<Drive name for removable media>:\System\systems.exe
<Drive name for removable media>:\MOXITA.EXE
Malicious functions:
Executes the following:
'<SYSTEM32>\attrib.exe' +S +H +R "G:\autorun.inf"
'<SYSTEM32>\attrib.exe' +S +H +R "F:\autorun.inf"
'<SYSTEM32>\attrib.exe' +S +H +R "E:\autorun.inf"
'<SYSTEM32>\attrib.exe' +S +H +R "J:\autorun.inf"
'<SYSTEM32>\attrib.exe' +S +H +R "I:\autorun.inf"
'<SYSTEM32>\attrib.exe' +S +H +R "H:\autorun.inf"
'<SYSTEM32>\attrib.exe' +S +H +R "G:\system"
'<SYSTEM32>\attrib.exe' +S +H +R "F:\system"
'<SYSTEM32>\attrib.exe' +S +H +R "E:\system"
'<SYSTEM32>\attrib.exe' +S +H +R "J:\system"
'<SYSTEM32>\attrib.exe' +S +H +R "I:\system"
'<SYSTEM32>\attrib.exe' +S +H +R "H:\system"
Modifies file system :
Creates the following files:
C:\swssetup\systems.exe
%WINDIR%\14785\WINUPDATE.DLL
%TEMP%\~1.bat
%WINDIR%\14785\systems.exe
Sets the 'hidden' attribute to the following files:
<Drive name for removable media>:\autorun.inf
%TEMP%\~1.bat
Deletes the following files:
%TEMP%\~1.bat
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more