Virus.VBS/Autorun.worm is a worm that spreads by copying itself to local hard drives, network drives, and removable drives. It has no other functionality. The first file is the worm’s Visual Basic Script file. The autorun.inf file causes the __.vbs file to be executed when an infected drive is accessed with a computer that has autorun enabled on the drive in question. The batch file can make the registry changes by adding the contents of __.reg in to the registry. If the __.bat file was executed by the registry entry, it then runs the script file.


Virus.VBS/Autorun.worm also tries to alter this registry entry:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced ShowSuperHidden
This alteration is an attempt to make hidden files invisible in Windows Explorer.