Technical Information
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'mls' = '"%APPDATA%\RAC\mls.exe" -s'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'svcsc.exe' = '%APPDATA%\RAC\svcsc.exe'
- %TEMP%\209515315.tmp
- %TEMP%\rcx6e0e.tmp
- %TEMP%\rcx6eab.tmp
- <PATH_SAMPLE>.doc
- %TEMP%\311775328.tmp
- <PATH_SAMPLE>.doc
- from %TEMP%\rcx6e0e.tmp to %TEMP%\209515315.tmp
- from %TEMP%\rcx6eab.tmp to %TEMP%\209515315.tmp
- from %TEMP%\209515315.tmp to %APPDATA%\rac\mls.exe
- 'wx###lytics.ru':80
- http://wx###lytics.ru/net.exe.config
- http://wx###lytics.ru/net.exe
- DNS ASK wx###lytics.ru
- '%APPDATA%\rac\mls.exe' -s
- '%ProgramFiles%\microsoft office\office14\winword.exe' /n "<PATH_SAMPLE>.doc"' (with hidden window)
- '%APPDATA%\rac\mls.exe' -s' (with hidden window)
- '%ProgramFiles%\microsoft office\office14\winword.exe' /n "<PATH_SAMPLE>.doc"