JavaScript support is required for our site to be fully operational in your browser.
Win32.HLLW.Autoruner2.19844
Added to the Dr.Web virus database:
2015-03-26
Virus description added:
2015-03-26
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'TestUSBWorm' = '<SYSTEM32>\USBWorm.exe'
Malicious functions:
Creates and executes the following:
Executes the following:
'<SYSTEM32>\taskhost.exe' import key.reg
'<SYSTEM32>\conhost.exe' /c bat.bat
'%WINDIR%\explorer.exe' /c bat.bat
'<SYSTEM32>\taskhost.exe' /c bat.bat
'%WINDIR%\explorer.exe' import key.reg
'<SYSTEM32>\reg.exe' import key.reg
'%WINDIR%\explorer.exe' C:\
'%WINDIR%\explorer.exe' /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
'<SYSTEM32>\conhost.exe' import key.reg
'<SYSTEM32>\reg.exe' /c bat.bat
Modifies file system :
Creates the following files:
\Device\Mup\.host\Shared Folders\vm_shara\USBWorm.exe
\Device\Mup\.host\Shared Folders\vm_shara\AutoRun.inf
<SYSTEM32>\USBWorm.exe
<Current directory>\key.reg
<Current directory>\bat.bat
Sets the 'hidden' attribute to the following files:
\Device\Mup\.host\Shared Folders\vm_shara\AutoRun.inf
\Device\Mup\.host\Shared Folders\vm_shara\USBWorm.exe
<SYSTEM32>\USBWorm.exe
Deletes the following files:
<Current directory>\key.reg
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK