:
<Drive name for removable media>:\autorun.inf
<Drive name for removable media>:\windows.exe
Malicious functions:
Executes the following:
'<SYSTEM32>\format.com' /c format x: /q /y
'<SYSTEM32>\format.com' /pid=3576
'<SYSTEM32>\format.com' /c format v: /q /y
'<SYSTEM32>\format.com' /pid=3500
'<SYSTEM32>\format.com' /pid=3616
'<SYSTEM32>\format.com' /pid=3600
'<SYSTEM32>\format.com' /pid=3528
'<SYSTEM32>\format.com' /c format l: /q /y
'<SYSTEM32>\format.com' c: /q /y
'<SYSTEM32>\format.com' /c format u: /q /y
'<SYSTEM32>\format.com' /pid=2996
'<SYSTEM32>\format.com' /pid=3560
'<SYSTEM32>\format.com' /c format s: /q /y
'<SYSTEM32>\format.com' /pid=3592
'<SYSTEM32>\format.com' /c format r: /q /y
'<SYSTEM32>\format.com' /c format w: /q /y
'<SYSTEM32>\format.com' /pid=3632
'<SYSTEM32>\format.com' /c format t: /q /y
'<SYSTEM32>\format.com' /c format h: /q /y
'<SYSTEM32>\format.com' /pid=3532
'<SYSTEM32>\format.com' /c format g: /q /y
'<SYSTEM32>\format.com' /c format q: /q /y
'<SYSTEM32>\format.com' /c format o: /q /y
'<SYSTEM32>\format.com' /c format i: /q /y
'<SYSTEM32>\format.com' z: /q /y
'<SYSTEM32>\format.com' j: /q /y
'<SYSTEM32>\format.com' h: /q /y
'<SYSTEM32>\format.com' i: /q /y
'<SYSTEM32>\format.com' m: /q /y
'<SYSTEM32>\format.com' l: /q /y
'<SYSTEM32>\format.com' k: /q /y
'<SYSTEM32>\format.com' d: /q /y
'<SYSTEM32>\format.com' b: /q /y
'<SYSTEM32>\format.com' a: /q /y
'<SYSTEM32>\format.com' g: /q /y
'<SYSTEM32>\format.com' f: /q /y
'<SYSTEM32>\format.com' e: /q /y
'<SYSTEM32>\format.com' v: /q /y
'<SYSTEM32>\format.com' t: /q /y
'<SYSTEM32>\format.com' u: /q /y
'<SYSTEM32>\format.com' y: /q /y
'<SYSTEM32>\format.com' x: /q /y
'<SYSTEM32>\format.com' w: /q /y
'<SYSTEM32>\format.com' p: /q /y
'<SYSTEM32>\format.com' o: /q /y
'<SYSTEM32>\format.com' n: /q /y
'<SYSTEM32>\format.com' s: /q /y
'<SYSTEM32>\format.com' r: /q /y
'<SYSTEM32>\format.com' q: /q /y
Injects code into
the following system processes:
Modifies file system :
Creates the following files:
<Auxiliary element>
C:\autorun.inf
%WINDIR%.exe
Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\autorun.inf
<Drive name for removable media>:\windows.exe
C:\autorun.inf
%WINDIR%.exe
Miscellaneous:
Searches for the following windows:
ClassName: 'Shell_TrayWnd' WindowName: '(null)'
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK